The Increasing Importance of Middleware and Platforms for Coding and DevOps

The dynamic nature of business requires that companies be agile enough to quickly react to new opportunities and stay ahead of the competition. Unfortunately, traditional development approaches no longer meet the business demands for speed, compounded by the complexities inherent in connecting new front-end mobile apps to back-end data services. This Slashguide details how a DevOps strategy with middleware and application run-time development platforms at the core can help today's businesses remain agile.
View Now

DevOps From the Trenches: Lessons Learned from the DevOps Community

DevOps is a strategy for developing what is becoming a universally recognized process for managing continuous delivery, but it is not that process. In this eBook, thought leaders and practitioners weigh in on the culture, process and tools that lead to the deployment of quality software at high velocity.
    Contents
  1. DevOps is a Strategy
  2. Change Management in a Change Dominated World
  3. Do Containers Become the DevOps Pipeline?
  4. Automated Testing in a DevOps World
  5. Who Controls Docker Containers
Get Whitepaper

An Enterprise Architect’s Guide to Mobility

Key insights and expert guidance for the enterprise development leader on:
  • Agile and Lean development approaches for mobile
  • The ideal way to organize a mobile team
  • Design for multiple mobile form factors
  • Basic principles of mobile development
  • QA/Testing for mobile apps
  • Mobile data integration
  • Management and app security
  • Mobile analytics
    Get Whitepaper

    5 Key Forces Shaping Next Generation of Enterprise Mobility

    Explosive growth in mobile device usage has created new opportunities for the enterprise. There are five major forces that will impact the success of your enterprise mobile app projects.

    After reading this whitepaper, you’ll know how to:
    • Gain a competitive edge via mobile innovation
    • Minimize mobility costs using the latest technologies
    • Deliver unique and innovative experiences across platforms
    • Protect mobile app projects against security risks
    • Leverage existing data when developing mobile apps
    Get Whitepaper

    The Enterprise Approach to Mobile App Development

    Time-to-market, reliability and positive brand representation are fundamental to commercial success.

    IDG Connect interviewed 150 IT decision makers engaged in mobile app development. Their responses provide a detailed picture of how companies across the four territories currently approach mobile app development and offers insight into changes to the way they plan and manage the development process to help overcome the challenges they face.
    Get Whitepaper

    Applications, DevOps and the Cloud: IT Impact of Trends in Motion

    This SlashGuide discusses the results of a recent Slashdot Media Pulse survey that looks at how new Cloud-based tools are impacting web and mobile app development, what factors are most impeding the ability to deliver new code releases and how development is migrating from on-premises to the Cloud.
    View Now

    Unlikely Partnerships

    Agile development organizations often see application security considerations as impediments to the rapid release cycles they strive for. But releasing software with vulnerabilities opens the door to hackers and puts the entire business at risk. How do you develop an application security program that protects the business without impacting time to market?

    This white paper explores the tension between development and security teams and proposes an approach to building security into the software development lifecycle. Read it to learn:

    • The five elements needed to build security into the development process
    • How to use automated security scanning to make application security more reliable and efficient
    • How HP Fortify can help you get started quickly

    Get Whitepaper

    Software Supply Chain Management with BOMtotal

    BOMtotal is a free service that generates a bill of materials from any executable code.

    Anyone who uses software has a right to know what's inside it. Just as you can examine any piece of food in a supermarket to see its ingredients, you should be able to know what's inside software that you use or might use.

    Enabling anyone to generate a bill of materials (list of ingredients) for any piece of software results in a better world for all of us. Buyers gain visibility into software during their procurement cycles by requesting bills of materials from builders. Builders examine bills of materials for their own products to make sure they have no surprises. Ordinary people benefit because when builders and buyers effectively manage their software supply chains, the entire ecosystem becomes safer, more reliable, and more secure.

    Get Whitepaper

    Software Supply Chain Management with BOMtotal

    BOMtotal is a free service that generates a bill of materials from any executable code.

    Anyone who uses software has a right to know what's inside it. Just as you can examine any piece of food in a supermarket to see its ingredients, you should be able to know what's inside software that you use or might use.

    Enabling anyone to generate a bill of materials (list of ingredients) for any piece of software results in a better world for all of us. Buyers gain visibility into software during their procurement cycles by requesting bills of materials from builders. Builders examine bills of materials for their own products to make sure they have no surprises. Ordinary people benefit because when builders and buyers effectively manage their software supply chains, the entire ecosystem becomes safer, more reliable, and more secure.

    Get Whitepaper

    Fuzz Testing Maturity Model

    Fuzz testing is an industry-standard technique for locating unknown vulnerabilities in software. Fuzz testing is mandatory portion of many modern secure software development life cycles (SDLCs), such as those used at Adobe, Cisco Systems and Microsoft. This document provides a framework to assess the maturity of your processes, software, systems and devices. At the heart of this document is a vendor-agnostic maturity model for fuzz testing that maps metrics and procedures of effective fuzz testing to maturity levels. The maturity model is a lingua franca for talking about fuzzing, allowing different organizations to communicate effectively about fuzzing without being tied to specific tools.

    The Fuzz Testing Maturity Model (FTMM) gives builders and buyers a set of standard levels for communicating about fuzz testing.

    Synopsys solutions help deliver a more comprehensive security offering for the SDLC by adding black box testing capabilities, including the Codenomicon Defensics® tool for file and protocol fuzz testing, and the Codenomicon AppCheck™ tool for software composition analysis and vulnerability assessment.

    Get Whitepaper

    What is Fuzzing: The Poet, the Courier, and The Oracle

    Fuzzing is well established as an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed input to target software and detect failure. A complete fuzzer has three components. A poet creates the malformed inputs or test cases. A courier delivers test cases to the target software. Finally, an oracle detects if a failure has occurred in the target. Fuzzing is a crucial tool in software vulnerability management, both for organizations that build software as well as organizations that use software.

    Synopsys solutions help deliver a more comprehensive security offering for the SDLC by adding black box testing capabilities, including the Codenomicon Defensics® tool for file and protocol fuzz testing, and the Codenomicon AppCheck™ tool for software composition analysis and vulnerability assessment.

    Get Whitepaper