List/Grid Author Archives Subscribe to the RSS feed of Bear Giles

spring-logo

Project Student: Sharding Integration Test Data

This is part of Project Student. Other posts are Webservice Client With Jersey, Webservice Server with Jersey, Business Layer and Persistence with Spring Data. All of the integration ...
spring-logo

Project Student: Business Layer

This is part of Project Student. Other posts are Webservice Client With Jersey, Webservice Server with Jersey and Persistence with Spring Data. The third layer of the RESTful webapp ...
spring-logo

Project Student: Persistence With Spring Data

This is part of Project Student. Other posts are Webservice Client With Jersey, Webservice Server with Jersey and Business Layer. The final layer of the RESTful webapp onion is the ...
java-logo

Project Student: Webservice Server with Jersey

This is part of Project Student. Other posts are Webservice Client With Jersey, Business Layer and Persistence with Spring Data. The second layer of the RESTful webapp onion is the ...
enterprise-java-logo

Project Student: Webservice Client with Jersey

This is part of Project Student. Other posts are Webservice Client with Jersey, Business Layer and Persistence with Spring Data. The first layer of the RESTful webapp onion is the webservice ...
spring-logo

What is Spring Data?

(This is related to Project Student and I will revisit this topic later.) Spring Data came up in passing in several recent interviews. What is Spring Data? To answer that let’s consider ...
career-logo

Revisiting Certifications

The job market is currently in a lull so I’ve been talking to a few new recruiters and gotten a better sense of what certifications mean today. Your mileage may vary, of course, since ...
apache-maven-logo

Creating Vulnerability Assessment Artifacts Using Maven Assembly

This article will discuss using Maven Assembly to create artifacts that can be provided to third-party vulnerability assessment sites (e.g., Veracode) for review. Static Analysis for ...
spring-logo

Spring-injected Beans in JPA EntityListeners

In Database Encryption Using JPA Listeners I discussed transparent encryption using a JPA EntityListener. This approach was transparent in the sense that the JPA Entity was (nearly) ...
java-logo

Creating Password-Based Encryption Keys

This article discusses creating password-based encryption PBE keys. First a reminder of earlier points – as a rule you should, when practical, use the PBE key as a master key that ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.

Sign up for our Newsletter

15,153 insiders are already enjoying weekly updates and complimentary whitepapers! Join them now to gain exclusive access to the latest news in the Java world, as well as insights about Android, Scala, Groovy and other related technologies.

As an extra bonus, by joining you will get our brand new e-books, published by Java Code Geeks and their JCG partners for your reading pleasure! Enter your info and stay on top of things,

  • Fresh trends
  • Cases and examples
  • Research and insights
  • Two complimentary e-books