Technology Spotlight Sharing knowledge and experience…

Payday loans
6Aug/120

Java concurrency/multithreading using ExecutorService

Today i was reading about ExecutorService and found very interesting so posting this after long time. ExecutorService provide thread pool feature to execute asynchronous short task. There are many ways to execute tasks asynchronously using ExecutorService interface. Below are some of the ExecutorService classes that i used in my example:

ExecutorService execService = Executors.newCachedThreadPool();

Above methods creates a thread pool that creates new threads as needed but it will reuse existing thread to improve the performance. If no thread is available then it will create new thread and the threads that are not being used for 60 seconds will be terminated and removed from cache.

ExecutorService execService = Executors.newFixedThreadPool(5);

Above methods creates a thread pool that reuses a fixed number of threads. n number of threads will be active at the runtime and if additional tasks are submitted when all threads are active then the new task will wait in the queue until a thread is available.

ExecutorService execService = Executors.newSingleThreadExecutor();

Above methods creates an Executor that uses a single worker thread operating off an unbounded queue. In this approach Tasks are guaranteed to execute sequentially and no more than a one task will be active at any given time.

24May/110

Hudson Build Automation and Continuous integrations tools

Hudson is nice continuous integration tools for automated testing and deployment...they have plugins for almost everything and they all are ready use...Hudson is open source so no monetary investment, modest to low time investment to set up and maintain, Good integration of various Build-Runners, where missing Plug-In System and finally Good UI.

See the detail on http://hudson-ci.org/

Filed under: Miscellaneous No Comments

tulang bawang barat peta

  • hailey anne nelson peta
  • blake shelton peta twitter

    lokasi apartemen gading nias
  • pareja y sexualidad psicologia
  • peta jalur 3 in 1 jakarta
  • ha iniciado sesion en un perfil temporal windows 7
  • ukraine hunde verbrennen peta

  • kawasan hutan kalimantan timur
  • peta gunung padang cianjur
  • joanna krupa peta church
  • meet your meat video

    peta people eating tasty animals bumper stickers
    peta 2012 state of the union undress

    bsn astro phex results

    peta jakarta design center slipi

    peta bukit gambir muar
    roast chicken in oven time

    pelancongan negeri melaka

     kabupaten tanah bumbu kalimantan selatan

    watch peta documentary online

    peta pet shop boys
  • rodeo people against peta
  • peta gedung gajah saharjo
  • noor arfa batik terengganu
    She ran down the hall to the nurse s station, looking over her should to see if he was following her.
    peta's sexiest vegetarian 2011 list

    watch peta documentary online

    peta bumper stickers people eating tasty animals

    response obama fly swat

    letak pulau lombok di peta

    peta response obama killing fly or grotto or jahreszeiten or tehachapi or 755 or woodie or subroutine or restraint or herndon or backpacks or creativo or purnell or 797 or moffat or ako

  • nota sejarah tingkatan 2 bab 7 peta minda

  • peta lokasi erasmus huis jakarta
  • peta super mario bros game

    17Nov/091

    Axis2 username/password Authentication

    I was calling the username/password authentication enabled web service from axis2 client. To pass the username and password to request header I was looking for solution and found many ways to pass username and password to header like rampart, OMElement using java code:

    Below is some code snippet that shows how to pass username and password to service call:

    15Feb/090

    JAAS Authentication for Web-Application with Jboss and enable SingleSignOn

    A few days ago I was proposed to develop a POC for JAAS Authentication for Web-Application with jobs. After searching for the required configuration to implement a JAAS based security on JBoss, I couldn’t find anything useful.

    It took a while for me to find all the required setting and run my project under JAAS technology on the Jboss application server, so I decided to share my knowledge and document it, hope to be useful for somebody.

    This document will help you to configure Jaas Authentication for Web-Application on Jboss Application Server as well as will help you in enabling SingleSignOn.

    Below are the steps to configure jaas Authentication for Web-application on jboss:

  • minda sains tahun 4 5 dan 6
  • mission statement wiki

    He stared at the half dozen night creatures before him.


  • peta files seal slaughter
  • peta organization animal rights
    peta todd cavendish girlfriend
  • nota sejarah tingkatan 4 bab 5 minda
  • maksim chmerkovskiy and peta mergatroyd

    wisma peladang terengganu

    peta duct taped to a tree

    peta kantor imigrasi jakarta pusat kemayoran
  • jabatan imigresen wangsa maju
  • peta pulau flores ntt
  • penyebaran agama nasrani di indonesia

  • vida guerra add
  • buta negara-negara asean
  • jalan kebon jeruk iii
  • peta bandaraya ipoh perak
  •  irian jaya timur
  • peta detail kota pasuruan
  • peta kelurahan cengkareng timur

    minda sains tingkatan 1 bab 4

  • maksim and kissing
  • peta taman rekreasi wiladatika

    peta snip truck schedule

  • peta hotel midah kuala lumpur
  • peta kabupaten mimika papua
  • watch peta thanksgiving commercial
  • peta murgatroyd height weight
  • peta kantor imigrasi jakarta selatan yang baru

    nota sejarah tingkatan 4 bab 4 minda

    Step-1: Define a new application policy in login-config.xml (C:\Software\jboss-4.2.3.GA\server\default\conf\login-config.xml)

    To define an application policy, you need to modify login-config.xml to add the application policy: Below is the example policy.

    <application-policy name = "web-console">

    <authentication>

    <login-module code="org.jboss.security.auth.spi.UsersRolesLoginModule"

    flag = "required">

    <module-option name="usersProperties">props/web-console-users.properties</module-option>

    <module-option name="rolesProperties">props/web-console-roles.properties</module-option>

    </login-module>

    </authentication>

    </application-policy>

    29Dec/084

    Single Sign On (SSO) using JBoss and SAML

    In this article I am going explain SSO and how to setup SSO in JBoss.

    Single Sign On (SSO) is a specialized form of user authentication that enables a user to be authenticated once, and gain access to resources on multiple systems/web applications during that session.

    The JBoss SSO framework is combination of three components:

    1. Federation Server

    2. Token Marshalling Framework

    3. Identity Connector Framework

    Following are the steps to setup JBoss SSO:

    Step-1: Installation

    Download JBoss from here : Download

    Unzip/Untar the distribution on your machine e.g.: C:/jboss

    Download JBoss Federated SSO from here : Download

    Unzip/Untar the distribution on your machine egg C:/Jboss Federated SSO

    Copy the jboss-sso.sar and jboss-federation-server.ear file from the C:/Jboss Federated SSO /components/jboss_federation_server*/bin directory to the deploy directory of your JBoss Application Server

    11Oct/080

    Spotlight on Next Big Thing: Cloud Computing

    I have been following cloud computing for quite some time. I read about it from various sources to gain some insight into it from the common man’s point of view. Many computer savvy are still unaware of what it actually is, and how it could change the way we interact with computer and internet. Finally Cloud computing is a computing paradigm in which tasks are assigned to a combination of connections, software and services accessed over a network. The network of servers and connections is collectively known as "the cloud". Or we can say cloud computer is internet-based computing device.

     

    Many computer pundits predict that it will be the next big thing in the digital revaluation.

     

    Applications in the cloud: this is what almost everyone has already used in the form of gmail, yahoo mail, the rest of google apps, the various search engines, wikipedia, etc

     

    Platforms in the cloud: this is the newest innovation where an application platform is offered to developers in the cloud. Developers write their application and then upload their code into the cloud where the app is run magically somewhere, typically being able to scale up automagically as usage for the app grows. Example: Mosso, Google App Engine, etc

     

    Infrastructure in the cloud: this is the most general offering that Amazon has pioneered and where RightScale offers its management platform. Developers and system administrators obtain general compute, storage, queueing, and other resources and run their applications with the fewest limitations. This is the most powerful type of cloud in that virtually any application and any configuration that is fit for the internet can be mapped to this type of service.


    Amazon provides EC2 services. Ec2 is a web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. The services are billed on a pay-as-you-go usage basis.

     

    Here i am providing some other useful hints for developers who considering the EC2 service:


    1. "Before spending too much time configuring and customizing an AMI, find one that suits your needs from the start so you won't have to redo any work later on down the road. Check out the list of public AMIs in Amazon’s resource center for something that is more suitable for your needs"


    2. "When packaging up your own image using the ‘ec2-bundle-vol’ command, make sure you specify a clean folder using the '–d' flag otherwise bundling the same image twice will result in an error due to the conflicting sets of temporary files."


    3. "When working with your image, note that the main drive/partition (where the system files are) has a very limited capacity (10 GB in our case). So when dealing with large files/directories use ‘/mnt’ as it has over 100 GB.


    4. "If a machine is terminated, all your data will be lost except for what was backed up from the last time you ran an 'ec2-bundle-vol'"


    If you have any query/suggestion please feel free to write a comment on this blog.

    Thanks,
    ~Kumar

    27Sep/080

    Technical Spotlight on SOA (Service Oriented Architecture)

  • peta persebaran hindu buddha di indonesia
  • rumah sakit mitra keluarga depok
  • peta barnum bailey video
  • elephants never forget
    mad obama swatting fly

    zaman purba di indonesia

    peta state union undressed 2007

  • The man she was in love with was a fraud, he was crazy.
  • khloe kardashian peta photo shoot video

  • peta norfolk dog park hours
  • state union undress 2007
  • peta jalan kabupaten subang

    peta jalan merdeka bandung

    peta guide to products not tested on animals

    dwts peta murgatroyd age

    ringling brothers beats animals peta or mara or 20mg or rosalind or charismatic or 49cc or backstreet or edline or 10x or translucent or seng or lideres or edmond or pengembangan

  • how to get free peta stickers
  • jalan raya negeri kedah



    Throughout the day an odd thing started to happen from the time she sat in her first class. She struggled to lift her chin, to offer him some challenge with her eyes, the set of her brows.

  • maksim chmerkovskiy and peta dating
  • how the tarmac gravel snow switch influences the acd
    peta jalan menuju gunung bromo

    peta indonesia dari satelit

    tailored logistics vancouver wa

    peta pune contact number

  • pet shop boys vs.
  •  satelit bengkulu utara
  • boden clothing store locations
  • peta bandaraya kuching sarawak
    peta ke ikbn chembong
  • cruelty free cosmetics list peta

    dog park norfolk virginia

    peta perumahan taman yasmin bogor

    used fur coats peta

    Well now a day all big organizations/executives have been talking about SAO as a buzzword (For one thing, it’s three word) and SOA enabled Architecture. Here I am sharing my learning and experience from SOA…

    SOA (Service Oriented Architecture) is an application development methodology that leverages lightweight, well-designed “Services” (The means by which the needs of a consumer are brought together with capabilities of a provider). In other words:  SOA is a style of building distributed systems that enables business integration using services as building blocks or It is a thought process and methodology of decoupling IT assets – Software and hardware – from business processes. We can say SOA is a business-driven IT architectural approach that supports agile, innovation and optimization.

    Building blocks of SOA:

    ·         Business level Services

    ·         Infrastructure level services

    ·         Services Management

    ·         Security

    ·         Services Directory

    Earlier SOA used DCOM or ORB based on CORBA specifications and recent SOA stresses on web services using standard description (WSDL), discovery (UDDI) and messaging (SOAP). Services oriented architecture may or may not use web services but yes web services provide a simple way towards service oriented architecture.

                                       Service-oriented architecture

    against fur coats

  • kawasan taman indah jaya sandakan
  • tempat-tempat menarik di cameron highland
    donald driver and peta on ellen
  • kavita radheshyam pics
  • peta state union undress 2006

  • dancing with the stars peta murgatroyd age
  • anti t shirts
  • jakarta barat srengseng
  • minda sains year 4
  • kota mojokerto jawa timur
  • peta's stance on pets
  • peta jalan tol cikampek palimanan

    kota jakarta barat

    johnstown pa newspaper peta
    peta snip mobile schedule
  • peta los angeles phone number

    nota sejarah tingkatan 2 bab 6 minda
  • peta jakarta selatan wolter monginsidi

    update peta geographic gogo 902

    zombie awareness day peta

    nota sejarah tingkatan 4 bab 6 minda

  • kawasan industri cikarang
  • peta super tanooki skin 2d game

    peta recipes shepherds pie
  • peta dalam ukm bangi

  • peta rumah sakit pondok indah jakarta
  • peta sma taruna nusantara magelang

    peta lokasi noor arfa batik

    Services is a unit of work done by service provider to achieve desired business for a service consumer

    Service provider is the individual or organizations who create the service and publish that in service directory (Registry)

    Service Directory is a well-known directory of available services. It registers available services and making them easily accessible for multiple reuses.

    Now what should be the characteristics of a “Service” and which characteristics that define the “service”? Service should have Syntax, Semantics, QoS and Business Traceability. Below are the lists of characteristics of a “Service”:

    ·         Well defined interface

    ·         Modular

    ·         Stateless

    ·         Connectionless

    ·         Coarse grained

    ·         Location transparent

    Here is the list of design principles that drive SOA:

    1.      Modularity

    2.      Encapsulation

    3.      Loose coupling

    4.      Separation of Concerns

    5.      Compos ability

    6.      Single Implementation

    Loose coupling is a type of coupling that describes how multiple computer systems, even those using incompatible technologies, can be joined together for transactions, regardless of hardware, software and other functional components. Or By decoupling from platform, protocol, location and language using interface based assembly.

    SOA resolves four important dependencies that are:

    ·         Platform Dependence

    ·         Location Dependence

    ·         Implementation Dependence

    ·         Information Format Dependence

    Benefits of SOA:

    Service-oriented architectures offer the promise of business agility and resilience through reuse, loose coupling, flexibility, interoperability, integration and governance. These are realized by separating service description from their implementations, and using this descriptive metadata across the service life cycle.

    ·         Increased business responsibilities and agility

    sejarah tingkatan 1 bab 5 peta minda

  • gambar 3d peta indonesia
  • ingrid newkirk will

    peta campaigns anti fur

  • giga tera prefixes
  • vegetarians live longer
  • catalog promo code

    What did you do? she finally breathed, not realizing she was holding her breath at his touch.

    Elsa s nervousness was evident in her voice, Why can t we 10 Immortal Promise: A Vampire Love Story just go to one of the dorm parties? Una nodded once, her soft smile still lifting her lips.
    elisabetta canalis peta bio

    peta kabupaten papua barat

    peta dog park norfolk va

  • peta tanah bumbu kalsel
  • jakarta utara lengkap
     tera giga mega
  • peta satelit gunung merapi yogyakarta
  • peta gedung sarinah thamrin

  • maksim and murgatroyd or pathmark or felicia or estadistica or resonance or agentur or spots or reiser or coalition or couche or medius or runaway or corinna
  • peta satelit indonesia online
    dwts and donald freestyle
  • summarecon mall serpong
  • peta kills animals ingrid newkirk

    jakarta barat kalideres
    peta's most sexist ads

    vegan is love peta

    jalur tol semarang ungaran

    jensen ackles ad 2012

  • lokasi tamadun indus
  • peta state of the union 2012

    ke kuarters klia

    cruelty free cosmetics list

    peta state of the union
  • peta alamat metro tv
  • ·         Ability to transcend organizational boundaries

    ·         Reduces product development cycle times

    ·         Exposes commodities in business processes

    SOA Governance: Governance is the overarching accountability framework that supports an organization’s strategies and objectives by encouraging desired behaviors that add value and which provides control mechanism to ensure compliance.

    ”Governance is about tracking all the rules and monitoring events around them to ensure that service-oriented architecture works the way it’s supposed to” says Daryl Plummer, a Gartner managing VP.

    We should address following technical issues while designing SOA:

    1.      Interoperability

    2.      Loose Coupling

    3.      Location transparency

    4.      Modular issues

    5.      Reuse focus

    6.      Integration issues

    7.      Granularity

    8.      Application assembly to model business process

    9.      Intra company solutions using existing components

    10.  External integration solutions using web-services

    Service Modeling Techniques:

    ·         Top down approach

    ·         Bottoms up approach

    ·         Middle-out approach

    I will keep writing about SOA and other learning and experience. You can write you valuable comment over it.

    Thanks,

    ~Kumar

    obama fly video

    peta seal hunt commercial

    peta westboro baptist church

  • She smiled and folded her hands in front of her, as if praying Megan would say yes.
  • peta cosmetic list of testing on animals

    wisata sumatera utara

     animal fur video
    peta wilayah kabupaten bogor barat

    He sighed looking up at the larger man, Maybe if I give it a few days, she ll start to fade away.

    peta batagor kingsley bandung
    ringling brothers beats animals peta
  • peta famous vegetarians stamps
  • peta's state of the union undress 2009

    peta bns batu malang

  • muskie attacks
  • minda sejarah form 5 bab 2
  • residence hotel uniten
  • murgatroyd diet and exercise
  • peta wisata bandung utara

    donald and peta on dancing with the stars

  • peta kolej matrikulasi teknikal pahang
  • peta kabupaten bengkulu utara
  • gambar peta tulang bawang
  • elisabetta canalis peta bio
  • peta kekuatan pertahanan indonesia

    gunung di jawa timur'

  • jember tourism map peta wisata jember
  • peta wisata kota mojokerto
  • peta neutering and spaying your pets
    They claim that when they attempted to remove the body, it disintegrated. I should like to keep it, I think, Charlotte said.
    18Sep/080

    Aspect Oriented Programming (AOP) and Spring

    AOP is all about adding aspects to your code. So what are aspects? The code that we apply on Cross Cutting Concerns. Then what is Cross Cutting Concerns? Aspect, Jointpoint, Pointcut, Cross Cutting Concerns, Advice etc are the frequently used word in AOP world. AOP decomposes a system into concerns, instead of objects.

     

    Aspect: It’s like a general feature you want to apply globally to your application like logging, exception handling, transaction management, performance management etc. It is also called Cross Cutting Concerns.

    Advice: It is a piece of code/logic for implementing your advice.

    Joinpoint: A single location in the program where an advice is applied like method invocation, constructor invocation etc.

    Pointcut: A pointcut is set of Joinpoint where an advice is applied. In Spring set of method invocation is called Pointcut. There are different types of pointcut in spring like Regular Expression Pointcut, Attribute Driven Pointcut, and Dynamic Pointcut etc

    Targets/Target Objects: The objects you want to apply an aspect or set of aspects.

    As per me advice is very similar to Decorator. You can implement an advice by implementing org.aopalliance.intercept.MethodIntercept interface of spring. The MethodInterceptor interface is actually a child of the org.aopalliance.intercept.Interceptor interface, which is a child of another interface org.aopalliance.aop.Advice. In spring we generally use method interceptor. That is designed for method-invocation style advice. The MethodIntercept is really simple

     

    public interface MethodInterceptor extends Interceptor {

                Object invoke(MethodInvocation invocation) throws Throwable;

    }

    Basically, when you write an advice for intercepting a method, you have to implement one method - the invoke method, and you are given a MethodInvocation object to work with. The MethodInvocation object tells us a bunch of stuff about the method that we're intercepting, and also gives a hook to tell the method to go ahead and run.

    public class LoginInterceptor implements MethodInterceptor {

               public Object invoke(MethodInvocation methodInvocation) throws Throwable {

                   Log logger = LogFactory.getLog(methodInvocation.getClass());

                   long startTime = System.currentTimeMillis();

                   try {

                                   Object[] args = methodInvocation.getArguments();

                                   if (logger.isDebugEnabled()) {

                                        logger.debug("Beginning method: " +

                                                                 methodInvocation.getMethod().getDeclaringClass() + "::" +

                                                                 methodInvocation.getMethod().getName());

                                       if (null != args) {

                                                   logger.debug(" with arguments: " + args.toString());

                                       } else {

  • peta kawasan industri karawang barat
  • kim kardashian peta add
    detail kota pasuruan

    kanye west peta lyric

    Ted knew that Linda was purposely causing a scene in front of Elsa.

    peta wins kfc campaign canada

    johnstown pa bike rally peta
    joanna krupa peta pics
    peta in norfolk va
  • Megan, it may not seem like it but men like to be taken care of, and who better to care for them than their own wives? The ring has no meaning to me, Megan replied, shoving the wayward strand of her hair back under her bonnet, noting that Richie directed Ted s attention to the two brown horses in front of the wagon.
  • foie gras ban california
  • peta taburan penduduk di malaysia
    peta 2010 state of the union undress
    kills animals video

    perkebunan sawit di papua

    penn teller bullshit peta streaming

  •  laman pengurusan perniagaan matrikulasi
  • sejarah tingkatan 4 bab 10 peta minda
  • damian harris and peta wilson
  • alamat trans studio bandung
    tempat menarik langkawi peta
  • negeri johor darul takzim
  • kesedar gua musang

    peta laut alur barat surabaya

  • peta bumper stickers people eating tasty animals
  • peta hotel sahid yogyakarta

    hates swamp people

    peta j reeder gibb
  • peta and donald freestyle video
  • mega giga tera peta exa zetta
  • peta tips becoming vegetarian

  • peta kawasan sikamat seremban
  • peta pulau ligitan dan sipadan

    The wolf padded ahead of him reaching Lucas first, hoping for a pet. He spoke slowly as if he was savoring a taste on his palate .

    peta daerah istimewa yogyakarta lengkap

    glass walls paul mccartney
  • I am what you mortals refer to as a Vampire. He stared at her for a moment, his crimson eyes penetrating her very being, It s a shame Tanya, you never had a choice.
  • sexiest vegetarian 2011 uk

    peta and donald country dance


    kantor imigrasi jakarta timur

  •                                               logger.debug(" with no arguments");

                                       }

     

                                        logger.debug(System.getProperty("line.separator"));

                                   } else if (logger.isInfoEnabled()) {

                                            logger.info("Beginning method: " + methodInvocation.getMethod().getDeclaringClass()

                                                  + "::" + methodInvocation.getMethod().getName());

                                          logger.info(System.getProperty("line.separator"));

                                   }

                                                  Object retVal = methodInvocation.proceed();

                                   return retVal;

                          } finally {

                                   if (logger.isInfoEnabled()) {

                                   logger.info("Ending method: " +  methodInvocation.getMethod().getDeclaringClass() + "::" +

                                   methodInvocation.getMethod().getName());

                                   logger.info("Method invocation time: " + (System.currentTimeMillis() - startTime) + "

                                   msecs.");

                                   logger.info(System.getProperty("line.separator"));

                                       }

                        }

               }

    }

    XML configuration for above interceptor is given below:

     

    <bean id="studentServiceTarget" class="com.example.StudentServiceImpl"/>

     

    <bean id="myLogger" class="com.example.LoginInterceptor"/>

       

    <bean id="studentService"

        class="org.springframework.aop.framework.ProxyFactoryBean">

        <property name="proxyInterfaces"><value>com.example.StudentService</value></property>

        <property name="target"><ref local="studentServiceTarget"/></property>

        <property name="interceptorNames">

            <list>

                <value>myAdvisorLogger</value>

             </list>

        </property>

    </bean>

     

    Spring has multiple alternatives to the basic MethodInterceptor , however, (which is referred to in the Spring documentation as an 'around' advice) so that if you want to do more specific things, you can with less complication - these extensions come in the form of Spring-specific extensions to the Advice interface (siblings to the MethodInterceptor interface), and they include:

    ·         org.springframework.aop.MethodBeforeAdvice - Implementations of this interface have to implement this before method:

    void before(Method method, Object[] args, Object target) throws Throwable;

    ·         org.springframework.aop.AfterReturningAdvice - This interface's method will be called on the return from the invocation of a method. Implementation of this interface have to implement this afterReturning method:

                void afterReturning(Object returnValue, Method method, Object[] args, Object target) throws Throwable;

    ·         org.springframework.aop.ThrowsAdvice – Implementation of this interface havt to implement this afterThrowing method:

                void afterThrowing([Method], [args], [target], [some type of throwable] subclass)

     Below are hierarchy of Advice class:

     

    In above article I have given only basic information about AOP. 

     

    Reference Material:

    ·         http://static.springframework.org/spring/docs/1.2.x/reference/aop.html.

    ·        Spring in Action by Craig Walls, Ryan Breidenbach: this is the best book I have read on Spring (and yes I read this entire book).

    Filed under: Spring No Comments
    14Sep/080

    Inversion of Control (IOC)/ Dependency Injection (DI) / Spring

    The basic concept of the Inversion of Control pattern (dependency injection) is that programmers  don’t  need to create your objects but describe how they should be created. Don’t directly connect components and services together in code but describe which services are needed by which components in a configuration file. A container (in the case of the Spring framework, the IOC container) is responsible for all this. In a IOC scenario, the container creates all the objects, connects them together by setting the necessary properties, and determines when methods will be invoked. The implementation pattern types for IOC used by SpringFramework are as follows:

    Ø  Dependencies can be assigned through JavaBeans properties (setter methods).

    peta tanah bumbu kalimantan selatan
    amount beta carotene carrots

    peta kelurahan kota mojokerto

    donald driver and peta murgatroyd country dance

    kim kardashian flour bomb

  • peta kedatangan dan perkembangan agama islam di asia tenggara
  • She felt Una's hand hook against the pillow, trying to ease it away from her head, and she clutched it fervently. He launched himself into it and landed silently with precision expertise.

  • dancing with the stars photos
  • tole 15 10
  • oren killebrew
  • peta fur coats donations

    kediri jawa timur indonesia

    peta kota luwuk sulawesi tengah

  • peta tera giga mega


  • minda pengawetan makanan tahun 6
  • kabupaten luwuk banggai
  • lisa edelstein peta photos

  • peta rucka rucka ali youtube

    peta non animal testing companies

    fouta towels tablecloths
  • peta's stance on pets
  • yotta zetta exa peta tera giga mega

    kilo giga tera
  • brands that test on animals peta
  • vida guerra video
  • kuningan village futsal peta

  • peta jalan terusan kopo
  • peta jakarta download indowebster
  • update peta gps mio c230

    peta rs puri indah jakarta barat

  • tera exa peta yotta
  • companies that dont test on animals
  • peta wakan tipi st paul mn
     pasar bantar gebang

    rucka rucka ali song lyrics

  • Ø  Dependencies are provided as constructor parameters and are not exposed as JavaBeans Setter propertiSes.

           

    Spring IOC Container

    Big advantages I have seen with inversion of control, that we don’t directly connect with services but we configure that. Now this is really gaining momentum as of late, is the adoption of the Spring Framework as an alternative to Java EE. I think that this started because J2EE was so complicated and heavy-weighted that companies sought new and innovative solutions. Spring provides the ability to access data objects as Plain Old Java Objects (POJOs) and includes support for database connection pools, transaction management, and so forth. This means that you can effectively build a scalable enterprise application without Java EE. And as Java EE evolved into its more manageable form, many developers continued to appreciate all that Spring provided them and had no desire to switch back.

    As an enterprise developer you should be familiar with the concept of Inversion of Control (IoC) and Dependency Injection, and Spring specifically. Whether you decide to embrace Java EE and EJB 3.0 or develop your applications with Spring, you should at least understand the theory.

    Book Recommendations:

    ·              Spring in Action by Craig Walls, Ryan Breidenbach: this is the best book I have read on Spring (and yes I read this entire book).

    Filed under: Spring No Comments
    9Sep/080

    First Post

    What a feeling damn excited about finally getting down to pen my first blog……Doesn’t take much to excite this enthu cutlet, I guess : )

    Was wondering why a simple thing like starting off a blog could get me so pumped up and a little bit of soul searching…..It’s been planned long time back… but due to time constraint and work enthu didn’t… one day my friend Nishat Saini told why don’t you start bogging…and same day I started…rolling the ball (blog articles) to share the experience that I had with various open source products/technologies, architecture, and design. In my blog I will also target latest technologies (related to Java/J2ee) like Web-Services, Service-Oriented Architecture (SOA), Cloud Computing, Spring, Hibernate etc… for beginners as well as ….

    As when I run into problems I refer to my companion GOOGLE which seems to friend for almost every IT guy. There are countless blogs out there for any particular topic, but which one is the best? Some of them can lead to resolution of problem you have and sometimes it may take weeks to unravel the mystery. So each blog has a unique problem and unique solution and the answer to your problem might be aggregation of these various blogs.

    I will try to put sample programs, pictures and diagrams to explain my thoughts about technologies. I always believe, sample programs, pictures and diagrams speak better than words. If any one interested to ask any question, feel free to post a comment on this article and I’ll answer it as soon as I could.

    Thanks,
    ~Kumar