In many programming languages we are urged to define methods hashCode, equals and toString. They are named like this in Java and in many JVM languages or they use similar names. Some languages like Perl and Scala provide decent mechanisms for the language to figure these out itself, which we do most of the time …
Kategorie-Archive: English
Can hashCodes impose a security risk?
This may come as a surprise, but attackers can assume that software is running in one of the common languages with their standard library. This calculates the hashcode of a string in a predictable way. For that reason it is possible, to create a large number of entries that result in strings having the same …
Unit Tests as Specifications
Quite often I hear the idea, that one team should specify a software system and get the development done by another team. Only good documentation is needed and good API contracts and beyond that, no further cooperation and communication is needed. Often a complete set of unit tests is recommended as a way or as …
Microservices
Microservices are a Hype, but they have their pros and cons. Sometimes people say, that this is the magic tool to solve all problems. They hear it on conference talks, read it in the internet or even in books. It is not the first time and it won’t be the last time that we hear …
ScalaUA 2019
In March 2019 I have visited ScalaUA in Kiev. It was interesting. I attended the following talks: Thinking Functionally by John A. De Goes Streaming data processing with Apache Spark by Roksolana Diachuk Theory of Constraints in Programming: Beyond Problem-Solving by Anatolii Kmetiuk Video Q&A session with Martin Odersky by Martin Odersky and Jon Pretty …
www.it-sky-consulting.com now https only
I have converted my company site www.it-sky-consulting.com to always use https. This is something all sites should do in the next few months.
Weird blackmailing via email from „Hacker“
I got a few emails, that looked like this (see at the button). I replaced all references to myself with xxxx. The source of the email indicates, that a mailserver „nmail.brlp.in“ has been used for this. The fact, that the email seems to come from my own mail address is not a proof that this …
Cisactions
New research has analyzed the concept of transactions from a very theoretical point of view. An interesting result of this research was the concept of cisactions, which are in some way the opposite of transactions. A duality between cisactions and transactions has been proven. This means that in principal every application that is based on …
Unicode and C
It is a common practice in C to use arrays of char as strings. The 0 is used as end marker. The whole thing was created like that in the 1970s and at that time it was kind of cool to get away with one less language feature and to express it in terms of …
Article 13
The European Parliament is considering to pass an article 13 that would interfer with the internet usage and freedom of speech in the internet under the pretence of enforcing copyright violations. It is important to resist. Links wired online-petition save the internet open letter How the German EU parliament member intend to vote (Twitter) NZZ …