Adobe ColFusion Summit East 2024 banner

Adobe ColdFusion Summit East 2024

Agencies are constantly looking for new ways to improve their web content and process flows. With Adobe ColdFusion, organizations are able to stay ahead of the curve with the latest trends in the web development ecosystem. Check out the presentation resources from the Adobe ColdFusion Summit East 2024 to learn how you can leverage Adobe ColdFusion to create engaging web content and improve your application framework.

Seminar 1: Migrating Adobe ColdFusion Admin Settings Between Versions Safely

When moving from one Adobe ColdFusion version to another (or even just the same version from one machine to another), someone will face the need to "bring along" the CF Admin settings: data sources, scheduled tasks, mappings, and so on. How can that be done quickly and safely? (You should not just "copy over the neo xml files", nor do you need to just "open two tabs/screens and start copy/pasting between them".) Did you know there are a few different ways to migrate admin settings safely-one of which is new since CF2021? Explore these options, some old and some new, some built into CF and some freely available.

Seminar 2: Golden Standards for ColdFusion: Preparing Your Environment for Success

Preparing your Adobe ColdFusion server environment for production workloads. Learn about ColdFusion server tuning best practices, ColdFusion JDK Updates, and ColdFusion Update(s) that will help with preventing unexpected bottlenecks or hangs post-deployment.

Seminar 3: Powerful Graphics Format – Taking Your PDF Workloads to the Next Level

Discover the incredibly powerful new features introduced in Adobe ColdFusion 2023's updated PDF 2.0 engine, explore how to use DDX to alter, manipulate and enhance your PDFs, and much more.

Seminar 4: Customizing the Web Platform with Web Components

You've been hearing that web components are the next big thing for at least a decade, but, over the past couple years, web components have really hit their stride, with new tooling and frameworks that are making them an indispensable tool for web development.

Discover what you need to know to begin extending the web with web components. Learn the what, why, and how of creating and using web components, including the history of the various technologies behind components, how to start building them now, and digging into plenty of examples.

Seminar 5: Optimizing Adobe ColdFusion with FusionReactor APM: Unlocking Superior Performance and Reliability for your Applications

Delve into the transformative capabilities of FusionReactor APM. In a time when everyone demands the utmost in performance, and reliability, FusionReactor stands out as the premier monitoring tool designed to meet these critical needs. Learn about the advanced features and benefits of FusionReactor APM and read a compelling case study of its successful deployment within a government setting. Expect a deep dive into real-time insights, troubleshooting techniques, and strategic optimizations - ensuring your ColdFusion applications run at peak performance.

Seminar 6: Preparing your Adobe ColdFusion 2023 for DISA STIG Compliance Requirements

A new STIG for Adobe ColdFusion 2023 is in progress! STIG (Security Technical Information Guides) are security standards for the DOD that are issued and maintained by DISA.

Just as the Federal Government looks to NIST (National Institute for Standards and Technology) for guidance and civilian agencies looks to FISMA, the Department of Defense (DOD) have yet another layer of requirements promulgated by the Defense Information Systems Agency (DISA). These Security Technical Information Guides (STIGs) are the configuration standards for DOD Information Assurance, or IA-enabled devices/systems. The STIGs contain technical guidance to 'lock down' information systems/software that might otherwise be vulnerable to a malicious computer attack.

Discover some of the Adobe ColdFusion 2023 settings that are key to STIG and learn how they help to secure and make your servers more resilient to cyber-attacks.

In this session, we will dig into a sample of the settings within the ColdFusion Administrator, Tomcat, and the operating system that help with DOS prevention, securing your data in transit, and general security best practices.

Seminar 7: BattleField ORM: Tips, Tactics and Strategies for Conquering your Database

Learn about ORM session management, ORM settings, caching strategies, virtual service layers, dynamic finders, dynamic counters, and an enhanced Hibernate Criteria builder for ColdFusion to create easy and programmatic HQL queries.

Seminar 8: MVC With And Without a Framework

So you've looked at CF Components, and kind of understand the basics of how they work. Everyone says "frameworks are the way to go", but there's still a big knowledge gap between those two points. As each framework has its own terminology, how do you know where verbiage for one begins and the other one ends? Is "Controller" a ColdBox specific thing? What about a "Service Layer" or a "View"? There's very little documentation available about the "Model-View-Controller" pattern for ColdFusion that is not specific to a framework, and that's often what causes the confusion for people newer to OO development.

Learn about a basic application that's built using the Model-View-Controller design pattern, but does not use any specific framework to get there.

Seminar 9: Leverage CI to Improve Code Security and Quality

Learn how to leverage Continuous Integration (CI) to boost the quality of code delivered, as well as improve the security of their applications. We'll discuss how CI works, and more importantly how you can get started using it in your workflow.

Seminar 10: Securing Cloud Infrastructure: Core Concepts

Discover a comprehensive overview of the fundamental principles involved in securing cloud infrastructure, covering various options across Azure, AWS, and GCP. It's important to recognize that there is no one-size-fits-all security solution and understanding these underlying principles is crucial for identifying a security strategy that best suits your needs.

To view the presentation resources from this event, fill out the form on the right.

Back to Top