Do you want to know how to develop your skillset to become a Java Rockstar?
Subscribe to our newsletter to start Rocking right now!
To get you started we give you our best selling eBooks for FREE!
1. JPA Mini Book
2. JVM Troubleshooting Guide
3. JUnit Tutorial for Unit Testing
4. Java Annotations Tutorial
5. Java Interview Questions
and many more ....
I agree to the Terms and Privacy Policy

The Role of Emerging Technologies in IoT

Internet of things (IoT) refers to a network of devices that are connected to one another and to the internet and are able to interact with each other and exchange data. A recent report by the International Data Corporation forecasts a compound annual growth rate of 13.6 percent from 2017 to 2022 for worldwide spending on IoT, rising to nearly ...

Read More »

Applying Bulkheads And Backpressure using MicroProfile

java-interview-questions-answers

I’ve recorded a video how to implement the bulkheads and backpressure using MicroProfile Fault Tolerance. The idea behind bulkheads is to split applications into several execution units that isolate functionality. In enterprise Java applications this typically means to define multiple thread pools. Applying backpressure to clients results in either adding information about the current pressure on the system to the ...

Read More »

Guidance for Building a Control Plane for Envoy Part 3 – Domain Specific Configuration API

java-interview-questions-answers

This is part 3 of a series that explores building a control plane for Envoy Proxy. In this blog series, we’ll take a look at the following areas: Adopting a mechanism to dynamically update Envoy’s routing, service discovery, and other configurationIdentifying what components make up your control plane, including backing stores, service discovery APIs, security components, et. al.Establishing any domain-specific ...

Read More »

Guidance for Building a Control Plane for Envoy Part 2 – Identify Components

java-interview-questions-answers

This is part 2 of a series that explores building a control plane for Envoy Proxy. In this blog series, we’ll take a look at the following areas: Adopting a mechanism to dynamically update Envoy’s routing, service discovery, and other configurationIdentifying what components make up your control plane, including backing stores, service discovery APIs, security components, et. al. (this entry)Establishing ...

Read More »

Architect for business, not technology

Based on which side of maturity timeline the market is in, either technology drives business or business drives technology. In an immature market such as the IoT market, technology typically drives business. Such a market is a pioneer’s market. Here IoT product businesses are trying to convince the customers that there is an advantage to installing sensors and connecting them ...

Read More »

New life of old Visitor design pattern

Introduction Visitor [1, 2] is a widely known classical design pattern. There are a lot of resources that explain it in details. Without digging into the implementation I will briefly remind the idea of the pattern, will explain its benefits and downsides and will suggest some improvements that can be easily applied to it using Java programming language.  Classical Visitor [Visitor] ...

Read More »

Centralized Authorization with OAuth2 & Opaque Tokens using Spring Boot 2

java-interview-questions-answers

If you are looking for JWT implementation please follow this link This guide walks through the process to create a centralized authentication and authorization server with Spring Boot 2, a demo resource server will also be provided. If you’re not familiar with OAuth2 I recommend this read. Pre-req JDK 1.8Text editor or your favorite IDEMaven 3.0+ Implementation Overview For this project we’ll ...

Read More »