5 Reasons Why Technologists are Optimistic About Full-Stack Observability

The world has become more app-centric, increasing the demand for always-on, seamless, and secure digital experiences. As a result, organizations in all sectors ramped up their efforts to achieve full-stack observability to bring together disconnected tools and generate unified visibility across their IT environment.

A recent report from Cisco AppDynamics, "The Journey to Observability," reveals the transition to full-stack observability is now a priority for 90% of organizations around the world.

Making Old Java Work

With Burningwave Tools, it is possible to perform dependency shrinking and also make applications created with old Java versions work on Java 9 and later versions. To adapt applications to Java 9 and later, you must create an application adapater and run it with JDK 9 or later. In this application adapter you must load, by using PathHelper, the JDK libraries the target application was developed with and pass to the method captureAndStore of the TwoPassCapturer component, as the first parameter, the name of the class of your application that contains the main method. In the example below, we're adapting a Java 8 Spring Boot application to Java 9 or later. 

Java
 




xxxxxxxxxx
1
24


1
ComponentSupplier componentSupplier = ComponentContainer.getInstance();
2
PathHelper pathHelper = componentSupplier.getPathHelper();
3
Collection<String> paths = pathHelper.getAllMainClassPaths();
4

          
5
if (JVMInfo.getVersion() > 8) {
6
    paths.addAll(pathHelper.getPaths("dependencies-capturer.additional-resources-path"));
7
}
8

          
9
List<String> _paths = new ArrayList<>(paths);
10
Collections.sort(_paths);
11

          
12
Result result = TwoPassCapturer.getInstance().captureAndStore(
13
    //Here you indicate the main class of your application
14
    "com.springbootappadapter.SpringBootWebApplication",
15
    args,
16
    paths,
17
    //Here you indicate the destination path where extracted
18
    //classes and resources will be stored  
19
    System.getProperty("user.home") + "/Desktop/dependencies",
20
    true,
21
    //Here you indicate the waiting time after the main of your
22
    //application has been executed. This is useful, for example, 
23
    //for spring boot applications to make it possible, once started,
24
    //to run rest methods to continue extracting the dependencies
25
    0L
26
);
27
result.waitForTaskEnding();



Are You Prepared to Handle Security Breaches for Web Applications?

Take security threats where they belong

Chances are, while you’re reading this, there are frantic boardroom meetings happening in some parts of the world. Imagine CxO’s shivering to their bones, urging their IT security teams to "do something" about the web application security breach they’ve been hit by. That’s how web application security breaches are.

You may also like Why Framework Choice Matters in Web Application Security.

What do the numbers say?