InITNEXTbySaeed ZarinfamDeep dive into the Structured Logging in Spring Boot 3.4Benefits of Structured Logging15h ago1
Martin HodgesMy experience adding a MongoDB No-SQL database to my Kubernetes clusterIf you have read my article on how to decide between SQL and No-SQL databases, you may be wondering if you can add a No-SQL MongoDB…Jun 10
Dulanjaya SandaruwanThe Best Way to Structure API Responses in Spring BootStructuring API responses is a critical part of building a robust and user-friendly Spring Boot application. A well-structured response not…Nov 235Nov 235
Akshay AryanHow an ArrayList, with Transient Array Storage, Can Still Be SerializedAt first glance, it might seem counterintuitive for an ArrayList in Java to be serializable if its core storage mechanism—a transient…6h ago6h ago
InITNEXTbyAbhinav SonkarSecuring Modular Monolith with OAuth2 and Spring SecurityWhere does Authentication and Authorization related code fit in a Modular Monolith? Let’s take a look with Spring Security and OAuth2.May 24May 24
InITNEXTbySaeed ZarinfamDeep dive into the Structured Logging in Spring Boot 3.4Benefits of Structured Logging15h ago1
Martin HodgesMy experience adding a MongoDB No-SQL database to my Kubernetes clusterIf you have read my article on how to decide between SQL and No-SQL databases, you may be wondering if you can add a No-SQL MongoDB…Jun 10
Dulanjaya SandaruwanThe Best Way to Structure API Responses in Spring BootStructuring API responses is a critical part of building a robust and user-friendly Spring Boot application. A well-structured response not…Nov 235
Akshay AryanHow an ArrayList, with Transient Array Storage, Can Still Be SerializedAt first glance, it might seem counterintuitive for an ArrayList in Java to be serializable if its core storage mechanism—a transient…6h ago
InITNEXTbyAbhinav SonkarSecuring Modular Monolith with OAuth2 and Spring SecurityWhere does Authentication and Authorization related code fit in a Modular Monolith? Let’s take a look with Spring Security and OAuth2.May 24
Eric Cabrel TiogoImplement JWT authentication in a Spring Boot 3 applicationThis blog post will show you how to implement a JWT authentication on Spring Boot 3 application using Spring Security 6Mar 1942
Ameesha RaniDatabase Principles for Managing Spring Boot ApplicationsWithin the context of Spring Boot applications, when data grows in a relatively uncontrolled manner, response times for queries tend to be…16h ago1
InITNEXTbySaeed ZarinfamTrue Test Coverage with TracingImproving test coverage by understanding the system’s behaviorMay 12