Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Fast, secure JSON library with tight ZIO integration
...Extreme performance is achieved by decoding JSON directly from the input source into business objects (docs/inspired by plokhotnyuk). Although not a requirement, the latest advances in Java Loom can be used to support arbitrarily large payloads with near-zero overhead. Best-in-class security is achieved with an aggressive early exit strategy that avoids costly stack traces, even when parsing malformed numbers. Malicious (and badly formed) payloads are rejected before finishing reading.
...Also, there isn't a better way to describe objects encoded in JSON than "things". Finally, we get a catchy slogan. Jawn was designed to parse JSON into an AST as quickly as possible. Currently, Jawn is competitive with the fastest Java JSON libraries (GSON and Jackson) and in the author's benchmarks, it often wins. It seems to be faster than any other Scala parser that exists (as of July 2014).
Scala macros for compile-time generation of safe and ultra-fast JSON
Scala macros for compile-time generation of safe and ultra-fast JSON codecs. This library had started from macros that reused jsoniter (json-iterator) for Java reader and writer but then the library evolved to have its own core of mechanics for parsing and serialization. The idea to generate codecs by Scala macros and main details was borrowed from Kryo Macros and adapted for the needs of the JSON domain. Validate parsed values safely with the fail-fast approach and clear reporting, provide configurable limits for suboptimal data structures with safe defaults to be resilient for DoS attacks, generate codecs that create instances of a fixed set of classes during parsing to avoid RCE attacks.