Here we go…
1. Spring and Java
>> Deep Dive into JUnit 5 Extension Model [infoq.com]
This great writeup introduces a clever extension for creating and executing BDD specification tests. Very cool.
>> How to Implement a Custom, Sequence-Based ID Generator [thoughts-on-java.org]
If you don’t want to roll-your-own database sequences, you’ll want to check out some of the cool sequence generators that you can quickly build in Hibernate by extending its SequenceStyleGenerator class.
>> X.509 client certificates with Spring Security [blog.codecentric.de]
A solid overview of the entire workflow involved in securing a Spring Boot REST service using X.509 digital certificates.
>> Bootiful GCP: Getting Started with Spring Cloud for Google Cloud Platform (1/8) [spring.io]
This quick introduction helps you build a basic Maven project for Spring Cloud GCP. Should be an interesting series!
>> Hibernate database catalog multitenancy [vladmihalcea.com]
A straightforward tutorial on configuring catal0g-based multitenancy in JPA and Hibernate — especially useful for databases that distinguish between a catalog and a schema, such as MySQL.
>> I believe in Java modules [blog.vavr.io]
A thoughtful piece reminding Java library developers of the benefits of migrating to the Java Platform Module System.
>> Hibernate with Kotlin – powered by Spring Boot [kotlinexpertise.com]
A nice, hands-on article that demonstrates how to implement JPA/Hibernate entity classes in Kotlin and use them with Spring Data repositories. Good stuff.
Also worth reading:
-
>> Carefully Specify Multiple Resources in Single try-with-resources Statement [marxsoftware.blogspot.com]
-
>> NetBeans Makes Progress at Apache [infoq.com]
-
>> How to lazily load non-relational attributes in a portable way [thoughts-on-java.org]
-
>> JBoss Web Server 5 with Tomcat 9 is Available [infoq.com]
-
>> JDK 11: Release Candidate Update and OpenJDK JDK 11 LTS [marxsoftware.blogspot.com]
-
>> JSON-B Asymmetrical Property Binding [blog.sebastian-daschner.com]
-
>> CompletableFuture Timeouts in Java [4comprehension.com]
Webinars and presentations:
-
>> Istio’s Networking API Explained [blog.sebastian-daschner.com]
-
>> DSL.using(java).toGoBeyond(BeanValidation) [youtube.com]
Time to upgrade:
-
>> Spring Framework 5.1 RC2 available now [spring.io]
-
>> Spring Session Bean-M1 and Apple-SR4 Released [spring.io]
-
>> Spring Data Lovelace RC2 available [spring.io]
-
>> Spring Security 5.1.0.RC1 Released [spring.io]
-
>> Spring Boot 2.1 M2 available now [spring.io]
-
>> Spring Integration for AWS 2.0 GA and Spring Cloud Stream Kinesis Binder 1.0 GA [spring.io]
-
>> AssertJ Core 3.11.0 release: New and noteworthy [joel-costigliola.github.io]
2. Technical and Musings
>> HTTPS security best practices [advancedweb.hu]
So, you think you know your way around HTTPS? Make sure you’re practicing safe security with this handy collection of HTTPS “dos and donts”.
>> Decoding Clojure code, getting your feet wet [blog.frankel.ch]
A short primer on some of the basic constructs and conventions of the Clojure functional language for the JVM. Sure to evoke feelings of nostalgia in former (and current) Lisp devotees.
>>Beyond Interactive: Notebook Innovation at Netflix [medium.com]
See how Netflix is taking the Jupyter Notebook infrastructure beyond its roots in data science and into general-purpose applications like workflow scheduling.
>> The Pitfalls of SIT [blog.scottlogic.com]
A reminder that system integration testing brings with it a unique set of challenges. But fear not — there are strategies to help us achieve just the right balance each step of the way.
>> Looking at randomness and performance for hash codes [vanilla-java.github.io]
As you might expect, hashing algorithms are not one-size-fits-all commodities. Find out which ones are better suited for inputs of different lengths.
>> 3 Use Cases Where Structured Log Data Really Helps [reflectoring.io]
A solid writeup on why we should treat log data as first-class data, with a few common scenarios to back it up.
>> Before You Turn On Two-Factor Authentication… [medium.com]
Even though adding 2FA is usually a good idea, it pays to know the risks involved, as well as the recovery mechanisms available, in case you get locked out of your accounts.
Also worth reading:
-
>> How to Write Multiset Conditions With Oracle VARRAY Types [blog.jooq.org]
-
>> Writing Big JSON Files with Jackson [techblog.bozho.net]
-
>> Easy integration between services with Apache Camel [blog.codecentric.de]
-
>> A Caveat with AWS Shared Resources [techblog.bozho.net]
-
>> TomEE: Running with Systemd [tomitribe.com]
-
>> The Must-Have Metrics Any DevOps and SRE Manager Should Measure [blog.takipi.com]
-
>> An Anecdote About Trust [blog.tfnico.com]
-
>> Sharing our Experience – Migrating to Agile mid-Project [blog.scottlogic.com]
-
>> Chaos Engineering GameDay [blog.codecentric.de]
-
>> The Curious Case of Not Hiring Directly into Software Engineer V (Or Whatever) [daedtech.com]
3. Comics
And my favorite Dilberts of the week:
>> Jerry the Contract Employee [dilbert.com]
>> What Makes an Idea Great? [dilbert.com]
>> It’s an Engineering Secret [dilbert.com]
4. Pick of the Week
>> The One Rule for Life [markmanson.net]