Quantcast
Channel: Baeldung
Browsing all 3573 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Introduction to Supervised, Semi-supervised, Unsupervised and Reinforcement...

1. Overview Machine learning consists of applying mathematical and statistical approaches to get machines to learn from data. It consists of four big families of techniques: Supervised learning...

View Article


Guide to Useful File Manipulation Commands

1. Overview In Linux, everything is a file. So, file manipulations – creating a file, removing a directory, etc. – are very common operations in Linux. In this tutorial, let's see some useful file...

View Article


Get the Current Date Prior to Java 8

1. Introduction In legacy systems, we might need to work with dates when neither the new date and time API nor the highly recommended Joda-Time library is available. In this short tutorial, we're going...

View Article

How to Pass Command Line Arguments to Bash Script

1. Overview Linux has a rich and powerful set of ways to supply parameters to bash scripts. In this tutorial, we'll look at a few ways of doing this. 2. Argument List Arguments can be passed to a bash...

View Article

How to Mount and Unmount Filesystems in Linux

1. Overview We know that files are the central operating units in the Linux system. Files and directories are stored in filesystems, which can be located on various devices, such as a hard disk or a...

View Article


Image may be NSFW.
Clik here to view.

Guide to Eureka Self Preservation and Renewal

1. Overview In this tutorial, we're going to learn about Eureka Self Preservation and Renewal. We'll start by creating a Eureka server alongside multiple Eureka client instances. Then, we'll register...

View Article

Overflow and Underflow in Java

1. Introduction In this tutorial, we'll look at the overflow and underflow of numerical data types in Java. We won't dive deeper into the more theoretical aspects — we'll just focus on when it happens...

View Article

Hibernate @NotNull vs @Column(nullable = false)

1. Introduction At first glance, it may seem like both the @NotNull and @Column(nullable = false) annotations serve the same purpose and can be used interchangeably. However, as we'll soon see, this...

View Article


Pattern Matching in Scala

1. Overview Pattern matching is a powerful feature of the Scala language. It allows for more concise and readable code while at the same time providing the ability to match elements against complex...

View Article


Checking if Two Java Dates are On the Same Day

1. Overview In this quick tutorial, we'll learn about several different ways to check if two java.util.Date objects have the same day. We'll start by considering solutions using core Java – namely,...

View Article

Image may be NSFW.
Clik here to view.

Intro to Apache Tapestry

1. Overview Nowadays, from social networking to banking, healthcare to government services, all activities are available online. Therefore, they rely heavily on web applications. A web application...

View Article

Spring MVC Themes

1. Overview When designing a web application, its look-and-feel, or theme, is a key component. It impacts our application's usability and accessibility and can further establish our company's brand. In...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Spark Graph Processing with GraphFrames

1. Introduction Graph processing is useful for many applications from social networks to advertisements. Inside a big data scenario, we need a tool to distribute that processing load. In this tutorial,...

View Article


A Quick Guide to Timeouts in OkHttp

1. Overview In this quick tutorial, we'll focus on different types of timeouts we can set for the OkHttp client. For the more general overview of the OkHttp library, check our introductory OkHttp...

View Article

Circular Linked List Java Implementation

1. Introduction In this tutorial, we'll look at the implementation of a circular linked list in Java. 2. Circular Linked List A circular linked list is a variation of a linked list in which the last...

View Article


Image may be NSFW.
Clik here to view.

Handling URL Encoded Form Data in Spring REST

1. Overview For an end-user, the process of form submission is convenient, and to some extent, equivalent to just entering data and clicking on a submit button. However, from an engineering...

View Article

How to Implement a Quarkus Extension

1. Overview Quarkus is a framework composed of a core and a set of extensions. The core is based on Context and Dependency Injection (CDI) and extensions are usually meant to integrate a third-party...

View Article


Image may be NSFW.
Clik here to view.

Introduction to Netflix Genie

1. Overview In this tutorial, we're going to explore the Genie engine, which Netflix developed for submitting jobs to clusters in an abstract way. Basic knowledge about big data processing, for example...

View Article

Fibonacci Series in Java

1. Overview In this tutorial, we'll look at the Fibonacci series. Specifically, we'll implement three ways to calculate the nth term of the Fibonacci series, the last one being a constant-time...

View Article

Java Weekly, Issue 310

1. Spring and Java >> Don’t expose your JPA entities in your REST API [thoughts-on-java.org] We can't fully avoid coupling, but mixing web and persistence layers is almost always a bad choice....

View Article
Browsing all 3573 articles
Browse latest View live