All Resources

Showing the most recent resources. The latest one is from 2019-08-15.
  • Learn about securing reactive REST endpoints with spring Webflux security. We will implement token-based authentication and authorization using JWT provider.
    Article  Added by only2dhir // www.devglan.com // about 1 month ago
  • In this tutorial, we will learn how to upload images or files from a React Js app with Spring MVC Rest. We will have a React app with and without Axios integrated with it to push selected files in the browser to the server via REST.
    Article  Added by only2dhir // www.devglan.com // about 1 month ago
  • In this article you can learn preface to java virtual machine and architecture with detailed explanation.
    Article  Added by EdwardWilson // www.flowerbrackets.com // about 2 months ago
  • System.gc() is an API provided in java, Android, C# and other popular languages. When invoked it will make its best effort to clear accumulated unreferenced object (i.e. garbage) from memory.
    Tutorial  Added by suryababy // blog.heaphero.io // about 2 months ago
  • This article is all about Base64 Encoding, you'll learn how to encode Base64 string , Use free online tool to Encode Base64 Data.
    Article  Added by onlineutility9 // www.onlineutility.in // about 2 months ago
  • This article is all about Base64 Decoding, you'll learn how to decode Base64 string , Use free online tool to Decode Base64 Data.
    Article  Added by onlineutility9 // www.onlineutility.in // about 2 months ago
  • Update  Added by iskimos // bell-sw.com // 2 months ago
  • A book that teaches you everything you need to create end-to-end analytics pipelines in Spark.
    Book  Added by vonlatinski // mng.bz // 2 months ago
  • RSA(Rivest-Shamir-Adleman) is an Asymmetric encryption technique that uses two different keys as public and private keys to perform the encryption and decryption. With RSA, you can encrypt sensitive information with a public key and a matching private key is used to decrypt the encrypted message. Asymmetric encryption is mostly used when there are 2 different endpoints are involved such as VPN client and server, SSH, etc.

    Below is the tool for encryption and decryption.
    Tool  Added by only2dhir // www.devglan.com // 2 months ago
  • In this article, we will develop a full stack app using Spring Boot and Angular 8 which performs different CRUD operations on a User entity. We will have spring data integrated at the DAO layer that performs different DB operations. We will be using MySQL database to save the user details. The REST APIs will have a token-based authentication integrated with Spring Security.
    Tutorial  Added by only2dhir // www.devglan.com // 2 months ago
  • Which language should be used? Here we discuss about two languages that are commonly compared against each other. — Python and Java. According to the report, Java and Python are the top three programming languages this year.
    Article  Added by konstant // www.konstantinfo.com // 3 months ago
  • In this tutorial, we will be discussing the integration of Redis cache with Spring Boot by developing a CRUD operation example using Jedis and spring boot starter data redis.
    Article  Added by only2dhir // www.devglan.com // 3 months ago
  • In this tutorial, we will learn about creating web service clients with Feign in a spring cloud application with an example for REST based HTTP calls. We will be developing 2 different microservices as customer-service and product-service. These 2 different services will register themselves to Netflix discovery server and will have Feign client integrated with customer-service.
    Tutorial  Added by only2dhir // www.devglan.com // 3 months ago
  • Kotlin or Scala? Scala or Kotlin? The two contenders for the crown of the JVM Kingdoms and the title of “Better Java” each bring something unique to the fight. But which should be the next ruler of your code?
    Article  Added by techslut // blog.codota.com // 3 months ago
  • In this article, you'll learn how to convert a character to an ASCII code and vice versa in Java. The conversion from ASCII code to character and character to ASCII code is done using type casting.
    Tutorial  Added by callicoder // www.asciitable.xyz // 4 months ago
  • We analyzed 300 vacancies for Java devs to define the skills most in-demand. Here is what the analysis showed.
    Article  Added by heatherale // cvcompiler.com // 4 months ago
  • Spring Cloud Gateway - A Reactive Gateway built upon Project Reactor, Spring WebFlux, and Spring Boot 2.0.
    Article  Added by only2dhir // www.devglan.com // 4 months ago
  • This book is focused on practical implementations of quantum computing algorithms, using Strange, a Java-based quantum computer simulator.
    Book  Added by vonlatinski // mng.bz // 4 months ago
  • This free eBook starts by taking you through contract tests that verify your entire system. You’ll discover how Docker helps with your testing and find out how to test your system even when there are components that have yet to be built.
    Book  Added by vonlatinski // mng.bz // 4 months ago
  • A book that teaches you how to implement unit and integration tests for microservice systems running on the JVM.
    Book  Added by vonlatinski // mng.bz // 4 months ago
  • Java TreeMap is one of the implementation class of Map interface in Java. Java TreeMap class is an implementation based on red-black tree.
    Article  Added by TechBlogStation // techblogstation.com // 4 months ago
  • Java BigDecimal class is used when developer is working around financial data. The Java BigDecimal class provides several operations on double numbers.
    Article  Added by TechBlogStation // techblogstation.com // 4 months ago
  • There are more than 2,500 programming languages in existence today. Where do all these languages come from? Learn more about the third generation.
    Article  Added by AnneLaure13 // www.welcometothejungle.co // 5 months ago
  • A book that shows how to run your own fully modular applications with best practices and expert techniques. It also explores Java 9's compatibility challenges and how to migrate your application to the module system.
    Book  Added by vonlatinski // mng.bz // 5 months ago
  • An introduction to writing programs in the Java language, starting from the most basic building blocks.
    Book  Added by vonlatinski // mng.bz // 5 months ago
  • A book of exercises, examples and projects that shows how to build applications in Clojure.
    Book  Added by vonlatinski // mng.bz // 5 months ago
  • A book that is an introduction to into Vert.x and basics of asynchronous programming through designing and coding reactive applications.
    Book  Added by vonlatinski // mng.bz // 5 months ago
  • A book that guides through Spring’s core features, explores reactive programming, microservices, service discovery, RESTful APIs, deployment, and expert best practices.
    Book  Added by vonlatinski // mng.bz // 5 months ago
  • A book about how to design and build JVM-based microservices applications.
    Book  Added by vonlatinski // mng.bz // 5 months ago
  • A practical introduction to the modern features of the latest Java releases with modern additions like the Streams API and the Java Module System, new approaches to concurrency, and how functional concepts can help you write code that’s easier to read and maintain.
    Book  Added by vonlatinski // mng.bz // 5 months ago