Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

and many more ....

 

Show your dev skills and win with CoderPower

coderpower-logo

CoderPower and Salesforce1 launch a series of coding challenges in the USA and in Europe. CoderPower is a platform where developers from all around the globe compete to get points and win prizes. After a summer competition with Salesforce1 and a constest with IBM in September, Salesforce1 launches a new series of challenges. The aim is simple: try to be ...

Read More »

5 Handy Tips From JBoss BPM Suite For Release 6.0.3

jboss-jbpm-logo

Last week Red Hat released the next version of JBoss BPM Suite, labeled 6.0.3 and it is available in their Customer Portal for those with a subscription. If you are curious as to what is new in this release, see the release notes and the rest of the documentation online in the Customer Portal. What we are looking for are ...

Read More »

WSO2 Identity Server 5.0.0 Authentication Framework

software-development-2-logo

The WSO2 Identity Server 5.0.0 takes the identity management into a new direction. No more there will be federation silos or spaghetti identity anti-patterns. The authentication framework we introduced in IS 5.0.0 powers this all. The objective of this blog post is to introduce high-level concepts associated with the authentication framework. Inbound Authenticators The responsibility of inbound authenticators is to ...

Read More »

Akka Notes – Actor Messaging – Request and Response – 3

akka-logo

Last time when we saw Actor messaging, we saw how fire-n-forget messages are sent (Meaning, we just send a message to the Actor but don’t expect a response from the Actor). Technically, we fire messages to Actors for its side-effects ALL THE TIME. It is by design. Other than not responding, the target Actor could ALSO do the following with ...

Read More »

Project Lifecycle in Teamed.io

agile-logo

In addition to being a hands-on programmer, I’m also co-founder and CTO of Teamed.io, a custom software development company. I play the role of a technical and management leader in all projects we work with. I wrote this article for those who’re interested in hiring me and/or my team. This article will demonstrate what happens from day one until the ...

Read More »

Control Sphero using Temperature Sensor in Android

android-logo

One of the most interesting topic around Android it is how we can connect our smart phones to other devices or smart devices to get information from them or to control them. In this post I want to introduce a new way to use our Android phone and explain how we can use it to control Sphero ball. Introduction In ...

Read More »

Stateless Spring Security Part 1: Stateless CSRF protection

spring-interview-questions-answers

Today with a RESTful architecture becoming more and more standard it might be worthwhile to spend some time rethinking your current security approaches. Within this small series of blog posts we’ll explore a few relatively new ways of solving web related security issues in a Stateless way. This first entry is about protecting your website against Cross-Site Request Forgery (CSRF). ...

Read More »

The future is Micro Service Architectures on Apache Karaf

java-interview-questions-answers

This is a guest blog post by Jamie Goodyear (blog, @icbts). He is an open source advocate, Apache developer, and computer systems analyst with Savoir Technologies; he has designed, critiqued, and supported architectures for large organizations worldwide. He holds a Bachelor of Science degree in Computer Science from Memorial University of Newfoundland.       Jamie has worked in systems administration, ...

Read More »

Identity Anti-patterns: Federation Silos and Spaghetti Identity

java-interview-questions-answers

A recent research done by the analyst firm Quocirca confirms that many businesses now have more external users than internal ones: in Europe 58 percent transact directly with users from other businesses and/or consumers; for the UK alone the figure is 65 percent. If you look at the history, most enterprises grow today via acquisitions, mergers and partnerships. In U.S ...

Read More »

DI Containers are Code Polluters

java-interview-questions-answers

While dependency injection (aka, “DI”) is a natural technique of composing objects in OOP (known long before the term was introduced by Martin Fowler), Spring IoC, Google Guice, Java EE6 CDI, Dagger and other DI frameworks turn it into an anti-pattern. I’m not going to discuss obvious arguments against “setter injections” (like in Spring IoC) and “field injections” (like in ...

Read More »
Do you want to know how to develop your skillset and become a ...

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!
Get ready to Rock!
To download the books, please verify your email address by following the instructions found on the email we just sent you.

THANK YOU!

Close