REST security is a hot topic. One of the reasons for this is the continued blowback from the over-complexity of the WS-* specifications. These specifications, including WS-Security, WS-Trust, and WS-ReliableMessaging, and were notorious for being difficult to comprehend.
When I wrote Patterns of Enterprise Application Architecture, I coined what I called the First Law of Distributed Object Design: “don’t distribute your objects”. In recent months there’s been a lot of interest in microservices, which has led a few people to ask whether microservices are in contravention to this law.
I got into a discussion online about MSMQ and its performance. So I decided to test things out. What I want to do is to check a few things, in particular, how much messages can I push to and from MSMQ in various configurations.
Good news out there. The recent nightly builds of NetBeans (apparently upcoming 8.0.1) already contain the latest WildFly Plugin. So you don't need to add it manually and can start working with your favorite application server right away.
The terms "modularity" and "microservices architecture" pop up quite often these days in context of building scalable, reliable distributed systems.
Since Groovy 2.3 we can use the MarkupTemplateEngine to generate XML/HTML. We can write our templates using a builder syntax.
In most of our projects we have dependencies on other code, like libraries or other projects. Gradle has a nice DSL to define dependencies. Dependencies are grouped in dependency configurations. These configuration can be created by ourselves or added via a plugin.
While a lot of folks (our team included) spend most of their efforts spreading the good word on Java EE 7 and now increasingly Java EE 8, sometimes it helps to get back to the basic
The article presents an example on one of the top OWASP vulnerability related with authentication and session management. This is termed as “Broken Authentication and Session Management”. To know more about this vulnerability and related details, visit OWASP page for authentication and session management.
Since Groovy 2.3 we can use the new MarkupTemplateEngine to generate XML/HTML content.
Java EE component life cycle and concurrency related details might not be new for seasoned professionals, but it is something which can take time to sink in for beginners. As far as EJBs are concerned, understanding their life cycle is extremely critical in order to ensure appropriate usage and solution design using EJBs.
This guide will get you up and running with this product, to run a demo, kick start a Proof of Concept (PoC), or just to let you explore the use cases that these products can cover. The main tool for teaching you about what this product can do will be the example demo projects.
Many banks are running on huge legacy mainframes. According to industry analysts, IT departments spend 70 to 90 percent of their budgets managing and maintaining these disparate systems, leaving little left over for new initiatives.
Overall, the message of OSCON is clear: open source is, today, a highly-valued building block of enterprise IT. There is no longer a slightly shamefaced need for an enterprise developer to admit that he or she is leveraging open source software in an application.
We see a similar pressure on enterprise IT with regards to mobile app development. Enterprise IT is under pressure to deliver and update mobile apps fast. Using traditional tooling is becoming a bottleneck as businesses cannot afford to wait 6-12 months to deliver a new app.
The article represents steps required to configure Tomcat 8 with Eclipse Kepler.
In this article about Message Cowboy, I will talk a bit about how to use the program. Using the configuration properties, we can configure which database will be used, whether to start an embedded ActiveMQ broker and some additional aspects of database storage and the embedded JMS broker.
A Grails application uses Spring under the hood, which means we can also use all of Spring's features in a Grails application.
I showed you how simple it is to expose CRUD REST operations on your database with TopLink/EclipseLink. The next logical step is to then consume those with Oracle MAF to build a mobile application.
As the title clearly suggests, this book deals with Performance Tuning. It focuses on tuning, monitoring and optimizing the performance of Java EE applications in particular.
For those who have been programming Java or C/C++ for any period of time will know one of the most annoying things is trying to debug a crash due accessing a null object
Dropwizard, as described on their website is a "Java framework for developing ops-friendly, high-performance, RESTful web services."
We use a logging layer over log4j to encourage our developers to log at any point in the code where they thought some extra context would help resolve runtime errors. The layer had to have a familiar API, be effortless to code, and cheap to call. This posting is mostly about the cost to call the logger and a little about enhancing the presentation of logged values.
When I started my career as a Java developer close to 10 years ago, the industry is going through a revolutionary change. Spring framework, which was released in 2003, was quickly gaining ground and became a serious challenger to the bulky J2EE platform.
Although OAuth is not for authentication (the "auth" is for authorization), it usually presupposes that an authentication event has taken place. In the case of the Axway API Gateway, you can use the internal use store for this authentication, or you can use a third-party repository like LDAP.