Oliver FosterSpring Boot: How Many Requests Can Spring Boot Handle Simultaneously?My article is open to everyone; non-member readers can click this link to read the full text.20h ago
Donald RaabinJavarevisitedHow to collect a Java Stream into a primitive CollectionDiscover a primitive collection bridge for Java Stream to avoid boxing.May 31
Akın TopbaşRefactoring Java Spring Boot Code: Eliminating If-Else Statements for Cleaner, Extensible LogicIf-else statements, though ubiquitous, can lead to complex and hard-to-maintain code if overused. In this article, we’ll explore various…Jun 5Jun 5
SomainJavarevisitedCodeCademy 50% Discount for Students and Developers 2024CodeCademy is offering 50% discount on their paid plan today use code AISUMMER to get the discount7h ago7h ago
Daniel García SollainTowards Data ScienceBuild Your Own ChatGPT-like Chatbot with Java and PythonCreating a custom LLM inference infrastructure from scratchMay 301May 301
Oliver FosterSpring Boot: How Many Requests Can Spring Boot Handle Simultaneously?My article is open to everyone; non-member readers can click this link to read the full text.20h ago
Donald RaabinJavarevisitedHow to collect a Java Stream into a primitive CollectionDiscover a primitive collection bridge for Java Stream to avoid boxing.May 31
Akın TopbaşRefactoring Java Spring Boot Code: Eliminating If-Else Statements for Cleaner, Extensible LogicIf-else statements, though ubiquitous, can lead to complex and hard-to-maintain code if overused. In this article, we’ll explore various…Jun 5
SomainJavarevisitedCodeCademy 50% Discount for Students and Developers 2024CodeCademy is offering 50% discount on their paid plan today use code AISUMMER to get the discount7h ago
Daniel García SollainTowards Data ScienceBuild Your Own ChatGPT-like Chatbot with Java and PythonCreating a custom LLM inference infrastructure from scratchMay 301
Eric Cabrel TiogoImplement JWT authentication in a Spring Boot 3 applicationThis blog post will show you how to implement a JWT authentication on Spring Boot 3 application using Spring Security 6Mar 1916
Abhinav SonkarinITNEXTSecuring Modular Monolith with OAuth2 and Spring SecurityWhere does Authentication and Authorization related code fit in a Modular Monolith? Let’s take a look with Spring Security and OAuth2.May 24