Hands-on with Jenkins – set up the system, connect to ticket systems & version management and create CI/CD pipelines. 10% discount until 19.9. Continuous integration/continuous...
Continuing the post on the factory method addresses two issues: slicing and ownership semantics. Patterns are an important abstraction in modern software development. They offer well-defined...
voonze Developer presents the videocast by Eberhard Wolff and Lisa Moritz: This episode is dedicated to the training of software architects. The current episode of...
We tested Camtasia 2022 for screen recording, the small mixer Rødecaster Pro 2 and the video editing program Video Trimmer for Linux. This week the...
Attackers could gain full control over PC systems with, among other things, IBM Business Process Manager or IBM Data Replication. IBM software admins should act...
The factory method from the book “Design Patterns” is also known as the virtual constructor. It defines an interface to create an object. Patterns are an...
Three years ago, the Apple subsidiary FileMaker was renamed Claris. In a next step, the name of the database software disappears completely. The database software...
Two half-day online training courses convey the basic knowledge in a practical way so that developers can make data protection-friendly decisions right from the start. ...
Attackers could use vulnerabilities in GitLab to guess passwords or execute malicious code despite two-factor authentication. Developers who manage versions of Git-based software projects with...
From September 6th to 8th, the autumn campus will take place again on site, in the TH Nuremberg. Now it’s time to book quickly to be...