As AI-powered coding assistants become more prevalent, developers are increasingly incorporating AI-generated code snippets into their projects… But how reliable and secure is it? The last Dora report made it clear: there is a 7.2% drop in delivery stability for every 25% increase in AI use! In this webinar, we’ll explore the risks AI-generated code … continue reading
Managing telemetry data efficiently is a constant balancing act—how do you maximize visibility while controlling costs? In this webinar, we’ll show you how Mezmo’s telemetry pipeline helps you make smarter decisions about your data. Learn how Mezmo helps you optimize telemetry data, reduce costs, and improve operational efficiency — without sacrificing the insights you need. … continue reading
Open source drives innovation, but unchecked it can increase risk. This webinar explores how Application Security Posture Management (ASPM) can help you harness the power of open source while mitigating vulnerabilities. Discover how ActiveState’s comprehensive platform, expert guidance, and commitment to community leadership can help you in a multitude of ways. … continue reading
The initial hype surrounding LLM is over. As more businesses adopt LLMs, their shortcomings in managing workflows, multitasking, and collaborative work are becoming increasingly evident. Multi-agent AIs are a step beyond LLMs as they are smarter, adaptable, and built for complex challenges. Key Takeaways: • How multi-agent AI overcomes LLM limitations • Key … continue reading
ActiveState is revolutionizing open source management with a streamlined, secure, and scalable approach. In this microwebinar series, learn how ActiveState helps DevSecOps teams eliminate the complexities of managing open source, securing the software supply chain, and integrating with your CI/CD workflows. With experts like CTO Scott Robertson and Product Director Pete Garcin, discover how ActiveState … continue reading
The hype around using AI in software development is at a high not seen since the cloud. Companies are rushing to get on the train, with spending plans for 2025 almost all targeting AI-based tools. And with all we understand – and don’t understand – about using AI in software development, and all the hurdles … continue reading
Bloomberg, Capital One, and tens of thousands of developers are using open source Cloud Native Buildpacks to transition application source code to container images that can be easily maintained and updated. Paketo Buildpacks, an implementation of the cloud Native Buildpacks, run on any container runtime that supports container images, which makes them suitable for Docker and Kubernetes based environments. … continue reading
Join us for an insightful webinar on “ValueOps ConnectALL: Pattern Thinking & Automation,” where Lance Knight, ValueOps by Broadcom’s Chief Value Stream Architect, delves into the transformative power of optimizing flow in software delivery value streams. This session will explore how identifying and leveraging patterns in your processes can significantly enhance efficiency and drive automation … continue reading
SD Times Live! Microwebinar Series — Continuous Testing Achieving continuous testing means shifting your testing left. That is a goal shared by every testing team in the industry, and this series will give you valuable insight and impactful tips for implementing a continuous testing approach into your testing strategy. Led by Perforce Vice President of … continue reading
The Best Way to Manage Development Secrets Protecting sensitive data like API keys, passwords, and encryption keys is crucial. With applications sprawling across various environments, managing these secrets securely can become a complex challenge. Brian Vallelunga, CEO of Doppler, dives deep into the concept of secrets management, explaining: What are secrets and why are they … continue reading
Join Melissa and SD Times for this series on data verification. This series will detail various security methodologies to help your organization properly evaluate and manage clientele data. May 16 – Global Email Verification July 18 – Global Name Verification September 19 – Global Phone Verification October 17 – Global Address Verification November 14 – … continue reading
Navigating Data Challenges for SaaS Companies: Knowing how your end users leverage the product and data within it often leads to increased adoption but not without some bumps. There are three key challenges common in SaaS environments: Building industry-specific solutions that meet customer data where it is and support security norms Enabling access to data … continue reading