Webinars

AVAILABLE NOW

Studying software engineering practices from 100,000 production applications and 4,000,000 open source component migrations, Sonatype uncovered eye-opening behaviors in modern software development, including a surprising trend that nearly 70% of dependency management decisions are suboptimal.

Understanding these migration paths, helps make sense of part of the panic that ensued when a zero-day vulnerability was disclosed in Log4j and Spring4Shell. If you weren’t automating software supply management and weren’t paying attention to your dependencies, you were left incredibly vulnerable.

Along with studying production applications, as the stewards of Maven Central, Sonatype teams have monitored download data, ensuring the world has reliable information on the latest trends.

In this talk, Ax Sharma shares insights from their recent software supply chain research along with lessons learned from Log4j and Spring4Shell to break down how to change your software supply management practices for a more secure SDLC.

Ax provides guidance on how teams can:

  • Choose components that help minimize their risks
  • Adopt practices that help you/them quickly discover and remediate security issues
  • Become more efficient and innovative developers

Webinars

AVAILABLE NOW FOR ON-DEMAND VIEWING!

This event focuses on bringing business and IT together. We expanded our 4th event lineup with more experts in Value Stream Management execution and optimization to bring you all the information you need to either start your value stream journey, or to improve on what you’re already doing. We cover new solutions, strategies, and trends that are shaping business and culture decisions within organizations worldwide.

VSMcon has attracted more than 1,800 attendees since its launch in 2020, and attendees have benefited from even greater opportunities in this 2022 event to network with peers, talk to solutions providers, and interact with speakers during and after their sessions.

You can watch the entire conference, or just your favorite sessions on-demand, so register today!

Webinars

AVAILABLE NOW

AI-augmented coding is here, and it isn’t your robot overlord – but it can make your coding life less tedious. Yes, that means Github Copilot, but there’s more to AI-augmented Java development than GPT-based auto-complete tools.

Technologies like Google’s Alphacode and Diffblue Cover also use AI (in different ways) to help development teams to work faster, be more productive and spend more time on interesting problems. In this session, we compare some of the key AI-based development tools, examine the technologies behind them, and look at the different ways they could change the way you work. 

Watch the webinar to learn:

●     Why AI has so much potential to help Java developers

●     About different approaches to AI-augmented software development

●     How AI can already transform mundane, but vital, tasks like unit testing

Webinars

NOW AVAILABLE

Get the real story on how hybrid cloud can mean high cost, governance headaches, and cloudy visibility of your organization. Unless you are in the business of managing hybrid cloud infrastructure, deploying, securing, and ensuring cloud compatibility can leave you restless and stuck in your tracks.

There is a silver lining. Join Taos, an IBM company, at this online event where we will share how with a few simple steps you can deploy quicker and save faster. The event offers helpful tips and relatable for deploying hybrid cloud, whether on your own or with a Managed Service Provider, as well as insights into how built-in continuous improvement and automation can accelerate any hybrid cloud success.

Webinars

AVAILABLE NOW

The Data Cloud enables builders to develop better applications, faster and deliver their products in a way that suits their customers and their business.

Some application providers opt for a “managed” deployment model that allows them to deliver a fully managed service, while managing and storing customer data in their data platform.

Recently, application providers are implementing “connected” deployment models that separate code and data such that the app provider creates and maintains the application code, while customers maintain control of their data.

No matter your deployment model, Snowflake makes it easy to build and scale your application.

Watch this webinar to learn:

  • The differences between a managed and connected application
  • How Snowflake supports both managed and connected applications
  • Deployment model architectures and implementation strategies
  • When to implement each deployment mode

Webinars

AVAILABLE NOW

Engineering teams are increasingly understanding the importance of shifting left and securing the software supply chain to decrease risk inherent in open source. But, many organizations are still working to find a way for their teams to see the big picture around software hygiene, and to recognize that managing your supply chain doesn’t just help eliminate risk, but also eliminates technical debt and innovation tax; ultimately increasing productivity and revenue. Unfortunately, by tying software supply chain management just to security, many organizations aren’t acting until they’ve experienced an attack.

Listen as SD Times’ Editor-in-Chief Dave Rubinstein hosts Steve Poole, Developer Advocate at Sonatype, for a conversation about how your organization can decrease innovation tax, technical debt and security risk, by encouraging regular security and governance routines.

White Papers

Trying to build embedded software that’s bulletproof can be both a difficult and time-consuming task. According to embedded software industry experts, nearly 90% of all detected security holes can be traced back to just TEN types of vulnerabilities.

In this paper we explore the top 10 most common cybersecurity vulnerabilities, provide examples from actual source code, and look at what changes can be made to coding style or processes to avoid them.

Here are a few of the top 10:

  • Vulnerability #10: Numeric Errors
  • Vulnerability #7: Code Injection
  • Vulnerability #5: Improper access control

See the rest when you download this whitepaper!

White Papers

Zero-day attacks can be the stuff of nightmares, but when an organization commits to using all available tools in their security arsenal towards a preventative strategy, security professionals can sleep a little easier.

If ever there was an event to strike fear into the hearts of brave security professionals all over the world, it’s the discovery of a zero-day cyberattack. In 2020, a study by the Ponemon Institute revealed that 80% of successful data breaches were the result of zero-day exploits, and sadly, most companies remain ill-equipped to make a significant improvement on this statistic.

However, we can significantly reduce the risk and chance of getting caught out by adopting a prevention-focused security program, especially when developer enablement is made a priority.

Explore this all-new guide to learn more about:

  • Pitfalls that can slow down or stop viable preventative security strategies, and how to avoid them
  • Why developers can be the secret sauce to reduce the potential attack surface
  • Powerful ways security-aware developers can work with AppSec on advanced preventative security tactics.

Webinars

AVAILABLE NOW

Workload automation is an important step in an organization’s DevOps journey, enabling practitioners to schedule and execute business process workflows and other jobs. This can help optimize data transfer and processing, while cutting down on errors and delays in process execution.

In this SD Times Live event, you’ll discover how the soon-to-be-released HCL Workload Automation can leverage historical workload execution data with artificial intelligence to expose observable data and provide an enhanced operational experience. Learn how HCL’s new UI workload designer, as a one-stop automation modeling platform, can unlock the full potential of workload automation.

Webinars

AVAILABLE NOW

How to stay proactive with your organizations’ mobile application security in 2022

It’s 2022, which means any organization that builds or maintains a mobile application, either for end-users or for employees, knows they have a responsibility to secure those applications. However, between fixing privacy, security and compliance risks in the development process and enabling protection from the many different threat vectors while in use, it’s hard to know where to start.

Watch SD Times and Zimperium, the global leader in mobile device and app security, as they discuss how to prioritize and approach your security objectives, and the overall best practices for securing the entire mobile application development lifecycle, including:

  • Research that surfaces the top threats that will impact your organization’s mobile applications
  • Highlights from a recent survey of 250 security practitioners on their approach to securing mobile applications
  • The most crucial security measures you should put in place to secure your mobile applications
  • What you should be looking for (and asking vendors about) to obtain comprehensive in-app protection and threat visibility

Webinars

AVAILABLE NOW

Everyone is telling you to map your value stream.

But have you thought about how?

No one is talking about specifics.

Join Lance Knight and Johnathan McGowan as they walk David Rubinstein through his first ever value stream mapping exercise using ConnectALL’s new complimentary [redacted].

Find out what it is on January 5th, 2022!

Webinars

LIVE APRIL 13, 2022 

Our first LC/NC Developer Day event brought in over 500 attendees from companies of all sizes and roles at all levels. This is an exciting and informational event, allowing you to engage with our speakers and your own peers to learn more about how they are using low-code/no-code in their daily roles.

Whether you’re a professional software engineer or a ‘citizen developer,’ LC/NC Dev Day 2022 will provide a full day of breakout sessions, keynotes, a chance to meet with solution providers, and more.

SD Times has been covering this space for over a decade, and we’re putting together a NEW program with experts to bring you all the information you need to either start your low-code journey, or to accelerate your organization’s digital transformation. We will also explore changes between 2021 and 2022!

There are a limited number of seats available, so register today to save yours!

« Previous PageNext Page »
DMCA.com Protection Status