Security: Maintaining a secure WordPress blog

By | November 11, 2016

I already have several posts related to security of an exposed Internet site. They were all summarized in the post Blog Links: Web site security As we know, the Internet threats are constant and evolving so to maintain the same level of security we constantly have to update the configurations of a secure installation. In… Read More »

Docker: Orchestrate multiple containers with docker-compose

By | November 8, 2016

In an enterprise environment we usually separate the components in independent containers: – a database container – a business application container – a web-layer application container – a load balancing layer container/containers – etc. When running our environment with docker and if the environment consist of something more than some simple tests, at some point… Read More »

#Docker: Create a custom #Glassfish based enterprise application docker image

By | March 6, 2017

[paypal_donation_button] In the following post I am going to describe how to create a custom docker image that contains the following: – Glassfish Application Server – Java JDK 1.8 – A custom deployed EJB 3.1 Application In connection with this a Postgres docker image from which we start a container with a certain database name… Read More »

Docker: Create your own private Docker registry

By | October 24, 2016

Docker is a nice low-cost virtualization solution that is more and more popular. A very nice use case is to use it to create images of enterprise systems, images that can be used for testing without having to bother to delete databases and reinitialize testing environment. You just simply have to fire up another set… Read More »

Blog Links: SQL Server Tricks and Tips

By | February 8, 2017

The following are some interesting SQL Server related links: A lot of times you have to relocate the data and log files of a SQL Server. It can be that the default installation was not OK or you change the storage. The following tutorial is very useful Move System Databases Using SQL Server with R… Read More »

Glassfish: Resource monitoring from command line

By | February 8, 2017

Glassfish Application server is a powerful application server that can support medium to big enterprise environments. It is one of the easiest to configure and maintain application servers. No jumping through loops is required to adapt the code of your enterprise application to be deployable on it. I am an adept of command line. Because… Read More »

Blog Links: Server Backup with open source tools

By | February 8, 2017

There are lots of expensive backup tools that can be used to back-up an enterprise environment. HP and IBM are leaders of this market but the costs can go very high quickly. As an alternative one can choose some open-source backup suites that are on par with the commercial ones. Bacula Bacula is a very… Read More »

JavaEE: Caching costly data across a transaction with TransactionSynchronizationRegistry

By | February 8, 2017

Everybody knows that a database query is extremely costly in enterprise application and usually has the biggest impact in process time of a transaction. There are plenty of best practice rules a developer has to follow: 1. Retrieve as much data as possible in a single query, avoid to make a data retrieve from the… Read More »

Hibernate: Avoiding a “fake” exception: javax.persistence.TransactionRequiredException: Executing an update/delete query

By | October 21, 2017

I encountered some weird issue caused by the way Hibernate works. The exception messages returned by Hibernate are confusing as they are just a side-effect of the real issue. The code in question was something like that: In a manager bean we have the following: @Stateless(name = “ObjectManagerBean”, mappedName = “ObjectManagerBean/remote”) public class ObjectManagerBean …… Read More »

Blog Links: Web site security

By | November 11, 2016

I already had several posts related to constructing a secure website that can be released in the wild world-wide web. The following are several resources and links that will give a good idea on what one can do in order to secure a web site. First we need a way to analyse how secure our… Read More »