Open in app

Sign in

Write

Sign in

czetsuya
czetsuya

57 Followers

Home

About

Jul 1

Java XML Validation: How to Validate an XML Document against an XSD

Introducing our Java XML Validation Project! Master the art of validating XML effortlessly against XSD in a Java environment. Gain hands-on experience, ensuring the integrity and conformity of your data. 1. Introduction Introducing our Java XML Validation Project! Gain hands-on experience in validating XML documents against XSD with ease. This project serves…

Java

4 min read

Java XML Validation: How to Validate an XML Document against an XSD
Java XML Validation: How to Validate an XML Document against an XSD
Java

4 min read


May 20

Unlocking Google Calendar API with Keycloak: A Developer’s Guide

1. Overview Unlock the power of Keycloak for seamless authentication and authorization in your applications. This comprehensive guide is designed for software developers who want to integrate Keycloak into their systems to enable secure user login and token exchange with Google. By following step-by-step instructions and best practices, you’ll learn how to…

Keycloak

7 min read

Unlocking Google Calendar API with Keycloak: A Developer’s Guide
Unlocking Google Calendar API with Keycloak: A Developer’s Guide
Keycloak

7 min read


May 7

Implementing X509 Certificate Validation in Java: A Step-by-Step Guide

Unlock the power of secure communication with Java! Learn how to implement X509 certificate validation simply and straightforwardly, step-by-step. Overview An X.509 certificate is a digital certificate used to verify a particular entity’s identity, such as a website or an individual. X.509 …

Java

3 min read

Implementing X509 Certificate Validation in Java: A Step-by-Step Guide
Implementing X509 Certificate Validation in Java: A Step-by-Step Guide
Java

3 min read


May 3

Java-Based Implementation of Digital Signatures and X509 Certificates for Secure XML Document Processing

Overview XML Signature is a standard in the digital signature that allows the authentication and validation of data being sent as XML objects in web service communication. Java 6 introduces Java XML Digital Signature API, which allows the generation and validation of signatures in an XML message. According to RFC 2828…

Java

5 min read

Java

5 min read


Feb 12

How to Insert Records in Batch with Spring Data

1. Introduction When working with a REST API, we often deal with a single entity to create, update, delete, list, and get. But there are also times when we need to manage entities in batches, and this mostly happens in the back office. For example, in an ecommerce platform, promotions are governed…

Spring

4 min read

Spring

4 min read


Jan 2

Write Hello World in Java Using Intellij and Maven

Learn how to code Hello World in Java using IntelliJ and Maven. 1. Introduction This blog will teach you how to create a Hello World application using a Maven archetype in Java using IntelliJ IDE. 2. Requirements You must have the following installed on your local machine. OpenJDK 11 Maven IntelliJ community edition 3. Creating a new Java project from a Maven archetype 3.1 Creating the project Open…

Java

5 min read

Write Hello World in Java Using Intellij and Maven
Write Hello World in Java Using Intellij and Maven
Java

5 min read


Dec 26, 2022

How to implement authentication in NextJS using Amazon Cognito

Are you looking to implement authentication forms in your NextJS project using Amazon Cognito? Then this article is for you. 1. Introduction 1.1 Amazon Cognito Amazon Cognito is an authentication and authorization service that lets you manage your applications’ access control, whether a web or mobile app. Whether dealing with a small number of users…

Authentication

5 min read

How to implement authentication in NextJS using Amazon Cognito
How to implement authentication in NextJS using Amazon Cognito
Authentication

5 min read


Dec 23, 2022

How to Use Jasypt or Jce to Encrypt Passwords in Spring Config

Jasypt and JCE are encryption protocols we can use in our Spring config to secure passwords. For example, if you wanted to encrypt the API token of your GitHub repository. Or encrypting the Spring config server’s security.user.password value. Jasypt Example Instruction on how we can use Jasypt in our Spring Boot application…

Jasypt

2 min read

Jasypt

2 min read


Dec 13, 2022

Securing your NextJS Web Application with AWS Amplify and Cognito

1. Introduction NextJS is an open-source framework for developing React applications, while Cognito is a user identity service that lets you secure your applications. Cognito also supports the OAuth form of authentication. AWS Amplify is an open-source library for managing AWS services like Cognito. It exposes an Authenticator library that can secure…

React

2 min read

React

2 min read


Dec 5, 2022

Microservice Architecture with Spring Cloud in Code

1. Overview Microservice is a service-oriented architecture where an application is deployed as a collection of loosely-couple services. The goal is to make each service independent, fine-grained, scalable and flexible, allowing faster testing and release. 2. Microservices 2.1 Business Services 2.1.1 applicant-services Dummy service that returns a list of applicant names. @GetMapping("/applicants-by-job") public List<String> getApplicantsByJob() {…

Microservice Architecture

3 min read

Microservice Architecture with Spring Cloud in Code
Microservice Architecture with Spring Cloud in Code
Microservice Architecture

3 min read

czetsuya

czetsuya

57 Followers

Open for Work | Java Backend Developer

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams