May 23, 2015

EMC-Windstream Partnering to Drive Cloud Solutions | @CloudExpo [#Cloud]

In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager – Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, will review next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discuss how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Speaker Bios Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has been engaged in the technology industry for more than 15 years in business development and management roles. He supports several of EMC's most strategic Cloud Service Provider relationships, including Windstream. His organization focuses on identification, solution development and joint go-to-market execution.

read more

by via Latest News from JAVA Developer's Journal

Agility and DevOps with @ActiveState | @DevOpsSummit [#DevOps]

"Our premise is Docker is not enough. That's not a bad thing - we actually love Docker. At ActiveState all our products are based on open source technology and Docker is an up-and-coming piece of open source technology," explained Bart Copeland, President & CEO of ActiveState Software, in this interview at DevOps Summit at Cloud Expo®, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.

read more

by via Latest News from JAVA Developer's Journal

May 22, 2015

DevOps Power Panel at @DevOpsSummit Silicon Valley [#DevOps]

The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps becomes essential for any ambitious enterprise today. This Lunchtime Power Panel at DevOps Summit (, was moderated by Andi Mann, VP of Strategic Solutions at CA Technologies. Monish Sharma, VP of Customer Success at ElasticBox; Myles Steinhauser, Software Development Engineer at Blue Box; Victoria Livschitz, CEO of Qubell Inc.; and Mark Levy, Sr. Product Marketing Manager at Serena Software go beyond the basics in a discussion of why DevOps is not only important for transformation, but is mission-critical for enterprises that want to stay in business.

read more

by via Latest News from JAVA Developer's Journal

Canada ripe for an invasion of U.S. dollar stores, experts say

Canada ripe for an invasion of U.S. dollar stores, experts say - 10 hours ago
Dollar Tree operates about 220 Canadian locations already, compared with Dollarama's 955 stores. Both have ambitions of opening hundreds of additional locations in the coming years.
Dollar stores fit the bill: Prentice - Ottawa Business Journal

by via News for Canadian Dollar - Google Finance
Canada ripe for an invasion of U.S. dollar stores, experts say

This week in JBoss (21 May 2015): Do One Thing for Diversity and Inclusion

By Kenneth Peeples


I feel very lucky to be a part of JBoss. It is great to see global diversity in the JBoss Community. I wanted to wish everyone a Happy World Day for Cultural Diversity which is celebrated on May 21st and supported by the United Nations. They have setup a Community Facebook page for “Do One Thing For Diversity and Inclusion”. The campaign aims:
  • To raise awareness worldwide about the importance of intercultural dialogue, diversity and inclusion.
  • To build a world community of individuals committed to support diversity with real and every day-life gestures.
  • To combat polarization and stereotypes to improve understanding and cooperation among people from different cultures.

Our JBoss Community is a large global community and I enjoy reading all the wonderful articles, news, blogs, etc that are published during the week. This week was another great week of news, new releases and articles. So let’s jump into This week in JBoss.

New Releases

To see the specific Release notes go the the Homepage or Website for the project from the links below.

jgroups-raft 0.2 – The jgroups-raft project is a Raft implementation in JGroups. It is currently in its own repo because it’ll move much faster than JGroups and I wanted to have the freedom to release versions in quick succession.

byteman 3.0.0 – Byteman is a tool which simplifies tracing and testing of Java programs.

immutant 2.0.1 Patch Release – Immutant is an integrated suite of Clojure libraries backed by Undertow for web.

infinispan 8 – This actually isn’t a release yet but the codename for infinispan 8 was voted upon and is, Infinite Darkness.

forge 2.16.1.Final (Club) – Forge is the Fastest way to build Maven-Based Java EE projects.

keycloak 1.2.0.Final – Integrated SSO and IDM for browser apps and RESTful web services.

Hibernate OGM 4.2.0.CR1 – Hibernate is an Object/Relational Mapper tool. OGM is the Domain model persistence for NoSQL datastores.

Hibernate ORM 4.3.10.FinalHibernate is an Object/Relational Mapper tool. ORM is the Domain model persistence for relational databases.


  • DevNation 2015 – June 21 – 25, 2015 | Hynes Convention Center | Boston, MA | USA – AN OPEN SOURCE CONFERENCE, BY AND FOR DEVELOPERS ACROSS THE GLOBE. DevNation is a full stack development conference featuring the best in open source! Learn how industry leaders use open source. Hack with some of the most innovative new projects including Docker, Hadood, Vert.x and more. See what new innovations are coming out of open source for DevOps, mobile and application development.


Microservices and Integration

  • Syed Rasheed wrote an excellent article on JBoss Integration Products, explaining Application Integration and Data Integration, Ultimate Guide: When to use which JBoss Integration Products. In The Bottom Line he indicated that In the end, application integration platform like JBoss Fuse are best suited for the functional integration of independent applications to implement a multi-step business process. Data virtualization platforms are best suited for the creation of data services where one is attempting to present a holistic view of the business data for analysis or operational visibility. Both technologies have different primary use cases and they are not interchangeable, however they can be used together.
  • Christina Lin continues her Microservices migration story with the Integration Demo Series with Fuse and BPMS.
  • Stian Thorgersen discussed Securing Microservices with Keycloak and OpenID. As microservices is all about having many smaller services each that deal with one distinct task the obvious solution to security is an authentication and authorization service. This is where Keycloak and OpenID Connect comes to the rescue. Keycloak provides the service you need to secure micro services.
  • Mark Little highlights XA and Microservices. I’m not suggesting that XA doesn’t have a role to play within microservices and between microservices. At least in the short term it most definitely does for some (small) set of applications. But really when I’m suggesting transactions have a role I’m looking well beyond XA.

Data Services with Teiid and Data Virtualization

Business Processes and Rules

And More…..

This weekend is a holiday weekend in the US to honor those that have died while serving in the armed forces. Be safe if you are in the US as alot of people will be traveling on the highways. On to another week in the community…..


by via Social Marketing by Wordpress »

TORONTO -- The Canadian dollar was down shortly after the open of North ...

TORONTO -- The Canadian dollar was down shortly after the open of North ...
CTV News - 9 hours ago
TORONTO -- The Canadian dollar was down shortly after the open of North American stock markets. The loonie traded at 81.37 cents US, down about half a U.S.
Loonie down ahead of TSX open - Stockhouse

by via News for Canadian Dollar - Google Finance
TORONTO -- The Canadian dollar was down shortly after the open of North ...

Canadian dollar down after open at Toronto Stock Exchange

Canadian dollar down after open at Toronto Stock Exchange - 5 hours ago
TORONTO - The Canadian dollar was down shortly after the open of North American stock markets. The loonie traded at 81.37 cents US, down about half a U.S.

by via News for Canadian Dollar - Google Finance
Canadian dollar down after open at Toronto Stock Exchange

Webcast: Scalable Analytics Using Amazon S3 & Snowflake | @CloudExpo [#Cloud]

DoubleDown Interactive, a provider of online free-to-play casino games, needs to process huge amounts of streaming event data from their games and make that data rapidly available to data scientists and analysts. Hear how Amazon S3 and Snowflake’s Elastic Data Warehouse have made it possible for DoubleDown to deploy a reliable, scalable data architecture for their analytics needs. You’ll learn how Amazon S3 and Snowflake technology help address key challenges in building data pipelines and processing data and how DoubleDown combines Amazon Kinesis, S3, and Snowflake to ingest, store, and process their data faster, more easily, and less expensively.

read more

by via Latest News from JAVA Developer's Journal

Thinking Like a Data Scientist: Part 2 By @Schmarzo | @BigDataExpo [#BigData]

In “Thinking Like a Data Scientist – Part I”, we examined the challenges for getting the business users to think like data scientists when contemplating where and how to leverage big data to drive business value. We introduced a “Thinking Like a Data Scientist” process that starts with identifying and understanding the organization’s top-level strategic business initiatives, then uses a “Strategic Nouns” technique to create potential business questions that were descriptive, predictive or in nature.

read more

by via Latest News from JAVA Developer's Journal

Secure the 'Internet of Things' By @JamesKobielus | @ThingsExpo [#IoT]

The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data consumer, routing intermediary, etc., is a new security-relevant detail that stirs up a wide range of collateral security issues. In other words, every new networked IoT endpoint is a new potential attack vector or launching point that the baddies can exploit. Potentially, every time you plug in a new IoT-networked device that is infected with malware or simply open to unauthorized third-party exploitation, the vulnerabilities start. Someone somewhere might exploit the new access point to gain illicit access to sensitive secrets (business, consumer, government, etc.), to damage software and data, and to wage distributed denial of service attacks.

read more

by via Latest News from JAVA Developer's Journal

Infinispan 8.0 “Infinite Darkness”

By Tristan Tarrant

You have voted, and we have a clear winner: Infinite Darkness, which fits in nicely with the other infinity references in the 8 release.


by via Social Marketing by Wordpress »

Canadian dollar down ahead of open at Toronto Stock Exchange

Canadian dollar down ahead of open at Toronto Stock Exchange

680 News1 hour ago
TORONTO – The Canadian dollar is down about one-third of a U.S. cent ahead of the open of trading on North American stock markets.

Canadian dollar down after open at Toronto Stock ExchangeBrandon Sun

Source:: cadusd from google financial

by via Social Marketing by Wordpress »

Canadian dollar down ahead of open at Toronto Stock Exchange

Canadian dollar down ahead of open at Toronto Stock Exchange
680 News - 1 hour ago
TORONTO - The Canadian dollar is down about one-third of a U.S. cent ahead of the open of trading on North American stock markets.
Canadian dollar down after open at Toronto Stock Exchange - Brandon Sun

by via News for Canadian Dollar - Google Finance
Canadian dollar down ahead of open at Toronto Stock Exchange

Addressing Social Issues Through Challenge Competitions

Concept graphic for housing construction, planning and costs.


Innovation challenges leverage public creativity to address important problems. They can also be a tool for reaching and educating the next generation of leaders about social issues.

The Office of Policy Development and Research (PD&R) at the U.S. Department of Housing and Urban Development (HUD) recently wrapped up the second year of the Innovation in Affordable Housing Student Design and Planning Competition.

The competition aims to encourage research and innovation in affordable housing, raise practitioner and future practitioner capacity, and foster cross-cutting team work within the design and community development process. Multidisciplinary graduate student teams come together from diverse areas including: business, finance, real estate, architecture, urban planning, law, and engineering, among others.

Through the experience of responding to a real world affordable housing issue, interacting with residents of public housing, and putting together professional proposals that take planning, architecture, and resident needs into account, a new cadre of affordable housing advocates is created.

Katherine O’Regan, Assistant Secretary for Policy Development and Research, touched on the broader goal of the challenge when announcing this year’s winners: “these bright minds represent the next generation of designers and planners who will produce tomorrow’s affordable housing. It’s our hope that this competition will excite new creative thinking about how to look at affordable housing.”

Many Disciplines, One Goal

Houses from Innovation in Affordable Housing Student Design and Planning Competition logo.PD&R first launched the competition in early 2014 and challenged multidisciplinary teams of students to respond to a real world issue involving design, planning, finance, and large community elements. The 2014 competition centered on veteran’s housing and was so successful that PD&R renewed the competition for an additional five years.

This year’s focus on senior housing provided another topic that is extremely relevant in the area of affordable housing and is only growing in importance. The students may not have been exposed to the issue of senior housing without the competition, which provided an opportunity to really examine the issue and the current research around it.

The Competition Process

The competition runs in two phases. In the first phase, student teams submit initial proposals which including digital design boards and a brief narrative. A group of five jurors, selected by HUD for their expertise in the areas of architecture, planning, community development and affordable housing, reviews the proposals and chooses four finalist teams. The finalists are then invited to participate in a site visit so they can view the redevelopment site firsthand, walk the grounds, and talk to stakeholders and residents of the community.

This year’s finalist teams represented the University of Kansas, the University of Minnesota, New York University (UCLA), and the University of California at Los Angeles (UCLA). The finalists traveled to Houma, Louisiana, to visit Bayou Towers, an 11 story, 300 unit high-rise for seniors operated by the Houma-Terrebonne Housing Authority. The site visit provided a wonderful opportunity for the students to see the site, talk to residents of Bayou Towers, and gain an understanding of the larger community of Houma and the goals of the Houma-Terrebonne Housing Authority.

The Winners

The NYU Team: Constantine Caloudas, Michelle Guber, Peter Lovanella, Kathy O’Regan (HUD), Matthew Jupin and Christopher Hayner.NYU took home the grand prize of $20,000. The team employed a sophisticated design that minimized the bulk of the building in response to the local context. The team also received very high marks for its innovative financing scheme that included using a mixed use strategy to create economic development and positive community-wide impact.

The runner-up team, which received a $10,000 prize, was the team from UCLA. The team designed a gut rehab of the existing Bayou Towers structure with an emphasis on energy efficiency coupled with strong healthcare partnerships. The jurors felt the team demonstrated a deep understanding of the senior population and its needs. The team also emphasized reuse of materials and designed a new modular innovative façade.

Planning is already underway for the next year of the Innovation in Affordable Housing Student Design and Planning Competition, which will launch in the fall of 2015.

Claire Yerke Desjardins is a Program Analyst in the Office of Policy Development and Research at the U.S. Department of Housing and Urban Development.

by Ashley Wichman via DigitalGov

DevOps Monitoring Webinar By @JKowall | @DevOpsSummit [#DevOps #Microservices]

I was able to spend time in Tallinn at the first TopConf conference focused on DevOps. The conference had a good turnout of over 80 attendees for its first year. The list of speakers was excellent at the conference, including technology companies such as Skype and SoundCloud and thought leaders of DevOps like Kris Buytaert. Hearing about how Skype has evolved and operates with both custom and standard technologies is interesting, along with the changes they are going through — with Microsoft as their parent company — including leveraging Azure services for new development. Being an avid music fan, I’m a huge user of SoundCloud so it was great to hear how they were evolving as the company has undergone massive growth. The user interfaces and technologies have evolved considerably, and it was great to talk shop with a great DevOps leader in the organization. Kris spoke well and hit on a lot of fundamentals. I learned quite a bit and enjoyed his comment about legacy software vendors who regularly “DevOps wash” legacy products which would never fit into a modern toolchain. This amusing comment and content resonated from my feedback to vendors at Gartner.

read more

by via Latest News from JAVA Developer's Journal

Java programmer

By Job Bank Job Number: 151094631
Location: Toronto,ON
Employer: Hays
Salary: Not Available Source::

by via Social Marketing by Wordpress »

May 21, 2015

Internet of Things Hackathon Proposals | @ThingsExpo [#IoT]

The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo – to be held June 9-11, 2015, at the Javits Center in New York City, NY – is now accepting Hackathon proposals. Hackathon sponsorship benefits include general brand exposure and increasing engagement with the developer ecosystem. At Cloud Expo 2014 Silicon Valley, IBM held the Bluemix Developer Playground on November 5 and ElasticBox held the DevOps Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of Bluemix, its services and functionality and provided short-term introductory projects that developers could complete between sessions.

read more

by via Latest News from JAVA Developer's Journal

Integration Project- Micro Services Migration Story with JBoss BPM Travel Agency – Part Five

By Christina Lin

Part Five- Migrating Web Services.

This post is the fifth part of a JBoss Travel Agency Integration Demo series, and we are going to talk about how to migrate from an existing web service to JBoss Fuse. And it is so much easier then you can ever imagine. When migrating web services, we know there will be a contract already exists, it is the WSDL file. So all we have to do is just to implement this contract. If you want to know more about the micro service architecture of the demo, please see this post for more details. For now, all you have to know, it that now we are going to migrate from an already existing web service to JBoss Fuse, and then dispatch these request to difference message queue in broker, so later on the backend service can retrieve and process it.

After receiving hotel request from client, the web service will be dispatched to messaging queues. And because the result needs to go back to the client, we need to make sure the request comes back, there for we need to set the JMS to in-out to make sure it gets the return message back. Also, we need to transform the data from client to the format backend service understand, which is JSON.

OK, first things first, from the WSDL file we have, by adding the cxf-codegen maven plugin to generate the related object and services, and direct it to read the wsdl file locate in the project.








And then we can start setting up the web service endpoint

Rather then just a simple connection to the messaging queue, this small application needs interact with messaging a lot, so we are going to create a pool to the broker.

Take a look at the WSDL, here you see it has three services, with different inputs, so we are going to implement these services.

The first route is the universal endpoint, where it will take in the entire request, and dispatch them to the routes that actually implements the web service.

Then we go on can create the route that handles booking and cancel booking, it simply converts the input into whatever format is needed.

Booking Route
Cancel Booking Route

For available hotel request it is a bit more complex, because the web service requires a specific object to return, so here we are going to do map JSON content and turn it into the specific object.

package org.blogdemo.travelagency.hotelwsendpoint;

import java.util.Map;

import acme.service.soap.hotelws.Resort;

public class ListHotelBean {

public Resort getResort(Map promotedResorts){
Resort resort = new Resort();

return resort;

Register the mapping bean in camel context,


And lastly, the available route.

And that’s it. More detail instructions are available in the slides below.

For more detail side in BPM Suite, please click here to Eric Schabell’s post.

Micro Services Migration Story with JBoss BPM Travel Agency

Part One: Introduction and Installation
Part Two: Moving towards Microservices
Part Three: Retrieving Data with JDBC
Part Four: Persistence with JPA
Part Five: Migrating Web Service Source::

by via Social Marketing by Wordpress »

Geo-spatial processing capabilities with Open Source Products

By Kenneth Peeples

In this article we have a guest author, Rich Lucente. Rich is a Red Hat Pre-sales engineer focusing on middleware and cloud computing initiatives for federal government customers. He is going to discuss Geo-spatial processing capabilities with Open Source Products which include Fuse, BRMS, Data Virtualization and EAP. You can find Rich on Linkedin at or email at [email protected].
Geo-spatial processing permeates the Department of Defense (DoD) with many solutions offered for tasks such as sensor and track fusion and correlation. Geo-spatial tasks encompass a specialized knowledge domain, often requiring input from subject matter experts for an effective solution. This article offers recommendations to modernize geo-spatial applications by leveraging current features and capabilities in popular open source products. This does not go into sufficient detail to create a “fully baked” solution since that would require fully understanding the prerequisites, dependencies, and having access to key stakeholders and existing software capabilities.
A number of DoD programs have expressed an interest in modernization and Red Hat believes that several products in our middleware portfolio can be a key foundation to this effort. Each product will be briefly described below with its applicability to this problem domain.
Red Hat JBoss Fuse 6.1
Red Hat JBoss Fuse 6.1 includes Apache Camel 2.12.0, which enables the definition of “routes” that specify chains, or pipelines, of activity on a message as it flows from a producer to a consumer. These routes can include mediation, transformation, and various other processors. Out of the box, Apache Camel includes a broad range of components that implement the protocols for endpoints. Examples include common endpoints like filesystems, file transfer protocol (FTP), as well as more complicated interfaces like java database connectivity (JDBC) and web services (both REST and SOAP).
Traditional application and data flow when processing sensor measurements and tracks can be externalized into camel routes, enabling a more flexible processing solution. The highly specialized processing for sensor and track fusion and correlation can still be embodied in specialized libraries that are accessed via custom message processors and/or custom camel components. This approach provides more modularity by bubbling up the processing flow to a higher abstraction layer.
These routes can be combined with specialized geo-spatial persistence stores like PostGIS or MySQL with geo-spatial extensions. Since camel components already exist for database interactions, this enables the results of the specialized library components to be persisted to geo-spatial data stores. Camel routes can manage the flow of the data through a larger integrated system including subsystems and subcomponents that persist sensor measurement, track data, and correlation/fusion statistics into geo-spatial and other data sources.
Red Hat JBoss Business Rules Management System 6.1
Within complex specialized problem domains, many decision points exist on the type of data, the results of various statistical tests, and other heuristics to optimize the processing of the data. These decisions are often buried in the implementation of the various libraries and sometimes are duplicated across software components, complicating any modernization and maintenance efforts.
Red Hat Business Rules Management System (BRMS) 6.1 specifically addresses the need to externalize various logical decisions into a versioned rules knowledgebase. Facts can be asserted into the knowledge session and then rules can be applied to prune the solution search space and create inferences on the data. This externalization of key decision logic enables more flexibility and modularity in implementations.
Fusion and correlation algorithms for sensor measurements and tracks are replete with heuristics and decision logic to optimize the processing of this data. Rather than bury decisions within the library implementations, BRMS can enable externalization of those decision points, providing for a greater level of flexibility in how tracks and sensor measurements are processed.
Red Hat JBoss Data Virtualization 6.1
Red Hat JBoss Data Virtualization (DV) 6.1 enables federation of multiple physical data sources into a single virtual database which may be exposed to an application as one more logical views. Client applications can access each view as a web service (REST or SOAP), JDBC/ODBC connection, or OData (using Atom XML or JSON). The DV tool offers an optimized query engine and a broad range of connectors to efficiently execute queries to populate the views.
Additionally, DV enables native query pass-throughs [1] to the underlying physical data source for those data sources that provide specialized query capabilities. For example, databases with geo-spatial extensions can execute specialized queries like whether one object contains another. By using query pass-throughs the DV query engine will not attempt further processing of the query but instead pass it as-is to the underlying geo-spatial datasource. This pass-through query processing can be combined with standard SQL queries from other data sources so that DV can provide a highly customizable, flexible data access layer for client applications. This data access layer can then be accessed as JDBC/ODBC, REST/SOAP web services and OData sources.
The Oracle and MongoDB translators within DV 6.1 also support geo-spatial operators. Specifically, the MongoDB translator [2] supports geo-spatial query operators in the “WHERE” clause, when the data is stored in the GeoJSon format in the MongoDB Document. These functions are supported:
  • CREATE FOREIGN FUNCTION geoIntersects (columnRef string, type string, coordinates double[][]) RETURNS boolean;
  • CREATE FOREIGN FUNCTION geoWithin (ccolumnRef string, type string, coordinates double[][]) RETURNS boolean;
  • CREATE FOREIGN FUNCTION near (ccolumnRef string, coordinates double[], maxdistance integer) RETURNS boolean;
  • CREATE FOREIGN FUNCTION nearSphere (ccolumnRef string, coordinates double[], maxdistance integer) RETURNS boolean;
  • CREATE FOREIGN FUNCTION geoPolygonIntersects (ref string, north double, east double, west double, south double) RETURNS boolean;
  • CREATE FOREIGN FUNCTION geoPolygonWithin (ref string, north double, east double, west double, south double) RETURNS boolean;
The Oracle translator [3] supports the following geo-spatial functions:
  • Relate = sdo_relate
  • CREATE FOREIGN FUNCTION sdo_relate (arg1 string, arg2 string, arg3 string) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_relate (arg1 Object, arg2 Object, arg3 string) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_relate (arg1 string, arg2 Object, arg3 string) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_relate (arg1 Object, arg2 string, arg3 string) RETURNS string;
  • Nearest_Neighbor = dso_nn
  • CREATE FOREIGN FUNCTION sdo_nn (arg1 string, arg2 Object, arg3 string, arg4 integer) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_nn (arg1 Object, arg2 Object, arg3 string, arg4 integer) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_nn (arg1 Object, arg2 string, arg3 string, arg4 integer) RETURNS string;
  • Within_Distance = sdo_within_distance
  • CREATE FOREIGN FUNCTION sdo_within_distance (arg1 Object, arg2 Object, arg3 string) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_within_distance (arg1 string, arg2 Object, arg3 string) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_within_distance (arg1 Object, arg2 string, arg3 string) RETURNS string;
  • Nearest_Neighbour_Distance = sdo_nn_distance
  • CREATE FOREIGN FUNCTION sdo_nn_distance (arg integer) RETURNS integer;
  • Filter = sdo_filter
  • CREATE FOREIGN FUNCTION sdo_filter (arg1 Object, arg2 string, arg3 string) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_filter (arg1 Object, arg2 Object, arg3 string) RETURNS string;
  • CREATE FOREIGN FUNCTION sdo_filter (arg1 string, arg2 object, arg3 string) RETURNS string;
Hibernate Search in Enterprise Application Platform (EAP)
Besides the above, a canvas of activities across Red Hat show that the handling of geo-spatial information is also incorporated into other products. Hibernate Search, which is part of Red Hat JBoss Enterprise Application Platform (EAP) and the Red Hat JBoss Web Framework Kit (WFK), implements geo-spatial query capabilities atop Apache Lucene. The implementation enables either a classical range query on longitude/latitude or a hash/quad-tree indexed search when the data set is large.
The Geological Survey of the Netherlands (TNO) is using JBoss EAP 6 in conjunction with Hibernate Spatial to process geo-spatial data. More information on this is available at
Other programs within the Department of Defense are actively applying Red Hat technology as well. Programs often leverage EAP as well as Apache Tomcat and Apache httpd within Enterprise Web Server to connect to backends in MySQL and MongoDB for basic track fusion and geo-spatial processing/querying and displaying tracks on a map.
Geo-spatial processing is a key component of many DoD systems, at both the strategic and tactical level. This article presented some alternatives to traditional implementations to more flexibly implement solutions that leverage features and capabilities in modern software frameworks.
To find out more examples and articles on each of the products you can also check out the resources from the Technical Marketing Managers:


by via Social Marketing by Wordpress »

Cloud Expo Sponsorship Opportunities Announced | @CloudExpo [#Cloud]

17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infrastructure as a service.

read more

by via Latest News from JAVA Developer's Journal

Got a second? A leap second that is. Be ready for June 30th!

By GCP Team

If you don’t have a second to spare, you soon will! On June 30, 2015 at precisely 23:59:60 UTC, the world will experience its 26th recorded leap second. It will be the third one experienced by Google. If you use Google Compute Engine, you need to be aware of how leap seconds can affect you.

What is a leap second?
It’s sort of like a very small leap year. Generally, the Earth’s rotation slows down over time, thus lengthening the day. In leap years, we add an extra day in February to sync the calendar year back up with the astronomical year. Similarly, an extra second is occasionally added to bring coordinated universal time in line with mean solar time. Leap seconds in Unix time are commonly implemented by repeating the last second of the day.

When do leap seconds happen?
By convention, leap seconds happen at the end of either June or December. However, unlike leap years, leap seconds do not happen at regular intervals, because the Earth’s rotation speed varies irregularly in response to climatic and geological events. For example, the 2011 earthquake in Japan shortened the day by 1.8 microseconds by speeding up the Earth’s rotation.

How does Google handle this event?
We have a clever way of handling leap seconds that we posted about back in 2011. Instead of repeating a second, we “smear” away the extra second. During a 20-hour “smear window” centered on the leap second, we slightly slow all our servers’ system clocks (by approximately 14 parts per million). At the end of the smear window, the entire leap second has been added, and we are back in sync with civil time. (This method is a little simpler than the leap second handling we posted back in 2011. The outcome is the same: no time discontinuities.) Twenty hours later, the entire leap second has been added and we are back in sync with non-smeared time.

Why do we smear the extra second?
Any system that depends on careful sequencing of events could experience problems if it sees a repeated second. This problem is accentuated for multi-node distributed systems, because a one second jump dramatically magnifies time sync discrepancies between multiple nodes. Imagine two events going into a database under the same timestamp (or even worse, the later one being recorded under an earlier timestamp), when in reality one follows another. How would you know later what the real sequence was? Most software isn’t written to explicitly handle leap seconds, including most of ours. During the 2005 leap second, we noticed various problems like this with our internal systems. To avoid changing all time-using software to handle leaps correctly, we instead attempt to make leaps invisible by adding a little bit of the extra second to our servers’ clocks over the course of a day, rather than all at once.

What services does this apply to on Google Cloud Platform?
Only Virtual Machines running on Google Compute Engine are affected by the time smear as they are the only entities that can manually sync time. All other services within Google Cloud Platform are unaffected as we take care of that for you.

How will I be affected?
All of our Compute Engine services will automatically receive this “smeared” time, so if you are using the default NTP service ( or the system clock, everything should be taken care of for you automatically (note that the default NTP service does not set the Leap Indicator bit). If, however, you are using an external time service, you may see a full-second “step”, or perhaps several small steps. We don’t know how external NTP services will handle the leap second, and thus cannot speculate on exactly how time will be kept in sync. If you use an external NTP service with your Compute Engine virtual machines, you should be prepared to understand how those time sources handle the leap second, and how that behavior might affect your applications and services. If possible, you should avoid using external NTP sources on Compute Engine during the leap event.

The worst possible configuration during a leap second is to use a mixture of non-smearing and smearing NTP servers (or servers that smear differently): behavior will be undefined, but probably bad.

If you run services on both Google Compute Engine and other providers that do not smear leap seconds, you should be aware that your services can see discrepancies in time during the leap second.

What is Google’s NTP service?
From inside a virtual machine running on Google Compute Engine, you can use You can also just use the system clock, which is automatically synced with the smeared leap second. Google does not offer an external NTP service that advertises smeared leap seconds.

You can find documentation about configuring NTP on Compute Engine instances
here. If you need any assistance, please visit the Help & Support center.

-Posted by Noah Maxwell & Michael Rothwell, Site Reliability Engineers Source::

by via Social Marketing by Wordpress »

The Evolution of the 'Internet of Things' By @RedHatNews | @ThingsExpo [#IoT]

The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data and analysis are providing the pull to meet customer expectations of a widely connected, multi-dimensional universe of people, things, and information.

read more

by via Latest News from JAVA Developer's Journal

DigitalGov Citizen Services Summit 2015: Open Innovation and Collaboration

Digital innovators from across government were asked to think of technology as digital service for their country at today’s DigitalGov Citizen Services Summit.

The theme of this year’s Summit was “open.” The agenda was packed with presentations about how “opening” data, content, contracts and talent makes digital citizen services better, more effective or even cheaper.  A diverse array of topics were addressed, including privacy and identity management, 3D printing, and agile methodology.

Megan Smith, U.S. Chief Technology Officer, opened the Summit, challenging all techies in government to help solve problems and be part of decision-making at the highest levels of government.

She also said that young people have found ways to serve their country through the Peace Corps and Teach for America and invited the group to think how they could serve digitally.

Dr. David Bray, Chief Information Officer for the Federal Communications Commission and Eisenhower Fellow, discussed the Internet of Everything.

This dependency on technology will generate new issues, he warned.

The Summit attracted over 500 attendees, both in-person at GSA headquarters in Washington, DC, and via our Summit live stream. Summit speakers and expo table participants represented 30 federal agencies, and the Twitter handle for the event, #DigitalGov15, was trending nationwide throughout the Summit.

The full livestream video will be posted to DigitalGov in the coming days, and over the coming months we will be revisiting each of the topics that were presented.

Thanks to all of you who helped make this event a success! Let’s keep the discussion going!

by Coqui Aspiazu via DigitalGov

Canadian dollar slips, Toronto Stock Exchange up sharply Thursday morning

Canadian dollar slips, Toronto Stock Exchange up sharply Thursday morning
Vancouver Sun - 3 hours ago
TORONTO - The Canadian dollar was down slightly Thursday morning as the Toronto Stock Exchange recorded a triple-digit gain.

by via News for Canadian Dollar - Google Finance
Canadian dollar slips, Toronto Stock Exchange up sharply Thursday morning

Areti Web Innovations Inc. Sells Assets and Reduces Debt

In the near term, Areti will focus on other non-hosting, but web-related ... offering various web hosting, data storage, and domain registration services, ...
Areti Web Innovations Inc. Sells Assets and Reduces Debt

Canadian Dollar And Business Outlook

Canadian Dollar And Business Outlook
Grainews - 3 hours ago
Winnipeg, May 21 - The Canadian dollar was weaker against its American counterpart Thursday morning, due to global economic worries and losses in crude oil.

by via News for Canadian Dollar - Google Finance
Canadian Dollar And Business Outlook

Google Cloud Launcher gains 25 new solutions and integration with Cloud Monitoring

By GCP Team

Back in March, we announced the availability of Google Cloud Launcher where (at the time) you could launch more than 120 popular open source application packages that have been configured by Bitnami or Google Click to Deploy. Since then, we have received many customer requests for additional solutions. We heard you!

Today, less than three months after launch, we have added 25 new solutions to Cloud Launcher. Recent additions include: Chef, Crate, OpenCart, Sharelock, Codiad and SimpleInvoices – and new solutions are being added on an ongoing basis.

We are also announcing the addition of 14 new operating systems to Cloud Launcher. These include Windows, Ubuntu, Redhat, SUSE, Debian and CentOS. Moreover, we’ve simplified the initial creation flow to make things even faster and simpler.
Figure 1 – The updated Cloud Launcher operating system section

To help users compare these solutions, we’ve updated the Cloud Launcher interface with detailed information on pricing, support (for OS), and free trial.
Figure 2 – The updated Cloud Launcher detailed solution interface

And finally, in line with our vision of providing customers with complete solutions that can be rapidly deployed, Google Cloud Monitoring is now integrated out of the box with 50 solutions. Built-in reports for components such as MySQL, Apache, Cassandra, Tomcat, PostgreSQL, and Redis provide DevOps an integrated view into their application.
Launcher screenshot scrubbed copy.png
Figure 3 – Google Cloud Monitoring Dashboard for Apache Web Server

You can get started with Cloud Launcher today to launch your favorite application packages on Google Cloud Platform in a matter of minutes. And do remember to give us feedback via the links in Cloud Launcher or join our mailing list for updates and discussions. Enjoy building!

– Posted by Ophir Kra-Oz, Group Product Manager Source::

by via Social Marketing by Wordpress »

Moore’s Law & Hadoop By @MasonKatz | @CloudExpo [#Cloud #BigData]

Hardware will never be more valuable than on the day it hits your loading dock. Each day new servers are not deployed to production the business is losing money. While Moore's Law is typically cited to explain the exponential density growth of chips, a critical consequence of this is rapid depreciation of servers. The hardware for clustered systems (e.g., Hadoop, OpenStack) tends to be significant capital expenses. In his session at Big Data Expo, Mason Katz, CTO and co-founder of StackIQ, discussed how infrastructure teams should be aware of the capitalization and depreciation model of these expenses to fully understand when and where automation is critical.

read more

by via Latest News from JAVA Developer's Journal

Installing Red Hat Container Development Kit on Mac OS X

By Thomas Qvarnström Containers are great and will change how we develop and deliver software. There are however also some criticism against containers that it isn’t secure and stable enough to run in products etc.

With the launch of Red Hat Enterprise Linux 7.1 and Red Hat Atomic enterprises and organisations can embrace innovations from this new trend without sacrificing security, stability and performance.

What is Red Hat CDK?

CDK is an abbreviation for Container Development Kit which enables developers to use Red Hat Atomic on their Desktop regardless if they are running Microsoft Windows®, Mac OS X® or another Linux distributions. Similar as boot2docker, CDK makes use of a virtual machine to boot a small host, which can run containers based on Red Hat Enterprise Linux.


  • Red Hat subscription – To install Red Hat CDK you will have to have a an active Red Hat Enterprise Linux subscription, if you don’t have an active subscription you can request and eval here.
  • Virtual environment – VirtualBox (Mac/Windows) or virt-manager (Linux)
  • Vagrant – Used to create and manage the virtual environment.
Download the following from the Red Hat Customer Portal.
  1. Red Hat Container Tools
  2. Red Hat Atomic Vagrant box for VirtualBox or Red Hat Atomic Vagrant box for libvirt.

Install the Red Hat Container Development Kit

Note: You need to have your virtualization environment and Vagrant installed before
Unzip the file you downloaded in your home directory. This should create ~/cdk (/Users/username/cdk)
$ unzip -d $HOME ~/Downloads/

Install additional Vagrant plugins for using Red Hat Vagrant boxes. The installation of the first plugin make take several minutes Vagrant may install some additional gem files as needed.

$ cd ~/cdk/plugins
$ vagrant plugin install vagrant-registration-0.0.8.gem
$ vagrant plugin install vagrant-atomic-0.0.3.gem

Verify the plugins are installed:

$ vagrant plugin list
vagrant-atomic (0.0.3)
- Version Constraint: 0.0.3
vagrant-registration (0.0.8)
- Version Constraint: 0.0.8

Add RHEL Atomic box to Vagrant:

$ vagrant box add --name rhel-atomic-7 ~/Downloads/

Start the Atomic host

Create a working directory for docker files
$ mkdir ~/containers && cd ~/containers
Create a working directory for containers and initiate vagrant
$ mkdir containers && cd containers
$ vagrant init -m
A `Vagrantfile` has been placed in this directory. You are now
ready to `vagrant up` your first virtual environment! Please read
the comments in the Vagrantfile as well as documentation on
`` for more information on using Vagrant.

This step will create a simple Vagrantfile. Open the Vagrant file and change the configuration as below:

Vagrant.configure(2) do |config| = "rhel-atomic-7"
config.vm.hostname = "rhel-atomic-7-docker-host"

config.vm.provider "virtualbox" do |vb|
vb.customize ["modifyvm", :id, "--cpuexecutioncap", "50"]
vb.memory = 4096

config.vm.provision "shell", inline: <<-SHELL
sudo systemctl stop docker > /dev/null 2>&1
sudo groupadd docker > /dev/null 2>&1
sudo usermod -a -G docker vagrant
sudo systemctl enable docker && sudo systemctl start docker
sudo chown root:docker /var/run/docker.sock
sudo systemctl enable docker && sudo systemctl start docker

We are now ready to start the container. During the creation of the machine you will be prompted if you would like to register the system. Answer “Y” and then when prompted give your username and password for your RHN (Red Hat Network) account.

$ vagrant up
Bringing machine 'default' up with 'virtualbox' provider...
==> default: Importing base box 'rhel-atomic-7'...
==> default: Matching MAC address for NAT networking...
==> default: Setting the name of the VM: containers_default_1432213616739_95846
==> default: Clearing any previously set network interfaces...
==> default: Preparing network interfaces based on configuration...
default: Adapter 1: nat
==> default: Forwarding ports...
default: 22 => 2222 (adapter 1)
==> default: Running 'pre-boot' VM customizations...
==> default: Booting VM...
==> default: Waiting for machine to boot. This may take a few minutes...
default: SSH address:
default: SSH username: vagrant
default: SSH auth method: private key
default: Warning: Connection timeout. Retrying...
default: Vagrant insecure key detected. Vagrant will automatically replace
default: this with a newly generated keypair for better security.
default: Inserting generated public key within guest...
default: Removing insecure key from the guest if its present...
default: Key inserted! Disconnecting and reconnecting using new SSH key...
==> default: Machine booted and ready!
==> default: Checking for guest additions in VM...
default: No guest additions were detected on the base box for this VM! Guest
default: additions are required for forwarded ports, shared folders, host only
default: networking, and more. If SSH fails on this machine, please install
default: the guest additions and repackage the box to continue.
default: This is not an error message; everything may continue to work properly,
default: in which case you may ignore this message.
==> default: Setting hostname...
==> default: Registering box with vagrant-registration...
default: Would you like to register the system now (default: yes)? [y|n] y
default: Subscriber username: <your-rhn-username>
default: Subscriber password: <password>
==> default: Rsyncing folder: /Users/tqvarnst/containers/ => /home/vagrant/sync
==> default: Running provisioner: shell...
default: Running: inline script

Test your installation

$ vagrant ssh
[[email protected] ~]$ docker ps
[[email protected] ~]$ docker run -it rhel7.1 bash
Unable to find image 'rhel7.1:latest' locally
Pulling repository
10acc31def5d: Download complete
Status: Downloaded newer image for
[[email protected] /]# cat /etc/redhat-release
Red Hat Enterprise Linux Server release 7.1 (Maipo)
[[email protected] /]#

Press CTRL-P + CTRL-Q to escape the container

[[email protected] ~]$ docker ps
ead3774c2b84 "bash" About a minute ago Up About a minute focused_rosalind

Stop and delete the container

[[email protected] ~]$ docker stop $(docker ps -q)
[[email protected] ~]$ docker rm $(docker ps -aq)


By following this guide you should have a working environment for using docker containers based on Red Hat Enterprise Linux 7.1 even if you are using Mac OS X®, Microsoft Windows® or another Linux distribution.


A special thanks goes to Pete Muir for the support and help with Vagrant setup.


by via Social Marketing by Wordpress »

Accelerating #DevOps By @BrianCReagan | @DevOpsSummit [#Docker #Containers #Microservices]

Providing the needed data for application development and testing is a huge headache for most organizations. The problems are often the same across companies – speed, quality, cost, and control. Provisioning data can take days or weeks, every time a refresh is required. Using dummy data leads to quality problems. Creating physical copies of large data sets and sending them to distributed teams of developers eats up expensive storage and bandwidth resources. And, all of these copies proliferating the organization can lead to inconsistent masking and exposure of sensitive data.

read more

by via Latest News from JAVA Developer's Journal

Andi Mann Named Editor of ‘DevOps Journal’ | @DevOpsSummit [#DevOps #Docker #Microservices]

SYS-CON Media named Andi Mann editor of DevOps Journal. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. DevOps Journal brings valuable information to DevOps professionals who are transforming the way enterprise IT is done. Andi Mann, Vice President, Strategic Solutions, at CA Technologies, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, communicator, and thought leader. For over 25 years and across five continents, he has built success with Fortune 500 corporations, technology vendors, governments, and as a leading research analyst and business consultant.

read more

by via Latest News from JAVA Developer's Journal

Securing Microservices

By Stian Thorgersen

In a traditional multi-tiered architecture like the one shown in the picture below a server-side web tier deals with authenticating the user by calling out to a relational database or an LDAP server. An HTTP session is then created containing the required authentication and user details. The security context is propagated between the tiers within the application server so there’s no need to re-authenticate the user.

With a microservice architecture the server-side web application is gone, instead we have HTML5 and mobile applications on the client side. The applications invoke multiple services, which may in turn call other services. In this architecture there’s no longer a single layer that can deal with authentication and usually it’s stateless as well so there’s no HTTP session.

As microservices is all about having many smaller services each that deal with one distinct task the obvious solution to security is an authentication and authorization service. This is where Keycloak and OpenID Connect comes to the rescue. Keycloak provides the service you need to secure micro services.

The first step to securing micro services is authenticating the user. This is done by adding the Keycloak JavaScript adapter to your HTML5 application. For mobile applications there’s a Keycloak Cordova adapter, but there’s also native support though the AeroGear project.

In an HTML5 application you just need to add a login button and that’s pretty much it. When the user clicks the login button the users browser is redirected to the login screen on the Keycloak server. The user then authenticates with the Keycloak server. As the authentication is done by the Keycloak server and not your application it’s easy to add support for multi-factor authentication or social logins without having to change anything in your application.

Once the user is authenticated, Keycloak gives the application a token. The token contains details about the user as well as permissions the user has.

The second step in securing micro services is to secure them. Again, with Keycloak this is easy to do with our adapters. We’ve got JavaEE adapters, NodeJS adapters and are planning to adding more in the future. If we don’t have an adapter it’s also relatively easy to verify the tokens yourself. A token is basically just a signed JSON document and can be verified by the services itself or by invoking the Keycloak server.

If a service needs to invoke another service it can pass on the token it received, which will invoke the other service with the users permissions. Soon we’ll add support for services to authenticate directly with Keycloak to be able to invoke other services with their own permissions, not just on behalf of users.

For more details about OpenID Connect you can look at the OpenID Connect website, but the nice thing is with Keycloak you don’t really need to know the low level details so it’s completely optional. As an alternative just go straight to the Keycloak website, download the server and adapters, and check out our documentation and many examples.


by via Social Marketing by Wordpress »

Virtual Machines vs #Containers at @DevOpsSummit New York [#DevOps #Docker #Microservices]

There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming onto the cloud hosting scene over 10 years ago. So, what has changed? In his session at 16th Cloud Expo, Tenko Nikolov, founder and CEO of Kyup, will discuss the security, speed, scalability, cost and outlook for the future of container cloud hosting.

read more

by via Latest News from JAVA Developer's Journal

Start Sleuthing with the Great Federal Mobile Product Hunt

The Digital Gov "Hunters of the Lost Apps" Twitter promo graphic, inviting users to Join the Hunt and use the "Lost Apps" hashtag.

Courtney Greenley

Mobile-friendliness is a must for government. We know there are a number of agencies who have mobile-friendly digital products that we don’t know about, and they deserve their day in the sun.

We need your help to find them. So today, at the DigitalGov Citizen Services Summit you will find the MobileGov Community of Practice Expo Table, where we are kicking off the Great Federal Mobile Product Hunt. The mission of the hunt is simple—find the mobile apps or websites not listed on the registry.

The Federal Mobile Products Registry is the authoritative source for federal mobile Web products, and we want to make sure your agency’s products are included. Agencies that do not have their apps registered here are losing out on valuable promotional opportunites on and DigitalGov.

Here’s how you can help agencies get their promotional mojo by participating in the Great Federal Mobile Product Hunt:

  • Check out the Mobile Apps Directory on to see if your agency’s products are listed.
  • If they are listed, great!
  • If not, email us with the subject line “LostApps,” and tell us the name of the mobile app or website and the contact person for it. We will add the app or website to the registry, and we may profile it in our Thursday Mobile Products series here on DigitalGov.

Stay tuned, as we will be bringing you periodic updates about our progress in finding missing apps. Help us spread the word by using the hashtags #lostapps and #mobilegov on Twitter.

Courtney Greenley is an ORISE/ORAU fellow at the Institute for Water Resources at the U.S. Army Corps of Engineers.

by Ashley Wichman via DigitalGov

Operational Hadoop for Streaming Data By @MapR | @CloudExpo [#BigData]

Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, representing a model of how to analyze real-time and historical data together.

read more

by via Latest News from JAVA Developer's Journal

Microservices Architecture Developer Day on June 11th in London

By Claus Ibsen

We are hosting a full day event,

James Strachan will start the day presenting Kubernetes and what impact it does, and how and what you as a developer and architect should know about it. We in the fabric8 team saw first hand the impact when we realized that fabric8 had to be architecture based on kubernetes and containers (eg Docker). And hence why fabric8 v2 was born. James will also show and tell what fabric8 brings to the table to make developing with kubernetes much easier, especially for developers coming with a Java background.

I on the other hand, talk about Apache Camel, which would hardly be a surprise. The scope is how developers can build microservices with Camel, and how you can use the fabric8 / maven / eclipse / hawtio / docker tooling to build and deploy your Camels on a docker/kubernetes based cloud infrastructure.

Then follows a very interesting topic about api management. An area that everyone would love some help with, but there is hardly so much great software around that. The apiman project is changing all that and making this area much easier for developers. Come and hear from the core developers on this project and see the hawtio based web console for managing all of this, and hear how apiman integrates with fabric8/kubernetes/docker et all in the cloud or on JEE servers such as WildFly.

James Rawlings, who has been a long time consultant in the field, shares his breath of expertise about microservices and fabric8. He is a great chap and we are grateful in the xpaas team to have him join us as a full time developer.

Mark Little, the CTO of JBoss Middleware, is not shy of presenting himself, so its great to see and hear him talk about how WildFly can host microservices with the newest Wildfly Swarm project.

Later in the afternoon there will BOF break-outs where the xpaas team will host a session about integration and api management. So this is our chance to sit face to face to discuss and share knowledge and ideas.

An alternative is to learn about the reactive platform called vert.X from the founder and core developer Tim Fox himself.

Arun Gupta, the leading evangelist at JBoss talks about microservices (yes its a microservice day) and the various design patterns that developers ought to know.

This is followed by mr Jolokia, Roland Huss, who just joined our xpaas team as a full time developer. Roland created the excellent Docker Maven Plugin, so he gives a run down of this tool and Docker, but from a tooling point of view. As a developer I recommend this as even though the Docker is very successful, it can be a bit daunting to get started with, especially for Java developers how are used to only use build tools like Maven.

To break the microservices dead-lock then the last talk is focused on mobile architectures.

The event is free to attend, but you need to register as there is limited seatings. You can find details about the event such as timetable, location and more and also importantly the registration button.

Hope to see you there. And we can afterwards head for a bite and a beer with us.


by via Social Marketing by Wordpress »
fabric8 console – Managing containers on a docker/kubernetes cloud platform

Gambling problem: Growth slows for Playtech

Playtech is considered a proxy for the global betting industry, with its business booming alongside the growth of online gambling around th...