Author: Shai Almog Original post on Foojay: Read More Table of Contents Network Debugging PowerhouseRe-Issuing and Modifying Requests cURL and Postman Throttling and Debugging Race Conditions Why Throttling Matters: How to Use Managing State with Storage Tools Challenges of State Management Analyzing Request and Response HeadersDebugging in Incognito Mode: Limitations and Best PracticesConnecting the Front-End to the DatabaseFinal Word Network …
Read More »foojay
Building local LLM AI-Powered Applications with Quarkus, Ollama and Testcontainers
Author: Jonathan Vila Original post on Foojay: Read More Table of Contents Project Overview1. Integrating Quarkus with Ollama Why Ollama? Quarkus and Ollama Integration 2. Using Testcontainers for Integration Testing Why Testcontainers? Example: Setting up a Testcontainer for Ollama Key Points: 3. Leveraging Quarkus Dev Services for Ollama What Are Quarkus Dev Services? Configuring Dev Services Development Workflow Conclusion Key …
Read More »Java 24 : What’s New?
Author: Loic Mathieu Original post on Foojay: Read More Table of Contents JEP 404: Generational Shenandoah (Experimental)JEP 450: Compact Object Headers (Experimental)JEP 472: Prepare to Restrict the Use of JNIJEP 475: Late Barrier Expansion for G1JEP 478: Key Derivation Function API (Preview)JEP 479: Remove the Windows 32-bit x86 PortJEP 483: Ahead-of-Time Class Loading & LinkingJEP 486: Permanently Disable the Security …
Read More »Checking out Junie, a coding agent by JetBrains
Author: Igor Kulakov Original post on Foojay: Read More Table of Contents Installation and overviewSetting requirements‘Coding’Code qualityCorrecting the implementationResults Other languages: Español 한국어 Português 中文 Recently, I talked about Duplicate Finder on the Foojay Podcast hosted by Frank Delporte. We briefly touched upon implementing support for other formats, and Frank asked if I’m planning on adding AsciiDoc, as it could …
Read More »Sliding Window Counter Rate Limiter (Redis & Java)
Author: Raphael De Lio Original post on Foojay: Read More Table of Contents Index How It Works 1. Define a Time Window 2. Track Requests 3. Remove Expired Intervals 4. Rate Limit Check How to Implement It with Redis 1. Track Requests by Sub-Interval 2. Remove Expired Intervals 3. Sum Counts for the Active Window Implementing it with Jedis Add …
Read More »Foojay Podcast #67: Writing a book. Does it make you rich and famous?
Author: Frank Delporte Original post on Foojay: Read More Table of Contents VideoPodcast (Audio only)Guests Trisha Gee Len Epp Wim Deblauwe Marián Varga Links Book by Frank Books and links by Trisha Gee Books by Wim Deblauwe Book by Marián Varga Leanpub Lulu Content Let me share a personal story. I started experimenting with Java on a Raspberry Pi about …
Read More »Pi4J Welcomes Java 21 on the Raspberry Pi
Author: Frank Delporte Original post on Foojay: Read More Pi4J provides a friendly object-oriented I/O API and implementation libraries for Java Programmers to access the full I/O capabilities of the Raspberry Pi platform. The project “hides” the complexity to interact with electronic components through different ways of communication (SPI, I2C, PWM,…) by providing Java interfaces on top of native libraries …
Read More »Event-Driven Architecture and Change Data Capture Made Easy
Author: Muaath Bin Ali Original post on Foojay: Read More Hello again! In this article (Part 1), we will discuss two common ways to build modern software systems: Event-Driven Architecture (EDA) and Change Data Capture (CDC). They serve different purposes but can work well together in some situations. we’ll explain EDA and CDC, discuss their use cases, and explain when …
Read More »Securing Vaadin Applications with Microsoft Entra
Author: Simon Martinelli Original post on Foojay: Read More Table of Contents Step 1: Create an Application in Entra Many companies use Microsoft 365, so letting users log in with their Microsoft account is a good choice. This blog post shows how to secure your Vaadin applications using Microsoft Entra for authentication and authorization and explains how Karibu Testing must …
Read More »Webinar: Find Undead Code in Your Java Environments
Author: Erik Costlow Original post on Foojay: Read More Table of Contents Put a stake through the heart of undead codeAzul Code Inventory can help remove undead codeGradle Devlocity can help automate tasks to improve productivity 10-30% of the custom code in applications is undead code and can just be deleted. Eliminating undead code can enhance the overall performance and maintainability …
Read More »
NLJUG – Nederlandse Java User Group NLJUG – de Nederlandse Java User Group – is opgericht in 2003. De NLJUG verenigt software ontwikkelaars, architecten, ICT managers, studenten, new media developers en haar businesspartners met algemene interesse in alle aspecten van Java Technology.