TornadoVM for RISC-V Accelerators

Author: Juan Fumero Original post on Foojay: Read More Takeaways RISC-V is an open standard instruction set architecture that anyone can use to build new processors and accelerators, for example, for AI. oneAPI Construction Kit (OCK) is a new framework that allows software developers and system designers to bridge the gap between hardware accelerators and open standards, by enabling a …

Read More »

The Persistent Threat: Why Major Vulnerabilities Like Log4Shell and Spring4Shell Remain Significant

Author: Brian Vermeer Original post on Foojay: Read More This article was originally published at Snyk.io As developers, we’re constantly juggling features, fixes, and deadlines. Yet, a lurking issue has been surprisingly overlooked: the continued use of vulnerable Log4j and Spring Framework versions in many projects. Despite the high-profile exposure of Log4Shell and Spring4Shell vulnerabilities, a shocking number of applications …

Read More »

Java 23 Has Arrived, And It Brings a Truckload of Changes

Author: Hanno Embregts Original post on Foojay: Read More Java 23 has arrived! It’s been six months since Java 22 was released, so it’s time for a fresh truckload of JEPs. In this article, we take you on a tour of everything that is part of this release, giving you a brief introduction to each of them. Where applicable the …

Read More »

Foojay Podcast #57: Welcome to OpenJDK (Java) 23

Author: Frank Delporte Original post on Foojay: Read More OpenJDK (Java) 23 is (almost) here! OpenJDK 23 introduces three new features to the language and runtime and many bug fixes, small improvements, and a longer list of preview features. What are the most important facts about this release? Let’s find out… Video Podcast (Audio Only) Guests Simon Ritter https://www.linkedin.com/in/siritter/  https://mastodon.social/@speakjava  …

Read More »

Health Check Response Format for HTTP APIs

Author: Nicolas Frankel Original post on Foojay: Read More I’m continuing my journey on getting more familiar with HTTP APIs by reading related RFCs. This time, I read the Health Check Response Format for HTTP APIs on the suggestion of Stefano Fago. In this article, I’d like to summarize my reading. Note that it’s a draft. Moreover, it has been …

Read More »

DRY your Apache APISIX config

Author: Nicolas Frankel Original post on Foojay: Read More DRY is an important principle in software development. In this article, you learn how to apply it to Apache APISIX configuration. The DRY principle “Don’t repeat yourself” (DRY) is a principle of software development aimed at reducing repetition of information which is likely to change, replacing it with abstractions that are …

Read More »

A Fresh Look at Embedded Java

Author: Frank Delporte Original post on Foojay: Read More Since its inception, Java has promised to “Write Once, Run Anywhere.” In its early days, the main focus of Java was embedded devices, such as set-top boxes and televisions. But soon, it became one of the leading programming languages powering high-scale business applications that can handle massive amounts of transactions with …

Read More »

Browserless Testing of Vaadin Applications with Karibu Testing

Author: Simon Martinelli Original post on Foojay: Read More In modern web development, testing is essential for ensuring the reliability and performance of applications. For developers working with Vaadin, one of the best testing tools is Karibu Testing. This testing framework stands out for its ability to run browserless testing, offering several advantages over traditional end-to-end testing approaches, such as …

Read More »

Top Security Flaws Hiding In Your Code Right Now: And How To Fix Them

Author: Jonathan Vila Original post on Foojay: Read More Recent years have seen numerous injection attacks causing significant damage, including a 2019 SQL injection breach in the Fortnite video game and a 2018 attack on Tesla’s systems. Other serious incidents involve the Log4Shell logging injection and a deserialization attack on Atlassian Jira. These examples show that various code vulnerabilities can …

Read More »