Magnus K Karlsson

I'm dedicated agile security architect/system architect/developer with specialty of open source framework.

September 12, 2016

Liquibase vs Flyway

http://stackoverflow.com/questions/8418814/db-migration-tool-liquibase-or-flyway

http://blog.getsandbox.com/2014/07/20/how-to-manage-database-change/

at September 12, 2016
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Magnus K Karlsson
Jag arbetar sedan 2016 på Antigo med IT-säkerhet, systemarkitektur och utveckling. Där arbetar jag inom branscher som Myndighet, Finansiell handel och Media. Tidigare har jag arbetat inom Transport och Telekom branscher.

Men det jag brinner för är enkla och lättrörliga arkitekturlösningar. Mitt motto är: när det inte går att förenkla en lösning mera, så är man klar.

Privat så är jag en stolt trebarnspappa, som tycker om aktivt umgänge med vänner och familjer, som segling, golf och vandring i skog och natur.

Credly Magnus Karlsson

CISSP, CCSP
RHCA, RHCE, RHCSA, RHCS{
 - Security: Linux
  - MultiCluster Management
  - OpenShift Automation and Integration
  - OpenShift Application Development
  - OpenShift Administration
  - Containers and Kubernetes}
Spring Certified Professional 2023
SC{EA, WCD, JD, JP}
View my complete profile

Search This Blog

Blog Archive

  • ►  2024 (10)
    • ►  August (8)
    • ►  July (2)
  • ►  2023 (16)
    • ►  September (2)
    • ►  August (9)
    • ►  July (1)
    • ►  January (4)
  • ►  2022 (57)
    • ►  November (7)
    • ►  October (12)
    • ►  September (1)
    • ►  July (31)
    • ►  June (4)
    • ►  May (2)
  • ►  2021 (15)
    • ►  June (1)
    • ►  May (3)
    • ►  April (1)
    • ►  March (9)
    • ►  February (1)
  • ►  2020 (14)
    • ►  November (11)
    • ►  March (1)
    • ►  February (2)
  • ►  2019 (40)
    • ►  December (3)
    • ►  November (2)
    • ►  October (9)
    • ►  September (6)
    • ►  August (7)
    • ►  June (5)
    • ►  May (1)
    • ►  April (4)
    • ►  March (2)
    • ►  February (1)
  • ►  2018 (57)
    • ►  November (9)
    • ►  October (32)
    • ►  July (1)
    • ►  June (1)
    • ►  May (8)
    • ►  April (3)
    • ►  March (1)
    • ►  February (2)
  • ►  2017 (83)
    • ►  December (23)
    • ►  November (24)
    • ►  October (1)
    • ►  September (1)
    • ►  July (3)
    • ►  June (4)
    • ►  May (11)
    • ►  March (3)
    • ►  January (13)
  • ▼  2016 (75)
    • ►  December (1)
    • ►  November (11)
    • ▼  September (14)
      • How To Read from a Text File in Java
      • How To Write to a Text File in Java
      • How to use Client Certificate Authentication in iO...
      • Difference between java.security.cert.X509Certific...
      • Java Supported Cipher (Encryption) Algorithms
      • Java Supported Signature Algorithms
      • Convert a PEM-formatted String to a java.security....
      • Public-Key Cryptography (Asymmetric Cryptography)
      • Maven Build JAR that Contains Dependencies
      • RHEL ip Command Cheat Sheet
      • Liquibase vs Flyway
      • Using the W3C WebCrypto API for Document Signing
      • Ensure Java is Installed for Applets and Web Start
      • OpenSSL Certificate Authority (CA)
    • ►  August (8)
    • ►  July (4)
    • ►  June (18)
    • ►  May (2)
    • ►  April (3)
    • ►  March (14)
  • ►  2015 (31)
    • ►  December (4)
    • ►  September (1)
    • ►  August (4)
    • ►  July (4)
    • ►  June (2)
    • ►  May (1)
    • ►  March (4)
    • ►  February (10)
    • ►  January (1)
  • ►  2014 (73)
    • ►  December (10)
    • ►  October (1)
    • ►  August (7)
    • ►  June (10)
    • ►  May (1)
    • ►  April (5)
    • ►  March (25)
    • ►  February (3)
    • ►  January (11)
  • ►  2013 (68)
    • ►  December (10)
    • ►  November (11)
    • ►  October (4)
    • ►  August (4)
    • ►  July (1)
    • ►  June (7)
    • ►  May (5)
    • ►  March (1)
    • ►  February (3)
    • ►  January (22)
  • ►  2012 (39)
    • ►  December (2)
    • ►  November (5)
    • ►  September (2)
    • ►  August (4)
    • ►  July (4)
    • ►  June (5)
    • ►  May (3)
    • ►  April (4)
    • ►  March (3)
    • ►  January (7)
  • ►  2011 (6)
    • ►  November (4)
    • ►  February (2)
  • ►  2010 (23)
    • ►  October (8)
    • ►  August (1)
    • ►  July (2)
    • ►  June (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (7)
    • ►  January (1)
  • ►  2009 (38)
    • ►  December (2)
    • ►  November (5)
    • ►  October (5)
    • ►  September (1)
    • ►  August (4)
    • ►  July (4)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (7)
    • ►  January (7)
  • ►  2008 (6)
    • ►  December (1)
    • ►  October (5)

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Followers

  • How to Setup and Use Artifactory as Proxy/Mirror for Remote Repositories
    In this blog I will discuss and show you how to setup and use Artifactory as proxy (mirror) for remote repositories, such as Central Maven ...
  • Entity Control Boundary (ECB) Pattern
    Introduction The Entity Control Boundary (ECB) pattern is and old pattern that was published by Ivar Jacobson (Ericsson Co.) in 80's. ...
  • How to Read PEM PKCS#1 or PKCS#8 Encoded Private Key In Java
    import java.io.InputStream; import java.math.BigInteger; import java.nio.file.Files; import java.nio.file.Paths; import java.security.KeyFa...

StatCounter

Simple theme. Powered by Blogger.