How Dangerous Is Log4Shell and How it Affects the Java Industry?

Log4Shell vulnerability alerted many of us. However, each bump counts for a new solution, and sometimes the higher the bump, the better the resolution might be. Read all

Optimization Techniques Using Java Streams

Learn a powerful big data analysis technique using Java Streams to order, optimize, categorize, and parallelize your data. Read all

Node.js vs Java: Which is Best for Your Business in 2022

Node.js and Java both are powerful for back-end development, but which one will be best for business? Let's compare the strengths and weaknesses of both. Read all

Filter or Criteria Design Pattern in Java: An Introduction, Example, and Key points

In the video below, we take a closer look at Filter or Criteria Design Pattern in Java with an introduction, example, and key points. Read all

Understanding Eclipse's Plugin Build

Discover how to configure your Plugin build descriptor successfully and how to build a Plugin with Eclipse's built-in PDE/Build tool. Read all

Boost throughput with RESTEasy Reactive in Quarkus 2.2

Read all

Dataweave 2.4.0 Dates Module Functions

Mulesoft released Dataweave 2.4.0 for Mule Version 4.4. The 2.4.0 version has many new features. In this post, we'll cover newly introduced DataWeave modules. Read all

Spring Boot + Swagger 3 (OpenAPI 3) + Security Example(Basic Authentication)

As a continuation in this Spring Boot tutorial series, learn in this post about implementing Spring Boot Basic Security for the Spring Boot Swagger example. Read all

Redis-Based Tomcat Session Management

Learn what Tomcat clustering is and what problems it solves by working with Redis for session management by distributing requests across a cluster of servers. Read all

Understanding Java Records From Java 16

A look into what you can and cannot do In Java record classes from Java 16 release, including implementations, applications, and extensions. Read all

How to Convert JSON to XML or XML to JSON in Java

Understanding how to convert between complex file types will allow you to optimize and perfect your operations, ensuring your data is always in the ... Read all

How to Protect URLs from SSRF Threats in Java

Learn how to check URLs for standard and HTML embedded Server-Side Request Forgery attacks using APIs in Java. Read all

Kubernetes for Java Developers

There is a new class of tools for dockerizing and deploying an application to Kubernetes which are aimed at developers. The latest in that category is JKube ... Read all

 

 

 

 

Top