Building and Deploying Python Code in Snowflake

AVAILABLE NOW The complex data environment today makes collaboration and the productization of data pipelines, machine learning (ML) models, and apps extremely difficult for data professionals, resulting in slow time to insight and leaving much invaluable data unrealized. Snowpark, a developer framework of Snowflake, was built to solve this exact challenge by allowing different data … continue reading

SD Times Live! microwebinar series – Value Stream Management

NEXT LIVE STREAM October 18th, 2022 @ 1:00PM ET | 10AM PT Topic 7 – “How Tool Integration and Automation Helps Ensure Compliance in Regulated Environments” SPEAKERS FOR THIS SESSION: ConnectALL’s Lance Knight, COO & President; Norman Miglietta, SVP Marketing; Dave Rubinstein, Editor-in-Chief of SD Times. In the last one decade, there has been a … continue reading

Bust This Myth: Software Quality is not Everyone’s Problem – Six Ways Tool Integration Dramatically Improves Test Management Processes and QA

AVAILABLE NOW Now, I got no fight with any man who does what he’s told, but when he don’t, the machine breaks down. And when the machine breaks down, we break down. And I ain’t gonna allow that in any of you. Not one. — Sgt Barnes, Platoon (1986) In our world of software delivery, … continue reading

You’ve Heard What Value Stream Management Isn’t. Now Hear the Truth About What It Is.

AVAILABLE NOW At ConnectALL, we have discussed ad nauseum what value stream management isn’t. We’ve told you that it is NOT a tool, NOT a feature, and NOT a map. It isn’t a person, it isn’t a platform, and it isn’t a set of metrics. Agile? DevOps? Also not value stream management. But what is less … continue reading

DevOps at Scale: Release Faster in More Complex Environments with Test Automation

How do you scale your testing to realize the full value of DevOps? In this session, Ethan Chung, Solutions Architect Manager at Keysight Technologies, will show how to expand testing coverage across complex applications with intelligent automation. Watch now to learn the basics of automation right through to building sophisticated test cases that integrate with … continue reading

Threat Landscapes: An Upstream and Downstream Moving Target

AVAILABLE NOW Hackers are becoming increasingly sophisticated and calculated in the ways in which they deliver attacks upstream in the software supply chain. There are growing numbers of organized attackers whose sole focus is exploiting vulnerabilities in open source ecosystems, frequently by making their malware appear legitimate. What’s new is the intensity, volume, frequency, and … continue reading

Write a year’s worth of code in 8 hours: Accelerate your Java pipeline with AI-assisted coding

AVAILABLE NOW Modern development strategies employ different tactics to deliver code more quickly, from agile planning to cross-functional teams to ‘shift left’. Unit testing has an important role to play, accelerating cycle times by detecting regressions at the earliest possible stage. Since testing remains a significant bottleneck in most CI pipelines, the gains can be … continue reading

Modernize Your Pipelines with Best Practices Built-In

AVAILABLE NOW Declarative pipelines provide a more modern, opinionated approach to pipeline creation and management. But what are they really? What benefit do they bring to your CI/CD processes? Our three expert panelists discussed: What declarative pipelines are and how they are used Where they are most useful Best practices around creating declarative pipelines in … continue reading

Introducing Contrast’s New Free Developer Security Tool – CodeSec!

AVAILABLE NOW As the need for code to be deployed faster grows every year. Code scanning has become a great part of the developer role. As such, Dev teams need a simple-to-integrate security tool that allows them to secure code quickly and accurately without disrupting their workflow. That is why Contrast is proud to introduce … continue reading

Protecting your Spring Boot applications from recent critical vulnerabilities

AVAILABLE NOW Spring Boot is a common framework for building Spring-based applications. But all frameworks have their risks, and Spring Boot is no exception. Recently, zero day vulnerabilities in the Spring Framework and Spring Boot have created increased demand for security for Spring Boot. For example, Spring Boot was recently impacted by the SpringShell vulnerability … continue reading

Preventing common vulnerabilities with Kiuwan’s SAST, SCA & QA tools

AVAILABLE NOW | SAST is a vulnerability scanning method that identifies risks early in the CI pipeline or within the IDE. As security moves right, coverage becomes increasingly challenging by implementing security earlier in the development cycle with the use of SAST, SCA & QA  – it automatically reduces the remediation work that can arise … continue reading

Creating and Implementing a test automation strategy for mobile app quality

AVAILABLE NOW In this webinar, SD Times and Kobiton’s Dev Evangelist Shannon Lee, discuss the value and importance of implementing an automation strategy for mobile in order to maximize business growth, and avoid common troubles when getting started. Watch this video at your convenience to learn: What is a test automation strategy and why you … continue reading

Next Page »
HTML Snippets Powered By :

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!