Archive: 2024

Hibernate performance

Posted on by  
Ronald Koster

Hibernate is a great Object Relational Mapping (ORM) library for accessing data in a relational database. It is one of the leading implementations of Java Persistence (formerly known as JPA). Using JPQL (based on HQL, which is still a nice syntax guide) one can access and update the data in the database through your ORM objects in a simplified SQL way. However, when implemented incorrectly one can run into serious performance problems. They can all be avoided though. Here are some important things to consider to make your queries performant.

Continue reading →

Why you should use Lombok

Posted on by  
Jacob van Lingen

It’s the year 2023. JDriven colleagues have gathered to discuss the new trends and deprecations of our work to put on the latest TechRadar. Once everybody is seated, everyone contributes their latest opinions. Very soon discussions run high. Lombok is dropped at the table of discussion as well. After some debate, it is decided. Lombok is put on HOLD!

Continue reading →

Navigating NIS2: Essential Preparations and Implications for Your Organization

Posted on by  
Mike van der Bijl

NIS2 is on the horizon, but what should you or your organization do? Which measures need to be taken? Unfortunately the exact guidelines are not known and leave us in a state of uncertainty. The Dutch Ministry of Justice and Security is working on translating NIS2 into the Cybersecurity Act, which will replace the current Network and Information Systems Security Act (Wbni). The new law was initially scheduled end of 2024 and required all companies and organizations to take steps to comply. The start date has been postponed to early 2025.

Continue reading →

Securing the Future: DevSecOps and OWASP SAMM in the Era of technical revolution

Posted on by  
Mike van der Bijl

In the era of unprecedented digitization, where technology deeply penetrates into our society and organizations, software has become the driving force behind progress. No matter which industry, almost every organization is increasingly dependent on software applications. The goal? Optimizing business processes, providing seamless user experiences, and creating new opportunities. The crucial detail of this revolution: high-quality software is essential for the success and resilience of businesses and organizations.

However, this is the part where we encounter an interesting paradox: digitization is not only an enormous opportunity, also a threat. Cyber threats are evolving at an alarming rate. Attackers constantly seek vulnerabilities to infiltrate systems and steal sensitive data. Ensuring the security of software is no longer a choice, but an absolute necessity.

Continue reading →

Mastering Maven: Disable Logging Of Progress Downloading Artifacts

Posted on by  
Hubert Klein Ikkink

When Maven needs to download artifacts from a remote repository, it logs the progress of the download. This can lead to a lot of noise in the output. Luckily, we can suppress the logging of the download progress. Since Maven 3.6.1. we can use the command-line option --no-transfer-progress to disable the logging of the download progress. There is also a short version of the option: -ntp.

Continue reading →

Helidon SE Helpings: Default Configuration Sources During Testing

Posted on by  
Hubert Klein Ikkink

In a previous blog post we learned about the default input sources that are used by Helidon SE. The list of input sources is different based on which artifacts are on the classpath of our application. When we write tests for code in our application that uses the default configuration created by Config.create() we must take into account that different input sources are used. Also here it is based on the artifacts that are on the classpath. That means that different files with configuration data are loaded, eg. a file application-test.conf when we have the artifact helidon-config-hocon and a file application-test.yml if the artifact helidon-config-yaml is on the classpath.

Continue reading →

Wat wil je worden als je later groot bent?

Posted on by  
Juliëtte Veldhuis

Blogtober, een jaarlijks terugkerend initiatief waarin onze collega’s elke (werk)dag in oktober (veelal technische) blogs delen! Echt iets voor onze developers, mensen vanuit de inhoud, die hun kennis op deze manier met de wereld delen. Tot vorige week mijn collega Erik Pronk als ‘geintje met een seintje’ liet vallen dat hij nog wacht op een blog van mij. Mijn eerste gedachte: grappig, niks voor mij. Mijn tweede gedachte: challenge accepted!

Continue reading →

GKE with terraform and helm

Posted on by  
Dimitris Androutsos

In this tutorial we will deploy a Spring Boot applications to GKE. The application connects to a cloud Postgres database and exposes some REST endpoints. The required infrastructure is created with Terraform and the code is deployed to GKE with Helm. Helm is also deployed by Terraform.

  1. Java 17 installed

  2. Maven installed

  3. Docker installed

  4. gcloud installed

  5. A GC project setup with the billing configured

Continue reading →

shadow-left