Dependency Injection is a widely used software design pattern in Java (and many other programming languages) that is used to achieve Inversion of Control.
If the future of IT is about integrated infrastructure, where will this integration take place? Most people will naturally tend to integrate systems and tools that occupy adjacent spaces in common workflows.
JSR 199 provides the compiler API to compile the Java code inside another Java program. The following are the important classes and interfaces provided for facilitating the compilation from a Java program.
I have been playing around with converting an application that I have to use Spring @Configuration mechanism to configure connectivity to RabbitMQ - originally I had the configuration described using an xml bean definition file.
One of the ways Spring recommends injecting inter-dependencies between beans is shown in the following sample copied from the Spring's reference guide.
Vaadin has became a popular choice of web applications in many platform and Liferay portal is no exception. There are several business applications built with it and this year's Marketplace app contest Vaadin-based applications took a double-win.
Two weeks ago I attended and presented at the awesome API Strategy and Practice conference in Chicago. Many sessions were recorded so you can watch them when you have time. My session: Using cloud tools to build enterprise mobile apps with APIs fast was part of the Enterprise track.
In one of the spring web applications we decided to use Log4J2 with SLF4J; when we deployed the web app in tomcat server along with the required jars we stumbled on the issue multiple binding for SLF4J and spring dependencies not getting satisfied.
This is a very simple application written in Jaggery. It is basically a address book which supports adding new record to the book and deleting records from the book. This application is purposely restricted to those functionalities to keep the code simple to make it easier for the newbies.
Once the audience restriction is enforced on OAuth tokens, they can only be used against the intended audience. You can access an API with an access token that has an audience restriction corresponding to that API.
In my previous article I was writing about Scala 4 Spring MVC without Web.XML and how to handle static resources accessed by AngularJS front-end client. In this article I will show how to connect the application with Apache Tiles 3.0.
Make sure you didn't miss anything with this list of the Best of the Week in the Enterprise Integration Zone (Oct 3 to Oct 9). This week's topics include microservices and PaaS, hypermedia and state machines, the future of microservices architecture, APIs in Big Data, and the Hacker News API.
Attend Red Hat's hands-on workshop and experience Red Hat JBoss Fuse and OpenShift. Learn how middleware and cloud solutions bridge theory with reality. Come and learn about OpenShift, JBoss Fuse, Fabric8 and HawtIO, and how to implement a successful DevOps strategy.
This tutorial, the second of the three-part series, explains how to develop a single sign on based identity management system with Shibboleth IDP and SP. This will also show how you can traverse the resources of multiple applications with single login mechanism.
As with previous DZone research guides, we currently have an audience survey making the rounds for our 2014 Guide to Enterprise Integration. DZone has been focusing on enterprise architecture with our content for many years now, and we want to hear your feedback on various integration topics.
As the word is coming more and more to its nature, distributed ones, the ability to implement most common design patter is more then expected and needed. Design patterns are trying to fulfill such motivation and enable understanding of the application behavior design.
This is the first part of the series giveng an overview of what is an Identity and Access manager and what are its features. Any application or tools claiming to be a identity provider has to fullfil these bases functionalities.
This article is the third in a series on Apache Camel and how I used it to replace IBM Message Broker for a client.
One of the main reasons behind this is that each API represents a specific optimization that requires a fairly different data structure. Common to all of the various techniques however is that they were written under the assumption that disk is a bottleneck
In this article I explained how spring built-in transformers works for while transforming object message to Map Message. Sometimes the messages need to be transformed before they can be consumed to achieve a business purpose.
They've released the API as part of a longer plan to modernize the markup and frontend of Hacker News to create a more reliable source of real-time data for readers that scrape the site for content and information. They plan to convert to a new Arc-powered engine in the next three weeks.
WSO2 Governance Registry is basically a metadata repository which basically helps to store and manage metadata. In this article I am trying to explain, how to mount a remote repository to WSO2 ESB via JDBC-based configuration.
Company employees are allowed to access these APIs via web apps while they’re behind the company firewall. All data is stored in a Microsoft Active Directory, and all the web applications are connected to a Security Assertion Markup Language (SAML) 2.0 identity provider to authenticate users.
This is Part IV of the "Microservices and PaaS" blog series covering the rapidly evolving use of microservices in modern cloud software projects. Parts I and II introduced microservices concepts and discussed patterns and practices being spearheaded by microservices pioneers.
Hi all, Recently I came across with the $subject and I was unable to find a comprehensive tutorial. So In this post I've decided to show how to install and configure apache subversion server and configure the server to access via http in ubuntu.