-
Android Core
Android Data Binding Tutorial
This post describes one of the most interesting feature in Android recently introduced and still in beta version: Android Data…
Read More » -
Scala
Divided We Win: an event sourcing / CQRS prospective on write and read models separation. Commands and Events.
In today’s post we are going to unveil some very interesting (in my opinion) architecture styles: event sourcing and command…
Read More » -
DevOps
Kubernetes Application – Package Multiple Resources Together
Deploying an application in Kubernetes require to create multiple resources such as Pods, Services, Replication Controllers, and others. Typically each resource…
Read More » -
Software Development
Divided we Stand: Optional
Our recent article “NULL is Not The Billion Dollar Mistake. A Counter-Rant” got us a lot of reads, controversial comments,…
Read More » -
Software Development
Regarding team building and bonding – on developer teams
This is something I wanted to write for some months now, especially after my relocation to a new country and…
Read More » -
Core Java
Comparing Hashing strategies
Overview Chronicle has a number of implementations for hashing, including City and Murmur. It also has it’s own Vanilla Hash,…
Read More » -
Enterprise Java
Use stored procedures with Hibernate
This article show different ways to call stored procedures from hibernate. JDBC actions will not be covered. Postgresql will be…
Read More » -
Software Development
Comments on The Twelve-Factor App
The Twelve-Factor App is a recent methodology (and/or a manifesto) for writing web applications that hopefully is getting quite popular.…
Read More » -
Software Development
Why You Should Encrypt ALL Personally Identifiable Information (PII)
Many critics have pointed out that Ashley Madison should have encrypted all personally identifiable information (PII). The database contained sensitive…
Read More »