Spring Batch Job Flow

Spring Batch Job Flow Using a JobExecutionDecider

Jonny Hackett Articles, Development Technologies & Tools, Java, Spring, Spring Batch, Tutorial 2 Comments

In this tutorial for Spring Batch, we’re going to take a look at Programmatic Flow decisions in a Spring Batch job using Spring’s JobExecutionDecider. Spring Batch is a pretty powerful framework and this is another useful tool to have in your Spring Batch toolbox.

To demonstrate, I’ll use a scenario that came up recently while working on my clientโ€™s project. After explaining the situation and my goals, Iโ€™ll jump into a detailed, step-by-step guide. Letโ€™s get started!

Learn Svelte by Making a Word Puzzle: Part 2, Reactivity

James Slaughter Articles, Development Technologies & Tools, JavaScript, Learning Svelte, Tutorial Leave a Comment

So far in this multi-part series, we’ve used Svelte to make the frontend of a Word Puzzle Game, but it does not receive user input, yet. That doesn’t make for a very fun game!

In Part 2 of this series, we’re going to make our game a little more functional. Weโ€™ll accomplish the following tasks: (1) allow users to guess a word, (2) manage state for the guesses, and (3) track the correctness of each letter in each guess.

By the end of this post, we will be one step closer to having a Svelte-based, fully functional Word Puzzle Game! Without further ado, letโ€™s get started.

Application Security

Top Security Mistakes to Avoid in AppDev

Zach Gardner All Industries, Architecture, Articles, Financial, Healthcare, Insurance, Manufacturing, Security, Spring, Supply Chain & Logistics Leave a Comment

Developing custom applications is one of the hardest professional endeavors, and making them secure is even harder. Malicious actors are constantly changing tactics and strategies, which, unfortunately, makes it impossible to completely eliminate any security threat.

There needs to be a balance between delivering features quickly to meet business objectives and mitigating security risks. Thankfully, these two goals are not mutually exclusive. This blog post dives into the top mistakes that can be made while developing custom applications.

These recommendations are different from what would commonly be seen in an OWASP list, and they should be used in addition to whatever security practices and procedures are already in place by an organizationโ€™s infosec department. These recommendations are also written from an application architectโ€™s (rather than an enterprise infrastructure) perspective, so most of them arenโ€™t covered by existing security checklists.