Author: Grace Jansen Original post on Foojay: Read More The 12 factor application methodology is being updated and we need your help with it! Be a part of this project helping to update and modernize the original methodology to enable it to be even more effective for modern cloud-native applications. What is the 12 factor app methdology? Originally created back …
Read More »foojay
Java 23: What’s New?
Author: Loic Mathieu Original post on Foojay: Read More As soon as Java 23 is out, it’ll be time to walk through all the functionalities that this version bring to us as developers. First of all, something has happened that, to my knowledge, has never happened before in a Java release: a preview feature has been removed! The String Templates …
Read More »Implementing the Idempotency-Key specification on Apache APISIX
Author: Nicolas Frankel Original post on Foojay: Read More Recently, I wrote an analysis of the IETF Idempotency-Key specification. The specification aims to avoid duplicated requests. In short, the idea is for the client to send a unique key along with the request: If the server doesn’t know the key, it proceeds as usual and then stores the response If …
Read More »When (not) to write an Apache APISIX plugin
Author: Nicolas Frankel Original post on Foojay: Read More When I introduce Apache APISIX in my talks, I mention the massive number of existing plugins, and that each of them implements a specific feature. One of the key features of Apache APISIX is its flexibility. If a feature is missing, you can create your own plugin in Lua or a …
Read More »How to profile a performance issue using Spring Boot profiling tools
Author: Nasim Salmany Original post on Foojay: Read More In today’s fast-paced development environment, ensuring the performance and reliability of your services is critical. Imagine you are part of a team responsible for several services essential to both internal teams and external customers. These services are the backbone of various business operations, and any downtime or performance degradation can have …
Read More »JavaFX Links of August 2024
Author: Frank Delporte Original post on Foojay: Read More Here is the overview of the JavaFX LinksOfTheMonth of August 2024, published on jfx-central.com during this month. Did we miss anything? Is there anything you want to have included in one of the next overviews? Let us know via links@jfx-central.com. Core Pedro Duke shared: “RichTextArea control is now available for testing …
Read More »Four Easy Ways to Analyze your Java and Kotlin Code for Security Problems
Author: Brian Vermeer Original post on Foojay: Read More Originally published at Snyk.io Nowadays, the security of your applications is just as important as the functionality they provide. Therefore, analyzing your code for security vulnerabilities is a vital part of maintaining the integrity of your applications and protecting your users’ data. As developers, we are at the front lines of …
Read More »Get Recognized for your Cloud-Native Java Development Skills with this New Badge
Author: Grace Jansen Original post on Foojay: Read More In a world where in-demand skills are critical for job success, security, and progression, it’s vital that we, as developers, ensure we are showcasing our skills to the wider world. This can include qualifications, courses, and badges, all of which help us to advertise our skills and highlight our professional experiences …
Read More »IBM Semeru Runtimes for Java includes FIPS 140-3 certified cryptography
Author: Laura Cowen Original post on Foojay: Read More IBM® Semeru Runtimes for Java 11, 17, 21+ now includes FIPS 140-3 cryptography (certified by the U.S. National Institute of Standards and Technology; NIST) and is production-ready for Java deployments. FIPS 140-3 is also available in IBM SDK, Java Technology Edition, V8. IBM first made FIPS 140-3 cryptography available as a …
Read More »Debugging Kubernetes: Troubleshooting Guide
Author: Shai Almog Original post on Foojay: Read More Table of Contents Identifying Configuration Issues Common Causes and Solutions Detailed Investigation Steps Dealing with Image Pull Errors Troubleshooting Steps Handling Node Issues Preventive Measures Managing Missing Configuration Keys or Secrets Utilizing Buildg for Interactive Debugging Conclusion As Kubernetes continues to revolutionize the way we manage and deploy applications, understanding its …
Read More »