Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Popular Topics
Spring Batch: Processing Data From Web Service to MongoDB
In this post, we will look at how to create a Spring Batch application that consumes web service data and insert it in the MongoDB database.
December 12, 2018
by
Anis Hajri
·
27,759 Views
·
4 Likes
JVM Calendar: JDPR or Java Data Protection Recommendations
After GDPR, we offer some additional thoughts on data protection within Java applications.
December 12, 2018
by
Erik Costlow
·
10,503 Views
·
3 Likes
Java Convert Map to Array [Snippet]
Check out this code example to learn more about converting to arrays.
December 10, 2018
by
Ramesh Fadatare
·
20,896 Views
·
8 Likes
The JDKs: Which One to Use?
Need help deciding which JDK is right for you? Look no further.
December 10, 2018
by
Fernando Almeida
·
113,414 Views
·
46 Likes
Installing Maven With Your JDK
Apache Maven remains one of the most popular dependency managers in the world of Java.
December 7, 2018
by
John Thompson
·
93,851 Views
·
11 Likes
How to Fix Invalid Target Release: 1.7, 1.8, 1.9, or 1.10 Error in Maven Build
Trying to build a Java project with Maven but your build keeps failing? Here's why.
December 7, 2018
by
Javin Paul
·
180,604 Views
·
7 Likes
An Overview of the Kafka Distributed Message System (Part 1)
Apache Kafka is one of the most popular tools for big data out there. If you're curious as to why, read on to take a look under the hood!
December 7, 2018
by
Leona Zhang
·
32,883 Views
·
17 Likes
5 Things that Are Easier in k6 Than in JMeter
Check out the load testing tasks that are easier in the open-source performance testing tool k6.
December 7, 2018
by
John Emmitt
·
21,587 Views
·
4 Likes
WeakHashMap in Java With Class Example
Let's take a closer look at the WeakHashMap implementation in Java.
December 7, 2018
by
Ramesh Fadatare
·
20,678 Views
·
15 Likes
The Right Way to Reverse a String in Java
Learn the right way to reverse a String.
Updated December 6, 2018
by
Jonatan Ivanov
·
46,300 Views
·
26 Likes
Type Safe State Machines in TypeScript
State machines are an important and often-used implement in software development. Let's take a look at how to create one using TypeScript.
December 6, 2018
by
David Karapetyan
·
11,956 Views
·
4 Likes
How to Boost Performance With Intel Parallel STL and C++17 Parallel Algorithms
Learn about C++17 parallel algorithms and how to boost performance with this library.
December 6, 2018
by
Bartłomiej Filipek
·
17,250 Views
·
3 Likes
All Hibernate Annotations: Mapping Annotations
If you make use of Hibernate, then this exhaustive reference of hibernate annotations will come in handy.
Updated December 6, 2018
by
Ramesh Fadatare
·
69,889 Views
·
7 Likes
What Is Amazon Machine Learning: 8 Benefits of AWS ML
Explore eight benefits of Amazon Machine Learning.
Updated December 5, 2018
by
Rinu Gour
·
10,657 Views
·
4 Likes
How to Learn React.js, Part 1: The React Road Map for Modern Web Developers
An in-depth discussion of the wonderful React Road Map created by developer Adam Golab, and how you can become a true React.js dev.
Updated December 5, 2018
by
Javin Paul
·
35,551 Views
·
26 Likes
Data Binding in Angular
A discussion of the four important types of data binding in Angular applications: string interpolation, property binding, event binding, and two-way data binding.
December 5, 2018
by
Nit A
·
89,170 Views
·
11 Likes
Why I Never Null-Check Parameters
Writing code with input parameters that are not null is not "safer" — it's the opposite.
December 4, 2018
by
Robert Brautigam
·
95,446 Views
·
30 Likes
Simple Sentiment Analysis With NLP
Look at a simple application of sentiment analysis using Natural Language Processing techniques.
December 4, 2018
by
Emrah Mete
·
22,519 Views
·
7 Likes
Kerberos Authenticator for Apache Cassandra
Explore the Kerberos authenticator for Apache Cassandra.
December 4, 2018
by
Justin Cameron
·
9,246 Views
·
4 Likes
The Dex File Format
Let's get to familiar with Dex files, which are about to get a lot smaller with the advent of D8.
Updated December 3, 2018
by
Jamie Lynch
·
18,100 Views
·
1 Like
Previous
...
321
322
323
324
325
326
327
328
329
330
...
Next