Recent Posts

What is RAG, and How to Secure It

Author: Brian Vermeer Original post on Foojay: Read More Table of Contents Why use RAGHow RAG Works 1. Retrieval 2. Generation Security implications of using RAG Prompt injection through retrieved content Data poisoning Access control gaps in retrieval Leaking PII to third-party models Caching risks and session bleed Contradictory or low-quality information Proactive and remediation strategies for securing RAG Sanitize …

Read More »

Building a Real-Time AI Fraud Detection System with Spring Kafka and MongoDB

Author: Tim Kelly Original post on Foojay: Read More Table of Contents What we are buildingPrerequisitesCreate our MongoDB databaseCreate a Vector Search indexCreate a Spring applicationSetting up configuration MongoDB configuration Spring AI configuration Kafka configuration Generate our synthetic customer profiles The customer model Customer seeding How the sample customers are structured The transaction model Generating random transactions How do we …

Read More »

Foojay Live @ JCON Köln

Author: Frank Delporte Original post on Foojay: Read More Today and tomorrow, we will be at the JCON Conference in Köln, Germany. We have set up an interview booth to talk to speakers and visitors about all things Java. Please follow us on LinkedIn and/or YouTube for the live interviews. Just like last year, these interviews will be grouped into …

Read More »