Vendor Forum

October 11, 2018
Eric Robertson
CollabNet

Agile is indeed expanding across the enterprise and there was a significant jump from last year to this year in the percentage of respondents who indicated that all or almost all of their teams were agile, according to the State of Agile 2018 report from CollabNet ...

October 04, 2018
Chris Colosimo
Parasoft

How do you integrate tools to enable shift-left performance? The following tools will simplify maintenance, can be managed in a centralized way, and provide an easy-to-use UI to comprehend results ...

October 03, 2018
Chris Colosimo
Parasoft

Focusing at the API layer of an application can help enable a scalable testing practice that can be efficiently executed as part of an accelerated delivery process, and is a practice that can be adopted and enabled at the earliest possible stages of development — truly shifting left functional testing. But what about performance testing? How do we enable the shift left of nonfunctional testing? Here, we explore what this means and how to enable it in your organization ...

September 27, 2018
Kalyan Ramanathan
Portworx by Pure Storage

Imagine that you are tasked with architecting a mission-critical cloud application. Or migrating an on-premise app to the cloud. You may ask yourself, "how do the cloud savvy companies like Airbnb, Adobe, SalesForce, etc. build and manage their modern applications?" ...

September 24, 2018
Nigel Kersten
Puppet

From how applications and infrastructure are developed, configured and built to how they are tested and deployed, pervasive automation is the key to achieving better efficiency and standardization that gives companies the competitive edge. Pervasive automation is the concept of scaling automation broadly and deeply across the entire software delivery lifecycle ...

September 20, 2018
Matt Hilbert
Redgate Software

The latest Accelerate State of DevOps Report from DORA focuses on the importance of the database and shows that integrating it into DevOps avoids time-consuming, unprofitable delays that can derail the benefits DevOps otherwise brings. It highlights four key practices that are essential to successful database DevOps ...

September 17, 2018
Ron Lifton
NETSCOUT

The role of DevOps in capitalizing on the benefits of hybrid cloud has become increasingly important, with developers and IT operations now working together closer than ever to continuously plan, develop, deliver, integrate, test, and deploy new applications and services in the hybrid cloud ...

September 12, 2018
Eric Sheridan
WhiteHat Security

This next blog examines the security component of step four of the Twelve-Factor methodology — backing services. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

September 10, 2018
Jennifer Andre
Rapid7

When thinking about security automation, a common concern from security teams is that they don't have the coding capabilities needed to create, implement, and maintain it. So, what are teams to do when internal resources are tight and there isn't budget to hire an outside consultant or "unicorn?" ...

September 04, 2018
Mary Robbins
Redgate Software

There's a welcome insight in the 2018 Accelerate State of DevOps Report from DORA, because for the first time it calls out database development as a key technical practice which can drive high performance in DevOps ...

August 22, 2018
Taylor Armerding
Synopsys

Only half of CI/CD workflows include application security testing elements despite respondents citing awareness of the importance and advantages of doing so, according to DevSecOps Realities and Opportunities, a survey conducted by 451 Research, commissioned by Synopsys ...

August 20, 2018
Jennifer Andre
Rapid7

As the security industry continues to evolve, one thing remains consistent – teams are still struggling with balancing the increasing amount of work they have to do, without an increase in resources to accomplish their goals. In turn, it is becoming progressively more difficult for teams to be successful and accomplish their goals. However, while this is prominent theme, a lesser-known problem has risen, which I like to refer to as "security as a silo" – a different kind of SaaS ...

August 16, 2018
Maty Siman
Checkmarx

There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities ...

August 15, 2018
Reuven Harrison
Tufin

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 06, 2018
Eric Sheridan
WhiteHat Security

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

Pages

Subscribe to Vendor Forum