Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

 

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

 

and many more ....

 

 

Continuous Integration is Dead

software-development-2-logo

A few days ago, my article “Why Continuous Integration Doesn’t Work” was published at DevOps.com. Almost the same day I received a few strongly negative critiques on Twitter. Here is my response to the un-asked question: Why the hell shouldn’t continuous integration work, being such a brilliant and popular idea?     Even though I have some experience in this ...

Read More »

Use Byteman in JBoss Fuse / Fabric8 / Karaf

java-interview-questions-answers

Have you ever found yourself in the process of try to understand how come something very simple is not working? You are writing code in any well known context and for whatever reason it’s not working. And you trust your platform, so you carefully read all the logs that you have. And still you have no clue why something is ...

Read More »

Conceptual Model vs Graph Model

software-development-2-logo

We’ve started running some sessions on graph modelling in London and during the first session it was pointed out that the process I’d described was very similar to that when modelling for a relational database. I thought I better do some reading on the way relational models are derived and I came across an excellent video by Joe Maguire titled ...

Read More »

Property-based testing with ScalaCheck – custom generators

scala-logo

One of the core data structures provided by Hazelcast is IMap<K, V> extending java.util.concurrent.ConcurrentMap – which is basically a distributed map, often used as cache. You can configure such map to use custom MapLoader<K, V> – piece of Java code that will be asked every time you try to .get()something from that map (by key) which is not yet there. ...

Read More »

4 Foolproof Tips Get You Started With JBoss BRMS 6.0.3

java-interview-questions-answers

Last week Red Hat released the next version of JBoss BRMS, labeled 6.0.3 and it is available in their Customer Portal for those with a subscription. If you are curious as to what is new in this release, see the release notes and the rest of the documentation online in the Customer Portal.   What we are looking for are ...

Read More »

Maven excludes all transitive dependencies

apache-maven-logo

“Transitive dependencies are a new feature in Maven 2.0. This allows you to avoid needing to discover and specify the libraries that your own dependencies require, and including them automatically.” I had a problem, where some dependencies were available in the run time, but they weren’t available in the public nexus repositories. For an example, Hibernate depends on the Sun JTA ...

Read More »

Diction in Software Development (i.e. Don’t be a d1ck!)

software-development-2-logo

Over the years, I’ve come to realize how important diction is in software development (and life in general). It may mean the difference between a 15 minute meeting where everyone nods their heads, and a day long battle of egos (especially when you have a room full of passionate people). Here are a couple key words and phrases, I’ve incorporated into ...

Read More »

Stop Chatting, Start Coding

software-development-2-logo

The first principle of eXtremely Distributed Software Development (XDSD) states that “everyone gets paid for verified deliverables”. This literally means that, in order to get paid, every programmer has to write the code, commit it to the repository, pass a code review and make sure the code is merged into the destination branch. Only then, is his result appreciated and ...

Read More »

Single Sign-On with the Delegated Access Control Pattern

software-development-2-logo

Suppose a medium-scale enterprise has a limited number of RESTful APIs. Company employees are allowed to access these APIs via web applications while they’re behind the company firewall. All user data is stored in a Microsoft Active Directory, and all the web applications are connected to a Security Assertion Markup Language (SAML) 2.0 identity provider to authenticate users. The web ...

Read More »

Legacy Code To Testable Code #1: Renaming

software-development-2-logo

This post is part of the “Legacy Code to Testable Code” series. In the series we’ll talk about making refactoring steps before writing tests for legacy code, and how they make our life easier. Renaming is easy and is usually safe. Most IDEs have the functionality, and most languages (I’m not talking about you, C++) lend themselves to safe renaming. ...

Read More »

Want to take your Java skills to the next level?

Grab our programming books for FREE!

Here are some of the eBooks you will get:

  • Spring Interview QnA
  • Multithreading & Concurrency QnA
  • JPA Minibook
  • JVM Troubleshooting Guide
  • Advanced Java
  • Java Interview QnA
  • Java Design Patterns