Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

 

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

 

and many more ....

 

 

Java 9 module-info Files in the Eclipse IDE

java-logo

Note that this post is not intended to be a status update; it’s just a quick update based on some experimenting that I’ve been doing with the beta code. It’s been a while, but I’m back to experimenting in Java 9 support in the Eclipse IDE. For testing purposes, I downloaded the most recent Oxygen (4.7) integration build (I20160914-0800) from the Eclipse ...

Read More »

Push notification in Android using Firebase cloud messaging

android-logo

This post covers how to send push notification in Android.  In the past, we were used to send push notification in Android using Google Cloud messaging service. Recently, it was introduced a new way to send push data using Firebase. Even if the basic principles remain the same Firebase introduced some interesting new features. Firebase supports other services like: Authentication ...

Read More »

Spring boot with Spring Security and jdbc

spring-security-logo

Spring security Is a wonderful framework saving lots of time and effort from the developers. Also It is flexible enough to customize and bring it down to your needs. Working with JDBC and Spring Security is pretty easy and many actions are automated. This would be a minimal showcase. The gradle file contains dependencies such as spring-security, spring-jdbc and h2 ...

Read More »

The Rationale for Securing Big Data

software-development-2-logo

This blog post is the first in a series based on the ebook The Six Elements of Securing Big Data by security expert and thought leader Davi Ottenheimer. In his book, Davi outlines the rationale and key challenges of securing big data systems and applications. He does so using some great anecdotes and with good humor, making the book a good ...

Read More »

More on Spooling Queries and Results in psql

postgresql-logo

In the recent blog post SPOOLing Queries with Results in psql, I looked briefly at some PostgreSQL database psql meta-commands and options that can be used to emulate Oracle database‘s SQL*Plus spooling behavior. In that post, I wrote, “I have not been able to figure out a way to … have both the query and its results written to the ...

Read More »

Service Discovery Inside A Docker Swarm Cluster

devops-logo

The text that follows contains excerpts from the Service Discovery Inside A Swarm Cluster chapter of the The DevOps 2.1 Toolkit: Docker Swarm book. Service Discovery In The Swarm Cluster The old (standalone) Swarm required a service registry so that all its managers can have the same view of the cluster state. When instantiating the old Swarm nodes, we had ...

Read More »

Injecting authenticated user into Spring MVC @Controllers

spring-interview-questions-answers

Injecting injecting authenticated user into Spring MVC handler method can be done with @AuthenticationPrincipal annotation and AuthenticationPrincipalArgumentResolver that is an implementation of Spring MVS MethodArgumentResolver. AuthenticationPrincipalArgumentResolver is registered by default with web security configuration (e.g. when you enable security with @EnableWebSecurity). 1. Custom UserDetails Let’s assume we have our custom UserDetails implementation: import org.springframework.security.core.GrantedAuthority; import pl.codeleak.surveyapp.entities.Member; import java.util.Collection; public class ...

Read More »

The Right To Be Forgotten In Your Application

software-development-2-logo

You’ve probably heard about “the right to be forgotten” according to which Google has to delete search results about you, if you ask them to. According to a new General Data Protection Regulation of the EU, the right to be forgotten means that a data subject (user) can request the deletion of his data from any data controller (which includes ...

Read More »

Negotiation for Contract-To-Hire Jobs

career-logo

I was recently asked a question on Reddit about a specific contract-to-hire (C2H) scenario that I hadn’t given much thought to recently. With the prevalence of C2H (sometimes called ‘try before you buy’ in the recruiting world) in the market today, I thought the topic was worthy of full exploration. What Is Contract-to-hire? For those unfamiliar, contract-to-hire is where a ...

Read More »

Apache NetBeans?

netbeans-logo

It’s fairly common to have significant announcements related to the world of Java released in the days and weeks leading up to JavaOne. With that in mind, it’s not surprising that we’re seeing some significant Java-related announcements just prior to JavaOne 2016 that begins next week. One announcement is Mark Reinhold‘s Proposed schedule change for JDK 9 in which Reinhold ...

Read More »

Want to take your Java skills to the next level?

Grab our programming books for FREE!

Here are some of the eBooks you will get:

  • Spring Interview QnA
  • Multithreading & Concurrency QnA
  • JPA Minibook
  • JVM Troubleshooting Guide
  • Advanced Java
  • Java Interview QnA
  • Java Design Patterns