Title
TheServerSide.com: your Java Community discussing server side development
Go Home
Category
Description
Java developers discussing Java J2EE, java software, Java programming and other trends in server side development
Address
Phone Number
+1 609-831-2326 (US) | Message me
Site Icon
TheServerSide.com: your Java Community discussing server side development
Page Views
0
Share
Update Time
2022-05-09 11:43:03

"I love TheServerSide.com: your Java Community discussing server side development"

www.theserverside.com VS www.gqak.com

2022-05-09 11:43:03

Sign-up now. Start my free, unlimited access.LoginRegisterWhite PapersDefinitionsJava DevOpsWebinarsRSSTopic All Topics Enterprise Java development Java in the cloud Java tools Java management Mobile app dev Modular code Architecture Web dev toolsFollow: New & NotableWhat are checked vs. unchecked exceptions in Java?Understand the difference between checked and unchecked exceptions in Java, and learn how to handle these problem conditions properly and gracefully.Either log or rethrow Java exceptions, but never do bothWhen an exception occurs in your Java code, you can log it or you can rethrow it -- but don't do both. Here's why you must avoid that exception handling antipattern.7 tips to choose the right Java libraryYour application is only as secure and reliable as the external libraries you use. Here's a list of the top 7 things to consider when choosing a software library for your project.An example of how suppressed exceptions in Java workDon't ignore suppressed exceptions. In this quick tutorial we show you how to anticipate when code will throw suppressed exceptions, along with the best practices to handle them.A simple 'try with resources' in Java exampleJava's 'try-with-resources' exception handling feature can help you write better, more effective Java code. Here's a quick example of the try with resources construct in action.Coffee Talk: News & InsightCDI Full vs CDI Lite: What's new in Contexts and Dependency Injection 4.020 Apr 2022There's an interesting change packaged inside the CDI 4.0 release that will change the way you think about the API. Version 4.0 of Jakarta Contexts and ...Hibernate 6.0 release marks a milestone for JPA 3.x development19 Apr 2022Hibernate 6.0 has finally been released. Here's what this full increment release means for developers who use JPA for persistence.Being Agile vs. doing Agile: What's the difference?Darcy DeClute18 Apr 2022What's the difference between being Agile and doing Agile? It's subtle, but it's significant. Here we compare them and show you how to both be Agile and do ...Top 5 best Scrum Master certificationsDarcy DeClute19 Mar 2022Whether you are hiring for a career position or just trying to build your resume, this list of the top 5 best professional Scum Master certifications to have ...Noon is neither 12am nor 12pmCameron McKenzie14 Feb 2022The terms 12am and 12pm make no logical sense. Neither one is noon or midnight. Remove the 12am vernacular from your applications. Users will thank you.How to convert a PEM file to PPK formatCameron McKenzie08 Feb 2022Need to SSH into a remote server with PuTTY but your PEM file just won do the trick? Here's a quick example of how to convert a PEM file to PPK format with ...Node.js file upload example with Ajax and JavaScriptCameron McKenzie07 Feb 2022The Node.js file upload process is made easy with libraries like 'fs' and 'formidable.' In this JavaScript and Node.js file upload example, we show you how to ...How to create an AWS account aliasCameron McKenzie26 Jan 2022Need to create, change or rename an AWS account alias? It's not too hard to do, and your users will thank you. Here are the steps to do it.Lessons learned from the Log4j 2 vulnerabilityJoseph Ottinger25 Jan 2022The Log4j 2 vulnerability was a black eye for the Java community. Here's how to protect yourself today, and how the community can protect itself in the future.Why is Bootstrap's grid system 12 columns wide?Cameron McKenzie25 Jan 2022Ever wonder why they created a 12-column Bootstrap grid system, and not 10 or 15? It's the same reason there's 60 seconds in a minute, or 360 degrees in a ...View All Posts Featured AuthorsCameron McKenzieTechTarget18 Apr 2022What are checked vs. unchecked exceptions in Java?Carolyn HeinzeFreelance writer01 Feb 2022Want to become a freelance developer? Weigh these 4 factorsDarcy DeCluteScrumtuous Inc.21 Jan 2022Why you must avoid ScrumBut at all costsBob Reselman10 Jan 2022Binary and hexadecimal numbers explained for developersTwitter TalkTweets by TTAppDev MultimediaVideos, Podcasts, Photo Stories and InfographicsView all MultimediaVideosPodcastsPhoto StoriesInfographicsGet StartedA better Gitflow diagram with branches, merges and colorProblem Solve5 ways to force garbage collection in JavaSearch thousands of tech definitionsgarbage collection (GC)uninterruptible power supply (UPS)clickstream data (clickstream analytics)network slicingView All DefinitionsLatest TechTarget resourcesSearchAppArchitecture Software Quality Cloud Computing Security AWS SearchAppArchitecture6 ways cloud-native and cloud-agnostic architecture differWhile development teams should carefully weigh the tradeoffs between cloud-native and cloud-agnostic architectures, they don't ...The deep-rooted relationship between REST and microservicesThe REST paradigm can be a natural fit for microservices architectures, but it also presents potential challenges for development...The management approach for internal vs. external APIsWhile internal and external APIs don't differ much mechanically, there are some important contrasts when it comes to certain API ...SearchSoftwareQualityDemand for no-code due to developer shortage, pandemicIn this Q&A, Quickbase CEO Ed Jennings shares his thoughts on the developer shortage, the no-code platform's growth and his plans...GitHub mandates 2FA by 2023, plans for additional securityGitHub will mandate using the extra layer of protection to make code more secure. The announcement didn't get the warmest ...How software testing affects a successful multi-cloud strategyHere's how QA professionals working with multi-cloud can deal with the increased complexity associated with the strategy, plus ...SearchCloudComputingUnderstand AWS Regions vs. Availability ZonesIt's easy to forget about data centers when you run workloads in the cloud. Learn how AWS Regions and Availability Zones differ, ...8 ways to reduce cloud costsOrganizations need the right strategies in place to avoid cloud cost pitfalls. Stay within your budget with these cost management...Explore options for FinOps certifications and trainingReceiving a FinOps certification helps individuals develop their cloud financial management skills. Discover training and ...SearchSecurityCryptocurrency mixer sanctioned over Lazarus Group tiesNorth Korea's Lazarus Group is accused of stealing more than $600 million in the Axie Infinity hack and laundering a chunk ...How to implement an attack surface management programKeeping attackers away from corporate assets means keeping a constant vigilance over the organization's attack surface. An attack...Hackers exploit vulnerable Adminer for AWS database theftsMandiant researchers spotted a threat group using an exploit for older versions of Adminer to get their hands on metadata that ...SearchAWSIn search of AWS Solutions Architect preparation?Think you're ready for the AWS Certified Solutions Architect certification exam? Test your knowledge with these 12 questions, and...Experts raise privacy concerns over Amazon fleet surveillanceAmazon said its van monitoring system is designed solely for driver safety. But many industry experts have concerns regarding the...Here's why Amazon's global expansion won't come easyAmazon would like to strengthen its global footprint, but the e-commerce giant faces roadblocks and challenges today that did not...About UsEditorial Ethics PolicyMeet The EditorsContact UsAdvertisersBusiness PartnersMedia KitCorporate SiteContributorsReprintsAnswersDefinitionsE-ProductsEventsFeaturesGuidesOpinionsPhoto StoriesQuizzesTipsTutorialsVideosAll Rights Reserved, Copyright 2000 - 2022, TechTargetPrivacy Policy Cookie Preferences Do Not Sell My Personal InfoClose