I am more interested in the technique and used standards and protocols than certain products. I love when I see that standards and well established tools are used and utilized for the own purpose. Then I can rely on having the chance to help myself. I usually start development with a small simple project and get all the required functionality running. As soon as everything, from development and testing over building to deployment and archiving, works users can start working and are not interrupted by environment problems anymore. My fist command after creating a new folder is always “git init” to make the whole process visible and traceable.
I love to automate frequently used tasks and prefer writing scripts to run the task. Thus I am working on deployment and integration into enterprise environments. I try to utilize technologies like group policies and PowerShell modules and automated scripts in Linux environments.
The following list is a collection of keywords describing technologies I have already worked with. I use most of them on a regular basis.
- Java (1.8 – now) and JNI
- C# (.NET core preferred)
- C/C++ (gcc, msvc)
- Java Swing
- ESP32-IDF (Micro controller programming in C)
- Bash and other *nix shells
- Legacy Windows “cmd”
Styling and UI
- HTML5 and CSS
- Scalable vector graphics
- React and Vaadin
- Default tasks: build, test
- Artifact generation: Versioned jar files, NuGet packages
- Deployment: Passwordless remote deployment and execution via SSH from and to Windows and Linux
- Archiving and lifecycle management with NuGet feeds and Maven repositories
- basically everything that can be done on command line
Version control systems
- Git (Setup with GitLab and plain ssh. Usage with all common providers.)
- Subversion (Setup with “Apache httpd” and usage)
- Linux KVM (Low cost virtualization)
- VMWare ESXi (Enterprise grade virtualization)
- Oracle VirtualBox (Desktop virtualization for testing and development)
Packaging and deployment
- Windows server and client (Legacy pre Windows 10/Server 2016 and current)
- Linux server (Debian and derivatives, Arch Linux) and client
- BSD with specialized distributions like pfSense
- SystemD (Linux) and Windows services (C# and C)
- Samba4 – “Active Directory” alternative
- OpenSSL PKI, signing and usage for encryption
- OpenVPN Administration with PKI
- Monitoring with Zabbix for Windows and Linux machines
- IPv4 and IPv6 networks with pfSense
- Active Directory with Samba4, ISC bind9 and ntp
- Implemenation of fail2ban to prevent ssh brute force attacks.
I don’t know where to put these points, that’s why they are under “Offtopic”.