Subscribe: Untitled
http://www.developer.com/icom_includes/feeds/special/dev-5.xml
Preview: Untitled

Untitled



Featuring in-depth articles, hands-on tutorials, case studies, and industry news for professional developers of all disciplines.



Copyright: Copyright 1996-2010 Quin Street Corporation
 



Combining Hibernate Cache and Ehcache for Better Java Scalability
Combine Hibernate second-level cache, Ehcache and Spring to greatly improve the scalability of your enterprise Java applications.



Pessimistic Locking in JPA 2 and Hibernate
JPA version 2 and Hibernate both support pessimistic locking for Java concurrency control, but not in the same way.



Bean Validation in Hibernate and JPA 2
Learn how Hibernate Validator handles Bean validation, and how you can implement it in Hibernate and JPA 2.



Is Ubuntu Contributing as Much as It Should to Free Software Projects?
The dispute over this issue reflects a clash of changing values about the future of open source.



Google Hacking Evolves for Defense
New tools announced at Black Hat will enable Google and Bing search queries for security vulnerability detection.