Pattern matching is a language feature where you can test for a specific pattern on a character sequence or a data structure. | Continue reading
Santa Claus has issued a security advisory for the popular holiday celebration. | Continue reading
Java modules have been a big discussion point before in many places. And this is now also causing some headaches in the Pi4J project... | Continue reading
K8ssandra is an open-source distribution of Apache Cassandra for Kubernetes, with a rich set of trusted open-source services and tooling. | Continue reading
In the 2nd part of the series, learn how to use MQTT and the Raspberry Pi to visualize sensor data on a TilesFX dashboard! | Continue reading
Let's learn about BlockingQueue, one of the essential concurrent collections available in the concurrent package in the JDK. | Continue reading
Learn how to improve the API provided by third-party libraries by combining Kotlin extension functions and delegation. | Continue reading
We discussed and finally solved this problem that has been bothering VS Code Java users for more than three years. | Continue reading
Vulnerability information and TCK test status details are available and easily detectable with JDKMon 17.0.18. | Continue reading
A pragmatic guide to Java logging—what should we log, what shouldn’t we log, and how to implement Java logging properly. | Continue reading
Let's understand what GitOps is and its benefits and learn how ArgoCD can help with the continuous delivery of Kubernetes-based applications. | Continue reading
foojay is the place for all OpenJDK Update Release Information. Learn More. | Continue reading
In this guide, learn how to build a small but fully functional ToDo application in pure Java using Vaadin Flow. | Continue reading
Over the last couple of days (and nights) I’ve been studying the new (extremely dangerous) vulnerability in log4j2 called Log4Shell. | Continue reading
When you set out to build the best messaging infrastructure service, the first step is to pick the right underlying messaging technology! | Continue reading
Get started with HiveMQ and publish the data of up to 100 devices to an always-on, maintenance-free message broker for free. | Continue reading
A broken kitchen appliance leads me down the path of intelligent failure, downside risk, exponential growth and Cloud computing! | Continue reading
Let's continue the discussion and share a few more thread-safe classes that we can use in our day-to-day coding! | Continue reading
Java developers typically choose from several logging systems or facades. Many of these logging frameworks have grown to work together. | Continue reading
Quarkus brings an exciting take to the table. Unlike Micronaut, it doesn't generate additional bytecode during each compilation. | Continue reading
On Dec.10, 2021, a new, critical Log4j vulnerability was disclosed: Log4Shell. All current versions of log4j2 up to 2.14.1 are vulnerable. | Continue reading
Continue with the JUnit 5 series on how to customize test classes and test method names to produce more meaningful output. | Continue reading
Learn today how you can modernize and reduce costs with blazing performance with fast JMS for Apache Pulsar. | Continue reading
Adelphi is an open-source QA tool for Apache Cassandra, packaged as a Helm chart, simplifying Kubernetes data integrity and performance tests. | Continue reading
In this article, we will develop a simple RESTful API using Spring WebFlux and aim to leverage the special Kotlin extensions in Spring. | Continue reading
I frequently use Spring Boot in my demos. The latest one is no different, showing how to achieve CQRS using two different code paths. | Continue reading
Point JDKMon to the folder where all your JavaFX SDK's are installed and it will check if there are any updates available. | Continue reading
A place for friends of OpenJDK, foojay provides user-focused Java and OpenJDK technical info and dashboards with free data for everyday Java developers. | Continue reading
Java, like most platforms or languages has layers of security, this article lookS at the Authorization layer and how JEP 411 relates to it. | Continue reading