Parse is shutting down and will be missed by many. However, their resources for running an open sourced Parse backend on your own server, and migration info sets an example for other services on how to properly shut down.
Redis server provides many popular data structures like map, list, set... In practice, however, you may face more complicated requirements, such as storing several values per key, for example. The best practice for that would be implementing the Multimap.
In this post, we are going to see how we can change the layout of a page dynamically, without writing any CSS styles for the page. Sounds cool, right? Read on and see how it's done.
JSR 372 is currently in the Early Draft Review stage. The JSF 2.3 spec is not complete and will likely change significantly before finalization. In the meantime, here's a pragmatic deep-dive into JSF 2.3 in its current state.
Check out the following infographics and brief break-down to help you visualize and understand the decisions involved in choosing a microservice architecture.
There are several parser-generators out there and most of them are good enough for most goals you may have. Among them I tend to use ANTLR more than others: it is mature, it is supported, and it is fast. Read on for the full explanation.
The provider() function allows us to create a configurable service where we can set input per application for the service created using the provider(). Let's take a look at it in detail.
In this post, we will see how we can extract or unzip the uploaded files and check for some files in it in a programmatic manner. We will use a normal MVC application to work with this demo. Read on for more info.
In recent years, API use, and reliance on web services has increased. Here's a list of 12 awesome web service testing tools to aid your API and web service journey.
To enable SAML Single Sign-On in Wildfly, you also need to enable SSL for the inbound connection / call back when the users browser sends their token supplied by the Identity Provider to avoid man in the middle attacks. Read on for more information.