New & Notable
Azure Spring Cloud, jointly developed by Microsoft and Pivotal, lets Spring developers bring apps to the cloud without concern for the underlying cloud infrastructure.
With the Semmle semantic code analysis engine freshly added to its quiver, GitHub gives corporate development teams one way to boost security of their open source software.
API and web application vulnerabilities may share some common traits, but it's where they differ that hackers will target.
Startup Xqiz.it has a new Ecstasy programming language that aims to arm developers for the cloud-native computing era with features that Java and other programming languages lack.
Once an afterthought in the Java community, Microsoft has seemingly overtaken IBM as the preeminent advocate among developers at the Oracle Code One conference.
Coffee Talk: News & InsightSubmit Post
03 Oct 2019
An Alexa vulnerability, combined with improper record retention in Amazon cloud servers, could expose a consumer or business developer to hacks that target ...
01 Oct 2019
A June 2019 NIST report identified hypervisor vulnerabilities in type 1 and type 2 hypervisors. Through the use of forensic analysis, you can start to close ...
29 Sep 2019
In need of a quick fix for the Eclipse "No Java virtual machine was found" error during an Ubuntu or Windows installation? Here's how to fix the Eclipse JRE ...
15 Sep 2019
If you're in San Francisco for Oracle Code One 2019, here are 10 sessions to visit to make the most out of your conference experience and chat with ...
12 Sep 2019
There's a lot to digest at Oracle Code One 2019. Here's some sage advice from a conference veteran to make the most out of your experience in San Francisco.
04 Sep 2019
How do you deploy a JAR file to Tomcat? Typically you deploy WAR files, not JARs. But if you need to link to a JAR file from a Java web app on Apache Tomcat, ...
29 Aug 2019
A Cisco firewall vulnerability stems from improper user input validation. Here is how to fix the problem, and other ways to stem firewall vulnerability issues ...
28 Aug 2019
With the HSTS header, your organization can ensure that communications are secure across your networks. Here is how to implement the header, and some ...
23 Aug 2019
Hackers don't always infiltrate your production systems with sophisticated attacks. Sometimes, they view overlooked IT security best practices as the best way ...
06 Aug 2019
Don't get caught up in all the microservices oriented architecture hype just yet. Make sure you ask some key questions, and examine potential design issues ...
Have a question for an expert?
Please add a title for your question
Get answers from your peers on your most technical Java Development challenges.
Darryl K. Taft asks:
How important is it for you to be able to run your Java workloads on Azure?
Margaret Rouse asks:
Which of popular Java web servers do you prefer to use when packaging applications?
Darryl K. Taft asks:
How significant a factor is security in regard to your enterprise applications?
Pro+ TheServerSide DownloadsView All
E-Handbook | June 2017Download