Java Code Geeks

Enabling HTTP/2 in Spring Boot with Tomcat

HTTP/2 is a major revision of the HTTP protocol that improves performance by ena...

Spring Boot Performance with Java Virtual Threads

For years, Java developers have wrestled with the limitations of platform thread...

[DEALS] Microsoft Office Professional 2021 for Windows:...

Hello fellow geeks, Fresh offers await you on our Deals store, please have a loo...

How to Dynamically Ignore Fields in Jackson

Jackson is a popular Java library for JSON processing. Sometimes, we need to ign...

Firebase + Spring Boot CI/CD: Zero Downtime Deployments...

Imagine this: You’ve just finished a new feature for your app—a sleek frontend u...

Java Naming Conventions Example

Java naming conventions are crucial for writing readable, maintainable, and stan...

Achieving Strong Consistency in Distributed Spring Boot...

Redpanda is a modern, Kafka-compatible streaming platform designed for high perf...

Micronaut: Loading External YAML Configuration

Configuration management is essential for any application, and Micronaut offers ...

Green Cloud Computing Practices 2025: Measuring & Reduc...

As cloud computing grows, so does its carbon footprint. By 2025, sustainable clo...

OutSystems vs. Traditional Coding in 2025: Scalability ...

As enterprises demand faster development and easier maintenance, the debate betw...

Understanding Dependency Injection in Micronaut

Micronaut is a lightweight framework for microservices and serverless applicatio...

Closing Scanner Java Example

1. Introduction The java.util.Scanner class can read input from System.in, File,...

Spring Cloud AWS FIFO Queue Support Example

Amazon Simple Queue Service (SQS) is a fully managed message queuing service. AW...

Returning JSON Responses in a Micronaut Controller

Micronaut is a modern Java framework designed to build lightweight and fast micr...

Feature Flags in Spring Boot: Unleash vs Togglz

Modern applications need the ability to toggle features dynamically without rede...

Firestore: Read/Write Optimization Strategies

Cloud Firestore is a highly scalable NoSQL database, but improper usage can lead...

Spring Security One-Time Token Login Example

One-time token (OTT) authentication is a secure mechanism often used when a user...

Securing Microservices with SPIFFE and Spring Security

Microservices architectures introduce new security challenges, particularly in w...

Explore the gather Method in Java 22 java.util.stream

Java 22 unveils an exciting preview feature through JEP 461: Stream Gatherers, m...

How Cloud Software Development Companies Build Robust C...

Introduction In today’s fast-paced digital world, businesses are progressively m...

[FREE EBOOKS] The Ultimate Linux Shell Scripting Guide,...

Hello fellow geeks, Fresh offers await you on our Information Technology Researc...

Deep JVM Observability with eBPF: Beyond Prometheus

Modern Java applications often run in complex, distributed environments where pe...

Spring AI Testing: AI Evaluators Example

Large Language Models (LLMs) have become an integral part of modern applications...

Building a Semantic Search System with Spring AI and PG...

Semantic search enhances traditional keyword-based search by understanding the m...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.