Recent Posts

The Real Mechanics of Vulnerabilities in an Upstream/Downstream, Topsy-Turvy EOL World

Author: Steve Poole Original post on Foojay: Read More Table of Contents In this article you’ll learn Introduction What this article is about Back in the real world Code Flows A different type of waterfall Unpredictable as the weather? The idealised workflow The ethics of vulnerability patching Unreported is not safe Downstream’s responsibility to the ecosystem End of Life software …

Read More »

MongoDB and WiredTiger: A Journey Through the Storage Engine

Author: Elie Hannouch Original post on Foojay: Read More Databases are the backbone of modern applications, and MongoDB stands out with its flexibility and scalability. Central to its functionality is the WiredTiger storage engine. WiredTiger, as MongoDB’s default engine, seamlessly merges document-level concurrency for high throughput, advanced compression techniques for optimized storage, and an in-memory architecture for rapid data access. …

Read More »

J-Fall 2025: A Day to Remember

On November 6, 2025, the Java community came together in Ede for another great edition of J-Fall. The event was filled with inspiring talks, practical insights, and lots of energy from both speakers and attendees. It was a full day of learning, sharing knowledge, and connecting with fellow developers. After the event, attendees rated the sessions. Based on a weighted …

Read More »