How Java Litters Beyond the Heap: Part 1, Relational Databases

As Java developers, we’re no strangers to the concept of garbage collection. Our apps generate garbage all the time, and that garbage is meticulously cleaned out by CMS, G1, Azul C4, and other types of collectors. However, the story doesn’t end with the Java heap. In fact, it is just the beginning. In this article, we will create a simple …

Read More »

A Poor Man’s API

Creating a full-fledged API requires resources, both time and money. You need to think about the model, the design, the REST principles, etc., without writing a single line of code. Most of the time, you don’t know whether it’s worth it: you’d like to offer a Minimum Viable Product and iterate from there. I want to show how you can …

Read More »

Controlling a LED strip with Pi4J and JBang

In an earlier post here on Foojay.io, JBang and Pi4J were used to control a LED and button connected to a Raspberry Pi. This week Robert von Burg, one of the main contributors of the Pi4J project, shared on Mastodon another project where a LED strip is controlled via I2C. This is the result, notice the Foojay.io startup artwork Wiring …

Read More »

You’re Doing It Wrong — Recruiting a DevRel

This article was co-written with Wesley Faulkner. Wesley Faulkner is a first-generation American, public speaker, and podcaster. He is a founding member of the government transparency group Open Austin and a staunch supporter of racial justice, workplace equity, and neurodiversity. His professional experience spans technology from AMD, Atlassian, Dell, IBM, and MongoDB. Wesley currently works as a head of community …

Read More »

Gossips: An Event-Bus in a Chatty Neighbourhood

In this article, we’ll tackle a common issue: simple communication between system components. With a slightly controversial, themed, domain-driven design. Though this post has nothing to do with Android, we need a context where an Event-Bus is needed. And boy oh boy is it needed in Android! And we’ll use this as an excuse to write an Event-Bus. I chose …

Read More »

Unusual Java: StackTrace Extends Throwable

There are things you can do in Java you rarely see, generally because there is no use for it. However, there are some unusual things in Java that could be surprisingly useful. Chronicle Software uses a number of different useful patterns in its low-level libraries most developers wouldn’t generally come across. One of them is a class that extends Throwable …

Read More »

AP-Loader: A New Way to Use and Embed async-profiler

Using async-profiler can be quite a hassle. First, you have to download the right archive from GitHub for your OS and architecture, then you have to unpack it and place it somewhere. Or you get it from your OS distribution, hoping that it is the current version. It gets worse if you want to embed it into your library, agent, …

Read More »

Friends of OpenJDK at FOSDEM 2023

We’re excited to announce that friends of OpenJDK (foojay.io), that is, developers who use OpenJDK on a day to day basis developing tools and technologies in languages such as Java and Kotlin, will be represented at FOSDEM 2023 again at the live Foojay DevRoom on Sunday, 5 February 2023!   Here you can find the CFP (Call For Papers) for …

Read More »

Foojay Podcast #7: Security in Java, what do we need to know and how to keep our applications secure?

For this Foojay Podcast, we invited security experts to dive into the fascinating world of secure coding and detecting vulnerabilities in your Java applications. How can you make and keep your systems safe? That’s what we want to find out… Guests Steve Poole (Sonatype, @spool167)Brian Vermeer (Snyk, @BrianVerm, @brianverm@mastodon.social) Anastasiia Voitova (Cossack Labs, @vixentael, @vixentael@mastodon.social) Host Erik Costlow (Azul, @costlow, @costlow@mastodon.social) …

Read More »

Internal Security: Hardening Internal Systems

60% of security breaches are internal to the organization and yet when we think about security we usually think about vulnerabilities, exploits, etc. All the while, 60% of hacks are just from a person just logging into the system and taking whatever the hell they want. I’ve been thinking about this quite a bit recently. I spent a great deal …

Read More »