Coffee Talk: Java, News, Stories and Opinions:

September 15, 2019  9:28 PM

10 Oracle Code One 2019 sessions to check out

cameronmcnz Cameron McKenzie Profile: cameronmcnz

As Oracle Code One 2019 kicks off in San Francisco, I hope you've already logged into the Oracle Open World (OOW) schedule builder and booked yourself into all of the sessions you want to attend. Unlike smaller conferences where you can easily slide into any session that has open seats, OOW tightly...

September 13, 2019  3:42 AM

How to get the most out of Oracle Code One 2019

cameronmcnz Cameron McKenzie Profile: cameronmcnz

If Oracle Code One 2019 is your first time at a major software conference, it will serve you well to follow some sage advice and insight from a veteran attendee of past JavaOne and Oracle Open World conferences. The first piece of advice, for which it is far too late to act upon, is to make sure...

September 4, 2019  4:18 PM

How to deploy a JAR file to Tomcat the right way

cameronmcnz Cameron McKenzie Profile: cameronmcnz

The question of how to deploy a JAR file to Tomcat drives a surprising amount of traffic to TheServerSide. It's a strange search query, because you don't really deploy JAR files to Tomcat. Apache Tomcat is a servlet engine that runs Java web applications, which are packaged as web application...

August 29, 2019  8:38 PM

Input validation issues open Cisco firewall vulnerability

JudithMyerson Profile: JudithMyerson

Standard security practices are the baseline for any product, and even the most junior software developers should be aware of the minimum security requirements for any project. And yet, something as simple as a lack of input validation still plagues the industry. For example, a firewall...

August 28, 2019  9:03 PM

Use the HSTS header for secure communications across networks

JudithMyerson Profile: JudithMyerson

It should always be a top priority for any developer to secure and encrypt communications across the network. Along these lines, the performance overhead for encryption and to ensure confidentiality is relatively minor. I’d go so far as to say the use of

August 23, 2019  9:28 PM

7 IT security best practices to know to prevent data breaches

JudithMyerson Profile: JudithMyerson

Imagine a hacker trying to break into a secure system. You often envision an expert programmer make attempts at a vast array of complex approaches, such as buffer overruns or distributed brute force attacks to breach security. But more often than not, breaches occur because basic IT security...

August 6, 2019  8:18 PM

3 questions to ask in a microservices oriented architecture review

BobReselman BobReselman Profile: BobReselman

Microservices oriented architecture is all the rage these days. Why not? It's hard to ignore the faster deployment rates and reduced costs that are the essential promises of microservices oriented architectures. Yet for most companies that take the plunge, development activity is more about the...

July 16, 2019  8:15 PM

Fix JAVA_HOME errors quickly | Invalid directory | Not set or defined | Points to JRE

cameronmcnz Cameron McKenzie Profile: cameronmcnz

There's nothing worse than installing your favorite Java-based application -- such as Minecraft, Maven, Jenkins or Apache Pig -- only to run into a JAVA_HOME is set to an invalid directory or a JAVA_HOME is not defined correctly error as soon as you boot up the program. Well,...

July 9, 2019  7:16 PM

The future of front-end software development in a post GUI world

BobReselman BobReselman Profile: BobReselman

By the year 2025, Google predicts that the number of IoT and Smart Devices in operation will exceed that of non-IoT devices. Statista also predicts a similar growth pattern, in which the proliferation of IoT devices will be three times more than today’s usage. Any way you slice it, the...

July 1, 2019  1:57 PM

Don’t let RabbitMQ vulnerabilities expose your CI pipelines

JudithMyerson Profile: JudithMyerson

RabbitMQ is an open source message broker that exchanges asynchronous messages between publishers and consumers. The messages can be a human-readable JSON, a simple string or a list of values that can be converted into a JSON string. In March of 2019, the

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: