-
Career
How not to approach me on LinkedIn
Recently, I have been invited to connect with a lot of people on LinkedIn and most of them were headhunters,…
Read More » -
Software Development
How the Cloud makes Windows irrelevant
Windows has been running on the majority of PCs for many years now. Microsoft successfully translated its client monopoly into…
Read More » -
Desktop Java
How to create MIDlet in J2ME
Overview Java Mobile Application is called J2ME. Normally when we are working in the mobile technology field then we must…
Read More » -
Enterprise Java
How does Spring @Transactional Really Work?
In this post we will do a deep dive into Spring transaction management. We will go over on how does…
Read More » -
Core Java
Java 8 Optional: How to Use it
Java 8 comes with a new Optional type, similar to what is available in other languages. This post will go…
Read More » -
Enterprise Java
How to use a JPA Type Converter to encrypt your data
A few days ago, I read an interesting article by Bear Giles about Database encryption using JPA listeners from 2012.…
Read More » -
Software Development
Is there a future for Map/Reduce?
Google’s Jeffrey Dean and Sanjay Ghemawat filed the patent request and published the map/reduce paper 10 year ago (2004). According to WikiPedia Doug Cutting…
Read More » -
Software Development
The Mouse is a Programmer’s Enemy
One of the first programming management books I was encouraged to read was Peopleware – Productive Projects and Teams. It…
Read More » -
Software Development
10 things you can do to make your app secure: #1 Parameterize Database Queries
OWASP’s Top 10 Risk list for web applications is a widely recognized tool for understanding, describing and assessing major application…
Read More »