White Papers

Whether you’ve been working successfully on your continuous integration (CI) infrastructure for some time or are just starting to build it out, you have realized the power of CI and are enabling your teams to be successful by implementing, administering, and sharing this powerful tool with the masses.

Fast forward to 3:00 AM on a Sunday morning… your phone is ringing…and your CI solution is down. Now what?!

The number one reason this type of scenario happens is due to monolithic controllers. This whitepaper is designed to help you understand and identify red flags to prevent you from creating these monolithic controllers.

Among what you’ll learn:

  • What is a Monolithic Controller?
  • 3 signs you are on the road to running a Monolith Controller
  • Remedying a Monolithic Controller
  • The future of CI and horizontal scaling

Download this whitepaper so you don’t get caught on the long, scary “monolithic” road! 

White Papers

Security is inherently more expensive if organizations find vulnerabilities after deployment, rather than incorporated into the lifecycle via security assurance (SA). If security isn’t incorporated early and often, major consequences could happen, such as:

  • Financial loss
  • Reputational damage
  • Data loss (company or customer)
  • IP theft
  • And much more!

This whitepaper will show you how and where to seamlessly integrate security throughout the entire development lifecycle, without having to slow app development teams down.


How do you scale your testing to realize the full value of DevOps? In this session, Ethan Chung, Solutions Architect Manager at Keysight Technologies, will show how to expand testing coverage across complex applications with intelligent automation.

Watch now to learn the basics of automation right through to building sophisticated test cases that integrate with any DevOps pipeline.

White Papers

Every software development team wants fast and stable releases but testing often slows everything down. Discover how intelligent test automation integrated with your CI/CD pipeline can accelerate every software delivery cycle.

In this brief, you will learn:

  • Why continuous testing is essential to accelerate release cycles
  • How to expand test coverage to uncover bugs in isolated areas of an application
  • Why testing the user experience can increase revenue

White Papers

Keysight’s Eggplant intelligent test automation can interact with various layers of the testing environment. And by testing real user scenarios, Keysight’s Eggplant can validate data integrity across the entire application workflow.

In this brief demonstration, Kieran Leicester, Technical Consult at Keysight Technologies, will use Eggplant to look up a colleague, schedule a meet up convenient to them at a 4-star coffee shop, and warn his colleague of the impending weather.

Watch now to discover how test automation can validate every layer of the application stack, including databases, APIs, and the UI over a cup of joe.


LIVE! September 8th, 2022 @ 1:00PM ET | 10:00AM PT

Hackers are becoming increasingly sophisticated and calculated in the ways in which they deliver attacks upstream in the software supply chain. There are growing numbers of organized attackers whose sole focus is exploiting vulnerabilities in open source ecosystems, frequently by making their malware appear legitimate. What’s new is the intensity, volume, frequency, and severity of malicious attacks. The popularity of open source makes repositories the ideal watering hole attacks — poison the well and all who drink from it are impacted. Once malicious code gets into machines and build environments, it can end up in internal corporate networks and in the final product.

We must become ever more vigilant in our coding practices as we represent a clear red target with exponential cascading impacts. We need to be prepared for multiple permutations in the types of malicious targeting, whether on us as developers specifically, or upstream or downstream of us. Top that off with needing to still be aware of legacy software supply chain “exploits,” like Log4j where attackers prey on publicly disclosed open source vulnerabilities left unpatched in the wild. Your teams need to understand the changing landscape and help put developer-first security tools in place across an organization.



  • Topic 6 of 6 – “How Automating with VSM Unifies Disparate Teams”

We as an industry cannot afford to ignore the dangers of siloed software delivery. The cost of a siloed workforce is staggering, resulting in project delays, declining software quality, and a disconnect from the original project intent. And with the widespread shift to remote work, these silos have become more entrenched than ever.

How can we begin to address the problem?

Join ConnectALL’s Lance Knight (President and COO) and Norman Miglietta (SVP of Marketing) as they sit down with David Rubinstein in the latest SD Times Microwebinar to discuss how automation with value stream management enables organizations to unify disparate teams in every stage of development.

They will discuss why automation is key for any organization struggling with siloed software delivery processes, and what benefits teams can expect from connecting their tools and closely managing the flow of work through the value stream.


  • Topic 5 of 6 – “The Misconception: Why do I Need VSM if I’m Already Implementing Agile?” 

Organizations not closely familiar with value stream management often may ask: “How does it fit with these other agile approaches we’ve been adopting?” “Why do I need VSM if I’m already implementing Agile?”

The answer: VSM, agile, or for that matter DevOps are not mutually exclusive. Principles of agile are baked into VSM, and VSM in many ways represents an extension of the short cycle/fast feedback approach championed in DevOps. Many organizations struggle to apply agile across silos, and others may struggle to determine ways to align agile workflows towards outcome-focused company goals. VSM does both ⁠— It enables agile at scale and at speed while focusing on the priorities that matter most. So, by adopting VSM, you are continuing along your agile digital transformation but with a broader look at all existing activities organization-wide, not just those directly involved with digital product creation/curation.

In this month’s microwebinar, we are joining you exclusively from the venue of Agile 2022 in Nashville, TN! David Rubinstein, SD Times editor-in-chief, Lance Knight, ConnectALL’s President & COO, and Andrew Fuqua, SVP of Product will discuss some of the key highlights they’ve seen from the conference and how those Agile concepts relate back to value stream management. Their insight will address how VSM supercharges agile and channels your software delivery towards a greater purpose.


  • Topic 4 of 6 – “What is Automating Your Value Stream?”

When you zoom in on a value stream, you’ll discover what goes into creating a specific valuable element of a software. By streamlining or optimizing a value stream, you can develop recurring principles that can be used repeatedly for value creation. And this is where automating your value stream comes in. In this session, we will show you how automating your value stream improves the performance of your value stream. Automation would involve introducing feedback loops for the smallest action taken. You can bring in consistency by following certain principles repeatedly, making some activities predictable. You can execute many of these tasks at scale and converge the results into something digestible for the next step.

  • Topic 3 of 6 – “The Surprising Reality About Bottlenecks”
Have you ever experienced a “bait and switch?” It can be frustrating when expectations don’t meet reality.
We believe that organizations are currently facing this level of frustration when trying to identify bottlenecks using graphs provided by some applications. Bottleneck graphs are often based on average cycle time. Is this effective? Or is it simply a feckless distraction?

In this microwebinar, we will delve into different perspectives on locating bottlenecks, how they might be useful (or not), and the reason that only using your average cycle time to identify your bottlenecks is not enough to get the job done.

  • Topic 2 of 6 – “Make your value streams flow: How to start seeing your value stream”

THIS IS NOW AVAILABLE ON DEMAND. In the last session, we highlighted the difference between value stream management and a value stream, and how you need to start seeing your value stream. In this session, we tell you how to start seeing your value stream and make meaningful connections. You need to understand what tools you use at every step, the people involved and the processes. Seeing your value stream helps you cut waste, make processes more efficient, align cross-functional teams and business goals, plan for future growth and do the right things.

Related Resource: What if there was a value stream mapping tool that focuses specifically on the tools & processes relevant to software development and delivery? Say hello to the Value Stream Designer – a complimentary tool that makes mapping value streams easy, interesting and fun. Download it today!


  • Topic 1 of 6 – “What’s the difference between value stream management and a value stream?”

THIS IS NOW AVAILABLE ON DEMAND. Watch as we kick off our first five-minute ‘microwebinar’ series, with value stream management provider ConnectALL. SD Times editor-in-chief and VSMcon chairman David Rubinstein hosts ConnectALL president and COO Lance Knight as we answer the question, “What’s the difference between value stream management and a value stream?” and then take a few LIVE questions from listeners.

Related Resource: If you want to learn more about value streams and value stream management, check out this library of instructional videos!

White Papers

In the past, the CI/CD pipelines were simply a place to integrate code. Developers would write their code in GitHub, pass it through the pipeline, and then deploy it. However, with the emergence of shift left security and newer automation practices, the pipeline has become a much more critical piece of the software delivery lifecycle.

“The delivery of the software through the pipeline also has to be secure and compliant,” said Tim Johnson, Product Manager at DevOps solutions company CloudBees. “As well as what it is doing beyond just the simple CI aspect of it. So now you get into things like security and testing automation, software composition analysis, static analysis, dynamic analysis, and all other things that need to be done to get that software through.”

In this solutions guide, you will learn specifics about:

  • How shift left security is changing the pipeline
  • Why Gartner says security in the CI/CD pipeline needs to be an end-to-end process
  • The need for automation – why is it essential to ensure your entire organization is on-board!
  • A guide to CI/CD tools
  • And more!

Download it today!

White Papers

Defining a plan to improve developer security maturity is no easy task when you still have compliance requirements and release deadlines to meet. But it is a worthy one that will pay dividends in improved productivity and reduced risk.

In this guide, we explore the lessons learned from three real-life Secure Code Warrior customers so you can start to assemble a secure code training blueprint for your organization.


  • What challenges do organizations face at different stages of developer security maturity?
  • Who are the stakeholders involved?
  • What are the key lessons learned along the way



Modern development strategies employ different tactics to deliver code more quickly, from agile planning to cross-functional teams to ‘shift left’. Unit testing has an important role to play, accelerating cycle times by detecting regressions at the earliest possible stage. Since testing remains a significant bottleneck in most CI pipelines, the gains can be significant.

But the effort of writing and maintaining tests can offset the benefits: it’s not unusual for Java developers to spend up to 50% of their time working on unit tests instead of on value-adding code changes.  And that still might not be enough to get good code coverage!

That’s why modern Java pipelines include integrated, AI-assisted coding that removes the effort from unit testing and accelerates development.

Join this webinar to learn:

  • Why unit testing is such a powerful aid to faster development
  • How AI can solve the problem of unit test writing
  • How Diffblue Cover accelerates Java development
  • About integrating automated unit test writing into your Java CI pipeline



Declarative pipelines provide a more modern, opinionated approach to pipeline creation and management. But what are they really? What benefit do they bring to your CI/CD processes?

Our three expert panelists discussed:

  • What declarative pipelines are and how they are used
  • Where they are most useful
  • Best practices around creating declarative pipelines in Jenkins

Watch the webinar on demand any time!



As the need for code to be deployed faster grows every year. Code scanning has become a great part of the developer role. As such, Dev teams need a simple-to-integrate security tool that allows them to secure code quickly and accurately without disrupting their workflow.

That is why Contrast is proud to introduce its new free developer security tool: CodeSec by Contrast, that brings the fastest and most accurate scanner in the market right to developers at no cost. Providing actionable remediation guidance, CodeSec enables developers to start securing code in LESS THAN 5 MINUTES!

In this webinar, we covered how CodeSec by Contrast is able to help developers secure code by showcasing:

  • An introduction to CodeSec by Contrast Security
  • The benefits of CodeSec
  • Demonstrate how Developers can get started
  • Showcase how Devs can scan both files & serverless environments for free
Next Page »
HTML Snippets Powered By : XYZScripts.com

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!