Bamboo 1.2
By: Atlassian View more from Atlassian >>
Download this next:
Shift-left security testing: Protect your customers now
By: Qualitest Group
Type: Blog
Despite its proven benefits, shift-left has not been widely adopted for security testing. Continued reliance on penetration tests performed pre-production exposes you and your clients’ source code unnecessarily to vulnerabilities throughout the SDLC.
The collaborative, sprint-based approach that is essential for effective shift-left testing requires a cultural and organizational shift as well. To build trust and overcome resistance, a proof of concept is often helpful.
Discover how shift-left can protect your company and customers from cyber threats in this blog post.
These are also closely related to: "Bamboo 1.2"
-
CI/CD Metrics for Platform Engineers
By: CircleCI
Type: eBook
The advent of rapid software delivery has increased pressure on platform engineers to enable their organizations to ship high-quality products quickly. This eBook explores key engineering metrics that platform teams should track to optimize performance.
Key metrics include:
· Velocity metrics like duration, throughput, deployment frequency, and cycle time - measuring delivery speed and efficiency
· Morale metrics like code quality confidence and employee morale - gauging developer sentiment and work environment quality
· Business metrics like growth, funnel metrics, and end-user value - linking engineering efforts to organizational goals
The eBook offers insights on defining goals, maintaining morale, starting small, reviewing metrics, and fostering a blameless culture. Optimize your platform engineering team's performance.
-
ALM: Taking a middleware-focused approach
By: GigaSpaces Technologies Inc.
Type: eGuide
Navigating the confusion of creating harmony between middleware, emerging apps, and your OS can be incredibly frustrating, especially when you add in complexities like working in the cloud.
In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices.
Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration.
Find more content like what you just read:
-
Build Trust in CI/CD : How AEO Delivers Value Swiftly to Customers
By:
Type: Talk
In this presentation I will cover how to architect a CI/CD pipeline that allowed my team to speed deployment cycles up from six weeks to weekly deployments. I will focus on leveraging quality control standards using automated tests within an Atlassian Bamboo pipeline. I will also cover how to build full trust in the CI/CD pipeline, giving developers confidence to deploy whenever code changes are merged because the code has been fully tested via a progressive deployment pipeline. This presentation will highlight the benefits of thorough testing in CI/CD, exploring levels of testing e.g. unit, contract, integration, and end to end testing. This talk will be tailored to developers starting on their journey towards building a CI/CD pipeline. Developers leaving this talk will be more familiar with CI/CD best practices, especially how to build a robust testing system that enables more efficient development cycles.
-
How to Manage Modern Apps atop Kubernetes with Popular Spring Tooling
By:
Type: Talk
How to Manage Modern Apps atop Kubernetes with Popular Spring Tooling (while enjoying peace of mind with JDK licensing) Spring is a popular enterprise development framework, while Kubernetes is the default infrastructure API for an increasing number of organizations. How can organizations get more from these two seemingly ubiquitous technologies? Join us for this VMware Tanzu webinar and learn: - How popular Spring components are being remastered and repackage for use atop Kubernetes - How to move from ticket-based API gateways into a modern developer-driven experience - How to modernize batch processing workflows with a more cloud-native approach We’ll also review how you can protect your organization from JDK licensing while delivering a secure, supported, and turnkey developer experience on any Kubernetes distribution. We’ll see you at the webinar!
-
Red Hat build of OpenJDK – past, present and future
By:
Type: Talk
Abstract: In this talk we will focus on Red Hat’s involvement in the OpenJDK project, and why we believe that our build of OpenJDK is the best JDK to use for your production environments Description: OpenJDK is the reference implementation of the Java SE specification. In the first part of this webinar we will focus on improvements Red Hat has made to OpenJDK and surrounding tooling over the years, and how these improvements can benefit you. We will take a brief look at improvements Red Hat has made, starting from taking OpenJDK to a buildable state on release in 2007, to significant enhancements such as the AArch64 port, Shenandoah Garbage Collector, Quality Testing, and more that are on the way. In the latter part we will go over our OpenJDK based offerings and our anticipated roadmap.
-
How Compass Medical, PC Increased TCM Visits, Improved Chronic Care Management, and Outcomes During COVID-19
By: Bamboo Health
Type: White Paper
Compass Medical, PC partnered with Bamboo Health to receive real-time visibility into patients' care events to improve care coordination outcomes and succeed with quality initiative programs such as the Next Gen ACO Model, Medicare Shared Savings Program, the Medicare Advantage Program, Transitional Care Management, and Chronic Care Management.
-
Next step app development: Microservices
By: TechTarget ComputerWeekly.com
Type: eGuide
Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.
-
How Pioneer Valley Accountable Care uses Pings to Lower Costs and Improve Care Coordination
By: Bamboo Health
Type: White Paper
Pioneer Valley Accountable Care (PVAC) is an accountable care organization (ACO) located in Western Massachusetts serving Medicare fee-for-service (FFS) beneficiaries throughout the Pioneer Valley. Prior to implementing Bamboo Health's Pings solution, PVAC lacked standardized communication protocols with their skilled nursing facility partners.
-
Securing the DevOps CI/CD Pipeline
By:
Type: Video
Development teams often use Continuous Integration (CI) tools (e.g., Jenkins, Bamboo, Team City, CircleCI, Concourse, etc.) and Continuous Deployment (CD) tools (e.g., Harness, etc.) in their SDLC cycles. Karthik Lalithraj, Keyfactor's Director of Solutions Engineering, East, will address some of the more complex questions facing enterprises today. Attendees will come away with answers to questions such as: How can teams integrate Continuous Security (CS) within the CI/CD process using digital signing? How can teams secure the private key while simultaneously providing code-signing access to various groups? How does this process work across globally disparate teams and individuals? How can you stop lousy development practices? Can we audit this? And finally, how do teams consume and validate these artifacts? This talk will cover how these challenges are quickly addressed in the enterprise. Earn 0.25 CPE credits on this session. Keyfactor is an approved (ISC)² CPE Submitter, partner.
-
How Saint Francis Healthcare Partners Improves Care Coordination with Bamboo Health
By: Bamboo Health
Type: White Paper
Saint Francis Healthcare Partners (SFHCP) is an independent organization founded in 1993 as a 50/50 physician-hospital organization. SFHCP implemented Bamboo Health's Pings solution, which are real-time care event notifications, in January of 2017.
-
Did Your Adversary Write Your Open Source Code?
By:
Type: Talk
We need to know who writes the Open Source code that is used to build critical applications. Today, engineers use pre-built components of software to accelerate software development. Every day, 20 million developers share and re-use open source software code. Open Source npm packages for Javascript code are used in all websites and most mobile apps. Open Source PyPI packages for Python code are used in almost all AI and Data Analysis system. Every day, continuous integration systems pull in the latest updates to this code. In mid March 2022, malicious code was added to a popular open-source package that is installed 3,292,333 times a week. The malicious code wiped files on computers located in Russia and Belarus. That's one for the good-guys. But the same line of attack can and will be directed at the West. We have to stop this. We need to know who writes the Open Source code. The Software Build of Materials(SBOM) needs to become a Verified Identity Software Build of Materials (VISBOM).
-
Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
-
How a Google Cloud Vulnerability Creates a Severe Supply Chain Risk
By:
Type: Talk
Bad.Build is a critical vulnerability discovered by the Orca Research Pod in the Google Cloud Build CI/CD service, which enables attackers to gain unauthorized access to code and images in Artifact Registry. The flaw presents a significant supply chain risk since it allows the injection of malicious code into applications, which could then be downloaded and installed by customers and partners. Learn from our speakers as they deep-dive into the anatomy of Bad.Build and provide practical recommendations on how to fortify your defenses around the use of the Google Cloud Build service. In this webcast, we’ll cover: • The steps that led to the Bad.Build discovery • A live demonstration of the Proof of Concept exploit, which includes Privilege Escalation and Remote Code Execution • Recommendations on how to reduce exposure to this risk
-
Shaping The Future of Business: No-Code In The Era of Digital Transformation
By: BPM Creatio
Type: White Paper
As digital transformation accelerates, no-code platforms empower non-developers to build custom applications faster and more efficiently. Learn how no-code can help your business gain a competitive edge in this in-depth e-book.
-
Build from Anywhere - Create Complete Experiences with Platform
By:
Type: Replay
The Salesforce Platform is a single, secure, and scalable platform which Salesforce applications are built on. It enables you to go digital, fast, and build or use apps to transform your business. Join Patrick Stokes, EVP and GM, Platform, Salesforce, to learn how to: ● Build unified experiences with low code ● Combine low code with other developer tools ● Use the latest Salesforce Platform innovations
-
Build time-saving automations in Slack with Workflow Builder
By:
Type: Video
With automation in Slack, customers experience a ¹35% increase in time savings. And with Slack’s newly improved Workflow Builder, automation is for everyone—admins, devs and business users. See a demo and learn how to automate with no-code workflows and level up with custom-coded functions. Walk away with real examples of ways you can automate, starting today. ¹Source: 2024 Salesforce Success Metrics AMER Highlights. Data is aggregated from 425 customers. Things you’ll learn: - How automation in Slack is transforming how customers approach work and unlocking productivity gains - How to create no-code workflows that anyone can build and use - How to build workflows with custom-coded functions for more powerful automations
-
Proactive Security: Software vulnerability management and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
Trends in the Industry: Setting the Stage on Open Source Trends
By:
Type: Replay
Open source is here to stay. Iconic brands like Google, Facebook, and Twitter have pioneered the practice of building their platforms on a core of code that is shared with the public and free for anyone to use. Rather than build applications from scratch, today’s developers first look to third-party code to kick start their innovation in the form of open source libraries. Unfortunately, reusable code also means reusable vulnerabilities, and the bad guys are increasingly turning to attacking open-source. Join us as we REPLAY the Keynote from our Virtual Summit, The Open Source Conundrum: Managing your Risk and learn the latest on trends in Opens source Library Use and Security.
-
Preview! Identity Security for Software Development (O'Reilly)
By: CyberArk
Type: eBook
Whether you’re just starting your coding journey or a seasoned veteran, this e-book serves as a comprehensive resource for those who want to develop a deep understanding of secure coding principles and best practices. Read the O’Reilly e-book to understand today’s identity security and secure development essentials.
-
Keeping Pace: Managing the risks of AI-generated code
By:
Type: Replay
AI coding assistants, such as Microsoft CoPilot and ChatGPT, will fundamentally change the way teams build software, much like open source software has over the last decade. As with open source, teams seeking the benefits of AI will also need to take precautions to address the security, quality, and intellectual property risks that come with the use of AI-generated code. Is your team ready for AI? In this webinar, we'll explore: Key risks teams might encounter using coding assistants Safeguards needed for confident use of AI-generated code
-
Empowering Supply Chain Collaboration in an Unpredictable Marketplace
By:
Type: Replay
Supply chain disruptions. Inflation spikes. Labor shortages. The only thing predictable these days for manufacturers is unpredictability. But by adopting a low-code application development platform to boost the adaptability and agility of its supply chain, world-class equipment and services company CNH Industrial has not only survived in the face of such volatility, it has thrived. The CNH low-code approach is to assemble supply chain processes with simple digital components that act as building blocks. As the marketplace shifts, CNH easily shifts along with it by reassembling those building blocks to modify their processes. Watch our free webinar to hear from CNH how you too can use a low-code application development platform to vastly expand your capacity for agility and adaptability.
-
Clean Code: Software Done Right
By:
Type: Talk
Software has become the heartbeat of all organizations. It is the IP of businesses today, but building software today is complex and organizations face many challenges as a result. In this conversation, Melinda Marks, principal analyst at ESG and Olivier Gaudin, CEO of SonarSource explore how developers can use Clean Code to deliver more value to the organization. This Fireside Chat will dig into: * Core problems developers are experiencing today * Using Clean Code to help solve key challenges * Best practices for organizations building their software pipeline * And much more
-
Platform in 5: Ready to Automate Everything?
By:
Type: Replay
How do you leverage the power of Slack and the Salesforce platform? - Solve business problems, fast - Collaboratively build low-code apps - Automate all the things
-
Dashing off a Dashboard with Apache Kafka®
By:
Type: Replay
How much can we do with Kafka in 30 minutes of coding? Let's find out. In this live-coding session we'll build a real-time dashboard from scratch. Dancing across three languages - KSQL, Python and JavaScript - we'll piece together the skeleton of a dashboard that could serve KPIs to everyone in your organisation, or just form the basis of your next lunchtime hacking session.
-
Dashing off a Dashboard with Apache Kafka®
By:
Type: Replay
How much can we do with Kafka in 30 minutes of coding? Let's find out. In this live-coding session we'll build a real-time dashboard from scratch. Dancing across three languages - KSQL, Python and JavaScript - we'll piece together the skeleton of a dashboard that could serve KPIs to everyone in your organisation, or just form the basis of your next lunchtime hacking session.
-
Increase Developer Collaboration with GitHub & Notion
By:
Type: Video
You want to make sure your engineering team remains laser-focused on what they do best – shipping code. But how can you escape the quagmire of building project management systems without losing management flexibility? In this webinar, discover how the powerful combination of GitHub and Notion eliminates the need for building intricate project management systems, allowing your developers to channel their energy into coding and innovation. Join Alexis Abril, Partner Engineering at GitHub, and Nick Gervasi, Engineering Manager at Notion for a comprehensive exploration of how the seamless integration of GitHub and Notion can revolutionise your development workflow.
-
Frameworks are dead, long live the compiler
By:
Type: Talk
HTML, CSS, and JavaScript. The low level building blocks of all the web have been around for years now. But building at such a low level creates a lot of boiler plate and ofter creates worse code. Enter frameworks! But, frameworks are large, slow, and require a lot of runtime execution. Enter Compilers! We'll look at the current state of web compilers and how building at a higher level and compiling down is a better way to build for the web.
-
Trends in the Industry: Setting the Stage on Open Source Trends
By:
Type: Replay
Open source is here to stay. Iconic brands like Google, Facebook, and Twitter have pioneered the practice of building their platforms on a core of code that is shared with the public and free for anyone to use. Rather than build applications from scratch, today’s developers first look to third-party code to kick start their innovation in the form of open source libraries. Unfortunately, reusable code also means reusable vulnerabilities, and the bad guys are increasingly turning to attacking open-source. In a recent study by Veracode, a whopping 88% of Java applications had at least one flaw in an open-source library, leaving application security managers faced with the challenging question: how can we keep innovating quickly without introducing vulnerabilities into our code base? The solution is multi-faceted – part education, part technology, part process change. Join us for our Virtual Summit, The Open Source Conundrum: Managing your Risk, as we dig into all the pieces of this solution.
-
From Idea to RPM: An introduction to building a Linux application (rescheduled)
By:
Type: Talk
Have an idea for an application but need to know how to distribute it? Are you curious about how RPMs are made? Writing code is probably the easiest part of building an application; we’ll help you navigate the rest. In this first session of a multi-part series, we will cover: -Overview of packages -Types of repositories -Demo: How to build your first RPM
-
An Efficient Way to Improve Your Kubernetes-Based App Development Productivity
By:
Type: Video
As organisations rapidly embrace Kubernetes, developers are often left with an overwhelming landscape of incoherent tools that are tough to set up and work inconsistently across teams. Connecting them to other apps and infrastructure is extremely complex and forces developers to spend too much time grappling with underlying infrastructure vs. writing innovative code. Are you looking for an easy and convenient way to enable your developers to build, deploy and manage applications on any Kubernetes platform? In this session will discuss how you can provide an environment where your developers can focus on writing code: - Rapidly build and test applications regardless of your Kubernetes knowledge - Automatically update code commits or patches for built containers by creating security and compliance application templates - Accelerate your path to production with seamless app handoffs from Dev to production
-
An Efficient Way to Improve Your Kubernetes-Based App Development Productivity
By:
Type: Replay
As organisations rapidly embrace Kubernetes, developers are often left with an overwhelming landscape of incoherent tools that are tough to set up and work inconsistently across teams. Connecting them to other apps and infrastructure is extremely complex and forces developers to spend too much time grappling with underlying infrastructure vs. writing innovative code. Are you looking for an easy and convenient way to enable your developers to build, deploy and manage applications on any Kubernetes platform? In this session we will discuss how you can provide an environment where your developers can focus on writing code: - Rapidly build and test applications regardless of your Kubernetes knowledge - Automatically update code commits or patches for built containers by creating security and compliance application templates - Accelerate your path to production with seamless app handoffs from Dev to production
-
3 defining fundamentals to kick-start your citizen development journey
By:
Type: Replay
Do you have a backlog of low-code apps but no one to build them? Have you started a small citizen development program but don't know how to grow? Come learn how citizen developers can boost productivity and lower cycle time across your enterprise. Nationale Nederlande (NN) Group experts will share how they empower citizen developers to create value with ServiceNow®'s low-code platform. The session will review how to ensure proper governance, how to start small and grow a program, and the importance of hosting hackathons to drive innovation. NN Group's experts will close with a demo—from intake to building an app, fast!
-
3 defining fundamentals to kick-start your citizen development journey
By:
Type: Video
Do you have a backlog of low-code apps but no one to build them? Have you started a small citizen development program but don't know how to grow? Come learn how citizen developers can boost productivity and lower cycle time across your enterprise. Nationale Nederlande (NN) Group experts will share how they empower citizen developers to create value with ServiceNow's low-code platform. The session will review how to ensure proper governance, how to start small and grow a program, and the importance of hosting hackathons to drive innovation. NN Group's experts will close with a demo—from intake to building an app, fast!
-
3 defining fundamentals to kick-start your citizen development journey
By:
Type: Replay
Do you have a backlog of low-code apps but no one to build them? Have you started a small citizen development program but don't know how to grow? Come learn how citizen developers can boost productivity and lower cycle time across your enterprise. Nationale Nederlande (NN) Group experts will share how they empower citizen developers to create value with ServiceNow®'s low-code platform. The session will review how to ensure proper governance, how to start small and grow a program, and the importance of hosting hackathons to drive innovation. NN Group's experts will close with a demo—from intake to building an app, fast!
-
3 defining fundamentals to kick-start your citizen development journey
By:
Type: Replay
Do you have a backlog of low-code apps but no one to build them? Have you started a small citizen development program but don't know how to grow? Come learn how citizen developers can boost productivity and lower cycle time across your enterprise. Nationale Nederlande (NN) Group experts will share how they empower citizen developers to create value with ServiceNow®'s low-code platform. The session will review how to ensure proper governance, how to start small and grow a program, and the importance of hosting hackathons to drive innovation. NN Group's experts will close with a demo—from intake to building an app, fast!
-
Build Better Apps with a Low-Code Development Approach
By:
Type: Replay
Businesses are adopting DevOps at increasing speed to enhance their digital transformation. For a large scale digital transformation to be successful business, development, and IT teams must work together to meet these demands. It should be simple when you consider that they both want the same thing. Low-Code development is becoming a popular way to accomplish this in tandem with DevOps. Accelerating change is easier than ever with low-code development which is visual, simple to use, and collaborative. With a low-code development platform, IT teams are seeing their capabilities increase. It also adds up to greater product innovation and an increase in agility. The result is better quality and faster app release velocity. That does not mean that traditional pro-coding is dead. In this webinar, Guy Arieli discusses the challenges and opportunities of low-code platforms compared to pro-coding. He also shows how enterprises use Low-Code development to build new apps, extend legacy ones, and test them in order to achieve their digital transformation goals. Watch this webinar to discover: -The emergence of Low-Code development platforms -How enterprises are using Low-Code and DevOps in tandem -The Pros and Cons of Low-Code versus Pro-Code development -A demo of SeeTest’s integration with Low-Code development platforms
-
Build a Streaming AI Agent using OpenAI, Vercel, and AstraDb in 10 lines of code
By:
Type: Video
Learn how to rapidly build production-ready Gen AI applications and see a real-world demo of Q&A against your data: - LangStream is a new way to create and run Gen AI applications - Bring your data to AI when creating LLM prompts - Rapidly build streaming AI agents with little or no code
-
Computer Weekly – 18 June 2024: General election 2024 – the digital policies examined
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the digital policies revealed in the three main political parties' general election manifestos. Our new buyer's guide looks at the latest trends in cloud security. And we find out about the EU's plans for a digital single market that could span the globe. Read the issue now.
-
No code to low code: Enabling enterprise-wide automation
By:
Type: Video
How can you unlock the power of automation for every employee at your organization—not just those with technical backgrounds? At Slack, we launched a low-code platform that empowers everyone to create workflows for their own processes. Instead of building out single-purpose integrations, our platform allows developers, admins and users to build together using a shared set of automation tools.
-
No code to low code: Enabling enterprise-wide automation
By:
Type: Replay
How can you unlock the power of automation for every employee at your organization—not just those with technical backgrounds? At Slack, we launched a low-code platform that empowers everyone to create workflows for their own processes. Instead of building out single-purpose integrations, our platform allows developers, admins and users to build together using a shared set of automation tools.
-
Empower your business with a low-code automation platform
By:
Type: Replay
How can you unlock the power of automation for every employee at your organization—not just those with technical backgrounds? At Slack, we launched a low-code platform that empowers everyone to create workflows for their own processes. Instead of building out single-purpose integrations, our platform allows developers, admins and users to build together using a shared set of automation tools.
-
Unleash the power of your developers with low-code platforms
By:
Type: Replay
Within development organizations staffed with hard-core coding veterans, low-code has been a well-kept secret. But word is getting out. Organizations that once placed a premium on experience are now leveraging low-code for increased agility, productivity, and creativity. Join our June webinar to find out more. We’ll discuss how to: - Maximize developer productivity by aligning the right skills to the right projects - Prioritize creativity by automating tedious, repeatable, manual tasks - Arm developers with the power to build up to 4 times faster - Upskill early career developers more quickly and thoroughly What happens when real pro coders are set free in a low-code environment? See for yourself
-
Unleash the power of your developers with low-code platforms
By:
Type: Video
Within development organizations staffed with hard-core coding veterans, low-code has been a well-kept secret. But word is getting out. Organizations that once placed a premium on experience are now leveraging low-code for increased agility, productivity, and creativity. Join our June webinar to find out more. We’ll discuss how to: - Maximize developer productivity by aligning the right skills to the right projects - Prioritize creativity by automating tedious, repeatable, manual tasks - Arm developers with the power to build up to 4 times faster - Upskill early career developers more quickly and thoroughly What happens when real pro coders are set free in a low-code environment? See for yourself
-
Unleash the power of your developers with low-code platforms
By:
Type: Replay
Within development organizations staffed with hard-core coding veterans, low-code has been a well-kept secret. But word is getting out. Organizations that once placed a premium on experience are now leveraging low-code for increased agility, productivity, and creativity. Join our June webinar to find out more. We’ll discuss how to: - Maximize developer productivity by aligning the right skills to the right projects - Prioritize creativity by automating tedious, repeatable, manual tasks - Arm developers with the power to build up to 4 times faster - Upskill early career developers more quickly and thoroughly What happens when real pro coders are set free in a low-code environment? See for yourself
-
Developer's Journey with Polaris
By:
Type: Talk
Join us for a deep dive into 'A Day in the Life of a Secure Code Developer' with Synopsys Polaris. In this upcoming webinar, we will explore how this developer-friendly software security platform is dedicated to keeping your code and open source libraries in your code secure. In this session we will demonstrate how Polaris - connects seamlessly with your SCM repositories and bug tracking systems - automates scanning, centralizes issue management, and increasing development velocity - triggers scanning with the option to “break the build” Polaris, is the all-in-one platform optimized for the needs of development and DevSecOps teams.
-
STRONGER 2024: Can AI Outsmart Cybercriminals? Building Predictive AI Risk Models in Python
By:
Type: Replay
This presentation from STRONGER discussed practical tips for building predictive risk models using Python and open-source libraries. Professor Huwyler explored how these models can detect unusual activity and threats in real-time, providing valuable insights to enhance cybersecurity measures. The session offered practical tips and recommendations, complete with code examples that you can implement immediately. He'll discuss various use cases to illustrate how these predictive risk models can be applied in real-world scenarios. Professor Huwyler demonstrated how to build these models with Python and published this code on a free-to-use platform, ensuring accessibility for all attendees from this session.
-
Cloud Security Architecture
By:
Type: Talk
Cloud is where our data lives, is where code resides, applications run, and decisions are made. With this huge responsibility placed on Cloud, it becomes a rich target for attackers to mime private data, insert malware into code or applications, as well as influence the decisions. This talk will provide an overview of cloud security, with an emphasis on secure design leaning on core building blocks such as Identity Management, storage security, key management.
-
Cloud Security Architecture
By:
Type: Talk
Cloud is where our data lives, is where code resides, applications run, and decisions are made. With this huge responsibility placed on Cloud, it becomes a rich target for attackers to mime private data, insert malware into code or applications, as well as influence the decisions. This talk will provide an overview of cloud security, with an emphasis on secure design leaning on core building blocks such as Identity Management, storage security, key management.
-
Cloud Security Architecture
By:
Type: Talk
Cloud is where our data lives, is where code resides, applications run, and decisions are made. With this huge responsibility placed on Cloud, it becomes a rich target for attackers to mime private data, insert malware into code or applications, as well as influence the decisions. This talk will provide an overview of cloud security, with an emphasis on secure design leaning on core building blocks such as Identity Management, storage security, key management.
-
Create & Enrich Knowledge Models with Semaphore
By:
Type: Talk
These days, it seems everyone is talking about knowledge models—but what exactly are they, and how do you get YOUR data into them? In this demo, we’ll show you how you can build and enrich metadata knowledge models using our no-code software: Semaphore by Progress.
-
Breaking the API Monolith with Digibee Capsules
By: Digibee
Type: White Paper
In this white paper, dig into the essentials of breaking the API monolith, and find out how Digibee’s reusable Capsules offer an alternative solution to the overhead of managing APIs.
-
How Does Malicious Code Enter Applications?
By:
Type: Replay
Malicious code has been making headlines over the past years. The type of attacks may vary, but the consequences are real. We’ve seen a spate of malicious open source components identified within the NPM repository, or an ethical hacker gaining access to the systems of several notable tech companies using publicly hosted packages. Today, threat actors are looking beyond exploiting weaknesses in the application layer. Now they have started taking advantage of the inherent trust associated with open source software. Inadvertently building code with these weaknesses into applications leaves businesses and their customers prime targets of supply chain attacks. Join us as we discuss • What can be classified as malicious code or malware • Some of the techniques that attackers use to inject malicious code into the supply chain • Methods for identifying malicious code and open source components