Vendor Forum

April 08, 2019
Eric Sheridan
WhiteHat Security

In this seventh step, the Twelve-Factor methodology encourages the integration of the network handling traffic code inside your running application ...

April 04, 2019
Paul Clauson
Functionize

Testing automation is in need of a revolution.So, let's banish the QA winter and usher in the QA spring. A review of problems throughout a test lifecycle cements the need for autonomous testing ...

April 01, 2019
Drew Horn
Applause

In your journey to mature test automation within your deployment pipeline, you will move through three distinct stages: beginner, intermediate, and expert. We will explore the beginner stage in part one of this series ...

March 28, 2019
Eran Kinsbruner
Perfecto by Perforce

The rise in "codeless" development and delivery is translating over to the DevOps world — even for those who are well-versed in coding and the numerous different languages that come with it. So much so that codeless test automation has become a top priority for testers, as well as the developers who are now also taking on some of those testing responsibilities ...

March 25, 2019
Nigel Kersten
Puppet

As companies change the way they deliver IT services and software, businesses need the right talent who can adapt to this shift and raise the bar for software delivery. This is proven to be true with Puppet’s fifth annual 2018 DevOps Salary Report, revealing that as the IT jobs landscape continues to evolve, larger organizations with more complex infrastructure are paying more for better talent and diverse skills ...

March 21, 2019
Brad Micklea
Red Hat

Containers and Kubernetes have become the most talked about way for services and applications to be deployed and managed. Already loved by development teams, there are an increasing number of businesses using Kubernetes and containers in production. There's a strong benefit to having DevOps and containers grow simultaneously because they have a symbiotic relationship. Containers have several qualities that make them well suited to DevOps-oriented teams ...

March 20, 2019
Tim Woods
FireMon

Cloud-based business initiatives are accelerating faster than security organizations' ability to secure them, according to the State of Hybrid Cloud Security Survey from FireMon. The survey revealed 60% of respondents either agreed or strongly agreed that this was happening in their organizations ...

March 18, 2019
Glen Rabie
Yellowfin

Are you a software product owner? Then you need to embrace the race to AI and automation and ensure you meet customers' needs for data insights and to stay competitive. To keep up in this race, you have two options as a software product owner: build your own analytics capability, or embed a third party analytics platform ...

March 13, 2019
Joe Kim
SolarWinds

While developers have the power to change the world with each tap of the keyboard, results from SolarWinds Cloud Confessions: The Trouble with Troubleshooting revealed a disconnect between technology pros' skills to innovate and the tasks they must deal with on an everyday basis. Troubleshooting application issues was the No. 1 activity on which tech professionals (including web product managers (WPMs), developers, and DevOps teams) spend their time, which results in less time for product development and innovation ...

March 11, 2019
Ali Golshan
StackRox

Companies are struggling to address the gap that exists between how they're using containers and their level of confidence about security and misconfigurations. The more containers dominate application development, the more imperative it is to integrate container security measures throughout the process, bringing it earlier in the app dev process and integrating it with the orchestration layer. Portability and integration are critical as companies are trying to simultaneously operationalize and secure containers and microservices across hybrid and multi-cloud deployments. The lag between container security and container adoption represents significant risks to individual businesses as well as the broader ecosystem. It's time to close this security gap before it widens, and DevOps has a central role to play ...

March 05, 2019
Bob Davis
Plutora

Feeling the constant pressure to deliver faster and more frequently, without compromising value, companies are looking for a way to control the overall process from the development level up to c-suite leadership. To make it work, they are turning to value stream management (VSM) ...

March 04, 2019
Eric Sheridan
WhiteHat Security

Step 6 of the Twelve-Factor App methodology encourages executing the app as one or more stateless processes. Here is some actionable security-focused advice which developers and ops engineers can follow during the SaaS build and operations stages ...

February 28, 2019
Taylor Armerding
Synopsys

Given the risks, container security presents unique challenges. But the right tools, practices, and strategies can overcome them. As is the case with any security initiative, there is no silver bullet that will guarantee security of containerized applications, so organizations should use a combination of techniques and solutions suited to their IT governance requirements. Here are some common approaches, including their pros and cons ...

February 27, 2019
Taylor Armerding
Synopsys

To design an effective container security strategy, organizations first need to understand the risks that attackers could exploit to make them leak. If you don't know the risks, how can you avoid them? Here are a few ...

February 25, 2019
Tushar Patel
Cleo

In a digital survey on integration challenges, the respondents were very forthcoming about the state of their current integration solutions and their roles in driving business outcomes. The consensus was that many of their solutions – the bulk of which are homegrown or greatly modified with custom code – are costly to maintain, require specific skill sets, are susceptible to data errors, and jeopardize business opportunities ...

Pages

Subscribe to Vendor Forum