5mof
9
akka
3
blacklite
1
blindsight
5
books
2
cryptography
1
devops
1
diagnostic logging
5
docker
2
echopraxia
2
error handling
1
groovy
1
infrastructure
1
java
26
jmx
3
json-ld
1
logback
2
memory
3
object capabilities
2
play ws
7
play
2
postgresql
1
rails
2
ruby
1
sbt
1
scalafix
1
scala
27
security
6
sqlite
1
ssl
7
terse-logback
17
testing
1
tls
7
tracing
7
5mof
-
The User Illusion 26 May 2012
-
Systemantics 17 Mar 2012
-
Failing with Passwords 17 Feb 2012
-
Heuristics in Mate Search 17 Jan 2012
-
Five Minutes of Web Frameworks 18 Nov 2011
-
How We Make Decisions 21 Oct 2011
-
Happiness Lecture at Noisebridge 15 Jul 2011
-
The Logic of Failure 10 Jun 2011
-
Life in Fifty Years 23 Apr 2011
akka
blindsight
cryptography
diagnostic logging
docker
echopraxia
error handling
infrastructure
java
-
The Case For Logging 12 Jun 2022
-
Dynamic Debug Logging and Echopraxia Improvements 09 Apr 2022
-
Echopraxia, a Better Java Logging API 02 Jan 2022
-
Logging Structured Data to Database 18 Sep 2019
-
Hierarchical Instrumented Tracing with Logback 15 Sep 2019
-
Tracing With Logback and Honeycomb 22 Aug 2019
-
Triggering Diagnostic Logging on Exception 28 Jul 2019
-
Targeted Diagnostic Logging in Production 22 Jul 2019
-
How to Log an Exception, Part 2 06 Jul 2019
-
How to Log an Exception 29 Jun 2019
-
Application Logging in Java: Putting it all together 23 Jun 2019
-
Application Logging in Java: Filters 15 Jun 2019
-
Application Logging in Java: Tracing 3rd Party Code 11 Jun 2019
-
Application Logging in Java: Encoders 09 Jun 2019
-
Application Logging in Java: Logging Costs 03 Jun 2019
-
Application Logging in Java: Appenders 27 May 2019
-
Application Logging in Java: Markers 18 May 2019
-
Application Logging in Java: Converters 11 May 2019
-
Application Logging in Java: Adding Configuration 05 May 2019
-
Application Logging in Java: Creating a Logging Framework 23 Apr 2019
-
Redefining java.lang.System with Byte Buddy 19 Jan 2016
-
Self-Protecting Sandbox using SecurityManager 29 Dec 2015
-
An Easy Way to Secure Java Applications 22 Dec 2015
-
The Right Way to Use SecureRandom 17 Dec 2015
-
Closing the Open Door of Java Object Serialization 08 Nov 2015
-
Effective Cryptography in the JVM 05 Oct 2015
jmx
logback
memory
object capabilities
play ws
-
Play TLS Example With Client Authentication 07 Jul 2014
-
Testing Hostname Verification 31 Mar 2014
-
Fixing Hostname Verification 23 Mar 2014
-
Fixing Certificate Revocation 22 Mar 2014
-
Fixing X.509 Certificates 20 Mar 2014
-
Monkeypatching Java Classes 02 Mar 2014
-
Fixing The Most Dangerous Code In The World 13 Jan 2014
play
rails
scala
-
ExecutionContext.parasitic and Friends 20 Jun 2024
-
Using Scalafix to Refactor Logging 18 Nov 2022
-
Adding Echopraxia to Akka 02 Oct 2022
-
What Scala adds to a Logging API 12 Jun 2022
-
Adding Scala 3 Support to Blindsight 19 Jul 2021
-
Debugging and Observing Your Scala Code 06 Jun 2021
-
Dynamic Logging with Conditions 02 May 2021
-
Semantic Logging with JSON-LD 27 Feb 2021
-
Logging vs Memory 09 Jul 2020
-
Why I Wrote A Logging Library 26 May 2020
-
Responsibility Tracking in Ocaps 21 Jul 2018
-
Security in Scala: Using Object Capabilities 24 Jun 2018
-
Exposing Akka Actor State with JMX 19 Aug 2014
-
Composing Dependent Futures 10 Jul 2014
-
Play TLS Example With Client Authentication 07 Jul 2014
-
Akka Clustering, Step by Step 25 Jun 2014
-
Writing an SBT Plugin 24 Jun 2014
-
Testing Hostname Verification 31 Mar 2014
-
Fixing Hostname Verification 23 Mar 2014
-
Fixing Certificate Revocation 22 Mar 2014
-
Fixing X.509 Certificates 20 Mar 2014
-
Monkeypatching Java Classes 02 Mar 2014
-
Fixing The Most Dangerous Code In The World 13 Jan 2014
-
Play in Practice 20 Apr 2013
-
Error Handling in Scala 27 Dec 2012
-
Problems Scala Fixes 16 Dec 2012
-
Remember Me Cookies for Play 2.0 07 Jul 2012
security
-
Redefining java.lang.System with Byte Buddy 19 Jan 2016
-
Self-Protecting Sandbox using SecurityManager 29 Dec 2015
-
An Easy Way to Secure Java Applications 22 Dec 2015
-
The Right Way to Use SecureRandom 17 Dec 2015
-
Closing the Open Door of Java Object Serialization 08 Nov 2015
-
Best Practices Crypto Algorithms 08 Oct 2010
ssl
-
Play TLS Example With Client Authentication 07 Jul 2014
-
Testing Hostname Verification 31 Mar 2014
-
Fixing Hostname Verification 23 Mar 2014
-
Fixing Certificate Revocation 22 Mar 2014
-
Fixing X.509 Certificates 20 Mar 2014
-
Monkeypatching Java Classes 02 Mar 2014
-
Fixing The Most Dangerous Code In The World 13 Jan 2014
terse-logback
-
Logging Structured Data to Database 18 Sep 2019
-
Hierarchical Instrumented Tracing with Logback 15 Sep 2019
-
Tracing With Logback and Honeycomb 22 Aug 2019
-
Triggering Diagnostic Logging on Exception 28 Jul 2019
-
Targeted Diagnostic Logging in Production 22 Jul 2019
-
How to Log an Exception, Part 2 06 Jul 2019
-
How to Log an Exception 29 Jun 2019
-
Application Logging in Java: Putting it all together 23 Jun 2019
-
Application Logging in Java: Filters 15 Jun 2019
-
Application Logging in Java: Tracing 3rd Party Code 11 Jun 2019
-
Application Logging in Java: Encoders 09 Jun 2019
-
Application Logging in Java: Logging Costs 03 Jun 2019
-
Application Logging in Java: Appenders 27 May 2019
-
Application Logging in Java: Markers 18 May 2019
-
Application Logging in Java: Converters 11 May 2019
-
Application Logging in Java: Adding Configuration 05 May 2019
-
Application Logging in Java: Creating a Logging Framework 23 Apr 2019
tls
-
Play TLS Example With Client Authentication 07 Jul 2014
-
Testing Hostname Verification 31 Mar 2014
-
Fixing Hostname Verification 23 Mar 2014
-
Fixing Certificate Revocation 22 Mar 2014
-
Fixing X.509 Certificates 20 Mar 2014
-
Monkeypatching Java Classes 02 Mar 2014
-
Fixing The Most Dangerous Code In The World 13 Jan 2014
tracing
-
Conditional Distributed Tracing 28 Aug 2021
-
Queryable Logging with Blacklite 26 Nov 2020
-
Why I Wrote A Logging Library 26 May 2020
-
A Diagnostic Logging Showcase 15 Mar 2020
-
A Taxonomy of Logging 10 Mar 2020
-
Hierarchical Instrumented Tracing with Logback 15 Sep 2019
-
Tracing With Logback and Honeycomb 22 Aug 2019