-
Software Development
10 things you can do as a developer to make your app secure: #7 Logging and Intrusion Detection
This is part 7 of a series of posts on the OWASP Top 10 Proactive Development Controls: 10 things you…
Read More » -
Enterprise Java
Using @NamedEntityGraph to load JPA entities more selectively in N+1 scenarios
The N+1 problem is a common issue when working with ORM solutions. It happens when you set the fetchType for…
Read More » -
Enterprise Java
Spring 4: CGLIB-based proxy classes with no default constructor
In Spring, if the class of a target object that is to be proxied doesn’t implement any interfaces, then a…
Read More » -
Agile
Do You Encourage People to Bring You Problems?
One of the familiar tensions in management is how you encourage or discourage people from bringing you problems. One of…
Read More » -
Software Development
Locking and Logging
Plumbr has been known as the tool to tackle memory leaks. As little as two months ago we released GC…
Read More » -
Enterprise Java
Java EE7 and Maven project for newbies – part 7
Resuming from the previous parts Part #1, Part #2, Part #3, Part #4, Part #5 , Part #6 In the…
Read More » -
Software Development
Behavior-Driven RESTful APIs
In the RESTBucks example, the authors present a useful state diagram that describes the actions a client can perform against…
Read More » -
Enterprise Java
Hibernate and UUID identifiers
Introduction In my previous post I talked about UUID surrogate keys and the use cases when there are more appropriate…
Read More » -
Software Development
Graduate School: ”Do… Or Do Not. There Is No Try” – Yoda
I recently completed my Master of Science in Computer Science. There were both good and bad experiences about graduate school…
Read More »