Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

and many more ....

 

Dealing With Slow Resource Leaks

java-monitor-logo

Finding resource leaks using Java-monitor Finding slow resource leaks is key to keeping your application servers up and running for very long times. Here I explain how I use Java-monitor to spot slow resource leaks and how to verify that they are actual leaks and not just extra pre-allocation into some HTTP connector or database pool. If you follow these ...

Read More »

Bean Manipulation using Dozer Framework

java-interview-questions-answers

Introduction As you know you can copy file or folder from source location to destination location in any operating system. Have you ever thought about copy the java object which is basically a POJO ? There are many instances where you need to copy the source bean contents to a destination bean. I am not taking about the copy constructor, ...

Read More »

Scala Wonderland: Case classes and pattern matching

scala-logo

Pattern matching is usually related to text search. In Scala it has much more sophisticated usage. You can write exciting decision logic when used together with case classes. Even after understanding what the two things mean I wasn’t able to use them as they deserve. It takes a while to really grasp them. Long and winding road. Case classes allow ...

Read More »

Unit testing a Java Hadoop job

apache-mrunit-logo

In my previous post I showed how to setup a complete Maven based project to create a Hadoop job in Java. Of course it wasn’t complete because it is missing the unit test part . In this post I show how to add MapReduce unit tests to the project I started previously. For the unit test I make use of ...

Read More »

How To Start With Software Security – Part 2

software-development-2-logo

Last time, I wrote about how an organization can get started with software security. Today I will look at how to do that as an individual. From Development To Secure Development As a developer, I wasn’t always aware of the security implications of my actions. Now that I’m the Engineering Security Champion for my project, I have to be. It ...

Read More »

Why You Took The Wrong Job

career-logo

The decision to join a new employer and the process leading up to the move can be fraught with emotional attachments, irrational fears, and incomplete information.  Since job searches in technology often include self-interested third parties of varying influence (e.g. recruiters, founders, hiring managers) acting within a highly competitive hiring environment, the job seeker can be pushed and pulled in ...

Read More »

The Economics of Open Source : Seek Free Code. Find Innovation.

software-development-2-logo

In the past, many technologists had to evangelize open source within the enterprise. We had to justify its use, reassure executives about security, ability to support, etc.  Recently,  I believe those tables have turned.  More and more, businesses are asking the question, “Isn’t there an open-source solution for this?”. Not only has open-source been accepted, but its become the preferred ...

Read More »

JAAS-secured JAX-RS end point

java-interview-questions-answers

With the advent of RESTFUL (JAX-RS) as the “preferred” way to create web service end points, for a long time I have always wondered how people implement security mechanism around it. At the end of the day, I presume the underlying implementation of JAX-RS is servlet, and therefore its security might also be around what is already provided by the ...

Read More »

Bluetooth Data Transfer with Android

android-logo

To develop an Android application making use of data transfers via Bluetooth (BT), one would logically start at the Android Developer’s Bluetooth page, where all the required steps are described in details: device discovery, pairing, client/server sockets, RFCOMM channels, etc. But before jumping into sockets and threads programming just to perform a basic BT operation, let’s consider a simpler alternative, ...

Read More »
Do you want to know how to develop your skillset and become a ...

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!
Get ready to Rock!
To download the books, please verify your email address by following the instructions found on the email we just sent you.

THANK YOU!

Close