ronald.vargas.quesada@gmail.com / Blog de Tecnologías Oracle desde 2009, San José, Costa Rica, 23 de Febrero 15 Aniversario -"No vivas para que tu presencia se note, sino para que tu ausencia se sienta" Bob Marley
Going into the Weekend, chill out with our Top Picks:
How to use Java 8 Functional Programming to Generate an Alphabetic Sequence (by Java Code Geeks) I’ve stumbled upon an interesting Stack Overflow question by user “mip”. The question was: :I’m looking for a way of generating an alphabetic sequence: A, B, C, ..., Z, AA, AB, AC, ..., ZZ." This can be quickly recognised as the headings of an Excel spreadsheet, which does precisely that...
Spring Data Rest Example (by JCG Examples) In the previous few examples we demonstrated how the different spring data modules are configured and their support for the NoSql databases. In this example, I will demonstrate how we can expose our CRUD Repository as a REST Web-Service over the HTTP. We will be using MySQL as the database for this project.
In this example, we’re going through a very useful widget of jQuery, autocomplete(). Autocomplete enables users to quickly find and select from a pre-populated list of values as they type, leveraging searching and filtering. Any field that can receive input can be converted into an Autocomplete, namely, elements,
Java EE: Spring Framework Tutorial (by JournalDev) Spring is the most widely used Java EE Web application framework. It’s built on the principles of Dependency Injection and Aspect Oriented Programming. It’s an open source framework and the best part is the different modules for integration with other frameworks, such as Spring ORM, Spring MVC etc. This guide lists more than 20 tutorials for different components of Spring framework.
[Video] Online Penetration Testing and Ethical Hacking (by Symantec) The need for capable ethical hackers is a global need. Ethical hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system. They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you'll benefit greatly from completing Penetration Testing and Ethical Hacking video training course.
No hay comentarios:
Publicar un comentario
Te agradezco tus comentarios. Te esperamos de vuelta.
No hay comentarios:
Publicar un comentario
Te agradezco tus comentarios. Te esperamos de vuelta.