Author: Sanjay Misra

Cloud Computing Tutorial

Cloud Computing– Introduction It is a virtualization technology that decreases the worth of IT base. It gives a result of IT infrastructure in lesser cost. In this tutorial of cloud, you will get fundamentals and advanced topics that are for beginners and professionals. By the use of Cloud Computing, we can access the applications as utilities over the internet. It admits us to develop, configure, and design the business operations online.While learning Cloud Computing concepts this tutorial will take you through a step-by-step...

Read More

Spring IoC Container

Spring IoC Container  Dependency injection (DI) is also called as IoC .In this process objects describe their dependencies, and the container injects those dependencies when it creates the bean. The container is the backbone of the Spring framework. A container is generally bean pool i. e. pool of beans that is build in a memory space by the framework when the application starts. An API provided by the framework disclosed methods to query the container beans. In Spring, the objects that form the backbone of an application and are managed by the Spring IoC container are beans. A bean is an object which can be instantiated, managed , and assembled by IoC container. Beans, and the dependencies between them, are repeated in the configuration metadata .The metadata is described in the form of XML, Java annotations and in the Java code. Container Overview The org.springframework.beans and the org.springframework.context packages both are the base of IoC container. Spring IoC container is defined by the interface an org.springframework.context. ApplicationContext is responsible for bean creation, configuration, and also for assemble . IOC containers in spring framework are of two types- 1. BeanFactory Container:- It is defined by the org.springframework.beans.factory. BeanFactory interface that add the configuration framework as well as main functionality for DI. 2. Application context Container:-ApplicationContext interface is an extension of Bean Factory and is defined by the org.springframework.context. ApplicationContext interface...

Read More

Generic Class

Generic Class  A class that specify to any type is known as generic class. So to create the generic class of specific type. Now, we are using T type parameter. By simple example we can create and use the generic class. Creating a generic class: class MyGenrics<T>{ T obj; void add(T obj){this.obj=obj;} T get(){return obj;} } The T type designate that it can refer to any type for an example Integer, String etc. By specify the type for class, will be used to retrieve and store the data. Using generic class: To use the generic class let’s see the code. class MyGenerics{ public static void main(String args[]) { MyGen<Integer> g=new MyGen<Integer>(); mg.add(4); System.out.println(g.get()); }} Output:4 public class MyGeneric<T> { public static void main(String args[]) { MyGeneric<Integer> g=new MyGeneric<Integer>(); g.add(4); System.out.println(((Object) g.get())); } private Object get() { return 4; } private void add(int i) { }...

Read More

REST Service Annotation

REST Service Annotation RESTful web services are easy to develop, and they have the ability to produce and consume different types of media i.e. information. In most cases, REST web services are encouraged for services that will be sending and receiving information over the Internet. A Java class that is a REST service implementation contains a multiple annotations. The possible annotations that may be used to create a REST service. Annotation :- @POST @GET @PUT @DELETE @HEAD @Path @PathParam @QueryParam @Consumes @Produces @Provider Annotation Description:- @POST Request method designator that processes HTTP POST requests. @GET Request method designator that processes HTTP GET requests. @PUT Request method designator that processes HTTP PUT requests. @DELETE Request method designator that processes HTTP DELETE requests. @HEAD Request method designator that corresponds to the HTTP HEAD method. Processes HTTP HEAD requests. @Path The value of this annotation should correlate to the relative URI path that indicates where the Java class will be hosted.Variables can be embedded in the URIs to make a URI path template. @PathParam A type of parameter that can be extracted for use in the resource class. The URI path parameters are extracted from the request URI, and the parameter names correlate to the URI path template variable names that are specified in the @Path class-level annotation. @QueryParam A type of parameter that can be extracted for use in the resource...

Read More

Web Services Security

Web Services Security Overview Web services technologies and  the usual methods of securing applications are not relevant anymore. New challenges have arisen from the very paradigm of Web services, which remain unaddressed by the traditional security methods. Thus, the promoters of Web services needed to figure out some way of securing Web services Without the proper security infrastructure in place, This realization gave birth to a surplus of technologies and standards that can be used to secure a Web service. Challenges of Securing Web Services The main benefit of Web services architecture is the ability to deliver integrated, interoperable solutions. Define a wide security model for Web services requires the combination of currently available security processes and technologies with the evolving security technologies. It demands the unification of technological concepts relevant to Web services, such as messaging, with process based concepts, such as policies, trust, and so forth. This unification of technologies and concepts should take place in such a way that it supports the abstraction of functional requirements of application security from the specific implementation mechanisms. For example, an online bank customer viewing his banking financial details  should not be impacted by whether he is using a cell phone or a desktop to do so, as long as the device on which he is viewing his account details  and able to properly convey security information, such as identity...

Read More