Coding Matters

Security alert

When do you know if something went wrong?

This is a very important question. How do you know if something has gone wrong, or if your site has been compromised? The answer is that, unless you are logging and monitoring events, you don’t know. If you read about major data breaches, you’ll notice that often the data breach

Continue reading →
Contract with a lock to show that it is binding

I didn’t read the T&Cs

In recent years, some companies have tried to make their contracts easier to read. Why? The Consumer Protection Act defines the right to plain and understandable language in consumer contracts.

Continue reading →
Wrong way sign post

Two things we get wrong

A few days ago, ITWeb published an article about a program for software graduates. This upskilling programme will give seven interns a chance to work with senior developers over nine months. It’s a great idea. But it highlights two problems in the South African IT industry. Both problems are favourite topics of

Continue reading →
Sign: Area closed. Keep out

Where are your visitors?

You’ve visited a building where you need an access card. Without the card, you don’t get in. But the card doesn’t (or shouldn’t) open all doors once you are in the building. Some areas must be off-limits. That’s physical access control. Digital access control works on the same principle. It

Continue reading →
Canonical classes in Java - picture of a canon

Canonical classes in Java

You’ve heard the term “canonical class”, but what does it mean? In Java, a canonical class is simply a well-formed or well-behaved class. The canonical class form is most often used for model classes (also called domain or entity classes).

Continue reading →
HTTPS

Is this site secure?

HyperText Transfer Protocol (HTTP) is the network protocol that allows your browser to communicate with a web server. HTTP makes it possible to send and receive information across the internet. HTTPS is the secure version of HTTP. For a long time, you only needed HTTPS if you used sensitive data

Continue reading →
money on a laptop

How much do you owe?

We know that Covid-19 has had a disastrous effect on the economy every where. For individuals and companies, it has meant a loss of income and an increase in financial debt. That got me to thinking about a different kind of debt. Technical debt.

Continue reading →
Log in screen with username and password fields

What did you do with my password?

As a user, you need to manage your passwords. (If you are struggling with that, read our blog post about password managers.) As a developer, you have a much greater responsibility. You are the Guardian at the Gate: it’s your job to keep your users’ passwords safe from potential attackers.

Continue reading →
JavaBeans and POJOs - image of coffee beans

JavaBeans and POJOs

You’ve heard of JavaBeans. But what are they actually? Java 1.1. introduced the term JavaBean to describe a self-contained, reusable, high-granularity component. The original idea was to create high-level building blocks for graphical user interfaces (GUI).

Continue reading →

Thank You

We're Excited!

Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)

Don't Worry

Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.

If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com

How can we help you?

Let us contact you about your training requirements. Just fill in a few details, and we’ll get right back to you.