The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
5 Best Practices for Highly Effective Mobile App Adoption and User Engagement
How does your app stack up? Mobile product teams are challenged to drive app adoption and usage in an environment where most apps don’t last past the first use. Successful mobile teams don’t just drive one-way outreach in their app, they close the loop with customers - offering deep engagement and communication throughout the user journey.
Why this webinar is worth your 60 minutes:
* You’ll learn new tactics for user engagement that you can use inside and outside of your app
* You’ll know how your users want to be contacted and surveyed
* You’ll see how app owners and product managers can marry customer experience with app engagement
* You’ll take actionable feedback that you can use immediately, no matter what kind of app you manage
Engineering teams often quickly go from just having a few feature flags, to way too many. Feature flags enable continuous delivery, dark launches, A/B tests, canary releases, kill switches, beta programs, and more.
It’s not long before the conditional statements littered through a codebase begin to chafe. Luckily there are some simple management techniques which help keep things under control. In this webinar continuous delivery consultant Pete Hodgson will introduce some of them.
Attend this webinar to learn:
- How to categorize feature flags
- How namespacing flags can communicate flag status and ownership
- Practical tips for keeping the number of flags manageable
- Pete Hodgson, Software Delivery Consultant
- Ed Sawma, VP of Product Marketing, Split Software
OpenStack has often been positioned as an alternative to traditional proprietary virtualization environments. Join Arturo Suarez and Stephan Fabel for:
>A breakdown of differences between OpenStack versus traditional proprietary virtualization and information on identifying when it makes sense to use one or the other
>Analysis on TCO, best practices and risks
>A demo on how to migrate from a traditional proprietary environment into an OpenStack cloud
According to Gartner, the application layer contains 90% of all vulnerabilities. This is why you cannot let potential system flaws or weaknesses in your application be exploited to compromise the security of your organization’s most critical assets. Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise.
Join this 20-minute webinar to see how Veracode can help your security and development teams identify and remove the vulnerabilities and flaws that can put your organization at risk. Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode provides on-demand application vulnerability testing to detect and offer solutions for vulnerabilities and other security issues.
We'll cover 'Cryptocurrency Related Attacks' for this month's theme. In doing so, we'll provide insight as seen by our investigators and analysts. For the 'Insight' portion, Adam Harrison will provide a 2018 Data Breach Digest pre-release 'sneak peek' on a Cryptocurrency-Mining Malware scenario. For the 'Today's Risk' portion, we'll feature Roy Porter who'll provide an in-depth look into cryptocurrency-related attacks as seen in our caseload and on the DarkNet and internet.
This will be followed by our regularly scheduled programming:
By now, you’re probably well into the implementation of policies and governance to ensure your organization is GDPR-compliant. Nevertheless, you may still be questioning whether there is a database, process or function within your department that hasn’t been through the full rigor of your compliancy program.
Join our live webinar as a sanity check against best practice and real-life examples whether:
- All sources of applicable data have been identified and risk-assessed you have created a comprehensive policy framework and guidance
- Functional departments understand their risks and taken the correct steps to mitigate
- Have sufficient transparency in place
- Know which third parties are holding data on your behalf
- Learn the required ongoing governance and testing of your compliance processes
Working with COBOL data files, including the creation of reports, often requires specialty tools and developer skills. It’s time to improve business continuity, application availability and to work with COBOL data files in real time, using off-the-shelf analysis and reporting tools.
Join Micro Focus on 21st February to:
Discover the real challenges many teams face in working with COBOL data files
Understand how to work with COBOL data files using familiar tools such as Excel and Crystal Reports
See how to easily integrate existing COBOL applications with RDBMS technology with minimal code change
Learn how to leverage open source database platforms, reducing application and infrastructure costs
Unlock the value of business application data using the latest modernization tools from Micro Focus. Join us on 21st February, 2018 for an exciting webinar discussion, demo and Q&A.
Discover how creating an agile culture enables you not only to deliver digital solutions fast, but also to make sure that they return results – including huge financial savings and complete project payback in 2 months or less
Join this webinar hosted by Bizagi Customer Travelport, a travel commerce platform connecting the world’s leading B2B travel providers with pioneering B2B payment solutions. We’ll discuss how agility has radically redefined the way Travelport operates by:
- Creating a culture of collaboration and experimentation
- Shining a light on the simplification of critical processes
- Delivering rapid results that demonstrate digital transformation
Who should attend: Digital Technology Leaders, Application Development Leaders, IT, Business and Process Professionals.
For Digital and operational leaders, there’s a tension between the demand for agility and the pressure to maintain compliance with global regulations. How can you reconcile these competing corporate goals?
Learn from the experience of Cofco International for practical advice on:
- The critical role of agility in global digital operations
- Why digital agility is essential to regulatory compliance
- How to create digital solutions fast in an agile culture
Who should attend? Digital Technology leaders, Application Development Leaders, IT, Business and Process Professionals.
Gain practical insights from experts on the critical role of agility in digital transformation. In this session, we will discuss how conservative and low risk cultures can be quickly replacing agile methodologies and rapid experimentation.
But how? Join us hear from a seasoned panel of Digital Agility experts including Rob Koplowitz (Forrester Research - Principal Analyst), Gustavo Gomez (Bizagi - CEO), Rui Dinis (Director of Finance and Administration – Manpower) as we answer questions including:
•Where should change come from, top down or the ground up?
•What are the biggest barriers to building agile momentum
•What results have agile solutions delivered for Manpower Group?
Who should attend: Digital Technology leaders, Application Development Leaders, IT, Business and Process professionals
A lot has been written recently about Agile expansion. That might sound scary when you are still new to Agile and might only have a few teams onboard. However, it is still important to start thinking about how you envision Scaling Agile and incorporating your business strategy.
Industry expert and ProjectManagement.com SME Andy Jordan believes that even for someone who is early in their agile adoption, it is essential to understand the concept of business agility.
Join Andy for this high energy, thought provoking webinar to learn:
-Why business agility matters and why you need to care about it
-The role of strategic agile models in supporting your agile success
-The importance of broadening Agile across multiple departments
In today’s business world every organization has to be able to react quickly and with minimal disruption to the inevitable changes they face. Business agility maximizes your ability to do that. Start improving things right now by signing up for this webinar.
APIs are powerful, and for many teams, very new. A strategy for APIs is complex because it needs to cover many areas. Many teams don't know how to articulate the benefits of APIs to craft a strategy. And defining and using an API strategy involves many roles and teams—not just techies anymore.
In this webcast, you’ll get a general introduction to ""the API economy"" and winning strategies in that economy. Topics will include:
- Business drivers for APIs and API management.
- API strategy models and methodology.
- Case studies from actual teams.
- Best practices of successful API teams.
- Practical checklists.
In this webinar, discover how AWS customers are using our AI solutions to transform their companies and their products. We'll look at multiple use cases from different industries (media, finance, travel, retail, consumer applications, security and law enforcement), both in the enterprise and the startup settings. We'll also overview the growing family of Amazon AI services and look at how they can help you bring innovative AI capabilities to your own applications.
You will hear customer examples, including:
- How Expedia uses Deep Learning to automatically select the best images to display on hotel pages
- How CSPAN uses Amazon Rekognition to identify 90,000+ speakers in their video archives
- How Duolingo uses Amazon Polly to generate lifelike audio clips to help students learn foreign languages
- How Hotels.com uses Amazon Translate for automatic website translation
Who Should Attend: Business Directors, Business Leaders, Project Managers, IT Managers, Business Consultants, Heads of Innovation, Data Scientists and Product Marketeers.
Augustin Huret, CEO & Founder of MondoBrain explains how MondoBrain is a revolutionary decision making and problem solving solution that brings immediate impact on a company’s PNL. According to Augustin, MondoBrain is the "ultimate combination of human intelligence, artificial intelligence, and collective intelligence" that helps craft the "best decision" in an easy to use and intuitive interface. You can learn more about how the solution works in this three-minute piece.
The global scientific community benefits from having a diverse range of perspectives. As such, Russia is working to make its research more visible. In the same way, science in Russia benefits from a diverse range of global collaborators. The willingness of Russian universities to expand these collaborations and foster the excellence of Russian research is supported by the Russian Ministry of Education and Science. Tomsk Polytechnic University (TPU) is among such universities.
The aim of this webinar to showcase how TPU uses Pure to make university’s research more globally visible and what the impact of the TPU Portal has been.
In this session, Dr. Falkovich will cover:
1)Why TPU research management counts on PURE as it’s research information management system
2)How has international visibility for TPU research improved since the TPU Pure Portal was launched in September 2015 The statistics of Portal visibility as well as case studies of collaborations started with the help of Pure.
This webinar will be helpful for the universities of Western Europe and the BRICS countries (Brazil, Russia, India, China and South Africa) that have the same challenges and a similar economic and historical background.
With Red Hat it's easy to create mobile apps for the enterprise that integrate with back-office processes and systems! In this video we demonstrate a mobile app for insurance claims processing, built with Red Hat Mobile Application Platform and Red Hat JBoss BPM Suite.
Everyone is trying to achieve high quality, fast deployment, and easy maintenance for their applications. Learn to get these benefits for your Java apps with DevOps-enabling technologies, containers, cloud platforms, and central management tools.
When insurer Aviva Group acquired Friends Provident International, it needed to replace aging proprietary systems that were expensive to maintain, and whose licenses were soon to expire. It chose a new solution based around Red Hat JBoss Middleware, which has reduced costs and improved response time for end users. Red Hat Consulting provided expert help, enabling Aviva to hit a tight six-month deadline.
This video provides a walkthrough of the Red Hat Mobile Application Platform running on OpenShift Container Platform, demonstrating how mobile applications can be built quickly and deployed to OpenShift. Red Hat Mobile Application Platform enables developers build enterprise-grade mobile apps that can run on devices but connect securely to enterprise applications and systems in the datacenter.
The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. Facebook, PayPal, Alibaba—these seemingly disparate companies have upended entire industries by harnessing a single phenomenon: the platform business model.
In order to achieve this scale, winning companies are establishing digital platforms with APIs that extend their organizational boundaries.
Attendees will learn from MIT Fellow and Boston University Professor Marshall Van Alstyne and ProgrammableWeb Editor-in-Chief David Berlind:
- Why enterprises need APIs and API strategy models
- The impact of API adoption and complementary investments on enterprise performance and revenue growth, based on new research
- About an “owner’s manual” for creating a platform marketplace, revealing the strategies behind some of today’s rising platforms
Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on Office 365.
This hands-on demo will provide examples of the key Office 365 use cases:
• Zero-day Malware
• Data Leakage
• Account Takeover
• Auditing and Compliance
We’ll show you how to:
• Stop phishing and malware in Office 365 mail
• Quarantine infected files within One Drive,
• Control sensitive information and prevent data leakage,
• Protect against the insider threat, and
• Monitor and enforce regulatory compliance for all users.
Want to know even more about Snaps? In our second webinar on the topic we’ll be taking a technical look at Snaps themselves, our writing and publishing tool Snapcraft, how you can convert your existing applications, and the insight you’ll need to start building your first snaps! Ready to start building? You won’t want to miss this one.
According to analyst firm IDC, using unsupported software can cost financial institutions in additional support, slower deployment times, more maintenance, and lost developer time.
Join this webinar as we explore:
-Hidden costs, which can include additional support, slower deployment times, more maintenance, and lost developer time.
-How using supported open source software can improve time to market.
-The benefits of supported software versus unsupported software.
-How the adoption of supported software versus unsupported software addresses security.
-A developer’s ability to deliver new features and new applications using supported software versus unsupported software.
SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you still want to have full control, traceability and visibility right? Containers are highly volatile, how can you do this if your container doesn’t exist anymore?
Sysdig uses Linux tracepoints to collect and then process and filter kernel system calls and events. Still this requires a deep knowledge on a tcpdump like filtering syntax and understanding on the syscalls involved. Sysdig Inspect makes our deep dive into system calls much more intuitive and visual though a graphical user interface that allows to correlate high level activities like containers, processes, containers, network or file I/O and commands, events or logs.
In this webinar series you will get to know how Sysdig and Sysdig inspect works through a series of practical examples:
-Exploration and performance analysis of container, processes, network and file activity on a typical Wordpress setup
-Debug a 502 HTTP error on a load-balanced Python app with HAproxy
-Troubleshoot a Kubernetes CrashLoopBackOff error
Who should attend?
If you're managing containers in production, using containers for development or just beginning our container exploration, you'll want to attend to understand the challenges of troubleshooting system or application errors when running inside containers.
t is clear that major organisations are starting to integrate RPA solutions into their IT ecosystems and those that haven’t are seriously considering the option, as the number of RPA users is doubling every 6 months.
In this rapidly developing climate, which platform will help your organisation meet their digital transformation goals? Join Andrew Murphy in this webinar, where he will review the core competencies of modern BPM and RPA. Considering whether you should be using neither or both.
In this webinar, K2 will cover:
- Core competencies of Modern BPM
- Core competencies of RPA
- Identifying the key stages of the digital transformation journey
- Where BPM and RPA applies to these stages to help you achieve your short term and long term transformation goals
If your organisation competes in the global market, you should expect GDPR to have a critical influence on the software that powers your business. Having a disciplined software security approach will help you not only identify, remediate, and prevent weaknesses in your software but also avoid violating GDPR.
Listen as experts Adam Brown of Synopsys and legal expert Dan Hedley of Irwin Mitchell, LLP provide insights into what GDPR requirements mean for your security initiative, how your existing security activities can support compliance, and best practices to keep in mind as you look to mature your software security program.
About the Presenters:
Adam Brown is Associate Managing Consultant at Synopsys in the software security consulting division. His background is in software security testing focusing on data centric web application security. Currently he specialises in helping organisations set up their software security initiatives, delivers training in software security and takes a keen interest in the GDPR from both data security and data privacy threat perspectives.
Dan Hedley is a partner at UK law firm Irwin Mitchell LLP. He is a specialist IT lawyer, focusing in particular on software licensing and development, IT service contracts, outsourcing and cloud services. He also advises on open source compliance, data protection, software IP issues and the IT aspects of M&A and IPO transactions. He regularly acts for both established corporates and early-stage and fast growth businesses.”
Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.
The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:
1) Understand the GDPR legal framework
2) Create a Data Register
3) Classify your data
4) Start with your top priority
5) Assess and document additional risks and processes
6) Revise and repeat
Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?
Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:
- How to monitor services and apps built on top of containers
- The benefits of transparent instrumentation for metric collection
- Using dashboards to quickly see and share performance data
- How to quickly determine the what and the why of what’s happening in your environment
Kubernetes has yet to close the developer gap from source code to app running in a production Kubernetes cluster. Many build bespoke tools. How can the Kubernetes community come together to build decomposable solutions that help people define their app, deploy it, and manage its lifecycle over time? Learn about the progress we are making together to elevate the conversation from container orchestration to application lifecycles management.
The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).
As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.
One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.
In this webinar, Yubico and Ping Identity will discuss:
● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement
Alex Yakubov, Senior Director - Ecosystem (Yubico)
Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.
Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
In this webinar Manfred Berger introduces the latest addition to the HGST platform portfolio, the SVR2U24 NVMe all-flash storage server.
Combining high performance NVMe SSDs and Intel®’s Purley server architecture into one tried and tested unit, the SVR2U24 enables customers to come to market quickly with a multitude of software defined storage solutions or data base servers optimized for high speed search operations, catering to a multitude of industry verticals.
95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,
The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.
During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
-2018 Global Cloud Data Security Findings
-Compliance and cloud security: How will this work?
-A shift in the budget: Where is IT spending their money?
-Country breakdown of IT cloud security: Who is doing the best?
-What can you do to secure the cloud and comply with regulations?
Today’s businesses require greater responsiveness and agility in meeting fast-paced, user-driven demand for products, services, and information. In turn, applications need to be designed, developed, deployed, and changed quickly when needed and be exposed to multiple channels, including mobile. To get apps to market fast and adapt them on the fly, low-code development tools and approaches are emerging to take the burden off IT and let the business self-serve.
In this session we'll discuss:
-How a wide range of technologies are coming together to enable the development of low-code, mobile, cloud-enabled, business automation solutions.
-Red Hat's approach to building these process-driven, mobile applications.
- Examples from some of Red Hat's most successful customers.
Introducing the OMG’s Data Residency Maturity Model
With the rise of managed IT services and cloud computing, sensitive data is regularly moved across countries and jurisdictions, which can be in direct conflict with various international, national or local regulations dictating where certain types of data can be stored (e.g., the European Union’ General Data Protection Regulation, or GDPR). Data residency is also a consideration of data owners responsible for protecting and securing data from unintended access.
The Object Management Group® (OMG®), a technology standards consortium, launched a working group in 2015 to address the challenges of data residency and define a standards roadmap to help stakeholders manage the location of their data and metadata.
Given the complexity of the issue, a stepwise improvement plan is necessary. This webinar will introduce a new Data Residency Maturity Model (DRMM) proposed in December 2017. Similar to the Capability Maturity Model (CMM) invented in 1990 at the Software Engineering Institute (SEI), the DRMM contains five maturity levels aimed at helping an organization improve their practices and governance of data residency. The OMG seeks feedback on the DRMM and calls on all interested parties to contribute to this work.
Microservices are a mainstay in the development of most modern applications as the shift to developing several small software components versus a single large application has been popular for a while. Yet even the best teams have trouble integrating security into their implementation. While many organizations see the benefits of the microservice architecture, questions continually arise on its impact on application security programs, especially with the rapid development that goes hand-in-hand with microservices.
Join Brian Pitta, Senior Solutions Architect at CA Veracode who will discuss:
•The need to keep up with the speed of DevSecOps and how to automate and integrate security testing with rapid feedback loops;
•How to run and measure an effective AppSec program at scale and maintain a holistic view of all your applications given the shift to a more “decentralized” application environment to which the microservice architecture lends;
•The importance of staying current with technology trends to equip an agile development team and continually enhance support for additional frameworks, languages and integration points
A practical way to get started with IIoT in a brownfield factory is by creating a “Green Patch in your Brownfield.”
Everyone is talking about deploying IIoT in brownfields to achieve incremental gains in productivity. But in the greenfield, IIoT can deliver a game changer: to change your business model to mass customization through adaptive machines. Batch size of one. Deliver direct from the production line to consumers. Flatten your supply chain, your sales chain. No greenfield in your near future? To get started, get focused. For your next capex, put a 'focused factory' in your existing plant -- a 'green patch' in your brownfield. Learn from a pilot project the full potential of IIoT with today's state of the art automation technologies, not the legacy assets of the brownfield.
Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.
We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!
During the live demo will walk you through what Sysdig Secure can do:
-Implement application and service aware policies
-Block incoming attacks and container break-ins
-Audit executed commands
-Intrusion forensics: pre and post attack investigation
-Unify monitoring & security workflows
AI isn’t a nice-to-have any more, it’s a must-have. There’s a reason why corporate giants like Google, IBM, Yahoo, Intel, Apple, and Salesforce are competing to snatch up private AI companies. In the first quarter of 2017 alone, 37 AI companies were swallowed whole.
Companies aren’t just using these AI tools to enable existing marketing strategies; they’re taking those strategies to the next level, going beyond simple retention and delivering active engagement. AI technology offers companies unprecedented insight into customer behaviors, patterns, and beliefs, allowing you to seamlessly anticipate customer needs and serve up hyper-personalized, emotionally resonant campaigns where and when they’re most welcome.
2018 is the year to seize the AI advantage. To learn more about the technology you need, the opportunities it unlocks, and what it takes to get your ball in the game, don’t miss this VB Live event!
In this webinar, you'll learn:
* What’s new in AI for 2018 -- and what’s coming down the pike
* How businesses are using AI to drive results
* How to go beyond customer retention and power customer engagement
* Brian Gross, VP Digital Innovation, Aeromexico
* Dan Wulin, Director of Data Science, Wayfair
* Michael Healey, President, Yeoman Technology Group
* Rachael Brownell, Moderator, VentureBeat
Hear from Steve Stone, former CIO of L Brands and Lowe's, as he reveals his advice in building a compelling customer experience. Learn how he has led major retailers to embrace technology as a strategic enabler and execute key use cases like eCommerce and omnichannel.
Attendees will learn:
- How L Brands and Lowe's digitized the in-store experience to better engage with customers
- How MuleSoft has helped his companies go 3x faster with self-service across the organization through reusable assets
- Real-life lessons from a seasoned technology leader who has spent 34+ years in the technology space
- Practical steps to embrace a new IT operating model that focuses on the customer
Most of your core applications weren’t built for the cloud era. But they could do even more for your business if they made the leap. The question is: How?
Skytap’s cloud experts can help you migrate core workloads into a modern IT portfolio and build a true ‘always on’ business.
Join us for 30 minutes on 28th February at 2.00PM GMT / 3.00PM CET to learn how we can help you:
- Optimise IT spend
- Boost business agility
- Clone testing environments instantly
- Drive sustainable cloud innovation
Unlock the full innovation potential of your core applications in just days – with truly unique Skytap insight.
Performance testing is more relevant than ever. It’s even more prominent in the software development life cycle than in the past. What’s changed is that development and testing teams now can test component level performance earlier than ever with tools such as Service Virtualization.
It’s now easier to identify and fix performance-related issues as they are being worked much earlier than before, when performance testing was done during a formal performance testing cycle in the stage environment after multiple code builds have hidden those issues deeper across several application layers.
This session will cover the basics of how to shift performance testing left so that development and testing teams can test component level performance using CA Service Virtualization and CA BlazeMeter.
Modern software is getting complicated, and we’re simply not able to hire or train people fast enough to operate it due to the complexity of micro-services running across many machines. Juju from Canonical allows you to deploy open source operations code and model-driven operations at any scale on any cloud. Join the Juju team to find out:
>The basics of Juju from Charms to Bundles
>How to easily deploy solutions and scale up from one simple dashboard
>How Juju can be used for deep learning, container orchestration, real-time big data, or stream processing
>How you can use Juju to simplify your operations!
Unique to the industry, CMD+CTRL are simulators where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.
For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.
We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.
When taking existing monoliths and decomposing their components into new microservices, the most critical concerns have much less to do with the application code and more to do with handling data.
In this webinar, Kenny Bastani from Pivotal and Jason Mimick from MongoDB will focus on various methods of strangling a monolith’s ownership of domain data by transitioning the system of record over time. The new system of record, MongoDB, will fuel rapidly built and deployed microservices which companies can leverage for new revenue streams.
They will use practices from Martin Fowler’s Strangler Application to slowly strangle domain data away from a legacy system into cloud-native MongoDB clusters using microservices built with Spring Boot and Spring Cloud.
Kenny Bastani is a Spring developer advocate at Pivotal. As a passionate blogger and open source contributor, Kenny engages a community of passionate developers on topics ranging from graph databases to microservices. Kenny is a co-author of Cloud Native Java: Designing Resilient Systems with Spring Boot, Spring Cloud, and Cloud Foundry from O’Reilly.
Jason Mimick is the Technical Director for Partners at MongoDB developing new product and technical innovations with a number of companies. He's been at MongoDB nearly 4 years and previously spent the last 20-odd years in various engineering positions at Intersystems, Microsoft, and other companies.