Søk på nettsiden

Tilbake

JavaZone 2019

Møt Ambita på JavaZone!  Vi er på Oslo Spektrum 11-12. september med stand og speakers.  

Arrangør
JavaZone

Fra: 11.09.2019 Kl. 08:00
Til: 12.09.2019 Kl. 16:00

Oslo Spektrum

Del denne siden

AMBITA SPEAKERS

 

SQL WINDOW FUNCTIONS TO YOUR RESCUE

Wednesday 15:40 by Frode Borlaug, Ambita

Twitter: @frobor

SQL Window Functions are a little-known feature of Standard SQL, but very powerful. A SQL Windows Function do calculations across a set of rows (window), these rows are somehow related to the current row. Compared to classical aggregate functions in SQL, aggregate as Window Functions do not cause rows to be grouped into one output row in the result but return all the rows in the result. The SQL Window Functions can be of statistical/analytical, ranking or aggregate type. Through this talk I will give developers and data analysts a little glimpse into this world. I will start with a little introduction, and then a few examples.

USEFUL DASHBOARDS WITH GRAFANA

Wednesday 16:20 by Jarl Totland, Ambita

Twitter: @jarltotland

Modern cloud and container orchestration makes it super easy to collect tons of metrics for your infrastructure and applications. Unfortunately it is not always obvious how to reduce the information flow, and visualize it. Let’s look at some good practices for creating effective dashboards for high level overviews and day to day devops activities. Based on real life experience using Grafana with Telegraf and Influxdb for managing 500+ servers whilst migrating from on prem to AWS.

DISCOVER VULNERABILITIES IN LESS THAN 5 MINUTES

Thursday 14:40 by Bjørn Hamre

Twitter: @javaguruen

In 2017 several Fortune 100 companies received unwanted media attention when a vulnerability in the Struts framework caused their system to be practically wide open. The best-known victim Equifax may have leaked personal information for as many as 100.000 Canadian customers.  In this lightning talk I demonstrate how to use OWASP’s little known plugins for Maven and SBT to check your third party libraries for known vulnerabilities. By comparing the version of your dependencies against a public database, it will generate a nice report with some explanations and links to the full vulnerability disclosures.