Coffee Talk: Java, News, Stories and Opinions
Recent Posts
-
A Jenkins YAML pipeline example
- TechTarget 28 Dec 2020 -
How to run Jenkins on AWS by example
- TechTarget 23 Dec 2020 -
How to implement a remote Jenkins build trigger with a URL
- TechTarget 22 Dec 2020
YAML has joined the ranks of declarative and scripted pipelines in Jenkins. Here's an example of what the syntax for a Jenkins YAML pipeline looks like.
Need to run Jenkins on AWS? It's not a bad idea, especially when developers consider the need for a CI/CD server to integrate with peripheral resources. This quick example shows you the easiest way ...
This quick example will demonstrate how to implement a remote Jenkins build trigger. With the remote Jenkins build URL, a developer can call jobs from scripts, the CURL command and even Java code.
-
An example hibernate.cfg.xml for MySQL 8 and Hibernate 5
- TechTarget 08 Dec 2020 -
Jenkins GitHub Webhook build trigger by example
- TechTarget 03 Dec 2020 -
10 best GitHub Actions examples
- TechTarget 30 Nov 2020 -
Fix Java memory leaks without costly JVM heap dumps by example
- TechTarget 14 Nov 2020 -
'403: No valid crumb' Jenkins GitHub webhook error fix
- TechTarget 04 Nov 2020 -
Use Jenkins' Warning plugin for CheckStlye, PMD and FindBugs reports example
- TechTarget 02 Nov 2020 -
How to use Jenkins with Ant to build your Java apps
- TechTarget 01 Nov 2020
Hibernate 5 has updated dialects for various databases, and MySQL 8 has a special one of its own. Here's an example hibernate.cfg.xml for MySQL 8 for Hibernate 5 apps or newer.
Running into difficulty with GitHub Webhooks and Jenkins builds? This Jenkins and GitHub webhook integration example shows how to trigger remote builds without the 403 no valid crumb in request ...
Here are the 10 best GitHub Actions examples for developers and DevOps admins that want to learn and master continuous integration and deployment.
You can fix your Java memory leak problem without a costly JVM heap dump. Just use Java Flight Recorder's Old Object Sample event and view the recording in JDK Mission Control.
Here's a quick fix to the "403 no crumb was included in the request" error you often see when a Jenkins GitHub webhook is configured incorrectly.
The Jenkins Warnings plugin replaces the deprecated CheckStyle, FindBugs and PMD ones. This static code analysis in Jenkins example shows you how to integrate Jenkins, CheckStyle, FindBugs and PMD ...
Here's a simple example of how to build your Java apps in Jenkins with Ant. We demonstrate both the Jenkins Ant plugin and the Jenkins pipeline approach with a Jenkinsfile as well.
-
How and when to perform a git clone depth 1 example
- TechTarget 30 Oct 2020 -
How to use the git log graph and tree command
- TechTarget 29 Oct 2020 -
How to create a GitHub repository example
- TechTarget 30 Sep 2020 -
Eight Git commands every GitLab developer must know
- TechTarget 29 Sep 2020 -
How to delete a GitHub repository example
- TechTarget 28 Sep 2020 -
AI, RPA offerings still stymied by security, governance concerns
21 Sep 2020 -
Use the Struts jQuery plugin to simplify Ajax request cycles example
- TechTarget 13 Sep 2020 -
How to perform a GitLab delete remote branch operation on any repository
- TechTarget 13 Sep 2020 -
Use .gitkeep to commit & push an empty Git folder or directory
- TechTarget 13 Sep 2020 -
Create your first RPA robot in UiPath Orchestrator
- TechTarget 13 Sep 2020 -
How to set Notepad++ as the Git editor instead of Vim
- TechTarget 03 Sep 2020 -
How GitLab developers can merge any branch into master
- TechTarget 31 Aug 2020 -
How to merge master into any branch in GitLab by examples
- TechTarget 21 Aug 2020 -
Why developers won't be able to find the gitconfig file
- TechTarget 13 Aug 2020 -
Fix "There isn't an Orchestrator present" error with the right UiPath Orchestrator URL
- TechTarget 05 Aug 2020 -
How TUF can secure software systems from update vulnerabilities
01 Aug 2020 -
How to create and delete GitLab projects
- TechTarget 30 Jul 2020 -
The right MySQL persistence.xml example file for JPA 2.2 and Hibernate 5
- TechTarget 28 Jul 2020 -
How AI can help with requirements analysis tools
28 Jul 2020 -
How to edit the Ubuntu hosts file and ping a domain name locally
- TechTarget 28 Jul 2020 -
Use git worktree add and never switch branches again
- TechTarget 15 Jul 2020 -
A Bitnami WordPress stack installation and examination
- TechTarget 30 Jun 2020 -
Why the pull request process could work beyond development
- CogArtTech 05 Jun 2020 -
How to Git rebase master onto any branch by example
- TechTarget 01 Jun 2020 -
How to Git rebase a branch to master by example
- TechTarget 01 Jun 2020 -
How to create a UiPath trigger to schedule robotic processes automation
- TechTarget 01 Jun 2020 -
How to git shelve changes and save local files
- TechTarget 30 May 2020 -
A version 5 Hibernate SchemaExport example with the ServiceRegistry and Metadata
- TechTarget 27 May 2020 -
How to create brand identity at the command line
- CogArtTech 22 May 2020 -
Always move and rename Git files in isolated commits
- TechTarget 18 May 2020 -
How to fix the 'HttpServlet not found' error in Eclipse
- TechTarget 30 Apr 2020 -
Consider these developer volunteer opportunities during COVID-19
23 Apr 2020 -
Kubernetes 1.18 adds more power, addresses shortcomings
- CogArtTech 21 Apr 2020 -
Kubernetes adoption continues to rise, according to CNCF Survey 2019
- CogArtTech 20 Apr 2020 -
How to plot your Java developer career path
- TechTarget 15 Apr 2020 -
Quickly fix the MySQL MyISAM type SQLSyntaxErrorException for Hibernate
- TechTarget 01 Apr 2020 -
How to go beyond Docker with WebAssembly on the server-side
- CogArtTech 30 Mar 2020 -
5 tips to improve remote work productivity
- CogArtTech 30 Mar 2020 -
Top Java frameworks for web app development
- TechTarget 26 Feb 2020 -
How to refactor a Java portlet application for a cloud-native future
- TechTarget 25 Feb 2020 -
Top 3 website performance issues and how to fix them
- TechTarget 21 Feb 2020 -
Why I consider the Lenovo T430 the best laptop value around
- TechTarget 06 Feb 2020 -
How a software development team can handle management battles
- CogArtTech 31 Jan 2020 -
Make this the year of your programming side hustle
- TechTarget 08 Jan 2020 -
5 technology predictions for 2020
- CogArtTech 07 Jan 2020 -
Top 5 functional Java interfaces
- TechTarget 23 Dec 2019 -
Why a TrackPoint keyboard is a great gift idea for ThinkPad lovers
- TechTarget 17 Dec 2019 -
5 simple steps you can take to prevent a data breach
13 Dec 2019 -
Find the right pull request workflow for your dev projects
27 Nov 2019 -
What type of developer are you: A technician or an artist?
- CogArtTech 26 Nov 2019 -
UX design reviews key to every web content management strategy
25 Nov 2019 -
How regular secure code reviews can benefit an organization
20 Nov 2019 -
Change how you present technical training for better value
- CogArtTech 08 Nov 2019 -
How to install Tomcat as your Java application server
- TechTarget 29 Oct 2019 -
Examples of Git commit message done wrong
- TechTarget 27 Oct 2019 -
What developers need to know about an Alexa vulnerability
03 Oct 2019 -
Forensic analysis helps close gaps in hypervisor vulnerabilities
01 Oct 2019 -
How to deploy a JAR file to Tomcat by example
- TechTarget 04 Sep 2019 -
Input validation issues open Cisco firewall vulnerability
29 Aug 2019 -
Use the HSTS header for secure communications across networks
28 Aug 2019 -
7 IT security best practices to know to prevent data breaches
23 Aug 2019 -
3 questions to ask in a microservices oriented architecture review
- CogArtTech 06 Aug 2019 -
Tips on how to successfully bring AI culture to dev teams
- TechTarget 26 Jul 2019 -
How to become a good Java programmer without a degree
18 Jul 2019 -
What is the future of front-end software development in a post GUI world
- CogArtTech 09 Jul 2019 -
Don't let RabbitMQ vulnerabilities expose your CI pipelines
01 Jul 2019 -
Perform a Kubernetes security hardening before you use Jenkins X
25 Jun 2019 -
How to troubleshoot a JVM OutOfMemoryError problem
13 Jun 2019 -
How to deal with a remote code execution vulnerability
10 Jun 2019 -
Why is programming so hard to master?
- CogArtTech 28 May 2019 -
What I learned from the Google I/O 2019 keynote address
09 May 2019 -
Java's UnaryOperator in Lambda expressions example
- TechTarget 01 May 2019 -
Top 5 software development best practices you need to know
23 Apr 2019 -
How to learn new technology in a corporate environment
- CogArtTech 26 Mar 2019 -
How Instacart works around buggy Elasticsearch queries
18 Mar 2019 -
How to get by without Concurrent Mark Sweep
20 Feb 2019 -
Don't struggle to learn new programming languages
13 Feb 2019 -
Why developers don't stay in management for IT career change
- CogArtTech 10 Jan 2019 -
How your team will benefit when you hire a full stack developer
09 Jan 2019 -
How Atomist's Rod Johnson works with pull requests
06 Jan 2019 -
Learn Java lambda syntax quickly by example
- TechTarget 13 Dec 2018 -
What is a lambda expression in Java? Where did the term 'lambda' come from?
- TechTarget 01 Dec 2018 -
DeepCode and AI tools poised to revolutionize static code analysis
30 Nov 2018 -
Continuous integration benefits: Why adopting a CI/CD tool like Jenkins makes sense
- TechTarget 20 Nov 2018 -
Do a git reset and push to undo previous local git commits example
- TechTarget 02 Nov 2018 -
To the brave new world of reactive systems and back
01 Nov 2018 -
How to choose the right virtual reality development engine
01 Nov 2018 -
How to learn software development tools faster
01 Nov 2018 -
How developers can prepare for the evolution of virtual reality
- TechTarget 01 Nov 2018 -
Reinhold advocates adding fiber to your Java diet in Oracle Code One keynote
- TechTarget 01 Nov 2018
In this git clone depth 1 example, we'll walk you through the process of pulling only one commit and one branch back from a remote Git repository.
In this git log graph example we demonstrate not only how the git log graph works, but also how to use a pretty switch to make it more readable.
This step-by-step, tutorial will walk developers through the necessary steps to create a GitHub repository and how to create the cloud-hosted Git repo that acts as the cornerstone for all ...
Every developer needs to know a few basic Git commands to become proficient with GitLab. Here are the top eight Git commands every developer must know to be on their way to GitLab mastery.
If you're ready to fly into the Danger Zone, then you're ready to follow these steps to delete a GitHub repository.
Security, compliance and governance concerns along with human worries still play a role in the integration of AI-based and RPA offerings to an enterprise. Here are some ways to alleviate those ...
The Struts 2 Ajax template is deprecated, but the Strut jQuery plugin is a more than capable replacement. In this Struts jQuery tutorial we show you how to integrate Ajax calls into your modern ...
It's not exactly a straightforward process for developers to have GitLab delete remote branches. In this GitLab tutorial, we'll show you how to remove remote GitLab branches with examples.
What is the .gitkeep file? How do you commit and push empty Git folders? In this quick tutorial we'll explain why git is not pushing empty folders and how to fix it.
After your RPA program is coded, you will need to create a robot in UiPath Orcestrator so the robotic automation can me managed. This UiPath robot creation tutorial shows you how to do exactly that.
Frustrated every time you forget to add a Git commit message and Vim, the default Git editor pops up? Here's a way to make issuing git commits a bit friendlier. In this Git tutorial, we show you ...
In this GitLab merge branch to master example, we explain why a GitLab merge into master is different from other operations, and how to accomplish this task with a GitLab master merge request.
There are two ways a developer can have GitLab merge master into a branch. One is to merge master into the branch on the client while the other is to perform a GitLab pull request. Here are some ...
Can't find the .gitconfig or gitconfig files on your system? It's possible that Git didn't create them. Here's how to find gitconfig on the filesystem and create the if it's not there.
Is the UiPath Assistant complaining that the UiPath Orchestrator URL is wrong? Here's how to fix the UiPath Orchestrator present at the indicated URL error.
An emerging specification from CNCF looks to secure software systems thanks to the open source community and a focus on update vulnerabilities that limit the effects of a potential attack.
To get started with GitLab, you first need to create a GitLab project. And when you're finished, you might also want to delete a GitLab project. Here we show you how to both create and remove ...
Old JDBC drivers and new MySQL 8 databases don't mesh. Here's an updated MySQL persistence.xml example file for those doing JPA and Hibernate development.
Functional requirements and user stories create the blueprint for software applications. A good set of requirements can simplify developer's work when they translate business ideas into working ...
Here's a quick video example of how to do an Ubuntu hosts file edit. This is useful for development and testing when a developer wants to mimic a production domain name locally.
Git Worktree Add Example I was today years old when I learned you could have multiple git working trees active at the same time. The idea is simple. Imagine you have multiple branches and want to ...
Sometimes it's fun to see how components in open source projects are architected together. I installed a Bitnami WordPress stack onto my laptop Here I to see how the popular blogging platform works.
The pull request process focuses on merit-based changed and an impartial review process to create improvements. It works well with open source software development. How would it fare in other areas ...
If you think you need to git rebase master to a branch like develop or release, this tutorial will guide your way, while also letting you know of potential dangers.
This Git rebase a branch to master example will show you how to clean up your commit history and sync with the latest master commit.
How do you schedule UiPath trigger? Time based and queue based are the two ways to run uattended UiPath robots. In UiPath time trigger example we demonstrate the former.
How can a developer unshelve and shelve git changes? Or how about a git shelve equivalent like what IntelliJ has? Let's set the record straight on the git shelve and stash debate.
The manner in which you create a version 5 Hibernate SchemaExport object is markedly different than earlier versions of the framework. But it's not overwhelmingly difficult. Here's how you do it. ...
How can an organization utilize the command line to create brand identity? Software developers spend hours working in the command line. Take advantage of these eyeballs and create a tool that's ...
Will there be a need to move or rename a Git file while you refactor your code? If so, don't mix code changes with file changes. Move and rename Git files in a separate commit.
Have you run into the HttpServlet not found error? This tutorial will show you how to quickly fix this annoying Eclipse error message in three easy steps.
As COVID-19 continues to affect the planet, there's an abundance of developer volunteer opportunities that can help health professionals and everyday people get through the global pandemic.
Kubernetes is no doubt a powerful technology, but it has its shortcomings. For example, debugging under Kubernetes has always been a challenge. When it started out, Kubernetes was intended to run ...
Kubernetes is a game-changing technology in the world of container orchestration. Its adoption has seen a meteoric rise in production use since its release in 2014. A 2019 survey conducted by the ...
Are you a software developer with a bit of downtime on your hands? Here are three easy ways to keep busy while nurturing your Java developer career path.
https://youtu.be/d0AJKtPgx3M There's nothing worse for a developer than an SQLException in Hibernate and JPA. And there's nothing more annoying than when the SQLException happens before any of the ...
Docker changed the way services and applications are designed, implemented and deployed. Before Docker, applications and services had to work cooperatively on the same machine. Sometimes they did, ...
As more people work from home as a result of COVID-19, employees used to the onsite work life will need to adapt to the remote work lifestyle. At first, it can seem like a welcome change but after ...
Client-side JavaScript frameworks are all the rage, but they aren't always the right answer if you want to deliver a web-based experience for your browser-based clients. If you want to distance ...
While the past may have been all about the development of Java portlet applications, the future is cloud-native. Here is how to bridge the two together.
It's amazing how even in 2020, you can visit an established organization's homepage, only to encounter serious website performance issues that could easily be fixed if the developers and designers ...
Looking for an affordable used laptop? Check out the Lenovo T430. It's the best used laptop value around.
Here’s how it usually goes. A project manager or product owner relays word from someone higher up the corporate food chain that a piece of software needs to be delivered by a given date. The reason ...
Don't keep your programming side hustle on the backburner anymore. Find the time to put some work into your passion project and reinvigorate your programming creativity when you're not on the job.
As the old saying goes, "the more things change, the more they stay the same." I find this saying to be particularly true when it comes to technology. Even though it's become more complex, the ...
Many developers get intimidated when they look at all the new APIs that accept lambda expressions as arguments, and wonder how they'll ever figure out which Java function to use and what the proper ...
Lenovo ThinkPads are one of the most commonly used laptops for enterprise software developers. They are well made, have a reputation for being durable and capable of taking a good deal of abuse, ...
Stick to best practices when it comes to security. Follow these five simple steps to guard against the most basic cyberattacks.
At the heart of all large-scale software development projects are the communications patterns required to keep everyone on the same page. The dawn of Git as a distributed version control system ...
When I used to work for a big computer manufacturing company, I once had a boss with an interesting hiring philosophy. He divided technical talent into two groups: technicians and artists. If he ...
In most enterprise organizations, UX designers and content managers are separate roles filled by different people. As a person who has worked in both capacities, I'm constantly reminded of the ...
Follow these code review best practices to identify security vulnerabilities before your applications are released into production.
More often than not, technical training misses the mark. You need to better understand how we ingest information through Bloom's educational taxonomy to get the most value out of your training ...
Doing Java web development and need to install Tomcat? This example will show you how to download, meet prerequisites, install and test the popular Java web server.
How not to write a Git commit message I'm working on an article that outlines how to write a good Git commit message, along with a variety of Git commit message conventions and rules that ...
An Alexa vulnerability, combined with improper record retention in Amazon cloud servers, could expose a consumer or business developer to hacks that target private data.
A June 2019 NIST report identified hypervisor vulnerabilities in type 1 and type 2 hypervisors. Through the use of forensic analysis, you can start to close gaps in these vulnerabilities and ...
How do you deploy a JAR file to Tomcat? Typically you deploy WAR files, not JARs. But if you need to link to a JAR file from a Java web app on Apache Tomcat, here's how to do it.
A Cisco firewall vulnerability stems from improper user input validation. Here is how to fix the problem, and other ways to stem firewall vulnerability issues in your environment.
With the HSTS header, your organization can ensure that communications are secure across your networks. Here is how to implement the header, and some parameters to set for proper security.
Hackers don't always infiltrate your production systems with sophisticated attacks. Sometimes, they view overlooked IT security best practices as the best way to gain access to your data.
Don't get caught up in all the microservices oriented architecture hype just yet. Make sure you ask some key questions, and examine potential design issues before you say yes.
The popularity of AI makes it an appealing option for some enterprises, but there's no one surefire option to implement AI culture with your staff. Follow these tips to open the door for AI in your ...
Great Java programmers are judged by their work, not their resume. How to become a good Java programmer without a degree largely depends on your own course of action and the hours you spend ...
By the year 2025, Google predicts that the number of IoT and Smart Devices in operation will exceed that of non-IoT devices. Statista also predicts a similar growth pattern, in which the ...
The Jenkins Security Advisory reported multiple security vulnerabilities in the RabbitMQ Publisher that exposed continuous integration pipelines to potential attacks through unencrypted passwords ...
Developers need to make a Kubernetes security hardening a priority before you dabble with Jenkins X in your environment. Don't let Kubernetes vulnerabilities expose your valuable data to possible ...
https://youtu.be/7Y67bkR977c There aren't any magical tools that will fix an OutOfMemoryError for you, but there are some options available that will help automate your ability to troubleshoot and ...
Manage a remote code execution vulnerability with careful diagnosis of the problem and different risk mitigation steps to avoid an attacker intrusion into your enterprise.
Why is programming so hard? Because it’s no longer about programming. Allow me to elaborate. I wrote my first line of professional code back in 1987. It was an application written in BASIC that did ...
Before the start of the Google I/O 2019 keynote address, I wondered what I'd learn in my role as an application developer. But when the keynote begins, I find myself thinking more like a consumer ...
Do you need an example of how to use Java's UnaryOperator in a functional Lambda expression? This tutorial shows you where when and how to use the UnaryOperator interface in a function.
Sometimes software development best practices are obvious. But as well-known as some of them may be, they are often overlooked. Explore these five best practices to ensure a smooth deployment.
Here’s how it usually goes when it comes to technical training in a corporate environment. A company decides to implement a new technology. The powers-that-be look around to determine if the IT ...
Enterprises that use Elasticsearch to find dynamic information in other apps are struggling to identify errant code that stalls enterprise apps. In theory, application performance monitoring tools ...
If your standby garbage collector option, Concurrent Mark Sweep, won't work on future Java releases, here are some option to consider as an alternative.
Developers need to learn new programming languages to stay ahead in their field and improve their skills. But, this can be a cumbersome process since people learn in different ways.
A move up the ladder might make sense for an IT career change, but the day-to-day work difference for developers could keep those in IT away from management positions.
How can your company benefit from a full-stack developer? While these IT pros are difficult to find and expensive to pay, they can create a more efficient line of communication within your ...
Pull requests play an important role in any large software development project. They facilitate efficient code review, reduce bugs, track progress, and help coordinate a shared understanding of ...
Don't be intimidated by the prospect of doing functional programming in Java. This step-by-step example will help you learn basic Java lambda syntax quickly and effectively.
What is a 'lambda function' and more importantly, where did the term 'lambda expression' come from? Here we look at the basics of lambda functions in Java and computer science.
Find out how AI promises to dramatically reshape the way developers analyze code for bugs, security issues, and performance improvements.
There's more to tools like Jenkins than simply building code after a Git commit. Here we explain continuous integration benefits clearly while answering the question 'Why Jenkins?'
What happens when you git reset and push to a remote GitHub or GitLab server? Are the reset local commits published, or do previous commits simply vanish?
We explore the idea of reactive systems and learn how they are designed.
Creating virtual 3D worlds has been a dream of programmers for many decades. Virtual reality, once a faraway fiction, is becoming a reality.
Red Hat’s chief trainer explores how developers can do a better job of keeping up with new tools.
Katie Stern, GM of the Game Developers Conference weighs in on what is in store for the future of VR development.
What's new in the Java ecosystem? Well, Project Amber, Loom, Valhalla and Panama to name just a few.