Hi [[ session.user.profile.firstName ]]
Sort by:
    • Top 6 Cases for Implementing a Low-Code Platform - and Two Real Examples Top 6 Cases for Implementing a Low-Code Platform - and Two Real Examples John Rymer of Forrester Research Recorded: Mar 1 2016 4:30 pm UTC 61 mins
    • Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.

      With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?

      Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.

      Read more >
    • Unlocking Hard-to-Reach Data with No-Code Integration Unlocking Hard-to-Reach Data with No-Code Integration Michael Wacht, VP of Operations and Infrastructure & Scott Lasenby, Supervisor, Financial Planning & Analytics, Helm Recorded: Mar 17 2016 4:00 pm UTC 59 mins
    • Are you struggling to access vital business data locked in your company's on-premises systems like ERP?

      In this webinar, you'll discover how business professionals can easily and automatically connect to data stored in any system, on premises or in the cloud, via CSV files in the cloud to drive seamless processes and better decisions.

      Hear Michael Wacht and Scott Lasenby from Helm explain how a leading distribution company transformed a key business process, saving their accounting department 300 hours a year.

      Watch now to learn how you can:

      -Access critical data stored in hard-to-reach systems with no code
      -Leverage data to drive seamless processes and better decisions
      -Eliminate copy/paste and manual imports between systems
      -Use a top application development platform designed for business professionals and its built-in no-code integration feature to automatically pull critical business data and instantly put it to use

      Read more >
    • Neue Maßstäbe in der Versicherungswirtschaft mit dem Code of Conduct Neue Maßstäbe in der Versicherungswirtschaft mit dem Code of Conduct Wolfgang Epting, Data Security Group Subject Matter Expert / Product Specialist / EMEA Recorded: Jul 21 2015 8:00 am UTC 48 mins
    • Wie Sie sicher wissen, untersagt das deutsche Bundesdatenschutzgesetz in seiner Zweckbindungsklausel das Verwenden von sensitiven Echtdaten in Test-, Entwicklungs- und Schulungssystemen. Dennoch sehen wir, dass eine Vielzahl von Unternehmen dieses Risiko immer noch eingeht und sich davor scheut, die nötigen Anpassungen durchzuführen.

      Die deutsche Versicherungswirtschaft begegnet diesem Thema mit dem Code of Conduct über den GDV als Vorreiter nun offensiv.

      Der GDV (Gesamtverband der deutschen Versicherer) ist der erste Verband in Deutschland, der für eine freiwillige Selbstverpflichtung zum Schutz von personenbezogenen Versichertendaten die Zustimmung der Datenschutzbehörden erhalten hat.

      Sämtliche deutschen Versicherungsunternehmen die dem Code of Conduct (CoC) bis Ende 2014 beigetreten sind haben sich damit verpflichtet, dem Datenschutzkodex des GDV innerhalb von 3 Jahren gerecht zu werden.

      Mit den neuen Verhaltensregeln wird transparent, was von der Antragstellung bis zur Schadenregulierung mit personenbezogenen Daten geschieht.

      Lernen Sie wie Informatica die Anforderungen aus dem CoC (Anonymisierung für sensitive Daten in Produktion sowie Test & Entwicklung) umsetzt und gleichzeitig Ihr Testdatenmanagement modernisieren kann.

      Da gemäß BSDSG als auch neuester EU-Novelle Datenschutz ein branchenübergreifendes Thema ist, sind alle Interessenten herzlich zu diesem Webinar eingeladen, die direkt (z.B. Datenschützer) oder indirekt (z.B. Test-Manager, Enterprise Architekten) mit dem Thema konfrontiert werden.

      Unternehmensweiter Datenschutz vom Marktführer – seien sie dabei !

      Read more >
    • DBA Code Reviews Done Dirt Cheap DBA Code Reviews Done Dirt Cheap Robert Davis Recorded: Apr 30 2014 9:00 pm UTC 79 mins
    • Do you know what code is going into your production systems? How can you support something you haven't seen? Whether you currently do code reviews or think it might be a good practice to start doing, this session will help you make the most of the code review process. For DBAs, we'll cover key things to look for such as looking for potential problems. For developers, this will be insight for you into how DBAs think when reviewing your code so you have a better idea what to expect.
      •Learn what kind of things to look for when reviewing code
      •Gain insight into what to expect from a DBA when they review your code
      •Discover how to have an effective communication between DBA and developer

      Read more >
    • Securing the IoT: next generation Code Signing Securing the IoT: next generation Code Signing Abhinav Sharma and Dave Roche, Product Managers for Symantec Secure App Service Recorded: Jul 13 2016 2:00 pm UTC 49 mins
    • With the explosion of connected objects and mobile devices, publishing or sharing software - even internally - has become a real challenge for companies with a coding activity. In this webinar, we will explore the code signing threat landscape and share our best practice and solutions to all your code signing needs. You will learn about:

      - the value of code signing today and the new code signing use cases in the world of IoT

      - the risks associated with traditional code signing: key management, auditing and reporting, multitude of signing platforms and files, compliance, embedding in the development process, etc.

      - the security and development costs to take into account

      - how to transition from a traditional to a next generation code signing activity thanks to Cloud based signing

      Read more >
    • Compliance as Code with InSpec 1.0 Compliance as Code with InSpec 1.0 Christoph Hartmann, InSpec core contributor & George Miranda, Product Marketing Manager Upcoming: Oct 25 2016 5:00 pm UTC 60 mins
    • InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.

      Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.

      Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.

      In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.

      Join us to learn about:
      - What’s new in InSpec 1.0
      - InSpec enhancements for Microsoft Windows systems
      - Integration between InSpec and Chef Automate

      Who should attend:
      Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.

      Read more >
    • Can This Code Be Trusted?: Why Code Signing is Essential for IoT Can This Code Be Trusted?: Why Code Signing is Essential for IoT Stephen Helm, Sr Product Marketing Manager - Gemalto Recorded: Apr 20 2016 2:00 pm UTC 40 mins
    • Code signing protects the Devices we use every day; in devices you expect as well as ones you may not have thought about. Code signing is used heavily in transportation; cars, planes, busses, tractors, etc all leverage code signing on various parts to ensure from the manufacturer that they are all up to spec, safe and have a valid origin.
      As the Internet of Things expands so does the need for trust that the code comes from the correct source. From Fridges to Bridges, Satellites to street lights, code signing is everywhere. Unfortunately, our adversaries have started to recognize value of stealing the sensitive cryptographic keys that underpin the code signing process.
      Join Gemalto on this webinar to learn:
      •The value of code signing in IoT
      •How hackers are increasingly trying to steal signing keys
      •Methods for high-assurance code signing
      •And more!

      Read more >