-
Core Java
Comparing Hashing strategies
Overview Chronicle has a number of implementations for hashing, including City and Murmur. It also has it’s own Vanilla Hash,…
Read More » -
Enterprise Java
Use stored procedures with Hibernate
This article show different ways to call stored procedures from hibernate. JDBC actions will not be covered. Postgresql will be…
Read More » -
Software Development
Comments on The Twelve-Factor App
The Twelve-Factor App is a recent methodology (and/or a manifesto) for writing web applications that hopefully is getting quite popular.…
Read More » -
Software Development
Why You Should Encrypt ALL Personally Identifiable Information (PII)
Many critics have pointed out that Ashley Madison should have encrypted all personally identifiable information (PII). The database contained sensitive…
Read More » -
Software Development
jOOQ Tuesdays: Thomas Muller Unveils How HSQLDB Evolved into the Popular H2 Database
Welcome to the jOOQ Tuesdays series. In this series, we’ll publish an article on the third Tuesday every other month…
Read More » -
Software Development
Setting PostgreSQL psql Variable Based Upon Query Result
When using PostgreSQL‘s psql command-line tool to interact with a PostgreSQL database via operator interaction or script, it is not…
Read More » -
DevOps
Using Docker to Build Debian Packages
Building Debian packages isn’t always fun. If you’ve ever tried to turn some software into a .deb package, chances are…
Read More » -
Enterprise Java
Parameterized integration tests with Spring JUnit Rules
Spring 4.2 comes with brand new JUnit rules: SpringClassRule and SpringMethodRule. The main advantage of using JUnit rules is to…
Read More » -
Enterprise Java
Apache Spark: 5 Pitfalls You MUST Solve Before Changing Your Architecture
The top 5 things you need to know before moving to Apache Spark It seems like everyone’s only talking about…
Read More »