Updated: 12 min 37 sec ago
Recently I ran into very interesting problem which I thought would take me just a couple of minutes to solve: protecting Apache CXF (current release 3.0.1)/ JAX-RS REST services with Spring Security (c
Recently I ran into very interesting problem which I thought would take me just a couple of...
These are two concepts that I mix up occasionally - a WebApplicationInitializer and an ApplicationContextInitializer, and wanted to describe each of them to clarify them for myself.
These are two concepts that I mix up occasionally - a WebApplicationInitializer and an ApplicationContextInitializer, and wanted to describe each...
is a technique used to speed up functions. Memoization may be done
manually. It may also be done automatically. We can find many
examples of automatic memoization on Internet. In this article, I
will show how Java 8 makes it very easy to memoize functions.
Memoization is a technique used to speed up functions....
networking industry has a somewhat unique relationship with high
availability. For compute, storage, and applications, failures are
somewhat tolerable because they tend to be more isolated (a single
server going down rarely impacts the rest of the servers). However, the
network’s central role in connecting resources makes it harder to
contain failures. Because of this, availability...
At JavaOne we announced the Open IoT Stack for Java, a set of open source technologies that will make it easier for Java developers to build IoT solutions. The focus of the technology is to enable developers to connect and manage the devices, sensors and actuators that are part of their IoT solution. VisionMobile estimates there will need to be 4.5 million IoT developers by 2020.
I saw a tweet the other day about the eight things that keep talented employees:Talented employees stay when they're:
1 paid well
7 on a mission
8 having fun
I’m normally not a fan of reducing human behavior to a list like this, but it seems pretty complete, and...
I use Charles Proxy extensively for debugging all kinds of applications, and lately I've been using it more with mobile devices. One of the killer features of Charles is its ability to intercept SSL traffic. This is hard - and rightly so, it should be difficult to inspect SSL traffic!
I use Charles Proxy extensively for debugging all...
Have you moved your Hadoop jobs over to Yarn? Are you seeing the following NullPointerException coming out of your job?
Caused by: java.lang.NullPointerException
... 14 more
This appears to be a...
We were promised hover cars - this is true. But if our present reality is not the future you had once imagined, you can take comfort in the fact that something else is coming in place of hover cars: massive amounts of money.
We were promised hover cars - this is true. But if our present reality is not the future you had once...
I have talked about human filters and my plan for digital curation.
These items are the fruits of those ideas, the items I deemed worthy
from my daily reading. These items are a combination of tech business
news, development news and programming tools and techniques. You will
note that some of the formatting has changed, and that is due to the
change in my process.
In a previous post we learned how to run a Java application in a Gradle project. The Java source file with a main method is part of the project and we use the JavaExec task to run the Java code. We can use the same JavaExec task to run a Groovy script file.
In a previous post we learned how to run a Java application in a Gradle...
A serious vulnerability, CVE-2014-6271, being variably referred to as Shellshock or Shellshocked, was just reported in the Bourne-Again Shell (bash) that affects most *NIX-based systems.
A serious vulnerability, being eferred to as Shellshock, was just reported in the Bourne-Again Shell (bash) that affects most *NIX-based systems....
Ever since Hadoop’s second generation release in late 2013 brought it
closer to enterprise capability acceptance, the blogosphere has been
ringing with the sound of commentators proclaiming what was still
lacking, and what hurdles that yellow elephant needed to jump in order to truly burst into the mainstream.
Originally Written by Tony Barbagallo
Whether you’ve made the decision to launch an e-commerce platform in the future or you’re figuring out if your current configuration needs a facelift, choosing the database that will power your site is one of the most important decisions you’ll make.
Recently, I joined a software project with a Spring/Hibernate-based software stack, which is shipped in an SAAS-like manner, but the databases of the customers need to be separated from each other. Sounds easy for you? Ok let’s see what we have in detail.
1. Baseline study
Requirement: There is a software product that can be sold to different customers, but the provider wants to keep the...
Load-testing is not trivial. It’s often not just about downloading JMeter or Gatling, recording some scenarios and then running them. Well, it might be just that, but you are lucky if it is. And what may sound like “Captain Obvious speaking”, it’s good to be reminded of some things that can potentially waste time.
So, when you run the tests, eventually you will hit a bottleneck, and then...
It's a funny thing, testability. It's not really defined, or rather, it is defined poorly. If testable code is code we can test, that means all code is like that. We can test it through unit tests. If it's hard we can move to functional tests. And if all fails, we can do manual testing. Even performance testing exercises the code. There might be code that tests cannot exercise, but then why...
This week, DZone released its latest Refcard:
Today, DZone released its latest Refcard: Getting Started with Scala. If you're interested in learning more about Scala or sharpening your skills, we decided to dig into the DZone archives and find some of the most popular posts we've had on the topic.
What do people do when they run out of topics? They recycle previous
topics and create top 10 lists. Here is a list of the top 10 most
popular articles from the jOOQ blog:
What do people do when they run out of topics? They recycle previous topics and create top 10 lists. Here is a list of the top 10 most popular articles from the...
You’ve seen it in billion dollar movie franchises. You’ve read it in countless science fiction novels. You’ve heard it straight from the mouths of luminaries in the world of technology.
It’s the premise that one day, machines will become so intelligent that they will rise up against their human creators, and either destroy them outright or simply out-compete them to extinction.