Minggu, 21 April 2019

Register and learn

DZone's Upcoming Webinars


May 1 - 1:00 PM EST

Inserting Business Logic Security Checks into DevOps Pipelines

Technical security vulnerabilities, such as SQL injections, cross-site scripting, etc. come from coding errors. However, business logic vulnerabilities are due to mistakes in how the application was intended to work. Since the code was written properly, business logic vulnerabilities cannot be detected using traditional source code analysis techniques. Historically, the only way to find business logic vulnerabilities in development was via manual source code reviews, which does not scale to the pace of modern DevOps driven release cycles.

Register

May 7 - 1:00 PM EST

How to Monitor the Performance of MySQL in the Cloud

When organizations deploy MySQL in the cloud, this creates challenges for database administrators. Typical concerns are determining the best database-specific settings, ensuring that databases are being correctly maintained without access to the full underlying infrastructure, configuring for high availability and disaster recovery, balancing performance and cost, and minimizing the learning curve.

Register

 

DZone's On-Demand Webinars


3 Steps to Monitoring in a Connected Enterprise

When your monitoring tools send you alerts, how do you tell if it's the signal or just the noise? Today's companies are monitoring all areas of their business, but they're having a difficult time leveraging all that data to prevent service outages and limit downtime.

Watch Now

The Secure DevOps Debate: Revolution or Evolution?

Watch this webinar to hear two experts engage in a spirited discussion around DevOps vs. other methodologies, problems created and solved by DevOps, integrating security into DevOps in a practical way, and the best practices for resilient software, regardless of what you call the process.

Watch Now

 

Tidak ada komentar:

Posting Komentar