JDK 22: Gatherer

This article will demonstrate, including examples, the implementation of how to use the new Gatheres, which are in Preview for JDK 22. Read all

Secure Password Hashing in Java: Best Practices and Code Examples

Secure Java Password Hashing Best Practices and Examples. Analysis of BCrypt, Argon2, and PBKDF2 algorithms as alternatives to SHA-512. Read all

Taming the Virtual Threads: Embracing Concurrency With Pitfall Avoidance

Learn what challenges you probably face when you try to run your microservices on the virtual threads. The challenge might be more complex and bigger if you need to import more Java libraries. Read all

Ways To Reduce JVM Docker Image Size

Explore different JVM Docker container image size optimizations through experiments with base images and the creation of custom JRE, jlink, and jdeps. Read all

A Study on Java Static Analysis Tool Reports Triage Using Machine Learning Approaches

This study offers a thorough exploration of the effective triage of findings from Java static analysis tools utilizing cutting-edge machine learning techniques. Read all

How to Password Protect a PDF File Using Java: A Step-By-Step Guide

Learn how to password protect PDF files using Java and Apache PDFBox. Follow this step-by-step guide to secure sensitive information and implement robust PDF encryption. Read all

Untangling Deadlocks Caused by Java’s "parallelStream"

Read all

How To Check Office Files for Macros Using Java

This article discusses the utility and cybersecurity risks associated with macros and provides several free API solutions to check Office content for macros. Read all

Introducing findjava, a Tool to Simplify JRE Selection for Java Applications

Use findjava to find the right JRE for your app, regardless of OS or package manager, for smooth performance. Read all

How To Approach Dependency Management in Java [Video]

In this video tutorial, learn about real-life considerations when working with dependencies in Java (Maven or Gradle). Read all

REST vs. SOAP: A Comprehensive Guide to Their Differences

Discover key differences between REST and SOAP APIs. Learn pros and cons, functionality, security, use cases, and how to choose the right API standard. Read all

Fluent-API: Creating Easier, More Intuitive Code With a Fluent API

This article will cover the fluent API, what it is, and how you can take advantage of this design to make the code cleaner and more valuable. Read all

Microservices With Apache Camel and Quarkus (Part 3)

In Parts 1 and 2, you've seen how to run microservices as Quarkus local processes. Let's now look at some K8s-based deployments, starting with Minikube. Read all

 

 

 

 

Top