Spring Security – Roles and Privileges 1. Overview This article continues the Registration with Spring Security series with a look at how to properly implement Roles and Privileges. Further reading: Intro to Spring Security Expressions Simple and practical guide to Spring Security Expressions. Read more → Introduction to Spring Method… Continue Reading role-and-privilege-for-spring-security-registration

Java Two Pointer Technique 1. Overview In this tutorial, we’ll discuss the two-pointer approach for solving problems involving arrays and lists. This technique is an easy and efficient way to improve the performance of our algorithm. 2. Technique Description In many problems involving arrays or lists, we have to analyze each element… Continue Reading java-two-pointer-technique