Microservices and Kerberos Authentication

Read all

How to Make Sure Your Mobile App is Secure

Mobile app development has become vital for enterprises as they look to support new devices (phones, tablets, wearables, etc.) for internal use while also... Read all

Can Static Analysis replace Code Reviews?

In my last post, I explained how to do code reviews properly. I recommended taking advantage of static analysis tools like Findbugs, PMD, Klocwork or Fortify to... Read all

Service Injection in Doctrine DBAL Type

When you think of a Doctrine 2 DBAL Type you think of an atomic thing, but how can you work programmatically on this type without defining an event? A DBAL Type... Read all

Understanding TCP/IP Network Stack & Writing Network Apps

We cannot imagine Internet service without TCP/IP. All Internet services we have developed and used at NHN are based on a solid basis, TCP/IP. Understanding how... Read all

Spring Tool Suite (STS) and Groovy/Grails Tool Suite (GGTS) 3.0.0 releases

We are proud to announce that the newest major release of our Eclipse-based developer tooling is now available. This is a major release not only in terms of new... Read all

Tools for Renaming the Package of a Dependency with Maven

If you need to rename the Java package of a 3rd party library, e.g. to include it directly in your project while avoiding possible conflicts, you can use one of... Read all

We’re not Japanese and we don’t build cars

In 1979 a group of western dignitaries visited Japan to learn more about the manufacturing models that had been applied to great success. Konosuke Matsushita,... Read all

 

 

 

 

Top