Java
-
Authentication against a RESTful Service with Spring Security
1. Overview This article is focused on how to authenticate against a secure REST API that provides security services –…
Read More » -
Google Guava BiMaps
Next up on my tour of Guava, is the BiMap, another useful collection type. It’s pretty simple really, a BiMap…
Read More » -
Increasing heap size – beware of the Cobra Effect
The term ‘Cobra effect’ stems from an anecdote set at the time of British rule of colonial India. The British…
Read More » -
How to Create Extensible Java Applications
Many applications benefit from being open to extension. This post describes two ways to implement such extensibility in Java. Extensible…
Read More » -
Of Hacking Enums and Modifying ‘final static’ Fields
In this newsletter, originally published in The Java Specialists’ Newsletter Issue 161 we examine how it is possible to create…
Read More » -
Using Builder Pattern in JUnit tests
This is not intended to be a heavily technical post. The goal of this post is to give you some…
Read More » -
Do you get Just-in-time compilation?
Remember the last time when you were laughed at by C-developers? That the Java is so slooooow that they would…
Read More » -
Getting started with Apache Camel
In a previous blog-post we got to know about enterprise integration patterns (EIPs). Now in this post we will look…
Read More » -
Decorate with decorator design pattern
Decorator pattern is one of the widely used structural patterns. This pattern dynamically changes the functionality of an object at…
Read More »