Featured FREE Whitepapers

What's New Here?

java-interview-questions-answers

XML to Avro Conversion

We all know what XML is right?  Just in case not, no problem here is what it is all about.                   <root> <node>5</node> </root> Now, ...
software-development-2-logo

Use KISS consciously

A while ago I wrote about few design paradigms to keep in mind when designing and implementing a certain component. Among them, the famous K.I.S.S. (Keep It Simple, Stupid) kept on ...
software-development-2-logo

Verifying Secure Password Storage Externally

Many websites (including big ones like Adobe, Yahoo, LinkedIn, Gawker, etc.) store user passwords insecurely. Either in plain text, or encrypted (reversible), or using a broken or brute-forceable ...
software-development-2-logo

Software Version Controlling Best Practices

Always use version controlling Use version controlling/source control even if one developer exists. This issue brings change tracking and versioning of the application continuously. ...
java-logo

Java 8: Lambda Expressions vs Auto Closeable

If you used earlier versions of Neo4j via its Java API with Java 6 you probably have code similar to the following to ensure write operations happen within a transaction:                   public ...
java-logo

An open source JVM Sampling Profiler

It’s a well known deficiency of most existing sampling Java profilers that their collection of stack traces has to happen at a safe point. This is the case for profilers such ...
agile-logo

Cost of Delay Due to Other Teams’ Delay, Part 5

Imagine you have a large program, where you have several teams contributing to the success of one business deliverable. You are all trying to achieve a specific date for release. One ...
apache-activemq-logo

Lessons learned: ActiveMQ, Apache Camel and connection pooling

Every once in a while, I run into an interesting problem related to connections and pooling with ActiveMQ, and today I’d like to discuss something that is not always very clear and ...
java-logo

Allocating memory for the JVM: a case study

This post is about a recent performance tuning exercise. As always, these start with vague statements about symptoms. This time the devil took the form of “The application is slow ...
java-logo

Synthetic and bridge methods

If you have ever played with reflection and executed getDeclaredMethods() you may have been surprised. You may get methods that are not present in the source code. Or, perhaps, you ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use | Privacy Policy | Contact
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.
Do you want to know how to develop your skillset and become a ...
Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you two of our best selling eBooks for FREE!

Get ready to Rock!
You can download the complementary eBooks using the links below:
Close