Skip to main content

Posts

Showing posts from June, 2022

Report: Fully automated testing remains elusive for organizations

Despite the growing complexity of the software that drives organizations, few companies have fully automated testing or are using AI, according to new research conducted by Forrester and commissioned by Keysight.  For the study, Forrester conducted an online survey in December 2021 that involved 406 test operations decision-makers at organizations in North America, EMEA, and APAC to evaluate current testing capabilities for electronic design and development and to hear their thoughts on investing in automation. It found that only 11% of respondents have fully automated testing. Eighty-four percent of respondents said that the majority of testing involves complex environments.  Most companies reported that they’re moderately or very satisfied with their testing methods and three-fourths of them use a combination of automated and manual testing. However, 45% of companies say that they’re willing to move to a fully automated testing environment within the next 3 years to increase pr

TigerGraph launches new version of TigerGraph Cloud

TigerGraph today announced new features for TigerGraph Cloud, including the addition of multi-user collaboration, integrated login, private networking options, and extended global cloud coverage.  The Enterprise IAM (Identity and Access Management) feature allows for a single enterprise account to manage multiple users and their role-based access with a holistic view of all solutions in one portal.  Developers will also benefit from increased collaboration and productivity through a simplified login process to enable access and collaboration across multiple projects.  “Graph is a critical technology for improved business insights from ML and AI and we want to make it so easy to access and use that anyone can do it,” said Yu Xu, CEO and founder, TigerGraph. “The TigerGraph Cloud capabilities we announced today make it easy for enterprises to adopt graph technologies and answer critical business questions in the most collaborative way possible. With this, along with our significant cl

CodeSee introduces Open Source Hub

CodeSee , the code visibility platform that detects, visualizes, and automates code understanding for a maintainable, resilient codebase,  today announced the launch of Open Source Hub (OSH) . OSH offers developers of all skill levels a place to learn, contribute, explore, and connect through open-source communities globally.  According to the company, rather than being a community dedicated to highlighting projects for developers to work on, OSH provides developers with tools to onboard and fully understand all of the code in an open-source project. This works to simplify the process of contributing, collaborating, and making a meaningful impact when working with open-source code. This open-source community intends to bring together maintainers, contributors, projects, mentorship, support, and communication alongside a community Discord server.  “We need more developers learning from and contributing to open source so that all of our codebases are more maintainable and resilie

Rafay Systems launches new open-source Kubernetes project

Rafay Systems launched a new open-source software project named Paralus to help keep users safe and applications secure on any Kubernetes environment for free. Paralus offers identity and access management throughout an organization by providing a single login zero-trust K8s solution to grant authorized users seamless and secure access to all clusters with a native and familiar kubectl experience and acts as a proxy between external access and the API server itself. Users don’t have to configure or manage Kubernetes RBAC one cluster at a time or design a zero-trust solution from the ground up. Paralus also enables the creation of custom roles, users, and groups, and it can dynamically change and revoke permissions with immediate effect. Users have the ability to control access via pre-configured roles across clusters, namespaces, projects, and more and can benefit from Seamless integration with single sign-on (SSO) and RBAC allowing the use of external authentication engines for us

Maneuvering around VSM roadblocks

While many organizations think they have value stream management, they are encountering roadblocks to gain the metrics they need from it, according to Laureen Knudsen, chief transformation officer at Broadcom in the talk “Maneuvering around VSM roadblocks” at {virtual} VSMcon 2022 .  A recent study by Broadcom found that 88% of people say they are doing value stream management, but only 42% say they have anything defined as a value stream.  A lot of organizations today are focusing on how to eliminate the last few siloes in their organizations, how to get the visibility they’ve been promised their whole product lifecycle, and how to use data effectively and efficiently, according to Knudsen. To read the full article, visit VSM Times where the article was originally published . The post Maneuvering around VSM roadblocks appeared first on SD Times . from SD Times https://ift.tt/nidI9Ap

Value driven planning and low code platforms, DevOps Edition

Increasing customer expectations have pushed business innovation into the clouds. We live and work in a world where digital customers expect an always on, always upgraded and always personalized digital experience across a multitude of devices and channels. These increasing expectations are forcing companies to move their digital transformations further into the clouds. Over the last 10 years, most of the custom app development has been pro-code based. But by 2025, over 70% of all new apps developed will be based on low-code or no code enterprise technologies, according to Gartner. Low code is not as new as it seems. A good example of this is Excel. Anyone who has ever worked in a spreadsheet, created a pivot table, or entered a formula has done low code no code. Over the years, low code has seeped into just about every industry, though it’s been more about completing smaller specific tasks—like adding a column of numbers or putting a picture on a website. Now, low code platforms are

WSO2 founder receives 2022 IEEE TCSVC Research Innovation Award

Dr. Sanjiva Weerawarana, CEO and founder of the API company WSO2, has been awarded the 2022 IEEE TCSVC Research Innovation Award.  The award is decided on by IEEE’s Computer Society Technical Community on Services Computing (TCSVC). It recognizes technologists that have significant influence on “the direction of research and development of the field, transferred theory to practice in significant and innovative ways, and/or enabled the delivery of impactful commercial service products/systems/solutions.” Over his 30 years in the industry, Weerawarana has led the creation of web service and open-source technologies that were important to the creation of the API economy. For example, he co-authored specifications such as Web Services Description Language (WSDL) and Business Process Execution Language of Web Services ( BPEL4WS).   Weerawarana also worked on open-source technologies like the Apache Axis2 web service engine and the Ballerina programming language. In addition, in his tim

ServiceNow announces LightStep Notebooks

ServiceNow , the SaaS cloud and computing software company, today announced LightStep Notebooks in order to deliver unified, comprehensive analysis across applications and infrastructure. This release allows developers to analyze data through visualizations while creating a structured view of the investigation steps as well as a path to resolution. LightStep Notebooks also enables SREs and developers to resolve incidents quickly and prevent recurrence. With the use of LightStep Notebooks’ analysis engine, Change Intelligence , any developer, operator, or SRE can understand changes in their services health and underlying infrastructure. This works to simplify investigating incidents, collaborating across teams, or documenting learning to share with the rest of the organization.  Additionally, this release brings users high data retention with 100% of trace data able to be retained for up to three days. This allows SREs to have the time they need to find the root of an issue without

Incredibuild raises $35 million in Series B funding

Incredibuild , creator of the leading hybrid development acceleration platform for developers and DevOps teams, announced today it has raised $35M in Series B funding after doubling its ARR, increasing its valuation significantly.  Hiro Capital , the entrepreneur-founded VC focused on Videogames, Creator Platforms and Metaverse Technologies, led the round with participation from existing investor  Insight Partners . Insight Partners acquired a stake in Incredibuild for $140 million just over one year ago in a round with several components, joining Fortissimo Capital, which invested in the company in 2018. In a world where user retention has become increasingly vital and rapid software releases are ever more urgent, Incredibuild has created the industry’s leading hybrid acceleration platform to support expedited development. By turning every machine on the network into a supercomputer, Incredibuild’s technology dramatically accelerates software builds, radically boosting development an

Top 10 Computer Science Universities in USA 2022 Juveria Asif The Crazy Programmer

Соmрuter sсienсe grаduаtes аnd рrоfessiоnаls аre in high demаnd fоr а vаriety оf роsitiоns аrоund the wоrld. This is а rарidly grоwing field, аnd yоu аre required tо keeр uр with new trends, соurses, аnd news in this industry, just like yоu must with аny оther emрlоyment, in оrder tо аdvаnсe yоur саreer. А Sоftwаre Develорment direсtоr eаrns аn аverаge оf $143,000 рer yeаr. Аs а result, yоu might eаrn а lоt mоre mоney here, esрeсiаlly in соuntries suсh аs the USА. The USА is hоme tо sоme оf the best соmрuter sсienсe universities in the wоrld. Sоme оf them аre Mаssасhusetts Institute оf Teсhnоlоgy, Stаnfоrd University, Geоrgiа Teсh, Соlumbiа University аnd mаny mоre. These аre the mоst рrestigiоus institutiоns in the USА. These universities аre highly соmрetitive tо get in аnd they рrоvide а gооd eduсаtiоn. If nоt these universities there аre аlsо vаriоus оther universities thаt yоu саn get intо. Yоu аlsо leаrn frоm the best рrоfessоrs in а gооd envirоnment. The USА оffers these соurs

Reflections about low-code data management

You wouldn’t code a website from scratch, so why would you code your corporate data estate from scratch? As it turns out, data engineers and business intelligence professionals can learn a great deal from the history of website development to help us with managing our corporate data estate .   In the early days of the Internet, websites were developed from scratch using coding languages like HTML and CSS. This was a complex process that often required a team of web designers and developers, a complex stack of tools, and months of development time. There were actually a number of advantages to building a website this way: Design Precision: It allowed for complete control over the design of the website. Customization: It meant that the website could be customized to a very specific set of requirements. Hosting & Storage: It gave the website owner complete control over the hosting, storage, and migration of the website. But on the flipside, there were several drawbacks of dev

SD Times Open-Source Project of the Week: data-diff

Data-diff is a new open-source project that was released by Datafold earlier this week. It is used for validating data across different databases.  It uses a simple CLI for creating monitoring and alerts, and can be used to bridge column types of different formats.  According to the project’s GitHub page, data-diff is able to verify over 25 million rows of data in under 10 seconds and over 1 billion rows in 5 minutes. It works for tables with billions of rows of data. It works by splitting the table into smaller segments and then performing checksums on each segment in both databases. If those checksums aren’t equal, then it will divide the segment into even smaller segments and checksums it until it finds the rows that differ.  Possible use cases highlighted on the project page include verifying data migrations, verifying data pipelines, alerting and maintaining data integrity SLOs, debugging complex data pipelines, and making self-healing replications.  “data-diff fulfills a nee

SmartBear introduces web testing on BitBar

SmartBear , a provider of software development and quality tools, recently released web testing on its next-gen mobile testing platform, BitBar . This comes as an answer to user requests for an all-in-one web and native mobile app testing solution. This release will bring users reliable and streamlined cloud-based testing available with instant access to all of the latest browsers and devices in order to support a consistent digital customer experience. According to the company, BitBar is highly scalable and performant, helping it to support the diversity of every test automation framework, environment, and language that software testers are already using.  BitBar enables testing teams that are responsible for ensuring a consistent, high-quality experience to quickly and securely test across real browsers and devices without needing to maintain those in-house. In addition, new deployment options, including private cloud and dedicated devices, are available in order to support ente

OctoML launches new machine learning platform expansion

Today OctoML , provider of a machine learning acceleration platform, released a major platform expansion in order to accelerate the development of AI-powered applications by eliminating bottlenecks in machine learning development.  This release is intended to enable app developers and IT operations teams to transform trained machine learning models into agile, portable, production-ready software functions that integrate with their existing application stacks and DevOps workflows. According to OctoML, the platform expansion will help to conquer the challenges of enterprise software development by abstracting out complexities, stripping away dependencies, and delivering models as production-ready software functions. “AI has the potential to change the world, but it first needs to become sustainable and accessible,” said Luis Ceze, CEO of OctoML. “Today’s manual, specialized ML deployment workflows are keeping application developers, DevOps engineers and IT operations teams on the sid

Python Single vs Double Quotes Gorakh Gupta The Crazy Programmer

We know that if we want to print something on the console then we use print() statement in python. In a print statement, we can use single quotes or double quotes to print the text to the console. In this article, we will see what is the difference between single and double quotes in Python and in which scenario we have to use one. In languages like Java, C++, and C when we want to print something we strictly have to use double quotes. This thing is different in the case of Python Language. In Python, we can use either single quotes or double quotes. Difference between Single and Double Quotes in Python In the case of Python, there is no major difference between the quotes. We can use either of them in the print statement. Now, we will see some scenarios that why both the quotes exist in Python while not present in other Languages. Let’s suppose we want to print a statement like This is Hari’s Book . By using double quotes we can easily print this statement. Code: print("

SingleStore announces new updates for improving scalability

SingleStore, provider of the real-time distributed SQL database SingleStoreDB, today announced the newest updates to its offering. These updates are intended to empower users to build and scale real-time applications and analytical workloads with simplicity and efficiency. Among these product announcements is Workspaces, which provides scalability by decoupling compute across individual applications, such as operational analytics and real-time machine learning, without these workloads interfering with one another. Additionally, Code Engine powered by Wasm allows code to be compiled to a wasm module and ported to multiple popular runtime environments. With this, developers can safely port over external code libraries into SingleStoreDB. “It has become essential for companies to reevaluate their data strategies to better support modern SaaS applications and also remain competitive in an era dominated by data intensity. With our new suite of updates, we’re empowering businesses to do t

Report: Rust takes the crown in Stack Overflow Developer Survey

For the seventh year, Rust has been named the most loved language in Stack Overflow’s Developer Survey.  Eighty-seven percent of Rust developers said that they want to continue using the language.  Rust also tied with Python as the most wanted technology in this year’s report, with TypeScript and Go following closely behind. The distinction between most loved and most wanted is that most wanted includes only developers who are not currently developing with the language, but have an interest in developing with it.  Looking beyond programming languages, Docker and Kubernetes took the top spot for most loved and most wanted tools. Docker was loved by 77% of its user base and Kubernetes by 75%, and 37% want to use Docker and 24% want to use Kubernetes. Last year, Docker was wanted by only 30% of developers.  In addition, 69% of professional developers view Docker as a fundamental tool, which is up from 55% last year.  The number of developers learning to code online is also increasing

Report: Indirect dependencies are increasingly causing trouble for organizations

Dependencies in open-source packages are ripe with the potential to contain vulnerabilities. It’s one thing to try to manage that when you know what those dependencies are, but what about the ones that you’re less aware of?   Only 18% of respondents to a joint survey conducted by Snyk and the Linux Foundation said they are confident of the controls they have for indirect dependencies, otherwise known as transitive dependencies.  According to the report, there is an average of 49 vulnerabilities per project, and 18 to 20 of those are indirect, or about 40%.  To get a better understanding, take a look at the real-life example of Log4j. The report states that 79% of the projects affected by Log4Shell contain the vulnerability more than once, and 60% of instances are found in indirect dependencies.  Further complicating the matter is that detecting and fixing those indirect vulnerabilities is more difficult than remediating direct vulnerabilities.  In addition, only 49% of organizat

CData Software introduces CData Arc

CData Software, provider of connectivity and integration solutions, today announced the CData Arc platform. This release works to enable organizations to automate their B2B integration workflows in minutes and share data with partners both in the cloud and on premises. According to the company, CData Arc Cloud brings businesses comprehensive no-code B2B solutions in the cloud, allowing businesses across several industries to simply modernize and streamline their EDI, MFT, API, and application integration strategy. The cloud solution also helps to reduce IT bottlenecks by ensuring that every user has the ability to connect their data and handle more complicated B2B workflows without the need to write or maintain code. “CData Arc Cloud is a modern cloud-first platform that dramatically simplifies B2B integration, a market segment that has traditionally suffered in terms of innovation and investment,” said Amit Sharma, CEO and founder of CData. “With Arc Cloud, we will make it easier

How policy-as-code can simplify API security

Most organizations today use hundreds  of applications in their environment, and with that they employ hundreds of APIs to connect these to the necessary web servers. Due to the flow of sensitive information, it’s crucial to manage policies that ensure controls are in place to only authorize appropriate access, as well as actions that can be taken with that access.  Before we dive in on the subject of API Security, I want to define exactly what I’m talking about here because often people immediately think of the OWASP top 10 , vulnerabilities around SQL injection and so on. Preventative steps and solutions that address those vulnerabilities are certainly crucial, but what I’m referring to is the practice of establishing attribute-based access control (ABAC) policies around what actions can be taken, by who or what (be it an identity or another application), and under what context/conditions. For security-centric organizations, it is important to establish modern approaches to writin