The Increasing Importance of Middleware and Platforms for Coding and DevOps
DevOps From the Trenches: Lessons Learned from the DevOps Community
- Contents
- DevOps is a Strategy
- Change Management in a Change Dominated World
- Do Containers Become the DevOps Pipeline?
- Automated Testing in a DevOps World
- Who Controls Docker Containers
Does your app hit the mark with users? Use cloud-based services to find out for sure!
Develop in the Cloud, Deploy Anywhere: Strategies for Write-Once, Use-Many Coding and Ops Solutions for Agile Enterprises
An Enterprise Architect’s Guide to Mobility
- Agile and Lean development approaches for mobile
- The ideal way to organize a mobile team
- Design for multiple mobile form factors
- Basic principles of mobile development
- QA/Testing for mobile apps
- Mobile data integration
- Management and app security
- Mobile analytics
5 Key Forces Shaping Next Generation of Enterprise Mobility
After reading this whitepaper, you’ll know how to:
- Gain a competitive edge via mobile innovation
- Minimize mobility costs using the latest technologies
- Deliver unique and innovative experiences across platforms
- Protect mobile app projects against security risks
- Leverage existing data when developing mobile apps
The Enterprise Approach to Mobile App Development
IDG Connect interviewed 150 IT decision makers engaged in mobile app development. Their responses provide a detailed picture of how companies across the four territories currently approach mobile app development and offers insight into changes to the way they plan and manage the development process to help overcome the challenges they face.
Applications, DevOps and the Cloud: IT Impact of Trends in Motion
Unlikely Partnerships
Agile development organizations often see application security considerations as impediments to the rapid release cycles they strive for. But releasing software with vulnerabilities opens the door to hackers and puts the entire business at risk. How do you develop an application security program that protects the business without impacting time to market?
This white paper explores the tension between development and security teams and proposes an approach to building security into the software development lifecycle. Read it to learn:
• The five elements needed to build security into the development process
• How to use automated security scanning to make application security more reliable and efficient
• How HP Fortify can help you get started quickly
Software Supply Chain Management with BOMtotal
Anyone who uses software has a right to know what's inside it. Just as you can examine any piece of food in a supermarket to see its ingredients, you should be able to know what's inside software that you use or might use.
Enabling anyone to generate a bill of materials (list of ingredients) for any piece of software results in a better world for all of us. Buyers gain visibility into software during their procurement cycles by requesting bills of materials from builders. Builders examine bills of materials for their own products to make sure they have no surprises. Ordinary people benefit because when builders and buyers effectively manage their software supply chains, the entire ecosystem becomes safer, more reliable, and more secure.
Software Supply Chain Management with BOMtotal
Anyone who uses software has a right to know what's inside it. Just as you can examine any piece of food in a supermarket to see its ingredients, you should be able to know what's inside software that you use or might use.
Enabling anyone to generate a bill of materials (list of ingredients) for any piece of software results in a better world for all of us. Buyers gain visibility into software during their procurement cycles by requesting bills of materials from builders. Builders examine bills of materials for their own products to make sure they have no surprises. Ordinary people benefit because when builders and buyers effectively manage their software supply chains, the entire ecosystem becomes safer, more reliable, and more secure.
Fuzz Testing Maturity Model
The Fuzz Testing Maturity Model (FTMM) gives builders and buyers a set of standard levels for communicating about fuzz testing.
Synopsys solutions help deliver a more comprehensive security offering for the SDLC by adding black box testing capabilities, including the Codenomicon Defensics® tool for file and protocol fuzz testing, and the Codenomicon AppCheck™ tool for software composition analysis and vulnerability assessment.
What is Fuzzing: The Poet, the Courier, and The Oracle
Synopsys solutions help deliver a more comprehensive security offering for the SDLC by adding black box testing capabilities, including the Codenomicon Defensics® tool for file and protocol fuzz testing, and the Codenomicon AppCheck™ tool for software composition analysis and vulnerability assessment.