A tutorial on how to create several different types of secure login pages and authentication pages using Java and Spring Boot/Spring Security technology. Read all
When it comes to Dependency Injection, the OSGi framework and its associated bundles can make service listening and registering a quick, clean, simple process. Read all
While cyberattackers operate within the realm of the developer, their goals are less intellectual and more worldly. Read on for info on the costs of a breach. Read all
Security is important. But too much security can lead a company to paranoia, or shoot you in the foot. In this article, we take on log injection as an example. Read all
Mobile app development has become vital for enterprises as they look to support new devices (phones, tablets, wearables, etc.) for internal use while also... Read all
In my last post, I explained how to do code reviews properly. I recommended taking advantage of static analysis tools like Findbugs, PMD, Klocwork or Fortify to... Read all
When you think of a Doctrine 2 DBAL Type you think of an atomic thing, but how can you work programmatically on this type without defining an event? A DBAL Type... Read all
We cannot imagine Internet service without TCP/IP. All Internet services we have developed and used at NHN are based on a solid basis, TCP/IP. Understanding how... Read all
We are proud to announce that the newest major release of our Eclipse-based developer tooling is now available. This is a major release not only in terms of new... Read all