Capturing JVM TCP Traffic
Introduction Any time you have a distributed application, there is network communication involved. Capturing this network traffic can be instrumental[…]
Read moreThe Intersection of Identity, Integration, API Management, and Application Security.
Introduction Any time you have a distributed application, there is network communication involved. Capturing this network traffic can be instrumental[…]
Read moreIntroduction Building on the ideas introduced in the last article, a J2EE Application servers classloaders are explored in this installment.[…]
Read moreCheck out JSR 316 and this article. There is also a Slashdot.org thread on the subject.
Read moreIntroduction Classloaders are responsible for finding and loading classes that are requested in Java code executed inside a Java Virtual[…]
Read moreThe older articles predating the use of WordPress are slowly being copied over to the WordPress format. This provides a[…]
Read moreI always forget the quantity prefixes above “tera”. Even more interestingly, one rarely thinks about the numbers’ names. For example,[…]
Read moreIntroduction This article expands on the previous Virtual Memory post by exploring Resident Set Size growth while running a Java[…]
Read moreGoogle has released a Browser Security Handbook online. It can be found here. thinkmiddleware.com usually focuses on server-side topics, but[…]
Read moreIntroduction It has been a couple of weeks since the last article was published. Recently, I had to dig into[…]
Read moreIn the last article, JAAS was introduced. An authenticated calling-entity (perhaps a user), has a JAAS Subject. This JAAS Subject[…]
Read more