Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

and many more ....

4 Foolproof Tips Get You Started With JBoss BRMS 6.0.3

java-interview-questions-answers

Last week Red Hat released the next version of JBoss BRMS, labeled 6.0.3 and it is available in their Customer Portal for those with a subscription. If you are curious as to what is new in this release, see the release notes and the rest of the documentation online in the Customer Portal.   What we are looking for are ...

Read More »

Maven excludes all transitive dependencies

apache-maven-logo

“Transitive dependencies are a new feature in Maven 2.0. This allows you to avoid needing to discover and specify the libraries that your own dependencies require, and including them automatically.” I had a problem, where some dependencies were available in the run time, but they weren’t available in the public nexus repositories. For an example, Hibernate depends on the Sun JTA ...

Read More »

Diction in Software Development (i.e. Don’t be a d1ck!)

software-development-2-logo

Over the years, I’ve come to realize how important diction is in software development (and life in general). It may mean the difference between a 15 minute meeting where everyone nods their heads, and a day long battle of egos (especially when you have a room full of passionate people). Here are a couple key words and phrases, I’ve incorporated into ...

Read More »

Stop Chatting, Start Coding

software-development-2-logo

The first principle of eXtremely Distributed Software Development (XDSD) states that “everyone gets paid for verified deliverables”. This literally means that, in order to get paid, every programmer has to write the code, commit it to the repository, pass a code review and make sure the code is merged into the destination branch. Only then, is his result appreciated and ...

Read More »

Single Sign-On with the Delegated Access Control Pattern

software-development-2-logo

Suppose a medium-scale enterprise has a limited number of RESTful APIs. Company employees are allowed to access these APIs via web applications while they’re behind the company firewall. All user data is stored in a Microsoft Active Directory, and all the web applications are connected to a Security Assertion Markup Language (SAML) 2.0 identity provider to authenticate users. The web ...

Read More »

Legacy Code To Testable Code #1: Renaming

software-development-2-logo

This post is part of the “Legacy Code to Testable Code” series. In the series we’ll talk about making refactoring steps before writing tests for legacy code, and how they make our life easier. Renaming is easy and is usually safe. Most IDEs have the functionality, and most languages (I’m not talking about you, C++) lend themselves to safe renaming. ...

Read More »

Show your dev skills and win with CoderPower

coderpower-logo

CoderPower and Salesforce1 launch a series of coding challenges in the USA and in Europe. CoderPower is a platform where developers from all around the globe compete to get points and win prizes. After a summer competition with Salesforce1 and a constest with IBM in September, Salesforce1 launches a new series of challenges. The aim is simple: try to be ...

Read More »

5 Handy Tips From JBoss BPM Suite For Release 6.0.3

jboss-jbpm-logo

Last week Red Hat released the next version of JBoss BPM Suite, labeled 6.0.3 and it is available in their Customer Portal for those with a subscription. If you are curious as to what is new in this release, see the release notes and the rest of the documentation online in the Customer Portal. What we are looking for are ...

Read More »

WSO2 Identity Server 5.0.0 Authentication Framework

software-development-2-logo

The WSO2 Identity Server 5.0.0 takes the identity management into a new direction. No more there will be federation silos or spaghetti identity anti-patterns. The authentication framework we introduced in IS 5.0.0 powers this all. The objective of this blog post is to introduce high-level concepts associated with the authentication framework. Inbound Authenticators The responsibility of inbound authenticators is to ...

Read More »

Akka Notes – Actor Messaging – Request and Response – 3

akka-logo

Last time when we saw Actor messaging, we saw how fire-n-forget messages are sent (Meaning, we just send a message to the Actor but don’t expect a response from the Actor). Technically, we fire messages to Actors for its side-effects ALL THE TIME. It is by design. Other than not responding, the target Actor could ALSO do the following with ...

Read More »
Do you want to know how to develop your skillset and become a ...

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!
Get ready to Rock!
To download the books, please verify your email address by following the instructions found on the email we just sent you.

THANK YOU!

Close