23 private links
The presenters discuss using techniques and patterns such as Event Storming, Strangling, Starving, Slice Analysis and Domain Driven Decomposition to transform legacy apps for PCF.
Read through the following principles and ask if the application in question benefits from a given principle. If you answer “yes” for one or more of the following principles, the feature is a good candidate to be a microservice. If you answer “no” for every principle, you are likely introducing accidental complexity into your system.
The Official Website for the Challenge
This tool helps you check what data-protecting measures a site has taken to help you exercise control over your privacy.
I decided to write an article about a thing that is second nature to embedded systems programmers - low level bit hacks. Bit hacks are ingenious little programming tricks that manipulate integers in a smart and efficient manner. Instead of performing some operation (such as counting the 1 bits in an integer) by looping over individual bits, these programming nuggets do the same with one or two carefully chosen bitwise operations.
In this article we will be extending an ExecutorService implementation with monitoring capabilities. This monitoring capability will help us to measure a number of pool parameters i.e., active threads, work queue size etc. in a live production environment. It will also enable us to measure task execution time, successful tasks count, and failed tasks count.
This huge collection of Spring-related news and tutorials covers everything from coding with Kotlin to using Micrometer to Spring Boot 2.0!
Take a deep dive into all things IMAP with CTO Christine Spang as part of our Email Experts series.
Wer ein Programmierprojekt angeht, wird früher oder später auch auf Git treffen. Wir haben dir eine einfache Übersicht über alle wichtigen Befehle zusammengestellt. Damit gelingt dein Einstieg garantiert.
Generator für Datenschutzerklärungen für Privapersonen, z.B. Blogger und Kleinunternehmer von Dr. jur. Thomas Schwenke. Berücksichtigt die DSGVO (Rechtslage ab Mai 2018)
Here, I am going to share a custom toolkit wrapped as a Spring Boot project with an Akka Persistence starter to act as a ready-made toolkit for event-driven, asynchronous, non-blocking flow APIs, event sourcing, and CQRS implementation within Spring Boot services.
When inserting records into SQL databases, we often want to fetch back generated IDs and possibly other trigger, sequence, or default generated values.
This article is a tutorial about parallel processing in Spring Batch. We will use Spring Boot to speed our development process.
In this article, I show how to ignore checked exceptions in Java. I will start by describing the rationale behind it and the common pattern to resolve this issue. Then I will present some libraries for that purpose.
In most ways, PL/SQL development is just like working with any other language but, sometimes it can be a little different. If you’d like to create a Continuous Deployment Pipeline for your P…