Featured FREE Whitepapers

What's New Here?

json-logo

Using Java WebSockets, JSR 356, and JSON mapped to POJO’s

So I have been playing around with Tyrus, the reference implementation of the JSR 356 WebSocket for Java spec. Because I was looking at test tooling I was interested in running both ...
software-development-2-logo

What does Code Ownership do to Code?

In my last post, I talked about Code Ownership models, and why you might want to choose one code ownership model (strong, weak/custodial or collective) over another. Most of the arguments ...
software-development-2-logo

Fallacies of massively distributed computing

In the last few years, we see the advent of highly distributed systems. Systems that have clusters with lots of servers are no longer the sole realm of the googles’ and facebooks’ ...
agile-logo

Agile Scenarios and Storyboards

User stories are great at capturing product functionality. But they are less suited to describe the user interaction in more detail. This is where scenarios and storyboards come into ...
software-development-2-logo

Efficiency is for Losers

Focusing on efficiency and ignoring effectiveness is the root cause of most software project failures. Effectiveness is producing the intended or expected result. Efficiency is the ...
java-logo

Elasticsearch: Text analysis for content enrichment

Every text search solution is as powerful as the text analysis capabilities it offers. Lucene is such open source information retrieval library offering many text analysis possibilities. ...
java-logo

Rare Uses of a “ControlFlowException”

Control flows are a “relict” from imperative programming, which has leaked into various other programming paradigms, including Java’s object oriented paradigm. Apart from the ...
enterprise-java-logo

Try the jBPM Console NG (Beta)

Hi everyone out there! This is another post about the jBPM Console NG. After 6 months of heavy work I’m happy to be writing this post for the developers community to try it out. ...
software-development-2-logo

Login Tokens In Email Links

Your system is probably sending some emails. Sometimes these emails contain links to the public part of the site, sometimes they have links to the authentication-protected part. Either ...
json-logo

Spring MVC, Ajax and JSON Part 1 – Setting The Scene

I’ve been thinking about writing a blog on Spring, Ajax and JSON for a good while, but I’ve never got around to it. This was mainly because it was quite complicated and ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use | Privacy Policy
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.

Sign up for our Newsletter

20,709 insiders are already enjoying weekly updates and complimentary whitepapers! Join them now to gain exclusive access to the latest news in the Java world, as well as insights about Android, Scala, Groovy and other related technologies.

As an extra bonus, by joining you will get our brand new e-books, published by Java Code Geeks and their JCG partners for your reading pleasure! Enter your info and stay on top of things,

  • Fresh trends
  • Cases and examples
  • Research and insights
  • Two complimentary e-books