Durable Subscription with JMS and Spring Boot
When using the publish-subscribe domain with JMS we often want to use durable subscriptions. But how can this be done with Spring Boot?
IT Risk Management
Learn more about the critical aspects of IT risk management and how your organization can protect its digital infrastructure to ensure long-term success in this increasingly[...]
Testing Spring Boot JMS with ActiveMQ Artemis and Testcontainers
Currently, I’m teaching JMS with Spring Boot at the University of Applied Science in Bern, Switzerland. We use Apache ActiveMQ Artemis as the JMS message broker. But how can[...]
Java Champion
Vor kurzem wurde mir die Ehre zuteil als Java Champion gewählt zu werden. Es ist eine der höchsten Auszeichnungen die man in der Java-Community erhalten kann und für die[...]
IT Security Audits
IT security checks are crucial for the security of your IT systems and data. In this article, we discuss everything about IT security audits, their benefits, types of audits,[...]
Standard Software vs. Custom Software
A question that often arises: should software be developed in-house or purchased off-the-shelf? In this article, we’ll explore both custom and standard software, their[...]
Strategic IT Planning
The topic of strategic IT planning is a complex one and can pose a challenge for many organizations. In this article, we delve into and explain this topic, while also examining[...]
IT Strategy
What makes a good IT strategy? In this article, we take a look at one of the most important artifacts of IT management.
IT Infrastructure Security
In this article, we will focus on the topic of IT security. This is a very broad subject, and we will thus not be able to cover every aspect exhaustively. Nevertheless, we hope to[...]
The advantages of custom software
In this article, we will explore the main benefits and disadvantages of custom software and when & why to use each.
IT Security for Small Businesses
In this article, we delve into the topic of IT security for small businesses. We explore the reasons why IT security is crucial for them, the potential consequences and costs of[...]
Legacy IT infrastructure
In many organizations, legacy IT systems and applications can still be found. They are known to be hopelessly outdated, yet they cannot be done away with. Is it a hopeless situation?