Functional Programming

Knolx session : Monoids in Scala

Reading Time: < 1 minute This presentation is the part of our on-going knolx session. It is brief introduction to monoids in scala. Monoids are the certain common pattern followed by the various data types of a programming language. They are the simple algebraic structure governed by certain laws. A  simple monoid consists of a associative operation and an identity element and they can be implemented in the form of trait Continue Reading

Create Akka project (2.2.3) with latest sbt (0.13) and scala (2.10.3)

Reading Time: 2 minutes In this blog, i will explain that how to create Akka project with the latest sbt and scala. As we know, Now latest Akka version is 2.2.3, sbt is 0.13 and scala is 2.10.3 So lets start to create the project : First of all, install the latest sbt and scala on your system then create sbt project by following the below steps : First Continue Reading

Knol Sesssion: String Interpolation in Scala

Reading Time: < 1 minute This presentation describes the String Interpolation in Scala and its different interpolator (s, f, and raw) to fomat the string in various way. String interpolation is the replacement of defined character sequences in the string by values or variable values. String interpolation was introduced by SIP-11, which contains all details of the implementation. String Interpolation allows users to embed variable references directly in processed string Continue Reading

Scala news which business’ can use – Monthly Scala News

Reading Time: < 1 minute Scala news is published and delivered in subscriber’s email every month with reports on major events happening around Scala ecosystem, latest Scala tech releases and coming-up Scala conferences. The aim of this news publish is to equipped business’ with latest updates on Scala world. Every news reports carries links to its source, giving the viewers enough material to rely and participate in the newest findings. Continue Reading

ScalaKnol : Loan Pattern Revisited

Reading Time: 2 minutes Here I am going to modify the loan pattern described in this article “Scala Knol : Understanding Load Pattern” . Let us take an example from earlier blog, we have all used connections to get to the database and then we need to destroy the connection so that there are no leaks. OK, we can use the connection factory but let us assume that we Continue Reading

ScalaGeek – Online assessment made easy

Reading Time: 3 minutes ScalaGeek in its newest version aims to cover the complete cycle of notifying the candidates, conducting the test and evaluating the performance of candidates. Organizer/Recruiter get his own dashboard which gives access to the evaluation screen of each tests. Recruiter can easily filter out the best performing candidate using easy-to-use sorting/searching menu. Here are given the screen-shots to make the new functionality familliar: First, access Continue Reading

Configure turn server for WebRTC on Amazon EC2

Reading Time: 2 minutes As we all know, WebRTC is used for video communication. In video communication, data packets are transferred from one place to another place, therefore a user is able to see other user’s streaming. But sometimes, when there are some network securities like firewall, then data packet does not transfer and we do not get proper streaming of another user i.e. we get black screen as Continue Reading

QuickKnol: Lift Json, ShortTypeHints and Scala Traits

Reading Time: 2 minutes We use the awesome Lift Json library in quite a few our projects. It allows for easy customization and is handy for writing and parsing JSON strings. One of the situations which could possibly push you against the wall is when you have classes extending traits. Let us look at this quick example trait Reducer case class SentimentReducer(name:String, coefficientLevel:Double) extends Reducer case class EmotionReducer(name:String, coefficientLevel:Double) Continue Reading

Configure SSL on jetty server to run it with https

Reading Time: 2 minutes We can run our application with http as well as with https. We use https for secure communication over the computer network. Technically, https is not a protocol in and of itself; rather, it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications. In this blog, Continue Reading