Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

 

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

 

and many more ....

 

 

Reference by Identity in JPA

java-interview-questions-answers

In a previous post, I mentioned that I opted to reference other aggregates by their primary key, and not by type. I usually use this approach (a.k.a. disconnected domain model) when working with large or complex domain models. In this post, let me try to explain further how it can be done in JPA. Note that the resulting DDL scripts ...

Read More »

Neo4j: Cypher – Detecting duplicates using relationships

neo4j-logo

I’ve been building a graph of computer science papers on and off for a couple of months and now that I’ve got a few thousand loaded in I realised that there are quite a few duplicates. They’re not duplicates in the sense that there are multiple entries with the same identifier but rather have different identifiers but seem to be ...

Read More »

Spring Integration – Polling file creation and modification

spring-interview-questions-answers

1 Introduction File support is another of Spring Integration’s endpoints to communicate with external systems. In this case, it provides several components to read, write and transform files. During this post, we are going to write an application which monitors a directory in order to read all files in there. In concrete it does the following: When the application starts, ...

Read More »

Why you Should Attack Your Systems – Before “They” Do

software-development-2-logo

You can’t hack and patch your way to a secure system. You will never be able to find all of the security vulnerabilities and weaknesses in your code and network through scanning, or by paying outsiders to try to hack their way in. The only way to be secure is to design and build security in from the beginning: threat ...

Read More »

Surge or pivot? – notes on failure

agile-logo

Failure is good. We learn from failure. Failure is learning; the information content of a failure may be more than the information content of success. Failure isn’t failure, it’s an opportunity to pivot. Failure is capitalism’s Darwinian evolutionary mechanism to remove the less productive, the less relevant. Fail fast, fail cheap, learn, try again. Creative Destruction is the way capitalism remove legacy companies ...

Read More »

Three Considerations For Your Agile Project

agile-logo

As consultants, we have the privilege of helping our clients along their agile journeys. It is always interesting, as each client is on their unique path with various levels of success and challenge in their agile adoption. Most of them are also using traditional project delivery for some of their projects…. And, I have to admit, I love this! As ...

Read More »

Query DynamoDB Items with Java Part 2

java-interview-questions-answers

On a previous post we had the chance to issue some basic DynamoDB query actions. However apart from the basic actions the DynamoDB api provides us with some extra functionality. Projections is a feature that has a select-like functionality. You choose which attributes from a DynamoDB Item shall be fetched. Keep in mind that using projection will not have any ...

Read More »

Want to take your Java skills to the next level?

Grab our programming books for FREE!

Here are some of the eBooks you will get:

  • Spring Interview QnA
  • Multithreading & Concurrency QnA
  • JPA Minibook
  • JVM Troubleshooting Guide
  • Advanced Java
  • Java Interview QnA
  • Java Design Patterns