mkheck / ai202Links
Next-level AI for Java developers
☆18Updated 5 months ago
Alternatives and similar repositories for ai202
Users that are interested in ai202 are comparing it to the libraries listed below
Sorting:
- Sample applications to demonstrate Observability concepts☆298Updated last month
- ☆87Updated 3 months ago
- ☆60Updated last year
- ☆374Updated last year
- Samples showing how to build multitenant applications with Java and Spring Boot☆151Updated last year
- Spring AI Workshop☆188Updated last month
- Demo codebase for our Spring I/O 2025 Barcelona talk☆49Updated 5 months ago
- Spring Security 5.5 From Taxi To Takeoff☆70Updated 3 years ago
- Sample code for the Spring Modulith Deep Dive workshop / training☆94Updated 3 months ago
- hi, Spring fans! in this installment we look at how to use the Spring Authorization Server.☆36Updated last year
- Efficient containers with Spring Boot 3.3, Java 21, CDS and Virtual Threads☆55Updated last year
- Chat with an AI that's aware of your documents.☆84Updated last year
- ☆11Updated last year
- Spring Boot HTTP Clients provides zero-boilerplate auto-configuration for WebClient and Spring 6 HTTP Interface based HTTP clients in a S…☆110Updated 2 years ago
- ☆122Updated 2 weeks ago
- Source code for the 'Taming Thymeleaf' book☆135Updated 2 years ago
- ☆59Updated last year
- the workshop☆60Updated last year
- A command-line chatbot built with Spring AI that demonstrates Retrieval-Augmented Generation (RAG) and conversational memory capabilities…☆61Updated last month
- ☆148Updated last week
- spring-security-enterprise-authorization-server☆116Updated 2 years ago
- ☆38Updated 2 years ago
- Vaadin UIs for Spring AI☆28Updated 4 months ago
- A sample application for a modern Spring Cloud architecture☆25Updated 5 months ago
- Spring Integration implementations for well-known Microservices Patterns☆144Updated 2 years ago
- ☆220Updated last week
- ☆19Updated 4 months ago
- Jakarta EE Examples☆150Updated last year
- Java backend application using Spring-security to implement JWT based Authentication and Authorization☆117Updated last year
- ☆50Updated last year