Bamboo 1.2
By: Atlassian View more from Atlassian >>
Download this next:
Integration Testing: Tips and Best Practices
By: TechTarget Business Analytics
Type: eGuide
If you practice agile development, you're probably familiar with integration testing. But did you know that the term “integration test” means different things to different people?
In this expert e-guide, explore the various meanings of integration testing and learn how each fits into the application development lifecycle. Also, get tips and best practices from the pros about integration testing, as well as advice for overcoming some of the most common integration testing challenges facing developers today.
These are also closely related to: "Bamboo 1.2"
-
How automation can drive testing and QA success
By: Qualitest Group
Type: Case Study
A leading sports-fashion retail business was looking to develop an application for its ecommerce platform as part of a future-proofing strategy. However, to accommodate their testing needs in a timely manner, they realized they needed to supplement their in-house efforts with outside expertise.
This case study will reveal how the retailer was able to integrate an automated testing solution and leverage parallel testing by partnering with Qualitest. Read on to learn how they sped up testing processes and improved performance for their ecommerce platform.
-
Achieve continuous testing at scale
By: Qualitest Group
Type: Webcast
For businesses operating at scale, efficient continuous testing is critical for maintaining security as operations expand.
But how can businesses overcome the hurdles associated with enterprise-level testing?
Join this webcast to learn about the intricacies of coping with complex challenges that arise in enterprise test automation and execution environments, specifically focusing on complexity, security, and scalability.
Find more content like what you just read:
-
Your key to improving your testing processes
By: Qualitest Group
Type: Case Study
When this large sports-fashion retail organization began to struggle with time-consuming, legacy testing that delayed their feedback loops, they sought out a way they could maintain reasonable test execution times without raising costs. Dig into this case study to hear the full story.
-
Continuous testing: How a bank boosted software quality
By: Digital.ai
Type: Case Study
A leading bank was primarily practicing manual testing for its software delivery efforts, which lacked standardization and led to inconsistencies across locations. To alleviate these problems and enhance software quality, the bank decided to integrate continuous testing into its DevOps practices. Read on to learn why.
-
QA automation: Consistently deliver high-quality software
By: Growth Acceleration Partners
Type: eBook
QA services and software testing solutions are crucial aspects of the software development lifecycle. A focus on this specialized process ensures software meets specified requirements, functions correctly, and delivers a positive user experience. Read on to understand why QA automation testing is key for delivering high-quality software.
-
AWS Differences between Active and Passive IAST and how to get the best of both worlds
By: Contrast Security
Type: White Paper
Interactive Application Security Testing (IAST) is a relatively new technology that has caused a lot of confusion for not being clearly explained. This article sets out to clear the air. It will explain:What is IAST?What’s the difference between Active IAST & Passive IAST? Which approach is better for you?Access the paper here.
-
How NHS improved the efficiency of their vaccination program by 75%
By: Qualitest Group
Type: Case Study
When the NHS needed to bring in a partner to act on its behalf and assure its third-party processes and deliverables were as efficient as possible, Qualitest was the natural choice. Read the case study now to learn how NHS improved the efficiency of their vaccination program by up to 75%.
-
How Compass Medical, PC Increased TCM Visits, Improved Chronic Care Management, and Outcomes During COVID-19
By: Bamboo Health
Type: White Paper
Compass Medical, PC partnered with Bamboo Health to receive real-time visibility into patients' care events to improve care coordination outcomes and succeed with quality initiative programs such as the Next Gen ACO Model, Medicare Shared Savings Program, the Medicare Advantage Program, Transitional Care Management, and Chronic Care Management.
-
How to tap into the top 5 benefits of low-code development
By: HCL Software
Type: eBook
In this e-book, dive into the specific capabilities for building innovative apps and the benefits of HCL Volt MX, an industry-leading low-code platform for mobile and multi-experience app development.
-
10 tips for low-code app development
By: ServiceNow
Type: eBook
In this 64-page ultimate guide to low-code application development, discover what questions you should ask before building, 10 development tips, and much more.
-
How Pioneer Valley Accountable Care uses Pings to Lower Costs and Improve Care Coordination
By: Bamboo Health
Type: White Paper
Pioneer Valley Accountable Care (PVAC) is an accountable care organization (ACO) located in Western Massachusetts serving Medicare fee-for-service (FFS) beneficiaries throughout the Pioneer Valley. Prior to implementing Bamboo Health's Pings solution, PVAC lacked standardized communication protocols with their skilled nursing facility partners.
-
How Saint Francis Healthcare Partners Improves Care Coordination with Bamboo Health
By: Bamboo Health
Type: White Paper
Saint Francis Healthcare Partners (SFHCP) is an independent organization founded in 1993 as a 50/50 physician-hospital organization. SFHCP implemented Bamboo Health's Pings solution, which are real-time care event notifications, in January of 2017.
-
How you can drive innovation with intelligent automation
By: ServiceNow
Type: Infographic
In order to stay competitive, organizations must have the flexibility to keep up with changing customer demands, solve complex issues, and the capability to digitize processes. However, if manual processes and siloed systems are preventing that, you need to adapt. Read on to see how low-code and automation can be the answer you’re looking for.
-
Low-Code Implementation For “Virtual Try On” Contact Lenses
By: Reply
Type: Case Study
Many organizations are still doing business while running an ecosystem made up of several applications with obsolete technologies. For one of the biggest eyewear retailers in the industry, they ran into that problem when they wanted to develop a virtual “try on” for contact lenses. Read on to learn what solution they used and how they did it.
-
Next step app development: Microservices
By: TechTarget ComputerWeekly.com
Type: eGuide
Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.
-
Proactive Security: Software vulnerability management and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
6 key criteria for developer-first secrets scanning solutions
By: Palo Alto Networks
Type: White Paper
Hardcoding secrets enables developers to seamlessly access or authenticate the services needed to build and deploy applications. But those secrets, if not stored securely, present a huge risk. This checklist presents 6 key criteria that you should use when evaluating a potential secrets-scanning solution. Download now to learn more.
-
How to close the skills gap and meet software demands
By: Be-Terna
Type: Webcast
In this webcast, you will learn about a low-code development platform capable of bridging the gap between the demand for software development and the supply of skilled developers. Tune in to understand how you can build the apps that power your organization and address your unique business needs.
-
Streamline DevOps with IT service management integration
By: Atlassian
Type: Blog
Discover how Jira Service Management boosts Dev and Ops teamwork in this Atlassian white paper. It streamlines incident handling, automates change management, and integrates platforms to dismantle silos. Explore demos and learn how it enhances IT Ops and Dev collaboration.
-
Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
-
Application security: More important than ever
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
-
Application security testing: Protecting your application and data
By: TechTarget Security
Type: eBook
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
-
Why 68% of mobile developers are prioritizing low-code development
By: HCL Software
Type: Infographic
Find out in this infographic the key challenges today’s organizations are facing when considering low-code development, and discover how your business can avoid the pitfalls to leverage low-code development for your innovation needs.
-
Are you prepared for the 5 low-code pitfalls?
By: HCL Software
Type: eBook
Discover in this e-book whether your development team might be susceptible to the most common low-code development pitfalls, and how your organization can seize on overlooked low-code opportunities.
-
3 paths to faster growth with low code development
By: ServiceNow
Type: White Paper
Low-code development platforms enable faster innovation and growth by expanding the developer pool. To learn more, read this paper on how low-code development can accelerate your digital transformation.
-
Third-party Vendor Comparison for Enterprise Low-Code Application Platforms 2023
By: ServiceNow
Type: Gartner Magic Quadrant
Read the complimentary 2023 Gartner® Magic Quadrant™ for Enterprise Low-Code Application Platforms for an unbiased, third-party evaluation of low code platform vendors.
-
Developer’s guide to secure coding
By: Veracode
Type: eBook
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
-
Mapping out your IAM strategy in Atlassian Cloud
By: Atlassian
Type: eBook
Discover in this e-book how you can extend your company-wide IAM policies and build a proactive defense strategy to protect your users and data in Atlassian Cloud.
-
Accelerate your automation goals with low-Code: Here's how
By: Reply
Type: Blog
Imagine a development approach that allows non-technical users to create, customize, and deploy software applications by using visual interfaces and templates, rather than traditional code. The Low-Code approach makes the process of app development faster and easier than ever before. Read on to learn more about this technology.
-
Insights and Intelligence: Atlassian’s Approach to ABM
By: TechTarget
Type: BrightTALK Webinar
To shine a light on Atlassian’s approach to ABM, three ABM professionals from the software company gathered for a discussion with TechTarget’s VP of Customer Enablement & Data Strategy. Tune into the webcast to unlock their insights.
-
QR code phishing on the rise: How to protect yourself
By: Cofense
Type: Blog
QR code phishing attacks are on the rise, exploiting the ubiquitous technology to steal data. Learn how to spot malicious QR codes, protect yourself, and train employees. Read on for details on real-world attacks and defense strategies. Learn more in this resource.
-
The application security solution checklist: What you need to know
By: HCL Software
Type: eBook
Download this e-book for your exclusive guide to procuring an application security testing partner, including gaining an understanding of use cases, critical technologies, and best practices.
-
How to spot a QR code phishing email
By: Cofense
Type: Blog
You can’t defend against QR code phishing emails unless you can identify them. So, how do you spot such an email? This blog by Senior Cyber Threat Intelligence Analyst at Cofense, Max Gannon, digs into the key characteristics of QR code phishing emails. Read on to unlock these insights and more.
-
Experts Answer Pressing PaaS Cloud Development Questions
By: TechTarget Business Analytics
Type: eGuide
As is the case with any “as a Service” application, before you embark on a Platform as a Service (PaaS) project, you must establish standards and strategies for how you plan to approach the implementation in order to be successful. This e-guide lays out expert tips for PaaS application development in the cloud.
-
Women Who Code: How women are redefining the programming world
By: TechTarget ComputerWeekly.com
Type: Landing Page
In this webinar, hear from women coders and leaders of software development teams about their career journeys and what it takes to encourage more women to take up coding.
-
How to protect your company's data in the cloud
By: Atlassian
Type: eBook
Managing data is challenging but critical. Atlassian details their cloud data protection across infrastructure, access management, compliance, and their Marketplace. Learn how Atlassian secures data and empowers organizations to meet complex regulatory requirements. Read the full eBook to ensure your data is safeguarded.
-
Low-Code Adoption Framework
By: Reply
Type: White Paper
With the rapid pace of digital change in today’s enterprises, if an organization does not have enough qualified talent to handle the workflows and constant change, then it’s time to take a different approach and consider the “citizen developer”. By adopting a low-code/no-code approach, businesses can keep up no matter what. Read on to see how.
-
Top 10 Backup Challenges and Expert Recommendations to Address Them
By: TechTarget Storage
Type: eGuide
Access this expert eGuide to learn about the backup challenges that companies struggle with today, and how to address them.
-
Next-generation DAST: Introducing interactive application security testing (IAST)
By: Contrast Security
Type: White Paper
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.
-
Urban Myths About Secure Coding
By: Veracode, Inc.
Type: eBook
Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.
-
Infographic: 5 essential open source cybersecurity tools for 2022
By: TechTarget ComputerWeekly.com
Type: Infographic
There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
-
Build a better webinar: Creating a promotion plan
By: BrightTALK by TechTarget
Type: eBook
To generate deep engagement and achieve strong ROI from your webinar strategy, it’s necessary to consider the promotional approach that will get your content in front of the right professionals and accounts. Access this e-book to learn more.
-
Leverage Abstraction to Limit Headless Commerce Tech Debt
By: Nacelle
Type: Blog
IT leaders know that avoiding technical debt is critical to business success. For organizations that run distributed systems like those in headless and composable commerce, they must leverage abstraction to avoid serious architectural pitfalls and limit their technical debt. Read on to learn more about this concept and improve your TCO.
-
Low-code app development explained in under 5 minutes
By: ServiceNow
Type: Video
How can you develop high-quality applications more quickly at your business? By adopting a low-code development approach, ServiceNow argues. To learn about a platform that can support low-code app development at your organization, watch this video.
-
A Zero Trust approach to securing your data in the cloud
By: Atlassian
Type: White Paper
Centralizing access management with strong authentication policies is crucial for cloud data security. Adopting a "zero trust" model by limiting user access and monitoring risks enhances protection. Implement this scalable framework to improve your security posture. For zero trust security guidance, read the full white paper.
-
4 tips for proactive code security
By: Palo Alto Networks
Type: White Paper
Noisy security alerts and productivity loss: These are two common challenges that can arise when organizations fail to prioritize proactive code security. To discover four tips for avoiding those obstacles, check out this white paper.
-
Computer Weekly – 19 November 2013: Software-defined networking explodes
By: TechTarget Security
Type: Ezine
In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.
-
GenAI in software development: The good & the bad
By: Sonatype
Type: Research Content
This Sonatype report, “The Risks & Rewards of Generative Al in Software Development,” details where developers and security teams differ and agree on GenAI. Dive into the report.
-
Take a strategic approach to IAM for Atlassian Cloud
By: Atlassian
Type: White Paper
Businesses must proactively address IAM for cloud apps to enable secure collaboration. This white paper explores extending enterprise IAM to Atlassian Cloud. With Atlassian Access, admins can enforce policies, manage users, and audit across products. Read the white paper to learn how global companies scaled IAM in the cloud.
-
Building a software factory with Red Hat OpenShift
By: Red Hat and Intel
Type: White Paper
This white paper provides an overview of using Red Hat OpenShift to build a software factory for accelerated software delivery. Read the paper here.
-
E-Book: Technical Guide on Web Application Firewalls
By: TechTarget Security
Type: eBook
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
-
Atlassian at a glance: Cloud vs Data Center
By: Atlassian
Type: Infographic
Explore in this infographic the feature and functional differences between Atlassian Cloud and Data Center products to find the right fit for you.
-
Computer Weekly – 22 August 2023: Can low code/no code ease developer skills shortages?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, with organisations increasingly turning to low-code/no-code tools to enable "citizen developers" among staff – we look at whether this can help to ease software developer skills shortages. Read the issue now.
-
Low-code development: What to expect in the future
By: ServiceNow and Softcat
Type: Blog
In the face of rapidly advancing AI, what does the future of low-code development hold? Check out this blog to unlock insights and to consider 5 major trends shaping low-code’s trajectory.
-
SIEM Best Practices for Advanced Attack Detection
By: TechTarget Security
Type: eGuide
The industry has panned SIEM as an expensive and under performing technology. But to be clear, it's not a technology problem, it's a process issue. In this tech tip, Securosis analyst Mike Rothman will outline a time tested process to build SIEM policies which actually alert on the attacks you need to protect against.
-
Providing a unified help experience with the “intelligent front door”
By: Atlassian
Type: Blog
Atlassian’s vision for a unified help experience is inspired by a rise in globally distributed teams, which has compelled organizations to rethink how they can provide 24/7 support to their customers and employees. Learn more about Atlassian’s efforts to construct the “intelligent front door” for today’s remote workforces in this blog.
-
A Computer Weekly buyer's guide to edge datacentres
By: TechTarget ComputerWeekly.com
Type: eBook
Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.