DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Java Topics

article thumbnail
Auditing Spring Boot Using JPA, Hibernate, and Spring Data JPA
This article provides a comprehensive guide to implementing auditing in Spring Boot applications using JPA, Hibernate, and Spring Data JPA.
September 19, 2023
by Andrei Rogalenko
· 29,079 Views · 3 Likes
article thumbnail
Parallel Sort
There are so many computer algorithms that have emerged to support sorting. Some of the well-known algorithms are quick sort, heap sort, merge sort, etc.
September 18, 2023
by Unni Mana
· 4,049 Views · 1 Like
article thumbnail
How To Validate Archives and Identify Invalid Documents in Java
Explore the prevalence of cyberattacks carried out using common archive formats and invalid document types and data validation API solutions.
September 16, 2023
by Brian O'Neill DZone Core CORE
· 5,941 Views · 2 Likes
article thumbnail
Spring WebFlux Retries
If you use Spring WebFlux, you probably want your requests to be more resilient. Here, learn to use the retries that come packaged with the WebFlux library.
September 16, 2023
by Emmanouil Gkatziouras DZone Core CORE
· 7,596 Views · 26 Likes
article thumbnail
Unraveling Lombok's Code Design Pitfalls: Exploring Encapsulation Issues
Lombok simplifies Java coding but can breach encapsulation. Java 8's Objects.requireNonNull and IDE support are alternatives. Choose wisely.
September 16, 2023
by Otavio Santana DZone Core CORE
· 8,955 Views · 8 Likes
article thumbnail
Difference Between High-Level and Low-Level Programming Languages
Explore high-level vs. low-level programming languages: abstraction, performance, and more. Choose the right one for your coding needs.
September 15, 2023
by Rishi Patel
· 7,175 Views · 1 Like
article thumbnail
Apache Flink
This tutorial will show you step-by-step how to use Astra as a sink for results computed by Apache Flink, an open-source framework.
September 15, 2023
by Patrick McFadin
· 4,698 Views · 1 Like
article thumbnail
Microservices With Apache Camel and Quarkus (Part 5)
After learning how to run our microservices in Minikube in part three of this series, let's look at how to do the same in OpenShift.
September 15, 2023
by Nicolas Duminil DZone Core CORE
· 8,401 Views · 7 Likes
article thumbnail
Securing Your Applications With Spring Security
Spring Security secures Java apps with authentication, authorization, and protection features, shown in an online banking example.
September 15, 2023
by Arun Pandey DZone Core CORE
· 12,683 Views · 4 Likes
article thumbnail
Mastering Persistence: Why the Persistence Layer Is Crucial for Modern Java Applications
Ignoring the persistence layer in software can cause data problems, slow performance, maintenance issues, and limited adaptability. It's vital for secure, efficient, and flexible applications.
September 15, 2023
by Otavio Santana DZone Core CORE
· 7,191 Views · 2 Likes
article thumbnail
Streamlining Development: Exploring Software Tools for Build Automation
In this article, we will discuss a few build automation tools which are extensively used in modern software development teams.
September 15, 2023
by Aditya Bhuyan
· 4,339 Views · 4 Likes
article thumbnail
Cutting Big Data Costs: Effective Data Processing With Apache Spark
In this article, we will delve into strategies to ensure that your data pipeline is resource-efficient, cost-effective, and time-efficient.
September 14, 2023
by Leonid Chashnikov
· 19,505 Views · 5 Likes
article thumbnail
Getting Started With Prometheus Workshop: Instrumenting Applications
Interested in open-source observability? Learn about instrumenting your applications for customized business metrics in cloud-native environments.
September 14, 2023
by Eric D. Schabell DZone Core CORE
· 4,454 Views · 6 Likes
article thumbnail
Parallelism in ConcurrentHashMap
ConcurrentHashMap is used extensively in multi-threaded applications. In this article, we will learn more about parallelism in Concurrent Hashmaps.
September 13, 2023
by Unni Mana
· 5,413 Views · 4 Likes
article thumbnail
Writing Kubernetes Operators in Java: Part 1
Kubernetes operators are typically written using Go. Recent advances and projects now make Java a compelling platform to write operators.
September 13, 2023
by Chris Laprun
· 4,931 Views · 2 Likes
article thumbnail
Spring Authentication With MetaMask
Learn how to develop an authentication mechanism for Spring Security with the MetaMask extension using asymmetric encryption and providing data privacy.
September 12, 2023
by Alexander Makeev
· 9,015 Views · 12 Likes
article thumbnail
Exploring IBM App Connect Enterprise 12.0.9.0
In this article, we take a dive into some of the features of IBM App Connect Enterprise 12.0.9.0 and explore how developers can use them for their integration needs.
September 11, 2023
by Ben Thompson
· 5,084 Views · 2 Likes
article thumbnail
LTS JDK 21 Features
In this post, take a dive into the upcoming LTS release — it might be just the version you will stick to for the years ahead!
September 11, 2023
by Dmitry Chuyko
· 9,148 Views · 10 Likes
article thumbnail
Java Parallel GC Tuning
Parallel garbage collector is one of the oldest Garbage Collection algorithms introduced in JVM to leverage the processing power of modern multi-core systems.
September 8, 2023
by Ram Lakshmanan DZone Core CORE
· 6,049 Views · 9 Likes
article thumbnail
Embracing Reactive Programming With Spring WebFlux
WebFlux enables efficient, scalable, reactive web applications with Spring, harnessing the power of non-blocking code, backpressure, and functional programming.
September 8, 2023
by Arun Pandey DZone Core CORE
· 8,743 Views · 3 Likes
  • Previous
  • ...
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: