Red Hat support for Spring Boot

Serverless computing in action
Article

Part 2: Building a Serverless Service

Doug Tidwell

Take a look at the image manipulation code behind the photo booth, then look at a modern web app that uses it.

Easily secure your Spring Boot applications with Keycloak
Article

Easily secure your Spring Boot applications with Keycloak

Sebastien Blanc

What is Keycloak? Although security is a crucial aspect of any application, its implementation can be difficult. Worse, it is often neglected, poorly implemented and intrusive in the code. But lately, security servers have appeared which allow for outsourcing and delegating all the authentication and authorization aspects. Of these servers, one of the most promising is Keycloak, open-source, flexible, and agnostic of any technology, it is easily deployable/adaptable in its own infrastructure. Moreover, Keycloak is more than just an authentication...

GNU C library
Article

Spring 2017 GNU Toolchain Update Part 5

Nick Clifton

The GNU Toolchain is a collection of programming tools produced by the GNU Project. The tools are often packaged together due to their common use for developing software applications, operating systems, and low-level software for embedded systems.

Internet of things feature image
Article

Wearable Tech: A Developer’s Security Nightmare

Samantha Donaldson

Web developers and IT professionals are the foundations of any quality business’ data security. However, with technology constantly changing and evolving as well as becoming more consumer-friendly, this data’s vulnerability only increases and it can often be hard to even notice how this new technology can actually affect your company until it occurs. Despite this, ignorance to modern hacking techniques does not refute their inability to transform even the smallest of devices into a weapon with which to infect or...