Coffee Talk: Java, News, Stories and Opinions
Recent Posts
-
The right MySQL persistence.xml example file for JPA 2.2 and Hibernate 5
- TechTarget 28 Jul 2020 -
How AI can help with requirements analysis tools
- Community Member 28 Jul 2020 -
How to edit the Ubuntu hosts file and ping a domain name locally
- TechTarget 28 Jul 2020
Old JDBC drivers and new MySQL 8 databases don't mesh. Here's an updated MySQL persistence.xml example file for those doing JPA and Hibernate development.
Functional requirements and user stories create the blueprint for software applications. A good set of requirements can simplify developer's work when they translate business ideas into working ...
Here's a quick video example of how to do an Ubuntu hosts file edit. This is useful for development and testing when a developer wants to mimic a production domain name locally.
-
How to remove Git submodules
- TechTarget 26 Jul 2020 -
How to Git clone on Ubuntu with GitLab and GitHub
- TechTarget 26 Jul 2020 -
Quick fix to Git's fatal 'unable to access SSL certificate' error
- TechTarget 26 Jul 2020 -
Use git worktree add and never switch branches again
- TechTarget 15 Jul 2020 -
How to perform a shallow git clone
- TechTarget 04 Jul 2020 -
How to rename a GitHub repository with Git example
- TechTarget 03 Jul 2020 -
A Bitnami WordPress stack installation and examination
- TechTarget 30 Jun 2020
There’s a lot of misinformation out there about how to remove a Git submodule. Follow these steps to delete Git submodules.
Need to perform an Ubuntu git clone operation? Here we will show you how to install Git on Ubuntu and then clone, commit and even push to GitLab and GitHub.
Here's a quick fix to the Git 'unable to access GitHub or GitLab' SSL certificate settings error when you attempt to clone from GitHub or GitLab.
Git Worktree Add Example I was today years old when I learned you could have multiple git working trees active at the same time. The idea is simple. Imagine you have multiple branches and want to ...
This shallow git clone example shows you how to use the --depth switch to limit the git commit history pulled to your local machine.
Sometimes new business requirements will force a Git admin to rename a GitHub repository. Here's how to do it, and here's how it will impact existing users.
Sometimes it's fun to see how components in open source projects are architected together. I installed a Bitnami WordPress stack onto my laptop Here I to see how the popular blogging platform works.
-
How to create a UiPath Orchestrator process to run robots
- TechTarget 27 Jun 2020 -
How to publish to UiPath Orchestrator example
- TechTarget 27 Jun 2020 -
Make this UiPath Hello World example the first project in your RPA journey
- TechTarget 25 Jun 2020 -
How to list and show the git stash history
- TechTarget 09 Jun 2020 -
How to master the Git status command
- TechTarget 09 Jun 2020 -
How to set important Git config global properties
- TechTarget 08 Jun 2020 -
List and show Git config settings
- TechTarget 07 Jun 2020 -
Why the pull request process could work beyond development
05 Jun 2020 -
How set git config username and email fields in global and local configuration files
- TechTarget 04 Jun 2020 -
How to squash git commits by example
- TechTarget 03 Jun 2020 -
A git stash name: Easily pop or apply changes by name example
- TechTarget 02 Jun 2020 -
Fix for the GitLab "Unable to locate package gitlab-ee" on Ubuntu 20
- TechTarget 02 Jun 2020 -
Where system, global and local Git config files on Windows and Ubuntu Linux are
- TechTarget 01 Jun 2020 -
How to make multiple values per key in a Java map possible example
- TechTarget 01 Jun 2020 -
Five git log oneline examples
- TechTarget 01 Jun 2020 -
How to Git rebase master onto any branch by example
- TechTarget 01 Jun 2020 -
How to Git rebase a branch to master by example
- TechTarget 01 Jun 2020 -
How to create a UiPath trigger to schedule robotic processes automation
- TechTarget 01 Jun 2020 -
How to git shelve changes and save local files
- TechTarget 30 May 2020 -
A version 5 Hibernate SchemaExport example with the ServiceRegistry and Metadata
- TechTarget 27 May 2020 -
How to create brand identity at the command line
22 May 2020 -
Always move and rename Git files in isolated commits
- TechTarget 18 May 2020 -
How to fix the 'HttpServlet not found' error in Eclipse
- TechTarget 30 Apr 2020 -
Tomcat vs WebSphere: How these application servers compare
- TechTarget 29 Apr 2020 -
Consider these developer volunteer opportunities during COVID-19
23 Apr 2020 -
Kubernetes 1.18 adds more power, addresses shortcomings
21 Apr 2020 -
Kubernetes adoption continues to rise, according to CNCF Survey 2019
20 Apr 2020 -
How to plot your Java developer career path
- TechTarget 15 Apr 2020 -
Quickly fix the MySQL MyISAM type SQLSyntaxErrorException for Hibernate
- TechTarget 01 Apr 2020 -
How to go beyond Docker with WebAssembly on the server-side
30 Mar 2020 -
5 tips to improve remote work productivity
30 Mar 2020 -
Top Java frameworks for web app development
- TechTarget 26 Feb 2020 -
How to refactor a Java portlet application for a cloud-native future
- TechTarget 25 Feb 2020 -
Top 5 benefits of client-side rendering frameworks
- TechTarget 24 Feb 2020 -
Easy JavaScript performance optimization tips for a speedy site
- TechTarget 21 Feb 2020 -
Top 3 website performance issues and how to fix them
- TechTarget 21 Feb 2020 -
Why you should make kebab case a URL naming convention best practice
- TechTarget 07 Feb 2020 -
Why I consider the Lenovo T430 the best laptop value around
- TechTarget 06 Feb 2020 -
How a software development team can handle management battles
31 Jan 2020 -
Fix Java memory leaks without costly JVM heap dumps by example
- TechTarget 31 Jan 2020 -
Make this the year of your programming side hustle
- TechTarget 08 Jan 2020 -
5 technology predictions for 2020
07 Jan 2020 -
TheServerSide's top articles from 2019
- TechTarget 30 Dec 2019 -
Top 5 functional Java interfaces
- TechTarget 23 Dec 2019 -
How to deploy a WAR file to Tomcat 5 different ways
- TechTarget 18 Dec 2019 -
Why a TrackPoint keyboard is a great gift idea for ThinkPad lovers
- TechTarget 17 Dec 2019 -
Moving JavaOne to Las Vegas shows Oracle has 2020 vision
- TechTarget 15 Dec 2019 -
5 simple steps you can take to prevent a data breach
13 Dec 2019 -
Fix SunCertPathBuilderException Jenkins plugin download error
- TechTarget 01 Dec 2019 -
Find the right pull request workflow for your dev projects
27 Nov 2019 -
What type of developer are you: A technician or an artist?
26 Nov 2019 -
UX design reviews key to every web content management strategy
25 Nov 2019 -
How regular secure code reviews can benefit an organization
20 Nov 2019 -
Change how you present technical training for better value
08 Nov 2019 -
What developers need to know about an Alexa vulnerability
03 Oct 2019 -
Forensic analysis helps close gaps in hypervisor vulnerabilities
01 Oct 2019 -
How to fix the Eclipse 'No Java virtual machine was found' install error
- TechTarget 29 Sep 2019 -
10 Oracle Code One 2019 sessions to check out
- TechTarget 15 Sep 2019 -
How to get the most out of Oracle Code One 2019
- TechTarget 12 Sep 2019 -
How to deploy a JAR file to Tomcat by example
- TechTarget 04 Sep 2019 -
Input validation issues open Cisco firewall vulnerability
29 Aug 2019 -
Use the HSTS header for secure communications across networks
28 Aug 2019 -
7 IT security best practices to know to prevent data breaches
23 Aug 2019 -
3 questions to ask in a microservices oriented architecture review
06 Aug 2019 -
Tips on how to successfully bring AI culture to dev teams
- TechTarget 26 Jul 2019 -
How to become a good Java programmer without a degree
18 Jul 2019 -
Fix JAVA_HOME errors | Invalid directory | Not set or defined | Points to JRE
- TechTarget 16 Jul 2019 -
What is the future of front-end software development in a post GUI world
09 Jul 2019 -
Don't let RabbitMQ vulnerabilities expose your CI pipelines
01 Jul 2019 -
Hibernate vs JPA: What's the difference between them?
- TechTarget 25 Jun 2019 -
Perform a Kubernetes security hardening before you use Jenkins X
25 Jun 2019 -
How to troubleshoot a JVM OutOfMemoryError problem
13 Jun 2019 -
How to deal with a remote code execution vulnerability
10 Jun 2019 -
Why is programming so hard to master?
28 May 2019 -
How to force JDK 1.8 compliance in a Maven POM example
- TechTarget 22 May 2019 -
Fix Git's 'fatal: repository not found' error quickly
- TechTarget 10 May 2019 -
What I learned from the Google I/O 2019 keynote address
09 May 2019 -
How to install Tomcat as your Java application server
- TechTarget 05 May 2019 -
Examples of Git commit message done wrong
- TechTarget 01 May 2019 -
Java's UnaryOperator in Lambda expressions example
- TechTarget 01 May 2019 -
How to write a screen scraper application with HtmlUnit
- TechTarget 25 Apr 2019 -
Top 5 software development best practices you need to know
23 Apr 2019 -
How to learn new technology in a corporate environment
26 Mar 2019 -
How Instacart works around buggy Elasticsearch queries
18 Mar 2019 -
Java Supplier interface example for functional programming
- TechTarget 27 Feb 2019 -
How to get by without Concurrent Mark Sweep
20 Feb 2019 -
A simple Java Function interface example: Learn Functional programming fast
- TechTarget 19 Feb 2019 -
Don't struggle to learn new programming languages
13 Feb 2019 -
A quick look at inferred types and the Java var keyword
- TechTarget 04 Feb 2019 -
Why developers don't stay in management for IT career change
10 Jan 2019
Want to run your RPA robots? Then you need to create a UiPath process. In this UiPath Orchestrator tutorial, we show you how to create processes and run unattended robots.
UiPath Orchestrator runs in the cloud. UiPath Studio runs on a developer's desktop or laptop. And RPA robots typically run on a physical desktop computer as well. Which means a piece of software ...
The first step in every RPA journey must be the creation of a Hello World robot. In this UiPath Hello World example, we step you through the creation of your first automation app.
Show your shelved change history with git stash list and show.
To really understand distributed version control, you must master the Git status command and understand the working tree states upon which it reports.
One of the key files managing how your DVCS system works is the glboal Git config file. Here we show you the most important global gitconfig settings and uses.
If you are wondering how a variable is assigned a value in Git config use --list to inspect the gitconfig files.
The pull request process focuses on merit-based changed and an impartial review process to create improvements. It works well with open source software development. How would it fare in other areas ...
Before you can commit code, you must set the local or global git config username and email fields. In this global git config example we will show you how.
If you goal is to clean up your repository, this squash git commits example give you the motivation you need to clean up your feature and topic branches.
A developer needs to name git stash saves if they want to easily identify them in the future. Here's how to do both a git stash with name apply and a git stash pop by name.
If you're doing a self-hosted GitLab Ubuntu 20 install and you hit the "Unable to locate package gitlab-ee" error, here's the solution to fix the problem.
Ubuntu, Linux and Windows Git configuration files are an unwieldy mess. Or at least is seems that way when you realize it's contained in three uniquely named files and spread across three or four ...
Need to add multiple values to a key in a Java HashMap but can't figure out how to do it? Here are three examples of how to solve the multiple values per key problem in Java.
Save time and effort when inspecting your commit history with the git log --oneline command.
If you think you need to git rebase master to a branch like develop or release, this tutorial will guide your way, while also letting you know of potential dangers.
This Git rebase a branch to master example will show you how to clean up your commit history and sync with the latest master commit.
How do you schedule UiPath trigger? Time based and queue based are the two ways to run uattended UiPath robots. In UiPath time trigger example we demonstrate the former.
How can a developer unshelve and shelve git changes? Or how about a git shelve equivalent like what IntelliJ has? Let's set the record straight on the git shelve and stash debate.
The manner in which you create a version 5 Hibernate SchemaExport object is markedly different than earlier versions of the framework. But it's not overwhelmingly difficult. Here's how you do it. ...
How can an organization utilize the command line to create brand identity? Software developers spend hours working in the command line. Take advantage of these eyeballs and create a tool that's ...
Will there be a need to move or rename a Git file while you refactor your code? If so, don't mix code changes with file changes. Move and rename Git files in a separate commit.
Have you run into the HttpServlet not found error? This tutorial will show you how to quickly fix this annoying Eclipse error message in three easy steps.
When it comes to Java application server comparisons, there isn't a starker contrast between two offerings than Apache Tomcat and IBM WebSphere. Right off the bat, let's clear up some ...
As COVID-19 continues to affect the planet, there's an abundance of developer volunteer opportunities that can help health professionals and everyday people get through the global pandemic.
Kubernetes is no doubt a powerful technology, but it has its shortcomings. For example, debugging under Kubernetes has always been a challenge. When it started out, Kubernetes was intended to run ...
Kubernetes is a game-changing technology in the world of container orchestration. Its adoption has seen a meteoric rise in production use since its release in 2014. A 2019 survey conducted by the ...
Are you a software developer with a bit of downtime on your hands? Here are three easy ways to keep busy while nurturing your Java developer career path.
https://youtu.be/d0AJKtPgx3M There's nothing worse for a developer than an SQLException in Hibernate and JPA. And there's nothing more annoying than when the SQLException happens before any of the ...
Docker changed the way services and applications are designed, implemented and deployed. Before Docker, applications and services had to work cooperatively on the same machine. Sometimes they did, ...
As more people work from home as a result of COVID-19, employees used to the onsite work life will need to adapt to the remote work lifestyle. At first, it can seem like a welcome change but after ...
Client-side JavaScript frameworks are all the rage, but they aren't always the right answer if you want to deliver a web-based experience for your browser-based clients. If you want to distance ...
While the past may have been all about the development of Java portlet applications, the future is cloud-native. Here is how to bridge the two together.
As the name of this site implies, we're big advocates of server-side technologies. But we also recognize that integrating client-side technologies into the web architecture can be advantageous as ...
JavaScript can deliver highly interactive websites that actively engage the user in a way HTML alone never could. However, the increased engagement levels come with a performance cost that can ...
It's amazing how even in 2020, you can visit an established organization's homepage, only to encounter serious website performance issues that could easily be fixed if the developers and designers ...
They say there are only two difficult challenges in the world of computer programming: Synchronizing the invalidation of a distributed tertiary and quaternary cache; and What to name things. Given ...
Looking for an affordable used laptop? Check out the Lenovo T430. It's the best used laptop value around.
Here’s how it usually goes. A project manager or product owner relays word from someone higher up the corporate food chain that a piece of software needs to be delivered by a given date. The reason ...
You can fix your Java memory leak problem without a costly JVM heap dump. Just use Java Flight Recorder's Old Object Sample event and view the recording in JDK Mission Control.
Don't keep your programming side hustle on the backburner anymore. Find the time to put some work into your passion project and reinvigorate your programming creativity when you're not on the job.
As the old saying goes, "the more things change, the more they stay the same." I find this saying to be particularly true when it comes to technology. Even though it's become more complex, the ...
From Git to the speed of the OpenJDK, here's a look at some of the most popular topics of 2019 on TheServerSide.com.
Many developers get intimidated when they look at all the new APIs that accept lambda expressions as arguments, and wonder how they'll ever figure out which Java function to use and what the proper ...
Tomcat WAR deployment example If you want to develop web applications and Apache Tomcat is your target web server, you need to know how to deploy WAR files to Tomcat so you can see if your ...
Lenovo ThinkPads are one of the most commonly used laptops for enterprise software developers. They are well made, have a reputation for being durable and capable of taking a good deal of abuse, ...
The rebranding of JavaOne to Oracle Code One and move from San Francisco to Las Vegas is one that I will welcome with open arms, and you should too.
Stick to best practices when it comes to security. Follow these five simple steps to guard against the most basic cyberattacks.
Sometimes when you install Jenkins, a SunCertPathBuilderException appears when you access the Jenkins plugin download page. Here's an alternate fix to the SunCertPathBuilderException error if you ...
At the heart of all large-scale software development projects are the communications patterns required to keep everyone on the same page. The dawn of Git as a distributed version control system ...
When I used to work for a big computer manufacturing company, I once had a boss with an interesting hiring philosophy. He divided technical talent into two groups: technicians and artists. If he ...
In most enterprise organizations, UX designers and content managers are separate roles filled by different people. As a person who has worked in both capacities, I'm constantly reminded of the ...
Follow these code review best practices to identify security vulnerabilities before your applications are released into production.
More often than not, technical training misses the mark. You need to better understand how we ingest information through Bloom's educational taxonomy to get the most value out of your training ...
An Alexa vulnerability, combined with improper record retention in Amazon cloud servers, could expose a consumer or business developer to hacks that target private data.
A June 2019 NIST report identified hypervisor vulnerabilities in type 1 and type 2 hypervisors. Through the use of forensic analysis, you can start to close gaps in these vulnerabilities and ...
In need of a quick fix for the Eclipse "No Java virtual machine was found" error during an Ubuntu or Windows installation? Here's how to fix the Eclipse JRE and JDK errors.
If you're in San Francisco for Oracle Code One 2019, here are 10 sessions to visit to make the most out of your conference experience and chat with TheServerSide's Cameron McKenzie.
There's a lot to digest at Oracle Code One 2019. Here's some sage advice from a conference veteran to make the most out of your experience in San Francisco.
How do you deploy a JAR file to Tomcat? Typically you deploy WAR files, not JARs. But if you need to link to a JAR file from a Java web app on Apache Tomcat, here's how to do it.
A Cisco firewall vulnerability stems from improper user input validation. Here is how to fix the problem, and other ways to stem firewall vulnerability issues in your environment.
With the HSTS header, your organization can ensure that communications are secure across your networks. Here is how to implement the header, and some parameters to set for proper security.
Hackers don't always infiltrate your production systems with sophisticated attacks. Sometimes, they view overlooked IT security best practices as the best way to gain access to your data.
Don't get caught up in all the microservices oriented architecture hype just yet. Make sure you ask some key questions, and examine potential design issues before you say yes.
The popularity of AI makes it an appealing option for some enterprises, but there's no one surefire option to implement AI culture with your staff. Follow these tips to open the door for AI in your ...
Great Java programmers are judged by their work, not their resume. How to become a good Java programmer without a degree largely depends on your own course of action and the hours you spend ...
If you've run into common JAVA_HOME errors such as JAVA_HOME not found or JAVA_HOME set to an invalid directory, we've got the fix for you with these tips.
By the year 2025, Google predicts that the number of IoT and Smart Devices in operation will exceed that of non-IoT devices. Statista also predicts a similar growth pattern, in which the ...
The Jenkins Security Advisory reported multiple security vulnerabilities in the RabbitMQ Publisher that exposed continuous integration pipelines to potential attacks through unencrypted passwords ...
Let us settle the Hibernate vs JPA debate for you. Here we explain the difference between JPA and Hibernate so that you'll never have to choose between the two database APIs.
Developers need to make a Kubernetes security hardening a priority before you dabble with Jenkins X in your environment. Don't let Kubernetes vulnerabilities expose your valuable data to possible ...
https://youtu.be/7Y67bkR977c There aren't any magical tools that will fix an OutOfMemoryError for you, but there are some options available that will help automate your ability to troubleshoot and ...
Manage a remote code execution vulnerability with careful diagnosis of the problem and different risk mitigation steps to avoid an attacker intrusion into your enterprise.
Why is programming so hard? Because it’s no longer about programming. Allow me to elaborate. I wrote my first line of professional code back in 1987. It was an application written in BASIC that did ...
Maven and Eclipse have always had a rocky relationship, and a common pain point between the two is how to force Maven JDK 1.8 support in new Eclipse projects. Without jumping through a few ...
Frustrated by Git's 'fatal: repository not found' error message? Here are five ways to fix that problem and successfully clone, fetch and pull from your repo.
Before the start of the Google I/O 2019 keynote address, I wondered what I'd learn in my role as an application developer. But when the keynote begins, I find myself thinking more like a consumer ...
Doing Java web development and need to install Tomcat? This example will show you how to download, meet prerequisites, install and test the popular Java web server.
How not to write a Git commit message I'm working on an article that outlines how to write a good Git commit message, along with a variety of Git commit message conventions and rules that ...
Do you need an example of how to use Java's UnaryOperator in a functional Lambda expression? This tutorial shows you where when and how to use the UnaryOperator interface in a function.
Interested in how to write a Java screen scraper application with HtmlUnit instead of JSoup? Here's a screen scraper example to help you get started with content aggregation.
Sometimes software development best practices are obvious. But as well-known as some of them may be, they are often overlooked. Explore these five best practices to ensure a smooth deployment.
Here’s how it usually goes when it comes to technical training in a corporate environment. A company decides to implement a new technology. The powers-that-be look around to determine if the IT ...
Enterprises that use Elasticsearch to find dynamic information in other apps are struggling to identify errant code that stalls enterprise apps. In theory, application performance monitoring tools ...
Functional supplier interface in Java tutorial There are only half a dozen classes you really need to master to become competent in the world of functional programming. The java.util.function ...
If your standby garbage collector option, Concurrent Mark Sweep, won't work on future Java releases, here are some option to consider as an alternative.
Interested in Java functional programming? The first place you need to start, especially if you use the Streams API, is with this Java Function interface example.
Developers need to learn new programming languages to stay ahead in their field and improve their skills. But, this can be a cumbersome process since people learn in different ways.
Here's a quick look at the Java var keyword and what it looks like when you use inferred types in your code.
A move up the ladder might make sense for an IT career change, but the day-to-day work difference for developers could keep those in IT away from management positions.