In this post, we learn how to handle exceptions using three basic patterns: translate, retry, and recover.
A Tribute to Java – DZone Java
The areas that Java captured and revolutionized are being transformed. Let’s talk more about the history of Java and its cross-platform features.
Java Weekly, Issue 266 | Baeldung
A lightweight approach to CDI bean testing with Weld, plus a look at four quality gates you can use to evaluate whether your release is production-ready.
RxJava vs Reactor
Summary: Stick to whichever library you already have on your CLASSPATH. If you get a choice, Reactor is preferable, RxJava 2.x is …
How to reference the result of reduce() operation in Java 8?
I was trying to write a mkString function in Java8, a la Scala’s useful mkString and ran into 2 issues that I could use some help on:I am unable to make the first argument of mkString a generic
3 Books to learn Java Programming from Scratch in 2019 – Best of Lot Must Read
I receive half a dozen emails every day asking about which is the best to learn Java from scratch? Which book should I read in 2019 to lear…
Mastering Threads (Early 2019 Edition)
Mastering Threads (Early 2019 Edition) Enroll in Course for $349 off original price! The coupon code you entered is expired or ….
NightHacking @nighthacking
Serverless Java Challenges and Trumphs with @shaunmsmith
10 Books Java Developers Should Read in 2019 – Best Of Lot
Hello guys, If you are Java developer and wondering what to read in 2019 then you have come to the right place. In this article, I am going…
How do I list, map and “print if count>0” with Java 8 / stream API?
Teams Q&A for work Learn More Here’s my code as per now. List
How to Deploy Maven Artifacts to CloudRepo via Rultor
In my previous article, I described how to set up a private Maven repository in Amazon S3 and deplo…
Why it’s still worth it to learn Java
Java may be relatively old, but the programming language mainstay can still give developers a leg up on the competition for enterprise jobs.
How a single request can kill your enterprise
As developers we always try to create bug free and secure applications. Sometimes the most critical issues are not part of our code but of its dependencies. This post shows how security issues in dependencies can be used to create horrible attack scenarios of your systems. I will show one exploit in a simply Java based server application that can be used to do mostly everything with your whole system.
Amazon.com: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more
Online shopping from the earth’s biggest selection of books, magazines, music, DVDs, videos, electronics, computers, software, apparel & accessories, shoes, jewelry, tools & hardware, housewares, furniture, sporting goods, beauty & personal care, broadband & dsl, gourmet food & just about anything else.