A Use Case With JavaCC [Snippet]

Let's say you have the following file:

fsdfsdfsdf 
sfsfasdfsdf  dfdsfsdfs f 
sfsfasdfsdf  
 Barcelona, Total SCORE 8 (4+4). 
          having 100% success rate. 

sfsdfsdfdf sfasdfum 34749n afsf

 Barcelona, Total SCORE 2 (6-4). 
          having 100% success rate.    


Don’t Complicate Spring Controllers With Commotions

@Controller Implementing Interface

You may get into the problem as described below

The mapped controller method class 'com.xyz.ABController'is not an instance of the actual controller bean instance 'com.sun.proxy.$Proxy108'.
If the controller requires proxying (e.g. due to @Transactional), please use class-based proxying.

Who Cares What Tools You Use, Just Keep Your Application Lightweight

Software applications are judged by many facets, for example, easy maintainability, easily altering of software behavior via configuration, speedy incorporation of a new feature without affecting existing features, how performant the application is, etc. 

If there is a question on building such software, you would get a different answer based on whom you approach. Spring evangelists would say "Spring is the framework for all you needDump the Java EE Standards since Java EE Lost the Competition and Spring Won" while Java EE adherents would respond by saying "It's not Spring anymore, it is the summer of Java EE 7 since the age of frameworks is over hence move from spring to Java EE.

Take Pub/Sub to the Next Level With an Enterprise Event Bus

You have distributed applications (from different vendors running on variety of platforms) integrated with middleware infrastructure. Applications interact with each other in a traditional/synchronous way by sending messages over the Enterprise Service Bus (ESB)/Broker to get the job done.

Infrastructure Problem

The synchronous infrastructure is causing delays leading to unproductive wait times and dissatisfaction from the users. There is a need for applications to propagate information (state changes and interesting events) to other interested applications asynchronously without knowing the details about their identity.

When to Use Java 8 Default Methods in Interfaces

One of the Oracle’s articles describes in great detail when Default methods should be used:

The section Interfaces describes an example that involves manufacturers of computer-controlled cars who publish industry-standard interfaces that describe which methods can be invoked to operate their cars. What if those computer-controlled car manufacturers add new functionality, such as flight, to their cars? These manufacturers would need to specify new methods to enable other companies (such as electronic guidance instrument manufacturers) to adapt their software to flying cars. Where would these car manufacturers declare these new flight-related methods? If they add them to their original interfaces, then programmers who have implemented those interfaces would have to rewrite their implementations. If they add them as static methods, then programmers would regard them as utility methods, not as essential, core methods.

Encryption and Signing

Symmetric Encryption

Symmetric encryption means that the same key is used to encrypt and decrypt:

Public Key Infrastructure (PKI)

Asymmetric Encryption

To solve the problem of negotiating 100 keys, if you want to send something privately to 100 individuals/system, a public/private key is used. If a message is encrypted using public key then it can be decrypted only with private key, and on the same line, if a message is encrypted using a private key, then it can decrypted using only a public key (not even with a private key)