Using Jakarta Security on Tomcat and the Payara Platform

In this article, we discuss how to use the Java EE Security API (Jakarta Security) on Tomcat and the Payara Platform in order to better handle user-authentication. Read all

Chaos Testing Your Microservices With Istio

A software architect discusses the idea of chaos testing, why building a microservices architecture with failure in mind is important, and more. Read all

You Should Actually Be Listening to Metal When You Code

Read all

A Guide to Blockchain Immutability and Challenges

Immutability means it is difficult to make changes without collusion — not that data is unchangeable. Let's take a closer look at blockchain immutability. Read all

4 Chatbot Security Measures You Absolutely Need to Consider

In this post, we take a closer look at the best practices for securely building chatbots, including end-to-end encryption, authentication, and more. Read all

Using TLS With Rust (Part 2): Client Authentication

In part two of this series on implementing TLS with Rust, we take a closer look at client authentication via the X509 client certificate. Read all

Security Best Practices for Managing API Access Tokens

A software developer takes us through the processes fellow application developers need to follow to properly secure mobile applications and their APIs. Read all

Service Stubbing With JMeter and Docker

In this performance testing tutorial, you'll learn how to reliably perform service stubbing in load testing using JMeter with Docker containers in the cloud. Read all

Build a Secure Progressive Web App With Spring Boot and React

In this tutorial, we take a look at how to securely build a web app with Spring Boot and React, focusing on OAuth 2.0, saving user data, and adding images. Read all

The ROI of Automated Testing

Automated testing, as part of DevOps, saves money in developer time and number of defects in the application. Read real-world examples from industry executives. Read all

User Impersonation With Spring Security

A backend dev gives a tutorial on how to use Spring Security to implement user impersonation protocols, allowing you to securely access user accounts. Read all

Testing Without Mocks: A Pattern Language

Learn about how to use these software testing patterns for writing code that can be tested without mocks like test doubles, DI frameworks, or end-to-end tests. Read all

How to Use Multiple Certificates When Load Testing Secure Websites

Check out how using keystores can help you access and load test your secure websites with multiple client-side and server-side certicficates with JMeter. Read all

 

 

 

 

Top