Steve Poole

Avatar photo

Steve Poole

HeroDevs

Do you want your ad here?

Contact us to get your ad seen by thousands of users every day!

[email protected]
Likes 17
Avatar photo
Avatar photo

Joe Kuhel

Author

Senior Software Engineer @ HeroDevs, Inc. | Expert in security in the Java ecosystem and cloud technologies. Passionate about Spring, open source, and the technologies that power modern software.

Learn More
Avatar photo
Avatar photo

Joe Kuhel

Author

Senior Software Engineer @ HeroDevs, Inc. | Expert in security in the Java ecosystem and cloud technologies. Passionate about Spring, open source, and the technologies that power modern software.

Learn More
Comments 1
Shares 1
Articles 17
Views 48,3K

All 1 Comments

Latest post

Crossing the River Styx: Spring Boot 3.5 and the Zombie Dependency Problem

Table of Contents The CVE Blind SpotThe River StyxThe Rules Changed. The Habits Didn't.What This Looks Like in PracticeWhen Dependencies Become ZombiesSpring Boot 3.5: The Next CrossingWe've Seen This Film BeforeThe Window Is Open. For Now.The Map, Not Just the ...

Spring I/O 2026: Field Notes from Barcelona

Table of Contents Agents everywhereRod Johnson on the roadThe sessions that didn’t get the main stageA few things from the HeroDevs cornerThe documentaryWhat I’m taking home Spring I/O 2026 wrapped in Barcelona on Wednesday. Three days at the Palau de …

Why Java Developers Over-Trust AI Suggestions

Table of Contents Your Brain Is Working Against YouWhere Java Developers Are Most ExposedYour Toolchain Catches Some of ThisMake the Model Show Its WorkingThe Confidence TaxSources This article is adapted from The Confidence Trap, part of the “2026 Supply Chain …

Grails Isn’t Done Yet (Part 2): EOL, Spring Boot, and What Comes Next

Table of Contents The inflexion pointWhere Grails versions stand todayThe Spring Boot gravitational pullWhat the risk actually looks likeThe practical middle groundUpgrade is an action, not a strategySummaryResources In the companion article to this one, I looked at the revitalisation …

Grails Isn’t Done Yet (Part 1): Inside the ASF Reboot

Table of Contents The technology we stop seeingWhy the Apache move mattersTwenty years of changing handsEighteen months of migrationOne hundred repositories become nineBeyond the code: licensing and complianceThe modernisation you might have missedWhat Grails 7 actually shipsGrails 8 and the …

The Shai-Hulud Cyber Worm and more thoughts on supply chain attacks.

Table of Contents first, a word about ecosystemsSpeed first.Still optimised for speed.Open Source Security Doesn’t Work the Way You Think It DoesThis matters more than people realise.The Inevitable AI in the MixEnter Shai-HuludThen it pivoted.The defining shift.This Is Also What …

FOSDEM 2026 and the Open Source Firehose

Table of Contents The Chaos and the CrowdFOSDEM isn’t a conference so much as a live snapshot of the open source ecosystem in action.Navigating the FirehoseSo why go in person when you could watch from your sofa?Trends and Tensions in …

Security Doesn’t Start at Liftoff

Table of Contents Are you sitting comfortably?The CVE is (almost) not importantThe Inversion of the Security TimelineHabit vs. HypeThe Flawed Assumption of Loud AlertsPrioritising Changes Over StoriesThe main timelineAre we done?How the message dilutesA common scenerioWhat This Means to You …

The Real Mechanics of Vulnerabilities in an Upstream/Downstream, Topsy-Turvy EOL World

Table of Contents In this article you’ll learnIntroductionWhat this article is aboutBack in the real worldCode FlowsA different type of waterfallUnpredictable as the weather?The idealised workflowThe ethics of vulnerability patchingUnreported is not safeDownstream’s responsibility to the ecosystemEnd of Life software …

Time to panic? AI and Cybercrime legislation is on your doorstep now

Table of Contents Accountability Cannot Be OutsourcedThe AI Act: Europe’s Regulatory BeaconThe US: Executive Orders and Sector-Specific PushUK and China: Innovation vs ControlFollowing the tech …What’s Next? As we settle into 2025, legislation around AI and cybercrime is no longer …

Thinking differently about testing

Table of Contents 10x Insights on a different view of quality assuranceBugs costWhen’s the best time to find bugs?How should we really test?Changing the status quoThree challenges to overcomeWe have almost all the piecesTesting is multiI-dimensionalTortoise and the Hare vs …

Join the Community

Be a Part of Our Network

Mastodon

Subscribe to foojay updates:

https://foojay.io/today/author/steve-poole/feed/
Copied to the clipboard