Do you want to know how to develop your skillset to become a Java Rockstar?
Subscribe to our newsletter to start Rocking right now!
To get you started we give you our best selling eBooks for FREE!
1. JPA Mini Book
2. JVM Troubleshooting Guide
3. JUnit Tutorial for Unit Testing
4. Java Annotations Tutorial
5. Java Interview Questions
and many more ....
I agree to the Terms and Privacy Policy

Ethereum Hello World Example using solc and web3

I’ve been trying to find an Ethereum Hello World example and came across Thomas Conté’s excellent post that shows how to compile and deploy an Ethereum smart contract with solc and web3. In the latest version of web3 the API has changed to be based on promises so I decided to translate Thomas’ example. Let’s get started. Install npm libraries ...

Read More »

Top 10 JavaCodeGeeks posts for 2017

Hello fellow geeks! 2017 is coming to its end and the new year is just around the corner! This has been again an amazing year for Java and Java Code Geeks. Our community continues to grow and improve, offering top-notch programming content to developers all over the world. Thank you for your support on achieving this great milestone! Our insiders ...

Read More »

Choosing Java Cryptographic Algorithms Part 3 – Public/Private key asymmetric encryption

Abstract This is the 3rd of a three-part blog series covering Java cryptographic algorithms. The series covers how to implement the following: Hashing with SHA–512 Single-key symmetric encryption with AES–256 RSA–4096 This 3rd post details how to implement public/private key, asymmetric, RSA–4096 encryption. Let’s get started. Disclaimer This post is solely informative. Critically think before using any information presented. Learn ...

Read More »

Choosing Java Cryptographic Algorithms Part 2 – Single key symmetric encryption

Abstract This is the 2nd of a three-part blog series covering Java cryptographic algorithms. The series covers how to implement the following: Hashing with SHA–512 AES–256 RSA–4096 This 2nd post details how to implement single key, symmetric, AES–256 encryption. Let’s get started. Disclaimer This post is solely informative. Critically think before using any information presented. Learn from it but ultimately ...

Read More »

The Formula for Software Quality

How do you define the quality of a software product? There is definitely an intrinsic emotional component to it, which means satisfaction for the user, willingness to pay, appreciation, positive attitude, and all that. However, if we put emotions aside, how can we really measure it? The IEEE says that quality is the degree to which a product meets its ...

Read More »

Switch Expressions Coming to Java?

A JEP draft has been created with the title, “Switch Expressions for the Java Language.” The current “Summary” states, “Extend the switch statement so that it can be used as either a statement or an expression, and improve how switch handles nulls. These will simplify everyday coding, as well as prepare the way for the use of pattern matching in ...

Read More »

A Log Message is Executable Code and Comment

Although there are differences of opinion regarding how many comments one should add to one’s code, I think it’s safe to say most developers would agree that the comment in the following code snippet is superfluous: // increment the total total++; In that example, the code is simple and really is self-explanatory with a decently named variable total being incremented ...

Read More »