firstname.lastname@example.org / Blog de Tecnologías Oracle desde 2009, San José, Costa Rica, La adquisición de cualquier conocimiento es siempre útil al intelecto, que sabrá descartar lo malo y conservar lo bueno. Leonardo Da Vinci /
Larry Ellison to Graduates: ‘Live Your Dreams, Not the Dreams of Others’
Going into the Weekend, chill out with our Top Picks:
How to use Java 8 Functional Programming to Generate an Alphabetic Sequence (by Java Code Geeks) I’ve stumbled upon an interesting Stack Overflow question by user “mip”. The question was: :I’m looking for a way of generating an alphabetic sequence: A, B, C, ..., Z, AA, AB, AC, ..., ZZ." This can be quickly recognised as the headings of an Excel spreadsheet, which does precisely that...
Spring Data Rest Example (by JCG Examples) In the previous few examples we demonstrated how the different spring data modules are configured and their support for the NoSql databases. In this example, I will demonstrate how we can expose our CRUD Repository as a REST Web-Service over the HTTP. We will be using MySQL as the database for this project.
In this example, we’re going through a very useful widget of jQuery, autocomplete(). Autocomplete enables users to quickly find and select from a pre-populated list of values as they type, leveraging searching and filtering. Any field that can receive input can be converted into an Autocomplete, namely, elements,
Java EE: Spring Framework Tutorial (by JournalDev) Spring is the most widely used Java EE Web application framework. It’s built on the principles of Dependency Injection and Aspect Oriented Programming. It’s an open source framework and the best part is the different modules for integration with other frameworks, such as Spring ORM, Spring MVC etc. This guide lists more than 20 tutorials for different components of Spring framework.
[Video] Online Penetration Testing and Ethical Hacking (by Symantec) The need for capable ethical hackers is a global need. Ethical hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system. They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you'll benefit greatly from completing Penetration Testing and Ethical Hacking video training course.