Some people use the terms Inversion of Control and Dependency Injection interchangeably. Let's see how they're different and how they can work together.
The folks at Gradle feel that Java 9's multi-release JARs are a poor solution to a real problem for library designers. See how to create an MRJAR and why you shouldn't.
We explain a type of attack that's possible to carry out on systems using OAuth and how to mitigate them using keyed-Hash Message Authentication Code Validation.
Learn how to build a secure SPA using Spring Boot and OAuth while using a Spring Boot starter to get additional support for validation and authority mapping.
If you haven't had a chance to explore Azure's Network Watcher, including the Network Security Group Flow logs, here's how to get the ELK integrated for analysis.
What should a DBA do other than wait for new edicts from on high — especially when data held by the IT department is a business asset and data governance is the responsibility of multiple people?