A Guide to the Folding Technique in Java 1. Introduction In this tutorial, we consider hashing techniques used in various data structures that provide constant time access to their elements. We discuss in more detail the so-called folding technique and give a short introduction to mid-square and binning techniques. 2.… Continue Reading folding-hashing-technique

Purging Expired Tokens Generated By The Registration 1. Overview In this tutorial – we’re continuing the ongoing Registration with Spring Security series to setup a scheduled task to purge expired VerificationTokens. During the registration process a VerificationToken is persisted. In this article we will show how to remove these entities.… Continue Reading registration-token-cleanup

WebAppConfiguration in Spring Tests 1. Overview In this article, we’ll explore the @WebAppConfiguration annotation in Spring, why we need it in our integration tests and also how can we configure it so that these tests actually bootstrap a WebApplicationContext. 2. @WebAppConfiguration Simply put, this is a class-level annotation used to… Continue Reading spring-webappconfiguration

Mesos vs. Kubernetes 1. Overview In this tutorial, we’ll understand the basic need for a container orchestration system. We’ll evaluate the desired characteristic of such a system. From that, we’ll try to compare two of the most popular container orchestration systems in use today, Apache Mesos and Kubernetes. 2. Container… Continue Reading mesos-kubernetes-comparison

Java Weekly, Issue 244 Here we go… 1. Spring and Java ===== >> Optimistic locking in JPA/Hibernate [blog.arnoldgalovics.com] A good review of lost update anomalies and how to detect them using versioned and non-versioned optimistic database locks. >> Bootiful GCP: Relational Data Access with Spring Cloud GCP (2/8) [spring.io] In this installment… Continue Reading java-weekly-244