LIVE! Wednesday, May 24th @ 1PM ET | 10AM PT | Are you looking for ways to help your Java dev team meet their looming deadlines and free up more time for feature development? Adding more people doesn’t necessarily help with tight sprints since it takes a while to ramp up new developers. Unlock a … continue reading
EVERY THIRD TUESDAY OF THE MONTH STARTING APRIL 18th, 2023 – See schedule & series topics below | In today’s fast-paced and ever-changing technological landscape, it’s crucial for organizations to be agile and efficient. To achieve this, optimizing flow in the software delivery value stream is key. And the answer is pattern thinking and automation … continue reading
AVAILABLE NOW | Growth of cloud computing and the preference for data-driven decision-making have led to a steady increase in investments in observability over the years. Telemetry data is becoming recognized as not only critical for maintaining a company’s infrastructure but also for aiding security and business teams in making informed decisions. In fact, according … continue reading
AVAILABLE NOW Episode 1: How Automated E2E Testing Creates a Safety Net for Innovation Speaker: Dennis Nelson, Customer Education Lead @ mabl As teams adopt DevOps practices and aim for automated pipelines, they need to expand the scope of testing that’s shifted left and aim for high test coverage: because any quality aspects that are … continue reading
AVAILABLE NOW | Software supply chain attacks mainly happen because 80-90% of all software developed relies on third party dependencies. Most of these attacks don’t happen with the dependencies you implicitly state but the transitive dependencies they rely on. The most dangerous of these attacks happen on a “Zero Day” which is where a vulnerability … continue reading
AVAILABLE NOW | It feels like the song is on repeat. Another week, another zero-day vulnerability is disclosed. Some are more potent than others. Log4j and Spring4Shell were on the catastrophic side. Enterprises are still grappling with the long tail of Log4j. The Department of Homeland Security Under Secretary Rob Silvers, the board’s chairman, recently proclaimed that … continue reading
AVAILABLE NOW The complex data environment today makes collaboration and the productization of data pipelines, machine learning (ML) models, and apps extremely difficult for data professionals, resulting in slow time to insight and leaving much invaluable data unrealized. Snowpark, a developer framework of Snowflake, was built to solve this exact challenge by allowing different data … continue reading
CHECK OUT ALL 10 TOPICS/VIDEOS BELOW Topic 10 – “The Bitter Truth About the State of Value Stream Management” SPEAKERS FOR THIS SESSION: Lance Knight, President & COO, ConnectALL, Andrew Fuqua, SVP of Products, ConnectALL, David Rubinstein, Editor-in-chief, SD Times As we get closer to the beginning of the new year, we feel obliged to give … continue reading
AVAILABLE NOW Now, I got no fight with any man who does what he’s told, but when he don’t, the machine breaks down. And when the machine breaks down, we break down. And I ain’t gonna allow that in any of you. Not one. — Sgt Barnes, Platoon (1986) In our world of software delivery, … continue reading
AVAILABLE NOW At ConnectALL, we have discussed ad nauseum what value stream management isn’t. We’ve told you that it is NOT a tool, NOT a feature, and NOT a map. It isn’t a person, it isn’t a platform, and it isn’t a set of metrics. Agile? DevOps? Also not value stream management. But what is less … continue reading
How do you scale your testing to realize the full value of DevOps? In this session, Ethan Chung, Solutions Architect Manager at Keysight Technologies, will show how to expand testing coverage across complex applications with intelligent automation. Watch now to learn the basics of automation right through to building sophisticated test cases that integrate with … continue reading
AVAILABLE NOW Hackers are becoming increasingly sophisticated and calculated in the ways in which they deliver attacks upstream in the software supply chain. There are growing numbers of organized attackers whose sole focus is exploiting vulnerabilities in open source ecosystems, frequently by making their malware appear legitimate. What’s new is the intensity, volume, frequency, and … continue reading