Core Java

Core Java news, information, and how-to advice

How to avoid becoming a dead-end developer
Java sign public domain

diamond light source synchrotron main chamber

OSGi at the UK's biggest science lab

Developers at Diamond Light Source set out to migrate a mission-critical, Java-based acquisition system to dynamic class loading. Here’s what they learned.

microsoft keyboard

43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle - Deal Alert

The Wireless Desktop 900 keyboard has quiet-touch keys, and the full-size ambidextrous mouse provides comfortable, precise navigation. The Wireless Desktop 900 also includes Advanced Encryption Standard to help protect your...

09 opensource

The 6 unwritten rules of open source development

Do you want to be a successful and valued member of an open source project? Follow these unwritten rules

security code big data cyberespionage byte

Should software developers have a code of ethics?

With the power to drive technology, comes great responsibility. What should developers do when faced with ethical dilemmas?

beagle dog puppy hound

Git Hound, Truffle Hog root out GitHub leaks

The two open source tools check for cyptographic keys and other sensitive information in code saved on GitHub and offers warnings if secrets are at risk

building network construction architect

New functional language for JVM builds on Haskell, Clojure, ML

Like Lisp, Lux runs on the Java Virtual Machine but promises more power and flexibility than its predecessors

Predictions for the Future of Programming

11 predictions for the future of programming

Our coding crystal ball offers clues about the kinds of turns your programming career will take in the years ahead

The year ahead in app dev

The year ahead for Java, JavaScript, Swift, and Universal Windows

Java and Swift will see significant upgrades, while JavaScript frameworks and Microsoft tooling will transform

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72% for the holidays. Use our link and see the discount applied when you click "buy now".

Google's Mountain View, California headquarters

Department of Labor sues Google over wage data

Google says it's provided hundreds of thousands of records to the agency, but called a handful of data requests "overbroad"

ransomware data laptop

Exposed MongoDB installs being erased, held for ransom

A nonprofit dedicated to making the internet safer is urging administrators to check their MongoDB installations

wearable smart watch

Data breaches through wearables put target squarely on IoT in 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts.

man with online security key

5 signs we're finally getting our act together on security

Despite all the bad news in 2016, trends suggest the year ahead could be a tipping point for information security

nest camera

15% off Nest Cam Indoor Security Camera - Deal Alert

With Nest Cam Indoor, you can check in -- even when you’re out. 24/7 live streaming. No dead batteries. And a versatile magnetic stand that lets you put it anywhere. Nest Cam is currently discounted 15% on Amazon.

high priority sign arrow

Oracle survey: Java EE users want REST, HTTP/2

Oauth and OpenID, eventing, and JSON-B also ranked high on developer wish lists

military bootcamp army exercise drills service

Coding boot camp grads write better code

Boot camp grads lead college grads in practical programming skills, but lag in deeper understanding of systems and algorithms

5 tips for developers3

5 tips to help developers keep up with changing technologies

Developers want to learn new technologies and build new things. These five tips can help keep your developers happy and the innovation flowing.

security code attack hack

Google open-sources test suite to find crypto bugs

Developers can use Project Wycheproof to test cryptographic algorithms against a library of known attacks to uncover potential weaknesses

Load More