Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

and many more ....

 

Spring Integration Jdbc RowMapper Example

spring-interview-questions-answers

The JDBC inbound channel adapter’s basic function is to execute a SQL query, extract the data and pass the result set encapsulated in the form of a Message onto the local channels. You can read more about this in my example on JDBC Inbound Channel Adapter. The type of the payload is decided by the row-mapping strategy. The default one ...

Read More »

Apache Camel Log Component Examples

apache-camel-logo

Apache Camel Log Component Examples You want to log messages to the underlying logging mechanism, use camel’s log: component. Camel uses sfl4j as the logger API and then allows you to configure the logger implementation. In this article, we will use Log4j as the actual logger mechanism. Let’s start with our examples. Dependencies You need to add: slf4j-api – SLF4J ...

Read More »

Spring lookup-method Example

spring-interview-questions-answers

When a bean has dependency on another bean, we inject the bean using the setter property or through the constructor. The getter method will return us the reference that is been set but suppose you want a new instance of the dependent bean each time you invoke the getter method, then you will probably have to follow a different approach. ...

Read More »

Centralized System and Docker Logging with ELK Stack

docker-logo

With Docker there was not supposed to be a need to store logs in files. We should output information to stdout/stderr and the rest will be taken care by Docker itself. When we need to inspect logs all we are supposed to do is run docker logs [CONTAINER_NAME]. With Docker and ever more popular usage of micro services, number of ...

Read More »

Designing a Disruptive Technology Strategy

software-development-2-logo

Growing up, my sister Christina was always interested in architecture and I wasn’t–at all. She was constantly visiting houses, churches, and corporate buildings for fun. I thought it was the most boring thing in the world. It wasn’t until much later in life that I gained an appreciation for architecture. Only after giving in and promising to open my mind ...

Read More »

The Product Strategy Defined

software-development-2-logo

Summary Creating a successful product requires attention to the details, from getting the user interaction and the visual design right to providing the right functionality and using the right technologies. With so much focus on the nitty-gritty, it’s easy to no longer see the wood for the trees. This is where the product strategy comes in. It helps you manage ...

Read More »

Performance Comparison of Multithreading in Java

java-logo

There are different techniques for multithreading in Java. One can parallelize a piece of code in Java either with synchronize keywords, locks or atomic variables. This post will compare performances of using synchronized keyword, ReentrantLock, getAndIncrement() and performing continuous trials of get() and compareAndSet() calls. Different types of Matrix classes are created for performance testing and a plain one also ...

Read More »

How does Hibernate NONSTRICT_READ_WRITE CacheConcurrencyStrategy work

jboss-hibernate-logo

Introduction In my previous post, I introduced the READ_ONLY CacheConcurrencyStrategy, which is the obvious choice for immutable entity graphs. When cached data is changeable, we need to use a read-write caching strategy and this post will describe how NONSTRICT_READ_WRITE second-level cache works. Inner workings When the Hibernate transaction is committed, the following sequence of operations is executed: First, the cache ...

Read More »

Configuration over JNDI in Spring Framework

spring-interview-questions-answers

From a certain point on, an application has to be configurable.  Spring Framework has a nice auxiliary tool for this issue since the first version 0.9 , the class PropertyPlaceholderConfigurer and since Spring Framework 3.1 the class PropertySourcesPlaceholderConfigurer. When you start a Google search for PropertyPlaceholderConfigurer, you will find many examples where the configuration items are saved in properties files. But ...

Read More »

Implementing Filter and Bakery Locks in Java

java-logo

In order to understand how locks work, implementing custom locks is a good way. This post will show how to implement Filter and Bakery locks at Java (which are spin locks) and will compare their performances with Java’s ReentrantLock. Filter and Bakery locks satisfies mutual exclusion and are starvation free algorithms also, Bakery lock is a first-come-first-served lock [1]. For performance testing, a ...

Read More »
Do you want to know how to develop your skillset and become a ...

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!
Get ready to Rock!
To download the books, please verify your email address by following the instructions found on the email we just sent you.

THANK YOU!

Close