Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

 

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

 

and many more ....

 

 

Comprehending Ulterior Motives and Forces around Software Technology Standards

An Introduction to Software Standards What are technology standards? What are standards? Essentially, a technology standard is a common agreement on the application programming interface and /or communication protocol in a vertical sector. Standards can be big or small. They have a profound effect on the mindshare of a community of peoplee, the economic market and, of course, corporate activity. ...

Read More »

Using microservices as a business initiative

Want to read more on the process of migrating to microservices? Read the full eBook on “How to Build (and Scale) with Microservices” here! For microservices to work in an organization, there must be a business initiative attached to it. Questions arise among IT professionals on whether microservices are suited only for giant Web applications like Google and Facebook. However, ...

Read More »

Docker Services, Stack and Distributed Application Bundle

First Release Candidate of Docker 1.12 was announced over two weeks ago. Several new features are planned for this release. This blog will show how to create a Distributed Application Bundle from Docker Compose and deploy it as Docker Stack in Docker Swarm Mode. Many thanks to @friism to help me understand these concepts. Let’s look at the features first: Built-in ...

Read More »

Some Thoughts on the Single Responsibility Principle

SOLID (single responsibility, open-closed, Liskov substitution, interface segregation and dependency inversion) is a set of principles popularised by ‘Uncle’ Bob Martin that aim to guide developers in implementing good software design. The principles define how Object Oriented classes should relate to each other in order to create a codebase that is flexible and able to accommodate ongoing change. The first ...

Read More »

Query DynamoDB Items with Java

On a previous post we proceeded on inserting data on a DynamoDB database. On this tutorial we will issue some basic queries against our DynamoDB tables. The main rule is that every query has to use the hash key. The simplest form of query is using the hash key only. We will query the Users table on this one. There ...

Read More »

[MEGA DEAL] The Complete Machine Learning Bundle (94% off)

Master AI & You’ll Achieve the Impossible: Launch Into the Innovative Field of Machine Learning with 10 Courses & 63.5 Hours of Training Hey fellow geeks, This week, on our JCG Deals store, we have an extreme offer. We are offering the Complete Machine Learning Bundle for only $39.99 instead of the original price of $780, yeap that is a ...

Read More »

dockerw – A simple Docker command wrapper for the rest of us

I am regularly working on Docker images and have to play with different settings. Thus I periodically find myself in the “build, run, clean-up, change something, re-build, run, …” rat race. dockerw is a little tool for working with Docker images and containers. And it aims to help you (and me ;-)) to build and (locally) run Docker images while it hides all the ...

Read More »

Eclipse Project Branding and Trademarks

As part of the project creation process, the Eclipse Foundation assumes ownership of the project’s name.  As a legal entity, the Eclipse Foundation owns all Eclipse project and corresponding product trademarks on behalf of the the Eclipse community. This prevents companies and others from misusing or misrepresenting their products as being the projects. For a trademark assertion to hold any ...

Read More »

Managing Secrets with Vault

spring-interview-questions-answers

How do you store Secrets? Passwords, API keys, secure Tokens, and confidential data fall into the category of secrets. That’s data which shouldn’t lie around. It mustn’t be available in plaintext in easy to guess locations. In fact, it must not be stored in plaintext in any location. Sensitive data can be encrypted by using the Spring Cloud Config Server ...

Read More »

Want to take your Java skills to the next level?

Grab our programming books for FREE!

Here are some of the eBooks you will get:

  • Spring Interview QnA
  • Multithreading & Concurrency QnA
  • JPA Minibook
  • JVM Troubleshooting Guide
  • Advanced Java
  • Java Interview QnA
  • Java Design Patterns