Are you working with Java? Have you ever seen the following warning message:
Type safety: The expression of type List needs unchecked conversion to conform to List<SomeClass>
I’ve seen it a lot. Technically, there is nothing wrong with this warning in most cases. The warning is related to API that either was built to support Java versions less than 1.5 or is a bit clumsy. Anyway, I do not really like any warnings in my code so I can’t ignore it. How to remove this warning? Read the rest of this entry »
In the following article I would like to talk about ghost connections on the FMS server. First of all, what does the term “ghost connection” mean? It is a registered and alive connection on the server without the real client. How could it happen? There are a few scenarios. Read the rest of this entry »
If you ever see how the JSR 303 validation works, you probably know how awesome this way is. I like it because it makes the code more readable, easy to maintain and to add new features. Additional information about the approach is available here, and in this article, I am going to show how to test JSR 303. Read the rest of this entry »
Yesterday I observed an interesting situation. Let’s take a look at the following use-case:
Let’s assume we have a web project hosted in Amazon Cloud. In Amazon, we do have a simple cluster with 2 nodes and the load balancer at the front. Next, we have a domain foo.com and we are using dyndns to manage dns records for our domain. Our goal is to point our domain to the load balancer. Read the rest of this entry »
In the following article, I would like to show an approach how to map one-to-one bi-directionall two entities in Hibernate.
First of all, let’s take a look at the relation between two tables in a database:
As you can see, there is the one-to-one relation between user and user_profile tables and the user_profile table has a primary key that in fact, it is a foreign key to the id property of the user table. In other words, there is a simple use-case: one user record can have only one related user_profile record.
What the mapping looks like?
There are two classes. Read the rest of this entry »
Let’s consider the following use-case.
There is a client – server basic application. The client uses a simple remoting to communicate with the server side. The server side could be powered on WebORB, BlazeDS or any other solution. The client side is using the FLEX framework. That is it about the technology stack. Now, let’s forget about the server side and just have a look at the following client code Read the rest of this entry »
Few days ago I received a question about how to push data from the server code (C#) to the client side (ActionScript) though a messaging (publish/subscribe) destination. The server side is powered by WebORB for .NET and the client side is a Flex (or AIR) client. Read the rest of this entry »
In the following article I would like to show how to secure a Flex application which uses RPC (remote procedure calls) to communicate with the server-side. The article consists of three parts:
- A simple use-case and the problem description
- How to hack a Flex application
- How to secure it
The problem is not related to a particular product. However, the solution provided above is oriented only for WebORB for .NET. Well, let’s move forward to the step #1? Read the rest of this entry »
WebORB Management Console is a flex application to manage the installed instance of WebORB. There is a number of available features in the console, and describing them is out of the article scope. I would like to say that the unsecured and available through the internet WebORB console may be a gap in the system security. So, how you can secure the console? Easily! Read the rest of this entry »