<img alt="" src="https://secure.leadforensics.com/150446.png " style="display:none;">
Go to top icon

Hibernate Performance Optimization (Part - 1)

To work effectively with hibernate you need to understand how hibernate executes queries. You can get the work done by using various alternative APIs which ...

By Neetesh Kadam Jul 31, 2012

Security vs Flexibility vs Automation vs Compliance (Part - 1)

Everybody who has been in IT Industry long enough would have played the balancing game between factors mentioned in the title of this post at some time or ...

By Vinay Pandey Jul 24, 2012

Java Monitor Pattern

In Java, each object provides an implicit monitor lock also called as intrinsic lock, which is used by its synchronized methods to ensure that only one thread ...

By Madhura Oak Jul 23, 2012

Importance of understanding the human and personal wins

Human resource is a term that has lost its impact after seeing it being used in a way that many a times is quite literally is inhuman or at least non-human. I ...

By Corporate Jul 23, 2012

Tech Digest – Week 29, 2012

Microsoft Office Cloud Computing

By Corporate Jul 21, 2012

Gradients In JavaFX

One of the very interesting features of JavaFX is its ability to have gradients (Linear or Radial) to the background color of the nodes. In this blog I am ...

By Sai Dandem Jul 19, 2012

Symmetric Cryptography

Cryptography is a mechanism of transforming sensitive information from meaningful plain text to some garbled form called cipher text, usually usedto securely ...

By Madhura Oak Jul 17, 2012

Tech Digest - Week 28, 2012

Enterprise Mobility and Migration Towards Cloud Data Centers Drives the Enterprise Mobile Cloud Computing Market, According to New Report by Global Industry ...

By Satish Chavan Jul 14, 2012

Enterprise Mobility Strategy Formulation

Gear up for Enterprise Mobility

Enterprises are looking for all the opportunities to sustain in today’s competitive markets by adapting latest technologies. ...

By Bharadwaj Satbhai Jul 11, 2012

Queues And Blocking Queues

The Java Collections Framework provides Queue interface and its implementation classes as shown in Figure 1 which enable usage of queue data structure in a ...

By Madhura Oak Jul 10, 2012

AWS Programmatic Billing Access

When to use programmatic billing access

Programmatic Billing Access advantages excising Amazon Simple Storage Service (Amazon S3) APIs so you can build ...

By Sandeep Dhawale Jul 06, 2012

Why HTML 5? Importance of HTML 5 in multi-device and multi-browser environment

Overview

By Bharadwaj Satbhai Jul 05, 2012

New Session Management Features In Servlet 3.0

The three mechanisms of client-side session management are HTTP Cookies, URL rewritting and HTML hidden form fields. Servlet 3.0 provides following new ...

By Madhura Oak Jul 03, 2012

About Apache Solr

Introduction:

By Neetesh Kadam Jul 02, 2012

Active Object Pattern

Ever wondered how a file is attached to an e-mail in web-based mail applications such as Yahoo Mail, Gmail etc.? If you have been using Yahoo Mail for some ...

By Madhura Oak Jul 02, 2012

e-Zest is a leading digital innovation partner for enterprises and technology companies that utilizes emerging technologies for creating engaging customers experiences. Being a customer-focused and technology-driven company, it always helps clients in crafting holistic business value for their software development efforts. It offers software development and consulting services for cloud computing, enterprise mobility, big data and analytics, user experience and digital commerce.