Java

veracode

Java Crypto Catchup

In 2017, we started a blog series talking about how to securely implement a crypto-system in java. How to Get Started Using Java Cryptography Securely touches upon the basics of Java crypto, followed by posts around various crypto primitives Cryptographically Secure Pseudo-Random Number Generator (CSPRNG), Encryption/Decryption, and Message Digests. We also released a Java Crypto Module for easier dockerization of injectable modules exposing Crypto services via an API.

State of Java Elasticity. Tuning Java Efficiency - JDD 2020

Java is finally elastic! OpenJDK improvements and new features in Garbage Collection technology resulted in enhancing Java scaling and resource consumption. Now JVM can promptly return unused memory and, as result it can be scaled up and down automatically. In this video from JDD conference, Ruslan Synytsky covers the main achievements in vertical scaling direction, as well as share tuning details of different GCs. Watch the session to find out how to make Java environments more flexible and adjustable to the load while lowering total cost of ownership.
overops

Java NullPointerException:One Tiny Thing That's Killing Your Chances of Solving It

What are some of the biggest obstacles with Java exception handling? Warning: the following string of characters is known to induce stress responses in certain individuals of the human species: “java.lang.NullPointerException”. If you’ve ever been frustrated with an exception, you’ve reached the right place! In this post, we highlight the shortcomings of relying on stack traces alone for investigating Java NullPointerExceptions.

elastic

Monitoring Java applications with Elastic: Multiservice traces and correlated logs

In this two-part blog post, we’ll use Elastic Observability to monitor a sample Java application. In the first blog post, we started by looking at how Elastic Observability monitors Java applications. We built and instrumented a sample Java Spring application composed of a data-access microservice supported by a MySQL backend. In this part, we’ll use Java ECS logging and APM log correlation to link transactions with their logs.

coralogix

Java Logging: Best Practices for Success with your Java Application

Java is used by at least 7.6 Million developers worldwide. Java logging has been a staple of the Java platform since day one, boasting extensive, resourceful documentation and rich API’s. The cornerstone of monitoring your application is efficient and widespread logging. At Coralogix, we know that logs have become one of the most important components of a modern monitoring function.

elastic

Monitoring Java applications with Elastic: Getting started with the Elastic APM Java Agent

The goal of Java application monitoring is to minimize the time it takes to discover a problem with a Java application (mean time to detect, or MTTD) and the time it takes to recover from it (mean time to resolve, or MTTR). Understanding what's going on in our code is the biggest step in finding and eliminating the root cause of a problem, and let's face it — that code that seemed clear and concise when we wrote it a year ago might not be as "self documenting" as we thought.

vmware tanzu

Announcing the General Availability of Azure Spring Cloud

Everyone wants their developers to be more productive. Increased productivity means more features and functionality, which leads to more satisfied customers and better business outcomes. That is why, today at SpringOne, we are happy to announce the general availability of Microsoft Azure Spring Cloud—a fully managed service for Spring Boot apps.