Coding Matters

Sign: Area closed. Keep out

Where are your visitors?

You’ve visited a building where you need an access card. Without the card, you don’t get in. But the card doesn’t (or shouldn’t) open all doors once you are in the building. Some areas must be off-limits. That’s physical access control. Digital access control works on the same principle. It

Continue reading →
Canonical classes in Java - picture of a canon

Canonical classes in Java

You’ve heard the term “canonical class”, but what does it mean? In Java, a canonical class is simply a well-formed or well-behaved class. The canonical class form is most often used for model classes (also called domain or entity classes).

Continue reading →
HTTPS

Is this site secure?

HyperText Transfer Protocol (HTTP) is the network protocol that allows your browser to communicate with a web server. HTTP makes it possible to send and receive information across the internet. HTTPS is the secure version of HTTP. For a long time, you only needed HTTPS if you used sensitive data

Continue reading →
money on a laptop

How much do you owe?

We know that Covid-19 has had a disastrous effect on the economy every where. For individuals and companies, it has meant a loss of income and an increase in financial debt. That got me to thinking about a different kind of debt. Technical debt.

Continue reading →
Log in screen with username and password fields

What did you do with my password?

As a user, you need to manage your passwords. (If you are struggling with that, read our blog post about password managers.) As a developer, you have a much greater responsibility. You are the Guardian at the Gate: it’s your job to keep your users’ passwords safe from potential attackers.

Continue reading →
JavaBeans and POJOs - image of coffee beans

JavaBeans and POJOs

You’ve heard of JavaBeans. But what are they actually? Java 1.1. introduced the term JavaBean to describe a self-contained, reusable, high-granularity component. The original idea was to create high-level building blocks for graphical user interfaces (GUI).

Continue reading →
Masked man using fishing rod to hook a laptop that someone is working on

Are you a smart phish?

I haven’t won the lottery for ages. And it’s been a while since an unknown relative died and left me a fortune. But I still get phishing emails quite often, and they are getting more sophisticated.

Continue reading →
Koi ponds at Incus Data

A virtual change of scenery

I don’t know about you, but there are days when I crave a change of scenery. Pre-pandemic, my life was pretty routine. Work, exercise, an occasional outing with friends. I think anyone with a full-time job and responsibilities at home – from laundry to looking after family – has a

Continue reading →

Thank You

We're Excited!

Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)

Don't Worry

Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.

If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com

How can we help you?

Let us contact you about your training requirements. Just fill in a few details, and we’ll get right back to you.