One of the really nice things about Django is that it ships with a fantastic ORM, user authentication, and admin panel. These three things make building secure Django websites incredibly easy. The new Stormpath Django library allows you to keep using all of the normal Django auth system functionality, while completely handling all scaling and security issues.
In this JavaAdvent post we create a simple native JVM agent that uses JVMTI to leverage a unique insight into what happens on the JVM heap. We show how to iterate the instances of a given class which can be handy in many situations. JVMTI offers lots of useful API and using a native Java agent is a good way to benefit from that.
Fedora 21 rolled out this week, organized into three separate flavors: Workstation, Server, and Cloud. Fedora's Cloud flavor is further divided into a "traditional" base image and an Atomic Host image into which Fedora's team of cloud wranglers has herded a whole series of futuristic operating system technologies.
Write a Java program to print Fibonacci series is one of the common coding problem Java developers are asked during interviews. To make it more interesting interviewer ask you to do this exercise using bot for loop and recursion. This article explains both the approach and also shows how to optimize them for further follow-up.
“Soft Skills: The software developer’s life manual” is a developer to developer guide offering techniques and practices for a more satisfying life as a professional software developer. In it, John addresses a wide range of important “soft” topics from career and productivity, to personal finance and investing, and even fitness and relationships all from a developer-centric viewpoint.
Undeniably, Java is the most popular and widely used programming language since its inception in the year 1995 by Sun Microsystems. Being the object-oriented and class-based programming language, Java takes the pride for being the popular programming language today, used by over 9 million developers globally for client server web applications. This programming language is best known for its unique characteristic, where programmers need to write only once and then run it anywhere anytime; this is the reason why it is so popular today.
We are please to announce the release of Spring Security 4.0.0.RC1. This release resolved 40 tickets. You can find a highlight of the changes below: - Updated Defaults - As security evolves, so does Spring Security. We took this opportunity to ensure that the defaults were more secure. For example, the XML Namespace support now enables CSRF protection by default. - Polish WebSocket Security - We received very valuable feedback from the community which allowed us to polish the WebSocket security. A complete example that also integrates with Spring Session can be found in spring-session/samples/websocket. For example, the WebSocket Java Configuration now better aligns with the HTTP configuration. - Simplified Configuration - By leveraging Spring 4.x new features, Spring Security's minimal configuration has been drastically simplified. For example, the minimal configuration to secure a web application can be seen below:
Most companies understand the importance of backing up data: Without a sufficient backup strategy in place, data loss could set a business back days, weeks, or even months. Despite this apparent understanding, many businesses still aren't taking the necessary measures to ensure that their data is protected from disaster. Well, this metric may help push them toward taking those measures: Data loss and downtime is costing companies $1.7 trillion per year.