What's New Here?

java-logo

The infamous sun.misc.Unsafe explained

The biggest competitor to the Java virtual machine might be Microsoft’s CLR that hosts languages such as C#. The CLR allows to write unsafe code as an entry gate for low level programming, something that is hard to achieve o ...
mongodb-logo

MongoDB Facts: Lightning speed aggregation

In my previous post, I demonstrated how fast you can insert 50 millions time-event entries with MongoDB. This time we will make use of all that data to fuel our aggregation tests. This is how one time-event entry looks like:   ...
software-development-2-logo

Counting Distinct Records in SQL

The SQL language and its depths… Some of you readers might be aware of MySQL’s capability of counting distinct records through the COUNT() aggregate function. The MySQL documentation reads: COUNT(DISTINCT expr,[expr...]) Retu ...
software-development-2-logo

Transforming a server application to cloud application

On-premise products are architected and designed for server operating environment i.e., they are web-based applications. SaaS, on the other hand is a cloud application (an application exposed as a service in a cloud operating envi ...
software-development-2-logo

The golden (broken) management approach

Golden and broken doesn’t certainly sound great concerning anything, but the management approach I going to write about should definitely ring some bell to your attention as a matter of real working scenario in organizations and ...
javafx-logo

Skinning in Java8 (JavaFX8)

There has been some changes in JavaFX8 regarding skinning, the most relevants of which are the new CSS API that allows you to create new CSS properties and pseudo-classes for your controls and the Skin class which has become publi ...
java-logo

Subtyping in Java generics

Generic types introduce a new spectrum of type safety to Java program. At the same type, generic types can be quite expressive, especially when using wildcards. In this article, I want to explain how subtyping works with Java gene ...
java-logo

RMI enforcing Full GC to run hourly

During all the troubleshooting exercises I have carried out in my career, I have picked up a feeling that the bugs I am after are evolving and becoming meaner and uglier over time. Or maybe it is just my age kicking in. This parti ...
software-development-2-logo

Attitudes of a Great Software Tester

In my previous post, I explained in my own words the “Attitude of a Great Software Developer“.  This post will focus on the testers.  Developers and Testers are two great personalities that work literally in the oppo ...
java-logo

Object-based micro-locking for concurrent applications by using Guava

One of the presumably most annoying problems with writing concurrent Java applications is the handling of resources that are shared among threads as for example a web applications’ session and application data. As a result, ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.

Sign up for our Newsletter

15,153 insiders are already enjoying weekly updates and complimentary whitepapers! Join them now to gain exclusive access to the latest news in the Java world, as well as insights about Android, Scala, Groovy and other related technologies.

As an extra bonus, by joining you will get our brand new e-books, published by Java Code Geeks and their JCG partners for your reading pleasure! Enter your info and stay on top of things,

  • Fresh trends
  • Cases and examples
  • Research and insights
  • Two complimentary e-books
Get tutored by the Geeks! JCG Academy is a fact... Join Now
Hello. Add your message here.