When adhering to the SOLID programming principles, Single Responsibility can be a bit tricky. Find out why and how to better understand this oft-misunderstood concept.
See how you can integrate Mendelson AS2, one of the more the widely used AS2 clients, into your testing cycles and automate it to perform AS2 operations.
Though it's tough, this developer admits he hadn't heard of this plugin until recently. If you're in the same boat, read to get an overview of this great security tool.
Still wrapping your head around DI? Let's explore the philosophy and functionality behind it, then see how Guice, or any other such framework, can help.
Some people use the terms Inversion of Control and Dependency Injection interchangeably. Let's see how they're different and how they can work together.
The folks at Gradle feel that Java 9's multi-release JARs are a poor solution to a real problem for library designers. See how to create an MRJAR and why you shouldn't.
We explain a type of attack that's possible to carry out on systems using OAuth and how to mitigate them using keyed-Hash Message Authentication Code Validation.