DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

  1. DZone
  2. Sitemap Home
  3. Articles
  4. 2013
  5. July

DZone Sitemap: July 2013 Articles

  • Adding Spring-Security to Openxava
  • Algorithm of the Week: Homomorphic Hashing
  • Algorithm of the Week: Spatial Indexing with Quadtrees and Hilbert Curves
  • An Introduction to Generics in Java – Part 5
  • Apache Camel / Talend ESB: Your Management and Monitoring Options
  • AWS: Attaching an EBS volume on an EC2 instance and making it available for use
  • Building Apache Axis2/C on Mac OS X Mountain Lion 10.8.4
  • Circular Dependencies With Jackson
  • Coming in ActiveMQ 5.9 a new way to abort slow consumers.
  • Content Negotiation Using Spring MVC
  • Converting Java Objects to Byte Array, JSON and XML
  • Creating External DSLs using ANTLR and Java
  • Displaying all argv in x64 assembly
  • Displaying and Searching std::map Contents in WinDbg
  • Easy Messaging with STOMP over WebSockets using ActiveMQ and HornetQ
  • Escaping XML with Groovy 2.1
  • Exploring Zipf’s Law with Python, NLTK, SciPy, and Matplotlib
  • Fake System Clock Pattern in Scala with Implicit Parameters
  • Flexible configuration with Guice
  • Getting started with JPA and Mule
  • Java 8 APIs: java.util.time - Instant, LocalDate, LocalTime, and LocalDateTime
  • Java Just-In-Time Compilation: More Than Just a Buzzword
  • Java: Testing a Socket is Listening on All Network Interfaces/Wildcard Interface
  • JAX RS: Streaming a Response using StreamingOutput
  • Jersey: Listing all Resources, Paths, Verbs to Build an Entry Point/Index for an API
  • JMS vs RabbitMQ
  • Leaflet JS: Resizing a map to keep a circle diameter inside it
  • Log4j 2: Performance close to insane
  • Node.js Call HTTPS With BASIC Authentication
  • OLAP Operation in R
  • OpenHFT Java Lang Project
  • PhoneJS - HTML5 JavaScript Mobile Development Framework
  • Playing with NHibernate - Inverse and Cascade Mapping Attributes
  • Read Outlook Email Template (.OFT) File & Save Message as MSG Format
  • Spire.Barcode for .NET
  • Sprint Backlogs in Practice
  • Stepping through LMDB: Making Everything Easier
  • Story Point
  • Strategy Pattern using Lambda Expressions in Java 8
  • The Legacy Code Retreat
  • Understanding The Problem Domain Is The Hardest Part Of Programming
  • Using Morphia to Map Java Objects in MongoDB
  • What is Claims-Based Authentication?
  • Why I Never Use the Maven Release Plugin
  • Why Static is Bad and How to Avoid It
  • Why String is Immutable in Java
  • Working With Gradle, Spring Aspects and Compile-time Weaving
  • Writing Clean Predicates with Java 8

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: