White Papers

Hiring and retaining software engineers is hard– and it’s only getting more difficult.  A hiring strategy that allows engineering managers to source talent from a global pool will bring a wider range of skills and experience, reduce turnover, and attract the 53.3% of developers, as surveyed by stack Overflow, who rank distributed work as the top priority.

White Papers

All too often, the onboarding process for new hires feels rushed and disorganized. Add in a remote/distributed engineering team, and the process is even more difficult. But, when onboarding is done right, it leads to better employee retention and improved on-the-job performance.

White Papers

Hiring new talent is a challenge for all companies, and it’s particularly true when hiring engineering talent. It’s time-consuming, costly and often impacts the development of a company’s growth, potential, and culture like no other decision you will make.

Webinars

RECORDED EVENT

Join SD Times and Micro Focus as we deflate the hype around DevOps and provide a no-nonsense, real-world view of how your organization can gain operational efficiencies and deliver value to your customers.

White Papers

For many CIOs, the realization that they can’t visualize how value flows across the software delivery process is a “eureka!” moment. Abandoning a hit and hope mentality, CIOs are taking a sledgehammer to the black box that conceals the mechanics of how software is planned, built and delivered at scale. Once inside, they’re analyzing how value flows from customer request to software in operation. They’re becoming ‘value stream thinkers.

White Papers

The core problem with software security today is not that far removed from the problem Veracode was trying to solve 10 years ago. In State of Software Security v1, the company concluded that “Most software is indeed very insecure.” We could use that same statement in Volume 10. However, it is seeing some positive AppSec signs in 2019. Organizations are increasingly focused on not just finding security vulnerabilities, but fixing them, and prioritizing the flaws that put them most at risk. The data suggests that finding and fixing vulnerabilities is becoming just as much a part of the software development process as improving functionality.

White Papers

How can organizations cut the risk of downtime? The answer: break your systems on purpose. Find out their weaknesses and fix them before they break when least expected.

It’s called chaos engineering, and it’s being adopted by leading financial institutions, internet companies, and manufacturing firms throughout the world.

Webinars

Recorded Event

Easy-to-understand monoliths are giving way to distributed systems: microservices, serverless, meshes, proxies, and every possible combination. These systems offer developers the freedom to build new features and technology faster, as they are no longer beholden to the elaborate release processes associated with monolithic architecture.

Webinars

Recorded Event

You’ve been hacked. A developer leveraged a 3rd party library with unsanitized input that a SCA tool can’t flag. This containerized application goes into production – making your entire cloud infrastructure vulnerable to severe security incidents. Does this sound familiar?

Webinars

Recorded Webinar

Learn the latest tips from the experts!
Gary Gruver’s latest book Engineering the Digital Transformation provides systematic approaches for improving how software is developed for a broad range of applications. This webinar will provide an overview of the key takeaways from Gary’s newest book.

Webinars

Recorded Event:

In this webinar we will talk about the last year in value stream management and value stream integration. We will try to answer questions like what is next for value stream and what is the real problem we are solving with value stream management and value stream integration. Also why value stream optimization is so important to agile DevOps and shift left initiatives.

Webinars

Recorded Event

Join us to see how making the move to NoSQL is easier than you think, getting higher value from your applications today and going beyond what you can achieve with legacy relational database technology.

« Previous PageNext Page »
DMCA.com Protection Status