Trust but Verify? The Risks Lurking in AI-Generated Code

As AI-powered coding assistants become more prevalent, developers are increasingly incorporating AI-generated code snippets into their projects… But how reliable and secure is it? The last Dora report made it clear: there is a 7.2% drop in delivery stability for every 25% increase in AI use! In this webinar, we’ll explore the risks AI-generated code … continue reading

Cut Costs, Not Insights: A Practical Guide to Telemetry Data Optimization

Managing telemetry data efficiently is a constant balancing act—how do you maximize visibility while controlling costs? In this webinar, we’ll show you how Mezmo’s telemetry pipeline helps you make smarter decisions about your data. Learn how Mezmo helps you optimize telemetry data, reduce costs, and improve operational efficiency — without sacrificing the insights you need.   … continue reading

Reduce Risk, Accelerate Innovation: ASPM for Modern Open Source

Open source drives innovation, but unchecked it can increase risk. This webinar explores how Application Security Posture Management (ASPM) can help you harness the power of open source while mitigating vulnerabilities.   Discover how ActiveState’s comprehensive platform, expert guidance, and commitment to community leadership can help you in a multitude of ways. … continue reading

Beyond LLMs: The Power and Pitfalls of Multi-Agent AI

The initial hype surrounding LLM is over.   As more businesses adopt LLMs, their shortcomings in managing workflows, multitasking, and collaborative work are becoming increasingly evident. Multi-agent AIs are a step beyond LLMs as they are smarter, adaptable, and built for complex challenges.   Key Takeaways: • How multi-agent AI overcomes LLM limitations • Key … continue reading

SD Times Live! Microwebinar Series — with ActiveState

ActiveState is revolutionizing open source management with a streamlined, secure, and scalable approach. In this microwebinar series, learn how ActiveState helps DevSecOps teams eliminate the complexities of managing open source, securing the software supply chain, and integrating with your CI/CD workflows. With experts like CTO Scott Robertson and Product Director Pete Garcin, discover how ActiveState … continue reading

Using AI to code: What could possibly go wrong?

The hype around using AI in software development is at a high not seen since the cloud. Companies are rushing to get on the train, with spending plans for 2025 almost all targeting AI-based tools. And with all we understand – and don’t understand – about using AI in software development, and all the hurdles … continue reading

From Source to Container – Gaining Productivity with Open Source Paketo Buildpacks

Bloomberg, Capital One, and tens of thousands of developers are using open source Cloud Native Buildpacks to transition application source code to container images that can be easily maintained and updated. Paketo Buildpacks, an implementation of the cloud Native Buildpacks, run on any container runtime that supports container images, which makes them suitable for  Docker and Kubernetes based environments. … continue reading

ValueOps ConnectALL: Pattern Thinking & Automation

Join us for an insightful webinar on “ValueOps ConnectALL: Pattern Thinking & Automation,” where Lance Knight, ValueOps by Broadcom’s Chief Value Stream Architect, delves into the transformative power of optimizing flow in software delivery value streams. This session will explore how identifying and leveraging patterns in your processes can significantly enhance efficiency and drive automation … continue reading

Continuous Testing Microwebinar Series

SD Times Live! Microwebinar Series — Continuous Testing  Achieving continuous testing means shifting your testing left. That is a goal shared by every testing team in the industry, and this series will give you valuable insight and impactful tips for implementing a continuous testing approach into your testing strategy. Led by Perforce Vice President of … continue reading

Secrets Management Microwebinar Series

The Best Way to Manage Development Secrets Protecting sensitive data like API keys, passwords, and encryption keys is crucial. With applications sprawling across various environments, managing these secrets securely can become a complex challenge. Brian Vallelunga, CEO of Doppler, dives deep into the concept of secrets management, explaining: What are secrets and why are they … continue reading

SD Times Microwebinar Series – Data Verification

Join Melissa and SD Times for this series on data verification. This series will detail various security methodologies to help your organization properly evaluate and manage clientele data. May 16 – Global Email Verification July 18 – Global Name Verification September 19 – Global Phone Verification October 17 – Global Address Verification November 14 – … continue reading

Data Connectivity Microwebinar Series

Navigating Data Challenges for SaaS Companies: Knowing how your end users leverage the product and data within it often leads to increased adoption but not without some bumps. There are three key challenges common in SaaS environments: Building industry-specific solutions that meet customer data where it is and support security norms Enabling access to data … continue reading

Next Page »
DMCA.com Protection Status