• Blog
  • Info Support
  • Career
  • Training
  • International Group
  • Info Support
  • Blog
  • Career
  • Training
  • International Group
  • Search
logo InfoSupport
  • Latest blogs
  • Popular blogs
  • Experts
      • All
      • Bloggers
      • Speakers
  • Meet us
  • About us
    • nl
    • en
    • .NET
    • 3D printing
    • Advanced Analytics
    • Agile
    • Akka
    • Alexa
    • Algorithms
    • Api's
    • Architectuur
    • Artificial Intelligence
    • ATDD
    • Augmented Reality
    • AWS
    • Azure
    • Big Data
    • Blockchain
    • Business Intelligence
    • Chatbots
    • Cloud
    • Code Combat
    • Cognitive Services
    • Communicatie
    • Containers
    • Continuous Delivery
    • CQRS
    • Cyber Security
    • Dapr
    • Data
    • Data & Analystics
    • Data Science
    • Data Warehousing
    • Databricks
    • DataOps
    • Developers life
    • DevOps
    • Digital Days
    • Digital Twin
    • Docker
    • eHealth
    • Enterprise Architecture
    • Event Sourcing
    • Hacking
    • Infrastructure & Hosting
    • Innovatie
    • Integration
    • Internet of Things
    • Java
    • Machine Learning
    • Microservices
    • Microsoft
    • Microsoft Bot Framework
    • Microsoft Data Platform
    • Mobile Development
    • Mutation Testing
    • Open source
    • Pepper
    • Power BI
    • Privacy & Ethiek
    • Python
    • Quality Assistance & Test
    • Quality Assurance & Test
    • Requirements Management
    • Scala
    • Scratch
    • Security
    • SharePoint
    • Software Architecture
    • Software development
    • Software Factory
    • SQL Server
    • SSL
    • Start-up
    • Startup thinking
    • Stryker
    • Test Quality
    • Testing
    • TLS
    • TypeScript
    • Various
    • Web Development
    • Web-scale IT
    • Xamarin
    • All
    • Bloggers
    • Speakers
Home » JavaOne 2006 – Day 3: Busting myths…
  • JavaOne 2006 - Day 3: Busting myths...

    • By Oud-medewerkers
    • Security 17 years ago
    • Security 0 comments
    • Security Security
    JavaOne 2006 - Day 3: Busting myths...

    Ah well the conference is now also taking its toll upon me when I woke up this morning. But the thoughts of another long and interesting conference day ahead including the Afterdark Bash alleviated some of the scars.


    The Mythbusters, who have their own must see popular tv show on the Discovery Channel will be in the Moscone Center tonight. They are a pair of special effect wizards who take on myths and urban legends. Very entertaining and most of the time they blow things up 😉


    Before all of the Afterdark fun stuff starts there is tons of sessions that I have to attend. Starting off with the IBM General Session.
    Erich Gamma talks about Eclipse and their way of innovation and project planning.


    The new enrollment system is getting better every day. They learn. However, if you want to attend a very popular session you have to be on time or the rows will be huge.


    I went to a session called ‘Extreme Web Caching’ by Jason Hunter. Great session! Jason is a very entertaining presenter and there was lots of good stuff in it as well.


    After the caching stuff I decided to skip a slot in order to walk across the pavilion one more time (as its the final day already) and I called Eric to arrange a meetup. We decided to pick a nearby Starbucks for this mini-blogger meetup, as Eric Stahl is a blogger too. He is Senior Director of Investor Relations at BEA. He joined the company about seven years ago and while he is in the Investor business now, he never lost touch with the technical stuff as he still showed broad knowledge and understanding about most of the topics that are going on in today’s Java world. We exchanged opinions and ideas about several Java related subjects, as well as some sneek peeks behind the curtains of BEA. We also straightened out some of the concerns that I picked up from BEA’s keynote yesterday. Eric explained some more of the intentions of BEA regarding open source and other vendors. Too bad he didn’t do the keynote himself. Unfortunately I had to leave the mini-blogger meeting sooner than I’d liked, but it was session time again and I wouldn’t want to miss that either.


    Another very nice session that I attended today was about ‘Secure Coding Anti-patterns’. It showed several nasty little side-effects of some Java constructs that give people with malicious intent the possibility to hack around in your code. Maybe the nicest thing about the presentation was the fact that they didn’t do simple ‘helloworld’ kind of examples, but instead they showed some actual JDK security holes from the (recent) past, that have now all been fixed ofcourse 😉 Very interesting session!


    It bugs me everytime I see some people walking in say 5 minutes prior to the end of a session. What are they thinking? My guess is that they are trying to earn there conference fee back by filling in as much eval forms as they can. At the end of every day, 5 lucky people receive a $75 gift certificate. Out of approximately 15.000 people attending, chances are crazy…but hey…


    Afternoon sessions were crammed with AJAX, AJAX, and…AJAX. I attended some sessions on using Dojo from Java and ofcourse I went to the ‘AJAX Frameworks Smackdown’, a successor to last years ‘Web Framework Smackdown’. It was fun and entertaining to watch the battle, but the people defending their frameworks were actually too nice to eachother. A lot of smack, but few downs.


    That rounded up another day of technical sessions. Off to grab a quick bite now and return in time for the Afterdark Bash. Looking forward to Mythbuster crazyness and the all-female AC/DShe band!

    Share this

Oud-medewerkers

View profile

Related IT training

Go to training website

Related Consultancy solutions

Go to infosupport.com

Related blogs

  • Secret management with Hashicorp Vault

    Secret management with Hashicorp Vault Tom van den Berg - 2 years ago

  • How to get Azure Sentinel Incidents via the Sentinel AP…

    How to get Azure Sentinel Incidents via the Sentinel AP… Sander Wannet - 2 years ago

  • Privacy & Computer Vision: How to Anonymize Video U…

    Privacy & Computer Vision: How to Anonymize Video U… Lucía Conde Moreno - 3 years ago

Data Discovery Channel

  • MLOps

  • Explainable AI - Break open the blackbox

  • Toekomstvaste microservice data architecturen

Nieuwsbrief

* verplichte velden

Contact

  • Head office NL
  • Kruisboog 42
  • 3905 TG Veenendaal
  • T +31 318 552020
  • Call
  • Mail
  • Directions
  • Head office BE
  • Generaal De Wittelaan 17
  • bus 30 2800 Mechelen
  • T +32 15 286370
  • Call
  • Mail
  • Directions

Follow us

  • Twitter
  • Facebook
  • Linkedin
  • Youtube

Newsletter

Sign in

Extra

  • Media Library
  • Disclaimer
  • Algemene voorwaarden
  • ISHBS Webmail
  • Extranet
Beheer cookie toestemming
Deze website maakt gebruik van Functionele en Analytische cookies voor website optimalisatie en statistieken.
Functioneel Always active
De technische opslag of toegang is strikt noodzakelijk voor het legitieme doel het gebruik mogelijk te maken van een specifieke dienst waarom de abonnee of gebruiker uitdrukkelijk heeft gevraagd, of met als enig doel de uitvoering van de transmissie van een communicatie over een elektronisch communicatienetwerk.
Voorkeuren
De technische opslag of toegang is noodzakelijk voor het legitieme doel voorkeuren op te slaan die niet door de abonnee of gebruiker zijn aangevraagd.
Statistieken
De technische opslag of toegang die uitsluitend voor statistische doeleinden wordt gebruikt. De technische opslag of toegang die uitsluitend wordt gebruikt voor anonieme statistische doeleinden. Zonder dagvaarding, vrijwillige naleving door uw Internet Service Provider, of aanvullende gegevens van een derde partij, kan informatie die alleen voor dit doel wordt opgeslagen of opgehaald gewoonlijk niet worden gebruikt om je te identificeren.
Marketing
De technische opslag of toegang is nodig om gebruikersprofielen op te stellen voor het verzenden van reclame, of om de gebruiker op een website of over verschillende websites te volgen voor soortgelijke marketingdoeleinden.
Manage options Manage services Manage vendors Read more about these purposes
Voorkeuren
{title} {title} {title}