Building CRUD app on any ArangoDB instance with low-code! In this blog, I will teach you how to build a front-end that can connect to ArangoDB as a data source.
Explore the challenges of building and debugging a service on your desktop. Learn 5 options of how to test your services in your microservice-based application.
In part 2 of this series on developing XR applications and experiences, explore Property Graphs and Analytics, Data Visualization, and Metaverse collaboration.
Distributed Tracing System is essential for microservice architecture and analyzes problem areas. Learn how with Spring Cloud Sleuth and analysis tool, Zipkin.
In this post, I'll outline the top trends shaping the future of open-source database programs and highlight a few example projects where you can help lead the way.
ID generation on the client-side is not as simple as it seems. In JPA and Hibernate, we can use UUIDs, custom strategies, and dedicated ID generation servers.
In this post, I'll share data mapping best practices in regards to data migration and data integration – the types of data mapping, approaches, and common tools.
In this interview, Kirke Everson - principal low-code practice leader, US gov and public sector at KPMG, talks about the rise of low-code development and automation.
You can use some powerful solutions for system authorization but if you want to reduce the number of dependencies, you can write something of your own.
Let's analyze Java, Spring Boot, MongoDB performance to see where JDK spends the most time. We'll also cover high impact, low change performance improvements.
In this below video tutorial, take a closer look at distribution design patterns in Java - Data Transfer Objects (DTO) and remote facade design patterns.
This guide helps you with embedding data protection standards into your development process in order to write software with a careful approach to data protection.
Data transparency is vital in today’s reality of online shopping, social media, and cyberthreats. Read how developers can ensure users’ information stays safe.