Hi [[ session.user.profile.firstName ]]

Application Development and Management

  • Date
  • Rating
  • Views
  • Cyber Security: Keeping Ahead of the Game with Micro Focus
    Cyber Security: Keeping Ahead of the Game with Micro Focus
    Darren Blumenthal, Stan Wisseman Recorded: Mar 14 2019 60 mins
    Join us to hear about the hot new technology trends and topics in the world of cyber security and how Micro Focus tools can help you stay ahead of the game with your cyber hygiene.

    This webinar is the first of its kind, as we are combining the Vivit Automation & Cloud Builders Special Interest Group and the Vivit Security Special Interest Group. This gives us an opportunity:

    •To align our thoughts and common practices
    •To learn from each other
    •To ensure we are all being cyber resilient
  • Robotic Process Automation - Based on Micro Focus OO & UFT
    Robotic Process Automation - Based on Micro Focus OO & UFT
    Michael Bettan, Guillaume Dubuc, Michael O’Rourke Recorded: Mar 12 2019 60 mins
    Robotic Process Automation (RPA) technology creates digital factories to automate and integrate any repetitive administrative tasks. RPA reduces labor-intensive processes by imitating human effort to complete tasks, thereby boosting the capabilities of companies that perform high-volume transactional processes. Operating non-invasively on the surface (UI layer) without compromising the underlying IT infrastructure, RPA bridges the technology gap between fragmented, semi-structured legacy systems. The RPA solution is based on industry leading products Operations Orchestration (OO) and Unified Functional Testing (UFT). During this session, you will learn more about this RPA solution with a live demonstration.

    At this session we will cover the What and Why of RPA, as well as, hear how some customers are already benefiting:

    •Save time and money and learn how growth in adoption of RPA technology by organizations is allowing for greater speed and scalability while at the same time reducing risk
    •Overcome manual limitations and gain efficiencies; RPA helps IT eliminate human errors introduced by workarounds and manual data entry, all while completing tasks in record time
  • Consolidating and Upgrading Multiple APM Instances with a Larger Retailer
    Consolidating and Upgrading Multiple APM Instances with a Larger Retailer
    Sarah Ware, Jay Batson Recorded: Feb 28 2019 58 mins
    Brought to you by the Vivit Application Performance Management Special Interest Group (SIG).

    After merging monitoring teams for consolidation and cost reduction opportunities, a larger retailer was faced with the challenge of merging the tools into one unified platform. We had two APM instances, both underutilized, that were good candidates to start with. The environments consisted of BSM 9.26 w/Oracle database and APM 9.40 w/SQL server.

    This webinar will walk through the deployment plan, problems, and successes we had along the way.


    •BSM9.2x to APM Comparison
    •Deciding on a Migration Path
    •Path of least resistance and down time
    •Prep work
    •Executing Plan
    •Moving things over
    •Shutting down decomd instance
    •Things you should know
    •Q and A session
  • What’s New in Container Storage
    What’s New in Container Storage
    Keith Hudgins, Docker; Alex McDonald, NetApp Recorded: Feb 26 2019 38 mins
    Containers are a big trend in application deployment. The landscape of containers is moving fast and constantly changing, with new standards emerging every few months. Learn what’s new, what to pay attention to, and how to make sense of the ever-shifting container landscape.

    This live webcast will cover:
    •Container storage types and Container Frameworks
    •An overview of the various storage APIs for the container landscape
    •How to identify the most important projects to follow in the container world
    •The Container Storage Interface spec and Kubernetes 1.13
    •How to get involved in the container community

    After you watch the webcast, check out the Q&A blog at http://bit.ly/2GPkFET
  • How to Modernize Applications in the Cloud Era
    How to Modernize Applications in the Cloud Era
    Jeffrey Deverter, Cloud Strategist, Cloudreach Recorded: Feb 21 2019 57 mins
    Learn from industry-leading Cloud Strategist Jeffrey Deverter how to modernize your applications using continuous deployment and continuous integration on the Cloud.

    Jeffrey will discuss a methodology that will enable you to modernize applications to reap several business benefits - including Agile improvements, transparency into the true cost of ownership of application operation - and share advice on how to drive business value and the direction of applications.
  • Emerging Application and Data Protection for Cloud
    Emerging Application and Data Protection for Cloud
    Ulf Mattsson, Head of Innovation, TokenEx Recorded: Feb 21 2019 62 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Learn about Data Protection solutions for enterprise.

    Learn about the new trends in Data Masking, Tokenization and Encryption.

    Learn about new Standards for masking from ISO and NIST.

    Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.
  • Scaling Collective Code Ownership & Code Reviews at LinkedIn - Nikolai Avteniev
    Scaling Collective Code Ownership & Code Reviews at LinkedIn - Nikolai Avteniev
    Nikolai Avteniev - Software Engineer, LinkedIn Recorded: Feb 21 2019 56 mins
    The contemporary code review practice has been adopted by many organizations and open source projects as a quality assurance measure. This process typically involves software tools such as Review Board and the time of one or more peer reviewers.

    However, there is a growing body of empirical research about this broadly‐adopted practice that can help us learn more about the effects of code reviews on software quality. Available research shows that in fact, peer code reviews are better suited for knowledge sharing and code improvements, rather than for eliminating code defects or reducing error rates. The effectiveness of the process seems to depend on the experience of the reviewer with the code, the size of the change set, and the rate at which the review is conducted.

    In this talk, Nikolai will share how the LinkedIn Flagship Product Engineering team leverages the code review process to spread organizational knowledge and uplevel individual contributors. I will also discuss the tools we’ve built to support this practice across a team which spans three offices, four development stacks, dozens of teams, and hundreds of individual contributors.
  • How to build low-cost, scalable Node.js APIs with Serverless and AWS Lambda
    How to build low-cost, scalable Node.js APIs with Serverless and AWS Lambda
    William Woodhead, Tech Lead and Co-Founder, Pilcro Recorded: Feb 21 2019 26 mins
    Switching from Express to Serverless has completely transformed the delivery of Pilcro’s APIs over the past 6 months.

    It has offered reduced cost, out-of-the-box deployment/scalability/monitoring, and lightning fast development.

    This talk outlines why we made the switch with a demonstration of setting up your first Node.js API with Serverless and AWS Lambda.
  • Not so FaaS, Hacker
    Not so FaaS, Hacker
    Aaron Weaver, Application Security Architect, OWASP and DefectDojo Recorded: Feb 20 2019 44 mins
    How fast can you build out a new security microservices? Building a security pipeline that scales with your development and operations team is achievable by creating security microservices that can be programmed in a variety of languages, cloud agnostic and infinitely scale.

    In this talk, Aaron will walk through the process of building a security automation pipeline starting with building containers in the first iteration and then moving to OpenFaaS to create simple Serverless functions. Building security automation into your program is essential in building out a scalable security services.
  • How to Prevent Mobile App API Abuse: Attacks and Counter-Measures
    How to Prevent Mobile App API Abuse: Attacks and Counter-Measures
    Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlue Recorded: Feb 20 2019 56 mins
    Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API security defenses as it beats back malicious ShipRaider.

    As ShipFast launches its mobile app with hidden API keys and OAuth2 user authorization, we'll start discussing the existing security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, app attestation and more will strengthen ShipFast's security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep exploiting ShipFast's API.

    This fast-paced overview of mobile attacks and counter-measures demonstrates the defense in-depth techniques required to protect both your mobile apps and your API backends.

Embed in website or blog