The 2019 Accelerate State of DevOps Report continues to show that software delivery and operational (SDO) performance drives organizational performance. The data also supports analyst reports that the industry is crossing the chasm: this year, there were almost 3x the proportion of elite performers compared to last year, with low performers shrinking slightly. This was driven by cloud adoption and execution on the key capabilities that drive performance.
Extending Jenkins to the Mainframe. A Simpler Approach.DevOps.com
Wouldn’t it be great to use familiar tools when you’re needing to integrate mainframe applications into your DevOps pipeline?
Mainframe applications have historically required specialized tools and knowledge to build, maintain and integrate with distributed systems. Existing tool integrations are designed for vendor-specific tool chains and they require a great deal of specialized knowledge and expertise to set up.
CA Technologies engineering decided to break with tradition and utilize advancements on the zOS platform to provide a Command Line Interface that turns Mainframe into “just” another deployment target for the DevOps pipeline.
In this webinar the presenters will show how to integrate, build and test COBOL applications into a modern DevOps pipeline managed by Jenkins Continuous Integration software.
Running on Amazon EKS – How Greenlight Gets Security RightDevOps.com
Like so many FinTech innovators, Greenlight has turned to containers and Kubernetes to enable rapid application development. It’s also turned to AWS to host many of its apps, so the company can focus internal resources on teaching financial literacy to the next generation.
Using GitHub and Visual Studio Code for Mainframe DevelopmentDevOps.com
Developers can now use these popular, dev-friendly tools with mainframe applications. Join this session to learn how to use GitHub and VS Code with mainframe-native code and languages like COBOL. For developers already familiar with these tools, mainframe development becomes more like other platforms. For mainframe developers new to these tools, combining their productivity and collaboration benefits with access to a broad array of devops tool opens a world of possibilities.
The presenters will demonstrate GitHub with the Git bridge to CA Endevor, the dominant mainframe-native SCM, allowing next-generation developers to work alongside their peers who use traditional tools. The Zowe open source extension for Visual Studio Code, which enables additional interactions with the mainframe without ever seeing a green screen, will also be demonstrated.
Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...DevOps.com
ABN AMRO is using continuous integration/continuous delivery to help to accelerate software delivery and improve security. In this webinar, ABN AMRO's Stefan Simenon, Head of Centre of Expertise Software Development & Tooling and Wiebe de Roos, CI/CD Consultant Engineer, explain the journey, the approach, tools used, results realized and the way forward.
Join us on Tuesday, March 27 for this webinar, Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Security to learn how thru ABN AMRO's CI/CD process they were able to:
Double the velocity of their developers
Respond to competitive threats more quickly
And introduce new innovation on an ongoing basis
Join this session to explore how a new generation of operational APIs enables the mainframe to become a more integrated and seamless platform. By focusing on common use cases, like trouble ticketing and metrics reporting, this session will equip attendees with high-value opportunities to modernize and automate their workflows.
Examples will include use of the Zowe open source framework and leverage various product and 3rd party APIs.
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
In the past decade, IDC has seen IBM Z evolve first from a siloed platform to what they call a "connected" platform, and then to a "transformative" platform. This transition has been driven by IBM, by the IBM Z software vendors, like Rocket Software, and by businesses themselves.
IDC research shows that businesses that choose to modernize IBM Z achieve higher satisfaction than re-platformers and many are using open source software (OSS) in their modernization initiatives. Employing OSS makes it possible to crack the platform open and enable it to connect to the rest of the datacenter and the outside world. Join IDC guest speaker, Al Gillen and Peter Fandel as they take a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z. In this webinar we’ll discuss:
How OSS can neutralize the disparity between seasoned IBM Z and emerging developers
The modernization initiatives that involve OSS
What to consider before bringing OSS to IBM Z
How Rocket Software is delivering commercially supported OSS to IBM Z
Measure Customer Value with Self-Service ObservabilityDevOps.com
Today’s digital economy and customer experience demands flawless service availability and reliability whilst delivering customer value at ever increasing pace. This rate and scale of change requires automation to assist teams as they continuously evolve digital products and services. Any compromised reliability or availability along the way means fundamentally taking two steps backwards in terms of customer experience and value delivery, instead of one step forward.
To keep up constant development momentum as they scale services and experience, teams are turning to self-service observability for better insights and context that grow with their services, and allow development teams to focus their time on delivering the value that customers want.
What you’ll learn:
What does a truly self-service observability solution mean to you
How customer value and experience insights are derived from your data
How you can transform your data to enrich your data for more context
How applying AI to your data continues to automate, automate, automate
What AI techniques can benefit you and your processes
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleDevOps.com
Improve and simplify securing Red Hat OpenShift containerized environments by leveraging CyberArk’s secrets management solutions and out-of-the-box certified integrations. This demo heavy technical session expands on the prior webinar and uses demos and examples to give practical guidance on how to improve securing your organization’s containerized applications. All while avoiding impacting developer velocity.
This session will provide:
A clear understanding of the challenges and requirements for securing Kubernetes and Red Hat OpenShift containerized environments at enterprise scale
The benefits of enhancing the native secrets management and security capabilities of OpenShift with CyberArk’s certified integrations
Guidance to address common security challenges, including achieving enterprise scale and availability, minimizing the time spent on audit and compliance requests, avoiding problems with developer adoption
Practical steps to get started using Conjur Open Source and next steps
CyberArk, the global leader in privileged access management, offers the industry’s most complete solution for securing both the credentials and secrets used by applications, Playbooks, scripts and other non-human identities, as well as human users. CyberArk solutions are deployed at many of the world’s largest enterprises including over half the Fortune 500.
Extending Jenkins to the Mainframe. A Simpler Approach.DevOps.com
Wouldn’t it be great to use familiar tools when you’re needing to integrate mainframe applications into your DevOps pipeline?
Mainframe applications have historically required specialized tools and knowledge to build, maintain and integrate with distributed systems. Existing tool integrations are designed for vendor-specific tool chains and they require a great deal of specialized knowledge and expertise to set up.
CA Technologies engineering decided to break with tradition and utilize advancements on the zOS platform to provide a Command Line Interface that turns Mainframe into “just” another deployment target for the DevOps pipeline.
In this webinar the presenters will show how to integrate, build and test COBOL applications into a modern DevOps pipeline managed by Jenkins Continuous Integration software.
Running on Amazon EKS – How Greenlight Gets Security RightDevOps.com
Like so many FinTech innovators, Greenlight has turned to containers and Kubernetes to enable rapid application development. It’s also turned to AWS to host many of its apps, so the company can focus internal resources on teaching financial literacy to the next generation.
Using GitHub and Visual Studio Code for Mainframe DevelopmentDevOps.com
Developers can now use these popular, dev-friendly tools with mainframe applications. Join this session to learn how to use GitHub and VS Code with mainframe-native code and languages like COBOL. For developers already familiar with these tools, mainframe development becomes more like other platforms. For mainframe developers new to these tools, combining their productivity and collaboration benefits with access to a broad array of devops tool opens a world of possibilities.
The presenters will demonstrate GitHub with the Git bridge to CA Endevor, the dominant mainframe-native SCM, allowing next-generation developers to work alongside their peers who use traditional tools. The Zowe open source extension for Visual Studio Code, which enables additional interactions with the mainframe without ever seeing a green screen, will also be demonstrated.
Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...DevOps.com
ABN AMRO is using continuous integration/continuous delivery to help to accelerate software delivery and improve security. In this webinar, ABN AMRO's Stefan Simenon, Head of Centre of Expertise Software Development & Tooling and Wiebe de Roos, CI/CD Consultant Engineer, explain the journey, the approach, tools used, results realized and the way forward.
Join us on Tuesday, March 27 for this webinar, Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Security to learn how thru ABN AMRO's CI/CD process they were able to:
Double the velocity of their developers
Respond to competitive threats more quickly
And introduce new innovation on an ongoing basis
Join this session to explore how a new generation of operational APIs enables the mainframe to become a more integrated and seamless platform. By focusing on common use cases, like trouble ticketing and metrics reporting, this session will equip attendees with high-value opportunities to modernize and automate their workflows.
Examples will include use of the Zowe open source framework and leverage various product and 3rd party APIs.
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
In the past decade, IDC has seen IBM Z evolve first from a siloed platform to what they call a "connected" platform, and then to a "transformative" platform. This transition has been driven by IBM, by the IBM Z software vendors, like Rocket Software, and by businesses themselves.
IDC research shows that businesses that choose to modernize IBM Z achieve higher satisfaction than re-platformers and many are using open source software (OSS) in their modernization initiatives. Employing OSS makes it possible to crack the platform open and enable it to connect to the rest of the datacenter and the outside world. Join IDC guest speaker, Al Gillen and Peter Fandel as they take a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z. In this webinar we’ll discuss:
How OSS can neutralize the disparity between seasoned IBM Z and emerging developers
The modernization initiatives that involve OSS
What to consider before bringing OSS to IBM Z
How Rocket Software is delivering commercially supported OSS to IBM Z
Measure Customer Value with Self-Service ObservabilityDevOps.com
Today’s digital economy and customer experience demands flawless service availability and reliability whilst delivering customer value at ever increasing pace. This rate and scale of change requires automation to assist teams as they continuously evolve digital products and services. Any compromised reliability or availability along the way means fundamentally taking two steps backwards in terms of customer experience and value delivery, instead of one step forward.
To keep up constant development momentum as they scale services and experience, teams are turning to self-service observability for better insights and context that grow with their services, and allow development teams to focus their time on delivering the value that customers want.
What you’ll learn:
What does a truly self-service observability solution mean to you
How customer value and experience insights are derived from your data
How you can transform your data to enrich your data for more context
How applying AI to your data continues to automate, automate, automate
What AI techniques can benefit you and your processes
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleDevOps.com
Improve and simplify securing Red Hat OpenShift containerized environments by leveraging CyberArk’s secrets management solutions and out-of-the-box certified integrations. This demo heavy technical session expands on the prior webinar and uses demos and examples to give practical guidance on how to improve securing your organization’s containerized applications. All while avoiding impacting developer velocity.
This session will provide:
A clear understanding of the challenges and requirements for securing Kubernetes and Red Hat OpenShift containerized environments at enterprise scale
The benefits of enhancing the native secrets management and security capabilities of OpenShift with CyberArk’s certified integrations
Guidance to address common security challenges, including achieving enterprise scale and availability, minimizing the time spent on audit and compliance requests, avoiding problems with developer adoption
Practical steps to get started using Conjur Open Source and next steps
CyberArk, the global leader in privileged access management, offers the industry’s most complete solution for securing both the credentials and secrets used by applications, Playbooks, scripts and other non-human identities, as well as human users. CyberArk solutions are deployed at many of the world’s largest enterprises including over half the Fortune 500.
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that MatterGene Kim
Stephen Elliot, VP of IDC
DevOps is the modern way to deploy new IT capabilities that drive and deliver business results. This session will dive into the key metrics that large companies are using to gauge the success and measure results utilizing the DevOps discipline. The session will answer the following questions:
What are some of the key technology and business metrics that large organizations are using to measure and manage DevOps projects?
What are the critical success factors required when communicating with the business on Devops delivered projects?
What role do the security and compliance teams play in DevOps, and related metrics?
Dependency Health: Removing the Barriers to Keeping Projects in ShapeDevOps.com
Enterprises and Developers already know the importance of managing vulnerabilities and dependencies, so why do so many still fall behind?
Like maintaining good physical health, software projects require more than just good intentions - there needs to be sensible and achievable process that developers want to follow, and the rewards must outweigh the demands.
In this webinar, David Habusha and Rhys Arkins from WhiteSource will discuss some of today's challenges that hold enterprises back from having great Open Source dependency management, and identify what the missing pieces are for a future in which updates and vulnerability patches can be applied intelligently, safely, and in many cases even automatically.
Using Collaboration to Make Application Vulnerability Management a Team SportDenim Group
Vulnerability management - especially application vulnerability management - is a challenging business function because it crosses disciplinary boundaries. Security teams find and adjudicate vulnerabilities, DevOps and server ops teams have to fix them, and GRC teams need to be kept apprised of status and progress. As has always been the case - but especially in a necessarily remote work environment - collaboration is key to making these business functions operate efficiently and effectively. This webinar looks at common bottlenecks that snarl vulnerability remediation workflows and discusses strategies to address these issues via collaboration. Examples are given of implementing these via the ThreadFix platform, but the strategies are universally-applicable for vulnerability management professionals looking to streamline their vulnerability remediation workflows.
DevOps in the Real World: Know What it Takes to Make it WorkVMware Tanzu
DevOps Loop at VMworld
Session Title: DevOps in the Real World: Know What it Takes to Make it Work
Speaker: Bola Rotibi, Research Director, Software Development, CCS Insight
The 7 Secrets of Performance Management in Virtualized EnvironmentseG Innovations
Whether you virtualize desktops or critical business applications, the dynamics and complexities of virtualized environments can cause significant performance and user experience issues that can diminish the benefits of virtualization and risk interruption of critical business processes. The toughest performance problems are the ones where users call and complain that "my application is slow". IT administrators often struggle to determine the root-cause of the problem and restore service levels: Is it the application server? The virtualization layer? Is it the network? Database? Storage ...?
Join our live webinar with virtualization experts Dave Bartoletti (Forrester Research) and Srinivas Ramanathan (eG Innovations), and find out how to deliver:
• Reliable performance assurance and user satisfaction
• Complete performance visibility across your virtualized environment
• Automatic, rapid root cause diagnosis for even the most complex performance problems
• Pre-emptive problem detection and alerting before users call
• Rapid ROI through right-sizing and optimization
Accelerate DevOps Transformation with App Migration to the CloudXebiaLabs
Migrating enterprise apps to the cloud may sound like a daunting leap, but it doesn’t have to be! Hear how Lincoln Financial Group, a 113-year old insurance institution is moving from a traditional development infrastructure organization to functional DevOps teams deploying applications to the cloud.
The modern IT stack has become diverse and distributed, and it’s increasingly challenging to manage heterogeneous platforms and multi-vendor devices. Customers are looking to the cloud and APM to help address these hurdles, as well as accelerate IT transformation.
But migrating to the cloud will take time, it won’t make infrastructure ‘just disappear’, and legacy workloads are going to remain part of the enterprise reality for many. In addition, while APM will continue to be increasingly important, all applications are not the same and an application is still not equal to a digital business service.
Watch this webinar as John Worthington, a service management expert and Director of Product Marketing for eG Innovations, continues our Shift-Left series. You can learn:
• Why domain expertise is important when defining monitoring requirements
• What analytics are useful from a monitoring and observability context
• How end-to-end monitoring with converged application and infrastructure performance can drive ITSM and DevOps integration
2018 Citrix Migration Survey - Industry InsightseG Innovations
With the end of maintenance of Citrix XenApp 6.5 approaching quickly (June 30, 2018), there is increased adoption of Citrix XenApp and XenDesktop 7.x. eG Innovations and DABCC have conducted a joint survey across 795 Citrix professionals to understand this migration trend, challenges involved, and performance expectations.
Read this survey analysis report and understand how the industry is gearing up for Citrix XenApp and XenDesktop 7.x adoption.
DevOps has made great strides in reducing bottlenecks in the software delivery process. Yet, it is surprising how many organizations keep DevOps on a separate track from long-established IT service management (ITSM) implementations and systems such as ServiceNow. Consequently, development teams find it challenging to track features, user stories, and IT service requests across different tools for backlog management and ITSM.
But how do they make sure tickets are closed when the work is complete? How can they ensure compliance? And can they answer the ultimate question: Which feature actually made it into which release?
What is DevOps? A lot of people think it means a lot of different things. We tend to think it has two complimentary aspects: culture and technology changes. Culture is what creates DevOps, technology enables it. Thanks, Kelly Goetsch, for the slide work.
Building an Adoption Plan: Turning it on(Part 2 of 2)Cisco Canada
Now that you understand what's included in your License agreement, it's time to get your employees excited to turn on the features and start reaping the benefits of your investment. The session will continue our discussion around adoption planning with best practices for employee training & engagement of your collaboration investment. This is a great opportunity to tap into your employees' creativity and empowering them to build new functionalities and applications leveraging devices they already are comfortable with. We will also review how to track utilization and consumption rates so you can reconcile your investment against the productivity gains you will see.
SDM: The Fundamentals of Software Delivery ManagementDevOps.com
Research and experience have proven that breaking down the barriers between Dev and Ops can yield tremendous efficiency, quality and velocity enhancements for software delivery teams.
But, in the spirit of continuous improvement… what’s next? What happens when you break down the barriers between DevOps and other parts of the business?
Join Jay Lyman (Principal Analyst, Cloud Native and DevOps, 451 Research) and Brian Dawson (DevOps Evangelist, CloudBees) as they review research on the current state of Software Delivery Management (SDM), and outline the key practices organizations should adopt to keep ALL teams on the same page about the software delivery function.
We’ll discuss:
How DevOps and SDM are critical for driving digital transformation.
The key stakeholders you need to focus on, beyond development and IT operations.
The role of security and governance, and how organizations can effectively measure and prove their DevOps success.
2019 State of DevOps Report: Database Best Practices for Strong DevOpsDevOps.com
Strong DevOps drives successful software delivery. Strong DevOps requires more frequent code deployments, faster lead times, quicker incident recovery times and lower change failure rates for application and database code. The DORA team at Google set out to investigate what practices set top-performing DevOps teams apart and how this gives them a competitive edge.
Please join Dr. Nicole Forsgren, DORA Lead, Google and Robert Reeves, co-founder and CTO, Datical to learn more about the survey findings and explore how these relate to essential database practices for successful software delivery and strong DevOps.
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that MatterGene Kim
Stephen Elliot, VP of IDC
DevOps is the modern way to deploy new IT capabilities that drive and deliver business results. This session will dive into the key metrics that large companies are using to gauge the success and measure results utilizing the DevOps discipline. The session will answer the following questions:
What are some of the key technology and business metrics that large organizations are using to measure and manage DevOps projects?
What are the critical success factors required when communicating with the business on Devops delivered projects?
What role do the security and compliance teams play in DevOps, and related metrics?
Dependency Health: Removing the Barriers to Keeping Projects in ShapeDevOps.com
Enterprises and Developers already know the importance of managing vulnerabilities and dependencies, so why do so many still fall behind?
Like maintaining good physical health, software projects require more than just good intentions - there needs to be sensible and achievable process that developers want to follow, and the rewards must outweigh the demands.
In this webinar, David Habusha and Rhys Arkins from WhiteSource will discuss some of today's challenges that hold enterprises back from having great Open Source dependency management, and identify what the missing pieces are for a future in which updates and vulnerability patches can be applied intelligently, safely, and in many cases even automatically.
Using Collaboration to Make Application Vulnerability Management a Team SportDenim Group
Vulnerability management - especially application vulnerability management - is a challenging business function because it crosses disciplinary boundaries. Security teams find and adjudicate vulnerabilities, DevOps and server ops teams have to fix them, and GRC teams need to be kept apprised of status and progress. As has always been the case - but especially in a necessarily remote work environment - collaboration is key to making these business functions operate efficiently and effectively. This webinar looks at common bottlenecks that snarl vulnerability remediation workflows and discusses strategies to address these issues via collaboration. Examples are given of implementing these via the ThreadFix platform, but the strategies are universally-applicable for vulnerability management professionals looking to streamline their vulnerability remediation workflows.
DevOps in the Real World: Know What it Takes to Make it WorkVMware Tanzu
DevOps Loop at VMworld
Session Title: DevOps in the Real World: Know What it Takes to Make it Work
Speaker: Bola Rotibi, Research Director, Software Development, CCS Insight
The 7 Secrets of Performance Management in Virtualized EnvironmentseG Innovations
Whether you virtualize desktops or critical business applications, the dynamics and complexities of virtualized environments can cause significant performance and user experience issues that can diminish the benefits of virtualization and risk interruption of critical business processes. The toughest performance problems are the ones where users call and complain that "my application is slow". IT administrators often struggle to determine the root-cause of the problem and restore service levels: Is it the application server? The virtualization layer? Is it the network? Database? Storage ...?
Join our live webinar with virtualization experts Dave Bartoletti (Forrester Research) and Srinivas Ramanathan (eG Innovations), and find out how to deliver:
• Reliable performance assurance and user satisfaction
• Complete performance visibility across your virtualized environment
• Automatic, rapid root cause diagnosis for even the most complex performance problems
• Pre-emptive problem detection and alerting before users call
• Rapid ROI through right-sizing and optimization
Accelerate DevOps Transformation with App Migration to the CloudXebiaLabs
Migrating enterprise apps to the cloud may sound like a daunting leap, but it doesn’t have to be! Hear how Lincoln Financial Group, a 113-year old insurance institution is moving from a traditional development infrastructure organization to functional DevOps teams deploying applications to the cloud.
The modern IT stack has become diverse and distributed, and it’s increasingly challenging to manage heterogeneous platforms and multi-vendor devices. Customers are looking to the cloud and APM to help address these hurdles, as well as accelerate IT transformation.
But migrating to the cloud will take time, it won’t make infrastructure ‘just disappear’, and legacy workloads are going to remain part of the enterprise reality for many. In addition, while APM will continue to be increasingly important, all applications are not the same and an application is still not equal to a digital business service.
Watch this webinar as John Worthington, a service management expert and Director of Product Marketing for eG Innovations, continues our Shift-Left series. You can learn:
• Why domain expertise is important when defining monitoring requirements
• What analytics are useful from a monitoring and observability context
• How end-to-end monitoring with converged application and infrastructure performance can drive ITSM and DevOps integration
2018 Citrix Migration Survey - Industry InsightseG Innovations
With the end of maintenance of Citrix XenApp 6.5 approaching quickly (June 30, 2018), there is increased adoption of Citrix XenApp and XenDesktop 7.x. eG Innovations and DABCC have conducted a joint survey across 795 Citrix professionals to understand this migration trend, challenges involved, and performance expectations.
Read this survey analysis report and understand how the industry is gearing up for Citrix XenApp and XenDesktop 7.x adoption.
DevOps has made great strides in reducing bottlenecks in the software delivery process. Yet, it is surprising how many organizations keep DevOps on a separate track from long-established IT service management (ITSM) implementations and systems such as ServiceNow. Consequently, development teams find it challenging to track features, user stories, and IT service requests across different tools for backlog management and ITSM.
But how do they make sure tickets are closed when the work is complete? How can they ensure compliance? And can they answer the ultimate question: Which feature actually made it into which release?
What is DevOps? A lot of people think it means a lot of different things. We tend to think it has two complimentary aspects: culture and technology changes. Culture is what creates DevOps, technology enables it. Thanks, Kelly Goetsch, for the slide work.
Building an Adoption Plan: Turning it on(Part 2 of 2)Cisco Canada
Now that you understand what's included in your License agreement, it's time to get your employees excited to turn on the features and start reaping the benefits of your investment. The session will continue our discussion around adoption planning with best practices for employee training & engagement of your collaboration investment. This is a great opportunity to tap into your employees' creativity and empowering them to build new functionalities and applications leveraging devices they already are comfortable with. We will also review how to track utilization and consumption rates so you can reconcile your investment against the productivity gains you will see.
SDM: The Fundamentals of Software Delivery ManagementDevOps.com
Research and experience have proven that breaking down the barriers between Dev and Ops can yield tremendous efficiency, quality and velocity enhancements for software delivery teams.
But, in the spirit of continuous improvement… what’s next? What happens when you break down the barriers between DevOps and other parts of the business?
Join Jay Lyman (Principal Analyst, Cloud Native and DevOps, 451 Research) and Brian Dawson (DevOps Evangelist, CloudBees) as they review research on the current state of Software Delivery Management (SDM), and outline the key practices organizations should adopt to keep ALL teams on the same page about the software delivery function.
We’ll discuss:
How DevOps and SDM are critical for driving digital transformation.
The key stakeholders you need to focus on, beyond development and IT operations.
The role of security and governance, and how organizations can effectively measure and prove their DevOps success.
2019 State of DevOps Report: Database Best Practices for Strong DevOpsDevOps.com
Strong DevOps drives successful software delivery. Strong DevOps requires more frequent code deployments, faster lead times, quicker incident recovery times and lower change failure rates for application and database code. The DORA team at Google set out to investigate what practices set top-performing DevOps teams apart and how this gives them a competitive edge.
Please join Dr. Nicole Forsgren, DORA Lead, Google and Robert Reeves, co-founder and CTO, Datical to learn more about the survey findings and explore how these relate to essential database practices for successful software delivery and strong DevOps.
Leading DevOps Application Release and Deployment - Best Practices for Organi...IBM UrbanCode Products
Explore the emerging best practices for leading organizational change to adopt application release and deployment. A variety of principles & practices will be described and illustrated through actual client cases.
Insights Success Recognition of Excellence in DevOps 2018, we have enlisted some of the outstanding DevOps providers which have crafted several innovative solutions that created fruitful grounds of scalable growth for its clients.
How to Drive More Value From Innovation InitiativesVMware Tanzu
Speed to value is critical for businesses to outpace their competition. Learn how your team or organization can leverage proven, modern product development best practices to win in today’s market.
Join Lauren Gilchrist and Paul Choi to gain insights on how to deliver more value to customers and better partner with your IT organization. We’ll share software development best practices and methodologies that have been used to help organizations adapt and thrive in today's digital markets.
In this webinar, you’ll learn:
● How Fortune 2000 companies can compete with startups and build more desirable and usable products
● How to realize value faster and more sustainably
● How to decrease risk and reduce waste in building your application
Presenters:
Lauren Gilchrist, Director, Pivotal Labs
Paul Choi, Sr. Director, Pivotal Labs
My presentation for our Benelux IBM Rational Innovate event. This presentation explains how the IBM Bluemix and devops as a service solution can be used for modern cloud based development.
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdfCraig Saunders
As Software Engineers we pride ourselves to build high-quality software using the best industry practices and principles.
But what happens when you’re asked to deliver a project with impossible timescales where a quick hacky solution is all that time allows.
This presentation talks about such a scenario where and how we managed to achieve the right solution but also met the business deadline.
In addition, it talks briefly about the key principles we followed to achieve this feat.
Digital Agility: The Key to Innovation in the Digital Age (eBook)Todd Erskine
Digital agility is the business conversation about how to adopt DevOps and agile practices to sense, anticipate, and respond to what the market needs. The aim is to exceed customer expectations with agile operations and development. Developing this agility starts with transforming your IT processes, but can also include parallel technology updates and further cultural changes. A successful digital transformation builds a cloud-enabled organization that delivers quality software rapidly and with regularity.
Applying DevOps for more reliable Public Sector Software DeliverySanjeev Sharma
Government agencies and contractors must build the competency to deliver software with greater predictability, quality, speed and frequency. The alternative of higher costs and late delivery is no longer acceptable - politically, economically or justifiably. This session will share findings from client experiences and lay out the DevOps approach that is help agencies and their contractors address the challenges inherent in software application delivery.
In the past few years, we have seen a rapid rise in digitalisation and automation. The importance of DevOps has also grown a lot as businesses run on the path to digital transformation. However, security has been a concern in the DevOps community, but a robust DevSecOps environment can be the solution.
Measure and Accelerate Your Software DeliveryAnand Chauhan
Many companies adopt the DevOps practices, but struggle to realize the impact the DevOps investment is making to improve software delivery. Disconnected teams, tools and increasing complexity leads to no visibility into how and where to optimize the process, deliver value to customers and maximize return on that investment. The session covers industry trends, critical need for measurement and touches on CloudBees DevOptics solution purpose built to provide immediate transparency you need to measure, optimize and improve your software delivery process.
is a method to frequently deliver apps to customers by introducing automation into the stages of app development. The main concepts attributed to CI/CD are continuous integration, continuous delivery, and continuous deployment. A solution to the problems integrating new code can cause for development and operations teams.
Similar to 2019 Accelerate State of DevOps Survey Results Are In (20)
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
With the growing adoption of Kubernetes, organizations want to take advantage of containerized Microsoft SQL Server 2019 to optimize transactional performance and accelerate time-to-insights from their business-critical data. However, as enterprises embrace hybrid cloud strategy, they need to consider several aspects based on the performance, cost and data protection requirements for running enterprise-grade SQL Server databases.
In this webinar, we will compare and contrast various cloud-native platforms for SQL Server that would help CIOs, DevOps engineers, database administrators and applications architects to determine the most suitable platform that fits their business needs.
Join us as we explore some exciting results from a recent performance benchmark study conducted by McKnight Consulting Group, an independent consulting firm, to compare the performance of Microsoft SQL Server 2019 on the best possible configurations of the following Kubernetes platforms:
Diamanti Enterprise Kubernetes Platform
Amazon Web Services Elastic Kubernetes Service (AWS EKS)
Azure Kubernetes Service (AKS)
Topics will include:
Platform considerations and requirements for running Microsoft SQL Server 2019
Performance comparison and analysis of running SQL Server on various platform
Best practices for running containerized SQL Server databases in Kubernetes environment
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
With the growing adoption of Kubernetes, organizations want to take advantage of containerized Microsoft SQL Server 2019 to optimize transactional performance and accelerate time-to-insights from their business-critical data. However, as enterprises embrace hybrid cloud strategy, they need to consider several aspects based on the performance, cost and data protection requirements for running enterprise-grade SQL Server databases.
In this webinar, we will compare and contrast various cloud-native platforms for SQL Server that would help CIOs, DevOps engineers, database administrators and applications architects to determine the most suitable platform that fits their business needs.
Join us as we explore some exciting results from a recent performance benchmark study conducted by McKnight Consulting Group, an independent consulting firm, to compare the performance of Microsoft SQL Server 2019 on the best possible configurations of the following Kubernetes platforms:
Diamanti Enterprise Kubernetes Platform
Amazon Web Services Elastic Kubernetes Service (AWS EKS)
Azure Kubernetes Service (AKS)
Topics will include:
Platform considerations and requirements for running Microsoft SQL Server 2019
Performance comparison and analysis of running SQL Server on various platform
Best practices for running containerized SQL Server databases in Kubernetes environment
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
Vulnerability assessment for teams can often be overwhelming. The dependency graph could be thousands of packages depending on the application. Triaging vulnerability data and prioritizing actions has historically been a very manual process, until now. With Datadog and Snyk, learn how to trace security and performance issues by leveraging continuous profiling capabilities for actionable insight that help developers remediate problems.
Join us on Thursday, January 21 for a unique opportunity to learn more about continuous profiling, vulnerability management, and the benefit to customers from using both of these products. In this webinar, you will:
Bust some myths around continuous profiling and learn how Datadog differentiates itself
See decorated traces in action for sample Java applications and understand how Snyk + Datadog reduce time to triage supply chain vulnerabilities
Learn roadmap information for upcoming public announcements from both partners
In the era of cloud generation, the constant activity around workloads and containers create more vulnerabilities than an organization can keep up with. Using legacy security vendors doesn't set you up for success in the cloud. You’re likely spending undue hours chasing, triaging and patching a countless stream of cloud vulnerabilities with little prioritization.
Join us for this live webinar as we detail how to streamline host and container vulnerability workflows for your software teams wanting to build fast in the cloud. We'll be covering how to:
Get visibility into active packages and associated vulnerabilities
Reduce false positives by 98%
Reduce investigation time by 30%
Spot a legacy vendor looking to do some cloud washing
2021 Open Source Governance: Top Ten Trends and PredictionsDevOps.com
If you work in software development, jumpstart your engineering team in 2021—get ahead of the engineering curve and your competitors—by attending this must-watch open source trends and predictions webinar.
Alex Rybak, Director of Product Management at Revenera, and Russ Eling, founder and CEO of OSS Engineering Consultants, share their top 10 open source usage, license compliance and security insights for the new year.
Just a few hints at what you’ll learn more about:
Where the adoption of shift-left is headed and the decisions you’ll face going forward
The impact of a lack of software developer security training relative to pandemic fallout
The broader role of the engineering team in open source management and governance
The expanding role and impact of open source marketplaces such as GitHub
Don’t miss the discussion for valuable insight and learning for software engineering teams
2020 was a brutal year for ransomware. Cybercriminals operated without any human decency, targeting the most vulnerable and at-risk parties, such as hospitals, scientists, and global manufacturers. The approach has become more sophisticated and life-threatening, shifting from individual targets to global enterprises, destroying backups, blackmailing victims with public leakage of exfiltrated data, and paralyzing critical systems and infrastructure.
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)DevOps.com
As containers and Kubernetes are adopted in production, security is a critical concern and DevOps teams need to go beyond image scanning. Use cases such as runtime security, network visibility and segmentation, incident response and compliance become priorities as your Kubernetes security framework matures.
In this talk, we’ll share an overview of runtime security, discuss approaches used by open source and commercial tools, and hear how users are getting started quickly without impacting developer productivity.
In any fast-paced engineering environment, unexpected incidents can arise and escalate without warning. Without strong leadership within teams, you get chaotic, stressful, and tiring situations that waste valuable engineering time, slow down resolution, and most importantly, impact your customers.
Operationally mature organisations use proven incident response systems led by Incident Commanders. Incident Commanders provide the leadership needed to help stabilize major incidents fast.
In this webinar, we’ll take lessons learned from formalized incident response, such as those used by first responders, and show you how to apply those same practices to your organization. By utilising these methods you’ll improve both the speed and effectiveness of your team’s response, reducing the amount of downtime experienced.
In this workshop, attendees will:
Be introduced to the Incident Command System and learn how it can be adapted to their organisation
Walk through the basics of incident response best practices
Discuss examples of formal incident response from multiple organisations
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureDevOps.com
Chaos engineering is becoming a critical part of the DevOps toolchain when adopting Site Reliability Engineering (SRE) practices. Every system is becoming a distributed system and chaos engineering proclaims many advantages for them.
It improves infrastructure automation, increases reliability and transforms incident management. However, an often-overlooked benefit of chaos engineering and SRE involves culture transformation. Culture is often touched upon when talking about chaos engineering and SRE but not as often as skills and process.
In this webinar, we will discuss how you can build out a chaos engineering practice and how you can adopt a true blameless culture and maximize the potential of your team.
You will learn how to:
Hold blameless postmortems
Share post mortems with other teams
Run regular fire drills and game days
Automate chaos experiments for continuous validation
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportDevOps.com
Enterprises are best served by leveraging an RBAC system to manage access to their SSH and Kubernetes resources. With Teleport, an open source software, employers are able to provide granular access controls to developers based on the access they need and when they need it. This makes it possible for employers to maintain secure access without getting in the way of their developers’ daily operations.
Join Steven Martin, solution engineer at Teleport, as he demonstrates how to assign access to developers and SRE’s across environments with Teleport through roles mapped from enterprises’ identity providers or SSOs.
Monitoring Serverless Applications with DatadogDevOps.com
Join Datadog for a webinar on monitoring serverless applications with AWS Lambda. You'll learn how to get the most of Datadog's platform, as well ask the following key takeaways:
Learn how to set up a Twitter bot that makes API calls with Node.js
Deploying Serverless Applications
What does observability look like with less infrastructure?
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
Developers are increasingly adopting a microservices approach for their apps in order to gain rapid iteration capabilities required for delivering new services faster. However, delivering the App still requires multiple steps such as allocation of virtual IPs, provisioning the front load balancer, configuring firewall rules, configuring a public domain, and DDOS. At present, each of these steps requires coordination across multiple teams with multiple iterations per team. The time efficiencies gained by adopting microservices and cloud-native technologies is negated due to the time taken to deliver the App.
In this session, Pranav Dharwadkar, VP of products at Volterra, and Jakub Pavlik, director of engineering, will help you understand these challenges and introduce a distributed proxy architecture that can alleviate the challenges across different cloud environments. This webinar will include a live demo using a distributed proxy architecture to advertise an App publicly and privately.
In this webinar, you will learn:
The steps required to deliver an App using the current approaches
How a distributed proxy architecture can be used to deliver the app publicly and privately
The operational benefits of a distributed proxy architecture for delivering new services
Securing medical apps in the age of covid finalDevOps.com
The COVID-19 pandemic has drastically altered the connected healthcare landscape, accelerating the usage of telemedicine and other remote healthcare delivery systems by as much as 11,000% for some populations. How has this unprecedented push affected healthcare and medical device application security? The security team at Intertrust recently analyzed 100 Android and iOS medical apps to find out.
In this webinar, we'll discuss:
Medical application and device threat trends
The top mHealth security vulnerabilities uncovered in our analysis
Strategies to keep your mHealth apps safe
Future advances in digital healthcare and how your security can evolve with it
Raise your hand if you enjoy being buried in alerts or woken up at 2 a.m. — yeah … thought so. Ever-rising customer expectations around high availability and performance put massive pressure on the teams who develop and support SaaS products. And teams are literally losing sleep over it. Until outages and other incidents are a thing of the past, organizations need to invest in a way of dealing with them that won’t lead to burn-out.
In this session, you’ll learn how to combine the latest tooling with DevOps practices in the pursuit of a sustainable incident response workflow. It’s all about transparency, actionable alerts, resilience and learning from each incident.
The Evolving Role of the Developer in 2021DevOps.com
The role of the developer continues to change as they sit on the front line of application and even cloud infrastructure security. Today, developers are focused on innovating fast and improving security, but how do high-performing teams accomplish this? They commit code frequently, release often and update dependencies regularly (608x faster than others).
In this webinar, we'll discuss the key traits of high-performing teams and how that impacts the role of the developer.
Key Takeaways:
Choose the best third party dependencies
Determine the lowest effort upgrades between open source versions
Solve for issues in both direct and transitive dependencies with a single-click
Block and quarantine suspicious open source components
Service Mesh: Two Big Words But Do You Need It?DevOps.com
Today, one of the big concepts buzzing in the app development world is service mesh. A service mesh is a configurable infrastructure layer for microservices application that makes communication flexible, reliable and fast. Let’s take a step back, though, and answer this question: Do you need a service mesh?
Join this webinar to learn:
What a service mesh is; when and why you need it — or when and why you may not
App modernization journey and traffic management approaches for microservices-based apps
How to make an informed decision based on cost and complexity before adopting service mesh
Learn about NGINX Service Mesh in a live demo, and how it provides the best service mesh option for container-based L7 traffic management
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
Red Hat OpenShift is enabling quicker adoption of DevOps practices. Containers are an essential component of DevOps and the OpenShift Kubernetes Container Platform is integral for orchestration within these environments. Data security is now challenged to keep pace with the size and scope of container usage. The migration from legacy in-house deployments to hybrid-cloud installations has created new attack surfaces as data is shared more freely in Kubernetes deployments.
Protecting data at rest and in motions is a necessity. Learn how you can keep data protected and securely share data in OpenShift environments with real-time data protection solutions.
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
Managing access permissions in the public cloud can be a very complex process. In fact, by 2023, 75% of cloud security failures will result from the inadequate management of identities, access and privileges, according to Gartner.
Join us as Guy Flechter, CISO of AppsFlyer, presents a real-world case of how his company works to enforce least-privilege and to govern identities in their cloud. This webinar will also provide an overview of how to govern access and achieve least privilege by analyzing the access permissions and activity in your public cloud environment. With thousands of human and machine identities, roles, policies and entitlements, this webinar will give you the tools to examine the access open to people and services in your public cloud, and determine whether that access is necessary.
In this workshop, you will learn about:
The risks of IAM misconfiguration and excessive entitlements in cloud environments
The challenges in identifying and mitigating Identity and access risks for both human and machine identities
How to automate cloud identity governance and entitlement management with Ermetic
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...DevOps.com
Open-source machine learning can be transformative, but without the proper tools in place, enterprises struggle to balance the IT security and governance requirements with the need to deliver these powerpoint tools into the hands of their developers and modelers.
How can organizations get the latest technology from the open-source brain trust, while ensuring enterprise-grade management and security? In this webinar, we will discuss how Anaconda Team Edition, available on RedHat Marketplace, enables IT departments to mirror a curated set of packages into their organization in a safe and governed way.
Join Michael Grant, VP of services at Anaconda, to discuss:
How IT organizations are using Anaconda Team Edition to curate, govern and secure Python and R packages
Tips for how development and data science teams can get the most out of Team Edition, from uploading your own packages to building custom channels for groups or projects
How to distribute conda environments to desktops, servers and clusters:
GUI-based installers for desktop users
“Conda packs” for automated delivery to remote servers and distributed computing clusters
Conda-enabled Docker containers for application deployment
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
This year has been full of surprises — and cloud security data breaches have been no exception. From hotel chains to dating apps and video conferencing, misconfigurations and mistakes have left many organizations with exposed data. Knowing how data breaches happen and how to prevent them from happening is key when it comes to defending your identities and data access.
In this webinar, Eric Kedrosky, CISO and director of cloud research at Sonrai Security, dissects the top 10 notorious cloud data breaches from 2020, breaking down how each was caused and how they could have been prevented. This webinar will detail the anatomy of each type of data breach, what we can learn, what allowed the data breach to happen and the preventative measures.
Join this webinar as we dissect the year’s top cloud data breaches and what caused them, including:
Identity and authentication for data storage
Public cloud misconfiguration
Key and secret management
Overprivileged identities
Malicious Bad Actors
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. Today!
● Key Findings from the 2019 Accelerate State of DevOps Report
● Some fun STATS: Benchmarks and more
● Getting better (aka Choose your own adventure)
● Performance
● Productivity
● Culture
● CloudBees Software Delivery Management
● Fin! (and more!)
4.
5. We have movement
● Look at the elite performers. Yay!
● Now look at the low performers. Yay!
● Check out medium performers…
● Now look at the medium vs. high. Oooo
6.
7. How do they compare? (And what does it all mean?)
8. Availability
Availability is about promises we make and keep to our customers and end users…
The measure: How well teams
● Define their availability targets
● Track their current availability
● Learn from any outages
9. Availability
Availability is about promises we make and keep to our customers and end users…
The measure: How well teams
● Define their availability targets
● Track their current availability
● Learn from any outages
Day one is short, day two is long
16. Cloud is a differentiator for elite
performance…
But only 29% of respondents met
all five characteristics of cloud
computing
Elite performers were 24 times
more likely to have met cloud
characteristics than low
performers
On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service
17. Code maintainability
Contributes to CD and helps
reduce technical debt (stay tuned!)
Change code maintained by other teams
Find code in the codebase
Reuse other people’s code
Add, upgrade, and migrate to new
versions of dependencies without
breaking code
Systems and tools that make it easy to:
19. What is productivity?
Productivity is the ability to get complex, time-consuming tasks completed with minimal
distractions and interruptions.
20. What is productivity?
Productivity is the ability to get complex, time-consuming tasks completed with minimal
distractions and interruptions.
This kind of productivity helps us
leave work at work and reduce
burnout.
21. Technical debt was
introduced in 1992 by Ward
Cunningham to describe what
happens when we fail to
maintain “immature code.”
It is a problem for many of us
and includes code or systems
with:
Known bugs that go unfixed in favor of new
features
Insufficient test coverage
Problems related to low code quality or poor
design
Code or artifacts that aren’t cleaned up when no
longer used
Implementations the team doesn’t have
expertise in, and therefore can’t debug or
maintain
Incomplete migration
Obsolete technology
Incomplete or outdated documentation or
missing comments
22. Reducing Technical Debt
This helps us maintain a mental
model of our systems, something
Ward Cunningham suggested we
would need in his original article.
Maintainable code
Loosely coupled architecture
Monitoring
26. Culture is important
● A culture of trust and psychological safety has a positive impact on:
○ Software delivery performance
○ Organizational performance
○ Productivity
● These results indicate teams with this culture see significant benefits in teams
in many contexts.
34. TL;DR
● Is this DevOps thing even “A Thing”?
● Getting better (aka Choose your own adventure)
● Performance
● Productivity
● Culture
● Fin! (there’s so much more!)
○ Disaster Recovery Testing
○ Change Approvals (the “right” way)
○ Open source!
○ More cloud (and costs!)
○ Scaling transformations successfully
Go check it out! cloud.google.com/devops