Vendor Forum

March 25, 2024
Peter Schneider
Qt Group

Software developers probably don't need to worry as much as they think about GenAI taking their jobs. But they do need to think twice about which language model they use. In fact, the Large Language Model (LLM) space is seeing something of a code generation arms race. How do you know which one's right for you? ...

March 21, 2024
Sandeep Hinduja
Newgen Software

Low-code development has been around for some time but has gained traction in recent years with a remarkable surge in its market share ... Financial institutions are using low-code for process automation, data modeling and visualization, data security, building customer-engaging applications, and more. Let's explore how this technology drives innovation in the financial services industry ...

March 20, 2024
Dotan Nahum
Check Point Software Technologies

Role Based Access Control (RBAC) is a method for regulating access to computer or network resources based on the roles of individual users within an organization. In RBAC, access permissions are grouped by role name, and access to resources is restricted to users who have been authorized to assume the associated role ...

March 11, 2024
Ernie Hu
CAST

Capturing institutional knowledge and insight into the mechanics of custom-built software has unique challenges. No two programmers think exactly alike, so documenting software development and coding changes is essential to keep products running. When a developer leaves or is let go, the remaining development team must rely on notes and documentation to understand their code structure ...

March 07, 2024
Dotan Nahum
Check Point Software Technologies

Sometimes, the most effective method of protection is to put yourself in the attacker's shoes so you can stay one step ahead of their next move. The same is true for penetration testing — If you can't beat 'em, join 'em ...

March 05, 2024
Christopher Hendrix
Styra

Policy as code is being explored by the industry as an alternative or expansion upon the long-term standards of role-based access control and entitlements. With policy as code, policies can be managed and automated using code written in a high-level language. It is a programmatic method of uniformly defining and enforcing policies throughout cloud native applications and their infrastructure ...

February 29, 2024
Lauren Hanford
Tidelift

Open source code is the bedrock of modern application development. Many applications are built almost entirely from open source components ... So what should you be looking for when making open source package choices for your applications? Here are ten critical questions to ask yourself before using an open source project ...

February 27, 2024
Salman Khan
LambdaTest

Software development is on the rise, and so are the expectations around its quality. When it comes to ensuring quality, there are various quality assurance (QA) techniques. As a tester, you can leverage different QA strategies, such as prioritizing and optimizing QA processes through CI/CD adoption, test orchestration, AI-based tooling, and more ...

February 26, 2024
Kenn Hussey
Ambassador Labs

Regardless of what kind of technology you're working with, boosting productivity is pivotal in today's market due to the proliferation of new innovations, the increase of AI, and an increasing consumer demand for a faster time to market. Developer productivity holds immense importance, not merely in coding faster but in making every minute count, particularly when time is constantly working against you ...

February 21, 2024
Stephen Feloney
Perforce Software

According to the 2024 State of Open Source Report — from Perforce in collaboration with the Open Source Initiative and the Eclipse Foundation — 95% of respondents say that they have increased or maintained their use of open source in 2023 (33% of those significantly so) ...

February 20, 2024
John Campbell
Security Journey

In the fast-paced world of modern business, application development teams face an immense amount of pressure to code faster than ever before ... However, prioritizing rapid development frequently leads to the neglect of security measures, creating a trade-off that can have significant repercussions, overburdening AppSec teams towards the end of the software development lifecycle (SDLC) and almost guaranteeing software vulnerabilities and exploits ...

February 14, 2024
Shay Levi
Noname Security

Everyone can agree that application programming interface (API) security is important, but whose responsibility is it? Many organizations don't have a clear answer — and this presents a major opportunity for developers to step up into an important new role: API champion ...

February 13, 2024
Keith Pitt
Buildkite

The personality types you often encounter in software development organizations can be divided into two basic categories: poets and librarians. Poets are the creative types who dream up big ideas. Librarians make sure high-quality code gets built on time. Their goals and motivations differ, but great software results when they work together harmoniously ...

February 07, 2024
Jori Ramakers
Tricentis

As companies move more and more of their operations to the cloud, it becomes increasingly important to ensure data integrity is maintained during migration. Data integrity in cloud-based environments is essential to ensuring that data remains accurate, consistent, and intact during migrations or transfers. However, cloud migration can be especially risky ...

February 06, 2024
Deepak Anupalli
Wavemaker

Agile development continually improves enterprise applications and shortens development time, helping companies stay competitive. Artificial intelligence (AI) automates processes to improve efficiency. Agile and AI low-code are naturally symbiotic, providing the means to streamline application development by building on existing software and components ...

Pages

Subscribe to Vendor Forum