List/Grid Author Archives Subscribe to the RSS feed of Bear Giles

spring-interview-questions-answers

Project Student: Business Layer

This is part of Project Student. Other posts are Webservice Client With Jersey, Webservice Server with Jersey and Persistence with Spring Data. The third layer of the RESTful webapp ...
spring-interview-questions-answers

Project Student: Persistence With Spring Data

This is part of Project Student. Other posts are Webservice Client With Jersey, Webservice Server with Jersey and Business Layer. The final layer of the RESTful webapp onion is the ...
java-logo

Project Student: Webservice Server with Jersey

This is part of Project Student. Other posts are Webservice Client With Jersey, Business Layer and Persistence with Spring Data. The second layer of the RESTful webapp onion is the ...
java-interview-questions-answers

Project Student: Webservice Client with Jersey

This is part of Project Student. Other posts are Webservice Client with Jersey, Business Layer and Persistence with Spring Data. The first layer of the RESTful webapp onion is the webservice ...
spring-interview-questions-answers

What is Spring Data?

(This is related to Project Student and I will revisit this topic later.) Spring Data came up in passing in several recent interviews. What is Spring Data? To answer that let’s consider ...
career-logo

Revisiting Certifications

The job market is currently in a lull so I’ve been talking to a few new recruiters and gotten a better sense of what certifications mean today. Your mileage may vary, of course, since ...
apache-maven-logo

Creating Vulnerability Assessment Artifacts Using Maven Assembly

This article will discuss using Maven Assembly to create artifacts that can be provided to third-party vulnerability assessment sites (e.g., Veracode) for review. Static Analysis for ...
spring-interview-questions-answers

Spring-injected Beans in JPA EntityListeners

In Database Encryption Using JPA Listeners I discussed transparent encryption using a JPA EntityListener. This approach was transparent in the sense that the JPA Entity was (nearly) ...
java-logo

Creating Password-Based Encryption Keys

This article discusses creating password-based encryption PBE keys. First a reminder of earlier points – as a rule you should, when practical, use the PBE key as a master key that ...
java-interview-questions-answers

Database Encryption Using JPA Listeners

I recently had to add database encryption to a few fields and discovered a lot of bad advice out there. Architectural Issues The biggest problem is architectural. If your persistence ...
Java Code Geeks and all content copyright © 2010-2015, Exelixis Media Ltd | Terms of Use | Privacy Policy | Contact
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.
Do you want to know how to develop your skillset and become a ...
Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you two of our best selling eBooks for FREE!

Get ready to Rock!
You can download the complementary eBooks using the links below:
Close