Quantcast
Channel: Baeldung
Viewing all articles
Browse latest Browse all 4535

Java Weekly, Issue 243

$
0
0

Here we go…

1. Spring and Java

>> Deep Dive into JUnit 5 Extension Model [infoq.com]

This great writeup introduces a clever extension for creating and executing BDD specification tests. Very cool.

>> How to Implement a Custom, Sequence-Based ID Generator [thoughts-on-java.org]

If you don’t want to roll-your-own database sequences, you’ll want to check out some of the cool sequence generators that you can quickly build in Hibernate by extending its SequenceStyleGenerator class.

>> X.509 client certificates with Spring Security [blog.codecentric.de]

A solid overview of the entire workflow involved in securing a Spring Boot REST service using X.509 digital certificates.

>> Bootiful GCP: Getting Started with Spring Cloud for Google Cloud Platform (1/8) [spring.io]

This quick introduction helps you build a basic Maven project for Spring Cloud GCP. Should be an interesting series!

>> Hibernate database catalog multitenancy [vladmihalcea.com]

A straightforward tutorial on configuring catal0g-based multitenancy in JPA and Hibernate — especially useful for databases that distinguish between a catalog and a schema, such as MySQL.

>> I believe in Java modules [blog.vavr.io]

A thoughtful piece reminding Java library developers of the benefits of migrating to the Java Platform Module System.

>> Hibernate with Kotlin – powered by Spring Boot [kotlinexpertise.com]

A nice, hands-on article that demonstrates how to implement JPA/Hibernate entity classes in Kotlin and use them with Spring Data repositories. Good stuff.

Also worth reading:

Webinars and presentations:

Time to upgrade:

2. Technical and Musings

>> HTTPS security best practices [advancedweb.hu]

So, you think you know your way around HTTPS? Make sure you’re practicing safe security with this handy collection of HTTPS “dos and donts”.

>> Decoding Clojure code, getting your feet wet [blog.frankel.ch]

A short primer on some of the basic constructs and conventions of the Clojure functional language for the JVM. Sure to evoke feelings of nostalgia in former (and current) Lisp devotees.

>>Beyond Interactive: Notebook Innovation at Netflix [medium.com]

See how Netflix is taking the Jupyter Notebook infrastructure beyond its roots in data science and into general-purpose applications like workflow scheduling.

>> The Pitfalls of SIT [blog.scottlogic.com]

A reminder that system integration testing brings with it a unique set of challenges. But fear not — there are strategies to help us achieve just the right balance each step of the way.

>> Looking at randomness and performance for hash codes [vanilla-java.github.io]

As you might expect, hashing algorithms are not one-size-fits-all commodities. Find out which ones are better suited for inputs of different lengths.

>> 3 Use Cases Where Structured Log Data Really Helps [reflectoring.io]

A solid writeup on why we should treat log data as first-class data, with a few common scenarios to back it up.

>> Before You Turn On Two-Factor Authentication… [medium.com]

Even though adding 2FA is usually a good idea, it pays to know the risks involved, as well as the recovery mechanisms available, in case you get locked out of your accounts.

Also worth reading:

3. Comics

And my favorite Dilberts of the week:

>> Jerry the Contract Employee [dilbert.com]

>> What Makes an Idea Great? [dilbert.com]

>> It’s an Engineering Secret [dilbert.com]

4. Pick of the Week

>> The One Rule for Life [markmanson.net]


Viewing all articles
Browse latest Browse all 4535

Trending Articles