Table of Contents JCmd triggered debuggingSummaryProblemSolutionConclusion Almost to the day, one and a quarter years ago, I published my blog post called Level-up your Java Debugging Skills with on-demand Debugging. In this artucle, I wrote about multiple rarely known and …
-
Front End Debugging Part 2: Console.log() to the Max
Table of Contents Understanding Front-End Logging vs. Back-End LoggingLeveraging Console Log LevelsCustomizing Console Output with CSSStack Tracing with console.trace()Assertions for Design-by-ContractPrinting Tables for Clearer Data VisualizationCopying Objects to the ClipboardInspecting with console.dir() and dirxml()Counting Function CallsOrganizing Logs with GroupsChrome-Specific Debugging …
-
Front End Debugging Part 1: Not just Console Log
Table of Contents Instant Debugging with the debugger KeywordTriggering Debugging from the ConsoleDOM Breakpoints: Monitoring DOM ChangesXHR Breakpoints: Uncovering Hidden Network CallsSimulating Environments for DebuggingDebugging Layout and Style IssuesFinal Word Instant Debugging with the debugger Keyword Triggering Debugging from the …
-
The Art of Full Stack Debugging
Table of Contents Full stack development is often likened to an intricate balancing act, where developers are expected to juggle multiple responsibilities across the frontend, backend, database, and beyond. As the definition of full stack development continues to evolve, so …
-
Profile IntelliJ IDEA with its own profiler
Table of Contents The problemRecreate the environmentIntelliJ ProfilerAnalyzing the reportWhy such huge difference?The fix?Share the snapshot Other languages: Español 한국어 Português 中文 Just like my previous post, this one is going to be slightly meta. Obviously, you can use IntelliJ …
-
Foojay Podcast #58: How Java Developers Can Secure Their Code
Table of Contents VideoPodcast (audio only)GuestsJonathan VilaBrian VermeerErik CostlowContent Three years after Log4Shell caused a significant security issue, we still struggle with insecure dependencies and injection problems. In this podcast, we’ll discuss how developers can secure their code. I talked …
-
Trash Pandas Love Enterprise Java Garbage Code
If raccoons were software engineers, they would feel at home inside many enterprise systems. These systems are often full of unused and dead code.
-
Get Started With Allocation Profiling
Trouble finding memory leaks in a Java program? Learn how allocation profiling can reveal bugs and help you troubleshoot Java performance.
-
Failure is Required: Understanding Fail-Safe and Fail-Fast Strategies
Let’s discuss the upside of failure. Why you should seek failure, why failure is good and why avoiding failure can reduce the reliability of your application.
-
Mastering Serverless Debugging
Discover effective strategies for debugging serverless and AWS Lambda. Serverless can be painful, but not a bottomless pit of despair.
-
Wireshark & tcpdump: A Debugging Power Couple
Explore the power of Wireshark and tcpdump for network analysis in our comprehensive guide, unveiling tips for effective troubleshooting.