And related question to the community. Does anyone know any good resource (preferred formats - video or article(s) with diagrams, more visuals) about OOP key concepts in detai...
In these examples with one-liners "read this property" or "write this property" we have great readable code. Why do you think that it's bad that for example def textInFile = f...
Hello. I assume you are the author of the article, right? The comments (I haven't paid attention to them at first) are great. People are saying good things. Especially, "Vishw...
Can someone please help me to finally understand what is the intended best usage for the "Collection.toArray(T[] destination)" method. Is it better to create destination array...
Hello! Can you please share which Eric Evans' book are you talking about? (just curious, haven't read it and want check it) Is this "Domain-Driven Design Reference: Definition...
Well, I've found a good example without diving into patterns. Check this out: http://www.angelfire.com/tx4/cus/shapes/java.html Ther's an abstract class Shape. Technically, it...
Regarding original question. Personally, I haven't ever seen such usage of marker interfaces. Neither in any codebase, nor in resources/documentation/books i.e. examples. I do...
"there're people who have the patience to explain..." - and now you met the one who does not. Welcome to real world. Why you think that if someone posts question then that qu...
What os and how much ram?
What stops you from creating two separate controllers, one for regular password and another for otp?
I often see adepts of such approach here and there. I'm surprised that you didn't suggested him to write code on paper. @mavericklady , you can follow that recommendation an...
Was anybody affected by recent log4j2 vulnarability issue? Any useful info to share? Here are some important links that may be helpful. Cloud providers: https://cloud.google....
Wow, overlooked your answer. Yeah, now I see the whole picture and understand why you asked the original question. Indeed, it makes sense to dump flash and compare hash. Real...
Also can you show your both auth providers implementation? I'm pretty sure you did it wrong, there's no need to have 2 providers
I have a question that bothers me several days. I don't have an answer to it. It's not java-only question, but more OOP one. Few days ago I was interviewing candidate for jun...
"configuration for my framework it is just a way to define test cases in JSON" - now I hope that I've finally got it. Now it all makes sense, the puzzle is complete in my head...
Guys, I have a question. I always coun't find a nice solution for this. I was writing a lib (standalone plain groovy/java project with minimal dependencies) for integration wi...
This is not about opinions, this is all about strong arguments. There's no a single argument to that by hand. No even single one. Maybe except a good practice in shell scripti...
@skippy , Now imagine that you go to the doctor complaining that you have regular stomach ache, feel uncomfortable and suspect that you need some cancer tests. And your doctor...
RxJava question. I have an Observable that emits big decimal numbers (or integers, doen'st matter actually). And I have a threshold value defined at observable composition tim...