The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
With Red Hat it's easy to create mobile apps for the enterprise that integrate with back-office processes and systems! In this video we demonstrate a mobile app for insurance claims processing, built with Red Hat Mobile Application Platform and Red Hat JBoss BPM Suite.
Everyone is trying to achieve high quality, fast deployment, and easy maintenance for their applications. Learn to get these benefits for your Java apps with DevOps-enabling technologies, containers, cloud platforms, and central management tools.
When insurer Aviva Group acquired Friends Provident International, it needed to replace aging proprietary systems that were expensive to maintain, and whose licenses were soon to expire. It chose a new solution based around Red Hat JBoss Middleware, which has reduced costs and improved response time for end users. Red Hat Consulting provided expert help, enabling Aviva to hit a tight six-month deadline.
This video provides a walkthrough of the Red Hat Mobile Application Platform running on OpenShift Container Platform, demonstrating how mobile applications can be built quickly and deployed to OpenShift. Red Hat Mobile Application Platform enables developers build enterprise-grade mobile apps that can run on devices but connect securely to enterprise applications and systems in the datacenter.
The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. Facebook, PayPal, Alibaba—these seemingly disparate companies have upended entire industries by harnessing a single phenomenon: the platform business model.
In order to achieve this scale, winning companies are establishing digital platforms with APIs that extend their organizational boundaries.
Attendees will learn from MIT Fellow and Boston University Professor Marshall Van Alstyne and ProgrammableWeb Editor-in-Chief David Berlind:
- Why enterprises need APIs and API strategy models
- The impact of API adoption and complementary investments on enterprise performance and revenue growth, based on new research
- About an “owner’s manual” for creating a platform marketplace, revealing the strategies behind some of today’s rising platforms
Want to know even more about Snaps? In our second webinar on the topic we’ll be taking a technical look at Snaps themselves, our writing and publishing tool Snapcraft, how you can convert your existing applications, and the insight you’ll need to start building your first snaps! Ready to start building? You won’t want to miss this one.
According to analyst firm IDC, using unsupported software can cost financial institutions in additional support, slower deployment times, more maintenance, and lost developer time.
Join this webinar as we explore:
-Hidden costs, which can include additional support, slower deployment times, more maintenance, and lost developer time.
-How using supported open source software can improve time to market.
-The benefits of supported software versus unsupported software.
-How the adoption of supported software versus unsupported software addresses security.
-A developer’s ability to deliver new features and new applications using supported software versus unsupported software.
SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you still want to have full control, traceability and visibility right? Containers are highly volatile, how can you do this if your container doesn’t exist anymore?
Sysdig uses Linux tracepoints to collect and then process and filter kernel system calls and events. Still this requires a deep knowledge on a tcpdump like filtering syntax and understanding on the syscalls involved. Sysdig Inspect makes our deep dive into system calls much more intuitive and visual though a graphical user interface that allows to correlate high level activities like containers, processes, containers, network or file I/O and commands, events or logs.
In this webinar series you will get to know how Sysdig and Sysdig inspect works through a series of practical examples:
-Exploration and performance analysis of container, processes, network and file activity on a typical Wordpress setup
-Debug a 502 HTTP error on a load-balanced Python app with HAproxy
-Troubleshoot a Kubernetes CrashLoopBackOff error
Who should attend?
If you're managing containers in production, using containers for development or just beginning our container exploration, you'll want to attend to understand the challenges of troubleshooting system or application errors when running inside containers.
t is clear that major organisations are starting to integrate RPA solutions into their IT ecosystems and those that haven’t are seriously considering the option, as the number of RPA users is doubling every 6 months.
In this rapidly developing climate, which platform will help your organisation meet their digital transformation goals? Join Andrew Murphy in this webinar, where he will review the core competencies of modern BPM and RPA. Considering whether you should be using neither or both.
In this webinar, K2 will cover:
- Core competencies of Modern BPM
- Core competencies of RPA
- Identifying the key stages of the digital transformation journey
- Where BPM and RPA applies to these stages to help you achieve your short term and long term transformation goals
With low-code and no-code app development, IT departments can now offload some of that work onto the business. However, these platforms don’t offer a solution for the complex, integrated processes that are essential to running an organization that has challenges beyond what’s industry standard.
Watch this webinar to learn how to:
- Achieve low-code scalability and the power of BPM.
- Empower the business to do more on their own with a low-code platform, while also giving IT the power to build complex solutions
- Solve both simple and complex business problems with one platform.
Learn how to use K2's intuitive, drag-and-drop designers, you can turn a simple document library or list into an app by rapidly designing forms that combine SharePoint and your line-of-business data. Add workflows that involve the right users and automate tasks across systems, regardless of whether they’re on premises or in the cloud.
Watch the on-demand part two of our series on Transforming Your Business Processes and learn how to build business applications involving many of the fundamental components including access to data, standardized business logic that aligns with the way an organization executes, and the ability to give users the experience they need on the devices they use. K2 allows organizations to rapidly compose business applications from reusable forms, workflow, and data components using drag-and-drop tooling.
Customizing SAP can be complex, expensive and time consuming, which can severely impact business agility. Watch this on-demand webinar to learn how K2 can help you tap the full value of your SAP information, break down technology silos, and increase business agility by delivering apps that make the most out of SAP and your surrounding systems.
Learn how to transform your processes with built-in mobile capabilities. In this webinar, you'll see how you can enable your business users to make business happen anywhere with the help of mobile apps. Learn why rapid, reusable development, data management, offline capabilities, project administration tools, end-to-end security and more are crucial to your mobile app strategy.
Watch this on-demand webinar and learn how to build forms that work with line-of-business information from disparate cloud and on-premises systems, and support standard electronic form features such as validation, cascading dropdowns and many more. Versatility and customization powers these resource-rich forms, incorporating and implementing personal business applications, accessible from any browser, table or mobile device.
A look at distributed systems, asynchronous communication, Service Oriented Architecture, and the microservice + cloud native space we live in today. There are a whole lot of buzz words floating around the modern Cloud and Containers space.
This talk is a guided tour of how we got here. It also hopes to clarify what some of the terms mean, why they’re even necessary to begin-with, and how to sort the hype from the helpful bits.
Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
•An introduction to benchmarking storage performance of workloads
•Common Workloads (OLTP, OLAP, VMware, etc.)
Spend Valentine’s Day with us. We think you’ll “love” this webcast!
When your content is valuable, and you’re rightly concerned about the privacy and security of your users, you can use NGINX to control and secure access to your services and the data that they manage.
We’ll cover different ways you can use authentication, authorization, and security controls in NGINX and NGINX Plus to protect your code and content.
Join to learn:
*About restricting access with NGINX
*How to offload SSL/TLS and use Let’s Encrypt certificates
*How to enable rate, connection, and bandwidth limiting
*About JWT authentication and single sign-on (SSO)
Unique to the industry, CMD+CTRL are simulators where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.
For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.
We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.
Achieving a single pane of glass for performance management has been an elusive goal, as organizations are faced with an increasingly complex mix of legacy, virtual and cloud technologies, as well as emerging operating models and evolving roles/skillsets.
But, monitoring the performance of digital business services demands more than visibility to just the end user experience, applications, or the underlying infrastructure. It requires an ability to automatically anticipate and isolate performance issues across a heterogeneous mix of technologies, devices and suppliers.
Digital business services are how end users experience IT, and that is how IT services must be managed. Achieving unified performance management will continue to be elusive until all stakeholders are aligned with this approach.
Join this webinar, as John Worthington, Director of Product Marketing at eG innovations, details some best practices for achieving the single pane of glass vision. Attendees will receive the related White Paper, "Best Practices for Achieving Transparency in Digital Business Services Monitoring".
In this webinar, you will:
-Learn how monitoring can be leveraged in continuous improvement and other transformative change programs
-See how converged APM/IPM can accelerate achievement of a single point of glass for performance monitoring
-Identify some best practices you can apply for achieving unified monitoring and improving organizational transparency
If you’re going Agile, you’re no doubt moving to faster sprints! Test data takes center stage as companies grapple with faster testing processes and new compliance initiatives such as GDPR. Two-week sprints require teams to test faster and testing faster means having test data delivered at any stage of development.
Join us for this webcast to learn how your teams can deliver the GDPR compliant data at the right time to every team that needs it. We will review traditional testing techniques and their strengths and weaknesses and then explore the world of synthetic data creation and virtual test data delivery to gain a better understanding of these trends. We will wrap things up by giving a game plan for GDPR compliance in the testing space.
One hour with us could save you days or weeks of frustration as you get ready for 2018.
SAST, IAST, DAST, MAST, *AST – There are plenty of technologies and ways to test your software, but how do we do that without slowing us down in a rapid development environment. In this talk we will give practical advice on how to integrate software security testing into your CI/CD and your development process so it works. The talk will review the pros and cons of each of the testing technologies, and how to adapt it to rapid development, and how to manage the balance between risk and speed to build a proper signoff process, so that real threats will become blockers, but other issues will be handled in a parallel slower cycle, without slowing down the main delivery.
Our adversaries are skilled in deception -- we as defenders must become
skilled as well. This talk provides information to defenders on
the importance of deception as part of our defense in depth strategy.
Why should the Red Team have all the fun? Let's explore the tools,
techniques, and processes that Blue Team can utilize to detect,
deceive, detour, confound, and confuse our attackers.
What we cover:
* The goals of deception from the perspective of both the attacker and defender
* The elements and processes needed to plan, prepare, execute, and
monitor effective deception
* The types of deception techniques that are effective and how they translate into actual web
* How to identify and respond to various types of attackers.
Finally, we walk through an example of a deceptive web application that will detect our attacker and sideline them in defense of our web application.
For this Vivit SIG Talk session, 2 Performance Testing thought leaders will be featured. They will share their knowledge and expertise with you.
Below is a quick outline of the agenda and topics for you:
Speaker: Scott Moore - Performance Testing Internet of Things:
• An overview of IoT architecture and protocols
• A deeper look into the MQTT and CoAP protocols specifically
• A demonstration of how to test the performance of IoT applications using LoadRunner 12.55
Speaker: Chris Trimper - Using Splunk to Analyze Performance Metrics:
• Introduction to Splunk
• Process of preparing LR data for Splunk consumption
• Building dashboards and performing analytics in Splunk
Join us for the next upcoming SIG Talk on Tuesday, March 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1073255&group=.
The global scientific community benefits from having a diverse range of perspectives. As such, Russia is working to make its research more visible. In the same way, science in Russia benefits from a diverse range of global collaborators. The willingness of Russian universities to expand these collaborations and foster the excellence of Russian research is supported by the Russian Ministry of Education and Science. Tomsk Polytechnic University (TPU) is among such universities.
The aim of this webinar to showcase how TPU uses Pure to make university’s research more globally visible and what the impact of the TPU Portal has been.
In this session, Dr. Falkovich will cover:
1)Why TPU research management counts on PURE as it’s research information management system
2)How has international visibility for TPU research improved since the TPU Pure Portal was launched in September 2015 The statistics of Portal visibility as well as case studies of collaborations started with the help of Pure.
This webinar will be helpful for the universities of Western Europe and the BRICS countries (Brazil, Russia, India, China and South Africa) that have the same challenges and a similar economic and historical background.
APIs are powerful, and for many teams, very new. A strategy for APIs is complex because it needs to cover many areas. Many teams don't know how to articulate the benefits of APIs to craft a strategy. And defining and using an API strategy involves many roles and teams—not just techies anymore.
In this webcast, you’ll get a general introduction to ""the API economy"" and winning strategies in that economy. Topics will include:
- Business drivers for APIs and API management.
- API strategy models and methodology.
- Case studies from actual teams.
- Best practices of successful API teams.
- Practical checklists.
A lot has been written recently about Agile expansion. That might sound scary when you are still new to Agile and might only have a few teams onboard. However, it is still important to start thinking about how you envision Scaling Agile and incorporating your business strategy.
Industry expert and ProjectManagement.com SME Andy Jordan believes that even for someone who is early in their agile adoption, it is essential to understand the concept of business agility.
Join Andy for this high energy, thought provoking webinar to learn:
-Why business agility matters and why you need to care about it
-The role of strategic agile models in supporting your agile success
-The importance of broadening Agile across multiple departments
In today’s business world every organization has to be able to react quickly and with minimal disruption to the inevitable changes they face. Business agility maximizes your ability to do that. Start improving things right now by signing up for this webinar.
Gain practical insights from experts on the critical role of agility in digital transformation. In this session, we will discuss how conservative and low risk cultures can be quickly replacing agile methodologies and rapid experimentation.
But how? Join us hear from a seasoned panel of Digital Agility experts including Rob Koplowitz (Forrester Research - Principal Analyst), Gustavo Gomez (Bizagi - CEO), Rui Dinis (Director of Finance and Administration – Manpower) as we answer questions including:
•Where should change come from, top down or the ground up?
•What are the biggest barriers to building agile momentum
•What results have agile solutions delivered for Manpower Group?
Who should attend: Digital Technology leaders, Application Development Leaders, IT, Business and Process professionals
For Digital and operational leaders, there’s a tension between the demand for agility and the pressure to maintain compliance with global regulations. How can you reconcile these competing corporate goals?
Learn from the experience of Cofco International for practical advice on:
- The critical role of agility in global digital operations
- Why digital agility is essential to regulatory compliance
- How to create digital solutions fast in an agile culture
Who should attend? Digital Technology leaders, Application Development Leaders, IT, Business and Process Professionals.
Discover how creating an agile culture enables you not only to deliver digital solutions fast, but also to make sure that they return results – including huge financial savings and complete project payback in 2 months or less
Join this webinar hosted by Bizagi Customer Travelport, a travel commerce platform connecting the world’s leading B2B travel providers with pioneering B2B payment solutions. We’ll discuss how agility has radically redefined the way Travelport operates by:
- Creating a culture of collaboration and experimentation
- Shining a light on the simplification of critical processes
- Delivering rapid results that demonstrate digital transformation
Who should attend: Digital Technology Leaders, Application Development Leaders, IT, Business and Process Professionals.
Working with COBOL data files, including the creation of reports, often requires specialty tools and developer skills. It’s time to improve business continuity, application availability and to work with COBOL data files in real time, using off-the-shelf analysis and reporting tools.
Join Micro Focus on 21st February to:
Discover the real challenges many teams face in working with COBOL data files
Understand how to work with COBOL data files using familiar tools such as Excel and Crystal Reports
See how to easily integrate existing COBOL applications with RDBMS technology with minimal code change
Learn how to leverage open source database platforms, reducing application and infrastructure costs
Unlock the value of business application data using the latest modernization tools from Micro Focus. Join us on 21st February, 2018 for an exciting webinar discussion, demo and Q&A.
By now, you’re probably well into the implementation of policies and governance to ensure your organization is GDPR-compliant. Nevertheless, you may still be questioning whether there is a database, process or function within your department that hasn’t been through the full rigor of your compliancy program.
Join our live webinar as a sanity check against best practice and real-life examples whether:
- All sources of applicable data have been identified and risk-assessed you have created a comprehensive policy framework and guidance
- Functional departments understand their risks and taken the correct steps to mitigate
- Have sufficient transparency in place
- Know which third parties are holding data on your behalf
- Learn the required ongoing governance and testing of your compliance processes
We'll cover 'Cryptocurrency Related Attacks' for this month's theme. In doing so, we'll provide insight as seen by our investigators and analysts. For the 'Insight' portion, Adam Harrison will provide a 2018 Data Breach Digest pre-release 'sneak peek' on a Cryptocurrency-Mining Malware scenario. For the 'Today's Risk' portion, we'll feature Roy Porter who'll provide an in-depth look into cryptocurrency-related attacks as seen in our caseload and on the DarkNet and internet.
This will be followed by our regularly scheduled programming:
According to Gartner, the application layer contains 90% of all vulnerabilities. This is why you cannot let potential system flaws or weaknesses in your application be exploited to compromise the security of your organization’s most critical assets. Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise.
Join this 20-minute webinar to see how Veracode can help your security and development teams identify and remove the vulnerabilities and flaws that can put your organization at risk. Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode provides on-demand application vulnerability testing to detect and offer solutions for vulnerabilities and other security issues.
OpenStack has often been positioned as an alternative to traditional proprietary virtualization environments. Join Arturo Suarez and Stephan Fabel for:
>A breakdown of differences between OpenStack versus traditional proprietary virtualization and information on identifying when it makes sense to use one or the other
>Analysis on TCO, best practices and risks
>A demo on how to migrate from a traditional proprietary environment into an OpenStack cloud
Engineering teams often quickly go from just having a few feature flags, to way too many. Feature flags enable continuous delivery, dark launches, A/B tests, canary releases, kill switches, beta programs, and more.
It’s not long before the conditional statements littered through a codebase begin to chafe. Luckily there are some simple management techniques which help keep things under control. In this webinar continuous delivery consultant Pete Hodgson will introduce some of them.
Attend this webinar to learn:
- How to categorize feature flags
- How namespacing flags can communicate flag status and ownership
- Practical tips for keeping the number of flags manageable
- Pete Hodgson, Software Delivery Consultant
- Ed Sawma, VP of Product Marketing, Split Software
5 Best Practices for Highly Effective Mobile App Adoption and User Engagement
How does your app stack up? Mobile product teams are challenged to drive app adoption and usage in an environment where most apps don’t last past the first use. Successful mobile teams don’t just drive one-way outreach in their app, they close the loop with customers - offering deep engagement and communication throughout the user journey.
Why this webinar is worth your 60 minutes:
* You’ll learn new tactics for user engagement that you can use inside and outside of your app
* You’ll know how your users want to be contacted and surveyed
* You’ll see how app owners and product managers can marry customer experience with app engagement
* You’ll take actionable feedback that you can use immediately, no matter what kind of app you manage
If your organisation competes in the global market, you should expect GDPR to have a critical influence on the software that powers your business. Having a disciplined software security approach will help you not only identify, remediate, and prevent weaknesses in your software but also avoid violating GDPR.
Listen as experts Adam Brown of Synopsys and legal expert Dan Hedley of Irwin Mitchell, LLP provide insights into what GDPR requirements mean for your security initiative, how your existing security activities can support compliance, and best practices to keep in mind as you look to mature your software security program.
About the Presenters:
Adam Brown is Associate Managing Consultant at Synopsys in the software security consulting division. His background is in software security testing focusing on data centric web application security. Currently he specialises in helping organisations set up their software security initiatives, delivers training in software security and takes a keen interest in the GDPR from both data security and data privacy threat perspectives.
Dan Hedley is a partner at UK law firm Irwin Mitchell LLP. He is a specialist IT lawyer, focusing in particular on software licensing and development, IT service contracts, outsourcing and cloud services. He also advises on open source compliance, data protection, software IP issues and the IT aspects of M&A and IPO transactions. He regularly acts for both established corporates and early-stage and fast growth businesses.”
Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.
The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:
1) Understand the GDPR legal framework
2) Create a Data Register
3) Classify your data
4) Start with your top priority
5) Assess and document additional risks and processes
6) Revise and repeat
Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?
Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:
- How to monitor services and apps built on top of containers
- The benefits of transparent instrumentation for metric collection
- Using dashboards to quickly see and share performance data
- How to quickly determine the what and the why of what’s happening in your environment
Kubernetes has yet to close the developer gap from source code to app running in a production Kubernetes cluster. Many build bespoke tools. How can the Kubernetes community come together to build decomposable solutions that help people define their app, deploy it, and manage its lifecycle over time? Learn about the progress we are making together to elevate the conversation from container orchestration to application lifecycles management.
The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).
As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.
One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.
In this webinar, Yubico and Ping Identity will discuss:
● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement
Alex Yakubov, Senior Director - Ecosystem (Yubico)
Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.
Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
In this webinar Manfred Berger introduces the latest addition to the HGST platform portfolio, the SVR2U24 NVMe all-flash storage server.
Combining high performance NVMe SSDs and Intel®’s Purley server architecture into one tried and tested unit, the SVR2U24 enables customers to come to market quickly with a multitude of software defined storage solutions or data base servers optimized for high speed search operations, catering to a multitude of industry verticals.
95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,
The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.
During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
-2018 Global Cloud Data Security Findings
-Compliance and cloud security: How will this work?
-A shift in the budget: Where is IT spending their money?
-Country breakdown of IT cloud security: Who is doing the best?
-What can you do to secure the cloud and comply with regulations?
Today’s businesses require greater responsiveness and agility in meeting fast-paced, user-driven demand for products, services, and information. In turn, applications need to be designed, developed, deployed, and changed quickly when needed and be exposed to multiple channels, including mobile. To get apps to market fast and adapt them on the fly, low-code development tools and approaches are emerging to take the burden off IT and let the business self-serve.
In this session we'll discuss:
-How a wide range of technologies are coming together to enable the development of low-code, mobile, cloud-enabled, business automation solutions.
-Red Hat's approach to building these process-driven, mobile applications.
- Examples from some of Red Hat's most successful customers.