Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

and many more ....

 

Android Activity Recognition

android-logo

Activity Recognition gives our Android device the ability to detect a number of our physical activities like walking, riding a bicycle, driving a car or standing idle. All that by simply using an API to access Google Play Services, an increasingly crucial piece of software available to all Android versions. As in the article on geofencing, we will download the ...

Read More »

Pagination with Couchbase

couchbase-logo

If you have to deal with a large number of documents when doing queries against a Couchbase cluster it is important to use pagination to get rows by page. You can find some information in the documentation in the chapter “Pagination“, but I want to go in more details and sample code in this article. For this example I will ...

Read More »

Light-weight, open-source integration: Apache Camel or Spring Integration?

apache-camel-logo

First of all, for full disclosure, for the last 1.5 years, I’ve been working as a consultant for FuseSource (now Red Hat) supporting SOA and Integration projects for large and small companies in diverse verticals from retail, shipping, banking/finance, health, etc etc. My specialty has been architecting solutions with high scalability and throughput demands using some of the best open-source ...

Read More »

Spring-injected Beans in JPA EntityListeners

spring-interview-questions-answers

In Database Encryption Using JPA Listeners I discussed transparent encryption using a JPA EntityListener. This approach was transparent in the sense that the JPA Entity was (nearly) entirely unaware that encryption was occurring and the JPA EntityListener itself was unaware of the details. There was one big problem. EJB3 can inject resources into an EntityListener. Spring cannot. (N.B., I am ...

Read More »

JavaOne 2013 Vicariously

javaone-logo

I was disappointed that I was not able to attend JavaOne 2013, but was happy to see numerous useful posts covering this annual conference. In this post, I link to many of these resources and provide a brief summary of what each post discusses in relation to JavaOne 2013. Keynotes The keynotes are where the “big announcements” tend to occur. ...

Read More »

Creating deployment plans with Oracle WebLogic

oracle-weblogic-logo

Creating deployment plans Deployment plans are part of the JSR-88 deployment standard, although not explicitly stated in this standard. A deployment plan is an XML document that defines a custom WebLogic Server deployment environment. This configuration can be used to override the specific settings defined into the application archive. There are many reasons why you may not want to modify ...

Read More »

Swagger: make developers love working with your REST API

java-interview-questions-answers

As JAX-RS API is evolving, with version 2.0 released earlier this year under JSR-339 umbrella, it’s becoming even more easy to create REST services using excellent Java platform. But with great simplicity comes great responsibility: documenting all these APIs so other developers could quickly understand how to use them. Unfortunately, in this area developers are on their own: the JSR-339 ...

Read More »

Travel Report: JavaOne 2013 – Back To Glory

javaone-logo

I’m back since a few days already and needed to catch up with all the things which had been on hold for the last couple of days. It was the busiest time of the year for me. A complete week of JavaOne and OpenWorld in San Francisco. A very brief travel report. Annual ACED Briefing Many of you know that ...

Read More »

XML Security with Digital Signature in JAVA

java-logo

Introduction As you know XML plays a major role in our product or project development and from an XML document we gather lot of information and also we can perform CRUD operations with XML files. But it is a matter of concern as to how we can ensure that the data available in an XML file are authentic and data ...

Read More »

Creating Password-Based Encryption Keys

java-logo

This article discusses creating password-based encryption PBE keys. First a reminder of earlier points – as a rule you should, when practical, use the PBE key as a master key that is used solely to unlock a working key. This has three major benefits: You can have multiple passwords, e.g., an escrowed recovery key, You can change your password without ...

Read More »
Want to take your Java Skills to the next level?
Grab our programming books for FREE!
  • Save time by leveraging our field-tested solutions to common problems.
  • The books cover a wide range of topics, from JPA and JUnit, to JMeter and Android.
  • Each book comes as a standalone guide (with source code provided), so that you use it as reference.
Last Step ...

Where should we send the free eBooks?

Good Work!
To download the books, please verify your email address by following the instructions found on the email we just sent you.