Here we examine a hypothetical, but very possible example where Tell, Don't Ask and the SRP collide. See what the moral is when it comes to applying principles.
This overview of Escape Analysis covers the various escape states and how Java's JIT compiler handles them as well as a few words on locking and synchronization.
If you're a C# programmer, you need to know how to convert a table column into a C# model class using stored procedures. And if you don't, you've come to the right place.
Learn the answer to the question: How do you configure Hibernate so that it writes the executed SQL statements and used bind parameters to the log file?
Learn how to easily use the SQL Helper Class, which interacts with a database with help from connection strings, to create Web APIs by using Visual Studio 2017.
We take a look at image-based exploits that are common to websites, in this case, those that are backed by PHP. We also look at what devs can do to prevent them.
Want to take a more functional approach to Java? The language doesn't offer a lot of options, but here is some custom code you can use for method lifting.
Follow along this explanation of JEP 213: Milling Project Coin. Check out the tweaks coming to the Java language for identifier names, SafeVarargs, and more.
Let's take an in-depth look at decorators in Python. Find out what they're all about, the various kinds, and how you can make use of them in your own code.
We take a look at some recent changes made to the use and format of the TEST compiler option in COBOL, as well as how those changes could affect your debugging practices.
We continue our series on XML External Entity attacks, by looking at some typical situations for XXE attacks, and the limitations and shortcomings of this attack.