Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

To manage what a user can or cannot do... Continue Reading →

I don't remember all of them, but the last one was:

Often the structure of domain objects needs to be updated to reflect some recent business case changes in your app.

As I promised on Twitter, I selected a couple of talks from the event that I liked very much (I almost feel guilty of selecting just […]

These are bundles, where, dependent on the java version you use, different manifest information is to be applied.

If you are working in an enterprise infrastructures, chances are that you are using a centralized authentication system, most likely Active Directory…

I am going to create simple form for post.

In this article I'm going to explain how to create keys, SSL certificates and key stores.

Everyone faces some strange behavior in software products from time to time.

View previous queries