Bamboo 1.2
By: Atlassian View more from Atlassian >>
Download this next:
Integration Testing: Tips and Best Practices
By: TechTarget Business Analytics
Type: eGuide
If you practice agile development, you're probably familiar with integration testing. But did you know that the term “integration test” means different things to different people?
In this expert e-guide, explore the various meanings of integration testing and learn how each fits into the application development lifecycle. Also, get tips and best practices from the pros about integration testing, as well as advice for overcoming some of the most common integration testing challenges facing developers today.
These are also closely related to: "Bamboo 1.2"
-
Continuous testing: How a bank boosted software quality
By: Digital.ai
Type: Case Study
A leading bank was primarily practicing manual testing for its software delivery efforts, which lacked standardization and led to inconsistencies across locations. What’s more, their manual solution lacked traceability, making it difficult to maintain compliance.
To alleviate these problems and enhance software quality, the bank decided to integrate continuous testing into its DevOps practices, thereby enabling the consistent delivery of high-quality software for their entire user community. Read on to understand how automating software delivery workflows can empower your business.
-
QA automation: Consistently deliver high-quality software
By: Growth Acceleration Partners
Type: eBook
When you need to deliver reliable, high-quality software that meets the needs of both your businesses and end-users, quality assurance (QA) is a step you can’t afford to skimp on.
Indeed, QA services and software testing solutions are crucial aspects of the software development lifecycle. A focus on this specialized process ensures software meets specified requirements, functions correctly, and delivers a positive user experience.
In this e-book, you’ll discover how you can empower your in-house developers to ship high-quality software that scales with your business and your customers’ needs. Read on to understand why QA automation testing is key.
Find more content like what you just read:
-
AWS Differences between Active and Passive IAST and how to get the best of both worlds
By: Contrast Security
Type: White Paper
Interactive Application Security Testing (IAST) is a relatively new technology that has caused a lot of confusion for not being clearly explained. This article sets out to clear the air. It will explain:What is IAST?What’s the difference between Active IAST & Passive IAST? Which approach is better for you?Access the paper here.
-
How to optimize your CI tool to overcome shortcomings
By: Cloudbees
Type: Product Overview
Jenkins remains the most valuable CI tool available; there’s a reason 80% of enterprise companies use it. You simply need to remedy its shortcomings to unlock its true power and potential. But what does your ideal toolkit look like
-
How Compass Medical, PC Increased TCM Visits, Improved Chronic Care Management, and Outcomes During COVID-19
By: Bamboo Health
Type: White Paper
Compass Medical, PC partnered with Bamboo Health to receive real-time visibility into patients' care events to improve care coordination outcomes and succeed with quality initiative programs such as the Next Gen ACO Model, Medicare Shared Savings Program, the Medicare Advantage Program, Transitional Care Management, and Chronic Care Management.
-
Fast vs. Secure: Striking the AppSec balance with Terraform
By: Microsoft + HashiCorp
Type: Webcast
In this webinar, explore the simple steps to include in your coding approach to build better security into your infrastructure code using Terraform with Microsoft Azure.
-
Build a Blueprint: Make Cloud Migration a Transformation
By: Atlassian
Type: Webcast
Tune in to this webinar as experts from Atlassian discuss how to build a migration blueprint, including creating an effective cloud tenant map.
-
How Pioneer Valley Accountable Care uses Pings to Lower Costs and Improve Care Coordination
By: Bamboo Health
Type: White Paper
Pioneer Valley Accountable Care (PVAC) is an accountable care organization (ACO) located in Western Massachusetts serving Medicare fee-for-service (FFS) beneficiaries throughout the Pioneer Valley. Prior to implementing Bamboo Health's Pings solution, PVAC lacked standardized communication protocols with their skilled nursing facility partners.
-
How to tap into the top 5 benefits of low-code development
By: HCL Software
Type: eBook
In this e-book, dive into the specific capabilities for building innovative apps and the benefits of HCL Volt MX, an industry-leading low-code platform for mobile and multi-experience app development.
-
10 tips for low-code app development
By: ServiceNow
Type: eBook
In this 64-page ultimate guide to low-code application development, discover what questions you should ask before building, 10 development tips, and much more.
-
App engine: How to build digital workflows on ServiceNow
By: ServiceNow
Type: Video
Discover in this ServiceNow video how your organization can fuel productivity by giving app developers the ability to build faster and more flexibly with low code development solutions.
-
How Saint Francis Healthcare Partners Improves Care Coordination with Bamboo Health
By: Bamboo Health
Type: White Paper
Saint Francis Healthcare Partners (SFHCP) is an independent organization founded in 1993 as a 50/50 physician-hospital organization. SFHCP implemented Bamboo Health's Pings solution, which are real-time care event notifications, in January of 2017.
-
Fast vs. Secure: Ending the balancing act in infrastructure code
By: Microsoft + HashiCorp
Type: Videocast
In this deep-diving video, explore the simple steps to include in your coding approach to build better security into your infrastructure code using Terraform with Microsoft Azure.
-
Low-code: How to do more with less
By: ServiceNow
Type: White Paper
To keep pace with today’s rapid change, low-code empowers everyone to do more with less. But how can you build great experiences swiftly, while safeguarding app quality, data security and platform stability? Discover low-code with easy, effective governance, in this e-book.
-
Cloud migration: You don’t have to undertake it alone
By: Atlassian
Type: Webcast
Watch this webinar session to discover 6 key factors to keep in mind when undertaking cloud migration, and learn how Atlassian experts are equipped to support your journey to the Atlassian Cloud.
-
Low-Code Implementation For “Virtual Try On” Contact Lenses
By: Reply
Type: Case Study
Many organizations are still doing business while running an ecosystem made up of several applications with obsolete technologies. For one of the biggest eyewear retailers in the industry, they ran into that problem when they wanted to develop a virtual “try on” for contact lenses. Read on to learn what solution they used and how they did it.
-
Low-code: Your key to solving major operational challenges
By: ServiceNow and Devhd
Type: White Paper
As today’s IT leaders continue need a higher level of efficiency, many have certain concerns and challenges. To solve these issues, some companies have turned to low-code to help streamline the development process and build more apps in less time. But what exactly is low-code development? Browse this guide to learn more.
-
Next step app development: Microservices
By: TechTarget ComputerWeekly.com
Type: eGuide
Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.
-
Proactive Security: Software vulnerability management and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
Test-integrated module publishing 101: What to know
By: Microsoft + HashiCorp
Type: Product Demo
Today, developers are looking for new, easy-to-use tools to perform unit and integration testing of code. However, to benefit from high-quality modules, companies must also have an effective way of publishing them systematically. Tune into this video to learn more.
-
6 key criteria for developer-first secrets scanning solutions
By: Palo Alto Networks
Type: White Paper
Hardcoding secrets enables developers to seamlessly access or authenticate the services needed to build and deploy applications. But those secrets, if not stored securely, present a huge risk. This checklist presents 6 key criteria that you should use when evaluating a potential secrets-scanning solution. Download now to learn more.
-
4 leading approaches to software integration
By: CData Software
Type: White Paper
You can build drivers into your applications to provide a more productive overall developer experience when compared to other integration approaches.
-
How to close the skills gap and meet software demands
By: Be-Terna
Type: Webcast
In this webcast, you will learn about a low-code development platform capable of bridging the gap between the demand for software development and the supply of skilled developers. Tune in to understand how you can build the apps that power your organization and address your unique business needs.
-
Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
-
Application security: More important than ever
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
-
Building connected, cross-enterprise platforms with a single low-code solution
By: ServiceNow
Type: eBook
Read this handbook for 3 steps to accelerating innovation. Learn how you can quickly build connected, cross-enterprise workflows with low-code, provide experiences that users love, and deliver them at scale—all with a single platform.
-
Application security testing: Protecting your application and data
By: TechTarget Security
Type: eBook
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
-
Insights and Intelligence: Atlassian’s Approach to ABM
By: TechTarget
Type: BrightTALK Webinar
To shine a light on Atlassian’s approach to ABM, three ABM professionals from the software company gathered for a discussion with TechTarget’s VP of Customer Enablement & Data Strategy. Tune into the webcast to unlock their insights.
-
The Importance of Low-Code Developer Tools to Hyperautomation Technologies
By: ServiceNow
Type: White Paper
Explore in this IDC white paper the key challenges of adopting low-code development tools within an organization, and the best practices organizations should follow to facilitate collaboration between enterprise IT-based developers and LOB low-code developers.
-
Why 68% of mobile developers are prioritizing low-code development
By: HCL Software
Type: Infographic
Find out in this infographic the key challenges today’s organizations are facing when considering low-code development, and discover how your business can avoid the pitfalls to leverage low-code development for your innovation needs.
-
Are you prepared for the 5 low-code pitfalls?
By: HCL Software
Type: eBook
Discover in this e-book whether your development team might be susceptible to the most common low-code development pitfalls, and how your organization can seize on overlooked low-code opportunities.
-
How to protect your company's data in the cloud
By: Atlassian
Type: eBook
Managing data is challenging but critical. Atlassian details their cloud data protection across infrastructure, access management, compliance, and their Marketplace. Learn how Atlassian secures data and empowers organizations to meet complex regulatory requirements. Read the full eBook to ensure your data is safeguarded.
-
2024 IT Service Management Vendor Rankings
By: TeamDynamix
Type: eBook
It is critical that you find the right ITSM software to support your needs today and into the future - giving your team the foundation upon which to build a true center of excellence. Use this guide from Info-Tech Software Reviews to evaluate the ITSM Marketplace.
-
Developer’s guide to secure coding
By: Veracode
Type: eBook
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
-
Accelerate your automation goals with low-Code: Here's how
By: Reply
Type: Blog
Imagine a development approach that allows non-technical users to create, customize, and deploy software applications by using visual interfaces and templates, rather than traditional code. The Low-Code approach makes the process of app development faster and easier than ever before. Read on to learn more about this technology.
-
Atlassian: 8 key areas where customers are realizing value
By: Atlassian
Type: Blog
Businesses across the globe have enlisted the aid of Atlassian to transition from self-managed cloud deployments. From increased productivity to improved employee engagement, key are the benefits are clear. Explore 8 key areas where customers are realizing value from Atlassian cloud in this blog.
-
A definitive guide to effective Kubernetes strategies
By: SUSE
Type: eBook
Building an enterprise Kubernetes strategy must start with understanding where Kubernetes is running in your organization. In this e-book, learn the secrets to a successful Kubernetes strategy.
-
The application security solution checklist: What you need to know
By: HCL Software
Type: eBook
Download this e-book for your exclusive guide to procuring an application security testing partner, including gaining an understanding of use cases, critical technologies, and best practices.
-
QR code phishing on the rise: How to protect yourself
By: Cofense
Type: Blog
QR code phishing attacks are on the rise, exploiting the ubiquitous technology to steal data. Learn how to spot malicious QR codes, protect yourself, and train employees. Read on for details on real-world attacks and defense strategies. Learn more in this resource.
-
Hyperautomation & low-code: Quick guide to cost savings
By: ServiceNow
Type: White Paper
Read this white paper for insights on how you can save money and drive significant ROI with hyperautomation and low-code solutions from ServiceNow.
-
Low-Code Adoption Framework
By: Reply
Type: White Paper
With the rapid pace of digital change in today’s enterprises, if an organization does not have enough qualified talent to handle the workflows and constant change, then it’s time to take a different approach and consider the “citizen developer”. By adopting a low-code/no-code approach, businesses can keep up no matter what. Read on to see how.
-
Experts Answer Pressing PaaS Cloud Development Questions
By: TechTarget Business Analytics
Type: eGuide
As is the case with any “as a Service” application, before you embark on a Platform as a Service (PaaS) project, you must establish standards and strategies for how you plan to approach the implementation in order to be successful. This e-guide lays out expert tips for PaaS application development in the cloud.
-
Women Who Code: How women are redefining the programming world
By: TechTarget ComputerWeekly.com
Type: Landing Page
In this webinar, hear from women coders and leaders of software development teams about their career journeys and what it takes to encourage more women to take up coding.
-
Urban Myths About Secure Coding
By: Veracode, Inc.
Type: eBook
Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.
-
Next-generation DAST: Introducing interactive application security testing (IAST)
By: Contrast Security
Type: White Paper
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.
-
Top 10 Backup Challenges and Expert Recommendations to Address Them
By: TechTarget Storage
Type: eGuide
Access this expert eGuide to learn about the backup challenges that companies struggle with today, and how to address them.
-
Infographic: 5 essential open source cybersecurity tools for 2022
By: TechTarget ComputerWeekly.com
Type: Infographic
There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
-
Take a strategic approach to IAM for Atlassian Cloud
By: Atlassian
Type: White Paper
Businesses must proactively address IAM for cloud apps to enable secure collaboration. This white paper explores extending enterprise IAM to Atlassian Cloud. With Atlassian Access, admins can enforce policies, manage users, and audit across products. Read the white paper to learn how global companies scaled IAM in the cloud.
-
Speed Up Your Software Development Cycle
By: Slack
Type: White Paper
Learn how to accelerate coding and deliver more software faster.
-
A Zero Trust approach to securing your data in the cloud
By: Atlassian
Type: White Paper
Centralizing access management with strong authentication policies is crucial for cloud data security. Adopting a "zero trust" model by limiting user access and monitoring risks enhances protection. Implement this scalable framework to improve your security posture. For zero trust security guidance, read the full white paper.
-
IT leader's guide to VS code for mainframe development
By: BROADCOM, Inc
Type: eBook
Download this IDC e-book today to learn how VS code can help your organization accelerate agile development, bring modern functionality to the mainframe, and democratize access to mainframe development.
-
Build a better webinar: Creating a promotion plan
By: BrightTALK by TechTarget
Type: eBook
To generate deep engagement and achieve strong ROI from your webinar strategy, it’s necessary to consider the promotional approach that will get your content in front of the right professionals and accounts. Access this e-book to learn more.
-
Low-code app development explained in under 5 minutes
By: ServiceNow
Type: Video
How can you develop high-quality applications more quickly at your business? By adopting a low-code development approach, ServiceNow argues. To learn about a platform that can support low-code app development at your organization, watch this video.
-
Atlassian at a glance: Cloud vs Data Center
By: Atlassian
Type: Infographic
Explore in this infographic the feature and functional differences between Atlassian Cloud and Data Center products to find the right fit for you.