5mof
9
akka
2
blindsight
2
cryptography
1
devops
1
diagnostic logging
5
docker
2
error handling
1
infrastructure
1
java
23
jmx
3
memory
3
object capabilities
2
play ws
7
play
2
postgresql
1
rails
2
ruby
1
sbt
1
scala
19
security
6
sqlite
1
ssl
7
terse-logback
17
testing
1
tls
7
tracing
6
5mof
-
The User Illusion 26 May 2012
-
Systemantics 17 Mar 2012
-
Failing with Passwords 17 Feb 2012
-
Heuristics in Mate Search 17 Jan 2012
-
Five Minutes of Web Frameworks 18 Nov 2011
-
How We Make Decisions 21 Oct 2011
-
Happiness Lecture at Noisebridge 15 Jul 2011
-
The Logic of Failure 10 Jun 2011
-
Life in Fifty Years 23 Apr 2011
cryptography
diagnostic logging
docker
error handling
infrastructure
java
-
Logging Structured Data to Database 18 Sep 2019
-
Hierarchical Instrumented Tracing with Logback 15 Sep 2019
-
Tracing With Logback and Honeycomb 22 Aug 2019
-
Triggering Diagnostic Logging on Exception 28 Jul 2019
-
Targeted Diagnostic Logging in Production 22 Jul 2019
-
How to Log an Exception, Part 2 06 Jul 2019
-
How to Log an Exception 29 Jun 2019
-
Application Logging in Java: Putting it all together 23 Jun 2019
-
Application Logging in Java: Filters 15 Jun 2019
-
Application Logging in Java: Tracing 3rd Party Code 11 Jun 2019
-
Application Logging in Java: Encoders 09 Jun 2019
-
Application Logging in Java: Logging Costs 03 Jun 2019
-
Application Logging in Java: Appenders 27 May 2019
-
Application Logging in Java: Markers 18 May 2019
-
Application Logging in Java: Converters 11 May 2019
-
Application Logging in Java: Adding Configuration 05 May 2019
-
Application Logging in Java: Creating a Logging Framework 23 Apr 2019
-
Redefining java.lang.System with Byte Buddy 19 Jan 2016
-
Self-Protecting Sandbox using SecurityManager 29 Dec 2015
-
An Easy Way to Secure Java Applications 22 Dec 2015
-
The Right Way to Use SecureRandom 17 Dec 2015
-
Closing the Open Door of Java Object Serialization 08 Nov 2015
-
Effective Cryptography in the JVM 05 Oct 2015
jmx
memory
object capabilities
play ws
-
Play TLS Example With Client Authentication 07 Jul 2014
-
Testing Hostname Verification 31 Mar 2014
-
Fixing Hostname Verification 23 Mar 2014
-
Fixing Certificate Revocation 22 Mar 2014
-
Fixing X.509 Certificates 20 Mar 2014
-
Monkeypatching Java Classes 02 Mar 2014
-
Fixing The Most Dangerous Code In The World 13 Jan 2014
play
rails
scala
-
Logging vs Memory 09 Jul 2020
-
Why I Wrote A Logging Library 26 May 2020
-
Responsibility Tracking in Ocaps 21 Jul 2018
-
Security in Scala: Using Object Capabilities 24 Jun 2018
-
Exposing Akka Actor State with JMX 19 Aug 2014
-
Composing Dependent Futures 10 Jul 2014
-
Play TLS Example With Client Authentication 07 Jul 2014
-
Akka Clustering, Step by Step 25 Jun 2014
-
Writing an SBT Plugin 24 Jun 2014
-
Testing Hostname Verification 31 Mar 2014
-
Fixing Hostname Verification 23 Mar 2014
-
Fixing Certificate Revocation 22 Mar 2014
-
Fixing X.509 Certificates 20 Mar 2014
-
Monkeypatching Java Classes 02 Mar 2014
-
Fixing The Most Dangerous Code In The World 13 Jan 2014
-
Play in Practice 20 Apr 2013
-
Error Handling in Scala 27 Dec 2012
-
Problems Scala Fixes 16 Dec 2012
-
Remember Me Cookies for Play 2.0 07 Jul 2012
security
-
Redefining java.lang.System with Byte Buddy 19 Jan 2016
-
Self-Protecting Sandbox using SecurityManager 29 Dec 2015
-
An Easy Way to Secure Java Applications 22 Dec 2015
-
The Right Way to Use SecureRandom 17 Dec 2015
-
Closing the Open Door of Java Object Serialization 08 Nov 2015
-
Best Practices Crypto Algorithms 08 Oct 2010
ssl
-
Play TLS Example With Client Authentication 07 Jul 2014
-
Testing Hostname Verification 31 Mar 2014
-
Fixing Hostname Verification 23 Mar 2014
-
Fixing Certificate Revocation 22 Mar 2014
-
Fixing X.509 Certificates 20 Mar 2014
-
Monkeypatching Java Classes 02 Mar 2014
-
Fixing The Most Dangerous Code In The World 13 Jan 2014
terse-logback
-
Logging Structured Data to Database 18 Sep 2019
-
Hierarchical Instrumented Tracing with Logback 15 Sep 2019
-
Tracing With Logback and Honeycomb 22 Aug 2019
-
Triggering Diagnostic Logging on Exception 28 Jul 2019
-
Targeted Diagnostic Logging in Production 22 Jul 2019
-
How to Log an Exception, Part 2 06 Jul 2019
-
How to Log an Exception 29 Jun 2019
-
Application Logging in Java: Putting it all together 23 Jun 2019
-
Application Logging in Java: Filters 15 Jun 2019
-
Application Logging in Java: Tracing 3rd Party Code 11 Jun 2019
-
Application Logging in Java: Encoders 09 Jun 2019
-
Application Logging in Java: Logging Costs 03 Jun 2019
-
Application Logging in Java: Appenders 27 May 2019
-
Application Logging in Java: Markers 18 May 2019
-
Application Logging in Java: Converters 11 May 2019
-
Application Logging in Java: Adding Configuration 05 May 2019
-
Application Logging in Java: Creating a Logging Framework 23 Apr 2019
tls
-
Play TLS Example With Client Authentication 07 Jul 2014
-
Testing Hostname Verification 31 Mar 2014
-
Fixing Hostname Verification 23 Mar 2014
-
Fixing Certificate Revocation 22 Mar 2014
-
Fixing X.509 Certificates 20 Mar 2014
-
Monkeypatching Java Classes 02 Mar 2014
-
Fixing The Most Dangerous Code In The World 13 Jan 2014