-
Core Java
Choosing Java Cryptographic Algorithms Part 3 – Public/Private key asymmetric encryption
Abstract This is the 3rd of a three-part blog series covering Java cryptographic algorithms. The series covers how to implement…
Read More » -
Core Java
Choosing Java Cryptographic Algorithms Part 2 – Single key symmetric encryption
Abstract This is the 2nd of a three-part blog series covering Java cryptographic algorithms. The series covers how to implement…
Read More » -
Software Development
The Formula for Software Quality
How do you define the quality of a software product? There is definitely an intrinsic emotional component to it, which…
Read More » -
Core Java
Switch Expressions Coming to Java?
A JEP draft has been created with the title, “Switch Expressions for the Java Language.” The current “Summary” states, “Extend…
Read More » -
Core Java
A Log Message is Executable Code and Comment
Although there are differences of opinion regarding how many comments one should add to one’s code, I think it’s safe…
Read More » -
Software Development
Microservices implementation example with Spring Boot
1. Introduction We have already been through the Microservice demo and it was so pleasing to see the wonderful response…
Read More » -
Enterprise Java
Apache Pulsar: Distributed Pub-Sub Messaging System
Apache Pulsar is an open-source distributed pub-sub messaging system originally created at Yahoo and part of the Apache Software Foundation. Pulsar…
Read More » -
Enterprise Java
OWASP Dependency Check Maven Plugin – a Must-Have
I have to admit with a high degree of shame that I didn’t know about the OWASP dependency check maven…
Read More »