-
Software Development
[MEGA DEAL] Cybersecurity Certification Mega Bundle (93% off)
Study for the CISA, CISM, & CISSP Exams & Jumpstart a New Career Hey fellow geeks, This week, on our…
Read More » -
Core Java
javap Usage Unfolds: What’s Hidden Inside Your Java Class Files?
What’s javap, how do you use it and when would you want to disassemble class files? There are a number…
Read More » -
Core Java
jhsdb: A New Tool for JDK 9
I like to use the command-line tools provided with the JDK in the early steps of analyzing performance and other…
Read More » -
Software Development
Microservices Patterns With Envoy Proxy, Part III: Distributed Tracing
This blog is part of a series looking deeper at Envoy Proxy and Istio.io and how it enables a more…
Read More » -
Agile
Zombies Are Muttering “Agile”, “DevOps”, “Containers”, “Big Data”, and “Microservices”
DevOps is the word of the year. Everyone speaks about it, and many are hoping to apply it, even though…
Read More » -
Core Java
JUnit 5 – Parameterized Tests
JUnit 5 is pretty impressive, particularly when you look under the covers, at the extension model and the architecture. But…
Read More » -
Core Java
Parsing in Java: all the tools and libraries you can use
If you need to parse a language, or document, from Java there are fundamentally three ways to solve the problem:…
Read More » -
Agile
Defining “Scaling” Agile, Part 3: Creating Agile Product Development Capabilities
In the “Scaling” Agile: Part 1, I wrote about cross-functional collaborative teams. The cross-functional collaborative feature team is the basis…
Read More » -
Software Development
The use of proxy indicators in service management
Operating any non-trivial IT-service is a complex exercise. There are multiple aspects one needs to bear in mind while building…
Read More »