Home » Author Archives: Bear Giles (page 3)

Author Archives: Bear Giles

Project Student: Sharding Integration Test Data

spring-interview-questions-answers

This is part of Project Student. Other posts are Webservice Client With Jersey, Webservice Server with Jersey, Business Layer and Persistence with Spring Data. All of the integration tests until now have used an in-memory embedded database that did not retain information from run to run. This changes when we fully integrate the REST server with a “real” database server ...

Read More »

Project Student: Business Layer

spring-interview-questions-answers

This is part of Project Student. Other posts are Webservice Client With Jersey, Webservice Server with Jersey and Persistence with Spring Data. The third layer of the RESTful webapp onion is the business layer. This is the guts of the application – well-written persistence and webservice layers are constrained but anything goes in the business layer. We’re only implementing CRUD ...

Read More »

Project Student: Persistence With Spring Data

spring-interview-questions-answers

This is part of Project Student. Other posts are Webservice Client With Jersey, Webservice Server with Jersey and Business Layer. The final layer of the RESTful webapp onion is the persistence layer. There are two philosophies for persistence layers. One camp sees the database as a simple store and wants to keep this layer extremely thin. The other camp knows ...

Read More »

Project Student: Webservice Server with Jersey

java-logo

This is part of Project Student. Other posts are Webservice Client With Jersey, Business Layer and Persistence with Spring Data. The second layer of the RESTful webapp onion is the webservice server. It should be a thin layer that wraps calls to the business layer but does not do significant processing of its own. This post has a lot of ...

Read More »

Project Student: Webservice Client with Jersey

java-interview-questions-answers

This is part of Project Student. Other posts are Webservice Client with Jersey, Business Layer and Persistence with Spring Data. The first layer of the RESTful webapp onion is the webservice client. It can be used to mimic web pages containing AJAX content or by programmatic users of the webapp. N.B., the latter might include other webapps, e.g., if you ...

Read More »

What is Spring Data?

spring-interview-questions-answers

(This is related to Project Student and I will revisit this topic later.) Spring Data came up in passing in several recent interviews. What is Spring Data? To answer that let’s consider the standard approach to persistence – all access is made via Data Access Objects (DAOs). This completely isolates the rest of the system from the specific details of ...

Read More »

Revisiting Certifications

career-logo

The job market is currently in a lull so I’ve been talking to a few new recruiters and gotten a better sense of what certifications mean today. Your mileage may vary, of course, since this will also depend on the actual position (e.g., junior vs. senior), local market expectations, etc. First, one recruiter/placement firm emphasizes that its candidates are certified. ...

Read More »

Creating Vulnerability Assessment Artifacts Using Maven Assembly

apache-maven-logo

This article will discuss using Maven Assembly to create artifacts that can be provided to third-party vulnerability assessment sites (e.g., Veracode) for review. Static Analysis for Bugs vs. Vulnerability Assessments At this point everyone is aware of findbugs and uses it religiously, right? Right? Findbugs uses static analysis to find bugs. More precisely, it uses static analysis to find bugs ...

Read More »

Spring-injected Beans in JPA EntityListeners

spring-interview-questions-answers

In Database Encryption Using JPA Listeners I discussed transparent encryption using a JPA EntityListener. This approach was transparent in the sense that the JPA Entity was (nearly) entirely unaware that encryption was occurring and the JPA EntityListener itself was unaware of the details. There was one big problem. EJB3 can inject resources into an EntityListener. Spring cannot. (N.B., I am ...

Read More »

Creating Password-Based Encryption Keys

java-logo

This article discusses creating password-based encryption PBE keys. First a reminder of earlier points – as a rule you should, when practical, use the PBE key as a master key that is used solely to unlock a working key. This has three major benefits: You can have multiple passwords, e.g., an escrowed recovery key, You can change your password without ...

Read More »
Do you want to know how to develop your skillset and become a ...

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!
Get ready to Rock!
To download the books, please verify your email address by following the instructions found on the email we just sent you.

THANK YOU!

Close