Updated: 53 min 44 sec ago
For three days and nights the Java master did not emerge from his cubicle. On the fourth day the monks of the temple sent a novice to inquire after him.
The novice found the master at his whiteboard, contemplating a single dataflow diagram. The novice recognized it as a minor component of the vast system that the monks were contracted to maintain. Politely, the novice asked what the master was...
Originally written by Stéphane Nicoll on the Spring blog
Application events are available since the very beginning of the Spring framework as a mean for loosely coupled components to exchange information. One of the most well known usage of application events is the following:
Application events are available since the...
HTML6 notion, despite the fact that the HTML5 specification was planned to fully adop
HTML6 notion, despite the fact that the HTML5 specification was planned to fully adopt and achieve the broadest possible compatibility in 2014, now began to appear ideas about how this specification of the next generation looks like –...
This post first started as I was discussing my post “You Aren’t Doing Scrum If …” with a friend who had read the post and was worried that I might not fit in an organization that wasn’t doing all of Scrum. I’ve since had other conversations and as I’ve reflected on the topic, I still stand by my original post, because there are some fundamental properties of Scrum that you...
Mobile by Rob LauerWhen you develop an Android app, your users will justifiably be concerned if your app requests access to a myriad of device features and personal information. You are risking decreased app installations and increased suspicions of your app’s motives if you ask your users for personal data, contacts, access to their phone, SMS messages, and so on. In this article I hope to...
you’ve been studying complex systems you know what minor changes might
cause consequences of much greater proportions, sometimes causing some
effects that are not easily explained at first. I recently ran across a
great illustration of such behavior while doing MySQL benchmarks which I
thought would be interesting to share.I’m using a very simple benchmark – Sysbench 0.5 on Percona...
Originally Written by Justin Swanhart
The JSON functions work very well for manipulating individual JSON objects, but like all other functions, using JSON_EXTRACT in the WHERE clause will result in a full table scan. This means the functions are virtually useless for searching through large volumes of JSON data...
In a previous blog post, I described using XmlNodePrinter to present XML parsed with XmlParser in a nice format to standard output, as a Java String, and in a
This post looks at how groovy.xml.XmlUtil can be used to present GPathResult objects that results from slurping XML to standard output, as a Java...
Hey, can you drop by and take a look at something weird”. This is how I started to look into a support case leading me towards this blog post. The particular problem at hand was related to different tools reporting different numbers about the available memory.
Hey, can you drop by and take a look at something weird”. This is...
Akin’s eighth law of spacecraft design says
In nature, the optimum is almost always in the middle somewhere. Distrust assertions that the optimum is at an extreme point.
When I first read this I immediately thought of several examples where theory said that an optima was at an extreme, but experience said otherwise.
Sometimes it’s rational to walk away from something you’ve invested a great deal in.
It’s hard to imagine how investors could abandon something as large and expensive as a shopping mall. And yet it must have been a sensible decision. If anyone disagreed, they could buy the abandoned mall on the belief that they could make a profit.
I came across a git repo recently that output this message with every operation I did:
Your branch is based on 'origin/master', but the upstream is gone.
(use "git branch --unset-upstream" to fixup)
I was delivering a workshop at the time so I kinda snarled at it and carried on with what I was doing, but later I looked up what is happening. This occurs when a branch is tracking a branch...
A few weeks ago we introduced the ByteSized DevOps Podcast series. Initial feedback from the community was very strong, so we've decided to do some more. We plan to release a few every week or two. Let us know what topics you'd like to see covered.
Monitoring and Logging
A few weeks ago we introduced the ByteSized DevOps...
Facets are annoying. Mostly because they tend to be used relatively rarely, but when they are used, they are used a lot, and in many interesting ways. Because they are fairly rarely used, let me explain what they are first.
We want to show the users all the recent phones. We can do this using the following query:
It often happens that a new piece of functionality is discussed within a team and different developers have a different preference over how it should be implemented. “But what if in the future…” is a typical argument, as well as “that way it’s going to be more extensible”.
It often happens that a new piece of...
A few weeks ago I came across a tweet by Sean Taylor asking for a weather data set with a few years worth of recording and I was surprised to learn that R already has such a thing – the weatherData package.
Winner is: @UTVilla! library(weatherData) df <- getWeatherForYear("SFO", 2013) ggplot(df, aes(x=Date, y = Mean_TemperatureF)) + geom_line()
One of the killer-features of Hystrix is a low-latency, data-intensive and beautiful
One of the killer-features of Hystrix is a low-latency, data-intensive and beautiful dashboard:
The mobile revolution flipped testing on its side. Suddenly teams and testers had to think about connectivity in new ways, power sources, the impact of touch technology, system interruptions, bandwidth, and dropped connections — which was barely on the radar screen before.
The mobile revolution flipped testing on its side. Suddenly...
Recently Lukas JOOQ Eder posted and article about nested classes and their use. This is an interesting topic and his article is, as always, interesting and worth reading. There was only one slight statement I could not agree with and we had a brief reply chain leading to default method and why there can not be something like
Here I will consider two different ways of standing up a local instance of Netflix Eureka. If you are not familiar with Eureka, it provides a central registry where (micro)services can register themselves and client applications can use this registry to look up specific instances hosting a service and to make the service calls.Approach 1: Native Eureka LibraryThe first way is to simply use...