AVAILABLE NOW FOR ON-DEMAND VIEWING!
This event focuses on bringing business and IT together. We expanded our 4th event lineup with more experts in Value Stream Management execution and optimization to bring you all the information you need to either start your value stream journey, or to improve on what you’re already doing. We cover new solutions, strategies, and trends that are shaping business and culture decisions within organizations worldwide.
VSMcon has attracted more than 1,800 attendees since its launch in 2020, and attendees have benefited from even greater opportunities in this 2022 event to network with peers, talk to solutions providers, and interact with speakers during and after their sessions.
You can watch the entire conference, or just your favorite sessions on-demand, so register today!
AVAILABLE NOW
AI-augmented coding is here, and it isn’t your robot overlord – but it can make your coding life less tedious. Yes, that means Github Copilot, but there’s more to AI-augmented Java development than GPT-based auto-complete tools.
Technologies like Google’s Alphacode and Diffblue Cover also use AI (in different ways) to help development teams to work faster, be more productive and spend more time on interesting problems. In this session, we compare some of the key AI-based development tools, examine the technologies behind them, and look at the different ways they could change the way you work.
Watch the webinar to learn:
● Why AI has so much potential to help Java developers
● About different approaches to AI-augmented software development
● How AI can already transform mundane, but vital, tasks like unit testing
NOW AVAILABLE
Get the real story on how hybrid cloud can mean high cost, governance headaches, and cloudy visibility of your organization. Unless you are in the business of managing hybrid cloud infrastructure, deploying, securing, and ensuring cloud compatibility can leave you restless and stuck in your tracks.
There is a silver lining. Join Taos, an IBM company, at this online event where we will share how with a few simple steps you can deploy quicker and save faster. The event offers helpful tips and relatable for deploying hybrid cloud, whether on your own or with a Managed Service Provider, as well as insights into how built-in continuous improvement and automation can accelerate any hybrid cloud success.
AVAILABLE NOW
The Data Cloud enables builders to develop better applications, faster and deliver their products in a way that suits their customers and their business.
Some application providers opt for a “managed” deployment model that allows them to deliver a fully managed service, while managing and storing customer data in their data platform.
Recently, application providers are implementing “connected” deployment models that separate code and data such that the app provider creates and maintains the application code, while customers maintain control of their data.
No matter your deployment model, Snowflake makes it easy to build and scale your application.
Watch this webinar to learn:
AVAILABLE NOW
Engineering teams are increasingly understanding the importance of shifting left and securing the software supply chain to decrease risk inherent in open source. But, many organizations are still working to find a way for their teams to see the big picture around software hygiene, and to recognize that managing your supply chain doesn’t just help eliminate risk, but also eliminates technical debt and innovation tax; ultimately increasing productivity and revenue. Unfortunately, by tying software supply chain management just to security, many organizations aren’t acting until they’ve experienced an attack.
Listen as SD Times’ Editor-in-Chief Dave Rubinstein hosts Steve Poole, Developer Advocate at Sonatype, for a conversation about how your organization can decrease innovation tax, technical debt and security risk, by encouraging regular security and governance routines.
Trying to build embedded software that’s bulletproof can be both a difficult and time-consuming task. According to embedded software industry experts, nearly 90% of all detected security holes can be traced back to just TEN types of vulnerabilities.
In this paper we explore the top 10 most common cybersecurity vulnerabilities, provide examples from actual source code, and look at what changes can be made to coding style or processes to avoid them.
Here are a few of the top 10:
See the rest when you download this whitepaper!
Zero-day attacks can be the stuff of nightmares, but when an organization commits to using all available tools in their security arsenal towards a preventative strategy, security professionals can sleep a little easier.
If ever there was an event to strike fear into the hearts of brave security professionals all over the world, it’s the discovery of a zero-day cyberattack. In 2020, a study by the Ponemon Institute revealed that 80% of successful data breaches were the result of zero-day exploits, and sadly, most companies remain ill-equipped to make a significant improvement on this statistic.
However, we can significantly reduce the risk and chance of getting caught out by adopting a prevention-focused security program, especially when developer enablement is made a priority.
Explore this all-new guide to learn more about:
AVAILABLE NOW
Workload automation is an important step in an organization’s DevOps journey, enabling practitioners to schedule and execute business process workflows and other jobs. This can help optimize data transfer and processing, while cutting down on errors and delays in process execution.
In this SD Times Live event, you’ll discover how the soon-to-be-released HCL Workload Automation can leverage historical workload execution data with artificial intelligence to expose observable data and provide an enhanced operational experience. Learn how HCL’s new UI workload designer, as a one-stop automation modeling platform, can unlock the full potential of workload automation.
AVAILABLE NOW
How to stay proactive with your organizations’ mobile application security in 2022
It’s 2022, which means any organization that builds or maintains a mobile application, either for end-users or for employees, knows they have a responsibility to secure those applications. However, between fixing privacy, security and compliance risks in the development process and enabling protection from the many different threat vectors while in use, it’s hard to know where to start.
Watch SD Times and Zimperium, the global leader in mobile device and app security, as they discuss how to prioritize and approach your security objectives, and the overall best practices for securing the entire mobile application development lifecycle, including:
Everyone is telling you to map your value stream. But have you thought about how? No one is talking about specifics. Join Lance Knight and Johnathan McGowan as they walk David Rubinstein through his first ever value stream mapping exercise using ConnectALL’s new complimentary [redacted]. Find out what it is on January 5th, 2022! |
LIVE APRIL 13, 2022
Our first LC/NC Developer Day event brought in over 500 attendees from companies of all sizes and roles at all levels. This is an exciting and informational event, allowing you to engage with our speakers and your own peers to learn more about how they are using low-code/no-code in their daily roles.
Whether you’re a professional software engineer or a ‘citizen developer,’ LC/NC Dev Day 2022 will provide a full day of breakout sessions, keynotes, a chance to meet with solution providers, and more.
SD Times has been covering this space for over a decade, and we’re putting together a NEW program with experts to bring you all the information you need to either start your low-code journey, or to accelerate your organization’s digital transformation. We will also explore changes between 2021 and 2022!
There are a limited number of seats available, so register today to save yours!