Using Enums as Request Parameters in Spring
1. Introduction In most typical web applications, we often need to restrict a request parameter to a set of predefined values. Enums are a great way to do this. In this quick tutorial, we'll show how...
View ArticleA Quick Guide to @DirtiesContext
1. Overview In this quick tutorial, we'll learn about the @DirtiesContext annotation. We'll also show a standard way to use the annotation for testing. 2. @DirtiesContext @DirtiesContext is a Spring...
View ArticleParallel Downloading with wget
1. Overview In this tutorial, we'll use a simple tool wget to download multiple files in parallel. The commands used in this article were tested in bash, but should work in other POSIX compliant shells...
View ArticleFinding an Element in a List Using Kotlin
1. Overview In this tutorial, we're going to see how to find an element in a list using Kotlin language. Also, we're going to filter this list by a condition. 2. Find an Element in a List Let's say...
View ArticleA Guide to Java HashMap
1. Overview In this article, we'll see how to use HashMap in Java, and we'll look at how it works internally. A class very similar to HashMap is Hashtable. Please refer to a couple of our other...
View ArticleIntro to the Java SecurityManager
1. Overview In this tutorial, we'll have a look into Java's built-in security infrastructure, which is disabled by default. Specifically, we'll examine its main components, extension points, and...
View ArticleThe Java File Class
1. Overview In this tutorial, we'll give an overview of the File class, which is part of the java.io API. The File class gives us the ability to work with files and directories on the file system. 2....
View ArticleHibernate @WhereJoinTable Annotation
1. Overview Using an Object Relational Mapping tool, like Hibernate, makes it easy to read our data into objects, but can make forming our queries difficult with complex data models. The many-to-many...
View ArticleThe State of Java in 2019
I've been running the yearly 2019 “State of Java” survey for the last couple of weeks. In its 6th year, we had 6707 developers taking the time to go through and answer; if that was you – thank you!...
View ArticleLinux Commands Comparison: curl vs wget
1. Overview We may wish to send HTTP requests without using a web browser or other interactive app. For this, Linux provides us with two commands: curl and wget. Both commands are quite helpful as...
View ArticleSearching for a String in an ArrayList
1. Overview In this tutorial, we'll look into different ways to search for a String in an ArrayList. Our intent is to check if a specific non-empty sequence of characters is present in any of the...
View ArticleJava Weekly, Issue 302
1. Spring and Java >> What's new in Spring Data Moore? [spring.io] Tons of new features across the board, with a strong focus on Reactive, Kotlin, and Performance. >> JUNIT 5 And Selenium –...
View ArticleConfiguring Skip Logic in Spring Batch
1. Introduction By default, any errors encountered during a Spring Batch job processing will make a corresponding step fail. However, there are many situations where we'd rather like to skip the...
View ArticleJetty ReactiveStreams HTTP Client
1. Overview In this tutorial, we're going to learn how to use the Reactive HTTP client from Jetty. We'll be demonstrating its usage with different Reactive libraries by creating small test cases. 2....
View ArticleCommon Linux Text Search
1. Overview Searching text is a very common operation in Linux. For example, we want to find the files that contain specific text, or we want to find the lines within a file that contain specific text....
View ArticleSplitting Files in Unix Systems
1. Introduction In this short tutorial, we’ll take a look at a few different ways we can split files in Unix systems. All of these commands were tested in Bash, but are platform-independent. 2. Using...
View ArticleSimultaneous Spring WebClient Calls
1. Overview Typically when making HTTP requests in our applications, we execute these calls sequentially. However, there are occasions when we might want to perform these requests simultaneously. For...
View ArticleDigital Signature in Java
1. Overview In this tutorial, we're going to learn about the Digital Signature mechanism and how we can implement it using the Java Cryptography Architecture (JCA). We'll explore the KeyPair,...
View ArticleBreadth-First Search Algorithm in Java
1. Overview In this tutorial, we're going to learn about the Breadth-First Search algorithm, which allows us to search for a node in a tree or a graph by travelling through their nodes breadth-first...
View ArticleValidations for Enum Types
1. Introduction In the tutorial Java Bean Validation Basics, we saw how we can apply javax validations using JSR 380 to various types. And in the tutorial Spring MVC Custom Validation, we saw how to...
View Article