The Prime Rule of Security is…

July 27, 2012 | No comments yet

You occasionally hear people refer to “security through obscurity”. This refers to the belief that if you make your security scheme as complicated as possible it becomes secure. This is, however, built upon the assumption that “not provably insecure” is the same as “provably secure”. It is frequently the case that ┬áthose espousing “security through…

Read More

Java and Spring
a truly scalable solution

July 26, 2012 | No comments yet

From server database middle-ware to devices in your pocket – the Java language is now all but ubiquitous. Why should you choose Java to address a heterogeneous system? There is often a temptation to “go native” and use software technologies unique to a particular platform. Using C, or assembler or .Net based on the theory…

Read More

First… Deliver Something, Simple and Useful

July 25, 2012 | No comments yet

Springsmith picks up on a project philosophy of build from “something simple and useful”. Although the ultimate target may involve a database server farm, load balanced web-servers and distributed clients with native code; often a project should start by providing a usable chunk of functionality without using all those hardware targets. Spring provides an opportunity…

Read More