Latest Java Articles

Learning from Failure

Failing is a part of life and business. Everyone fails, but the impact of that failure is what matters. Learn some of the insights, tips, and comments gleaned from Fail Fest 2014.

Top Down with Memorization Complexity

Learn how to construct practical algorithms using a top down approach with memorization, including a walk-through example explaining how to write a recursive top down algorithm and reduce hardness and complexity.

All About Exception Handling in Java

In Java, Exceptions are either Checked Exceptions or Unchecked Exceptions. Checked Exceptions are checked by the Compiler and the compiler forces you to decide on whether you want to handle them or not. Unchecked Exceptions are not supposed to be handled; they should be fixed when found to occur in certain conditions in a program. Read on to learn more.

Tomorrow's Web Standards

Paul Avery offers an overview of upcoming web standards, including HTML5, CSS3 and newer JavaScript updates.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Working with Parallel LINQ

Working with Parallel LINQ

LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date