The True Value of Microservices
Read the full article about Microservices written by Simon Martinelli that appeared in Java Spectrum
Hibernate Schema-based Multi-Tenancy using StatementInspector
When using schema-based multi-tenancy with Hibernate, a simple way to define the schema is using a MultiTenantConnectionProvider where we call SET SCHEMA on the connection. However, this approach does not work with certain databases like MS SQL.
How do you get a Spring Bean without Dependency Injection?
Sometimes, you want to use a Spring Bean in a class that is not a Spring Bean, but then dependency injection doesn’t work. This article shows a way to get around that limitation.
2023 – What a Year!
I’ve been a software developer since 1995, but 2023 was by far the most exciting year of my IT career. Let’s look back on projects, conferences, and recognitions and an outlook to 2024.
IT Security Risks
In this article, we take a closer look at the definition of IT security risks to establish a basic understanding of the complex dangers that businesses and organizations face.
Durable Subscription with JMS and Spring Boot
When using the publish-subscribe domain with JMS we often want to use durable subscriptions. But how can this be done with Spring Boot?
IT Risk Management
Learn more about the critical aspects of IT risk management and how your organization can protect its digital infrastructure to ensure long-term success in this increasingly connected world.
Testing Spring Boot JMS with ActiveMQ Artemis and Testcontainers
Currently, I’m teaching JMS with Spring Boot at the University of Applied Science in Bern, Switzerland. We use Apache ActiveMQ Artemis as the JMS message broker. But how can we test our Spring Boot application?
Java Champion
Vor kurzem wurde mir die Ehre zuteil als Java Champion gewählt zu werden. Es ist eine der höchsten Auszeichnungen die man in der Java-Community erhalten kann und für die Ernennung bin ich den Java Champions äusserst dankbar!
IT Security Audits
IT security checks are crucial for the security of your IT systems and data. In this article, we discuss everything about IT security audits, their benefits, types of audits, audit processes and provide a helpful checklist for conducting an IT security audit for your company.
Standard Software vs. Custom Software
A question that often arises: should software be developed in-house or purchased off-the-shelf? In this article, we’ll explore both custom and standard software, their respective advantages and disadvantages, and explain when to use each.
Strategic IT Planning
The topic of strategic IT planning is a complex one and can pose a challenge for many organizations. In this article, we delve into and explain this topic, while also examining the relevant challenges and trends.