Featured FREE Whitepapers

What's New Here?

java-interview-questions-answers

Ultimate JPA Queries and Tips List – Part 3

Before you read the third part , remember the first and second part of the series JPA: Creating a object from a query The JPA allow us to create objects inside a query, just with the ...
spring-interview-questions-answers

Spring Custom Namespaces

Spring Custom Namespaces provides a good way to simplify the xml files used to describe the bean definitions of a Spring Application Context. It is a fairly old concept, first introduced ...
devops-logo

Does Devops have a Culture Problem?

At the Devopsdays conference in Mountain View, Spike Morelli led an Open Space discussion on the importance of culture. He was concerned that when people think ...
couchbase-logo

Couchbase 101 : install, store and query data

Introduction In this post I just want to show how easily is to get started with Couchbase, and also explain how to “query” the data. The basic steps of this tutorial are: ...
spring-security-logo

Spring Security Part 1 – Simple Login application with database

What is Spring Security? Spring security is a framework that provides security solution, handling authentication and authorization at both the web request level and the method level. ...
logback-logo

Logback: Application errors notification

Some months ago when I was doing big application refactoring I found really annoying pieces of log4j based code used for logging repeated hundreds of times:                   if ...
junit-logo

Tomcat Context JUnit @Rule

A first draft of a JUnit @Rule that create the test context. This can be used with the Spring context rule for this post to create a complete Spring context for integration tests. import ...
oasis-saml-logo

Implementing SAML to XACML

Before Implementing SAMLThis is how a XACML request will looks like when it is arriving at PDP(Policy Decision Point) to be evaluated. <Request xmlns='urn:oasis:names:tc:xacml:2.0:context:schema:os'> <Subject> ...
spring-security-logo

REST + Spring Security session problem

REST, sessions .. wait. There are no sessions in REST application, right? Well, thats true. If we can avoid sessions we should do that. REST is stateless. The main concern about statelessness ...
java-logo

How to analyze Thread Dump – Thread Stack Trace

This article is part 5 of our Thread Dump analysis series. So far you have learned the basic principles of Threads and their interactions with your Java EE container & JVM. You ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use | Privacy Policy | Contact
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.
Do you want to know how to develop your skillset and become a ...
Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you two of our best selling eBooks for FREE!

Get ready to Rock!
You can download the complementary eBooks using the links below:
Close