AVAILABLE NOW
The Data Cloud enables builders to develop better applications, faster and deliver their products in a way that suits their customers and their business.
Some application providers opt for a “managed” deployment model that allows them to deliver a fully managed service, while managing and storing customer data in their data platform.
Recently, application providers are implementing “connected” deployment models that separate code and data such that the app provider creates and maintains the application code, while customers maintain control of their data.
No matter your deployment model, Snowflake makes it easy to build and scale your application.
Watch this webinar to learn:
AVAILABLE NOW
Engineering teams are increasingly understanding the importance of shifting left and securing the software supply chain to decrease risk inherent in open source. But, many organizations are still working to find a way for their teams to see the big picture around software hygiene, and to recognize that managing your supply chain doesn’t just help eliminate risk, but also eliminates technical debt and innovation tax; ultimately increasing productivity and revenue. Unfortunately, by tying software supply chain management just to security, many organizations aren’t acting until they’ve experienced an attack.
Listen as SD Times’ Editor-in-Chief Dave Rubinstein hosts Steve Poole, Developer Advocate at Sonatype, for a conversation about how your organization can decrease innovation tax, technical debt and security risk, by encouraging regular security and governance routines.
Trying to build embedded software that’s bulletproof can be both a difficult and time-consuming task. According to embedded software industry experts, nearly 90% of all detected security holes can be traced back to just TEN types of vulnerabilities.
In this paper we explore the top 10 most common cybersecurity vulnerabilities, provide examples from actual source code, and look at what changes can be made to coding style or processes to avoid them.
Here are a few of the top 10:
See the rest when you download this whitepaper!
Zero-day attacks can be the stuff of nightmares, but when an organization commits to using all available tools in their security arsenal towards a preventative strategy, security professionals can sleep a little easier.
If ever there was an event to strike fear into the hearts of brave security professionals all over the world, it’s the discovery of a zero-day cyberattack. In 2020, a study by the Ponemon Institute revealed that 80% of successful data breaches were the result of zero-day exploits, and sadly, most companies remain ill-equipped to make a significant improvement on this statistic.
However, we can significantly reduce the risk and chance of getting caught out by adopting a prevention-focused security program, especially when developer enablement is made a priority.
Explore this all-new guide to learn more about:
AVAILABLE NOW
Workload automation is an important step in an organization’s DevOps journey, enabling practitioners to schedule and execute business process workflows and other jobs. This can help optimize data transfer and processing, while cutting down on errors and delays in process execution.
In this SD Times Live event, you’ll discover how the soon-to-be-released HCL Workload Automation can leverage historical workload execution data with artificial intelligence to expose observable data and provide an enhanced operational experience. Learn how HCL’s new UI workload designer, as a one-stop automation modeling platform, can unlock the full potential of workload automation.
AVAILABLE NOW
How to stay proactive with your organizations’ mobile application security in 2022
It’s 2022, which means any organization that builds or maintains a mobile application, either for end-users or for employees, knows they have a responsibility to secure those applications. However, between fixing privacy, security and compliance risks in the development process and enabling protection from the many different threat vectors while in use, it’s hard to know where to start.
Watch SD Times and Zimperium, the global leader in mobile device and app security, as they discuss how to prioritize and approach your security objectives, and the overall best practices for securing the entire mobile application development lifecycle, including:
Everyone is telling you to map your value stream. But have you thought about how? No one is talking about specifics. Join Lance Knight and Johnathan McGowan as they walk David Rubinstein through his first ever value stream mapping exercise using ConnectALL’s new complimentary [redacted]. Find out what it is on January 5th, 2022! |
LIVE APRIL 13, 2022Â
Our first LC/NC Developer Day event brought in over 500 attendees from companies of all sizes and roles at all levels. This is an exciting and informational event, allowing you to engage with our speakers and your own peers to learn more about how they are using low-code/no-code in their daily roles.
Whether you’re a professional software engineer or a ‘citizen developer,’ LC/NC Dev Day 2022 will provide a full day of breakout sessions, keynotes, a chance to meet with solution providers, and more.
SD Times has been covering this space for over a decade, and we’re putting together a NEW program with experts to bring you all the information you need to either start your low-code journey, or to accelerate your organization’s digital transformation. We will also explore changes between 2021 and 2022!
There are a limited number of seats available, so register today to save yours!
AVAILBLE NOW
Increasing collaboration between teams to create customer value is now essential to doing business in the modern enterprise. But while understanding and reimagining how value is created through streams (rather than functional processes) becomes ever more important, realizing the value stream and creating value for stakeholders while carrying on with business as usual is challenging.
In this panel discussion, our experts will surface some of the unseen challenges that mean value stream mapping often fails to deliver results in the real world, and share some of the leading-edge thinking and practices they use to overcome them.
Register for the LIVE panel discussion and Q&A today!
For successful product testing, your test teams must be aligned with business criteria. A clearly articulated definition of “done” must be established and communicated to your testing teams. While these statements seem obvious, they are challenges that product development teams routinely struggle to solve, especially if they aren’t using a lifecycle management tool to automate their DevOps Pipeline.
Our latest webinar with Perforce’s Director of Product Management Tzvika Shahaf who hosted Testing Consultant Brijesh Deb for an in-depth and revealing dialogue on all things testing, covered topics including:
Requirements on developers have shifted over the last 5 years. Team sizes are shrinking but responsibilities are growing with DevOps and accelerated SDLC. A developer must become fluent in software architecture, testing, deployment, telemetry, and even security. It is less about multi-layer and more about multi-discipline.
In this talk, Pete Chestna, CISO of North America for Checkmarx shares updates to the insights that he first shared over 4 years ago. We discuss how the opportunities and accountability afforded to developers needs better support from employers and the vendor community. There is practical advice to rise to the challenge.
What you will learn:
AVAILABLE NOW
As software development, delivery and performance become more complex due to modern architectures, value streams can help organizations unlock the bottlenecks and eliminate process waste to continuously improve how they work and deliver better experiences to their customers. Value stream management concepts are critical when the product changes frequently due to opportunities in the markets, the materials change due to the complexity of modern software architectures and means of delivery, and the output is often changing based on customer demands and expectations.
At Virtual VSMcon, you will learn how to apply value stream strategies to your development process to gain efficiencies, improve quality and cut costs.