Stephane Clinckart

Ranch Hand
+ Follow
since Oct 21, 2003
Merit badge: grant badges
For More
Cows and Likes
Cows
Total received
0
In last 30 days
0
Total given
0
Likes
Total received
0
Received in last 30 days
0
Total given
0
Given in last 30 days
0
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by Stephane Clinckart

Peter Stampede wrote:

Shai Almog wrote:
In the book I go through this in steps. Building a command line app in pure Java. Then as we proceed we go through a spring boot webservice, thymeleaf then to an SPA in JavaScript which connects back to the webservice. I think this process helps new developers understand the evolutionary process we went through historically.



That is so cool that you traverse the history of Java and the web. Understanding where things originated from always interests me.

Looking between a pure javascript webapp and one with a Java in any part of the stack, is one significantly more performant than the other? What are Java's strengths in the modern web?

Not to be overly direct or rude but I would like to understand your thoughts about, With the abundance of javascript frameworks out there, why should I learn Java?  It feels like typescript, react, and python among many others are stealing the show with modern web apps and maybe Rust and web assembly grabbing a slice of high performance applications. Where does Java fit in and what is it's future?  



I can only agree on that.

For me following are mostly always missing I would love to see covered in a (series of) book(s):

1. Security at service levels are often described with ACL, but mostly never with RBAC or similar concept (ABAC, PBAC, ...)
2. Security at data level (row + column) is almost never considered
3. Security with inheritence concept
4. Time period for security (access day x from till day y)
5. Working hours (from 8h to 17h)
6. Delegation of rights
7. Calendar of rights Delegation (during holidays, etc)
8. Auditing of service access (who did what when)
9. Auditing of data access (who had access to what when)
10. History of changes (who changed what when)
11. Performance, security, audit monitoring at service level
12. Performance, security, audit monitoring data layer level
13. Rules definitions for monitoring (critical level definitions, notifications, ...)
14. AI analysis of monitorings with automatic resolution actions
15. AI analysis of service access (ex: high frequency access to data, abnormal activity, ...)
17. Code readability optimisation (loombok, ...)
18. Declarative programming (annotation for caching, security, logging, auditing, ...)
19. Licensing. How to make optionnal some part of the application, how to secure it)
20. Code obfuscation
21. Microservices with all above included
22. Versionning of (micro)service deployed (ex: service X version 1 and 2 running same time having client v1 and v2 accessing). This allow to update the clients step by step. Mandatory in big infrastructures.
23. DDD + oignon approach with all above included
24. Integration with Graphana (or similar) of all monitored data
25. Maven (or similar) integration
26. Continuous integration (with most used tools)
27. Auto Installation packaging
28. Auto and manual Deployment platform
29. Monitoring platform multi installation

I probably miss lot of points... but this is for me all jobs that a full stack developer should know.
I never found any (series of) book(s) that touch all of this.

Challenge accepted ?
7 months ago
Full stack is complex to reduce in one book.
For me you can only scratch the surface of each part...

But I see a big advantage of this kind of book because it helps to put the pieces together in a nice way.

I'm wondering if this book cover how to handle security (RBAC) at row and column level in a database.
So far I haven't see anything of that.

Pitty... because it is really painfull to achieve that.

Interested to read the book even without that :-)

Thanks for sharing your knowledge
7 months ago
Hello Venkat,

Welcome to the Ranch

Interesting topic covered by your book.

Have a nice day

Stephane
7 months ago
Hello,

I have always wondered whether it would be possible to create a methodology for analysing and categorising the data so that once this work has been done the same "recipes" can be used systematically to process the data.

Make a kind of 80/20 where 80 represents the usual repetitive cases and 20 the exceptions.
And in the exception cases, to list the exception cases by type... so that the exceptional is also treated in a similar way.

For each data item that requires non-standard or even exceptional treatment to have a questionnaire that allows classification into one or more exception categories where the best examples of resolution are demonstrated/deconstructed.

This will leave the unique cases which will have to be treated on a case by case basis.

Does the content of the book allow for this type of methodology?  

Thank you
1 year ago
Hello,

What is the audience level of this book ?

I had level considered like "senior java developer till 2011"... then I stopped developing in Java.
I'm looking now to fill the gap.

Is this book the right book for me ?

Thanks

Kind regards
2 years ago
You mentioned previously:
HTML5 imbedded DB is not really a topic I considered, because of the focus being on Spring. But I will keep it in mind for the  next edition. Thank you!

Thanks for taking this in account.

When do you plan to write your next edition ?
2 years ago

iuliana cosmina wrote:
The book has examples of different bits of a page being loaded by different reactive components. So, I think this covers what you are interested about.



Does the framework also make use of the HTML5 imbedded DB in the browser ?
For offline work ?

And if yes, does the book cover how to "resynchronize" the data when going online ?

Thanks
2 years ago
Hi,

Long time I'm looking for a serious book covering this trio.

Do you cover the aspects of asynchronous commands and automatic page portion refresh in your book?

Thanks
2 years ago
Hi,

Are you touching data structures and algorithms (or concepts) used in crypto mining... more precisely in blockchain programming ?
Is there a recept to prepare a "conventional" program to be migrated to "blockchain" solutions ?
What are the datastructures / algoritms that are (not) elligible ?
Where should we pay attention ?

Thanks

Kind regards
4 years ago
Go
Hi,

Could you point me which plugin i should use to do the following:

On a Server A, I have Hudson (continuous integration) installed.

On a Server B, I have Selenium RC server installed (and running).

Each night, a full build is executed on the Server A (with latest version of the sources stored in svn).

I would like that my Selenium Tests Cases (and Suites) are started during this build from the Server A but the execution of the Tests should be done on the Server B (remotely from Maven thus).

How can I do that ???

Thanks for help.

Stephane
12 years ago
Thanks.

Is it possible to mix both technologies - GWT and JavaFX ???

The idea is to have an GWT application who "embed" a small JavaFX application in the banner by exemple that allow to send mail on the client side with an attachement ?
This to "hack" the fact that mailto don't allow attachment.

You think it is faisable ?

Thanks


13 years ago
Hello,

I read that in the roadmap of JavaFX2 there is something binded to handle Swing.

Can you spot me a good article that explain what is covered ?

Thanks.
13 years ago