Docmosis V2.0
By: Docmosis View more from Docmosis >>
Download this next:
Raspberry PI with Java: programming the internet of things
By: TechTarget ComputerWeekly.com
Type: Essential Guide
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
This chapter will take you through a first-time installation of Raspbian on a Raspberry Pi with the latest Java version. It also details some additional configuration that you may want to change to optimise Java and other visual applications. Finally, Chin shows you how to create a network between your Raspberry Pi and another machine and run a simple Java application.
These are also closely related to: "Docmosis V2.0"
-
From Oracle Java to OpenSource: Making the Switch a Cost-Effective Solution
By:
Type: Talk
Join us for a live webinar on migrating from Oracle Java to OpenSource! With Oracle's new licensing model, organisations are facing serious cost increases. But is switching to an OpenSource version the solution? And what about security policies and 3rd party applications? Azul and Insight are partnering to answer these questions and more. Simon Ritter, Deputy CTO at Azul and author of "OpenJDK Migration for Dummies", will share his in-depth knowledge and best practices for a successful Java migration. Nele Matthys, one of Insight's Oracle licensing experts, will also be on hand to answer your questions. You'll have the chance to ask any questions you may have on the topic. Don't miss out on this opportunity to make your Java migration smooth and seamless.
-
Navigating the Future: Unleashing Java 21's Power with Red Hat's OpenJDK Roadmap
By:
Type: Talk
Java enthusiasts and developers, get ready to embrace the future! Java 21 has arrived, bringing with it a treasure trove of new features, including Virtual threads, String templates, record patterns, and Foreign memory. But that's not all - join us to explore how the Red Hat build of OpenJDK aligns with this exciting release. We'll discuss its roadmap and delve into the possibilities of running Java 21 in containers, on OpenShift, and in serverless environments. Discover how Java 21 and Red Hat's OpenJDK roadmap are shaping the landscape of Java development, offering powerful tools and endless opportunities for innovation. Don't miss this opportunity to stay at the forefront of Java technology!
Find more content like what you just read:
-
Java Serialization: A Practical Exploitation Guide
By:
Type: Replay
Java Serialized Objects (JSOs) are a mechanism to allow for data exchange between Java services. Because they also give attackers a stable and reliable vector for gaining remote control of systems running Java applications, they are increasingly responsible for vulnerabilities and public exploits against internet-accessible services. Join Tod and Jon as they discuss the exposure of Java Serialized Objects and the recent uptick in vulnerability research around JSO exploitation, culminating in Rapid7’s most recent research report, Java Serialization: A Practical Exploitation Guide.
-
Fail-Safe vs. Fail-Fast: Which Java Iterator Should You Choose?
By:
Type: Video
Iterators in Java provide a simple mechanism to help developers avoid runtime exceptions. In this video, we'll explore how Java iterators work, and compare and contrast the two types of Java iterators – fail-fast and fail-safe – to decide which is best for your needs.
-
Java modernization: Taming volatile licensing and eliminating Oracle compliance woes
By:
Type: Replay
The moving target of Java licensing and Oracle compliance issues impact a majority of critical workloads running today; in fact, in a 2023 survey of more than 2,000 businesses running Java, 82% of respondents expressed concern about Oracle’s Java licensing and pricing changes, and 72% are considering migrating to another solution. A Java assessment and modernization can help you: - Understand your current Java licensing state and options - Optimize your costs and performance - Modernize to a solution with stable licensing and strong compliance features This webinar is your opportunity to learn how a modernization of your Java workloads can optimize application and cloud costs, improve performance, and reduce business risk via: - Java Assessment: Learn about pitfalls and opportunities in your Java workloads to help you get control of your licensing - Cost Optimization: Learn how migration to Azul can save up to 70% on licensing costs with equal or greater performance and no high-pressure licensing practices - Proactive Compliance: Learn how to prevent Oracle audits and avoid up to 100% of claims with SoftwareOne’s License and Baseline Advisory proactive approach
-
Computer Weekly – 13 April 2021: The evolution of RPA
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our latest buyer's guide looks at the future of robotic process automation (RPA). Google's legal victory against Oracle over the use of Java APIs has huge significance for software developers. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.
-
Java container optimization for the cloud
By:
Type: Talk
Developing and deploying Java applications to the cloud is easy, right? Copy the über jar of your application into a directory and run it in any Java capable container. Done. Far from it! Creating well-behaving Java applications in containers in a dynamic computing environment such as the cloud that also utilizes its resources well can be challenging. Why? Because without proper thought your cloud deployment might not be tuned for low memory usage, might not use available memory efficiently, it might pick a wrong GC algorithm or it might not get properly updated when your base image receives security fixes. In this session we'll talk about common gotchas when deploying OpenJDK to containers in resource constrained environments, talk about a few GC and memory settings in order to get the most out of your Java application in the cloud, and give some guidance as to how to debug issues when things go wrong. Finally, we show how a good framework choice when developing a Java application for the cloud from scratch can make a real difference.
-
Post-quantum hybrid cryptography in Bouncy Castle
By:
Type: Video
While waiting for the final standards from the NIST Post-Quantum Competition, you can start preparing with a hybrid approach, combining post-quantum algorithms with traditional public key algorithms. In this workshop, Keyfactor’s David Hook and Roy Basmacier will look at several hybrid techniques as well as how they can be applied to the Bouncy Castle Java APIs, both FIPS and non-FIPS. Get CPE Credits Earn 0.5 CPE credit on this workshop. Keyfactor is an Approved (ISC)2 CPE Submitter Partner. https://www.isc2.org/ Agenda - Basic techniques and algorithms to use. The mechanisms for secret sharing in post-quantum encryption are based around Key Encapsulation Mechanisms (KEMs). We will start by looking at what is available and how they translate into the Java Cryptography Architecture. - Post-quantum hybrid cryptography in the general Bouncy Castle APIs. Building on session 1, we will look at how KEMs can be applied to more classical key agreement and key transport mechanisms. - Post-quantum hybrid cryptography in the Bouncy Castle FIPS APIs. Building further on session 2, we will look at how KEMs can be applied together with certified versions of classical algorithms. What You Will Learn After the workshop, you will have knowledge of the mechanisms that can be used in Java with the Bouncy Castle APIs for doing hybrid-cryptography to post-quantum harden classical approaches to encryption. You will be able to recognize which method is most appropriate to their situation and how to use hybrid approaches in a certified environment. For documentation and exercises, see: https://doc.primekey.com/bouncycastle/post-quantum-hybrid-cryptography-in-bouncy-castle This workshop was also held live at the Keyfactor Community Tech Meetup in Stockholm on September 7, 2022.
-
Monitoring Java Applications with Prometheus and Grafana
By:
Type: Talk
Learn how to modernize your Java application monitoring and dashboarding with Prometheus and Grafana. There's a lot of information out there when it comes to monitoring a Kubernetes cluster with Prometheus, but, in the modern enterprise landscape, applications are still what matters. Learn how to leverage Prometheus and Grafana to build slick, modern monitoring dashboards and threshold logic for Java applications.
-
How to instrument Java Applications
By:
Type: Replay
Who Should Attend: Site Reliability Engineers, Platform and Cloud Operations, Developers, Software Engineers, DevOps Engineers How to instrument Java Applications This webinar will discuss the various in-product configuration steps in detail on auto-instrumenting a basic Java application with Splunk APM. Configuration examples will include deployments of a basic Java application with and without Kubernetes and how the auto-instrumentation process is different with container orchestration. Tune in to learn about: - Splunk APM’s in-product configuration steps for easy instrumentation with OpenTelemetry - How to deploy the OpenTelemtry collector in Linux and Kubernetes - How the Splunk OpenTelemtry collector gathers metrics
-
Observability in Java
By:
Type: Talk
"As Java applications move to containers and migrate to the cloud, they become ever more complex, and it's increasingly important to monitor, analyze, and diagnose their behaviour. Observability is a new way of thinking about monitoring and understanding your applications. It’s supported by a growing range of open source tools and standards - part of the new wave of technologies that modern Java developers need to go fully Cloud Native. Join Ben Evans to get the state of the fundamentals of Observability in 2023. You'll learn how to achieve Observability in Java using OpenTelemetry, the emerging Open Standard for Observability, and we'll meet several other related OSS libraries and tools (such as Prometheus Jaeger) along the way. "
-
Enhancing Compliance and Security with Tanzu Spring Runtime
By:
Type: Talk
Public sector agencies are under unique pressure to modernize their applications and operating models, continually secure their systems, and meet several executive order requirements and mandates. In this webinar we will discuss how organizations can do so more quickly, securely and efficiently using Tanzu Spring Runtime. Spring is the world’s most popular Java Framework because it makes programming in Java easier, faster and more secure. Built on degrades of open source innovation, Tanzu Spring Runtime brings you 24x7 Commercial support for the entire Spring ecosystem (Java, Apache Tomcat®, and your Spring applications) from the experts who wrote it. Join us to learn how Tanzu Spring Runtime can help you: - Ensure Security Compliance by extending open-source Spring End of Life dates - Extend Open-Source Spring Boot 2.7 until August 2025. - Gain instant security insights into your Spring application landscape. - Enable Continuous Upgrades to stay current on Spring releases and patches. - Deliver Cost Savings & Improve Performance by upgrading your Spring applications. - Use output to help meet Authorization to Operate (ATO) and other compliance requirements more quickly We’ll also share how Tanzu Spring Consulting can provide your organization with hands-on support to help upgrade your app portfolios to the latest version of Spring, build new Spring apps, or migrate existing applications to Spring.
-
VeraTalks: What Holds Developers Back From Addressing Security Vulnerabilities?
By:
Type: Replay
Our recent State of Software Security report found that 97 percent of typical Java applications are made up of open source libraries. Unfortunately, 79 percent of developers never update third-party libraries after including them in a codebase … resulting in an unnecessary amount of vulnerabilities and technical debt. What if developers realized that 92 percent of library flaws can be fixed with an update? Or that 69 percent of library updates are a minor version change or less? Join us as we discuss the common misconceptions around open source flaws and show you just how easy it is to find and fix library flaws.
-
VeraTalks: What Holds Developers Back From Addressing Security Vulnerabilities?
By:
Type: Talk
Our recent State of Software Security report found that 97 percent of typical Java applications are made up of open source libraries. Unfortunately, 79 percent of developers never update third-party libraries after including them in a codebase … resulting in an unnecessary amount of vulnerabilities and technical debt. What if developers realized that 92 percent of library flaws can be fixed with an update? Or that 69 percent of library updates are a minor version change or less? Join us as we discuss the common misconceptions around open source flaws and show you just how easy it is to find and fix library flaws.
-
From Zero to Hero in Kubernetes Native Java
By:
Type: Talk
More than 16.5 million Java developers are currently working to realize business requirements and spend a ton of time and effort to optimize the application performance for a variety of workloads (e.g., Web, Mobile, AI/ML, Edge) in the cloud. A big issue for the developers is to adopt a new language programming or runtimes over Java due to the lack of compatibility with Kubernetes. This session will walk you through how developers can scaffold a Java project from scratch and then evolve it as a Kubernetes native application in terms of optimizing resources with the native build, integrating Kubernetes manifest (ConfigMap, Secret, Health Check), building container images, and deploy it to Kubernetes. You can also continue testing and debugging the application while it’s already deployed to the remote Kubernetes, the same as the local developer experiences of inner loop development.
-
April 2018 Patch Tuesday Analysis
By:
Type: Video
"April showers" the poem begins, and while it's not an all-out storm, April Patch Tuesday provides more than a sprinkling of updates, including critical patches. Take note as well of the out-of-band patch that protects you from an Elevation of Privilege vulnerability as well as the Java update. Java remains a common target for threat actors. In the midst of these clouds, though, here's a silver lining: Microsoft lifted the AV compatibility check prior to delivery of Windows security updates. It's full speed ahead on patching!
-
January Patch Tuesday 2019
By:
Type: Video
Happy New Year! Celebration continues in 2019 with a mild January Patch Tuesday. But, make sure you’ve deployed Microsoft’s emergency patch, released post December Patch Tuesday, so attackers with a New Year’s zero-day resolution don’t suck all the fun out of your month. Also, take note of the public disclosure, and take this calm before whatever comes next to catch up on Java support changes going forward. Java SE 8 will soon receive its last public update.
-
JBoss EAP 8
By:
Type: Talk
Red Hat recently announced the latest release of their Jakarta EE compliant platform, JBoss EAP 8.0. With this release, companies will be able to take advantage of the latest Jakarta EE APIs and significantly extend the life cycle of their enterprise Java applications. JBoss EAP 8.0 introduces improvements across many areas of the platform, including the management console and CLI, cloud workflow, security, clustering, datasource and EJB subsystems. In this webinar, we will describe the new JBoss EAP 8.0 features and the tools provided by Red Hat to help customers migrate from older versions of JBoss EAP.
-
Modernizing Java Workloads for the Cloud
By:
Type: Talk
Monolithic Java applications typically require significant time, effort, and money to support and maintain. Modernizing these applications can help you get more from your existing investments and free time for strategic projects, feature improvements, and new applications that support business initiatives. Not all application modernization efforts should follow the same pattern. In this session, we will explore three popular paths to application modernization including rehosting, replatforming, and refactoring. We will cover a comprehensive set of options for Java on cloud providers for a range of technical requirements and consumption models. Additionally, we will explore refactoring a Spring application to run on OpenShift. Red Hat technologies include: JBoss EAP, OpenShift (ARO), Quarkus
-
Integrating Data Security into the DevSecOps Toolchain
By:
Type: Video
This webinar will include discussion of the following DevSecOps capabilities: -Build - Secret Management with Gitlab and Kubernetes. -Package - Java Artifact Signing -Deploy - Postgres Short-lived credentials -Operate - AWS Bring Your Own Key (BYOK)
-
Coffee + Community | November 2021
By:
Type: Video
We sat down with Samantha Stroupe, Director of Training for Port City Java, and Nick Kyle, Training Manager for Bagel Brands, to discuss best practices in Learning & Development. They also hosted a “show and tell,” and talked about some of the exciting L&D programs they run.
-
Road to Virtual Threads Cheaper, Faster, & Easier Concurrent Applications QRK 3
By:
Type: Talk
Developers have had extraordinary experiences and taken stunning capabilities while they were developing Java microservices from local to the cloud using Quarkus for the past 5 years. But there is more to come with their journey since we have just arrived in Quarkus 3 which provides good, better, and even excellent features and capabilities in terms of developer experience, performance, scalability, and cloud integration. Especially, Quarkus 3 on Java 21 simplifies asynchronous concurrent applications using virtual threads (Project Loom) for high scalability. In this session, we take you through how Quarkus integrates Loom on Java 21 for developers to make concurrent applications easier, have cheaper memory, and have high performance using virtual threads. You can also learn about what’s new in Quarkus 3 such as JakartaEE 10, MicroProfile 6, Hibernate ORM 6, and more. Live event not at the best time for you? In order to support our global partner ecosystem, all webinars are available on-demand after the live event. Register and you will receive an email reminder for on-demand viewing. *Red Hat collects your personal data when you submit information as a part of the registration process within BrightTalk. By registering for any of our webinars, you agree that Red Hat and the Red Hat Partner Program may contact you by email about products, services, and offerings that may be of interest to you. You may opt out at any time. For more information, please visit our Privacy Policy and Partner Preference Center: https://connect.redhat.com/en/partner-preferences.
-
Event-driven autoscaling for Serverless Java
By:
Type: Talk
"Kubernetes makes it possible to autoscale various business use cases from web apps to mobile, IoT edge streaming, and AI/ML in more reliable and stable ways. One caveat of the Kubernetes autoscaling is based on hardware resource utilization (CPU, memory) through Horizontal Pod Autoscaling. This causes a new challenge to build an event-driven serverless Java on Kubernetes because the event metrics from multiple event sources (e.g., Apache Kafka, AWS SQS) are more relevant than a pod's CPU usage for deciding when applications need to be scaled out and in. Fortunately, KEDA and Knative on Kubernetes are designed to solve this challenge by autoscaling both standard apps and serverless by event metrics in a separate way. This session will teach you how to redesign your Kubernetes autoscaling architecture by event-driven metrics from Apache Kafka over standard resources (CPU, Memory) with Knative and KEDA integration for serverless Java using Quarkus."
-
Threats in 3 Minutes - Apache Log4j Vulnerability (Explained)
By:
Type: Video
Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security risks with a severity score of 10/10. Numerous enterprise applications and open-source applications commonly use Java Apache Log4j. However, the scary part is that it is hard to detect which applications use Log4j due to the way it's implemented and developed. The Log4j flow allows third-party servers to execute software code remotely, making it easy to perform all kinds of malicious actions on the targeted machine. This opens the door for detrimental damage, by stealing sensitive data, taking control of the affected machine, and installing ransomware that locks the system until the ransom demand has been met. In this video, we will be covering what the Log4j vulnerability is, how it's exploited, and how you can fix it. Watch the video to learn more!
-
Virtual #DevDay 2021 Series: Infrastructure Modernization
By:
Type: Video
Attend the Micro Focus on demand recording from the Virtual #DevDay 2021 Series. In this session learn how infrastructure modernization enables portability of business process and integration with Java and .NET frameworks. New scalable architectures support fit for purpose deployment of dev, test, and production workloads to any platform--mainframe, distributed or cloud.
-
Spring: Elevating Your Organization to New Heights
By:
Type: Video
Join us for an insightful webinar as we delve into the transformative power of Spring, one of the world's leading application frameworks for enterprise-level Java development. With a legacy built on speed, simplicity, and productivity, Spring has become the cornerstone for developers worldwide, providing a robust foundation for applications that power streaming, online commerce, and various innovative solutions.
-
Spring Boot 3 & Beyond
By:
Type: Replay
Join us for an insightful webinar as we delve into the transformative power of Spring, one of the world's leading application frameworks for enterprise-level Java development. With a legacy built on speed, simplicity, and productivity, Spring has become the cornerstone for developers worldwide, providing a robust foundation for applications that power streaming, online commerce, and various innovative solutions.
-
Interacting with data in the cloud
By:
Type: Talk
The Cloud changes how we ingest, store, and query data. It also offers a massive choice in terms of data-centric technology choices. This talk will show how you can manipulate data with the cloud-native Java framework, Quarkus. We will explore innovative ways that Quarkus provides to interact with data "at rest" with both traditional relational databases as well as NoSQL databases.
-
Log4j Vulnerability - Everything you need to know
By:
Type: Talk
The Apache Log4j vulnerability exploit has caught security teams entirely off guard. Log4j is the most popular java logging library with over 400,000 downloads from its GitHub project and the Log4j library is embedded in almost every Internet service or application we are familiar with, including Twitter, Amazon, Microsoft, Minecraft and more. Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks. We’ve subsequently seen new variations of the original exploit being introduced rapidly- over 60 in less than 24 hours. Check Point’s Infinity architecture provides zero-day protection for our customers and prevented hackers from exploiting this vulnerability in our customer deployments. Join us to discuss: • How to identify a Log4j attack • Who is vulnerable to this exploit • How to keep applications secure from this attack and future, currently unknown zero-day attacks
-
Visual COBOL Infrastructure Modernization: Deploy new platforms & architectures
By:
Type: Video
Watch the Micro Focus recorded session from a "live in person" #DevDay technical workshop designed for COBOL and mainframe application developers. Infrastructure modernization enables portability of business process and integration with Java and .NET frameworks. New scalable architectures support fit for purpose deployment of dev, test, and production workloads to any platform--mainframe, distributed or cloud.
-
Power Your AI/ML Workloads in the Snowflake Data Cloud
By:
Type: Video
Learn how to use Snowflake to power your AI and ML workloads and bring generative AI and LLMs to your enterprise, governed data with the latest innovations coming to the Data Cloud. Then, watch a live demo of an end-to-end machine learning workflow in Dataiku leveraging integrations with Snowpark for Python and Java and Snowpark ML so the data and data processing never leave Snowflake.
-
Falcon Complete Attack & Defend Demo - Falcon Cloud Security
By:
Type: Video
Join the Falcon Complete team for the latest episode in our Live Attack & Defend Demo Series. We will dive into a realistic attack scenario of an Apache Tomcat web server. Our Falcon Complete team will use Falcon Cloud Security to investigate the attack and perform live remediation within the cloud workload environment. Your key takeaways from the webinar: - Gain valuable insights into the exploitation of a Java web server within a Docker container and the potential risks it poses to your organisation's security. - Understand how you can protect and fortify cloud workload environments against sophisticated threats. - Witness live attack investigation and remediation, to appreciate the skills, steps and technologies required to successfully defend your environment. - Learn best practice strategies and preventive measures to safeguard your Java web servers running in Docker containers and enhance your overall security posture. This webcast is a must-attend for IT professionals, cybersecurity enthusiasts, and anyone interested in strengthening and extending their knowledge of cloud workload protections.
-
Innovation Showcase Ep.2: Identifying Log4j Vulnerable Assets & Assessing Risks
By:
Type: Talk
On December 9, 2021, Apache released a security advisory disclosing multiple zero-day exploits identified in a widely used Java logging library called Log4j. The Log4j vulnerabilities allow threat actors to carry out unauthorized remote code execution (RCE) and/or unauthorized Denial of Service (DoS) attacks. Log4j is an open-source Java logging library widely used in many applications and services across the globe. The popularity of the Log4j Java logging library significantly increases the attack surface to an organization. The Verizon Threat Intelligence Team (VTRAC) has found: “Some of the post-compromise activity as a result of the Log4j exploit has been the unauthorized installation of cryptocurrency miners, Remote Access Trojans (RATs), DDoS botnets, and ransomware.” VTRAC is able to review an organization’s environment to assess whether assets are subject to the Log4j vulnerabilities, provides independent third-party validation of the risk associated with and the potential impacts of the Log4j vulnerabilities, and provide containment and recommendations for any response and mitigation. During this webinar, you’ll learn how our VTRAC Log4j Assessment seeks to assess and: Determine if the organization was subject to the Log4j zero-day vulnerabilities. Help to inform the organization on decisions about the potential mitigation or investigatory actions that need to be taken. Become aware of third party service providers running in the environment that are vulnerable to Log4j. Provide independent third-party validation associated with the risk and potential impacts of the Log4j vulnerabilities.
-
Infrastructure Modernization
By:
Type: Replay
Deploy to new platforms and architectures. In this session learn how infrastructure modernization enables portability of business process and integration with Java and .NET frameworks. New scalable architectures support fit for purpose deployment of dev, test, and production workloads to any platform--mainframe, distributed or cloud. PLEASE NOTE THIS IS A LIVE REPLAY OF AN ON DEMAND SESSION. THERE IS STILL OPPORTUNITY TO ASK QUESTIONS TO MICRO FOCUS RELATED TO THIS TOPIC.
-
OpenSSL 3.0.7 - What You Need to Know
By:
Type: Video
The OpenSSL project released OpenSSL version 3.0.7, which patches vulnerabilities in current versions of OpenSSL. What does this mean for you, and how can Qualys help? Join us on Thursday, November 3rd at 10:00am PST, as the Director of Product Management, Eran Livne, answers questions from attendees and covers how customers can leverage the Qualys Cloud Platform to manage and patch two critical vulnerabilities (CVE-2022-3786 and CVE-2022-3602) in versions of OpenSSL 3.0.0 onward. Subsequent on-demand sessions are also available on Friday at 10:00am for European and Asia-Pacific regions. From this web event, you will come away with: • The latest minute-to-minute information on the OpenSSL 3.0.7 disclosure • What the OpenSSL 3.0.7 means for your environment, now and into the future • How Qualys VMDR, Patch Management, and CyberSecurity Asset Management are equipped to help you solve for the OpenSSL version 3.0.7 disclosure
-
Accelerate Application Modernization With the AI-Powered AveriSource Platform™️
By:
Type: Talk
Are you curious how AI could help accelerate your modernization strategy? Plan, document, and map your complete modernization journey with confidence. Transform your mainframe and mid-range applications written in COBOL, RPG, Assembler, PL/I, Natural (and more) while extracting business rules, as well as optimizing code quality and maintenance. Join this webinar and discover how the AveriSource Platform™ can help you: — Quickly assess risk and complexity for any application transformation project — Document and discover application architecture, dependencies, data lineage, and relationships across your entire legacy codebase — Identify and extract business rules within your applications while reducing technical debt — Leverage AI modeling to transform legacy code written in COBOL or RPG to Java, C#, or microservices — Deploy transformed code to any platform, free from proprietary runtimes, library dependencies, vendor, or platform lock-in Interested in learning more? Tune in at 2 p.m. ET on Thursday, July 11 to start your modernization journey. Unable to make the live event? Register for the webinar to watch the video on-demand after the discussion concludes.
-
Java: What are your Options?
By:
Type: Talk
It has been over a year since Oracle changed their Java licensing model. We are still receiving a large number of questions and hearing concerns from businesses all over the world. In our webinar, we will provide you with insight and advice on how to address these important questions. We will talk about the main trends we are seeing across organisations and how they plan to mitigate the risks and potential price increases in their environment. Register for our live webinar here and gain the insight you need as well as the opportunity to ask questions and gain advice from our experts.
-
AI-Driven Performance Optimization – A Real-World Example
By:
Type: Talk
Modern applications sit atop of many layers, such as Java Virtual Machines, container, database, cloud and more, each providing hundreds of settings all interacting in complex and counterintuitive ways. Manual and trial-and-error performance tuning cannot cope with this complexity with today’s fast release cycles and business speed. As a result, incorrect configurations may cause poor application performance, low reliability, and resource (cost) inefficiency. This webinar explores how an AI-driven Performance Optimization solution can allow performance engineers to automate testing, automatically identify optimal full-stack configurations to enable their companies to deliver unprecedented application performance and cost saving, while also improving operational resiliency. We will discuss: • The fundamental problem with performance optimization • Addressing the challenges with an AI-driven performance optimization • How performance optimization and performance engineering work together • Demo: optimizing a Java-based e-commerce application Please join Cyrus Manouchehrian, Micro Focus LoadRunner Product Management and Stefano Doni, Akamas Co-Founder and CTO to learn about the modern approach to performance optimization and how to get the most out of your Performance Engineering solution.
-
Harnessing the Power of Spring Framework 6 & Spring Boot 3
By:
Type: Talk
Welcome to an engaging and insightful webinar tailored for Spring Java developers, security teams, and software leaders. We're diving deep into the cutting-edge advancements in the Spring ecosystem – Spring Framework 6 and Spring Boot 3 – and offering tangible, actionable guidance for organizations who are looking to migrate to the current versions of Spring. In this webinar, we explore the major factors driving businesses toward the adoption of Spring Framework 6 Spring Boot 3, including: - Ensuring that the organization is running supported / current code to minimize security and business risks - Reviewing the advanced features of the new Spring releases that provide greater scalability/performance and reduced infrastructure consumption For those on the brink of the migration journey, we'll share vital considerations to bear in mind as you shape your migration strategy and demonstrate how the VMware Tanzu team can help you navigate these changes with ease. Come and uncover the transformative potential of Spring Framework 6, Spring Boot 3, and VMware Tanzu. Arm your enterprise with the knowledge and strategies needed to lead the charge in next-generation application development.
-
Harnessing the Power of Spring Framework 6 & Spring Boot 3
By:
Type: Replay
Welcome to an engaging and insightful webinar tailored for Spring Java developers, security teams, and software leaders. We're diving deep into the cutting-edge advancements in the Spring ecosystem – Spring Framework 6 and Spring Boot 3 – and offering tangible, actionable guidance for organizations who are looking to migrate to the current versions of Spring. In this webinar, we explore the major factors driving businesses toward the adoption of Spring Framework 6 Spring Boot 3, including: - Ensuring that the organization is running supported / current code to minimize security and business risks - Reviewing the advanced features of the new Spring releases that provide greater scalability/performance and reduced infrastructure consumption For those on the brink of the migration journey, we'll share vital considerations to bear in mind as you shape your migration strategy and demonstrate how the VMware Tanzu team can help you navigate these changes with ease. Come and uncover the transformative potential of Spring Framework 6, Spring Boot 3, and VMware Tanzu. Arm your enterprise with the knowledge and strategies needed to lead the charge in next-generation application development.
-
Top 10 KSQL FAQs
By:
Type: Video
KSQL, recently announced as generally available, is the streaming SQL engine for Apache Kafka® that’s easier than Java, highly intuitive compared to other stream processing solutions and more accessible for developers and data engineers. In this interactive discussion, the KSQL team will answer 10 of the toughest, most frequently asked questions about KSQL. These range from technical examples of managing streaming topics to practical applications and common use cases, such as market basket pattern identification and network monitoring patterns.
-
Introducing the Red Hat build of Cryostat: Optimize Java workloads in the cloud
By:
Type: Talk
Do you know how your Java workloads are performing in OpenShift? Are your services consuming too many resources or lagging in performance as load increases? Deep dive into your application’s performance by adding Cryostat to your arsenal of developer tools; a container-native application used to retrieve and analyze profiling data from your workloads running on the Red Hat OpenShift Container platform. In this session, we’ll: Discuss the challenges of deploying workloads in the cloud and how Cryostat can solve these problems Highlight some of Cryostat's feature in a live demo
-
Log4Shell: Your Questions Answered
By:
Type: Talk
Everyone agrees that the historic Log4J vulnerability, and the associated Log4Shell exploit, is the worst Java risk we’ve seen in years–maybe ever. But why? And what will remediation look like for the countless platforms and products that touch it in some way? Furthermore, how should the ecosystem prepare for the next one before it happens? Join us for an impromptu AMA session with Bugcrowd Founder and CTO Casey Ellis to hear answers to those questions, insights about how hunters on the Bugcrowd Security Knowledge Platform are working 24/7 to find and understand this vuln for customers, and to ask Casey your own questions, as well.
-
Visual COBOL 7.0 Product Launch – The Next Chapter
By:
Type: Talk
Digital transformation has changed the game—again. The new pace of rapid change now requires every IT leader to re-think their strategy. Recent research shows that building on what works, while bridging to the latest technology is the new proven recipe for success in this digital age. Achieving that outcome requires the right balance of modernization planning, partnership and technology. Join us for this exciting product launch webinar to discuss the next chapter of innovation supporting today’s core business applications, as Micro Focus unveils its latest release of Visual COBOL—version 7.0. Explore how these cutting-edge capabilities supporting application, process and infrastructure modernization, enable a continuous modernization strategy and customer success. During this webinar you will explore: • How Visual COBOL supports your DX strategy • The latest 7.0 tools supporting application, process and infrastructure modernization • New resources for the Java developer working with COBOL systems • A live product demonstration • Best practices for continuous modernization Don’t miss an opportunity to pose your questions to our expert product panel. Register now. And for more exciting news on innovative modernization, join us for the Enterprise Suite 7.0 product launch on June 30, 2021.
-
Operate Enterprise-grade Spring Apps at scale on Azure
By:
Type: Talk
Spring Boot is the world’s most popular framework for Java, with proven benefits for developer productivity. With your existing portfolio of Spring apps - you are already taking advantage of high delivery velocity, and Spring’s wide ecosystem of tools & frameworks. How do you take this to the next level with Microsoft Azure? What would fully managed infrastructure, built-in app lifecycle management, and easy monitoring look like for your Spring apps on Azure? Presenting Azure Spring Apps Enterprise, a fully managed service from Microsoft built in collaboration with VMware. The Enterprise tier combines Microsoft’s cloud expertise with commercially supported Spring Runtime and VMware Tanzu components. Applications running on Azure Spring Apps can take advantage of several benefits: - Efficiently migrate existing Spring apps and manage cloud scaling and costs - Modernize apps with Spring Cloud patterns to improve agility and speed of delivery - Run Java at cloud scale and drive higher usage without complicated infrastructure - Develop and deploy rapidly without containerization dependencies - Monitor production workloads efficiently and effortlessly In this webinar, join Microsoft and VMware teams to learn more about running Spring apps at scale, and the advantages of managed services, when costs matter. Our teams will be in San Francisco for SpringOne December 6-8, come say hello if you’re around!
-
Red Hat build of OpenJDK – past, present and future
By:
Type: Talk
Abstract: In this talk we will focus on Red Hat’s involvement in the OpenJDK project, and why we believe that our build of OpenJDK is the best JDK to use for your production environments Description: OpenJDK is the reference implementation of the Java SE specification. In the first part of this webinar we will focus on improvements Red Hat has made to OpenJDK and surrounding tooling over the years, and how these improvements can benefit you. We will take a brief look at improvements Red Hat has made, starting from taking OpenJDK to a buildable state on release in 2007, to significant enhancements such as the AArch64 port, Shenandoah Garbage Collector, Quality Testing, and more that are on the way. In the latter part we will go over our OpenJDK based offerings and our anticipated roadmap.
-
#IMOS22 Log4j Reflections: What the Vulnerability Has Taught the Industry
By:
Type: Talk
Every so often we see a security incident so major that it renders large portions of the internet critically vulnerable. We saw it with Heartbleed, EternalBlue, and more recently, Log4J. Also known as Log4Shell, this vulnerability in the Java logging tool Log4J 2 knocked the infosec community on its back as it struggled to fix thousands of affected applications. This session explores the origin and nature of the Log4J vulnerability, investigating how it happened, why it hit us so hard, and why some found it so difficult to fix. We also look into the lessons learned from the whole incident and how we might be able to apply these lessons to mitigate and avoid similar problems in the future.
-
Tools and Recipes to Replatform Monolithic Apps to Modern Cloud Environments
By:
Type: Replay
Digital transformation includes replatforming applications to streamline release cycles, improve availability, and manage apps and services at scale. But many enterprises are afraid to take the first step because they don’t know where to start. In this webinar, Rohit will provide a step-by-step guide that covers: ● How to find high-value modernization projects within your application portfolio ● Easy tools and techniques to minimally change applications in preparation for replatforming ● How to choose the platform with the right level of abstraction for your app ● Examples that show how Java EE Websphere applications can be deployed to Pivotal Cloud Foundry We look forward to you joining us. Pivotal Privacy Statement: https://pivotal.io/privacy-policy
-
DevOps for Java Shops
By:
Type: Talk
DevOps is great, if you have the people, processes and tools to support it. In this session I’ll highlight the easiest ways for Java developers to work with their IT organizations and partners to deliver their code to the cloud, including the best ways to reliably make updates and maintain production cloud code. The focus is on real-world examples using Linux command line tools, open source tools including Jenkins, and other free SDKs and tools available on GitHub. The examples, tools and demos that I show are applicable to any cloud platform, and all are available on GitHub. I will show Microsoft Azure running the samples but will not be selling azure - this is a technical talk that will focus on the code.