The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
An accessible mobile internet and the app economy changed the way we work over the last decade. Since then we have seen a fast progress in the world of automation, machine learning and data sciences. These new improvements in technology have mobilized companies and organizations to be faster and more efficient. But it has also come at a cost.
With Blockchain revolutionizing everything from retail operations to finance, we will take a hard look at how a combination of these technologies will change the way the PMO operates. We will look at the potential pros and cons of how fast emerging technologies create disruption and how to get ahead of it.
Join us to learn about the benefits of containers on AWS and how they can help you create consistency, gain operational efficiency, and improve productivity. We'll cover Amazon ECS, Amazon ECR, Amazon EKS and Fargate.
Containers on AWS are a major resource for developers looking to improve infrastructure efficiency. Watch our webinar to learn several techniques for deploying containers on AWS. We’ll discuss the pros and cons of differing approaches, and explore a live demo.
The marketplace is changing so quickly that we need a paradigm shift in how we enable innovation in the large enterprise. When an innovation culture is relegated exclusively to the startup, our biggest brands—those who employ most of the people and drive most of the world's economy—are at risk for their very survival. And yet, sometimes it seems that the larger and more successful the company, the more difficult it is to innovate. Fortunately, Lean and Agile development gives us many of the tools we need to apply that momentum to new innovations, and to do so at enterprise scale. And now, the Scaled Agile Framework® (SAFe®) and other industry trends bring new mindsets and thinking to bear on this challenge.
In this session, Dean Leffingwell will illustrate how seemingly disparate practices—like Agile, scaled Agile, Lean Startup, Lean UX, DevOps, and Continuous Delivery—need not be separate initiatives, but rather a continuum that helps enterprises delivery more innovative solutions at a velocity they could only imagine before. From Minimum Viable Product to Minimum Marketable Feature, to the-smallest-package-that-can-be efficiently-released-into-production, Dean will discuss how reducing batch size enables fast feedback, and is the one elemental practice that binds them all.
Continuous delivery is becoming increasingly critical but it still remains a hard problem many enterprises struggle with. We will present lessons learned from the CI/CD transformation of 1000s of legacy monolith applications and how to achieve new levels of automation for cloud applications in day 0 and day 1+ scenarios.
We will show how to fully automate to achieve true continuous delivery using Ansible and Avi. We will show how to use analytics to express and automate application evaluation and ML-based traffic switching without any downtime.
Attendees of this webinar will learn:
- What Canary and Blue/Green continuous delivery patterns are
- What decisions are involved in continuous delivery
- How to define and measure SLAs as applications are upgraded
- How to avoid service and traffic disruptions during the continuous delivery
- How to automate continuous delivery using Ansible and Avi
See a live demonstration of K2 and Blue Prism working together to demonstrate how you can deliver intelligence automation in Financial Services with RPA and BPA. Andrew Murphy, VP of EMEA at K2, provides practical insights on how to approach intelligent automation - resources, timing and tooling - to jumpstart your road to digital automation.
Mobile app crashes lose you revenue, loyalty, and potential customers due to poor user ratings at the App Store or Play Store.
But stack traces, the traditional debugging method, can leave you with more questions than answers. Learn how to keep your apps healthy and customers happy by fixing crashing apps more quickly, and for good.
This invaluable lesson on debugging apps will teach you how to:
- Access a full context of user behavior, application flow, and code execution
- Reduce your Mean Time to Identification of a crash issue
- Eliminate costly trial and error, replicating, or not finding the issue at all
The health of your apps is too important to your business to pass up these valuable tips. Register now.
DevOps. Microservices. Containers. These terms have a lot of buzz for their role in cloud-native application development and operations. But, if you haven't automated your tests and builds with continuous integration (CI), none of them matter.
Continuous integration is the automation of building and testing new code. Development teams that use CI can catch bugs early and often; resulting in code that is always production ready. Compared to manual testing, CI eliminates a lot of toil and improves code quality. At the end of the day, it's those code defects that slip into production that slow down teams and cause apps to fall over.
The journey to continuous integration maturity has some requirements. Join Pivotal's James Ma, product manager for Concourse, and Dormain Drewitz, product marketing to learn about:
- How Test-Driven Development feeds the CI process
- What is different about CI in a cloud-native context
- How to measure progress and success in adopting CI
Dormain is a Senior Director of Product and Customer Marketing with Pivotal. She has published extensively on cloud computing topics for ten years, demystifying the changing requirements of the infrastructure software stack. She’s presented at the Gartner Application Architecture, Development, and Integration Summit; Open Source Summit; Cloud Foundry Summit, and numerous software user events.
James Ma is a product manager at Pivotal and is based out of their office in Toronto, Canada. As a consultant for the Pivotal Labs team, James worked with Fortune 500 companies to hone their agile software development practices and adopt a user-centered approach to product development. He has worked with companies across multiple industries including: mobile e-commerce, finance, heath and hospitality. James is currently a part of the Pivotal Cloud Foundry R&D group and is the product manager for Concourse CI, the continuous "thing do-er".
Artificial Intelligence, Machine Learning, Deep Learning are the buzz words across the globe today. Businesses, as well as people, are trying to make out if it is simply hype or not. While there is hope there is also gloom somewhere, as far as AI is concerned. There is a lot of work to be done to ensure effective and valid deployment of AI solutions.
Today’s AI concern is Frameworks and toolsets to manage the entire lifecycle in an integrated manner to ensure dependable results - which is the burgeoning need for AI to move forward. In this discussion, we will be focussing on some of the important challenges faced with respect to resources, frameworks, tools, and techniques for implementing AI and also the direction it is trending towards.
Security breaches are on the rise. According to the Verizon Data Breach Investigations Report 2018, web application attacks are the number one source of breaches, but web application security—especially as web applications are increasingly deployed outside of traditional on-premise environments—is lagging. As a result, regulations and compliance needs are increasingly reinforcing the need for web application security. This webinar will focus on regulations such as GDPR, PCI DSS, and HIPAA and their impact on what you need to do for web security. You will learn how advances in Web Application Firewalls and application insights can help you achieve your security and compliance goals.
Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.
Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
Transform your entire organization, not just a part of it. Take a modern look now that the world is focusing on business agility rather than thinking about team-level or even scaled Agile.
Many people and businesses believe that “doing Agile” will solve all their business and organizational problems. The truth is that “doing Agile”, especially team-level agility, is not the same as being an agile organization.
Authors Doug Dockery and Laureen Knudsen share their years of experience in transforming corporations and organizations to successfully compete and win in today’s fast-paced markets. Using proven techniques and stories of actual experiences in a multitude of organizations, Doug and Laureen relate what it takes to successfully transform your organization, as well as how to tell if your transformation is working.
This webinar details what you need to know to transform your business to deliver value and thrive. Coverage includes:
•What Agile means to an executive and the benefits you should be seeing
•The top failure modes and why so many transformations fail
•A framework for success, including an operational framework and a transformation framework
•How big data internal to a company is needed to successfully run a world-wide corporation today
•The definition of a modern business and what it looks like
In today’s environment data protection is more critical than ever and businesses are responding. This 13th edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals how increased cloud use and accelerated compliance initiatives are driving adoption of new encryption strategies. Join Dr. Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:
• Growth in encryption and Hardware Security Module (HSM) usage
• The importance of performance, scalability and consistent policy enforcement across enterprise and cloud use cases for encryption solutions
• Trends in encryption deployment across multiple vertical markets and geographies that are useful for benchmarking
The move to the cloud coupled with shifts to organisational structures and application architectures is driving agility and innovation.
Enterprises that are undertaking this transformation are following in the footsteps of the digital natives, be it Google, Facebook or Amazon.
Join this webinar to learn:
* Why the cloud means your data strategy needs to adapt
* What do you need to consider when building your data strategy
* How a cloud data strategy can help accelerate digital transformation initiatives and drive tangible business value
As customer expectations shift to mobile and on-demand solutions, no matter which industry you are in, the experiences you offer must be constantly evolving to remain competitive. How do you approach the architecture of your ICT to ensure you’re not being left behind?
Hear from Stefan Okhuijzen, SVP Business Applications at SES, a world-leading satellite operator with over 50 satellites reaching 99% of the world’s population, on how SES is shifting their business model through connectivity to transform customer experience.
Attendees will learn:
- Best practices to implement delightful customer experiences, such as an innovative customer portal to improve transparency
- How SES is shifting from a B2B to a B2C business model to differentiate itself, supported by the exposure of reusable APIs
- How adopting an API-led approach to connectivity can help you speed up the digital transformation process
As the era of cloud computing continues to grow more significant, services like containerization and microservice architecture are increasing in popularity, allowing enterprises to adopt a more agile and transformative framework for future growth. Within this trend, software containers are helping developers incorporate new microservice application designs, build and release code faster, and push fixes through testing more frequently. However, with the use of containers comes an unforeseen layer of risk that many cyber security professionals are struggling to mitigate.
Join this 20-minute webinar to learn how you can safeguard your containerization strategy against security risk. Hear one of CA Veracode’s platform implementation experts discuss the best approach to securing your container usage including how to:
•Inject Security Into The Container During Development
•Secure The Container During Testing And modification
•Monitor And Guard Containers In Production
If used correctly, Real User Monitoring, or RUM, can deliver immediate performance results and greatly improve user experience. However, implementing RUM and actually realizing these improvements can be a challenging project without clear direction - How do you collect the data? How do you use the data? How do you keep the data secure?
In this webinar, we introduce Pulsar, NS1's advanced RUM engine. Pulsar seamlessly integrates with our DNS platform so you can quickly and easily enable granular, automated, and optimized traffic routing.
We'll also cover:
- NS1's Filter Chain - our point and click traffic management technology
- Demonstrate how to leverage Pulsar with the Filter Chain
- Understanding "Best Practices" when combining the Pulsar filter with other filters
- Using NS1's community cloud & CDN data or bringing your own data
This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.
For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.
Following the MSI highlights, we'll cover the following topics:
Encore of "The Emergent Cloud Security Toolchain for CI/CD" given at RSA Conference 2018 in San Francisco.
All organizations want to go faster and decrease friction in their cloud software delivery pipeline. Infosec has an opportunity to change their classic approach from blocker to enabler. This talk will discuss hallmarks of CI/CD and some practical examples for adding security testing across different organizations. The talk will cover emergent patterns, practices and toolchains that bring security to the table.
1: Learn the emerging patterns for security in CI/CD pipelines.
2: Receive a pragmatic security toolchain for CI/CD to use in your organization.
3: Understand what the real meaning of DevSecOps is without all the hype.
Most developer testing strategies require developers to pull double-duty, juggling both writing code and testing it. Although adding testing tools and procedures to developer processes can increase code quality and ownership, it slows down productivity significantly.
How do organizations empower their developers to own quality without creating distractions that take them away from building and releasing innovative, new features?
In this webinar, we’ll cover:
1. Trade-offs to consider between standalone vs. embedded QA teams
2. How a developer-owned QA team can effectively collaborate on testing ownership and code quality
3. Tools and setups that enable individual developers to manage their QA processes end-to-end
To learn more about the realities of DevSecOps today and the real degree to which security is or is not being included in enterprise continuous integration/continuous delivery workflows, we surveyed 350 decision-makers at large enterprises across a variety of industries.
What we found is that only about half of enterprise CI/CD workflows include any security elements at all, highlighting ample room for improvement. Enterprises did seem to show an awareness of the importance of adding security elements into DevOps releases, but they are not necessarily injecting security early in the process -- ideally at code commit and in pre-implementation. This webinar will cover these and other results of our survey, and offer guidance on how enterprise organizations can effectively integrate security tools, thinking and people into their CI/CD workflows to reduce rework and risk without sacrificing velocity.
Digital transformation has disrupted the payments ecosystem. Recent technology innovations around contactless payment have transformed the payment industry by providing concrete advantages and benefits to both merchants and consumers. Applying contactless functionality to traditional payment cards can enable a better customer experience based on convenience and ease of use. Furthermore, by promoting contactless payment, merchants can improve their operational efficiency through faster digital transactions that reduce payment times. The infrastructure deployed to process contactless payments must be certified and aligned with the latest security standards to ensure success.
· Understand the recent specifications and requirements published for Latin America
· Hear about the new Visa deadline regarding contactless implementation
· Find out how your organization can derive competitive advantage by embracing contactless payments
· Discuss expected industry transformation with key industry stakeholders
Imagine automating away the drudgery of repetitive daily tasks and manual processes to focus on delivering more value to your business. Consider your current process: Do you find that delivering an application into production involves a multitude of trivial tasks? Do these tasks create friction between developer teams and IT operations?
These painful deployments not only lead to poor quality, but may also create shadow IT or deter deploying to production altogether, which results in lower citizen satisfaction. Operations teams play a crucial role in implementing new DevOps processes and speeding time to market for new apps.
Join this webinar to learn how to:
-Reduce complexity with consolidation.
-Decrease security concerns and delays.
-Give your team more time to innovate.
Although security and identity management is a crucial aspect for any application, its implementation can be difficult. Worse, it’s often neglected, poorly implemented, and intrusive in the code. Recently, identity management servers have appeared that allow one to outsource and delegate all aspects of authentication and authorization, such as https://auth0.com/. Of these servers, one of the most promising is Keycloak—open source, flexible, agnostic of any technology and is easily deployable and adaptable in its own infrastructure.
In this session, we’ll discover KeyCloak progressively and in an interactive way:
-No slides, just 100% live coding
-Focused on the Spring Boot adapter provided by Keycloak
-Showing how to combine Spring Security with Keycloak
Digital transformation is a critical part of an enterprise business strategy. However, for many organizations, having more digital assets introduces major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. The ability to use cloud based solutions to service digital strategies is helping reduce costs but is also increasing risks, isolating data and reducing controls.
Many MSPs have recognized this as an opportunity and are building business plans and service strategies to help their customers. Being the one-stop shop for applications, cloud services and related security aspects is a path that is actively being trodden by MSP’s, MSSP’s and traditional resellers alike. According to 451 Research, it is about a “sell with” approach by addressing business requirements with security “built-in”. In this joint webinar, our guest William Fellows, 451 Research analyst will provide new research results this related data points and discuss how the cloud is creating opportunities as well as challenges. The interactive Q&A style webinar will cover:
• A current view of the cloud’s impact on digital transformation
• Opportunities for MSPs to expand service portfolios and generate new revenue streams
• What a true “sell with” partnership looks like
• Technology enabling this new sales and marketing strategy for MSPs
William Fellows is a co-founder of The 451 Group. As VP of Research, he is responsible for the Cloud Transformation Channel at 451 Research.
Gary Marsden: Senior Director of Partnerships at Gemalto
Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.
In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.
- What social enhancements are available in the latest release of Sitefinity
- Some useful ideas to increase the social savviness of your website
- How to integrate a social platform into Sitefinty using OAuth
Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
There is a lot of discussion nowadays on how to use containers in production - are you there already?
When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From an agnostic monitoring solution perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc).
In today’s digital-first market, financial services organizations are only as competitive as their ability to rapidly develop and deploy new applications and products, provide optimal customer service while still maintaining or exceeding industry compliance and security standards.
Join Stelligent CTO Paul Duvall to learn how customers are driving a digital transformation strategy through DevOps automation on Amazon Web Services (AWS) to provide superior digital customer experiences and gain a competitive edge.
About Stelligent: Stelligent provides DevOps automation professional services on AWS, enabling engineering teams to focus on creating software users love. Our goal is to work closely with customers to develop fundamentally secure infrastructure automation code, deployment pipelines, and feedback mechanisms for faster, more consistent software and infrastructure deployments. As a Premier AWS Consulting Partner, and AWS DevOps and Financial Services Competency holder, we use our demonstrated expertise to help customers benefit from continuous AWS innovation.
Find out why data protection and encryption is an essential component of preparing for your GDPR readiness process.
Specifically, we will cover:
What is considered "Personal Data" and why it needs to be "protected"
The Legal Aspects of Data Protection under GDPR.
The technical ways to protect/pseudonymization
In this Session you will learn from the leading experts:
- Ulf Mattsson: The father of database Encryption.
- Martyn Hope: The Co-Founder of the GDPR Institut.
- Mark Rasch: Former Chief Cybersecurity Evangelist at Verizon and led the DOJ's Cyber Crime Unit.
The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).
As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.
One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.
In this webinar, Yubico and Ping Identity will discuss:
● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement
Alex Yakubov, Senior Director - Ecosystem (Yubico)
Management Foundations (Cherwell Software bietet einen besseren Weg, um transformierende, neue Business-Projekte umzusetzen).
Sich schnell ändernde Kundenanforderungen, technische Innovationen sowie ein dynamischer Wettbewerb gehören für viele Unternehmen zur Norm. Aber genau jene Elemente, die Stabilität sichern, können die Fähigkeit der Zusammenarbeit und Reaktionsfähigkeit beeinträchtigen. Freuen Sie sich auf Prozesse, die zur Stabilität beitragen und das effiziente Erreichen strategischer Ziele mit Cherwell Project Portfolio Management Foundations ermöglichen.
Cherwell Software bietet einen besseren Weg, um transformierende, neue Business-Projekte umzusetzen.
With most enterprises using a mix of Agile, Waterfall and Hybrid methodologies for the delivery of their applications decision makers are struggling to get end-to-end visibility in to the progress of their products and services. With the trend towards autonomous teams using tools of their choice, find out how Micro Focus’ Octane can help by aggregating data from various sources to help plan, build, test & track progress regardless of your chosen methodology or toolset.
Implementing AI applications based on machine learning is a significant topic for organizations embracing digital transformation. By 2020, 30% of CIOs will include AI in their top five investment priorities according to Gartner’s Top 10 Strategic Technology Trends for 2018: Intelligent Apps and Analytics. But to deliver on the AI promise, organizations need to generate good quality data to train the algorithms. Failure to do so will result in the following scenario: "When you automate a mess, you get an automated mess."
This webinar covers:
- An introduction to machine learning use cases and challenges provided by Kirk Borne, Principal Data Scientist at Booz Allen Hamilton and top data science and big data influencer.
- How to achieve good data quality based on harmonized semantic metadata presented by Andreas Blumauer, CEO and co-founder of Semantic Web Company and a pioneer in the application of semantic web standards for enterprise data integration.
- How to apply a combined approach when semantic knowledge models and machine learning build the basis of your cognitive computing. (See Attachment: The Knowledge Graph as the Default Data Model for Machine Learning)
- Why a combination of machine and human computation approaches is required, not only from an ethical but also from a technical perspective.
Clinical practice guidelines are systematically developed statements based upon prevailing evidence to assist health practitioner’s in their decisioning making concerning the appropriate care to be provided for a specific clinical circumstance. A guideline is meant to offer concise instructions on how to provide healthcare services. The most important benefits of clinical practice guidelines are their potential to improve both the quality care and patient outcomes, and reduce costs. However, these guidelines are developped and communicated in prose, which often lacks the required specificity to clearly and unambiguously convey the clinical knowledge. These ambiguities can lead to the misapplication of intended therapy, causing at best a reduction in the quality of care and reduce costs, at worst causing harm.
This presentation will demonstrate the use of three OMG standards, Business Process Model and Notation (BPMN), Case Management Model and Notation (CMMN) & Decision Model and Notation (DMN) to represent clinical guidelines. These methods in tandem provide a means to clearly and unambiguously describe and convey the clinical knowledge. The models can be reviewed, tested and computational verified. Further, since there are clear computation semantics for the standards, the models developed based upon these standards are potentially executable. This promotes the rapid dissemination and uptake of the guidelines in a clinical setting.
The speakers will provide a brief overview of the three methods, supporting HL7 standards and supporting technologies necessary to make the guideline actionable in a clinical setting. A simple clinical model based upon the standards will be reviewed and finally shown executing. The presentation will show the potential of using these methods to model clinical knowledge and their potential of being directly executable.
Learn how you can fix more than 2.5x the average number of application flaws.
As you embark on the mission to tackle the flaws and vulnerabilities found after scanning, you need to prioritize and optimize your approach. You know you cannot let potential system flaws or weaknesses in your application be exploited to compromise the security of your organization’s most critical assets.
Join this 20-minute webinar to see how Veracode can help you prioritize and find the best location in which to fix and remove the vulnerabilities and flaws that can put your organization at risk. Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode provides on-demand application vulnerability testing to detect and offer solutions for vulnerabilities and other security issues.
Containers are a developer's best friend. Quickly developing your code, dropping it into a container, and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?
Join this webinar to explore your containers' journey. Using practical examples, we'll cover:
-What actually happens to create a container in OpenShift and how it all works inside Linux®.
-How container-native storage works to let you dynamically provision storage for your modern applications.
-How to persist your Red Hat® Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
Containers are mainstream and a strategic priority for enterprises everywhere. While they are enabling teams to migrate workloads to microservices and enabling flexible scalable workloads, a key question arises, where do we store and manage our container images?
While the answer to this question is a Container Registry, do you know what to look for when evaluating enterprise container registry solutions? Have you identified your organization's requirements for container registries?
Join Praveen Rajagopalan and Vikas Grover from Red Hat to hear and discuss about an enterprise container registry solution that has all the required enterprise security features.
Praveen and Vikas will discuss various options such as:
Container Size: Optimized storage of container Images
Availability: Geo-replication technology for Multi-Data Center
Hosting: Cloud or On Prem
Vulnerability scanning of images
Access control (RBAC)
Adopters of Pivotal Cloud Foundry have achieved remarkable gains in developer productivity. Allstate, Citi, CoreLogic, Liberty Mutual, and many others have shared their stories, detailing how they’ve attained a 3x to 4x increase in developer productivity. It’s common to hear Pivotal Cloud Foundry users share anecdotes like, “We delivered 3x the number of features this year compared to last year,” and “Our developers went from working on code only 20% of the time to 80–90% of the time.”
Where does this productivity come from? Attend this webinar and learn the five practices that lead to these software development process improvements:
- Developer Self-Service
- Smaller Projects and Smaller Releases
- Cross-Functional, Self-Directed Teams
- Increasing Visibility of Defects
- Reduce Variability
Along the way, we’ll also show how Pivotal Cloud Foundry enables each practice.
Open source components are the foundation of modern applications, but ineffective management around open source can lead to serious risks and unwanted media attention when security flaws lead to data breaches. The Black Duck by Synopsys 2018 Open Source Security and Risk Analysis (OSSRA) examines the previous year’s open source and security news and analyzes trends based on the audits of more than 1,100 codebases.
Not surprisingly, 96% of the audited codebases contained open source components, and nearly 78% of the codebases contained at least one vulnerability. As the percentage of open source in codebases continues to grow, it’s clear that open source management practices need to improve.
In this webinar, open source expert Tim Mackey will walk through the report’s findings in depth and discuss strategies companies can use to minimize open source security risk while maximizing the benefits open source provides.
Get a deeper understanding of the underlying technical architecture behind a Data Makeover.
Does data preparation and analysis currently consume 80 percent of your time, with only 20 percent of your time spent actually creating insights? Stop spending all of your time on rear-view reporting and start seeing the data you really want to see.
Who Should Attend
Technical leaders who are interested in leveraging Microsoft Azure for enterprise data and analytics, including Big Data, Modern Visualization, IoT or Machine Learning.
Why You Should Attend
This educational session enables teams to understand the impact a Capax Global Data Makeover has had on other companies in Finance Services and Retail companies and how we go about these projects in a way that gets progress into their hands quickly.
With the General Data Protection Regulation (GDPR) becoming enforceable in the EU on May 25, 2018, many data scientists are worried about the impact that this regulation and similar initiatives in other countries that give consumers a "right to explanation" of decisions made by algorithms will have on the field of predictive and prescriptive analytics.
In this session, Beau will discuss the role of interpretable algorithms in data science as well as explore tools and methods for explaining high-performing algorithms.
Beau Walker has a Juris Doctorate (law degree) and BS and MS Degrees in Biology and Ecology and Evolution. Beau has worked in many domains including academia, pharma, healthcare, life sciences, insurance, legal, financial services, marketing, and IoT.
Legacy MPLS networks weren’t built to optimize network visibility. In an age when nearly 80% of workloads are in the cloud and almost every function is tied to an application, transparency is critical to managing traffic. Gaining the control you need starts with taking an app-first approach.
Software defined networking (SDN) is critical to gauging the breadth of all your applications and to effectively steering traffic to maximize performance. In “Navigating the New, App-Centric Reality,” our panelists will explore how the internet has changed radically in the past 10-15 years; network and infrastructure challenges; how SDN offers greater control; and more.
Our panelists are:
• John Burke, principal research analyst, Nemertes Research, advises key enterprise and vendor clients, conducts and analyzes primary research, and writes thought-leadership pieces across a wide variety of topics.
• Jody Hagemann, director of product management, Comcast Business Services, focuses on service operations design, new product launch, product-to-product migration, and lifecycle management. Her current role is developing the Comcast Business ActiveCore℠ platform.
Participants will gain insights into:
• The landscape of the “new internet”;
• Case study examples of network limitations;
• Applications best served by infrastructure type;
• Application best practices; and
• The keys to unlocking bandwidth constraints.
Register for “Navigating the New, App-Centric Reality,” on Thursday, May 24th, 1 p.m. EST, today!
Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.
Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.
We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.
Bringing microservices and service mesh architectures to life in working code is a huge and novel challenge. NGINX makes this easier with Ingenious, a demo app that is part of the Microservices Reference Architecture (MRA). Ingenious works across multiple architectures, bringing the differences and advantages of each to life.
In this webinar we discuss how Ingenious is (mostly) the same, but also the differences in its code, features, and runtime behavior, as it’s implemented in various architectural models. You then get a chance to ask us, well, anything about microservices, the MRA, and service mesh architectures.
It's GDPR due date. How will enforcement be rolled out when a breach occurs and what are the likely consequences for the breach?
Join this panel of experts:
Martyn Hope: Co-Founder of the GDPR Institut
Mark Rasch: Chief Legal Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ.
Ray Ford: Founding Associate of GDPR Institut, DPO for Acer(UK) who currently hold some 15million childrens records on behalf of the Scottish Government.
This session will cover:
- How GDPR will be enforced.
- Who is likely to be among the first brought to court?
-What Should I do Now?
The dawn of GDPR will have a global impact. If you work with European employees, customers or partners, the regulation affects you and failure to comply could result in fines up to 20 million euros, or up to 4% of the company’s total global revenue for the preceding fiscal year, whichever is higher.
It's not too late to get ready. Sign up for this webinar to learn 3 key steps you need to start now:
•How to show that you are processing data in accordance to the GDPR
•How to ensure (and document) the security, confidentiality and availability of data
•How to support the Right to be Forgotten
You'll also learn how Box can help. Our philosophy is to evaluate and meet the highest bar for data privacy, as well as enable organizations to meet data privacy obligations across the globe, so you can rely on Box to get GDPR-ready.
Apache Camel has fundamentally changed the way enterprise Java™ developers think about system-to-system integration by making enterprise integration patterns (EIP) a simple declaration in a lightweight application wrapped and delivered as a single JAR.
In this session, we’ll show you how to bring the best practices from the enterprise integration world together with Linux® containers, running on top of Kubernetes/OpenShift, and deployed as microservices, which are both cloud-native and cloud-portable.
Claus Ibsen is co-author of the Camel in Action books. Claus is a long time Apache Camel committer, and wrote a lot of the Camel code. He is a professional open source developer, working daily on the Apache Camel and ActiveMQ projects, as well as working with other open source integration technologies such as hawtio, vert.x and fabric8. Claus spends many hours in the Camel community to help others, write blogs, tweet, and help make Apache Camel a better product.
We're excited to announce the GA release of Mule 4 and Studio 7, a major evolution of the core runtime behind Anypoint Platform.
Mule 4 accelerates developer velocity by adding more power, higher speed, and greater simplicity into the famously small footprint of Mule – the industry's leading all purpose engine for building application networks.
Join us as we talk about the innovations, tips, and tricks to being successful with Mule 4 and Studio 7.
Attendees will learn:
- How to start flows and integrations quickly with Mule 4 and Studio 7
- How to use DataWeave
- Design time error handling and try scopes
- Mule SDK