Exploring the essentials of professional software engineering

Content type
Blog

Overview: Blog series - Jelle

Kennis Blog Exploring The Essentials Of Professional Software Engineering
Author
Jelle Fremery

Throughout this series, Jelle explored various facets of the software engineering profession that, in his view, define a genuine professional. It's important to note that his perspective is influenced by his own skills, experiences, and aspirations. Nevertheless, he trusts that the discussions have offered valuable insights into the realm of software development, with a specific focus on the roles and responsibilities of a software engineer.

Jelle is covering a range of topics. Below is a quick refresher on everything he has delved into.

An overview of this entire blog series by Jelle.

  1. Don't Skip, Hot Take
  2. Writing Quality Code (part 1)
  3. Writing Quality Code (Part 2)
  4. Building Quality Software (part 1)
  5. Building Quality Software, (Part 2)
  6. Creating ethical software, Part 1)
  7. Creating ethical software (part 2)
  8. The Development Process (part 1)
  9. The Development Process (part 2)
  10. The Software Engineer Oath 

More blog posts

  • Blind SQL Injection: what it is and how to prevent it

    Introduction to SQL injection and blind SQL injection, showing how attackers extract and manipulate data and how to prevent this using secure practices like parameterized queries and input validation.
    Content type
    Blog
    Blind SQL Injection What It Is And How To Prevent It
  • Threat modeling: from vulnerability to control

    Threat modeling helps identify and manage risks early by analyzing threats, prioritizing them, and integrating security into the development process to prevent issues.
    Content type
    Blog
    Kennis Blog Threat Modeling From Vulnerability To Control
  • Securing web applications and the OWASP Top 10

    The OWASP Top 10 for 2025 highlights where web applications are truly vulnerable today and how you, as a developer, can tackle those risks in a targeted manner.
    Content type
    Blog
    Het Beveiligen Van Webapplicaties En De OWASP Top 10

Stay up to date with our tech updates!

Sign up and receive a biweekly update with the latest knowledge and developments.