JavaOne 2014 USA concluded October 2, 2014 in San Francisco, California. The war on security is sometimes takes it toll on all of us. This year, whenever I feel depressed I pull out my Nerf Duke, give him a squeeze, and reflect upon what we all did at JavaOne 2014. The JavaOne security track was, hands down, amazeballs!
“JavaOne is the first developer conference to dedicate an entire track to security.” Frank Kim SANS Institute
During the Call for Proposals (CFP) the submissions for the security track stalled until the very last week. I was really wondering if I would have to give up on the security track. Teammates told me not to worry since it’s normal for submissions to come in late. The idea of throwing in the towel on the security track was depressing. According to Frank Kim of SANS Institute, “JavaOne is the first developer conference to dedicate an entire track to security”. The last week of the CFP more than three quarters of the submissions for the security track rolled in. The moral of the story? Unless you want this track leader to have a heart attack get your submissions in early ;o)
|Photo: JavaOne 2014 keynote|
|Photo: Oracle Customer Appreciation Event|
This year security was highlighted early at JavaOne. In fact, security made it to the JavaOne keynote presentation provided by Georges Saab (Twitter: @gsaab). In his slides (photo on right) Georges is noting facts about the security track at JavaOne. In particular, my security track opening presentation and the new web appsec book I finished with Manico (Twitter: @manicode) and Detlefsen (Twitter: @codemagi). A little birdie told me, Georges was surprised how many comments and retweets he received on all this security stuff, lol. Well it’s because me, all my friends, and many others live, breath, and eat security day and night. A slide or two on security at a developer keynote is a huge positive and just the right level of attention on web application security. Sorry we Tweet slammed you Georges but much appreciated!
On Wednesday Oracle held the Customer Appreciation Event. How was it? Fan-freaking-tastic, is the word that comes immediately to mind. Employees are not generally invited to customer event. I received two tickets in a odd quirk of fate. A quick call to my wife and she arrived a few hours later and we were off to see the event.
|Photo: book signing event at Oracle book store|
The appreciation event was incredible. Aerosmith was great. I checked Wikipedia and it reported Steve Tyler’s age as 66. Phew, I hope I could perform at such levels at age 66. Likewise, Macklemore was great. I recognized a few of their songs and enjoyed their music.
The appreciation event left me with about 3hrs of sleep and there was lots happening on Thursday. I had to arrive at the conference early, lots to do. No sleeping in for me. I downed a Starbucks Venti Pike Place, a Red Bull, and another Starbucks coffee when I arrived at the hotel. I would do it all over again the event was great.
|Photo: NEC biometrics at Open World|
This month was the release of our new web application security book Iron-Clad Java. The Iron-Clad Java team, Manico, Detlefsen, and Me, had a book signing over at the Moscone center. Unfortunately, it was a bit of a bust for book signing. The book signing was scheduled in the wrong venue at Oracle Open World. We signed a few books but honestly everyone who would like our book was attending JavaOne, two blocks away. Oracle reminds me of my Marine Corps days, requisition 1000 roles of toilet paper and receive 1000 lightbulbs. As long as you receive 1000 of something delivered on time then the Logistics organization never cared. I wanted to rest on the couches and chat with friends anyway.
While over in the Open World vicinity, I later headed to the vendor floor to visit my friend Beau Broker at NEC. Beau showed me some pretty interesting facial recognition software by his company. In the photo (on left) you can see how it recognizes Beau’s face after he’s registered with the system. It’s pretty interesting technology. It’s also available on mobile and tablet devices. The technology is multi-purpose and may be used to unlock a desktop or recognize unauthorized individuals in a crowd.