Quantcast
Browsing latest articles
Browse All 33 View Live

Image may be NSFW.
Clik here to view.

Short Introduction to iOS for Java Developers: MVC

A series for Java developers who want to learn about iOS, Objective-C and best practices.

View Article


Image may be NSFW.
Clik here to view.

Short Introduction to iOS for Java Developers: SDK

The first article about iOS for Java developers that introduces the iOS development environment and SDK.

View Article


Image may be NSFW.
Clik here to view.

Compiler aware internationalization (I18N) with Java ResourceBundle

Interesting article about how to develop compiler aware resource bundles. Including example and source.

View Article

Image may be NSFW.
Clik here to view.

Best development tools in the cloud

This article gives an overview about development tools in the cloud - like GitHub for version control, Cloudbees for continuous integration and Saucelabs for automated testing.

View Article

Image may be NSFW.
Clik here to view.

Find Java Memory Leaks at Runtime (Act 5)

Nice tutorial how to find Java memory leaks at runtime.

View Article


Image may be NSFW.
Clik here to view.

Distributed automated acceptance testing with Robot and Chef

Article how to to distributed, automated testing using Robotframework and Chef.

View Article

Image may be NSFW.
Clik here to view.

Automated Acceptance-Testing using Concordion

Article that explains the usage of the Concordian framework for automated acceptance tests. After Robotframework and JBehave this is this third article that describes the functionality of ATDD test...

View Article

Image may be NSFW.
Clik here to view.

Find Memory Leaks at Runtime – Addendum

Interesting additional blog entry that shows the usage of plumbr a new and (currently) free runtime memory analysis tool.

View Article


Image may be NSFW.
Clik here to view.

A business component architecture with Spring 3.0/3.1 – Part 2: Resources

Second part of the Spring business component architecture article.

View Article


Image may be NSFW.
Clik here to view.

Analyzing Production Outage Caused by Weblogic Compiler Threads

An example of an analysis of a stability problem in production.

View Article

Image may be NSFW.
Clik here to view.

A business component architecture with Spring 3.0/3.1 – Part 3: Properties

A series about how to develop a business component architecture with Spring - part three is about properties.

View Article

Image may be NSFW.
Clik here to view.

Robot Framework Tutorial – Overview

Very goog introduction to automated acceptance testing with the Robot Framework.

View Article

Image may be NSFW.
Clik here to view.

Robot Framework Tutorial – A complete example

Second part of a Robotframework tutorial for automated acceptance testing. It shows a concrete example how to setup and develop a Robotframework test.

View Article


Image may be NSFW.
Clik here to view.

One solution for Android TLS/SSL client authentication

A solution for a TLS/SSL client authentication on Android platform.

View Article

Image may be NSFW.
Clik here to view.

Screencast: Create your first EC2 instance

Screencast tutorial how to setup an EC2 instance.

View Article


Image may be NSFW.
Clik here to view.

10 Application Performance Tuning Tips

10 performance tuning tips that describe best practices for getting more performance and scalability out of your application. The tips are high level approaches that can be applied on any application...

View Article

Image may be NSFW.
Clik here to view.

MongoDB: Close Encounters of the Third Kind

Great blog series about MongoDB.

View Article


Image may be NSFW.
Clik here to view.

Aerospike NoSQL Database – First Contact

Interesting tutorial about first usage of Aerospike NoSQL database.

View Article

Image may be NSFW.
Clik here to view.

Useful JVM Flags – Part 7 (CMS Collector)

Introduction to the CMS garbage collector and description of the JVM parameters to configure and optimize CMS.

View Article

Image may be NSFW.
Clik here to view.

Automated Security Testing of web applications using OWASP Zed Attack Proxy

Penetration testing web applications is not an easy task, no matter if you are a Java, PHP, Ruby or C# developer. Often development teams use web frameworks to develop their application and rely on...

View Article

Image may be NSFW.
Clik here to view.

Useful JVM Flags – Part 6 (Throughput Collector)

Introduction to the throughput garbage collector and description of the JVM parameters to configure and optimize it.

View Article


Image may be NSFW.
Clik here to view.

Useful JVM Flags – Part 8 (GC Logging)

The last part of the JVM flags series is about garbage collection logging and associated flags. The GC log is a highly important tool for revealing potential improvements to the heap and GC...

View Article


Image may be NSFW.
Clik here to view.

Automation of Windows App Testing with Robotframework

This article describes step-by-step how to test a native Windows application using the popular Robotframework for test automation.

View Article

Image may be NSFW.
Clik here to view.

Debunking APM Myth Busters

An article that describes the critical factors that matters for APM in terms of detail level and overhead. It also discusses some approaches that could be applied on these tools.

View Article

Image may be NSFW.
Clik here to view.

Installing a Hadoop Cluster with three Commands

What is the quickest and best way to get a virtual Hadoop cluster running on your development machine? This article shows how to use Puppet and some other tools to setup a 3 (virtual) node Hadoop...

View Article

Browsing latest articles
Browse All 33 View Live