Your cart is currently empty!
Author: fdlkjeo
Open source alone does not create digital sovereignty, but it contributes!
The ever-expanding digital world is sparking passionate debates about digital sovereignty. At the heart of this debate, open source is emerging as a key issue . By allowing free access to source code, it democratises technology. It reduces dependence on tech Open source alone giants and proprietary software, strengthening users’ ability to control their systems. By its transparent and collaborative nature, open source offers an unprecedented opportunity to strengthen companies’ digital sovereignty.
Transparency and control
Open source and sovereignty
With over 80% of the world’s applications and websites hosted on open source web servers, and a market valued at €5.9 billion in countries like France in 2022, its legitimacy in the software sector is beyond doubt. And there are several reasons why it is so popular.
The main advantage is that the source code of the software is freely accessible and can be modified as needed. Thus, the open source community knows the software and can share it as they wish to contribute to its development.
This helps to improve the quality of open iceland email list 188757 contact leads source software by benefiting from the experience of users and developers. A significant advantage in terms of reliability and therefore cybersecurity: errors are detected quickly and corrected even faster.
Of course, using open source doesn’t necessarily mean that the software is free. Specific extensions, support, or hosting contracts require budgets to make the experience positive and successful. But open source puts control in the hands of the companies that use it. Why do they do this? Because they can make their own contributions, sponsor developments or plugins to meet their needs, and, above all, decide to deploy open source software as they see fit.
From open source to digital sovereignty
But open source is not synonymous with digital sovereignty. It simply gives more control. By using open source, companies have the opportunity to lead scoring, what it is and how to use it to boost sales free themselves from “closed” and licensed software solutions, such as those of the GAFAMs, most of which are not cmo email list sovereign. They store and retain data in data centres outside Europe, especially in the United States. The data is therefore subject to extraterritorial laws such as the American Cloud Act.
Is digital sovereignty linked to cybersecurity?
At a time when cyberattacks are becoming more numerous and sophisticated, cybersecurity is a prerequisite for digital sovereignty . Information systems are becoming more complex, with public-private interconnections and often porous borders. At the same time, the volume of email exchanges is increasing by the day, offering many entry points for cyberthreats.
When it comes to data protection, cybersecurity Is digital sovereignty and sovereignty are inseparable . Here’s why.
Digital sovereignty, the first step towards data protection
cybersecurity
As mentioned in the article “ Digital sovereignty: European initiatives ”, the aim of sovereignty is to better protect the data of European organisations and citizens. Indeed, by using the services of a partner who claims to be sovereign, one expects that they will only use the data for the specified purposes and not disclose it. This guarantee is obviously ensured by the established control, storage and processing processes, compliance with regulations. But also by the technological solutions used (sovereign hosting, open source software…).The threat of cyber attacks or data disclosure is therefore lower when using a European service provider.
Cybersecurity: protection against external threats
By definition, cybersecurity is a set of measures designed to ensure the security of computer systems and data against malicious acts. A cyberattack can hong kong email list 1 million contact leads seriously affect companies. Therefore, they must be able to deal with such an event and implement IT security measures.
This involves, among other things, the deployment of protection software (antivirus, for example), system update plans (patches), authentication systems and also the training of employees in good cybersecurity practices.
Companies are often unaware that they have sensitive data, or they think that an attack only happens to others. Unfortunately, the number of incidents is constantly increasing and the techniques used by cyber attackers are becoming more and more sophisticated. The consequences can be dramatic. For example, as a victim of a ransomware attack, the Corbeil-Essonnes hospital saw some sensitive data (DPI, personal data, etc.) released on the Internet following its refusal to pay a ransom.
Without cybersecurity there is no digital sovereignty
sovereignty and cyber threats
It is increasingly clear that digital what is a dnvb and what are its characteristics? sovereignty alone is not enough to protect data without including cybersecurity.Digital sovereignty certainly allows cmo email list for better control over one’s data. However, a software environment or applications that are too open or exposed will allow certain flaws to persist.
Professional email systems pose a risk to companies
The evolution of remote work, the adoption of cloud solutions, the hybridisation of information systems, etc. are factors that increase the vulnerability of Professional email systems companies to cyber threats. If a few years ago attackers target infrastructure, today they target people and rely on the lack of vigilance of users. And what better mium than email to carry out their attacks?
Professional email therefore poses risks for the protection of company data. Fortunately, there are sovereign solutions that offer greater security. Here are some explanations.
Professional email: the first source of cyberattacks
professional messaging
With nearly 300 billion emails sent every day in 2020 worldwide, email is a prime entry point for cyberattacks. This communication channel allows companies to share data and information of varying sensitivity. These exchanges are fertile ground for cybercriminals. The numbers bear this out: 83% of respondents said their company had suffer at least one email phishing attack in 2021.
Sharing fraudulent links, sending malicious attachments, requesting bank details, etc. These are all techniques us to trap email recipients. Without honduras email list 234074 contact leads increas employee awareness and the right tools, companies are expos to the risk of data breaches, the consequences of which can be disastrous.
How to avoid cyber attacks? The answer is not so simple. Attackers are becoming more clever, and zero risk does not exist . On the other hand, it is possible to ruce the risk and better protect your data by paying special attention when choosing a professional email provider.
What should a good email system have?
The solutions manag by GAFAM are not sovereign by nature. In fact, they collect data and store it in data centres not subject to European sovereignty rules. It is what is google freshness and how does it affect seo? therefore not possible to guarantee their confidentiality or maintain control over them as cmo email list a company. In addition, their messaging systems are clos-source software, which reinforces the dependence on a supplier, without transparency in the processing, contrary to the principles of digital sovereignty.
However, there are solutions and they offer real alternatives: open source email systems.open source webmail Between the demands of sovereignty and cybersecurity, what is the ideal business email.
Open source to the rescue of professional email services
Email is an application that is part of everyday business life. Its use goes beyond the simple exchange of messages. It is a real collaboration tool and a universal means of communication that saves time and dematerializes many exchanges.
This is why it is essential to have Open source to the rescue an intuitive, ergonomic, reliable and secure email tool . On the ground, GAFAM dominates the market with email systems integrat into its office suites such as Office 365 or Google Workspace. However, there are alternatives. These include open source email systems.
Advantages of open source email systems
Open source email
The great advantage of open source email is that the code is freely available. Its use is not subject to the purchase of a license, and companies are not dependent on a supplier . Its integration into the information system can be carri out internally or by an integrator, without any commitment on the part of the latter. Open source code also allows it to be adapt to very specific nes, at a lower cost.
Choosing open source means haiti email list 128362 contact leads benefiting from a community of users who are constantly enriching and improving the solution. Whether it is ergonomics, functionality or security, contributors are full of ideas and bring their skills to help the solution evolve and adapt it to the nes of organizations.
From the IT department’s point of view, it is primarily the technical sustainability that weighs in the balance. For specialist IT professionals, open source email systems are often easier to implement than those of the tech giants, because they draw on their expertise in the field.
Email and digital sovereignty
Business email security is address at several levels. From a data perspective, the question is: where is it stor? How is it access? Open source solutions do find messages faster with chat filters not impose any rules on companies. This way, they can choose their data hosting provider and ensure that the data is process correctly.
To ensure service continuity, companies cmo email list can subscribe to a “disaster recovery plan” in the event of an incident, in accordance with the conditions defin with their hosting provider.
Opting for a European and open source email system, combin with sovereign hosting, provides an essential security foundation. In particular, company data is not subject to the Cloud Act, the US legislation that applies to GAFAM email solutions.
Mail flow control: a key element for healthcare facilities
Public organisations, and healthcare establishments in particular, have been one of the favourite targets of cybercriminals in recent years. Attacks have multiplied, with significant consequences for the activity of public establishments and sometimes generating very high costs. For example, in European countries such as France, 733 security incidents, including a Mail flow control hundred cyberattacks, were recorded in 2021 in 582 hospitals*.
Many of these attacks originated from fraudulent emails. Specific and reinforced monitoring of emails is therefore essential to reduce the risks and ensure the security of the IS of these public structures. This is all the more important since healthcare establishments host and use highly sensitive personal data. In addition to the operation of hospitals, the confidentiality of this information is also at stake.
Mail security: an essential requirement for healthcare institutions
antispam hospital
Business email is one of the main entry points for cyberattacks. In fact, 94% of cyberattacks (across all sectors) are triggered via email. Therefore, healthcare guyana email list 39,863 contact leads establishments that handle personal data (identity, medical records, social security numbers, etc.) must pay special attention to this channel.
To achieve this, a number of measures can be adopted:
Manage your email service on-premise – no cloud hosting or providers like GAFAM. This allows you to retain control over your email management.
Monitor data and information exchange via email with best practice guides for all agents.
Exercise full control over email flow – In addition to regular network protection, use dedicated email protection software to block spam and Mail flow control quarantine suspicious emails.
Public health establishments periodically hold competitions to question the solutions already implemented and opt for increasingly innovative and effective safety programmes.The main requirements for antispam tools are as follows:
Combat spam and newsletter spam to reduce the risk of user inconvenience.
Protect your mail server against all content optimization: separate by keyword types threats (malware, spam, phishing, spear phishing, etc.).
Antispam, quarantine, reporting. Going even further in email protection
In addition to anti-spam , other cmo email list functions also offer important advantages for hospitals. Email quarantine is an interesting option: staff can check incoming emails about which there is some doubt and not miss any important information. But for this to be appreciated, management must be simple: receiving a summary of what has been quarantined, allowing the user to decide whether or not to accept receiving suspicious emails, for example.Emergency Webmail: Why not do without it?
Emergency webmail is a temporary email service accessible online to compensate for any email server issues. It offers undeniable peace of mind for businesses where email use is critical to their business.
Companies don’t always see the point Emergency Webmail: Why not of having a backup webmail, until one day… they get hack, they suffer a hosting incident (a fire, for example), the server crashes and becomes inaccessible… In these cases, organizations that have a PCN for their email are reliev. So, can a company do without emergency webmail? Let’s take stock.
Loss of mailbox access: consequences
webmail of secours
Imagine a day without access to your email, everyone guatemala email list 490124 contact leads on their phones in the open space, being forc to use your personal email to be reach… It’s hard to imagine, isn’t it? And yet, it happens more often than you think.
Professional email has become a critical application, essential for the work of many employees. Not having access to them generates:
Loss of productivity : how to receive orders, send invoices or communicate with stakeholders?
Loss of information : Messages receiv during the interruption are lost, resulting in loss of information.
Difficulty in recovering data : Recovering lost data (mainly receiv messages, messages in the process of being sent, etc.) can take a long time, or even be impossible.
As an organisation’s flagship Emergency Webmail: Why not application, email deserves a dicat and reliable business continuity plan (BCP). Yet email systems are often overlook in general business BCPs. This is all the more unfortunate as it is not the most complex area of IT to protect.Emergency Webmail: How does it work?
In practice, this email PCB involves the creation of an emergency webmail system. This is an email inbox accessible via a web browser. It is true that the ux and seo: the key union for your website interface is a little more austere than that of the classic mailbox. But if the mail server is not available, this webmail allows you to continue working and sending and receiving emails, without affecting email traffic.
When companies set up an emergency cmo email list webmail solution, they define a time period for backing up emails (7 or 14 days on average). This way, users can recover all messages they have receiv and sent during this period in case their professional email is interrupt.
Why archive emails?
What does it mean to archive an email?
This involves copying an email from where it usually resides, the user’s mailbox! to a place where it can remain for a long time. Of course, this place must remain accessible so that the user can easily and quickly retrieve any archiv email. Once the email is archiv, it can then be delet from the user’s mailbox.This archiving process for emails that Why archive emails are electronic documents is very similar to the archiving process for paper documents. When I no longer ne certain paper documents in my daily work and I start to run out of space in my office, I archive these documents.
There are various archiving methods, from the simplest: the document is plac in a folder stor on a shelf in the Archive service, for example, “2007 – Invoices”. To the very specific archiving process manag by professional archivists.
What are the common solutions to solve this problem?
From a technical point of view, the volume of these mailboxes cannot be allow to grow indefinitely. Even if it were technically possible, this would grenada email list 18731 contact leads not be reasonable, as the size of the mail servers would have to be constantly adjust. On the other hand, as mail servers grow in size, so does the cost of producing mail: maintenance, backups and recovery in the event of a major incident become more expensive.
Note: Nowadays, cloud messengers offer users mailboxes of 25 GB or even 50 GB. Many believe that this is more than enough for one user and for a long time. Given the ever-increasing number of attachments (email is mainly us to send and receive documents) and Why archive emails especially given the volume of these attachments (HD photos, audio files, videos…), this limit will be reach. So, the problem will reappear again.
Discover our solution
Limit user mailboxes
For companies what image formats to use on your website to optimize performance that do not have a sufficiently robust messaging system and cannot oversize their mail service, the usual solution is to limit the size of users’ mailboxes: 50 Mb, 100 Mb, 200 Mb, 1 Gb.When this limit is reach. The user’s mailbox will stop working. In order to cmo email list continue using their mailbox, the user will have to empty it. If they want to keep their emails, they will create a personal archive before emptying their mailbox. For Microsoft Outlook users, these personal archives are call PST files.What is an Internet Service Provider spam filter and how does it work?
Every day, the evolution of the Internet and its capabilities connects our societies and communities. Technological advances are opening up new What is an Internet Service means of communication, research, commerce and entertainment, with seemingly endless possibilities.
However, with this abundance of potential also comes risks and problems. One of the most common is spam, the unwant email that floods users’ inboxes.
Internet Service Providers (ISPs) must continually combat this threat, and that’s where spam filters come in. In this article, we’ll explore what a spam filter is, how it works, and why ISPs ne them.
What is spam?
Spam is any type of unsolicit content sent to users . It can be unsolicit emails, misleading advertisements, or malicious messages, such as phishing attempts or malware distribution. The main goal is often to obtain personal information for financial purposes. Spam guatemala email list 490124 contact leads filters are one solution to ruce the risks associat with unwant email by identifying and preventing spam from reaching recipients’ inboxes. Types of spam There are several types of spam, each with specific methods to deceive recipients: Phishing – A form of cyberattack in which emails are sent that appear to come from trust sources . Such as banks, reputable companies, or government institutions. Their primary goal is to obtain personal information , including usernames, passwords, and banking details.
These emails often use tactics such as creating a sense of urgency or fear to prompt immiate action, for example by claiming that there is a security problem with the recipient’s account. Information obtain through phishing can be us for identity theft. Unauthoriz financial transactions, or other fraudulent activities.
How anti-spam filters work
Hoaxes and lures : Emails design to get recipients to act quickly by promising ux and seo: the key union for your website rewards, exclusive offers, or large financial gains . Common examples bw lists include fake lottery winnings, investment opportunities that are too good to be true! or urgent requests for financial help. The underlying intent is to trick users into providing personal information. Making payments, or clicking on malicious links that could compromise their security.
What is a phishing test and how can it benefit your business?
In today’s digital age, the security of your organization’s data is crucial. Data theft or exposure can lead to significant financial losses, damag customer trust, and even business closure if the impact is severe. This data is highly priz by scammers and cybercriminals, and one of their favorite ways to obtain it is through email using phishing attacks , for example. A phishing audit helps ensure What is a phishing test that your employees know how to handle phishing attempts, helping to keep your business more secure. By proactively training and improving users’ ability to recognize and respond to phishing threats, you can protect your company’s valuable data and keep it safe.
Understanding Phishing
Phishing is a common type of cybercrime in which attackers send deceptive emails that trick recipients into revealing sensitive information , such as passwords, crit card numbers, or personal details. These fraudulent emails pose a major risk to your organization because they are design to appear to come from trust sources, such as banks, online services, or even coworkers. Once cybercriminals obtain this information, they can use it to access accounts, steal money, or commit other fraudulent activities.
Phishing attacks can take several forms. One common type is spear phishing, which targets specific individuals with a personaliz email grenada email list 18731 contact leads and uses social engineering techniques to make the scam more convincing. Another form is whaling, which targets senior corporate
executives and often includes highly sophisticat and personaliz content. Regardless of the form it takes, phishing relies on psychological manipulation and the victim’s lack of awareness of the threat.
What is a phishing test?
email-phishing-test-alinto
A phishing test is a simulation to determine how vulnerable your company’s employees what image formats to use on your website to optimize performance are to phishing attacks . This process involves a specializ company designing a phishing email and a fake, landing page that mimics a real phishing attempt. The fake email is then sent to users to test their responses.The audit can be set bw lists up in a number of ways to test different aspects of user behavior. For example the fake landing page might ask for personal information or be us to track who clicks on the link. The company running the simulation will monitor who clicks on the link. Who enters sensitive information, and who reports the email as a scam. This data helps assess employee awareness of phishing threats.
What are Vanity Numbers? 🙂 800.com Blog
If your business is in the market for a toll-free number, you may have heard of a vanity phone number. Whether a vanity phone number comes to mind or it doesn’t, you have probably come across a business that marketing uses one.
Let’s go over basic information that answers the question, “What are vanity numbers?”, but helps you see how vanity numbers for business are useful.
A vanity phone number is
Phone number that businesses use to either spell out a word related to their business or make their phone number memorable. For colombia phone number library example, a florist company may use 1-800-FLOWERS as their business number, where the letters are spelled out using the numbers on the telephone keypad.
Businesses usually set up toll-free vanity phone numbers by using a toll-free phone number prefix. This means that vanity numbers start with toll-free area codes (or prefixes), including 800, 833, 844, 855, 866, 877, and 888.
Benefits of Vanity Phone Numbers
If you choose to get a vanity phone number for your business, you can find that it offers many benefits that help you increase sales, grow your brand, and more.Make Your Mark
One of the top benefits of custom vanity phone numbers is that they are memorable. If they see your number on a billboard while they are on the road, a vanity number makes it easy for them to remember how to contact you. If they hear your phone number on the television or on the radio, it will stand out – making it easy for them to jot down or remember it later on.
It’s easy for people to remember a business phone number such as 800-GoFedEx versus 800-463-3339. These numbers will both get you to the same place, but one is way easier to keep in your mind. This all boils down to choosing a vanity phone number that makes it easy for people to recognize your business and quickly recall how to get in touch with you.
Elevate Your Brand Awareness
Another benefit of a vanity phone number is that you can use it to improve brand awareness. For example, you can ux and seo: the key union for your website use a vanity number to include your business name or emphasize your business’s product or service. Several successful brands use vanity numbers to elevate their brand. The global shipping company FedEx, for example, uses the vanity number 1800-GoFedEx.
Stand Out From Your Competitors
If you want a unique way to stand out from competitors, a vanity number can provide you with the exclusivity you are looking for. Just by looking at that number, you instantly know the business that you need to call. When you see the business phone number 1800-CALL-ATT, it’s clear that it’s the contact number to call AT&T. If you want an easy jump on your competitors, you should buy a vanity phone number.
Compliment Your Marketing Strategy
A vanity number can be a fantastic job data tool for making your business more marketable. For example, they are short and easy to display on billboards and other printed advertisements. You can also incorporate them into your business jingle, which helps consumers make an audible connection to your business.Get Consumers to Trust Your Brand
Like many businesses, you are looking for ways to get consumers to trust your brand. A vanity number can help. In today’s competitive marketing market, consumers hesitate to trust a company that they do not know – especially if they question the company’s legitimacy. For over 40 years, 800 toll-free numbers have been synonymous with a well-established business. When you show consumers that you are a real business by using an 800 vanity number, it helps build their trust.
Reduce Your Telephone Costs marketing
When toll-free numbers were marketing first available, they were expensive. This made them only available to very elite businesses that could afford them. Even today, many business owners assume that a vanity number is still a costly feature. However, the modern digital landscape has made vanity phone numbers more affordable than ever before. In comparison to traditional phone services, vanity phone numbers are available for modest monthly fees. Businesses can save even more if they choose an annual payment plan. 800.com, for example, offers 20% off will annual billing – making vanity phone numbers a very cost-effective solution.
Using Google’s libphonenumber Library to Parse and Validate Phone Numbers
Using Google’s libphonenumber Library to Parse and Validate Phone Numbers
Techby Sunny Srinidhi -January 9, 20200We all work with phone numbers phonenumberproto in almost any project or product which has human users. And when the product is available to a global user base, it becomes very difficult to maintain valid phone numbers in the database.
We need to make sure phonenumberproto
Numbers for different regions are of the proper length for their regions, add country codes, or remove them, and a lot of such validations. This could become a project of its own pretty soon.
We had such an issue in one china phone number library of our projects. When I was doing the research to find an easy to use and light weight tool so that I could outsource the smarts involved in this to, I came across the libphonenumber library by Google. Google has everything you need. So without thinking phonenumberproto about it twice (which is bad), I just started looking at the documentation to understand how I can integrate this to my project to make my life easier. In this post, I’ll try and help you understand the same.
As you already know phonenumberproto
I write most of my projects in Spring Boot, this is no different. I’m using a Spring Boot command line runner for this POC. One awesome thing is, the Java client for this Google library is very optimised, such that you can use it in an phonenumberproto Android app as well. It’s that small in size and that quick in response. In fact, all Android versions starting from Android 4.0 (Ice Cream Sandwich), have this library baked into the system. So, let’s get started.
Importing the library
The libphonenumber library phonenumberproto is available in the Maven central repository, so importing the library into your project is as easy as adding a dependency in the pom.xml file. Just add the following dependency in your pom.xml file and you’re done:The Code
Let’s now get into the what image formats to use on your website to optimize performance fun part. In this example, we’re going to take a few Brazilian and a few Colombian phone numbers, and their respective country short codes, and try to figure out thefollowing about them
Are the phone numbers valid for their regions?
Do they have a country code present? If so, what is it?
Do they have a national phonenumberproto number present? If so, what is it?
Formatting the phone numbers to the E164 standard.
Before we begin with this, let’s look at the phone numbers we have:
As you can see, it’s not 100% accurate, but job data most of the times, it get’s it right. Depending on your application, you could decide if this level of accuracy is enough for you or not. But the library does come in handy when phonenumberproto you’re dealing with phone numbers.There’s a lot more you could with this library. I encourage you to check out the Github repo of the library (yes, it’s open sourced, of course) and try to figure out yourself if this serves to your needs.
If you’re interested in getting
your hands dirty with a ready project which you can just run, head over to my Github repo where you’ll get the project from phonenumberproto which I took out these code snippets, and you’ll be able to just run it and get the output. And if you found this post or any other of my posts helpful, consider supporting my on Patreon below.
The Best Way to Handle Phone Numbers – Keep IT Simple with Simon Martinelli
Processing phone numbers seems complicated at first glance because of the many different formats. In this post, I’ll show you that phonenumberutil with libphonenumber, it becomes child’s play. I’ll also recommend how to store the phone number in the database.
Introduction Googles phonenumberutil
According to the GitHub repository libphone number is:
Google’s common Java, C++ and JavaScript library for parsing, formatting, and validating international phone chile phone number library numbers. The Java version is optimized for running on smartphones, and is used by the Android framework since 4.0 (Ice Cream Sandwich).
Let’s see the library in action. The source code is available here: https://github.com/simasch/libphonenumber-demoCreating and Formatting Phone Numbers
The main class of libphonenumber is, no surprise, the class Phonenumber. You’ll want to use a phone number in two ways to create a phone number.First from country code and
Phonenumber.PhoneNumber swissPhoneNumber = new Phonenumber.PhoneNumber();
swissPhoneNumber.setCountryCode(41)
swissPhoneNumber.setNationalNumber
We can now format the phone number in different ways:NumberUtil phoneNrUtil = PhoneNumberl.getInstance();
System.out.println(phoneUtil.format(swissPhoneNumber, .PhoneNumberFormat.INTERNATIONAL));
System.out.println(il.format(swissPhoneNumber, Util.PhoneNumberFormat.NATIONAL));This will prin Parsing Phone Numbers
But what if we get the phone number as a string? No worries, the PhoneUtil cannot only format but also parse phone numbers:
Phonenumber.PhoneNumber parsedSwissPhoneNumber =NumberUtil.parse(“032 455 66 77”, “CH”);
The linkedin live, the most human way to network on the social network first argument is the phone number as a string, and the second parameter is the region we expect the number to be from; this is only used if the number string is not an international number.Validating Phone il Numbers
Now that we can parse strings to phone numbers, how can we check if the phone number is valid?
Also, here, l, has you covered it as it has metadata of the phone numbers of many regions?Phonenumber.PhoneNumber
invalidSwissPhoneNumber = .parse(“032 631 11 2”, “CH”);
System.out.println(isValidNumber(invalidSwissPhoneNumber));
The code above will print false as the phone number is too short.Conclusion and Recommendation
Google’s libphonnumber is very powerful, and it has even more features, like finding phone numbers in text, getting the type of the job data number, and so on. In my opinion, it’s the go-to library when it comes to processing phone numbers.Finally, to answer how a phone number should be stored in the database, I recommend storing the country code and national number separately as numbers. That way, you can directly create a libphonenumber Phonenumber from the data and format it when needed.
Simon Martinelli phonenumberutil
Follow Me
Simon Martinelli
I’m a Java Champion, a Vaadin Champion, and an Oracle ACE Pro. I write and speak about architecture and software development with Java.
I’m fighting for simplicity in software development.
Previous
Fly.io and Neon: The Perfect Combination to Run Your Java Applications