In my last post, I explained how to do code reviews properly. I recommended taking advantage of static analysis tools like Findbugs, PMD, Klocwork or Fortify to... Read all
When you think of a Doctrine 2 DBAL Type you think of an atomic thing, but how can you work programmatically on this type without defining an event? A DBAL Type... Read all
We cannot imagine Internet service without TCP/IP. All Internet services we have developed and used at NHN are based on a solid basis, TCP/IP. Understanding how... Read all
We are proud to announce that the newest major release of our Eclipse-based developer tooling is now available. This is a major release not only in terms of new... Read all
If you need to rename the Java package of a 3rd party library, e.g. to include it directly in your project while avoiding possible conflicts, you can use one of... Read all
In 1979 a group of western dignitaries visited Japan to learn more about the manufacturing models that had been applied to great success. Konosuke Matsushita,... Read all
Learn to set up a containerized MySQL database with Docker, including steps for running, accessing, connecting from your host, and cleaning up the container. Read all
Learn how to harness advances in Kubernetes to optimize resource allocation by prioritizing workloads dynamically and efficiently based on need. Read all
This article series will take you through the process of developing a network anomaly detection system using the Spring Boot framework in a robust manner. Read all