Software Development
-
An Alternative to the Twitter River – Index Tweets in Elasticsearch with Logstash
For some time now I’ve been using the Elasticsearch Twitter river for streaming conference tweets to Elasticsearch. The river runs…
Read More » -
Database primary key flavors
Types of primary keys All database tables must have one primary key column. The primary key uniquely identifies a row…
Read More » -
The Simple Story Paradox
I’ve recently been following the #isTDDDead debate between Kent Beck (@kentbeck), David Heinemeier Hansson (@dhh), and Martin Fowler (@martinfowler) with…
Read More » -
gonsole weeks: content assist for git commands
While Eclipse ships with a comprehensive Git tool, it seems that for certain tasks many developers switch to the command…
Read More » -
How to increase productivity
Unlocking productivity is one of the biggest concerns for any person with a management role. However, people rarely agree on…
Read More » -
10 things you can do as a developer to make your app secure: #5 Authentication Controls
This is part #5 of a series of posts on the OWASP Top 10 Proactive Development Controls: In the previous…
Read More » -
Graph Degree Distributions using R over Hadoop
There are two common types of graph engines. One type is focused on providing real-time, traversal-based algorithms over linked-list graphs…
Read More » -
Code For Maintainability So The Next Developer Doesn’t Hate You
Unless your problem domain includes some specific need for highly optimized code, consider what is your biggest coding priority. I’m…
Read More » -
10 things you can do to make your app secure: #4 Access Control
This is #4 in a series on the OWASP Top 10 Proactive Controls: 10 things that developers can do to…
Read More »