In-Depth

Transitioning from DevOps to Rugged DevOps: Avoiding the pitfalls

As many as four out of five companies leveraging a DevOps approach to software engineering do so without integrating the necessary information security controls, underscoring the urgency with which companies should be evaluating “Rugged” DevOps (also known as “shift left”) to build security into their development life cycle as early as possible. Rugged DevOps represents … continue reading

In-memory technology: Serving up application data to users on the go

Data can be viewed to be as valuable in the digital business world as oil is to the economy. Oil fuels homes, cars, railroads, and even electricity. Data powers the business and revenue. Businesses that want to continue to evolve, transform and improve need are being fueled by their data to tell them where and … continue reading

premium W3C: XML is everywhere

As the World Wide Web Consortium (W3C) winds down its work standardizing the Extensible Markup Language (XML), it is looking back at the history that brought XML to its success today. “W3C XML, the Extensible Markup Language, is one of the world’s most widely-used formats for representing and exchanging information. The final XML stack is … continue reading

premium How security is playing catch-up to the Internet of Things

Smart homes. Smart cities. Smart factories. Intelligent cloud. Intelligent edge. While many still believe the Internet of Things has a way to go before we see widespread adoption, there is no questioning that it is here today. Some things are prototypes upon which larger deployments can be built, and some are already in wide use, … continue reading

More In-Depth

5 ways static code analysis can save you

If you’re not doing static code analysis (aka static analysis), now is the time to start. Delivering code faster has dubious value if the quality degrades as development cycles shrink. On the other hand, if you’re not doing static code analysis, you’re not alone. Despite the mature age of the tool category, not a lot … continue reading

The reality of augmented reality

While the first thing that might come to mind when picturing the near-future applications of augmented reality are snazzier Snapchat filters, for major players in AR development, it has serious potential in business environments, with a definite roadmap, and the use cases have already been illustrated. Hardware manufacturer Stanley Black & Decker, for instance, has … continue reading

Open source at 20: The ubiquity of shared code

“Why is open source important? That’s like asking why is gravity important,” stated Brian Behlendorf, a leading figure in the open-source software movement, and executive director for the blockchain consortium Hyperledger. While this year marks the 20th anniversary of open source, it is hard to imagine a time before open-source software. Today, it’s difficult to … continue reading

Talking Azure migration with Microsoft’s Corey Sanders

Microsoft has divided the process of moving on-premises workloads and applications to the cloud into three key steps: Assess, migrate and optimize. Once the assessment of existing infrastructure, applications and dependencies is complete, there are four general options for undergoing an application migration to Azure. Those are: re-hosting or lift and shift, refactoring with containers, … continue reading

Migrating to Microsoft Azure

One of the first things cloud architect Bill Zack did after moving from Connecticut to Nashville in 2013 was to form a Microsoft Azure User Group. Launched with just four initial members, the Nashville Azure User Group has a membership well above 800 and growing. “It’s been exploding,” Zack says of the user group in … continue reading

Artificial intelligence: Do it your way

Practical adoption of artificial intelligence (AI) is driven by an exclusive club of companies. A report from McKinsey Global Institute, published in June 2017, ascertained that investment in AI is dominated by digital giants such as Google and Baidu. On the other hand, the vast majority of firms have not taken any practical steps at … continue reading

Using hybrid mobile to your advantage

It is no longer a question of “should I build a mobile app?” Digital businesses have begun to realize mobile app development is necessary to not only stay competitive, but to achieve customer satisfaction. Customers are accessing information on a huge variety of devices, and have come to expect a high-quality, mobile-friendly user experience. “Consumers, … continue reading

Fewer bugs, faster releases: How APM improves the SDLC

Breaking down a series of interdependent movements into discrete actions is often the first step to improving the performance of everything from professional orchestras to sports teams. And so it is with software. The Software Development Life Cycle (SDLC) evolved out of an effort in the late 1960s to put formal quality processes in place … continue reading

Web Accessibility: The effort at Capital One Bank

Web and mobile development focuses on technological inclusiveness, such as across operating systems, browsers and devices. Yet, as organizations become even more digital over time, human accessibility still isn’t getting the attention it should because there’s a general lack of awareness about the issue and how best to address it. Capital One began its journey … continue reading

Efforts to standardize tracing through OpenTracing

Industry efforts toward distributed tracing have been evolving for decades, and one of the latest initiatives in this arena is OpenTracing, an open distributed standard for apps and OSS packages. APMs like LightStep and Datadog are eagerly pushing forward the emerging specification, as are customer organizations like HomeAway, PayPal and Pinterest, while some other industry … continue reading

For development managers, the question is: How close to the code should you be?

No two managers are alike. Styles differ, their approaches to their roles differ, and face it – their levels of energy differ. But how important is it for managers overseeing software development to get down in the weeds with their teams, or should they remain above the fray, enforcing coding practices and setting policies? We … continue reading

Has DevSecOps succeeded in what it was created to accomplish?

At this point, the concept of DevOps should be familiar to everyone. But with the rise of cybersecurity attacks, organizations have seen the need to incorporate security into the mix. Thus, the idea of DevSecOps. Though the concept and practices were created with the best intentions, the number of cybersecurity attacks continues to rise, which … continue reading

Release automation: All about the pipeline

To many, release automation is that last stage of the DevOps pipeline, when software is made public. Yet, to many, release automation remains largely misunderstood and so is not as widely utilized in organizations that claim to be agile and doing DevOps. “I don’t know if people are recognizing the benefits of application release automation … continue reading

The two big traps of code test coverage

Measurement of code coverage is one of those things that always catches my attention. On the one hand, I often find that organizations don’t necessarily know how much code they are covering during testing — which is really surprising! At the other end of the coverage spectrum, there are organizations for whom the number is … continue reading

Cyberextortion: A growing Internet problem

“If you’re gonna commit a crime,” as “Slick Willie” Sutton said when asked why he robbed banks, “That’s where the money is.” Also known as “Willie the Actor” for his ability to disguise himself, Sutton stole an estimated $2 million during his 40-year robbery career. Modern-day cyber criminals have adopted this approach to digital extortion … continue reading

Preparing for the GDPR in the eleventh hour

If digital businesses haven’t already been preparing for the European Union’s General Data Protection Regulation (GDPR), the time is now. The regulation was adopted in April of 2016 and will officially go into effect on May 25, 2018. Despite the advance notice and warnings given, the range of GDPR preparedness is still very broad, according … continue reading

Database market consolidation is inevitable – how to pick the winners?

Databases comprise one of the largest and most foundational segments of the IT landscape—in some cases, comprising over 50 percent of the cost of the total application stack. The size and prominence of this segment continues to expand unfettered. Recent estimates from Gartner peg the database market at $36.4 billion, having grown 8.6 percent in … continue reading

Riding herd over your microservices

By now, the benefits of microservices have been well established. Reliability. Scalability. Productivity. What you don’t hear about are the tradeoffs, challenges and complexities it takes to transition from a monolith to a microservice. All of these smaller components in a microservice may make it easier to develop software, but instead of only having one … continue reading

Framework and standards are the ‘Essence’ of agile at scale

Since its creation, the agile software development methodology has been increasing in popularity. With its almost universal use, agile has now become less of a different and new methodology and more just the way developers operate. In other words, it is now standard practice for most teams to be using agile. With that in mind, … continue reading

Unlocking the blockchain potential

A new and emerging technology is hitting the ground running, and creating a frenzy in the industry. Bitcoin. Cryptocurrency. Initial Coin Offering (ICO). These are just some terms being seen in the headlines every day lately, but the real importance is the technology behind these terms: Blockchain. Blockchain is a new technology that has been … continue reading

Cybersecurity operations and the role of visualization, design, and usability

Data is overwhelming cybersecurity teams worldwide. Too much data is not necessarily a bad thing, but the daily barrage creates challenges stemming from the following questions: where is the data coming from, what does it mean and how can it be applied to keep companies more secure? Many in security operations are grappling with how … continue reading

Next Page »
HTML Snippets Powered By : XYZScripts.com

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!