Enterprise Java
-
WS-Security: using BinarySecurityToken for authentication
As we all know, one goal set by WS-Security is to enforce integrity and/or confidentially on SOAP messages. In case…
Read More » -
Configuring Hadoop with Guava MapSplitters
In this post we are going to provide a new twist on passing configuration parameters to a Hadoop Mapper via…
Read More » -
Gradle: do we need another build tool?
In the early days of Java development, we either didn’t see much of a need for build tools, or used…
Read More » -
Deploying Identity Server over a JDBC Based User Store
With this post I am to demonstrate how to configure WSO2 Identity Server with a JDBC user store. For the…
Read More » -
Long Polling with Spring 3.2’s DeferredResult
In our last episode, the CEO of Agile Cowboys Inc had just hired a Java/Spring consultant by giving him the…
Read More » -
Bean Manipulation using Dozer Framework
Introduction As you know you can copy file or folder from source location to destination location in any operating system.…
Read More » -
Unit testing a Java Hadoop job
In my previous post I showed how to setup a complete Maven based project to create a Hadoop job in…
Read More » -
Optimizing Java Serialization – Java vs XML vs JSON vs Kryo vs POF
Perhaps I’m naive, but I always thought Java serialization must surely be the fastest and most efficient way to serialize…
Read More » -
JAAS-secured JAX-RS end point
With the advent of RESTFUL (JAX-RS) as the “preferred” way to create web service end points, for a long time…
Read More »