When we write APIs, that have parameters or as return values, it is a good idea to consider relying on immutable objects only. This applies also when collections are involved directly or indirectly as content of the classes that occur as return values or parameters. Changing what is given through the API in either direction …
Autor-Archive: bk1
Scala Days 2019
Scala Days had a tenth anniversary in 2019. It is an annual conference about Scala, which I like to visit, when possible. There is some confusion as to what is meant: Where this the 9th, 10th or 11th Scala Days? Where the first Scala Days 9, 10 or 11 years ago? The truth is, that …
hashCode, equals and toString
In many programming languages we are urged to define methods hashCode, equals and toString. They are named like this in Java and in many JVM languages or they use similar names. Some languages like Perl and Scala provide decent mechanisms for the language to figure these out itself, which we do most of the time …
Can hashCodes impose a security risk?
This may come as a surprise, but attackers can assume that software is running in one of the common languages with their standard library. This calculates the hashcode of a string in a predictable way. For that reason it is possible, to create a large number of entries that result in strings having the same …
Unit Tests as Specifications
Quite often I hear the idea, that one team should specify a software system and get the development done by another team. Only good documentation is needed and good API contracts and beyond that, no further cooperation and communication is needed. Often a complete set of unit tests is recommended as a way or as …
Microservices
Microservices are a Hype, but they have their pros and cons. Sometimes people say, that this is the magic tool to solve all problems. They hear it on conference talks, read it in the internet or even in books. It is not the first time and it won’t be the last time that we hear …
ScalaUA 2019
In March 2019 I have visited ScalaUA in Kiev. It was interesting. I attended the following talks: Thinking Functionally by John A. De Goes Streaming data processing with Apache Spark by Roksolana Diachuk Theory of Constraints in Programming: Beyond Problem-Solving by Anatolii Kmetiuk Video Q&A session with Martin Odersky by Martin Odersky and Jon Pretty …
50 years of internet
According to some the RFC1, which was published on 1969-04-07, was the start of the internet. Many RFCs have since this time been published and they describe the standards of the internet. The early internet did contain functionality to communicate between computers, but it did of course not include http, html and the WWW, which …
www.it-sky-consulting.com now https only
I have converted my company site www.it-sky-consulting.com to always use https. This is something all sites should do in the next few months.
Weird blackmailing via email from „Hacker“
I got a few emails, that looked like this (see at the button). I replaced all references to myself with xxxx. The source of the email indicates, that a mailserver „nmail.brlp.in“ has been used for this. The fact, that the email seems to come from my own mail address is not a proof that this …