Quantcast
Channel: Tech Annotation
Browsing all 131 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cas and Spring Security – Client

Continuing from my previous post, I’ll show the client integration to a CAS Authentication service using a little example. It will show how calling the authentication and how verify user credentials...

View Article


Image may be NSFW.
Clik here to view.

5 minutes with – Spring Transaction Isolation Level

Understanding the isolation level of the database transaction is not so obvious as you might think. Let me lead you through the different isolation type in the way to find out the correct one to use in...

View Article


Image may be NSFW.
Clik here to view.

Spring Oauth2 with Authorization Code

In this article I’ll show how to develop a solution that uses OAuth2 as authentication protocol with Authorization code during the flow process. Spring Framework has been used as backbone of the...

View Article

Image may be NSFW.
Clik here to view.

JBoss Hornetq – Connecting from external App

In this article I tried to use JBoss Messaging service by an external Spring solution. The idea is to connect a console app (but it may also work as Web Application) that run in external JVM than JBoss...

View Article

Image may be NSFW.
Clik here to view.

Spring distributed transaction with Atomikos and ActiveMQ

How can we put together different resource in a unique and atomic transaction? We’re speaking about Jta and distributed transactions, not only with Dao resources but also including a Jms resource. It’s...

View Article


Image may be NSFW.
Clik here to view.

5 minutes with – Asymmetric Key

A short summer article about the asymmetric key pairs in order to guarantee an encrypted communication between two endpoints. I’ll show the main steps to achieve this aim using jdk tool (keytool) and a...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Apache Kafka using Spring

A frequently common problem today it’s to deal with big data that makes you adopt of different system in order to achieve the result of processing large data. One of the product that makes it possible...

View Article

Image may be NSFW.
Clik here to view.

5 minutes with – Spring WebFlow

Spring Framework makes available a powerful package named WebFlow that allows the building of step-by-step web navigation. It’s common to have to deal with check out shopping cart in e-commerce web...

View Article


Image may be NSFW.
Clik here to view.

5 minutes with – WebSocket

Build interactive Web Application by using relative new technologies as WebSocket can improve the user experience in the 2.0 Web World. Let’s have a look at how to get it by adopting Browser WebSocket...

View Article


Image may be NSFW.
Clik here to view.

Junit testing with Spring

Testing code is an important step as writing code. Unfortunately this task is frequently put at last position, too near the project deadline and,  for that reason, it stays unimplemented. In this post...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Apache Spark

Big data issues are common nowadays than ever before. In order to survive at them and be efficient we need to use tools that help us to elaborate them. Apache Spark can help us to work big data issue...

View Article

Image may be NSFW.
Clik here to view.

Custom Jdbc Spring 4 Authentication

Spring Security makes available a good base customizable authentication layer to transform a plain web application into a secure one. In this article I’ll show some of the behaviours that are...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Spring Batch

How accomplish a job using Spring Batch solution in order to using the same Spring technology adopted for a Web solution. Easy to get, adding an administration monitor that helps to keep under control...

View Article


Image may be NSFW.
Clik here to view.

5 minutes with – Spring Integration

A very common schema, nowadays, is the need of transforming data and processing them through a pipeline where, at the end, we get the data ready to use. In this article, I’ll show how to get it using...

View Article

Image may be NSFW.
Clik here to view.

Java memory for singleton object

The Java Virtual Machine (JVM) manages the memory of the operation system where it’s running in order to obtain the best performance by optimizing the usage of it. In this article, I’ll put the focus...

View Article


Image may be NSFW.
Clik here to view.

Introduction to Docker

A fast introduction to what is growing in the public interest. Docker is climbing the attention of the developers concerning the virtualization. In this article I’ll show you an easy example of how it...

View Article

Image may be NSFW.
Clik here to view.

Junit testing with Spring – part 2

In my previous post on the argument (Junit testing with Spring), I skipped a very interesting part of testing attributes in the code which are inside methods. In these cases, Mockito it’s very helpful...

View Article


Image may be NSFW.
Clik here to view.

Spring Microservices with MongoDb

Distributed applications is always a current topic in the articles and forum discussions; Microservices answers the need for application scalability and makes a good marriage with Cloud solution (AWS)...

View Article

Image may be NSFW.
Clik here to view.

5 minutes with – Spring Object Pooling

Sometimes an object instance is not enough; specially, when you use a stateful classes on concurrency environment runtime, a pool of object is a good solution to achieve a multithreaded executions. In...

View Article

Image may be NSFW.
Clik here to view.

Sample of Voice Authentication

Have you ever thought of using your voice instead of plain text string to get authenticated? It’s not science fiction, it’s called biometric authentication and, some company as Google, are going to...

View Article
Browsing all 131 articles
Browse latest View live