The SQL language has been evolving steadily over the last two decades. At the same time, the verbosity caused by the JDBC API in Java client code and the lack of first class SQL support within the Java language have led to the introduction of ORMs such as Hibernate, which was later standardised into JPA and the Criteria API.If SQL and JPA are diverging, where will our data interaction patterns go?
Developing a light-weight, lockless, inter-thread communication framework in Java without using any locks, synchronizers, semaphores, waits, notifies; and no queues, messages, events or any other concurrency specific words or tools. Just get POJOs communicating behind plain old Java interfaces.
On certain occasions you will need to build your own parser, eg if there is nothing standard that fits the bill. This article walks through the steps of building a high performance parser
This article will take you through creating a simple RESTful web service with Spring Boot and Aerospike, a distributed and replicated in-memory NoSQL database.
InfoQ speaks with the authors of Java Coding Guidelines about their new book and how developers can apply it to their own code.
MQTT is making the Internet of Things an interoperable and flexible world where the smallest devices can talk to the largest of servers. This article presents the Eclipse Paho project. 2
In this article, Ben Evans explores some features in Java 7 which lay the groundwork for the new features in Java 8. 4
JavaOne 2013 was recently held in San Francisco, from September 22 to September 26th. If you missed it we've got you covered with a round-up of the key news from the conference. 17
The Android Developer’s Cookbook is a solid reference book for mobile app developers that can serve as an authoritative guide for sound programming practices. A nice addition to a dev's book shelf. 1
A concrete example of how to get started with acceptance-test driven development on an existing code base. It is part of the solution to technical debt. 5
Tyler Jewell, CEO of Codenvy, unveils in this 2-parts article the architecture of Codenvy, providing details on its platform, plug-in architecture, workspace and cluster management, and many others.
Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how to make it more difficult for anyone to see or alter your data exchanges. 2
CONTENT IN THIS BOX PROVIDED BY OUR SPONSOR
Featured Blog Posts
We get a lot of questions about our analytics-driven Application Performance Management (APM) collection and analysis technology. Specifically, people want to know how we capture so much detailed information while maintaining such low overhead levels. Read More.
Most technology folks have heard Marc Andreessen’s provocative statement, “Software is eating the world.” Whether you agree fully or not, you’re realizing that your business critical software applications increasingly drive both the top-line revenue growth and the bottom-line operational efficiency of your company – and often form the pillar of your business... Read More.
Wouldn’t do website load/performance testing any more without having an APM tool in place. Period. Full stop. End of story. I’ve been involved in website load testing for over 10 years, as a “end-user” when I was web operations manager for an online job board, as a team leader for a... Read More.
White Papers and Assets
|QCon SF||Nov 3-5|
|AppSphere 2014||Nov 3-5|