Houston, I have a solution.
Benefit from top-tier expertise with the flexibility of no long-term contracts, ensuring your next project is both high-quality and cost-efficient.
Your co-pilot for impossible missions.
Recent posts
#32 Trust No Input: The Dangers Of Cross-Site Scripting (XSS)
Trusting user input can lead to attackers taking control of your customers' machines. Protect them from invisible threats that could empty their bank accounts or steal their identities.
#31 The Parallel Puzzle: Solving Database Changes Across Parallel Versions
Running different versions of an application at the same time can be tricky, but the real headache often comes from the database changes. Even a small change can cause big problems across versions.
#30 Worth To Know: Common Deployment Strategies
Choosing the right deployment strategy is critical to efficient software delivery. In this post, I describe four battle-tested approaches: basic, blue-green, canary, and rolling deployments.
#29 From Chaos to Order: Bounded Context Canvas Explained
For years, I struggled to effectively describe bounded contexts. It was a constant challenge in my work, and I experimented with various methods, searching for the perfect fit. Finally, I found it.
#28 CQRS Myth Busted: Separating Commands from Queries, Not Databases
One of the most widespread interpretations of CQRS involves using two separate databases for read and write operations. This view has become so popular that it is often considered integral to CQRS.
#27: Don't Break the Bank: Smart Spending on Software Architecture
Budgets and software architecture go hand-in-hand. If you don't keep an eye on your budget, you are asking for trouble. That's why it is so important to give it the attention it deserves.