JDBI is a library to access to relation data in Java, it doesn’t provide support for the Specification Pattern, but with some classes and code we can implement it and use it.
Continue readingCategory: Java
How to get the current directory path of a JAR in Java
Let’s learn about different approaches and concerns when we want to find the current directory where a JAR file is running….
Continue readingSpring Data JPA and the Specification Pattern
Spring Data JPA provides support to the Specification pattern that will help us to reduce the amount of methods in our repository improving the readability and maintainability of the code.
Continue readingUsage of Deprecated for removal
Java 9 added the attribute forRemoval to the @Deprecated annotation, the purpose is to let know the developer there is a real intention in the short coming future (next releases) to remove completely that code. Therefore, stop using it should be a high priority.
Continue readingMaking Visual Studio Code your Java IDE
Let’s make VS Code our Java IDE tool with just few steps and clicks.
Continue readingJava 17 features – new since Java 11
Let’s know about the main new features introduces in Java 17 if you are using Java 11 at this moment.
Continue readingSwitch expression on Java 17
Java 17 includes the switch expressions into the language, which provides a more declarative and pleasant programming style, which we see in other programming languages.
Continue readingAdding vulnerabilities check on maven or gradle
Instructions to add the owasp dependency check plugin in maven or gradle and detect possible vulnerabilities as part of the dependencies of our applications.
Continue readingUnderstanding Sealed classes in Java 17
Sealed classes are an enhancement to the language included with LTS version 17 (included since version 16) of Java. Sealed classes or interfaces allow us to restrict what other classes and interfaces can extend from them.
Continue readingLock mechanism using Files on Java
Using Java NIO we can implement a locking mechanism, to access resources concurrently safely and maintaining the integrity of our information.
Continue reading