premium How training to run a marathon is like bringing a marathon project to the finish line

Anyone who has run a full marathon knows about “the wall,” also known as the point where runners feel like they can’t go any further. This happens when runners hit the 20-mile mark which for many is the most challenging part of the race––their bodies send signals like muscle cramps and fatigue as a cry …

Esper announces new funding for its Android IoT DevOps platform

Android device and deployment application management company Esper announced a $7.6 million Series A funding round. According to the company, the funding will help it provide a full stack development and management platform for Android edge devices.  Esper explained that the overall edge market is growing 26% annually with more than 7 million developers worldwide …

SD Times news digest: Google acquires Looker, GitHub CLI now in beta, and Ionic 5 released

Google completed the acquisition of Looker, which will offer customers an analytics solution that integrates and visualizes insights at every layer of business.  As more organizations adopt a multi-cloud strategy, Looker customers and partners can expect continued support of all cloud data management systems like Amazon Redshift, Azure SQL, Snowflake, Oracle, Microsoft SQL Server and …

SD Times Open-Source Project of the Week: OWASP SAMM

The Open Web Application Security Project (OWASP) has announced version 2 of the Software Assurance Maturity Model (SAMM). SAMM is an open-source framework that enables teams and developers to assess, formulate and implement better security strategies that can be integrated into the software development life cycle.  “Our mission is to provide an effective and measurable …

Latest News

VCs move their focus from consumer tech to enterprise technology

Forget cool technologies, like wearables or smart home devices. Enterprise technology is all the rage, at least in the mind of venture capital (VC) firms. According to data recently released by Bloomberg, in 2019, for the first time in five years, VCs spent more money on enterprise technology companies than on consumer technology companies.  Funding …

SD Times news digest: Magic Leap developer access program, WhiteSource extends its open-source security tool, and OutSystems app dev research

Magic Leap announced Access Hardware, a new program to get Magic Leap devices into the hands of developers, and the two-day LEAP Developer Days dedicated to developers.  “Access is the staple of our programs as a whole – it’s how we help empower developers with resources they need, no matter where they are in their …

premium Why behavior-driven development is hurting your test automation efforts

There’s a lot to like about behavior-driven development (BDD). When applied in the right way, BDD can narrow communication gaps, inject real-world examples into strategic discussions, and foster a better understanding of the customer. It can help eliminate the many wasteful activities that often hinder software development, such as rework caused by misunderstood or vague …

Synopsys helps developers analyze open-source and proprietary code simultaneously

Synopsys announced that it will release a major update to the Polaris Software Integrity Platform to extend its static application security testing (SAST) and software composition analysis (SCA) capabilities through the native integration of the Code Sight plugin. The new update will allow developers to find and fix security weaknesses in both proprietary code and …

SD Times news digest: Swift Playgrounds comes to Mac, Microsoft dual-screen experiences, and DevTool improvements in Firefox 73

Swift Playgrounds is an app for Mac and iPad that uses interactive puzzles and challenges to help users learn the basics of coding. Users will use Swift, the programming language created by Apple that is used to build many of today’s most popular apps, according to Apple. “Swift Playgrounds requires no coding knowledge, so it’s …

Computer scientists tackle performance regressions with new tool

Researchers from Texas A&M University have teamed up with computer scientists from Intel Labs to create a tool that will help identify the source of software bugs. According to the researchers, software updates are supposed to make applications run faster, but sometimes they end up doing the opposite. Bugs known as performance regressions pop up …

2020 Software Supply Chain Must-Knows

Open source software is taking the world of software development into new frontiers and changing the way industries create and consume software. However, there is a learning curve with open source use and businesses need to not only be able to trust the open source software being used in their solutions, but they need to …

Report: COBOL at the center of modernization strategies

Across the industry, companies are looking to modernize, and according to a new survey from Micro Focus, the programming language COBOL is at the center of this modernization.  According to 70% of the COBOL survey’s respondents, modernizing COBOL applications is favored over replacing or retiring them. This is due to the fact that COBOL provides …

SD Times news digest: Applause’s Accessibility Tool, Instana’s continuous production profiler for Java apps, and Apache Groovy 3.0

Applause has released a new tool to find and fix key issues in development. The Applause Accessibility Tool automatically detects and addresses accessibility issues earlier in the SDLC.  The tool integrates into the web development process and provides automated fixes or recommendations to resolve each issue. While the tool can help identify and fix common …

‘Security debt’ focus of 2019 State of Software Security report

In 2011, Marc Andreessen wrote an article in the Wall Street Journal that included the now-famous phrase “software is eating the world.” Eight years on, that statement rings truer than ever. It’s not a stretch to say that software is eating the cybersecurity world as well. The fallout from not integrating security early in the …

Learning Center

  • Webinars

    A Pragmatic View of DevOps in Large Enterprises

    Live Event: Tuesday, March 10 | 1PM EST | 10AM PST Join SD Times and Micro Focus as we deflate the hype around DevOps and provide a no-nonsense, real-world view of how your organization can gain operational efficiencies and deliver value to your customers. …

  • White Papers

    Value Stream Management: The key to balancing what your customers want with the software you are providing

    For many CIOs, the realization that they can’t visualize how value flows across the software delivery process is a “eureka!” moment. Abandoning a hit and hope mentality, CIOs are taking a sledgehammer to the black box that conceals the mechanics of how software is planned, built and delivered at scale. Once inside, they’re analyzing how …

  • White Papers

    The 10th Annual State of Software Security Report

    The core problem with software security today is not that far removed from the problem Veracode was trying to solve 10 years ago. In State of Software Security v1, the company concluded that “Most software is indeed very insecure.” We could use that same statement in Volume 10. However, it is seeing some positive AppSec …

  • White Papers

    Chaos Engineering: Finding Outages Before They Become Failures

    How can organizations cut the risk of downtime? The answer: break your systems on purpose. Find out their weaknesses and fix them before they break when least expected. It’s called chaos engineering, and it’s being adopted by leading financial institutions, internet companies, and manufacturing firms throughout the world. …

  • Webinars

    The Complete Guide to Observability

    Wednesday, February 19 | 1PM EST | 10AM PST Easy-to-understand monoliths are giving way to distributed systems: microservices, serverless, meshes, proxies, and every possible combination. These systems offer developers the freedom to build new features and technology faster, as they are no longer beholden to the elaborate release processes associated with monolithic architecture. …

  • Webinars

    Attack Simulation: Deconstructing an Attack in a Containerized Application

    Thursday, February 20 | 1PM EST | 10AM PST You’ve been hacked. A developer leveraged a 3rd party library with unsanitized input that a SCA tool can’t flag. This containerized application goes into production – making your entire cloud infrastructure vulnerable to severe security incidents. Does this sound familiar? …

SD Times Newswire

HTML Snippets Powered By : XYZScripts.com

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!