Recent Posts

How to Deploy a Vaadin Application as a WAR on Tomcat 11

Author: Simon Martinelli Original post on Foojay: Read More Table of Contents Step 1: Download Tomcat 11Step 2: Create a New Vaadin ProjectStep 3: Adjust the pom.xmlStep 4: Update the Spring Boot Application ClassStep 5: Build the Application for ProductionStep 6: Deploy the WAR to TomcatConclusion If you want to run a Vaadin application on an external servlet container like Apache Tomcat …

Read More »

What is RAG, and How to Secure It

Author: Brian Vermeer Original post on Foojay: Read More Table of Contents Why use RAGHow RAG Works 1. Retrieval 2. Generation Security implications of using RAG Prompt injection through retrieved content Data poisoning Access control gaps in retrieval Leaking PII to third-party models Caching risks and session bleed Contradictory or low-quality information Proactive and remediation strategies for securing RAG Sanitize …

Read More »

Building a Real-Time AI Fraud Detection System with Spring Kafka and MongoDB

Author: Tim Kelly Original post on Foojay: Read More Table of Contents What we are buildingPrerequisitesCreate our MongoDB databaseCreate a Vector Search indexCreate a Spring applicationSetting up configuration MongoDB configuration Spring AI configuration Kafka configuration Generate our synthetic customer profiles The customer model Customer seeding How the sample customers are structured The transaction model Generating random transactions How do we …

Read More »