Matthias is working at Red Hat where he is leading the AeroGear project. Previously, he was the PMC Chair of the Apache MyFaces project.
We are going to use Docker and Overcast. Probably you already know Docker. It's a technology to run applications inside software containers. Overcast is the library we will use to manage docker for us. Overcast is a open source java library developed by XebiaLabs to help you to write test that connect to cloud hosts.
As you might have gathered from OWASP’s definition of broken authentication and session management, is that the realm of possible areas this risk encompasses is overwhelming. Application security is a broad subject and authentication and session management is just a piece of the whole pie.
After the introduction of annotations in Spring 3.0, implementation of validation was simpler and cleaner. Developers can reduce the code by using the Hibernate Validator framework along with Spring. Follow these steps and you can easily implement validation using the JSR-303 constraint.
Apache Camel has a new release recently, and some of the new features were blogged about by my colleague Claus Ibsen. You really should check out his blog entry and dig into more detail, but one of the features I was looking forward to trying was the new REST DSL.
As you might be aware, the initial wave of Java EE 8 JSRs are now launched, including the platform JSR itself, CDI 2, JSON-B, JMS 2.1, Servlet 4, JAX-RS 2.1, MVC and JSF 2.3.
Software architects will design the application from various perspectives and also decides, based on various reasons, which approach to take to expose new API to third party applications. As a software architect, it is good practice to involve your development team lead.
When field access mode is used, JPA directly reads the state values from the fields of an entity using reflection.
In the spirit of “here’s something I couldn’t find an easy answer for so I’m writing it myself”, let me very briefly run you through how to have Raygun.io ignore specific exception types raised by Web API.
Just a short week ago the vJBUG was live-streaming the Red Hat mini-booth sessions from JavaOne and we made all of them available for your to watch if you haven't been able to catch up
Dependency Injection is a widely used software design pattern in Java (and many other programming languages) that is used to achieve Inversion of Control.
If the future of IT is about integrated infrastructure, where will this integration take place? Most people will naturally tend to integrate systems and tools that occupy adjacent spaces in common workflows.
JSR 199 provides the compiler API to compile the Java code inside another Java program. The following are the important classes and interfaces provided for facilitating the compilation from a Java program.
I have been playing around with converting an application that I have to use Spring @Configuration mechanism to configure connectivity to RabbitMQ - originally I had the configuration described using an xml bean definition file.
One of the ways Spring recommends injecting inter-dependencies between beans is shown in the following sample copied from the Spring's reference guide.
Vaadin has became a popular choice of web applications in many platform and Liferay portal is no exception. There are several business applications built with it and this year's Marketplace app contest Vaadin-based applications took a double-win.
Two weeks ago I attended and presented at the awesome API Strategy and Practice conference in Chicago. Many sessions were recorded so you can watch them when you have time. My session: Using cloud tools to build enterprise mobile apps with APIs fast was part of the Enterprise track.
In one of the spring web applications we decided to use Log4J2 with SLF4J; when we deployed the web app in tomcat server along with the required jars we stumbled on the issue multiple binding for SLF4J and spring dependencies not getting satisfied.
This is a very simple application written in Jaggery. It is basically a address book which supports adding new record to the book and deleting records from the book. This application is purposely restricted to those functionalities to keep the code simple to make it easier for the newbies.
Once the audience restriction is enforced on OAuth tokens, they can only be used against the intended audience. You can access an API with an access token that has an audience restriction corresponding to that API.
In my previous article I was writing about Scala 4 Spring MVC without Web.XML and how to handle static resources accessed by AngularJS front-end client. In this article I will show how to connect the application with Apache Tiles 3.0.
Make sure you didn't miss anything with this list of the Best of the Week in the Enterprise Integration Zone (Oct 3 to Oct 9). This week's topics include microservices and PaaS, hypermedia and state machines, the future of microservices architecture, APIs in Big Data, and the Hacker News API.
Attend Red Hat's hands-on workshop and experience Red Hat JBoss Fuse and OpenShift. Learn how middleware and cloud solutions bridge theory with reality. Come and learn about OpenShift, JBoss Fuse, Fabric8 and HawtIO, and how to implement a successful DevOps strategy.
This tutorial, the second of the three-part series, explains how to develop a single sign on based identity management system with Shibboleth IDP and SP. This will also show how you can traverse the resources of multiple applications with single login mechanism.
As with previous DZone research guides, we currently have an audience survey making the rounds for our 2014 Guide to Enterprise Integration. DZone has been focusing on enterprise architecture with our content for many years now, and we want to hear your feedback on various integration topics.