Code & Cluster
Wednesday, May 16, 2012
When to use explicit Locks in JAVA ?
›
Prior to JDK 5, the only way to protect data from concurrent access was to use the synchronized keyword. The limitations of using synchroni...
Friday, April 20, 2012
Build distributed applications using Spring HTTP Invoker
›
Buliding distributed applications involves calling methods on objects that are remote - on different machines and/or different JVMs. Code r...
2 comments:
Sunday, March 18, 2012
High Availability for Web applications
›
As more mission critical applications move to the cloud, making the application highly available becomes super critical. An application not ...
2 comments:
Sunday, February 19, 2012
Java Generics #2 : what is "? super T" ?
›
Consider the merge method below that copies all elements from List source to List target. public static <T> void merge(List<? supe...
Sunday, January 15, 2012
Java Generics #1 : Subtyping using wildcard with extends
›
Generics is one of those more complicated language features in Java that is not well understood by many programmers. Many avoid it altogethe...
1 comment:
Sunday, December 18, 2011
Single Sign On for the cloud: SAML & OpenId
›
When accessing different applications owned by different organizations, having to authenticate everytime you go from one application to anot...
Saturday, November 19, 2011
What is NoSQL ?
›
NoSQL is a term used to refer to a class of database systems that differ from the traditional relational database management systems (RDBMS)...
3 comments:
‹
›
Home
View web version