Coding Matters

Wrong way sign post

Two things we get wrong

A few days ago, ITWeb published an article about a program for software graduates. This upskilling programme will give seven interns a chance to work with senior developers over nine months. It’s a great idea. But it highlights two problems in the South African IT industry. Both problems are favourite topics of

Continue reading →
Sign: Area closed. Keep out

Where are your visitors?

You’ve visited a building where you need an access card. Without the card, you don’t get in. But the card doesn’t (or shouldn’t) open all doors once you are in the building. Some areas must be off-limits. That’s physical access control. Digital access control works on the same principle. It

Continue reading →
Canonical classes in Java - picture of a canon

Canonical classes in Java

You’ve heard the term “canonical class”, but what does it mean? In Java, a canonical class is simply a well-formed or well-behaved class. The canonical class form is most often used for model classes (also called domain or entity classes).

Continue reading →
HTTPS

Is this site secure?

HyperText Transfer Protocol (HTTP) is the network protocol that allows your browser to communicate with a web server. HTTP makes it possible to send and receive information across the internet. HTTPS is the secure version of HTTP. For a long time, you only needed HTTPS if you used sensitive data

Continue reading →
money on a laptop

How much do you owe?

We know that Covid-19 has had a disastrous effect on the economy every where. For individuals and companies, it has meant a loss of income and an increase in financial debt. That got me to thinking about a different kind of debt. Technical debt.

Continue reading →
Log in screen with username and password fields

What did you do with my password?

As a user, you need to manage your passwords. (If you are struggling with that, read our blog post about password managers.) As a developer, you have a much greater responsibility. You are the Guardian at the Gate: it’s your job to keep your users’ passwords safe from potential attackers.

Continue reading →
JavaBeans and POJOs - image of coffee beans

JavaBeans and POJOs

You’ve heard of JavaBeans. But what are they actually? Java 1.1. introduced the term JavaBean to describe a self-contained, reusable, high-granularity component. The original idea was to create high-level building blocks for graphical user interfaces (GUI).

Continue reading →
Masked man using fishing rod to hook a laptop that someone is working on

Are you a smart phish?

I haven’t won the lottery for ages. And it’s been a while since an unknown relative died and left me a fortune. But I still get phishing emails quite often, and they are getting more sophisticated.

Continue reading →

Your Java tip is on its way!

Check that incusdata.com is an approved sender, so that your Java tips don’t land up in the spam folder.

Our privacy policy means your data is safe. You can unsubscribe from these tips at any time.

Thank You

We're Excited!

Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)

Don't Worry

Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.

If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com

How can we help you?

Let us contact you about your training requirements. Just fill in a few details, and we’ll get right back to you.