It seems to be a gathering of Java users. There was a part that it was too different world, but It seems that it may be useful unexpectedly I will report it. This is the official website address http://www.java-users.jp/ccc2017fall/
ccc_l1 Description When faced with a large-scale legacy system, it is of utmost importance to suppress the data structure first. However, in such sites, documents often do not catch up, and the reality is that salvage of information takes time in the first place. The project I participated in also had only an Excel entity definition that wasn't well maintained. Documents are often created as input for product development, but as the service continues, it shifts to a role of visualizing the current situation. There are many visualization tools and services available today, but there are many things that legacy systems can't get into that scheme. At such times, Spring Boot can be a powerful ally. I used Spring Boot and MyBatis to create a web application that visualizes database meta information. In this presentation, based on that experience, I would like to talk about the importance of visualizing the current situation with technology, the strength of Spring Boot and MyBatis, and hints for on-site improvement.
Explanatory material https://speakerdeck.com/higedrum/springboottomybatisdedetabesuwoke-shi-hua-suru
the term SchemaSpy ・ ・ ・ Can be executed with CUI It seems that it can be reversed from the existing DB.
comment Focusing on data to get rid of legacy systems I think so. It seems that I made something more convenient than SchemaSpy with springBoot and MyBatis.
ccc_e3 Document https://www.slideshare.net/masatoshitada7/spring-boot-jjug
Comment: It seems to be a famous teacher.
ccc_g4 Description With the introduction of Spring Security, there is no need to worry about the security of web applications ... There are some areas that are covered by Spring Security and some that are not. In this session, I will talk about the scope of protection provided by Spring Security in my own way, in light of the security measures listed in "How to Create a Secure Website" issued by IPA. Instead of discussing the implementation details, the focus will be on the features of Spring Security. This content will be the same as "KANJAVA PARTY 2017 !!!" held in Java on 2017-06-24.
Document https://qiita.com/opengl-8080/items/6dc37f8b77abb5ae1642
comment I couldn't hear them all, but it was fun. I have been very active in Gina security testing. It was so different whether the project could be saved or not depending on whether it was done or not. What I find interesting is that there are no people who hit the gar as a whole, so there are many things I understand. Also, in terms of performance, when I did 3 or 5 multiplexes, strange errors appeared again. I remembered that.
ccc_g6 Description JVM languages with different paradigms than Java, such as Scala and Clojure, are getting a lot of attention these days. What should we do next to "Hello world!" For efficient learning? One of the training suggestions is to implement an HTTP server. In this session, through the implementation of a simple HTTP server, you will learn techniques necessary for Web application development such as string and byte string manipulation, regular expressions, I / O, parallelization, etc. for each language of Java, Scala, Clojure. To go. (No deep prior knowledge of each language or HTTP server implementation required
Document https://speakerdeck.com/todokr/xin-siihurokuraminkuyan-yu-falsexue-hifang-httpsahawozuo-tutexue-hu-java-scala-clojure
comment It was an interesting content. Let's teach Java and JavaScript about events.
Other It seems that the book is also out. Crawling Hack Practical Techniques for Crawling Any Website Book (Softcover) – 9/14/2017 Naoki Takezoe (Author), Takako Shimamoto (Author), Shunsuke Tadokoro (Author), Takataku Hagino (Author), Momoko Kawakami (Author)
D-Cube They also have events. https://d-cube.connpass.com/
Recommended Posts