New & Notable

Monitor and fix Jenkins plugins regularly

Let's explore the Blue Ocean, Config File Provider and Groovy plugins with security vulnerabilities. Here's how to address them, and what could happen if you don't.

Follow these 7 git commit message rules

Follow these rules for writing clear and concise git commit messages that allow other developers to find and follow your commit history without any hassle.

NetBeans Java IDE emerges from Apache Incubator

The NetBeans Java development environment has achieved top-level project status at the Apache Software Foundation, a leading open source software project hosting organization.

How entropy as a service can address strong encryption needs

Cryptographic keys help improve security in your enterprise. Consider entropy as a way to safeguard your data and prevent hackers from picking your locks with faulty keys.

Developers get lost in the IT security shuffle

Developers need to be comfortable with their tools to create a strong security model in an organization. Don't overlook these areas or credentials can end up in the wrong hands.

Coffee Talk: News & Insight

Submit Post View All Posts Submit Post

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Java Development challenges.

You will be able to add details on the next page.

Pro+ TheServerSide Downloads

View All

Search thousands of tech definitions

View All Definitions

-ADS BY GOOGLE

SearchCloudApplications

SearchSoftwareQuality

SearchHRSoftware

SearchSAP

SearchERP

DevOpsAgenda

Close