Part 5 Real-World Applications and Best Practices with Java StreamsWelcome to the final part of our Java Streams series! So far, we’ve covered the basics of streams, intermediate operations, terminal…Jan 16Jan 16
Part 4: Debugging and Optimizing Java Streams for PerformanceWelcome to the fourth part of our Java Streams series! In the previous parts, we explored how to create streams, use intermediate…Jan 15A response icon1Jan 15A response icon1
Part3: Mastering Terminal Operations and Real-World Use Cases with Java StreamsWelcome to Part 3 of our series on Java Streams! By now, you’ve learned how to create streams (Part 1) and use intermediate operations like…Jan 14Jan 14
Part 2: Intermediate Stream OperationsWelcome to the second part of our series on Java Streams! In Part 1, we introduced the basics of streams and covered their creation and…Jan 11A response icon1Jan 11A response icon1
Lessons from the Atlassian Outage: Understanding Load Balancers and Blue-Green DeploymentIn 2019, Atlassian experienced a significant service outage caused by issues with its load balancers. This incident underscored the…Jan 10Jan 10
Part1: Getting Started with Java StreamsIntroduced in Java 8, Java Streams have transformed the way developers process and manipulate data. Streams provide a functional…Jan 10Jan 10
Mastering Records in Java: Simplifying Data ClassesAs developers, we often encounter scenarios where we need to create classes that primarily store data. Traditionally, creating such classes…Jan 9Jan 9
Java’s Z Garbage Collector: Achieving Low Latency at ScaleIf you’ve ever worked on applications requiring high throughput and low latency, you know how challenging managing garbage collection (GC)…Jan 9Jan 9
Published inWhite Collar ProfessionalJava 17: What’s New and How It Will Change Your CodingJava 17, the latest Long-Term Support (LTS) release of Java, brings a host of new features, enhancements, and deprecations that promise to…Jul 6, 2024Jul 6, 2024
Published inJavarevisitedSpring Boot with Jasypt 1:1Jasypt library offers encryption and decryption for text strings, passwords, and other private data. In order to protect sensitive data…Apr 24, 2023Apr 24, 2023