Sweet 6.0

Gradle 6.0 brings Java 13 support, better dependency management & much more

It’s not even been a year since Gradle 5.1 arrived in January, and yet here we are staring down the next major release: Gradle 6.0. This latest release of the build-automation software brings much improved features for dependency management, faster incremental compilation for Java and Groovy, support for Java 13, as well as out of the box support for javadoc and source jars. And that’s not all, so let’s take a closer look!

Watch Henrik Stene's JAX DevOps session

Deploy code changes to production with confidence using Consumer Driven Contracts

Consumer Driven Contracts is a testing paradigm that let API-consumers communicate to the API-providers how they are using their services. This talk discusses software testing, how and when to use Consumer Driven Contracts, and how Consumer Driven Contracts can make developers more confident. It also includes live coding to show how to implement Consumer Driven Contracts using the Pact framework.

Spinning order out of chaos

Is chaos engineering the key to lockdown cybersecurity?

The practice of chaos engineering can help unearth security problems that ordinarily, you would never discover. By utilizing chaos engineering best practices, your teams can keep up with how a potential hacker might infiltrate your network and gain a better understanding of the weaknesses in your infrastructure and what security measures to take.

October release of VS Code is here

VS Code 1.40 closes 4,600 GitHub issues and adds new features

Visual Studio Code’s October update has arrived with new features. The source code editor now offers TypeScript 3.7 support, an activity bar indicator for the workbench, and more. The VS Code team also did some November “spring cleaning” and took care of thousands of GitHub issues.

Stay up to date with JDK 14 news

Java 14: Seventh JEP proposed to target JDK 14

Java 14, the third version since the last LTS release, is in development. Java 12 and Java 13 each came with a manageable number of new features; a system that, for Java 14, will probably not change. This is of course due to the new release cadence. Nevertheless, there are now 10 JEPs that are likely to be implemented for JDK 14 and the planning phase is not yet complete. What’s new is that a seventh JEP has now been proposed to target JDK 14: JEP 366.

Something something Windows garbage

JEP 365: ZGC on Windows

The Z Garbage Collector or ZGC is a scalable low latency garbage collector that’s included in the JDK. Until now, it has not been compatible with Windows, but JEP 365 wants to change that. Let’s take a closer look at the future of Java.

All wrapped up in Clojure

Solving JavaFX’s CSS problems with cljfx css

We like to browse GitHub and occasionally shed some light on interesting or useful open source repositories. Today we are taking a closer look at a few projects written in Clojure: clfx and cljfx css. Cljfx css is “charmingly simple styling” for cljfx. What’s under the hood of this styling library for JavaFX? Find out how it simplifies CSS for JavaFX and what requirements you need to run it.

Await no more!

Rust 1.39.0 stable update adds async-await

The latest version of Rust is now available and introduces a big change for the language. 1.39.0 adds async-await. This feature moves out of beta and is now stable. The use of asynchronous code allows users to run multiple tasks concurrently on the same OS thread. See what other changes are now available to Rust, Cargo, and Clippy.

Watch Helen Beal's DevOpsCon session

DevOps Culture: the Neuroscience of Behavior

We acknowledge that we can’t change culture, but we can change behavior. Culture is the sum of values and behavior. But what makes humans behave the way we do and how can we influence behavior and model it the way we want to? Culture is such a large part of DevOps and is essential in understanding how to implement DevOps strategies.

Is your IoT fish tank secure?

Are there any real security threats to sensor-generated data?

IoT devices can be a weak leak and expose data to hackers. Businesses should be aware of the risks that can occur if attackers get their hands on data, and keep up with security updates and testing. How can hackers compromise sensor-generated data, and what are the best practices for IoT device security?