AVAILABLE NOW Now, I got no fight with any man who does what he’s told, but when he don’t, the machine breaks down. And when the machine breaks down, we break down. And I ain’t gonna allow that in any of you. Not one. — Sgt Barnes, Platoon (1986) In our world of software delivery, … continue reading
AVAILABLE NOW At ConnectALL, we have discussed ad nauseum what value stream management isn’t. We’ve told you that it is NOT a tool, NOT a feature, and NOT a map. It isn’t a person, it isn’t a platform, and it isn’t a set of metrics. Agile? DevOps? Also not value stream management. But what is less … continue reading
How do you scale your testing to realize the full value of DevOps? In this session, Ethan Chung, Solutions Architect Manager at Keysight Technologies, will show how to expand testing coverage across complex applications with intelligent automation. Watch now to learn the basics of automation right through to building sophisticated test cases that integrate with … continue reading
AVAILABLE NOW Hackers are becoming increasingly sophisticated and calculated in the ways in which they deliver attacks upstream in the software supply chain. There are growing numbers of organized attackers whose sole focus is exploiting vulnerabilities in open source ecosystems, frequently by making their malware appear legitimate. What’s new is the intensity, volume, frequency, and … continue reading
AVAILABLE NOW Modern development strategies employ different tactics to deliver code more quickly, from agile planning to cross-functional teams to ‘shift left’. Unit testing has an important role to play, accelerating cycle times by detecting regressions at the earliest possible stage. Since testing remains a significant bottleneck in most CI pipelines, the gains can be … continue reading
AVAILABLE NOW Declarative pipelines provide a more modern, opinionated approach to pipeline creation and management. But what are they really? What benefit do they bring to your CI/CD processes? Our three expert panelists discussed: What declarative pipelines are and how they are used Where they are most useful Best practices around creating declarative pipelines in … continue reading
AVAILABLE NOW As the need for code to be deployed faster grows every year, code scanning has become a great part of the developer role. As such, Dev teams need a simple-to-integrate security tool that allows them to secure code quickly and accurately without disrupting their workflow. That is why Contrast is proud to introduce … continue reading
AVAILABLE NOW Spring Boot is a common framework for building Spring-based applications. But all frameworks have their risks, and Spring Boot is no exception. Recently, zero day vulnerabilities in the Spring Framework and Spring Boot have created increased demand for security for Spring Boot. For example, Spring Boot was recently impacted by the SpringShell vulnerability … continue reading
AVAILABLE NOW | SAST is a vulnerability scanning method that identifies risks early in the CI pipeline or within the IDE. As security moves right, coverage becomes increasingly challenging by implementing security earlier in the development cycle with the use of SAST, SCA & QA – it automatically reduces the remediation work that can arise … continue reading
AVAILABLE NOW In this webinar, SD Times and Kobiton’s Dev Evangelist Shannon Lee, discuss the value and importance of implementing an automation strategy for mobile in order to maximize business growth, and avoid common troubles when getting started. Watch this video at your convenience to learn: What is a test automation strategy and why you … continue reading
AVAILABLE NOW What better way is there to understand something than to consider its transformation through time and experience? This time, we are talking about Value Stream Management. In this webinar, SD Times is hosting a talk with ConnectALL’s newly appointed SVP of Operations and Customer Success Charles ‘Scot’ Garrison, and President & COO of … continue reading
AVAILABLE NOW As an alternative, successor, and child to REST, GraphQL inherits the old security challenges of its antecedent and adds new security challenges of its own. In this session, we will review how to apply old REST security recipes in order to establish a solid baseline. Then, we will learn how to upgrade our … continue reading