One of the most extended belief about web applications is that most of them are insecure. This opinion is supported by statistics published by SANS [1] which show that almost half the vulnerabilities ...
Request handling is the bread and butter of Java web application development. In order to respond to requests from the network, a Java web application must first determine what code will respond to ...
Many software developers do not pay enough attention to the shutdown (also referred to as undeploy) of the applications they write. In fact, the most popular shutdown mechanism is to execute Ctl+C or ...
All the cool new programming languages, like Ruby, always have compilers/interpreters and tools for Linux, and the old UNIX standbys like Tcl/Tk are still around when you need them. Why, then, is Java ...
When evaluating tools and frameworks, it's very important to understand how they support the specific applications that your teams are developing. Using tools that are well designed for the task at ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. This article dives into the happens-before ...
Linux leader Red Hat is selling subscriptions for three collections of higher-level applications that run Web sites' Java server software. The three support subscriptions will cost a minimum of $599 ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Jinsong Yu shares deep architectural insights ...
Researchers from the Polish firm Security Explorations have identified two new vulnerabilities in the latest version of Java, which was released just this week to address two other security holes. The ...
I'm seeing some really odd memory usage and garbage collection behavior in a web application my team supports. We have a homebrewed monitoring application that tracks memory and CPU utilization and ...