site logo

HARSHAD's Dev Diary

Understanding Virtual Threads in Java (Project Loom) for High Concurrency Systems
Java, Spring Boot, AWS, Microservices

Understanding Virtual Threads in Java (Project Loom) for High Concurrency Systems

Introduction High concurrency has always been one of Java’s strongest use cases—and one of its toughest challenges. For years, Java developers have relied on thread pools, asynchronous frameworks, and reactive programming models to scale systems efficiently. While these approaches work, Read more

By HS, 5 daysFebruary 14, 2026 ago
Platform Engineering Essentials for Java-Centric Cloud Teams
Java, Spring Boot, AWS, Microservices

Platform Engineering Essentials for Java-Centric Cloud Teams

Introduction As cloud adoption matures, Java teams are facing a new challenge. While infrastructure is more powerful and flexible than ever, developers are often slowed down by fragmented tooling, inconsistent environments, and operational complexity. Simply “using the cloud” is no Read more

By HS, 2 weeksFebruary 7, 2026 ago
Architecting Java Applications for Edge and IoT Deployments
Java, Spring Boot, AWS, Microservices

Architecting Java Applications for Edge and IoT Deployments

The rapid rise of Internet of Things (IoT) devices and real-time processing demands has shifted computation closer to the data source — at the edge. Java, with its strong ecosystem, platform independence, and mature tooling, continues to be a powerful Read more

By HS, 3 weeksJanuary 31, 2026 ago
Choosing the Right Cloud Database: RDS, DynamoDB, Aurora, or DocumentDB?
Java, Spring Boot, AWS, Microservices

Choosing the Right Cloud Database: RDS, DynamoDB, Aurora, or DocumentDB?

Choosing the right database service is one of the most critical decisions when designing a cloud-native application. AWS offers a variety of purpose-built databases that cater to different performance, scalability, cost, and operational requirements. Among the most widely adopted options Read more

By HS, 4 weeksJanuary 24, 2026 ago
Eventual Consistency in Distributed Java Systems: Patterns and Pitfalls
Java, Spring Boot, AWS, Microservices

Eventual Consistency in Distributed Java Systems: Patterns and Pitfalls

Building modern applications inevitably means distributing components across multiple services and data stores. With microservices, cloud-native architectures, and globally distributed systems, strong consistency becomes difficult and expensive to maintain at scale. This is where eventual consistency emerges as a practical Read more

By HS, 1 monthJanuary 17, 2026 ago
How to Perform Technical Debt Assessment in Legacy Java Systems
Java, Spring Boot, AWS, Microservices

How to Perform Technical Debt Assessment in Legacy Java Systems

Legacy Java systems often represent years of enhancements, quick fixes, shifting business priorities, and evolving technology stacks. While these systems continue to deliver critical value, they also accumulate technical debt — making development slower, riskier, and expensive over time. A Read more

By HS, 1 monthJanuary 10, 2026 ago
2-Factor App Principles Applied to Java Applications
Java, Spring Boot, AWS, Microservices

Understanding Two-Factor Authentication in Java

What is 2FA? Two-Factor Authentication involves combining two different categories of identity evidence: Factor Type Examples Knowledge Password, PIN, security questions Possession OTP app, SMS code, hardware key (FIDO2, YubiKey) Inherence Face/voice recognition, fingerprints Why 2FA for Java Applications? Java Read more

By HS, 2 monthsJanuary 3, 2026 ago
Implementing Zero Trust Architecture in Java-Based Systems
Java, Spring Boot, AWS, Microservices

Implementing Zero Trust Architecture in Java-Based Systems

Zero Trust Architecture (ZTA) has become a fundamental approach for securing modern applications where users, services, and data are distributed across hybrid and cloud environments. Traditional perimeter-based security models are no longer sufficient as threats can originate from both outside Read more

By HS, 2 monthsDecember 27, 2025 ago
Audit Logging in Java Microservices: Techniques and Compliance Tips
Java Development, Software Architecture, Backend Engineering

Audit Logging in Java Microservices: Techniques and Compliance Tips

In the era of distributed systems, microservices introduce agility and scalability — but they also dramatically increase complexity in tracking user actions and system changes. Audit logging plays a crucial role in ensuring traceability, accountability, and compliance with regulations such Read more

By HS, 2 monthsDecember 20, 2025 ago
API Rate Limiting & Throttling in Spring Boot with Bucket4j
Java, Spring Boot, AWS, Microservices

API Rate Limiting & Throttling in Spring Boot with Bucket4j

As modern systems continue to embrace microservices, public APIs, and high-volume traffic, controlling how consumers access APIs becomes critical. Without proper rate limiting, even a single misbehaving client can overwhelm your application—leading to degraded performance, increased latency, and potential downtime. Read more

By HS, 2 monthsDecember 13, 2025 ago

Posts pagination

1 2 … 6 Next
Hestia | Developed by ThemeIsle
site logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}