We run data acquisition at the UK's biggest science project using Java. This year we completed a migration of around three million lines of code in our Java servers to OSGi running with Equinox and declarative services. This is the story of how we did it, the pitfalls and real world examples of what happened.
AceJump, a popular plugin for IntelliJ IDEA, is coming soon to Eclipse! We'll discuss some technical hurdles encountered when migrating this plugin, and how I resolved them using Kotlin, Gradle, and the Eclipse RCP to help you jump to any character in the editor with just a few keystrokes.
Vanguard is one of the world's largest mutual fund providers and responsible for over $3.5 trillion in assets under management. With the recent global growth in assets, Vanguard found it necessary to invest in the people, process, and technology that support the investment decision making process.
In this talk we will discuss the new API paradigm in Eclipse Dirigible and will show examples for:
Scientific software lacks much of the prim and polish of other types of software - it can be hard to use or find, it might only be distributed as C and Fortran source, and it probably doesn't run on Windows. In addition to being extremely annoying, the reality of this situation severly undermines productivity and scientific progress. What would things be like if installing linear algebra libraries was as simple as installing mobile apps?
Deploying Domain-Specific Language (DSL) editors on Cloud IDEs opens up new possibilities to make development experience easier and more productive thanks to the abstraction of low-level technical details and the automation of repetitive and error-prone tasks. In this talk, we will demonstrate how easy to integrate DSL editors to Dirigible Web IDE using DSL Forge, a framework for building web-based editors based on EMF, Xtext, and ANTLR.
The Eclipse Rich Client Platform provides benefits that very few other frameworks can match. It's ability to support modular user-interfaces and to allow for the assembly of modules into different functional sets makes the framework especially powerful. Unfortunately the power of Eclipse RCP can also result in increased complexity - architecturally and also from a development perspective. Integration and UI testing in particular can be a serious challenge.
The number of mobile cyber security attacks is continuing to grow. At any given time, malicious code is infecting more than 11.6 million mobile devices. Recent research shows that nearly 40 percent of large companies, including many in the Fortune 500, aren’t taking the right precautions to secure the mobile applications they build for customers. The alarming state of mobile insecurity expands beyond applications, to gaps in mobile device management, data and content and user access.
IBM Security supports an intelligent, integrated and innovative approach to addressing the security challenges bombarding today’s mobile enterprises. The comprehensive portfolio of IBM Mobile Security solutions can meet your needs for trusted, high-quality interactions. These solutions deliver a protective layer of security intelligence for correlating events across the enterprise and facilitating proactive responses. This way, organizations can help prevent identity theft, reduce the risk of fraud and protect all types of critical data.
In Industry 4.0, different types of isolated and optimized sensors, machines, and instruments of varying vintage will emerge as a fully integrated, automated, and optimized production flow, leading to greater efficiencies and changing traditional production relationships among suppliers, producers, and customers. In the IoT context, Eclipse Kura is a Java/OSGi application container framework that enables remote management of IoT service gateways and provides a wide range of APIs that simplify the development of IoT applications.
Are you a new committer or project lead for an Eclipse, LocationTech, or PolarSys open source project? Are you thinking about proposing a new open source project? This session will take you quickly through the important parts of being a committer on an Eclipse Foundation project. Don't expect a lot of background or related discussion; in this session, we get right to the point and talk you through the key things that you need to know to follow the rules and be an effective committer.
Pair programming is a well-known agile software development technique where two programmers work together on one set of code files. One person is typically the driver while the other is the observer. What happens when one of the programmers is remote? Can we do better than screen sharing? This talk builds on the collaborative editing experience and examines the intriguing possibility of a first class shared development environment and seamless team awareness in the cloud.
There are many reasons to build a modern web application as so called single page application (SPA), for example enhancing the user experience by executing code on the client rather than on the server. A common way to create such a SPA is to use AngularJS together with HTML 5 and CSS 3 as front end technology and the Spring technology stack for the back end.
If you look around, you’ll find that a lot of things that used to hang around on your hard drive, from documents to applications, have been moving to the cloud in recent years. The same seems to be true for IDEs: Eclipse Che for example is hosted in the cloud and uses workspaces containing your projects alongside the necessary runtimes: Instead of setting up the required environment - like databases, applications servers, or third party libraries - everything you need for your project to run is already associated with your workspace.
Elliptical Curve Cryptography (ECC) for IoT and the NSA
Explains why and how to use ECC for securing IoT devices and systems.
A portion of the presentation focuses on the mathematics of Elliptical Curve Cryptography and its low computational power requirement with performance examples.
Delves into the NSA’s position on the use of ECC for National Security Systems.
Provides examples of using ECC for Secure Boot and Code signing to produce products that have certifiable integrity and authenticity.