Pipelines are an important part of the Jenkins ecosystem for CI/CD, and one important iteration of the pipeline concept is called the declarative pipeline. SD Times, in partnership with CloudBees, recently hosted a webinar called “Modernize Your Pipelines with Best Practices Built-In,” to talk about the benefits of these. But to understand why CloudBees, which … continue reading
Amazon announced it is open sourcing the Cloudscape Design System, which is a solution for building web applications. Cloudscape consists of a set of guidelines to create web applications, along with the design resources and front-end components to streamline implementation. AWS created it in 2016 to improve the user experience across AWS web applications and … continue reading
As many organizations are bolstering up their security measures, hackers have shifted their focus to smaller and more concentrated attacks, according to Daniel Fonseca, senior solutions engineer at Kiuwan in the webinar “Preventing common vulnerabilities with Kiuwan’s SAST, SCA, and QA tools.” The National Vulnerability Database (NVD) said there were over 20,000 security vulnerabilities CVE … continue reading
The team at Microsoft recently announced that the Windows Community Toolkit Labs is now the primary way that the company will be developing new features for Windows Community Toolkit. It is intended to act as a safe space for collaboration and engineering solutions from the prototyping stage all the way through polished and finalized component. … continue reading
Over a decade ago, Internet and tech entrepreneur Marc Andreesen penned a prescient article for The Wall Street Journal, Why Software is Eating the World. His thesis, that software allowed for vast cost reductions in businesses, and enabled the complete disruption of once-staid markets, has been proven many times over. But while Mr. Andreesen’s observation … continue reading
Feedback is routinely requested and occasionally considered. Using feedback and doing something with it is nowhere near as routine, unfortunately. Perhaps this has been due to a lack of a practical application based on a focused understanding of feedback loops, and how to leverage them. We’ll look at Feedback Loops, the purposeful design of a … continue reading
Amazon is hosting its Alexa Live 2022 conference for developers building skills, which are sort of like applications, for Alexa-powered smart home devices. According to Amazon, there are hundreds of millions of Alexa-enabled devices in use, and building skills for Alexa provides developers with a good opportunity to engage with those customers in new ways. … continue reading
CompTIA and ConnectWise launched a new training program to expand the nation’s cybersecurity and technology workforce through paid apprenticeships. The collaboration was announced following the recent Cyber Workforce and Education Summit at the White House where the Cybersecurity Apprenticeship Sprint challenged IT leaders to expand Registered Apprenticeships in cybersecurity. “We focus so much on top … continue reading
The productivity tools company, JetBrains, recently announced that its complete platform for software development, Space, is now available on-premises in beta. This offering comes with Docker Compose and Kubernetes installation options. Space brings users an all-in-one platform that covers Git hosting, code review, CI/CD, package repositories, issue tracking, documents, and chats. On top of this, … continue reading
Organizations realize the importance of test automation but many struggle to make a move to automation on mobile. The inception of mobile testing wasn’t as user-friendly for developers when compared to web testing, for example, and the difficulties still last today, according to Kobiton’s DevOps evangelist Shannon Lee, in the SD Times Live! webinar, “Creating … continue reading
The World Wide Web Consortium (W3C) announced that Decentralized Identifiers (DIDs) v1.0 is now an official web standard. The new type of verifiable identifier doesn’t require a centralized registry and it will enable individuals and organizations to take better control of their online information while providing greater security and privacy, according to W3C. Users will … continue reading
In an attempt to meet companies where they are in their transition to passwordless, Stytch introduced a new password-based authentication solution “rebooted for the modern era.” The idea behind the solution is to create a way for companies to ease into passwordless by not quitting passwords cold turkey since a full 85% of IT and … continue reading