Check out this open source project to get a start on your microservices architecture, learn about the tools you need to connect your microservices, and more.
With JAR files, you've got your fat JARs, thin JARs, and skinny JARs, but here's an overview of Hollow JARs and how they sit between an app server and an Uber JAR.
Using some form of secret rotation when using web tokens to encrypt payloads is important to any security strategy. Read on for an example of how to implement this.
When adhering to the SOLID programming principles, Single Responsibility can be a bit tricky. Find out why and how to better understand this oft-misunderstood concept.
See how you can integrate Mendelson AS2, one of the more the widely used AS2 clients, into your testing cycles and automate it to perform AS2 operations.
Though it's tough, this developer admits he hadn't heard of this plugin until recently. If you're in the same boat, read to get an overview of this great security tool.
Still wrapping your head around DI? Let's explore the philosophy and functionality behind it, then see how Guice, or any other such framework, can help.