Vendor Forum

July 25, 2019
Matt Hilbert
Redgate Software

Wherever you are in the world, data privacy is now a major regulatory and consumer concern. The introduction of the GDPR in 2018 ushered in tough new rules for anyone dealing with the personal data of European Union citizens, while a string of cases involving either hacking or the improper use of data has led to consumers everywhere becoming more aware of how their information is used and protected ...

July 24, 2019
Dave Karow
Split Software

It’s the big day, and your team is excited to implement the new features on your company’s grocery shopping app. You’ve been working on the code for weeks and ensuring that everything will run smoothly by planning for a canary release. Your stakeholders are eagerly awaiting the feedback and press coverage from the launch of these new features — no pressure ...

July 18, 2019
Cynthia Dunlop
Tricentis

The way that we develop and deliver software has changed dramatically in the past 5 years — but the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? ...

July 16, 2019
Tom Hickman
Edgewise Networks

Security teams must prepare for the certainty that, eventually, something malicious will gain a foothold in the network. In response, security teams are refocusing their work on the need to harden internal network security. And the methodology they're turning to is zero trust ...

July 15, 2019
Eric Sheridan
WhiteHat Security

Step 9 of the Twelve-Factor App discusses disposability, which means that apps built using the twelve-factor methodology can be started or stopped at a moment's notice ...

July 11, 2019
Drew Horn
Applause

Do you hear that sound? It's a steady chorus coming from your QA team repeating, "No rest for the weary. No rest for the weary." It's become something of a mantra in QA as deadlines have tightened and consumer expectations continue to rise ...

July 09, 2019
Brook Schoenfield
IOActive

"Shift Left" has become an ever-present meme amongst DevOps and the security folk concerned about or working with DevOps. To "shift left" means to attend to something as early in development as possible, based on the assumption of left-to-right mapping of development activities ...

June 27, 2019
Steve Jones
Redgate Software

DevOps brings enormous competitive advantage to businesses. However, at the same time there is an intense and growing focus on data security and privacy. Whether it's through regulations such as the GDPR or increasing consumer expectations that their personal information will be kept safe and used responsibly, it's business-critical that organizations take these concerns seriously ...

June 25, 2019
Malcolm Isaacs
Micro Focus

DevOps thrives on automation, and it's clear why: manual processes are slow, error-prone, and inconsistent. In practice, automation rates, especially for testing, are very low, so achieving effective test automation can be challenging, but there are steps that you can take to increase test automation in your organization ...

June 24, 2019
Joshua Platt
SmartDraw Software

Any time you embark on a new initiative across your organization getting buy-in is critical. This is especially true of DevOps initiatives. The nature of DevOps dictates that adopting it impacts engineers, sys admins, quality assurance, and the executives setting priorities for quarters ahead ...

June 20, 2019
Rod Cope
Perforce

Alongside the general emphasis in the industry on making software development safer, the growing use of more complex programming languages — notably C++ — has added to the challenge. While C++ gives developers a far more scope for creativity and innovation, its flexibility makes it easier for individuals to inadvertently create coding errors — take for example, memory leaks — that can lead to software vulnerabilities ...

June 19, 2019
Adam Zimman
LaunchDarkly

While you’re still in the planning phase for a new feature, it’s a good idea to also think about how you will release it. This is something often done within the design process ...

June 17, 2019
Antony Edwards
Eggplant

Overall, C-suite executives are happy with the applications and solutions that come out of the pipeline. However, businesses are still frustrated by the speed of delivery, according to a recent study from Forrester Consulting, commissioned by Eggplant. The research identified that improving the customer experience is the number one goal for organizations when planning and orchestrating their software strategy ...

June 13, 2019
Murli Thirumale
Portworx

Responses to our annual Container Adoption Survey — conducted jointly by Portworx and Aqua Security — have shown a clear uptick in how complex containerized applications have become, demonstrating that IT organizations are increasingly confident that container infrastructure can manage business-critical applications. However, this year's responses also suggest a continuing lack of clarity when it comes to who's responsible for container security ...

June 10, 2019
Chris O'Malley
Compuware

Most innovative web-based applications ultimately depend on finely tuned mainframe code to complete their basic functions. This tuning should begin with individually and independently scrutinizing the smallest part — the unit — of an application for proper operation ...

Pages

Subscribe to Vendor Forum