You've requested...

Download this next:

IBM Worklight Developer Q&A

Thanks to its constantly shifting environment, mobile development can be challenging at best. Different software versions for different platforms make QA and development a tricky business, and things will change at the drop of a hat.

Access this resource to see an open-forum developer question-and-answer for IBM's Worklight environment. See if another developer has encountered the same issue as you, and if someone has already provided an easy solution.

These are also closely related to: "BlackBerry Java Development Environment"

  • Raspberry PI with Java: programming the internet of things

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

    This chapter will take you through a first-time installation of Raspbian on a Raspberry Pi with the latest Java version. It also details some additional configuration that you may want to change to optimise Java and other visual applications. Finally, Chin shows you how to create a network between your Raspberry Pi and another machine and run a simple Java application.

  • Remote Network Access for the Hybrid Workforce

    Since 2020, the shift to remote and hybrid working models - and newly distributed employees accessing data from distributed locations - has opened up a need for more stringent and secure network access security models. This is balanced with the need for remote employees to have access to reliable, low-latency access and connectivity to cloud and data center applications. So what’s the solution? Join this session to learn more about: • Best practices for implementing SD-WAN, SASE and ZTNA • Understanding the SD-WAN and SASE ecosystem • How to keep corporate data safe across your network • The future of secure access models, and what to expect over the next 12 months Moderated by: Simon Ratcliffe, Technology Evangelist, Ensono Panelists include: Mark Mariani, Senior Product Marketing Manager, BlackBerry Nigel Thompson, Vice President, Solutions Marketing, BlackBerry Heather Paunet, SVP of Products, Untangle

Find more content like what you just read:

  • Navigating the Future: Unleashing Java 21's Power with Red Hat's OpenJDK Roadmap

    Java enthusiasts and developers, get ready to embrace the future! Java 21 has arrived, bringing with it a treasure trove of new features, including Virtual threads, String templates, record patterns, and Foreign memory. But that's not all - join us to explore how the Red Hat build of OpenJDK aligns with this exciting release. We'll discuss its roadmap and delve into the possibilities of running Java 21 in containers, on OpenShift, and in serverless environments. Discover how Java 21 and Red Hat's OpenJDK roadmap are shaping the landscape of Java development, offering powerful tools and endless opportunities for innovation. Don't miss this opportunity to stay at the forefront of Java technology!

    Download

  • Java Serialization: A Practical Exploitation Guide

    Java Serialized Objects (JSOs) are a mechanism to allow for data exchange between Java services. Because they also give attackers a stable and reliable vector for gaining remote control of systems running Java applications, they are increasingly responsible for vulnerabilities and public exploits against internet-accessible services. Join Tod and Jon as they discuss the exposure of Java Serialized Objects and the recent uptick in vulnerability research around JSO exploitation, culminating in Rapid7’s most recent research report, Java Serialization: A Practical Exploitation Guide.

    Download

  • Fail-Safe vs. Fail-Fast: Which Java Iterator Should You Choose?

    Iterators in Java provide a simple mechanism to help developers avoid runtime exceptions. In this video, we'll explore how Java iterators work, and compare and contrast the two types of Java iterators – fail-fast and fail-safe – to decide which is best for your needs.

    Download

  • Java modernization: Taming volatile licensing and eliminating Oracle compliance woes

    The moving target of Java licensing and Oracle compliance issues impact a majority of critical workloads running today; in fact, in a 2023 survey of more than 2,000 businesses running Java, 82% of respondents expressed concern about Oracle’s Java licensing and pricing changes, and 72% are considering migrating to another solution. A Java assessment and modernization can help you: - Understand your current Java licensing state and options - Optimize your costs and performance - Modernize to a solution with stable licensing and strong compliance features This webinar is your opportunity to learn how a modernization of your Java workloads can optimize application and cloud costs, improve performance, and reduce business risk via: - Java Assessment: Learn about pitfalls and opportunities in your Java workloads to help you get control of your licensing - Cost Optimization: Learn how migration to Azul can save up to 70% on licensing costs with equal or greater performance and no high-pressure licensing practices - Proactive Compliance: Learn how to prevent Oracle audits and avoid up to 100% of claims with SoftwareOne’s License and Baseline Advisory proactive approach

    Download

  • Java container optimization for the cloud

    Developing and deploying Java applications to the cloud is easy, right? Copy the über jar of your application into a directory and run it in any Java capable container. Done. Far from it! Creating well-behaving Java applications in containers in a dynamic computing environment such as the cloud that also utilizes its resources well can be challenging. Why? Because without proper thought your cloud deployment might not be tuned for low memory usage, might not use available memory efficiently, it might pick a wrong GC algorithm or it might not get properly updated when your base image receives security fixes. In this session we'll talk about common gotchas when deploying OpenJDK to containers in resource constrained environments, talk about a few GC and memory settings in order to get the most out of your Java application in the cloud, and give some guidance as to how to debug issues when things go wrong. Finally, we show how a good framework choice when developing a Java application for the cloud from scratch can make a real difference.

    Download

  • Monitoring Java Applications with Prometheus and Grafana

    Learn how to modernize your Java application monitoring and dashboarding with Prometheus and Grafana. There's a lot of information out there when it comes to monitoring a Kubernetes cluster with Prometheus, but, in the modern enterprise landscape, applications are still what matters. Learn how to leverage Prometheus and Grafana to build slick, modern monitoring dashboards and threshold logic for Java applications.

    Download

  • Computer Weekly – 13 April 2021: The evolution of RPA

    In this week's Computer Weekly, our latest buyer's guide looks at the future of robotic process automation (RPA). Google's legal victory against Oracle over the use of Java APIs has huge significance for software developers. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.

    Download

  • Observability in Java

    "As Java applications move to containers and migrate to the cloud, they become ever more complex, and it's increasingly important to monitor, analyze, and diagnose their behaviour. Observability is a new way of thinking about monitoring and understanding your applications. It’s supported by a growing range of open source tools and standards - part of the new wave of technologies that modern Java developers need to go fully Cloud Native. Join Ben Evans to get the state of the fundamentals of Observability in 2023. You'll learn how to achieve Observability in Java using OpenTelemetry, the emerging Open Standard for Observability, and we'll meet several other related OSS libraries and tools (such as Prometheus Jaeger) along the way. "

    Download

  • From Oracle Java to OpenSource: Making the Switch a Cost-Effective Solution

    Join us for a live webinar on migrating from Oracle Java to OpenSource! With Oracle's new licensing model, organisations are facing serious cost increases. But is switching to an OpenSource version the solution? And what about security policies and 3rd party applications? Azul and Insight are partnering to answer these questions and more. Simon Ritter, Deputy CTO at Azul and author of "OpenJDK Migration for Dummies", will share his in-depth knowledge and best practices for a successful Java migration. Nele Matthys, one of Insight's Oracle licensing experts, will also be on hand to answer your questions. You'll have the chance to ask any questions you may have on the topic. Don't miss out on this opportunity to make your Java migration smooth and seamless.

    Download

  • How to instrument Java Applications

    Who Should Attend: Site Reliability Engineers, Platform and Cloud Operations, Developers, Software Engineers, DevOps Engineers How to instrument Java Applications This webinar will discuss the various in-product configuration steps in detail on auto-instrumenting a basic Java application with Splunk APM. Configuration examples will include deployments of a basic Java application with and without Kubernetes and how the auto-instrumentation process is different with container orchestration. Tune in to learn about: - Splunk APM’s in-product configuration steps for easy instrumentation with OpenTelemetry - How to deploy the OpenTelemtry collector in Linux and Kubernetes - How the Splunk OpenTelemtry collector gathers metrics

    Download

  • From Zero to Hero in Kubernetes Native Java

    More than 16.5 million Java developers are currently working to realize business requirements and spend a ton of time and effort to optimize the application performance for a variety of workloads (e.g., Web, Mobile, AI/ML, Edge) in the cloud. A big issue for the developers is to adopt a new language programming or runtimes over Java due to the lack of compatibility with Kubernetes. This session will walk you through how developers can scaffold a Java project from scratch and then evolve it as a Kubernetes native application in terms of optimizing resources with the native build, integrating Kubernetes manifest (ConfigMap, Secret, Health Check), building container images, and deploy it to Kubernetes. You can also continue testing and debugging the application while it’s already deployed to the remote Kubernetes, the same as the local developer experiences of inner loop development.

    Download

  • April 2018 Patch Tuesday Analysis

    "April showers" the poem begins, and while it's not an all-out storm, April Patch Tuesday provides more than a sprinkling of updates, including critical patches. Take note as well of the out-of-band patch that protects you from an Elevation of Privilege vulnerability as well as the Java update. Java remains a common target for threat actors. In the midst of these clouds, though, here's a silver lining: Microsoft lifted the AV compatibility check prior to delivery of Windows security updates. It's full speed ahead on patching!

    Download

  • January Patch Tuesday 2019

    Happy New Year! Celebration continues in 2019 with a mild January Patch Tuesday. But, make sure you’ve deployed Microsoft’s emergency patch, released post December Patch Tuesday, so attackers with a New Year’s zero-day resolution don’t suck all the fun out of your month. Also, take note of the public disclosure, and take this calm before whatever comes next to catch up on Java support changes going forward. Java SE 8 will soon receive its last public update.

    Download

  • Increase Cyber Resilience with Zero Trust

    Cyber attacks are exploding. This year, as of Q3 2020, 16 billion records have been exposed. This represents a 273% increase compared to the first half of 2019*. LogRhythm, joined by Forrester Principal Analyst serving Security & Risk Professionals Jinan Budge, Unisys, and Blackberry Cylance, discuss how you can effectively achieve true cyber resilience. Key Takeaways: 1. What is Zero Trust and its alignment to the NIST-CSF 2. How to detect, respond and mitigate common attacks (e.g. phishing) using a Zero Trust model 3. How an organization can embark on a successful Zero Trust journey and avoid common pitfalls. * Source: Security Boulevard - https://securityboulevard.com/2020/08/5-biggest-data-breaches-of-2020-so-far

    Download

  • Staying Ahead of the Breach in 2021

    Cyber attacks on companies, governments and individuals grew significantly in 2020. What can enterprises do to better protect their data? Is breach prevention even possible? Hear from the experts on what the new normal for organizations looks like, the cybersecurity best practices to adopt and what's in store for the rest of 2021. The topics up for discussion will include: - Cybersecurity in the new normal - How attackers have take advantage of the pandemic - Critical steps to take on the path to preventing data breaches - Why data protection and cybersecurity should not be separate functions - Best practices and solutions for breach detection and response - Lessons from the field and recommendations for CISOs Moderated by: Kalani Enos, CEO, KEnos Technologies Panelists include: Michelle Drolet, CEO, Towerwall Christopher Kruegel, VP Security Services - Network and Security Business Unit (NSBU) at VMware Ido Safruti, CTO & Co-Founder, PerimeterX Chris Arsenault, Principal Solutions Architect, BlackBerry

    Download

  • Understanding ChatGPT Risk: Do You Need to Worry?

    ChatGPT has been all over the news over the past few months. It is a great example of generative AI, and uses “deep learning techniques to generate human-like responses to text inputs in a conversational manner”. ChatGPT offers a range of benefits to users from all industries - but does it pose any risk? And what of the other AI chat tools being released like Google Bard? According to Blackberry, though business leaders recognise its innate value, 51% of IT leaders believe there will be a successful cyber attack credited to ChatGPT within the year. So where does this leave us? How can we leverage OpenAI tools while also remaining secure? Join us in this month’s episode of The (Security) Balancing Act as we discuss: - AI tools, what’s on offer and how to stay secure - Risks of chatbot "overconfidence" even when wrong - How to leverage Generative tools safely - Investments from MSFT, and what this tells us about ChatGPT - The future of AI, machine learning and natural language processing - And much more!

    Download

  • Modernizing Java Workloads for the Cloud

    Monolithic Java applications typically require significant time, effort, and money to support and maintain. Modernizing these applications can help you get more from your existing investments and free time for strategic projects, feature improvements, and new applications that support business initiatives. Not all application modernization efforts should follow the same pattern. In this session, we will explore three popular paths to application modernization including rehosting, replatforming, and refactoring. We will cover a comprehensive set of options for Java on cloud providers for a range of technical requirements and consumption models. Additionally, we will explore refactoring a Spring application to run on OpenShift. Red Hat technologies include: JBoss EAP, OpenShift (ARO), Quarkus

    Download

  • Integrating Data Security into the DevSecOps Toolchain

    This webinar will include discussion of the following DevSecOps capabilities: -Build - Secret Management with Gitlab and Kubernetes. -Package - Java Artifact Signing -Deploy - Postgres Short-lived credentials -Operate - AWS Bring Your Own Key (BYOK)

    Download

  • Coffee + Community | November 2021

    We sat down with Samantha Stroupe, Director of Training for Port City Java, and Nick Kyle, Training Manager for Bagel Brands, to discuss best practices in Learning & Development. They also hosted a “show and tell,” and talked about some of the exciting L&D programs they run.

    Download

  • Road to Virtual Threads Cheaper, Faster, & Easier Concurrent Applications QRK 3

    Developers have had extraordinary experiences and taken stunning capabilities while they were developing Java microservices from local to the cloud using Quarkus for the past 5 years. But there is more to come with their journey since we have just arrived in Quarkus 3 which provides good, better, and even excellent features and capabilities in terms of developer experience, performance, scalability, and cloud integration. Especially, Quarkus 3 on Java 21 simplifies asynchronous concurrent applications using virtual threads (Project Loom) for high scalability. In this session, we take you through how Quarkus integrates Loom on Java 21 for developers to make concurrent applications easier, have cheaper memory, and have high performance using virtual threads. You can also learn about what’s new in Quarkus 3 such as JakartaEE 10, MicroProfile 6, Hibernate ORM 6, and more. Live event not at the best time for you? In order to support our global partner ecosystem, all webinars are available on-demand after the live event. Register and you will receive an email reminder for on-demand viewing. *Red Hat collects your personal data when you submit information as a part of the registration process within BrightTalk. By registering for any of our webinars, you agree that Red Hat and the Red Hat Partner Program may contact you by email about products, services, and offerings that may be of interest to you. You may opt out at any time. For more information, please visit our Privacy Policy and Partner Preference Center: https://connect.redhat.com/en/partner-preferences.

    Download

  • Event-driven autoscaling for Serverless Java

    "Kubernetes makes it possible to autoscale various business use cases from web apps to mobile, IoT edge streaming, and AI/ML in more reliable and stable ways. One caveat of the Kubernetes autoscaling is based on hardware resource utilization (CPU, memory) through Horizontal Pod Autoscaling. This causes a new challenge to build an event-driven serverless Java on Kubernetes because the event metrics from multiple event sources (e.g., Apache Kafka, AWS SQS) are more relevant than a pod's CPU usage for deciding when applications need to be scaled out and in. Fortunately, KEDA and Knative on Kubernetes are designed to solve this challenge by autoscaling both standard apps and serverless by event metrics in a separate way. This session will teach you how to redesign your Kubernetes autoscaling architecture by event-driven metrics from Apache Kafka over standard resources (CPU, Memory) with Knative and KEDA integration for serverless Java using Quarkus."

    Download

  • Threats in 3 Minutes - Apache Log4j Vulnerability (Explained)

    Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security risks with a severity score of 10/10. Numerous enterprise applications and open-source applications commonly use Java Apache Log4j. However, the scary part is that it is hard to detect which applications use Log4j due to the way it's implemented and developed. The Log4j flow allows third-party servers to execute software code remotely, making it easy to perform all kinds of malicious actions on the targeted machine. This opens the door for detrimental damage, by stealing sensitive data, taking control of the affected machine, and installing ransomware that locks the system until the ransom demand has been met. In this video, we will be covering what the Log4j vulnerability is, how it's exploited, and how you can fix it. Watch the video to learn more!

    Download

  • Enhancing Compliance and Security with Tanzu Spring Runtime

    Public sector agencies are under unique pressure to modernize their applications and operating models, continually secure their systems, and meet several executive order requirements and mandates. In this webinar we will discuss how organizations can do so more quickly, securely and efficiently using Tanzu Spring Runtime. Spring is the world’s most popular Java Framework because it makes programming in Java easier, faster and more secure. Built on degrades of open source innovation, Tanzu Spring Runtime brings you 24x7 Commercial support for the entire Spring ecosystem (Java, Apache Tomcat®, and your Spring applications) from the experts who wrote it. Join us to learn how Tanzu Spring Runtime can help you: - Ensure Security Compliance by extending open-source Spring End of Life dates - Extend Open-Source Spring Boot 2.7 until August 2025. - Gain instant security insights into your Spring application landscape. - Enable Continuous Upgrades to stay current on Spring releases and patches. - Deliver Cost Savings & Improve Performance by upgrading your Spring applications. - Use output to help meet Authorization to Operate (ATO) and other compliance requirements more quickly We’ll also share how Tanzu Spring Consulting can provide your organization with hands-on support to help upgrade your app portfolios to the latest version of Spring, build new Spring apps, or migrate existing applications to Spring.

    Download

  • Virtual #DevDay 2021 Series: Infrastructure Modernization

    Attend the Micro Focus on demand recording from the Virtual #DevDay 2021 Series. In this session learn how infrastructure modernization enables portability of business process and integration with Java and .NET frameworks. New scalable architectures support fit for purpose deployment of dev, test, and production workloads to any platform--mainframe, distributed or cloud.

    Download

  • Interacting with data in the cloud

    The Cloud changes how we ingest, store, and query data. It also offers a massive choice in terms of data-centric technology choices. This talk will show how you can manipulate data with the cloud-native Java framework, Quarkus. We will explore innovative ways that Quarkus provides to interact with data "at rest" with both traditional relational databases as well as NoSQL databases.

    Download

  • Spring: Elevating Your Organization to New Heights

    Join us for an insightful webinar as we delve into the transformative power of Spring, one of the world's leading application frameworks for enterprise-level Java development. With a legacy built on speed, simplicity, and productivity, Spring has become the cornerstone for developers worldwide, providing a robust foundation for applications that power streaming, online commerce, and various innovative solutions.

    Download

  • Spring Boot 3 & Beyond

    Join us for an insightful webinar as we delve into the transformative power of Spring, one of the world's leading application frameworks for enterprise-level Java development. With a legacy built on speed, simplicity, and productivity, Spring has become the cornerstone for developers worldwide, providing a robust foundation for applications that power streaming, online commerce, and various innovative solutions.

    Download

  • Log4j Vulnerability - Everything you need to know

    The Apache Log4j vulnerability exploit has caught security teams entirely off guard. Log4j is the most popular java logging library with over 400,000 downloads from its GitHub project and the Log4j library is embedded in almost every Internet service or application we are familiar with, including Twitter, Amazon, Microsoft, Minecraft and more. Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks. We’ve subsequently seen new variations of the original exploit being introduced rapidly- over 60 in less than 24 hours. Check Point’s Infinity architecture provides zero-day protection for our customers and prevented hackers from exploiting this vulnerability in our customer deployments. Join us to discuss: • How to identify a Log4j attack • Who is vulnerable to this exploit • How to keep applications secure from this attack and future, currently unknown zero-day attacks

    Download

  • Visual COBOL Infrastructure Modernization: Deploy new platforms & architectures

    Watch the Micro Focus recorded session from a "live in person" #DevDay technical workshop designed for COBOL and mainframe application developers. Infrastructure modernization enables portability of business process and integration with Java and .NET frameworks. New scalable architectures support fit for purpose deployment of dev, test, and production workloads to any platform--mainframe, distributed or cloud.

    Download

  • Power Your AI/ML Workloads in the Snowflake Data Cloud

    Learn how to use Snowflake to power your AI and ML workloads and bring generative AI and LLMs to your enterprise, governed data with the latest innovations coming to the Data Cloud. Then, watch a live demo of an end-to-end machine learning workflow in Dataiku leveraging integrations with Snowpark for Python and Java and Snowpark ML so the data and data processing never leave Snowflake.

    Download

  • Falcon Complete Attack & Defend Demo - Falcon Cloud Security

    Join the Falcon Complete team for the latest episode in our Live Attack & Defend Demo Series. We will dive into a realistic attack scenario of an Apache Tomcat web server. Our Falcon Complete team will use Falcon Cloud Security to investigate the attack and perform live remediation within the cloud workload environment. Your key takeaways from the webinar: - Gain valuable insights into the exploitation of a Java web server within a Docker container and the potential risks it poses to your organisation's security. - Understand how you can protect and fortify cloud workload environments against sophisticated threats. - Witness live attack investigation and remediation, to appreciate the skills, steps and technologies required to successfully defend your environment. - Learn best practice strategies and preventive measures to safeguard your Java web servers running in Docker containers and enhance your overall security posture. This webcast is a must-attend for IT professionals, cybersecurity enthusiasts, and anyone interested in strengthening and extending their knowledge of cloud workload protections.

    Download

  • Post-quantum hybrid cryptography in Bouncy Castle

    While waiting for the final standards from the NIST Post-Quantum Competition, you can start preparing with a hybrid approach, combining post-quantum algorithms with traditional public key algorithms. In this workshop, Keyfactor’s David Hook and Roy Basmacier will look at several hybrid techniques as well as how they can be applied to the Bouncy Castle Java APIs, both FIPS and non-FIPS. Get CPE Credits Earn 0.5 CPE credit on this workshop. Keyfactor is an Approved (ISC)2 CPE Submitter Partner. https://www.isc2.org/ Agenda - Basic techniques and algorithms to use. The mechanisms for secret sharing in post-quantum encryption are based around Key Encapsulation Mechanisms (KEMs). We will start by looking at what is available and how they translate into the Java Cryptography Architecture. - Post-quantum hybrid cryptography in the general Bouncy Castle APIs. Building on session 1, we will look at how KEMs can be applied to more classical key agreement and key transport mechanisms. - Post-quantum hybrid cryptography in the Bouncy Castle FIPS APIs. Building further on session 2, we will look at how KEMs can be applied together with certified versions of classical algorithms. What You Will Learn After the workshop, you will have knowledge of the mechanisms that can be used in Java with the Bouncy Castle APIs for doing hybrid-cryptography to post-quantum harden classical approaches to encryption. You will be able to recognize which method is most appropriate to their situation and how to use hybrid approaches in a certified environment. For documentation and exercises, see: https://doc.primekey.com/bouncycastle/post-quantum-hybrid-cryptography-in-bouncy-castle This workshop was also held live at the Keyfactor Community Tech Meetup in Stockholm on September 7, 2022.

    Download

  • Innovation Showcase Ep.2: Identifying Log4j Vulnerable Assets & Assessing Risks

    On December 9, 2021, Apache released a security advisory disclosing multiple zero-day exploits identified in a widely used Java logging library called Log4j. The Log4j vulnerabilities allow threat actors to carry out unauthorized remote code execution (RCE) and/or unauthorized Denial of Service (DoS) attacks. Log4j is an open-source Java logging library widely used in many applications and services across the globe. The popularity of the Log4j Java logging library significantly increases the attack surface to an organization. The Verizon Threat Intelligence Team (VTRAC) has found: “Some of the post-compromise activity as a result of the Log4j exploit has been the unauthorized installation of cryptocurrency miners, Remote Access Trojans (RATs), DDoS botnets, and ransomware.” VTRAC is able to review an organization’s environment to assess whether assets are subject to the Log4j vulnerabilities, provides independent third-party validation of the risk associated with and the potential impacts of the Log4j vulnerabilities, and provide containment and recommendations for any response and mitigation. During this webinar, you’ll learn how our VTRAC Log4j Assessment seeks to assess and: Determine if the organization was subject to the Log4j zero-day vulnerabilities. Help to inform the organization on decisions about the potential mitigation or investigatory actions that need to be taken. Become aware of third party service providers running in the environment that are vulnerable to Log4j. Provide independent third-party validation associated with the risk and potential impacts of the Log4j vulnerabilities.

    Download

  • Verizon Cyber Risk Roundtable Series Ep. 2 The truth about AI and cybersecurity

    In this 4-part webinar series, Verizon and partnering security experts discuss the state of cybersecurity and the role of security as a business enabler. The panel will review the latest data and research from Verizon’s gold standard research reports coupled with our field experience doing 600+ breach investigations every year to educate the cybersecurity community on ways to become more resilient and innovative through digital transformations. In just a few years, AI has gone from buzzword to business-ready, and more and more cybersecurity leaders are evaluating Artificial Intelligence-driven tools to enhance their security programs. But do security leaders and the C-level executives who fund their programs fully understand the promises, limitations and operational impacts of AI?  In this webinar, cybersecurity experts from Verizon and Blackberry Cylance will explore how AI-powered security tools can: ·      accelerate incident detection and remediation ·      change the nature of work for security analysts, and ·      impact established SOC processes and procedures. Our panelists will share examples of the lessons they and their customers have learned when evaluating and deploying AI-driven security solutions -- from managing C-level expectations about the technology to the challenges and rewards of using AI as the springboard for transforming an entire security program and its IT infrastructure.

    Download

  • Infrastructure Modernization

    Deploy to new platforms and architectures. In this session learn how infrastructure modernization enables portability of business process and integration with Java and .NET frameworks. New scalable architectures support fit for purpose deployment of dev, test, and production workloads to any platform--mainframe, distributed or cloud. PLEASE NOTE THIS IS A LIVE REPLAY OF AN ON DEMAND SESSION. THERE IS STILL OPPORTUNITY TO ASK QUESTIONS TO MICRO FOCUS RELATED TO THIS TOPIC.

    Download

  • Java: What are your Options?

    It has been over a year since Oracle changed their Java licensing model. We are still receiving a large number of questions and hearing concerns from businesses all over the world. In our webinar, we will provide you with insight and advice on how to address these important questions. We will talk about the main trends we are seeing across organisations and how they plan to mitigate the risks and potential price increases in their environment. Register for our live webinar here and gain the insight you need as well as the opportunity to ask questions and gain advice from our experts.

    Download

  • AI-Driven Performance Optimization – A Real-World Example

    Modern applications sit atop of many layers, such as Java Virtual Machines, container, database, cloud and more, each providing hundreds of settings all interacting in complex and counterintuitive ways. Manual and trial-and-error performance tuning cannot cope with this complexity with today’s fast release cycles and business speed. As a result, incorrect configurations may cause poor application performance, low reliability, and resource (cost) inefficiency. This webinar explores how an AI-driven Performance Optimization solution can allow performance engineers to automate testing, automatically identify optimal full-stack configurations to enable their companies to deliver unprecedented application performance and cost saving, while also improving operational resiliency. We will discuss: • The fundamental problem with performance optimization • Addressing the challenges with an AI-driven performance optimization • How performance optimization and performance engineering work together • Demo: optimizing a Java-based e-commerce application Please join Cyrus Manouchehrian, Micro Focus LoadRunner Product Management and Stefano Doni, Akamas Co-Founder and CTO to learn about the modern approach to performance optimization and how to get the most out of your Performance Engineering solution.

    Download

  • Introducing the Red Hat build of Cryostat: Optimize Java workloads in the cloud

    Do you know how your Java workloads are performing in OpenShift? Are your services consuming too many resources or lagging in performance as load increases? Deep dive into your application’s performance by adding Cryostat to your arsenal of developer tools; a container-native application used to retrieve and analyze profiling data from your workloads running on the Red Hat OpenShift Container platform. In this session, we’ll: Discuss the challenges of deploying workloads in the cloud and how Cryostat can solve these problems Highlight some of Cryostat's feature in a live demo

    Download

  • Top 10 KSQL FAQs

    KSQL, recently announced as generally available, is the streaming SQL engine for Apache Kafka® that’s easier than Java, highly intuitive compared to other stream processing solutions and more accessible for developers and data engineers. In this interactive discussion, the KSQL team will answer 10 of the toughest, most frequently asked questions about KSQL. These range from technical examples of managing streaming topics to practical applications and common use cases, such as market basket pattern identification and network monitoring patterns.

    Download

  • Log4Shell: Your Questions Answered

    Everyone agrees that the historic Log4J vulnerability, and the associated Log4Shell exploit, is the worst Java risk we’ve seen in years–maybe ever. But why? And what will remediation look like for the countless platforms and products that touch it in some way? Furthermore, how should the ecosystem prepare for the next one before it happens? Join us for an impromptu AMA session with Bugcrowd Founder and CTO Casey Ellis to hear answers to those questions, insights about how hunters on the Bugcrowd Security Knowledge Platform are working 24/7 to find and understand this vuln for customers, and to ask Casey your own questions, as well.

    Download

  • VeraTalks: What Holds Developers Back From Addressing Security Vulnerabilities?

    Our recent State of Software Security report found that 97 percent of typical Java applications are made up of open source libraries. Unfortunately, 79 percent of developers never update third-party libraries after including them in a codebase … resulting in an unnecessary amount of vulnerabilities and technical debt. What if developers realized that 92 percent of library flaws can be fixed with an update? Or that 69 percent of library updates are a minor version change or less? Join us as we discuss the common misconceptions around open source flaws and show you just how easy it is to find and fix library flaws.

    Download

  • VeraTalks: What Holds Developers Back From Addressing Security Vulnerabilities?

    Our recent State of Software Security report found that 97 percent of typical Java applications are made up of open source libraries. Unfortunately, 79 percent of developers never update third-party libraries after including them in a codebase … resulting in an unnecessary amount of vulnerabilities and technical debt. What if developers realized that 92 percent of library flaws can be fixed with an update? Or that 69 percent of library updates are a minor version change or less? Join us as we discuss the common misconceptions around open source flaws and show you just how easy it is to find and fix library flaws.

    Download

  • Cybersecurity Now: A Guide to Building a People-Centric Strategy

    Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)? You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people. Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will: o Prevent cyberattacks by stopping them before they start o Defend against email and cloud threats o Respond quickly to threats and limit the damage they could cause About the presenter: With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

    Download

  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond

    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt. However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options? In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following: - What happens when a ransomware is exploded in a computer, with a demo - How do you detect and respond to a ransomware attack? - What is coming next in the world of ransomware? To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar. About our key speaker: Dinah Davis is the VP of R&D at Arctic Wolf Networks, responsible for the development of the AWN CyberSOCTM product. Dinah holds an M. Math in cryptography from the University of Waterloo. She has over 16 years of experience in the tech industry with time spent as a Security Software Developer at the Communications Security Establishment Canada and BlackBerry, and as a manager at TrustWave and D2l. Dinah is also the founder of Code Like a Girl, a publication whose goal it is to change society’s perceptions of how women are viewed in technology, which has over 36,000 subscribers and a vibrant online community.

    Download

  • Operate Enterprise-grade Spring Apps at scale on Azure

    Spring Boot is the world’s most popular framework for Java, with proven benefits for developer productivity. With your existing portfolio of Spring apps - you are already taking advantage of high delivery velocity, and Spring’s wide ecosystem of tools & frameworks. How do you take this to the next level with Microsoft Azure? What would fully managed infrastructure, built-in app lifecycle management, and easy monitoring look like for your Spring apps on Azure? Presenting Azure Spring Apps Enterprise, a fully managed service from Microsoft built in collaboration with VMware. The Enterprise tier combines Microsoft’s cloud expertise with commercially supported Spring Runtime and VMware Tanzu components. Applications running on Azure Spring Apps can take advantage of several benefits: - Efficiently migrate existing Spring apps and manage cloud scaling and costs - Modernize apps with Spring Cloud patterns to improve agility and speed of delivery - Run Java at cloud scale and drive higher usage without complicated infrastructure - Develop and deploy rapidly without containerization dependencies - Monitor production workloads efficiently and effortlessly In this webinar, join Microsoft and VMware teams to learn more about running Spring apps at scale, and the advantages of managed services, when costs matter. Our teams will be in San Francisco for SpringOne December 6-8, come say hello if you’re around!

    Download

  • #IMOS22 Log4j Reflections: What the Vulnerability Has Taught the Industry

    Every so often we see a security incident so major that it renders large portions of the internet critically vulnerable. We saw it with Heartbleed, EternalBlue, and more recently, Log4J. Also known as Log4Shell, this vulnerability in the Java logging tool Log4J 2 knocked the infosec community on its back as it struggled to fix thousands of affected applications. This session explores the origin and nature of the Log4J vulnerability, investigating how it happened, why it hit us so hard, and why some found it so difficult to fix. We also look into the lessons learned from the whole incident and how we might be able to apply these lessons to mitigate and avoid similar problems in the future.

    Download

  • JBoss EAP 8

    Red Hat recently announced the latest release of their Jakarta EE compliant platform, JBoss EAP 8.0. With this release, companies will be able to take advantage of the latest Jakarta EE APIs and significantly extend the life cycle of their enterprise Java applications. JBoss EAP 8.0 introduces improvements across many areas of the platform, including the management console and CLI, cloud workflow, security, clustering, datasource and EJB subsystems. In this webinar, we will describe the new JBoss EAP 8.0 features and the tools provided by Red Hat to help customers migrate from older versions of JBoss EAP.

    Download

  • Red Hat build of OpenJDK – past, present and future

    Abstract: In this talk we will focus on Red Hat’s involvement in the OpenJDK project, and why we believe that our build of OpenJDK is the best JDK to use for your production environments Description: OpenJDK is the reference implementation of the Java SE specification. In the first part of this webinar we will focus on improvements Red Hat has made to OpenJDK and surrounding tooling over the years, and how these improvements can benefit you. We will take a brief look at improvements Red Hat has made, starting from taking OpenJDK to a buildable state on release in 2007, to significant enhancements such as the AArch64 port, Shenandoah Garbage Collector, Quality Testing, and more that are on the way. In the latter part we will go over our OpenJDK based offerings and our anticipated roadmap.

    Download