Delivering great quality apps demands great scrutiny to the various aspects of the user experience. This attention to quality goes far beyond the initial design phase. Achieving this level of success requires investment and maturity from the entire organization in time, resources, and skills. HPE Mobile Center software is your single gateway that enables you to redefine such 5-star experience. By delivering a predictable and repeatable mechanism for testing, monitoring and improving your mobile apps throughout its lifecycle you create an unforgettable experience.
And today, HPE Mobile Center got even better. With Mobile Center 2.0, we are bringing the following capabilities – and more - to further enhance your mobile app lifecycle:
Multiple hybrid cloud options to choose from: locally or distributed, locked in a secure room, in Amazon Device Farm
End-to-end testing with full control over devices, inclusive of system apps
We expand Appium and Selenium to enterprise-grade testing
RecordedJul 6 201662 mins
Your place is confirmed, we'll send you email reminders
The concept of “shift left” engages security earlier in the development cycle of cloud-native applications, accelerating development while reducing risk. However, migrating to cloud-native environments also necessitates the security team to “shift up”, focusing on the application layer to account for the shared-service model and “thin OS” environments that are prevalent in these environments.
Attend this webinar to learn why Shifting Up provides improved security and cost efficiency in cloud-native environments, including:
- Kubernetes orchestrated applications
- Containers running on VMs
- Serverless containers (e.g., AWS Fargate and Azure Container Instances)
- Serverless functions (e.g., AWS Lambda and Azure Functions)
With today's enterprises leveraging around 1000 applications and multiple clouds, application security is becoming a key area of focus. Application security testing is being integrated into the DevOps process early on, while automation, speed and coverage and becoming critical to the success of DevSecOps programs.
Join this interactive panel of industry experts to learn more about:
- Why application security is critical
- Key principles for building application security into DevOps
- Best practices for leveraging automation
- Speed vs Security: Where do you draw the line?
- Recommendations for improving security in 2019
Matt Baldwin, NetApp and Former Founder StackPoint Cloud; Ingo Fuchs, NetApp; Mike Jochimsen, Kaminario
Kubernetes (k8s) is an open-source system for automating the deployment, scaling, and management of containerized applications. Kubernetes promises simplified management of cloud workloads at scale, whether on-premises, hybrid, or in a public cloud infrastructure, allowing effortless movement of workloads from cloud to cloud. By some reckonings, it is being deployed at a rate several times faster than virtualization.
In this presentation, we’ll introduce Kubernetes and present use cases that make clear where and why you would want to use it in your IT environment. We’ll also focus on the enterprise requirements of orchestration and containerization, and specifically on the storage aspects and best practices.
•What is Kubernetes? Why would you want to use it?
•How does Kubernetes help in a multi-cloud/private cloud environment?
•How does Kubernetes orchestrate & manage storage? Can Kubernetes use Docker?
•How do we provide persistence and data protection?
•Example use cases
Moderator: Daniel Blander, Virtual Clarity; Paul Farrington, CTO - Veracode EMEA
As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.
So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.
From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.
Robotic Process Automation (RPA) technology creates digital factories to automate and integrate any repetitive administrative tasks. RPA reduces labor-intensive processes by imitating human effort to complete tasks, thereby boosting the capabilities of companies that perform high-volume transactional processes. Operating non-invasively on the surface (UI layer) without compromising the underlying IT infrastructure, RPA bridges the technology gap between fragmented, semi-structured legacy systems. The RPA solution is based on industry leading products Operations Orchestration (OO) and Unified Functional Testing (UFT). During this session, you will learn more about this RPA solution with a live demonstration.
At this session we will cover the What and Why of RPA, as well as, hear how some customers are already benefiting:
•Save time and money and learn how growth in adoption of RPA technology by organizations is allowing for greater speed and scalability while at the same time reducing risk
•Overcome manual limitations and gain efficiencies; RPA helps IT eliminate human errors introduced by workarounds and manual data entry, all while completing tasks in record time
Brought to you by the Vivit Application Performance Management Special Interest Group (SIG).
After merging monitoring teams for consolidation and cost reduction opportunities, a larger retailer was faced with the challenge of merging the tools into one unified platform. We had two APM instances, both underutilized, that were good candidates to start with. The environments consisted of BSM 9.26 w/Oracle database and APM 9.40 w/SQL server.
This webinar will walk through the deployment plan, problems, and successes we had along the way.
•BSM9.2x to APM Comparison
•Deciding on a Migration Path
•Path of least resistance and down time
•Moving things over
•Shutting down decomd instance
•Things you should know
•Q and A session
Containers are a big trend in application deployment. The landscape of containers is moving fast and constantly changing, with new standards emerging every few months. Learn what’s new, what to pay attention to, and how to make sense of the ever-shifting container landscape.
This live webcast will cover:
•Container storage types and Container Frameworks
•An overview of the various storage APIs for the container landscape
•How to identify the most important projects to follow in the container world
•The Container Storage Interface spec and Kubernetes 1.13
•How to get involved in the container community
After you watch the webcast, check out the Q&A blog at http://bit.ly/2GPkFET
Learn from industry-leading Cloud Strategist Jeffrey Deverter how to modernize your applications using continuous deployment and continuous integration on the Cloud.
Jeffrey will discuss a methodology that will enable you to modernize applications to reap several business benefits - including Agile improvements, transparency into the true cost of ownership of application operation - and share advice on how to drive business value and the direction of applications.
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
Learn about Data Protection solutions for enterprise.
Learn about the new trends in Data Masking, Tokenization and Encryption.
Learn about new Standards for masking from ISO and NIST.
Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.
The contemporary code review practice has been adopted by many organizations and open source projects as a quality assurance measure. This process typically involves software tools such as Review Board and the time of one or more peer reviewers.
However, there is a growing body of empirical research about this broadly‐adopted practice that can help us learn more about the effects of code reviews on software quality. Available research shows that in fact, peer code reviews are better suited for knowledge sharing and code improvements, rather than for eliminating code defects or reducing error rates. The effectiveness of the process seems to depend on the experience of the reviewer with the code, the size of the change set, and the rate at which the review is conducted.
In this talk, Nikolai will share how the LinkedIn Flagship Product Engineering team leverages the code review process to spread organizational knowledge and uplevel individual contributors. I will also discuss the tools we’ve built to support this practice across a team which spans three offices, four development stacks, dozens of teams, and hundreds of individual contributors.
Aaron Weaver, Application Security Architect, OWASP and DefectDojo
How fast can you build out a new security microservices? Building a security pipeline that scales with your development and operations team is achievable by creating security microservices that can be programmed in a variety of languages, cloud agnostic and infinitely scale.
In this talk, Aaron will walk through the process of building a security automation pipeline starting with building containers in the first iteration and then moving to OpenFaaS to create simple Serverless functions. Building security automation into your program is essential in building out a scalable security services.
Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlue
Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API security defenses as it beats back malicious ShipRaider.
As ShipFast launches its mobile app with hidden API keys and OAuth2 user authorization, we'll start discussing the existing security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, app attestation and more will strengthen ShipFast's security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep exploiting ShipFast's API.
This fast-paced overview of mobile attacks and counter-measures demonstrates the defense in-depth techniques required to protect both your mobile apps and your API backends.
As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
What no one tells you is that you're only looking at one of the three factors that lead to career success.
In this session, you will:
- Learn the other two factors (and what you should do about them)
- Learn the four levels of thinking needed to be an expert who leads
- Assess where you are in each of the areas
- Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
Join Asankha Perera and Chathura Widanage from SLAppForge to learn about:
- A significantly more productive IDE for Serverless computing
- How to develop an end-to-end Serverless application in a few minutes
- How to build, test and deploy applications without leaving the IDE
- Work hands-on with the AWS API Gateway, Lambda, DynamoDB and S3
- Learn about upcoming features - Serverless security and monitoring
Dan Garfield, Chief Technology Evangelist, Codefresh.io
Most people think “adopting containers” means deploying Docker images to production. In practice, adopting containers in the continuous integration process provides visible benefits even if the production environment are VMs. In this webinar, we will explore this pattern by packaging all build tools inside Docker containers. Container-based pipelines allow us to create and reuse building blocks to make pipeline creation and management MUCH easier. It’s like building with Legos instead of clay.
This not only makes pipeline creation and maintenance much easier, it also solves a myriad of classic CI/CD problems such as:
Putting an end to version conflicts in build machines
Eliminating build machine management in general
Step portability and maintenance
In a very real sense, Docker-based pipelines reflect lessons learned from microservices in CI/CD pipelines. We will share tips and tricks for running these kinds of pipelines while using Codefresh as a CI/CD solution as it fully supports pipelines where each build step is running on its own Docker image.
Ruchir Shastri, President & Founder, SoftSys Hosting
Most often developers are spending hours of their valuable time in deploying their application, tweaking the environment to make their apps work and monitoring them to ensure that they have enough resources to run smoothly. This reduces productivity. Developers are responsible for doing the more important task of making intelligent & user friendly apps and software solutions.
It is about time that you leverage a platform that helps in automating the process of scaling your cloud environment with intelligent rules. This ensures that your cloud platform always has sufficient resources to operate smoothly at all times & you only pay for what you use (and not pay for limits or unused portions of flat rates). Additionally, we will also walk through the easy & zero code change deployment, secure containerised setup & self service dashboard to help you address familiar business problems like:
Complex Management & High TCO
Difficult Migration Flow to Cloud & Containers
Long Time to Market & Slow Product Upgrades
Limits in data location due to security reasons
"In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.
Join cloud, security and compliance experts as they discuss:
- How to proactively analyze security risk from the business perspective
- What you need to know about your data, and how to ensure it is compliant when in the cloud
- How to automate security policy changes
- Top challenges for CISOs and CIOs
- Achieving security and compliance across multiple clouds
- Steps to take today"
Benny Czarny, CEO and Founder, OPSWAT
Tzach Horowitz, Pre-Sale Director, Cybergym
Ariel Zeitlin, CTO and co-founder, Guardicore
Diana Kelley, Cybersecurity Field CTO, Microsoft