GraalVM : A JVM written in Java for high performant applications !!

The HotSpot JVM which i shared in the previous blog is suited and optimized for traditional on-premise based applications to provide high throughput and stability.New modern applications are being built for cloud as distributed systems developed using microservices, event driven, asynchronous and reactive design which should scale quickly and efficientlyHotSpot JVM and JIT compiler is … Continue reading GraalVM : A JVM written in Java for high performant applications !!

Execution of a Java Program & Role of Just In Time (JIT) Complier

When we write a Java program and issue a javac command , the program is compiled to bytecode.To execute this program, we issue a java command and when we do so, the bytecode generated by javac is interpreted by the Java Virtual Machine (JVM) to produce machine code which is ultimately fed to CPU to … Continue reading Execution of a Java Program & Role of Just In Time (JIT) Complier

What is JWT and why do we need it in a microservices based application?

JWT (JSON Web Token) is a very popular way to do user authorization in microservices. It is a standard which is used to create access tokens for an application and enables secure communication between between two parties.The Industry standard specification RFC7519 outlines how information in JWT should be structured.It is widely used in microservices based … Continue reading What is JWT and why do we need it in a microservices based application?

What is Dependency Injection & why do we need it ?

Dependency injection is a technique used in software engineering to develop loosely coupled systems.It is a technique that allows an object to receive other objects that it depends on by some other program than it explicitly calling the dependent object.Let us understand why this is needed by an example. I have a Notification Interface which … Continue reading What is Dependency Injection & why do we need it ?

Chrome Task Manager

Just found the built in Task Manager for Google Chrome that allows you to see how much memory and CPU web pages, extensions, and Google processes are consuming while Chrome is running.  A very useful feature to find out which web page or chrome extension is consuming more memory, CPU and slowing down your system. … Continue reading Chrome Task Manager

Podman, a secure alternative for Docker.

Podman (POD MANager) is a container engine, developed by Red Hat which is designed to be a replacement for Docker. It is now the default container engine used by Red Hat Enterprise Linux (RHEL).Podman was also a lot in the news as an alternate for Docker when Docker announced change in its subscription plan. If … Continue reading Podman, a secure alternative for Docker.

Pijul, the Git Alternative ???

Pijul is a distributed version control system written in Rust and is now available as a beta release .Similar to other version control systems, it is a tool that tracks changes in your files, can revert them, and can merge them with your coauthors’ changes.The architecture and design methodology of Pijul is influenced by the … Continue reading Pijul, the Git Alternative ???

Execute multi-container applications (Spring boot & PostgreSQL)

Use Case Run a dockerized spring boot application which has dependency on PostgreSQL docker containerInitialize the database with data while its getting createdMount an external volume so that the data does not get lost when container exits Solution:Step 1: Build a micro service using spring boot to be containerizedClone the following spring boot implementationhttps://github.com/rajeshsgr/order-svcThe example … Continue reading Execute multi-container applications (Spring boot & PostgreSQL)

What is Log4j Vulnerability ??

Log4j vulnerability was disclosed on December 9, 2021. It is a serious vulnerability in the java-based logging utility from Apache Software Foundation.This issue was discovered by Chen Zhaojun of Alibaba Cloud Security Team.The flaw has also been dubbed as “Log4Shell,”, and has the highest possible severity rating of 10Log4j is a very popular logging framework used … Continue reading What is Log4j Vulnerability ??

Mount volumes to persist data in local & initialize database in Docker

When a docker container is deleted, relaunching it from the image will start a fresh new container without any of the changes made in the previously running containerThis happens because when we create a new container from an image, we add a new writable layer on top of the underlying stack of layers present in … Continue reading Mount volumes to persist data in local & initialize database in Docker