Memory management remains the primary factor for application performance in enterprise Java environments. Between 2017 and 2025, the ecosystem shifted from manual tuning to architectural selection. Industry data suggests that 60 percent of Java performance issues and 45 percent of production incidents in distributed systems stem from suboptimal Garbage Collection (GC) behavior. This guide provides a strategic framework for selecting collectors based on workload characteristics. It covers the transition from legacy collectors to Generational ZGC, analyzing trade-offs regarding throughput, latency, and hardware constraints with mathematical precision.
-
First Experiments with Java on the LattePanda IOTA: An Alternative to Raspberry Pi?
Table of Contents Unboxing the LattePanda IOTAAssemblySetting Up The BoardFirst Boot: Windows Pre-installedInstalling UbuntuSetting Up Java DevelopmentTesting Java, JavaFX, and Pi4JHelloWorld with JBangJavaFX TestPi4J TestPerformance CheckConclusion After years of experimenting with Raspberry Pi boards, Java, JavaFX, and Pi4J to control …
-
Java, What’s Old? Part III: I/O
Let’s see now the less known old classes related to I/O.
-
Java 21+ on Raspberry Pi Zero 2 is Back In Business
Table of Contents Reproducing The ProblemFixed with Latest OpenJDK 21 and 25Conclusion As described before on Java 21+ Not Working on Raspberry Pi Zero 2, a problem appeared to execute Java code on the Raspberry Pi Zero 2 with OpenJDK …
-
Foojay Podcast #83: OpenJDK Evolutions plus Tips and Tricks
Table of Contents YouTubePodcast AppsContent Welcome to another episode of the Foojay Podcast! Just like in the previous episode, I bring you conversations from two of Europe’s premier Java conferences – Devoxx in Belgium and JFall in the Netherlands. At …
-
Foojay Podcast #82: OpenJDK Projects (Leyden, Babylon, Panama) and TornadoVM
Table of Contents Podcast AppsContent In this Foojay Podcast, we’re diving deep into some of the most exciting developments happening within the OpenJDK and TornadoVM projects. At the Devoxx and JFall conferences, we spoke with several speakers and visitors about …
-
Java Security Starts with the JVM
Table of Contents 1. Security starts with timely, predictable updates Azul does it differently Why this matters 2. Long-term support = long-term security The problem Azul’s solution 3. A secure software supply chain How Azul secures the supply chain Key Takeaway 4. Beyond the JDK: proactive insights Why this matters 5. …
-
JC-AI Newsletter #7
Fourteen days have passed, and it is time to present a fresh collection of readings that could influence developments in the field of artificial intelligence. Beyond focused tutorials that can enhance your understanding of AI applications, this newsletter concentrates on …
-
What Happens When 10,000 JVMs Collaborate in One Production Environment
Table of Contents Limitations of OpenJDK How Azul Platform Prime removes the limits of traditional JVMs A large global enterprise achieved a performance and efficiency milestone, running 10,000 Java Virtual Machines (JVMs) that collaborate and share optimizations with one another, using …
-
Design Patterns Update to JDK25
Table of Contents JEPs LTS journey (focus on coding but not only):References: The information technology landscape is changing rapidly. This is not only due to the utilization of AI and new methodologies [8], or business requirements trying to keep up, …
-
Here’s Java 25, Ready to Perform to the Limit
Table of Contents JEP OverviewNew featuresCore LibsHotSpotSecurity LibsJava Flight RecorderRepreviews and FinalizationsJEP 505: Structured Concurrency (Fifth Preview)JEP 506: Scoped ValuesJEP 507: Primitive Types in Patterns, instanceof, and switch (Third Preview)JEP 508: Vector API (Tenth Incubator)JEP 510: Key Derivation Function APIJEP …