New & Notable
IBM and Apple extended their existing enterprise mobility partnership with tools to help developers build Watson-based AI services for the IBM Cloud.
How do you choose one NoSQL database over another? Expert Christopher Tozzi explains the difference between MongoDB and Cassandra.
Java security best practices include validating input to prevent injection attacks and managing malicious JAR vulnerabilities.
Which is the right methodology to use for your project: Waterfall or Agile? The industry may be at peak Agile, as the practicality of Waterfall is winning over more converts.
Coffee Talk: News & InsightSubmit Post
22 Mar 2018
Was it just me, or did the Java 10 release just creep up on everyone? Given, a March release for Java 10 was planned a long time ago, but given Oracle's spotty...
08 Mar 2018
While great efforts have been made to encourage both men and women to enter into STEM related fields, ongoing acts of discrimination against women makes gender...
27 Feb 2018
The Eclipse Foundation has decided on Jakarta EE as the new name for Java EE as the organization moves to advance enterprise Java under the aegis of Eclipse.
27 Feb 2018
Many organizations moved into the cloud with more enthusiasm than forethought. Which is why it is more important than ever for organizations to rethink how ...
21 Feb 2018
New architectures composed out of language agnostic software containers have made polyglot programming a new reality. But out of this newfound freedom chaos ...
30 Jan 2018
Apple is undeserving of the backlash they have suffered. The battery update is a good feature that will extend a phone's life. It's not planned obselecense.
23 Jan 2018
With so many competing container orchestration tools on the market, it's difficult to settle on which one to choose. But for many, Kubernetes is the right ...
12 Jan 2018
One of my favorite things about interviewing women in technology has been hearing all their helpful tips and insights. Many of these women spent decades in the...
05 Jan 2018
The article demonstrates that the requirements management, software integration and value stream networds are not only complementary, but essential in keeping ...
12 Dec 2017
The Management Engine, embedded on certain Intel chips, is a hidden threat to the security of personal and corporate computers. People need to take this hidden...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Have a question for an expert?
Please add a title for your question
Get answers from your peers on your most technical Java Development challenges.
Pro+ TheServerSide DownloadsView All
E-Handbook | June 2017Download