Coffee Talk: Java, News, Stories and Opinions
Recent Posts
-
Find the right pull request workflow for your dev projects
- Community Member 27 Nov 2019 -
What type of developer are you: A technician or an artist?
- CogArtTech 26 Nov 2019 -
UX design reviews key to every web content management strategy
- Community Member 25 Nov 2019
At the heart of all large-scale software development projects are the communications patterns required to keep everyone on the same page. The dawn of Git as a distributed version control system ...
When I used to work for a big computer manufacturing company, I once had a boss with an interesting hiring philosophy. He divided technical talent into two groups: technicians and artists. If he ...
In most enterprise organizations, UX designers and content managers are separate roles filled by different people. As a person who has worked in both capacities, I'm constantly reminded of the ...
-
How regular secure code reviews can benefit an organization
20 Nov 2019 -
Change how you present technical training for better value
- CogArtTech 08 Nov 2019 -
How to install Tomcat as your Java application server
- TechTarget 29 Oct 2019 -
Examples of Git commit message done wrong
- TechTarget 27 Oct 2019 -
What developers need to know about an Alexa vulnerability
03 Oct 2019 -
Forensic analysis helps close gaps in hypervisor vulnerabilities
01 Oct 2019 -
How to deploy a JAR file to Tomcat by example
- TechTarget 04 Sep 2019
Follow these code review best practices to identify security vulnerabilities before your applications are released into production.
More often than not, technical training misses the mark. You need to better understand how we ingest information through Bloom's educational taxonomy to get the most value out of your training ...
Doing Java web development and need to install Tomcat? This example will show you how to download, meet prerequisites, install and test the popular Java web server.
How not to write a Git commit message I'm working on an article that outlines how to write a good Git commit message, along with a variety of Git commit message conventions and rules that ...
An Alexa vulnerability, combined with improper record retention in Amazon cloud servers, could expose a consumer or business developer to hacks that target private data.
A June 2019 NIST report identified hypervisor vulnerabilities in type 1 and type 2 hypervisors. Through the use of forensic analysis, you can start to close gaps in these vulnerabilities and ...
How do you deploy a JAR file to Tomcat? Typically you deploy WAR files, not JARs. But if you need to link to a JAR file from a Java web app on Apache Tomcat, here's how to do it.
-
Input validation issues open Cisco firewall vulnerability
29 Aug 2019 -
Use the HSTS header for secure communications across networks
28 Aug 2019 -
7 IT security best practices to know to prevent data breaches
23 Aug 2019 -
3 questions to ask in a microservices oriented architecture review
- CogArtTech 06 Aug 2019 -
Tips on how to successfully bring AI culture to dev teams
- TechTarget 26 Jul 2019 -
How to become a good Java programmer without a degree
18 Jul 2019 -
What is the future of front-end software development in a post GUI world
- CogArtTech 09 Jul 2019 -
Don't let RabbitMQ vulnerabilities expose your CI pipelines
01 Jul 2019 -
Perform a Kubernetes security hardening before you use Jenkins X
25 Jun 2019 -
How to troubleshoot a JVM OutOfMemoryError problem
13 Jun 2019 -
How to deal with a remote code execution vulnerability
10 Jun 2019 -
Why is programming so hard to master?
- CogArtTech 28 May 2019 -
What I learned from the Google I/O 2019 keynote address
09 May 2019 -
Java's UnaryOperator in Lambda expressions example
- TechTarget 01 May 2019 -
Top 5 software development best practices you need to know
23 Apr 2019 -
How to learn new technology in a corporate environment
- CogArtTech 26 Mar 2019 -
How Instacart works around buggy Elasticsearch queries
18 Mar 2019 -
How to get by without Concurrent Mark Sweep
20 Feb 2019 -
Don't struggle to learn new programming languages
13 Feb 2019 -
Why developers don't stay in management for IT career change
- CogArtTech 10 Jan 2019 -
How your team will benefit when you hire a full stack developer
09 Jan 2019 -
How Atomist's Rod Johnson works with pull requests
06 Jan 2019 -
Learn Java lambda syntax quickly by example
- TechTarget 13 Dec 2018 -
What is a lambda expression in Java? Where did the term 'lambda' come from?
- TechTarget 01 Dec 2018 -
DeepCode and AI tools poised to revolutionize static code analysis
30 Nov 2018 -
Continuous integration benefits: Why adopting a CI/CD tool like Jenkins makes sense
- TechTarget 20 Nov 2018 -
Do a git reset and push to undo previous local git commits example
- TechTarget 02 Nov 2018 -
To the brave new world of reactive systems and back
01 Nov 2018 -
How to choose the right virtual reality development engine
01 Nov 2018 -
How to learn software development tools faster
01 Nov 2018 -
How developers can prepare for the evolution of virtual reality
- TechTarget 01 Nov 2018 -
Reinhold advocates adding fiber to your Java diet in Oracle Code One keynote
- TechTarget 01 Nov 2018 -
Ballerina language promises to improve app integration
01 Nov 2018 -
Lamenting the death of JavaOne at Oracle Code One 2018
- TechTarget 23 Oct 2018 -
Five Oracle Code One sessions you don't want to miss
- TechTarget 21 Oct 2018 -
How to 'git cherry-pick' from another branch example
- TechTarget 16 Oct 2018 -
Is there a place for old developers on young development teams?
- CogArtTech 02 Oct 2018 -
False 'DevOps encompasses culture and collaboration' myth destroyed
- TechTarget 02 Oct 2018 -
How diversity in the workforce leads to better IoT solutions
- Scrumtuous Inc. 01 Oct 2018 -
How big data and AI bring synergies to data science
- Scrumtuous Inc. 01 Oct 2018 -
How to prepare for virtual reality development
01 Oct 2018 -
Fix SonarQube's 'jvm.dll is missing' and 'missing server JVM' startup error
- TechTarget 21 Sep 2018 -
Fix 'could not reserve enough space for 2097152KB object heap' JFrog Artifactory startup error
- TechTarget 01 Sep 2018 -
Cloudfare puts early mobile network performance in the hands of devs
15 Aug 2018 -
Nexus repository manager tutorial: Get started with the OSS Maven tool
- TechTarget 03 Aug 2018 -
The secret history behind the success of npm and Node
19 Jul 2018 -
Get started with GoLang maps: A tutorial
17 Jul 2018 -
Embed a WebSphere Liberty profile in an executable JAR with Maven
- TechTarget 06 Jul 2018 -
Surprise results stem from curious data analytics models
01 Jul 2018 -
Jenkins interview questions and answers PDF download for experienced CI/CD engineers
- TechTarget 01 Jul 2018 -
DevOps interview questions and answers PDF for experienced job applicants
- TechTarget 01 Jul 2018 -
An introduction to Scala functional programming
25 Jun 2018 -
Aging successfully in technology: Addressing the graying elephant in the room
- CogArtTech 16 Jun 2018 -
Introduction to Scala for enterprise Java developers
15 Jun 2018 -
Google positions 'Android Things' to solve the IoT problem
11 May 2018 -
Smart Compose and the Visual Positioning System impress at Google I/O
09 May 2018 -
Borderless blockchain collaboration to change how software is developed
11 Apr 2018 -
Using Agile for hardware development to deliver products faster
- Scrumtuous Inc. 10 Apr 2018 -
Why the new Java 10 features list is so small
- TechTarget 22 Mar 2018 -
Acts of discrimination lets gender inequality in technology go unresolved
- Scrumtuous Inc. 08 Mar 2018 -
Re-introducing Jakarta EE: Eclipse takes Java EE back to its roots
27 Feb 2018 -
The things you need to know about managing cloud data
27 Feb 2018 -
Clear software development governance needed in this polyglot world
- TechTarget 21 Feb 2018 -
Top three mistakes new data scientists need to avoid
- Scrumtuous Inc. 01 Feb 2018 -
Developers, learn from the iPhone battery glitch
30 Jan 2018 -
Cybersecurity risk management doesn’t need to be all or nothing
- Scrumtuous Inc. 22 Jan 2018 -
Women in Cybersecurity: Bringing Balance to the Equation
- Scrumtuous Inc. 14 Jan 2018 -
How to bring requirements management and software integration together
05 Jan 2018 -
Is there a hidden threat embedded in the Management Engine of your Intel chip?
12 Dec 2017 -
DevOps for enterprise development a key theme at the Gartner Solutions Conference
- TechTarget 11 Dec 2017 -
Twelve ways to be a more trustworthy serverless services vendor
- Scrumtuous Inc. 22 Nov 2017 -
From monoliths to cloud native composition
- TechTarget 06 Nov 2017 -
Seven mistakes digital transformation projects must avoid
06 Nov 2017 -
Why effective DevOps needs maneuverability more than speed
03 Nov 2017 -
The right five questions to ask before purchasing CRM software
31 Oct 2017 -
Freenode ##java's interesting content podcast
26 Oct 2017 -
Digital transformation tools move AI and deep learning forward
- Scrumtuous Inc. 22 Oct 2017 -
Digital transformation spells opportunity for developers
- Features Writer 06 Oct 2017 -
Agile developers' pain points in digital transformation projects
- Features Writer 04 Oct 2017 -
Java SE 9 approaches Atari-like performance at JavaOne 2017
- TechTarget 04 Oct 2017 -
Three reasons to start digital transformation projects
- Features Writer 03 Oct 2017 -
A bug fix always beats a round of risk assessments
- TechTarget 26 Sep 2017 -
How to create secure Java software: A talk with Black Duck's Tim Mackey
- TechTarget 10 Sep 2017 -
Implementing cloud-native security means going back to your secure coding basics
- TechTarget 01 Sep 2017 -
Implementing a custom user registry to consolidate LDAP servers and active directories?
- TechTarget 14 Aug 2017 -
Gender and ethnic parity is not equivalent to workplace diversity
- TechTarget 14 Aug 2017 -
Are you going to JavaOne 2017? Book your San Francisco hotel now.
- TechTarget 08 Aug 2017 -
How women in IT influence today's workforce and tomorrow's technology
- Scrumtuous Inc. 20 Jul 2017 -
The importance of developing Virtual Reality applications
14 Jul 2017 -
DevOps development is a software developer's burden
- TechTarget 11 Jul 2017
A Cisco firewall vulnerability stems from improper user input validation. Here is how to fix the problem, and other ways to stem firewall vulnerability issues in your environment.
With the HSTS header, your organization can ensure that communications are secure across your networks. Here is how to implement the header, and some parameters to set for proper security.
Hackers don't always infiltrate your production systems with sophisticated attacks. Sometimes, they view overlooked IT security best practices as the best way to gain access to your data.
Don't get caught up in all the microservices oriented architecture hype just yet. Make sure you ask some key questions, and examine potential design issues before you say yes.
The popularity of AI makes it an appealing option for some enterprises, but there's no one surefire option to implement AI culture with your staff. Follow these tips to open the door for AI in your ...
Great Java programmers are judged by their work, not their resume. How to become a good Java programmer without a degree largely depends on your own course of action and the hours you spend ...
By the year 2025, Google predicts that the number of IoT and Smart Devices in operation will exceed that of non-IoT devices. Statista also predicts a similar growth pattern, in which the ...
The Jenkins Security Advisory reported multiple security vulnerabilities in the RabbitMQ Publisher that exposed continuous integration pipelines to potential attacks through unencrypted passwords ...
Developers need to make a Kubernetes security hardening a priority before you dabble with Jenkins X in your environment. Don't let Kubernetes vulnerabilities expose your valuable data to possible ...
https://youtu.be/7Y67bkR977c There aren't any magical tools that will fix an OutOfMemoryError for you, but there are some options available that will help automate your ability to troubleshoot and ...
Manage a remote code execution vulnerability with careful diagnosis of the problem and different risk mitigation steps to avoid an attacker intrusion into your enterprise.
Why is programming so hard? Because it’s no longer about programming. Allow me to elaborate. I wrote my first line of professional code back in 1987. It was an application written in BASIC that did ...
Before the start of the Google I/O 2019 keynote address, I wondered what I'd learn in my role as an application developer. But when the keynote begins, I find myself thinking more like a consumer ...
Do you need an example of how to use Java's UnaryOperator in a functional Lambda expression? This tutorial shows you where when and how to use the UnaryOperator interface in a function.
Sometimes software development best practices are obvious. But as well-known as some of them may be, they are often overlooked. Explore these five best practices to ensure a smooth deployment.
Here’s how it usually goes when it comes to technical training in a corporate environment. A company decides to implement a new technology. The powers-that-be look around to determine if the IT ...
Enterprises that use Elasticsearch to find dynamic information in other apps are struggling to identify errant code that stalls enterprise apps. In theory, application performance monitoring tools ...
If your standby garbage collector option, Concurrent Mark Sweep, won't work on future Java releases, here are some option to consider as an alternative.
Developers need to learn new programming languages to stay ahead in their field and improve their skills. But, this can be a cumbersome process since people learn in different ways.
A move up the ladder might make sense for an IT career change, but the day-to-day work difference for developers could keep those in IT away from management positions.
How can your company benefit from a full-stack developer? While these IT pros are difficult to find and expensive to pay, they can create a more efficient line of communication within your ...
Pull requests play an important role in any large software development project. They facilitate efficient code review, reduce bugs, track progress, and help coordinate a shared understanding of ...
Don't be intimidated by the prospect of doing functional programming in Java. This step-by-step example will help you learn basic Java lambda syntax quickly and effectively.
What is a 'lambda function' and more importantly, where did the term 'lambda expression' come from? Here we look at the basics of lambda functions in Java and computer science.
Find out how AI promises to dramatically reshape the way developers analyze code for bugs, security issues, and performance improvements.
There's more to tools like Jenkins than simply building code after a Git commit. Here we explain continuous integration benefits clearly while answering the question 'Why Jenkins?'
What happens when you git reset and push to a remote GitHub or GitLab server? Are the reset local commits published, or do previous commits simply vanish?
We explore the idea of reactive systems and learn how they are designed.
Creating virtual 3D worlds has been a dream of programmers for many decades. Virtual reality, once a faraway fiction, is becoming a reality.
Red Hat’s chief trainer explores how developers can do a better job of keeping up with new tools.
Katie Stern, GM of the Game Developers Conference weighs in on what is in store for the future of VR development.
What's new in the Java ecosystem? Well, Project Amber, Loom, Valhalla and Panama to name just a few.
The Ballerina language, promises to streamline integration development for enterprise apps.
The JavaOne conference is no more, but that doesn’t mean we can’t lament its death at the new Oracle Code One conference in San Francisco.
From Jenkins pipelines written in Groovy, to cloud native applications written using the Eclipse MicroProfile, there is plenty to be excited about at the conference that was once called JavaOne. ...
In a previous tutorial, we took a look at how to cherry-pick a commit on the current branch, but one of the ancillary questions that commonly arises is how to perform a git cherry-pick from another ...
You stay close to the code and do the work that needs to be done in the pursuit of excellence. But when are you too old for young development teams?
If evangelists keep asserting that DevOps encompasses culture and collaboration, I'm afraid I'm going to have to keep showing them how they are wrong.
The Internet of Things has a great deal of allure for consumers and businesses alike. It holds the promise of easing the tedium of mundane tasks, creating greater connection, and bringing new ...
Data science is having its day in the sun, delivering a wealth of possibilities for women in technology. Talent is in high demand, open source is democratizing access, and innovation is blossoming. ...
Katie Stern, general manager of the Game Developers Conference, weighs in on what is in store for the future of VR development.
Hitting a 'jvm.dll is missing', 'jvm.dll not found' or a 'missing server JVM' error as you try to start Java apps such as Eclipse or SonarQube? Here's the fix.
Just a quick tip on how to fix the Artifactory 'could not reserve enough space for 2097152KB object heap' startup error message.
New mobile troubleshooting tools can help correlate different mobile network issues. Fixing mobile network performance problems has never been so easy.
Looking at configuring your own local Maven repository? Here's a Nexus repository manager tutorial that will help you get started with Nexus OSS v2.
The CTO of npm, the free package manager driving JavaScript, explains the perfect storm behind the catastrophic success of JavaScript and Node.JS.
Object oriented programming has been the standard for years, but more and more use cases are demanding a functional programming approach to solving problems. In this tutorial, we will look at ...
The last step you take before deploying your Java web apps into containers is packaging them in executable JAR files. Here we show you how to take the WebSphere Liberty profile's open source ...
Sometimes it's just a hunch that kicks off a data analytics project. But surprising results often come from data analytics models put together by those who are both curious and perceptive.
Looking for a Jenkins interview questions and answers PDF for experienced continuous integration professionals? Here's our previous Jenkins CI intereview questions article in PDF format.
Looking for a DevOps interview questions and answers PDF for experienced job applicants? Here's a downloadable PDF of our original DevOps interview questions article.
Object-oriented programming has been the standard for years, but more and more use cases are demanding a functional programming approach to solving problems. In this tutorial, we will look at Scala ...
Is software development a game for the young? Despite maintaining a passion for programming and software development, seasoned veterans in their 40s and 50s are finding age is the new barrier to ...
This introduction to Scala programming will introduce you to a new way to program one the JVM. Scala rides atop the Java virtual machine. In compiles into Java bytecode. It can be packaged in Jar ...
Google's Android Things development Iokit turned v1.0 on Monday. I celebrated the birthday of the new tool that hopes to address IoT problems in development by belatedly attending a "What's New in ...
This year's Google I/O conference kicked off on May 8 with a nearly two-hour keynote. The keynote was held at the outdoor Shoreline Amphitheater near Google's headquarters in Mountain View, ...
A new borderless, blockchain collaboration talent pool could be the revolutionary force that resets the ground for both gaming industry players and developers.
The Agile methodology has proven itself effective in the world of software development, but can Agile for hardware development transform the manner in which products can be manufactured and ...
Was it just me, or did the Java 10 release just creep up on everyone? Given, a March release for Java 10 was planned a long time ago, but given Oracle's spotty history in terms of pushing out ...
While great efforts have been made to encourage both men and women to enter into STEM related fields, ongoing acts of discrimination against women makes gender inequality in technology a problem ...
The Eclipse Foundation has decided on Jakarta EE as the new name for Java EE as the organization moves to advance enterprise Java under the aegis of Eclipse.
Many organizations moved into the cloud with more enthusiasm than forethought. Which is why it is more important than ever for organizations to rethink how they manage and secure cloud data.
New architectures composed out of language agnostic software containers have made polyglot programming a new reality. But out of this newfound freedom chaos can ensue if clear software development ...
Data science as a discipline has a brief history but a bright future. The label for this particular field of specialization has caught on in the past ten years after being popularized by ...
Apple is undeserving of the backlash they have suffered. The battery update is a good feature that will extend a phone's life. It's not planned obselecense.
Cybersecurity risk management should be a concern for organizations of all sizes, with fresh threats and data breaches making the news every few days.
The world of technology is exciting. And confusing. And dangerous. And full of potential. For women, privacy and security are concepts that go hand in hand. Today’s technology has created new ways ...
The article demonstrates that the requirements management, software integration and value stream networds are not only complementary, but essential in keeping all stakeholders involved in product deve
The Management Engine, embedded on certain Intel chips, is a hidden threat to the security of personal and corporate computers. People need to take this hidden threat seriously.
Walking the exhibition floor at the 2017 Gartner Strategies and Solutions Summit, is was hard to ignore the number of top DevOps vendors innovating and competing. DevOps for enterprise development ...
Serverless services may be the big trend in IT these days, but it's still a service-full world out there, and virtually every organization is relying on third party services to keep their ...
In our series on cloud native computing, TheServerSide spoke with a number of experts in the field, including a number of members of the Cloud Native Computing Foundation. The following is the ...
Every organization managing big data, employing IoT devices or pulling from a disparate set of information streams is looking at ways to put all of the data they have gleamed from their various ...
Find out why Michael Nygard, author of Release:It! thinks that when it comes to effective DevOps, a focus on faster release cycles is really solving the wrong problem.
CRM software is a competitive field, so you need to know the right questions to ask before making a purchase.
The ##java channel on Freenode IRC has been collecting interesting content for years, including content from here on TSS on occasion. Now, it's being collected into a weekly podcast.
While today’s Agile transformation tools have expanded the possibilities presented by analytics, social, IoT, and mobile, there’s also an underlying factor that can’t be ignored. Businesses can ...
Take a seat at the digital transformation project table, developers. It's your time to shine.
A consultant explains how developers must adjust to succeed in digital transformation projects.
As things get better, they often get slower, making better things worse. Far too often, that’s how things work in the tech sector, which is why I’m glad to see the architects of Java SE 9 bucking ...
What's driving businesses to start digital transformation projects? Tata Consultancy experts explain the human and technology forces in play.
When static code analysis tools identify a bug in the production code, there are two approaches organizations can take. The sensible one is to put a software developer or two on the problem and ...
In TheServerSide's ongoing coverage of developing secure Java software, I spoke recently with Tim Mackey, the IT evangelist for Black Duck Software. The conversation was interesting enough to pull ...
There's really nothing new under the sun when it comes to addressing security vulnerabilities in code. While there has been a great shift in terms of how server side application are architected, ...
Should you implement a custom user registry to help mitigate access to your various LDAP servers in order to simplify security tasks such as authentication and group association? The answer to that ...
Former Google employee James Damore's recently leaked memo about his old employer's employment activities has brought the discussion about IT hiring practices to the fore. After reading a vast ...
It's likely not advice a veteran of JavaOne conferences needs to hear, but if you've got your ticket for JavaOne 2017, and you're attending this OracleWorld affiliated event for the first time, I'm ...
What would the tech world look like without leaders, visionaries, and entrepreneurs like Satya Nadella, John Ive, or Elon Musk? What about the contributions of the other seven men who complete the ...
Find out why the director of design at Singularity University Labs believes virtual reality (VR) and augmented reality (AR) are important new interfaces that developers need to start building for ...
The committed use of a continuous delivery pipeline inevitably puts a far greater onus on the software developer than systems that used more traditional methods of moving code into product. A ...