- The Reactive Revolution with Josh Long
Details The reactive revolution continues. For as much as we've been talking about reactive programming in Spring for the last few years the journey has only just begun. Join Spring Developer Advocate Josh Long (@starbuxman), as he will show us how to take our reactive applications further, looking at how to build microservices for cloud platforms like Cloud Foundry and Kubernetes. REGISTER AT: https://www.meetup.com/Chicago-Spring-User-Group/events/259903186/ Some of the things Josh will cover may include: * reactive NoSQL data access * reactive SQL data access with R2DBC * orchestration and reliability patterns like client-side loadbalancing, circuit breakers, and hedging * messaging and service integration with Apache Kafka or RSocket * API gateways with Spring Cloud Gateway and patterns like rate limiting and * API adapters * serverless programming with Spring Cloud Function and project Riff * reactive authentication and authorization with Spring Security REGISTER AT: https://www.meetup.com/Chicago-Spring-User-Group/events/259903186/ Agenda 5:30 - 6:00 - Networking, food and drinks 6:00 - 7:30 - Speaker's Presentation 7:30 - 8:00 - Q&A REGISTER AT: https://www.meetup.com/Chicago-Spring-User-Group/events/259903186/ Speaker Bio: Josh (@starbuxman) is the Spring Developer Advocate at Pivotal. Josh is a Java Champion, author of 6 books (including O'Reilly's Cloud Native Java: Designing Resilient Systems with Spring Boot, Spring Cloud, and Cloud Foundry and the upcoming Reactive Spring) and numerous best-selling video trainings (including Building Microservices with Spring Boot Livelessons with Spring Boot co-founder Phil Webb), and an open-source contributor (Spring Boot, Spring Integration, Spring Cloud, Activiti and Vaadin). REGISTER AT: https://www.meetup.com/Chicago-Spring-User-Group/events/259903186/
- Brett Lindsley Presents Intro to Big Data Mining
Big data is becoming part of every company’s business. Although there are various technologies for collecting data, the real value is in the data analysis, and application of the results to business planning. Understanding the algorithms is important to determine what algorithms can be used for various data problems. This presentation provides an understanding of two of the most common yet powerful data mining algorithms – the Apriori algorithm and the Bayesian classifier. The objective is to demystify the mathematics, provide an intuitive understanding of the algorithms and Java code (on GitHub) to demonstrate the simplicity of implementation. As a example of the Apriori algorithm...“On Friday afternoons, married men under the age of 35 tend to buy both diapers and beer”. Observations such as this can be used for product placement, advertising, etc. The Apriori algorithm is used to develop item relationships and association rules from a transactional log. In this example, the transactional log is purchases at a store. Another example is the on-line book seller that indicates “people who bought this book also bought the following items” or “the following items were commonly purchased together”. The second algorithm is the Bayesian classifier for data classification. Data classification learns a model from labeled training data and predicts the classification of new data. The Bayesian classifier is one of the most important classifiers because it is highly accurate, very simple to implement and efficient. Although wrapped in probability theory, the implementation of Bayes Theory for classifiers is fairly simple. The Bayesian classifier can be implemented using simple loops and counters. Two classifiers will be explained including a document classifier that is typically used as the basis for email classification (spam filtering). Spend a little time coming up to speed on the two most important algorithms you will encounter on a path to being a data scientist!
- Kafka's Core Concepts by David Greenfield
Abstract Kafka is a clustered streaming platform. It has been adapted across multiple industries over the last decade to provide scalable and durable messaging. The goal of this talk is to provide an understanding of the basics of Kafka as well as an understanding of how it is applied. Bio Dave Greenfield has been a software development professional and hobbyist in the Chicago-land area for over 25 years. He has sat on the IJUG (Illinois Java Users Group) board. He has worked in multiple industries using multiple programming languages and under multiple development paradigms. He has spoken on REST, Enterprise architecture in the Chicago area and at Java One.
- The Influential Engineer, and The Art of the Impossible by Michael Carducci
1: The Influential Engineer Abstract: As technology professionals we are frequently frustrated by positive initiatives that are quickly shut down by management, or rejected by peers. The skills necessary to overcome these obstacles are rarely taught but are absolutely critical to our success as developers. Whether you want to effect culture change in your organization, lead the transition toward a new technology, or are simply asking for better tools; you must first understand that having a “good idea” is just the beginning. How can you dramatically increase your odds of success? You will learn 12 concrete strategies to build consensus within your team as well as 6 technique to dramatically increase the odds that the other person will say “Yes” to your requests. As a professional mentalist, Michael has been a student of psychology, human behavior and the principles of influence for nearly two decades. There are universal principles of influence that necessary to both understand and leverage if you want to be more effective leader of change in your organization. In this session we discuss strategies for getting your team on board as well as when/how to approach management within the department and also higher-up in the organization. 2. The Art of the Impossible Abstract: The Art of the Impossible - Video Preview We all have an innate sense of what's possible. Not only is this how magicians fool you, but it might also be what's holding you back. In this session Michael Carducci shares how he applied lessons learned in his career as a professional magician to his “day-job” as a software engineer. Magicians have a simple process for creating new material; think of the most impossible thing you can imagine, the engineer a way to make it possible. Michael has been engineering solutions to “impossible” problems for nearly 20 years and this has given him a unique perspective on dealing with challenges in all aspects of his life. This talk combines illusion, anecdotes and real-world examples to help identify and overcome your mental obstacles. Bio: For nearly 20 years, Michael was a software engineer moonlighting as a magician. Now he's a magician moonlighting as a software engineer. In both endeavors he has dedicated himself to mastery and has gained deep insights both from his eclectic interests, entrepreneurial spirit, and experience that spans the full stack, the entire project lifecycle, and several technologies. His background and breadth of skills has yielded many unique insights that he will share with you. His time is equally divided between performing around the world, jumping out of perfectly good airplanes, and building software that doesn't suck.
- HOLIDAY PARTY 2018 (12/5) @ Nerdery!
REGISTER AT ==> https://gotochgo.com/2019/pages/holidayparty REGISTER AT ==> https://gotochgo.com/2019/pages/holidayparty REGISTER AT ==> https://gotochgo.com/2019/pages/holidayparty REGISTER AT ==> https://gotochgo.com/2019/pages/holidayparty REGISTER AT ==> https://gotochgo.com/2019/pages/holidayparty
- “Mastering Web Security” for Developers --> Moved to Nov 15th
Abstract: “Mastering Web Security” for Developers This is a small slice of a larger enterprise training offering. The goal of which is to introduce key concepts to web developers so they can become contributors and recognize security weakness in enterprise applications. We’ll start by reacquainting the attendee with internet network protocols, and quickly move on to hot web application security concepts such as OAuth, tokens and JWT focusing on examples and implementation details within Spring Boot. Bio: Glenn Drong has been a software development professional and hobbyist in the Chicago-land area for over 25 years. He sits on the IJUG (Illinois Java Users Group) board and as the community leader provides a voice to the community as a conference track adviser. He has a passion for mentoring and teaching development concepts, which is now directed to build vibrant well-rounded teams within the realm of extreme programming.
- Java: Get ready for an exciting but stormy 2019
Title: Java: Get ready for an exciting but stormy 2019 The Java world is in the midst of tectonic shift. With dramatic changes to the pace of feature introduction, release lifecycles, compatibility policies, security update policies, and the required pace of adoption in production all happening at the same time, the world ahead will look nothing like what you may have gotten used to. In the short talk, Gil Tene (CTO, Azul Systems) will provide a quick overview of what developers and operational people need to know if Java is part of their world. Title: Java at Speed: Get the Most out of Modern Hardware Getting the most of your Java applications can be an interesting challenge. Understanding some of the optimizations the latest crop of JVMs are able to apply when running on the latest servers may help with that. This talk will discuss some of those features and optimizations. Along with discussing some JIT compiler capabilities, we will take a look at the evolution of Intel-based server platforms, quickly traversing through features that were introduced over the past few years. We will demonstrate some examples of JVM JITs using these capabilities where available, as they adapt the code they generate to the specific processors they run on. Speaker: Gil Tene is CTO and co-founder of Azul Systems. He has been involved with virtual machine and runtime technologies for the past 25 years. His pet focus areas include system responsiveness and latency behavior. Gil is a frequent speaker at technology conferences worldwide, and an official JavaOne Rock Star. He pioneered the Continuously Concurrent Compacting Collector (C4) that powers Azul's continuously reactive Java platforms. In past lives, he also designed and built operating systems, network switches, firewalls, and laser based mosquito interception systems.
- 10/10 Networking Event - Meet n Greet Peers/Employers
10/10 Could be a Meetup that changes your life. Good networking helps you meet people who have solutions to problems you might encounter, meet people who can provide you a inside track to a companies hiring process, and meet people who are helpful mentors and friends in new technologies. iJUG wants to help you and Chicago grow, and that means helping you connect with peers, friends, employers, and learn about opportunities and technologies. Networking also lets you get inside knowledge on what opportunities exist and at what rates. So come out and kick back some drink n food and meet your peers and employers. Everyone is invited to our first networking party (techies, wanna-be-techies, coders, recruiters, managers, and anyone else) .