I just announced the new Spring Boot 2 material, coming in REST With Spring:

>> CHECK OUT THE COURSE

At the very beginning of last year, I decided to track my reading habits and share the best stuff here, on Baeldung. Haven’t missed a review since.

Here we go…

1. Spring and Java

>> Spring Boot with Scala [java-allandsundry.com]

This is very cool if you’re into Scala.

I’m personally moving towards Clojure instead of Scala, but this still looks quite interesting to me.

>> Log management in Spring Boot [frankel.ch]

How to configure logging in Spring Boot (without having to go the native XML route) – very quick and to the point (much like Boot).

>> JUnit 5 – Basics [codefx.org]

Thought last weeks JUnit 5 post was all there was? Think again 🙂

I’m super excited about finally seeing some actual progress in the JUnit space, so this series should be fun to read and follow along with.

>> (Ab)using Java 8 FunctionalInterfaces as Local Methods [jooq.org]

As always, a very nice exploration of a lambdas in Java 8.

And I can no longer call lambdas “new”, they’re now just an arrow in the quiver.

>> Java EE 8 MVC: Working with form parameters [mscharhag.com]

A quick writeup that continues to explore the mapping of parameters to Controllers in Java EE 8. Very quick and to the point.

>> JetBrains Releases Kotlin 1.0 [infoq.com]

Kotlin isn’t something I’ve done any actual work with myself. But it is the official 1.0 release of what looks to be a language with some interesting syntax choices – which doesn’t happen all that often.

Also worth reading:

Webinars and presentations:

Time to upgrade:

2. Technical

>> Automate Deployment & Management of Docker Cloud/Virtual Java Microservices with DCHQ [infoq.com]

Docker containers, continuous delivery of microservices and Event Sourcing.

Yep, every word of that sentence is an overused buzzword, yet the article solid and detailed, so worth a careful read if you’re doing work in this area.

>> Bind Parameters for Database Queries [martinfowler.com]

This weeks installment of the “Web Security Basics” series – getting into some foundation aspects of input sanitization.

And of course, SQL injection is not the only game in town.

>> Default HotSpot Maximum Direct Memory Size [marxsoftware.com]

Getting into some of the low level JVM details of direct memory access and sizing.

Also worth reading:

3. Musings

>> Why do you write accessor methods? [codecentric.de]

An “back to basics” style exploration of a core object oriented concept – accessor methods.

>> Splunk vs ELK: The Log Management Tools Decision Making Guide [takipi.com]

A solid guide to picking a log management tool and getting the most out of it.

>> Escaping the Legacy Skill Quicksand [daedtech.com]

Common sense advice about stepping up your tech skill game.

>> Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs [troyhunt.com]

Hacking a connected car – this is scary stuff.

Also worth reading:

4. Comics

And my favorite Dilberts of the week:

>> You probably shouldn’t put your suggestions in form of questions [dilbert.com]

>> He’ll be under-communicating all day [dilbert.com]

>> It sounds better when you don’t do the math [dilbert.com]

 

5. Pick of the Week

I recently discovered I writer that I’m thoroughly enjoying:

>> The Gervais Principle, Or The Office According to “The Office” [ribbonfarm.com]

 

I just announced the new Spring Boot 2 material, coming in REST With Spring:

>> CHECK OUT THE LESSONS

newest oldest most voted
Notify of
Zaier
Guest
Zaier

Hi,
I love your blog and I wish that one day I will make a similar blog, such great job Eugen !
just keep sharing knowledge !
Thanks a lot

Eugen Paraschiv
Guest

Glad you’re enjoying the site Zaier – and if you do set up your blog and start writing, definitely shoot me an email with the link. Cheers,
Eugen.

Shimona
Guest
Shimona

Where are the topics mentioned in the Emails , I never foud it , For instance Highlights:

The Kotlin language got its 1.0 this week

A writeup all about picking a good log management solution (very often overlooked)

An analysis of the super weird IPv6 syntax and why it’s more problematic than it should be

And a detailed look at a security vulnerability found in Nissan connected cars

Eugen Paraschiv
Guest

Hey Shimona – the easiest way to find all 4 is to do a search on the page 🙂
I don’t mean to be critical or anything, I’m just saying that search is the best way to go. Cheers,
Eugen.

Kostadin Golev
Guest

Thank you for the reminder about “The Gervais Principle” post – I’ve read it long time ago, it’s just brilliant 🙂 For people that loved it – you can also check out a post by Eric Dietrich that continues exploring on the subject: http://www.daedtech.com/defining-the-corporate-hierarchy/

Eugen Paraschiv
Guest

Yeah, I’m a long time reader of Eric’s. I’m really enjoying the Ribbon Farm lately as well. Cheers,
Eugen.