Vendor Forum

January 10, 2023
Don Boxley
DH2i

In 2023, developers will demand solutions that enable highly available cloud-native SQL Server availability groups (AGs) in containers, including support for Kubernetes (K8s) clusters — across mixed environments and across any type of infrastructure or cloud ...

November 29, 2022
Noel Wurst
SmartBear

SmartBear conducted a survey to learn the methodologies, practices, and tools used by the software testing professionals worldwide who build, validate, and deliver software ... What did we discover? First, being able to keep pace with the increasing rates of release cycles — we saw it with quarterly and yearly release cycles this year — is a continuous challenge ...

November 21, 2022
Stephen Atwell
Armory.io

Imperative versus declarative deployment — which one is better? The answer: it depends. Development teams may prefer one over the other based on their workload capacity, infrastructure and desire for control. However, we are on the precipice of change. In the coming years, we will see a rapid shift to declarative automation in deployment ... Let's look at why many more teams are gravitating toward declarative deployment ...

November 16, 2022
Jori Ramakers
Tricentis

The future of DevOps is bright and the opportunities to utilize cutting edge artificial intelligence (AI) and machine learning (ML) applications of these technologies will only further enhance its adoption ...

November 15, 2022
Simon Taylor
HYCU

Data breaches cost US companies an average of $9.4 million — and by 2031, ransomware attacks will happen every two seconds. To address the scourge of cybercrime, we must all become data protectionists ...

November 14, 2022
Tom Tovar
Appdome

Mobile DevSecOps as it's currently implemented has a big problem: it's too slow and inefficient to keep up with the constantly evolving threat landscape. In the typical way of doing things, common tools like pen testing and code scanning identify known vulnerabilities, and the mobile app is then booted back to the development team where they manually add whatever protection they can within the time they have ...

November 08, 2022
Bryan Kirschner
DataStax

As companies look to innovate and advance, it has become clear that real-time applications are the path to growth. In fact, 71% of tech leaders confirmed a clear link between real-time data and revenue growth, indicating that the data race is not only heating up, but rapidly shifting toward real-time applications ...

November 02, 2022
Simon Ritter
Azul

Running Java, or any other JVM language, in the cloud comes with hurdles. Microservice architectures, quick scaling operations (scale up or down) to balance load requirements and cost effectiveness, as well as environments such as Kubernetes come with their own complexity in terms of Java ...

October 31, 2022
Shay Levi
Noname Security

We recently published The API Security Disconnect: API Security Trends in 2022, which reveals some striking disconnects between the respondents' experiences with API security incidents, their lack of awareness of their own APIs, and their confidence in cloud service providers and others to provide API security. The findings are more relevant today ...

October 26, 2022
Stephanie Best
Salt Security

Living in an API-dominated world poses unique challenges and risks to companies of every size. With ever-increasing digitalization, business leaders must look at traditional security measures in place and assess if they still adequately protect the organization from growing API threats ...

October 25, 2022
Terence Wong
Octopus Deploy

As a recent technology, containers have emerged as a tool that can help your business become more agile in your software development lifecycle. Containers have many benefits that can give you a competitive advantage compared with more traditional software delivery methods. In this post, I explain what containers are, share the key benefits of containers for software development, and discuss why you might consider adding them to your DevOps processes ...

October 24, 2022
Shelley Boose
Venafi

Most CIOs (82%) say their organizations are vulnerable to cyberattacks targeting software supply chains, according to a global study of 1,000 CIOs conducted by Venafi ...

October 18, 2022
Tomislav Pericin
ReversingLabs

The federal government has been quite busy building its case that both the private and public sectors need to address software supply chain risk head-on. However ... for the many software organizations out there that do not work directly with the federal government, what can serve as their source of truth for software supply chain security? ...

October 17, 2022
Tal Melamed
Contrast Security

Ever experience a serverless nightmare? ... Read on for what we see as the top three serverless mistakes that can similarly get you into trouble ...

October 13, 2022
Benjamin Brial
Cycloid

Cloud computing has become the cornerstone for businesses looking to scale infrastructure up or down quickly according to their needs with a lower total cost of ownership. But far from simplifying the IT executive's life, the expanded use of the cloud is introducing a whole new level of concept and complexity ...

Pages

Subscribe to Vendor Forum