Migrating SpringBoot PetClinic REST to Quarkus

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

In this post, I’m going to cover my experience migrating the Spring Boot PetClinic REST application to Quarkus, to check how hard it can be and also to see which are the metrics I obtain at the end.
This is only an experiment with an application with low complexity but touching several common libraries and concepts used by anyone that creates a Spring Boot application.

X ITM Cloud News

Sofia .

Leave a Reply

Next Post

Improved malware protection for users in the Advanced Protection Program

Wed Sep 16 , 2020
<div><span class="byline-author">Posted by Daniel Rubery, Software Engineer, Chrome, Ryan Rasti, Software Engineer, Safe Browsing, and Eric Mill, Product Manager, Chrome Security</span><div><br></div><div><span id="docs-internal-guid-b578bb4d-7fff-c907-a838-e1d9ecb20218"><p dir="ltr" style="line-height: 1.38;margin-bottom: 0pt;margin-top: 0pt"><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline">Google’s </span><a href="https://landing.google.com/advancedprotection/"><span style="color: #1155cc;font-family: Arial;font-size: 11pt;vertical-align: baseline">Advanced Protection Program</span></a><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline"> helps secure people at higher risk of targeted online attacks, like journalists, political organizations, and activists, with a set of constantly evolving safeguards that reflect today’s threat landscape. Chrome is always exploring new options to help all of our users better protect themselves against common online threats like malware. As a first step, today Chrome is expanding its download scanning options for users of Advanced Protection.</span></p><br><p dir="ltr" style="line-height: 1.38;margin-bottom: 0pt;margin-top: 0pt"><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline">Advanced Protection users are already well-protected from phishing. As a result, we’ve seen that attackers target these users through other means, such as leading them to download malware. In August 2019, Chrome </span><a href="https://blog.google/technology/safety-security/advanced-protection-program-expands-chrome/"><span style="color: #1155cc;font-family: Arial;font-size: 11pt;vertical-align: baseline">began warning Advanced Protection users when a downloaded file may be malicious</span></a><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline">.</span></p><br><p dir="ltr" style="line-height: 1.38;margin-bottom: 0pt;margin-top: 0pt"><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline">Now, in addition to this warning, Chrome is giving Advanced Protection users the ability to send risky files to be scanned by Google Safe Browsing’s full suite of malware detection technology before opening the file. We expect these cloud-hosted scans to significantly improve our ability to detect when these files are malicious. </span></p><p dir="ltr" style="line-height: 1.38;margin-bottom: 0pt;margin-top: 0pt"><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline">  </span></p><p dir="ltr" style="line-height: 1.38;margin-bottom: 0pt;margin-top: 0pt"><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline">When a user downloads a file, Safe Browsing will perform a quick check using metadata, such as hashes of the file, to evaluate whether it appears potentially suspicious. For any downloads that Safe Browsing deems risky, but not clearly unsafe, the user will be presented with a warning and the ability to send the file to be scanned. If the user chooses to send the file, Chrome will upload it to Google Safe Browsing, which will scan it using its static and dynamic analysis techniques in real time. After a short wait, if Safe Browsing determines the file is unsafe, Chrome will warn the user. As always, users can bypass the warning and open the file without scanning, if they are confident the file is safe. Safe Browsing deletes uploaded files a short time after scanning.</span></p><br><p dir="ltr" style="line-height: 1.38;margin-bottom: 0pt;margin-top: 0pt"><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline"><span style="border: 1pt solid #d9d9d9;height: 77px;overflow: hidden;width: 618px"><img alt="unknown.exe may be dangerous. Send to Google Advanced Protection for scanning?" src="https://lh3.googleusercontent.com/XuLgBaeTsYdebvfPX71EqHtTabY6F_1WFNC3QUcdFB8_9tJDXgx_z88SBPH0D2P0CW93HQx8vmXFEUURuva3lVBpmdfKfONkblu5m9MOobDHC6glDAZ8WmS5B44senP9g8jxScjbsg=s16000" style="margin-left: 0px;margin-top: -5.476461396179482px" title="unknown.exe may be dangerous. Send to Google Advanced Protection for scanning?"></span></span></p><p dir="ltr" style="line-height: 1.38;margin-bottom: 0pt;margin-top: 0pt"><br></p><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline">Online threats are constantly changing, and it's important that users’ security protections automatically evolve as well. With the US election fast approaching, for example, Advanced Protection could be useful to members of political campaigns whose accounts are now more likely to be targeted. If you’re a user at high-risk of attack, visit </span><a href="https://g.co/advancedprotection"><span style="color: #1155cc;font-family: Arial;font-size: 11pt;vertical-align: baseline">g.co/advancedprotection</span></a><span style="font-family: Arial;font-size: 11pt;vertical-align: baseline"> to enroll in the Advanced Protection Program.</span></span></div><div class="feedflare"> <a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=carv-yR3GvE:Zxt1-RJ-Zk8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"></a> <a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=carv-yR3GvE:Zxt1-RJ-Zk8:V_sGLiPBpWU"><img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=carv-yR3GvE:Zxt1-RJ-Zk8:V_sGLiPBpWU" border="0"></a> </div><img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/carv-yR3GvE" height="1" width="1" alt=""></div>
X- ITM

Cloud Computing – Consultancy – Development – Hosting – APIs – Legacy Systems

X-ITM Technology helps our customers across the entire enterprise technology stack with differentiated industry solutions. We modernize IT, optimize data architectures, and make everything secure, scalable and orchestrated across public, private and hybrid clouds.

This image has an empty alt attribute; its file name is x-itmdc.jpg

The enterprise technology stack includes ITO; Cloud and Security Services; Applications and Industry IP; Data, Analytics and Engineering Services; and Advisory.

Watch an animation of  X-ITM‘s Enterprise Technology Stack

We combine years of experience running mission-critical systems with the latest digital innovations to deliver better business outcomes and new levels of performance, competitiveness and experiences for our customers and their stakeholders.

X-ITM invests in three key drivers of growth: People, Customers and Operational Execution.

The company’s global scale, talent and innovation platforms serve 6,000 private and public-sector clients in 70 countries.

X-ITM’s extensive partner network helps drive collaboration and leverage technology independence. The company has established more than 200 industry-leading global Partner Network relationships, including 15 strategic partners: Amazon Web Services, AT&T, Dell Technologies, Google Cloud, HCL, HP, HPE, IBM, Micro Focus, Microsoft, Oracle, PwC, SAP, ServiceNow and VMware

.

Cloud Services Live Updates Contact Us




X ITM