Security Best Practices Security Best Practices Defensive programming is a style of programming that is particularly well suited to smart contracts. It emphasizes the following...
1 Introduction 1.1 What's new in Grails 4? 1.1.1 Updated Dependencies 1.1.2 Micronaut Parent Context 1 Introduction Many modern web frameworks in the Java space are more com...
Participate in Contributing 1. Participate in documentation contributions. 2. Participate in code contributions. 3. How to pick up an Issue and submit a Pull Request. Partici...
1. [Mandatory] Do not use API in log system (Log4j, Logback) directly. API in log framework SLF4J is recommended to use instead, which uses Facade pattern and is conducive to keep...
Background Release 4 with Single-Page Rendering Release 5 Powered by GWT Birth of Vaadin Release 6 The Major Revision with Vaadin 7 Vaadin Framework 8 with New Data Binding API...
6.2. Navigation in the Hierarchy 6.2. Navigation in the Hierarchy 6.2. Navigation in the Hierarchy Navigation among sub-sheets It is very easy thanks to the navigator tool acc...
Migrating to v1.0.0 Migrating to v1.0.0 The release of v1.0.0 brings with it some breaking changes, however it is relatively easy to migrate older projects. The steps required ...