Date: Wednesday, December 13, 2017
Time: 8:00 AM PDT | 11:00 AM EDT | 4:00PM GMT
One of the myths of low-code development is that the apps won’t scale. In this myth-busting webinar, one of our foremost AWS cloud experts will demonstrate that a low-code platform can support customers with 10s of millions users. From load balancing to managing databases to new features like AWS Step Functions, you’ll learn from a pro the 5 things you can do to scale like you’re an online retailer during the holidays.
Register for the webinar!
Date: Tuesday, December 12, 2017
Time: 1:00 PM ET | 10:00 AM PT
The wide range of choice among development technology tools is daunting for most IT organizations. As modern application requirements become more complex it’s apparent that one runtime, one framework, or one architectural style is no longer a feasible strategy for application development and organizations must figure out how to manage the complexity of distributed app development, diversity of technologies, lack of skilled resources, and siloed processes.
Join this webinar to learn about Red Hat’s solution for optimized cloud-native development: Red Hat OpenShift Application Runtimes. A suite of containerized runtimes that simplifies cloud-native development, it provides a highly productive and prescriptive developer experience and delivers strategic flexibility without limiting development, testing, deployment, and modernization preferences.
Topics to be discussed include:
Register for the webinar!
Date: Thursday, December 7, 2017
Time: 12:00 PM ET | 09:00 AM PT
Globally distributed interactive applications are hard to develop due to read and write conflicts. The new CRDBs (conflict-free replicated databases) enable the same sub-millisecond latencies you are accustomed to getting with Redis applications with globally-distributed deployment topologies. CRDB make building complex geo-distributed apps simple by using the built-in smarts of proven CRDT approach (conflict-free replicated data-types).
In this webcast, we will look at how always-on, “AP-leaning” deployment of Redis (AP refers to A -“available” and P – “partition-loss tolerant” of CAP) is possible with CRDBs. We’ll peak under the hood at how CRDBs and Redis types such as strings, sets, and hashes work in CRDBs. We’ll also demo how to code an application with CRDBs for safe distributed failover across two data centers and avoid any downtime!
Register for the webinar!
Large enterprises require complex services to provision and allocate systems and resources—with consistent processes and standards. Red Hat Consulting partners with customers to standardize, streamline, and automate processes across departments and environments, integrating with existing systems. Experienced Red Hat subject matter experts develop a reliable life-cycle management strategy using self-service catalogs that leave full control of the infrastructure with the customer.
Download the white paper.
Red Hat Open Innovation Labs is an immersive residency for modernizing application development. Developing applications can take years and cost millions, and security, compliance, and privacy requirements stall progress. IT teams are innovating faster and improving quality with DevOps. The approach is to make large-scale changes iteratively, instead of all at once—adjusting direction as you go.
Download the e-book now.
Improved approaches, collaboration, and technology have led to faster software life cycles. Linux containers and container application platforms, a new category of enterprise software, can help businesses benefit from these advances. But IT managers must consider a wide range of activities, teams, and processes that together form the desired but elusive DevOps culture. An effective adoption program—using best practices based on experience—can guide organizations to successful container-based software delivery infrastructure.
Learn more about adopting a container application platform in this white paper.
Ansible by Red Hat can help organizations achieve an effective approach to business automation, but the path to DevOps can be long and complex. Outdated habits must be replaced with more efficient practices, but new tools and processes require buy-in from various stakeholders across the organization. Additionally, groups must be taught the specific best practices for their work. Red Hat Consulting helps customers successfully adopt and integrate Ansible to create and sustain standardized, centralized automation practices that add business and market value and build a solid foundation for DevOps.
Learn more today!
As developers consider leveraging usage analytics, one early question they often face is: should we build or buy this capability? This guide sheds light on that question for development and product management teams so you can understand the implications of your decision – ranging from turning data into insight, to time-to-market, to the direct and indirect costs of development and ongoing operation.
Download the guide today!
An increasingly large amount of all software today consists of third-party code, either purchased or licensed consumer off-the-shelf (COTS) software or free open source software (FOSS). Software Composition Analysis (SCA) is a testing process that breaks down the individual components, the ingredients of any software, producing a Bill of Materials (BoM) that shows what vulnerabilities and software components exist within a given application.
The State of Software Composition 2017 report is based on analysis of 128,782 software applications uploaded and tested through the Synopsys Software Composition Analysis tool (Protecode SC) cloud service from January 1 through December 31, 2016.
Read the report now.
Fuzz testing is an excellent way to locate vulnerabilities in software. The premise is to deliver intentionally malformed input to target software and detect failure. In fact, Synopsys used its own fuzz testing technology to discover the infamous Heartbleed vulnerability OpenSSL, which had gone unidentified for more than two years and impacted more than 500,000 websites.
In the State of Fuzzing 2017, Synopsys analyzed over 4.8 billion individual fuzz tests to identify the average time to first failure and overall maturity of protocols.
Learn more today.
Understanding MISRA checkers and their limits
One of the principles learned during the development of the MISRA guidelines has been the primary importance of being able to enforce rules with static analysis tools. It has been amply demonstrated, that without the ability to implement automatic enforcement, coding rules are of marginal value.
The market for tools which provide enforcement has grown in parallel with the adoption of MISRA Coding Guidelines. Many tools are now available claiming to provide enforcement of MISRA rules. Unfortunately, in the absence of any independent tool certification body or any independent test suite, misleading claims are often made about the effectiveness of that enforcement.
What you’ll learn:
This paper discusses the reasons why such claims are either a misconception or a deception and outlines some of the principles which should be understood when assessing tool performance.
Gain a better understanding of:
Read the white paper today!
For many organizations, the planning and budgeting process for the next fiscal year is well underway. During this process, it is common to have concerns about where and how much to invest while wishing you had more money. Even though we can’t give you more money we can share Gartner’s research report Five Tips for Getting the Most From Your Secure Software Development Testing Budget. Within the report, Gartner provides recommendations for maximizing your spend and increasing your impact.