Object Mappers Disable Domain Driven Design

An application needs to be able to retrieve and store data in order to do something useful. This data is eventually stored in some sort of persistent database. Object mappers are frequently used to convert persisted data to objects in memory and the other way around. The biggest motivation behind using object mappers is that […]

Read More

Java Uses Call-by-value? Yes, but …

Java is known to be a language that uses call-by-value as an evaluation strategy. This is correct when you look at the definition from a technical point of view. This is also obvious in the case of primitives because you can only change their value by assignment. In the case of objects, this definition can […]

Read More

The Exception Handling Jungle in Java

What is the best strategy to handle exceptions in Java? That’s the question I have been asking myself for a long time. First I was convinced that checked exceptions were the way to go. Later on, I started to prefer unchecked exceptions because of the disadvantages of checked exceptions. With the release of Java 8, […]

Read More

Domain Driven Design for the Win?

When I think about domain driven design, I also tend to think about the book written by Erik Evans (Domain Driven Design – Tackling Complexity in the Heart of Software).  It is a fantastic book and I would recommend every software engineer to read it. The book explains how you can design your software so that it […]

Read More

How to be successful at Agile

Agile software development is a development method that tries to solve a lot of the issues of plan-driven development methods like the waterfall model. Although Agile can be the solution to these issues, there are many pitfalls that can prevent teams from being succesful at Agile. Plan-driven Approach Issues In order to develop using a […]

Read More

Data Validation Strategy for Web Applications

Implementing data validations can be complex and time consuming. It is also important once you implemented everything, you can modify it easily. So you need to design your validations for change. The difficult thing about validations is that they can be implemented in different places throughout a web application. First we need to make a […]

Read More

Creating an Authorization Server using JWTs

The aim of this post is to illustrate how to build a simple authorization server using JWTs. The source code of this project is available at my GitHub account: https://github.com/nille85/auth-server. About JWTs JWTs are self-containing tokens. In contrast to opaque tokens, all the necessary information about a user or client is present in the token […]

Read More

One-time Pad Implementation In Java

In this post you can find an implementation of the one-time pad cipher in Java. This cipher uses a symmetric key, which means that the same key is used to encrypt and decrypt. The same function is applied in the encrypt and decrypt function. It is basically a xor operation between a byte from the […]

Read More

Creating and Reading Public and Private Keys

Working with public and/or private keys can be very confusing. When you search for documentation how touse  these in Java, it can be overwhelming. DER, PEM, CRT, CER, KEY, X.509, ASN.1, PKCS1, PKCS8, PKCS12, PKI…What can be used for public keys? What can be used for private keys? What is the encoding? X.509 certificate When searching […]

Read More

Pushing a Maven Project to the Central Repository


August 4, 2016

DevOps, Java, Maven

No Comment

A couple of weeks ago, I started working on a new open source project in my spare time. The aim of the project is my own implementation of an authorization server. The architecture will be inspired by OAuth 2.0, OpenID Connect and JSON Web Tokens. The project itself is build using Maven. Now I have […]

Read More