How do you defend your software from threats creeping in at every step of the SDLC? In this DevOps State Amsterdam talk, we:
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
November 11, 2025 at 2:05 PM
Everybody can reply
Most AI teams are stuck between PoC and production.
At QCon AI NYC (Dec 16-17), practitioners share proven patterns for context engineering, SDLC transformation, evaluation frameworks, and scaling AI infrastructure.
Explore the full schedule: bit.ly/445fvNU
#QConAI
At QCon AI NYC (Dec 16-17), practitioners share proven patterns for context engineering, SDLC transformation, evaluation frameworks, and scaling AI infrastructure.
Explore the full schedule: bit.ly/445fvNU
#QConAI
November 11, 2025 at 1:19 PM
Everybody can reply
How do you defend your software from threats creeping in at every step of the SDLC? In this DevOps State Amsterdam talk, we:
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
November 11, 2025 at 12:05 PM
Everybody can reply
How do you defend your software from threats creeping in at every step of the SDLC? In this DevOps State Amsterdam talk, we:
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
November 11, 2025 at 10:04 AM
Everybody can reply
How do you defend your software from threats creeping in at every step of the SDLC? In this DevOps State Amsterdam talk, we:
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
November 11, 2025 at 8:02 AM
Everybody can reply
1 likes
D816. Lectures. We had an introduction to artificial intelligence today and a tutorial on data visualization. On Wednesday, I'll show them more code examples. And next week we do Recommendation Systems & SDLC. My office hours are packed now because of final grades 😅 End of the semester is stressful.
November 11, 2025 at 12:44 AM
Everybody can reply
1 likes
How do you defend your software from threats creeping in at every step of the SDLC? In this DevOps State Amsterdam talk, we:
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
November 10, 2025 at 4:07 PM
Everybody can reply
How do you defend your software from threats creeping in at every step of the SDLC? In this DevOps State Amsterdam talk, we:
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
- Map trust boundaries in your pipeline—from dev workstation to end user.
- Reveal how your dependency tree explodes into dozens of transitives, each a potential risk.
-
November 10, 2025 at 2:08 PM
Everybody can reply
Demystifying the Software Development Life Cycle (SDLC)! 🚀 From initial planning to final deployment and maintenance, understand every crucial step in building amazing software.
#SDLC #SoftwareDevelopment #TechLife #CodingJourney
#SDLC #SoftwareDevelopment #TechLife #CodingJourney
November 10, 2025 at 1:58 PM
Everybody can reply
1 likes
The Role of SLDC Gap Analysis in Reducing Development Risks
In the race to build and release software faster, many organizations unintentionally overlook one critical aspect: security and process integrity within the Software Development Life Cycle (SDLC). Every missed control or…
#hackernews #news
In the race to build and release software faster, many organizations unintentionally overlook one critical aspect: security and process integrity within the Software Development Life Cycle (SDLC). Every missed control or…
#hackernews #news
The Role of SLDC Gap Analysis in Reducing Development Risks
In the race to build and release software faster, many organizations unintentionally overlook one critical aspect: security and process integrity within the Software Development Life Cycle (SDLC). Every missed control or overlooked best practice in the SDLC can lead to significant risks from vulnerabilities and compliance failures to project delays and increased costs. To mitigate […]
securityboulevard.com
November 9, 2025 at 5:13 PM
Everybody can reply
1 reposts
1 likes
[some-subscribed-rss] New Post: What AI is used for in the SDLC - inner and outer loop watch, by https://cote.io/2025/11/07/what-ai-is-used-for.html
November 7, 2025 at 7:16 AM
Everybody can reply
AI in the SDLC Starts With Clarity, Not Tools.
Everyone talks about “AI in software delivery,” but few know where to start.
#hackernews #news
Everyone talks about “AI in software delivery,” but few know where to start.
#hackernews #news
AI in the SDLC Starts With Clarity, Not Tools.
Everyone talks about “AI in software delivery,” but few know where to start.
hackernoon.com
November 7, 2025 at 4:33 AM
Everybody can reply
1 reposts
AI in the SDLC Starts With Clarity, Not Tools.
Everyone talks about “AI in software delivery,” but few know where to start.
Telegram AI Digest
#ai #news
Everyone talks about “AI in software delivery,” but few know where to start.
Telegram AI Digest
#ai #news
AI in the SDLC Starts With Clarity, Not Tools.
Everyone talks about “AI in software delivery,” but few know where to start.
hackernoon.com
November 7, 2025 at 3:20 AM
Everybody can reply
1 reposts
The AI-Powered Developer: Your New Cybersecurity Secret Weapon or Your Next Greatest Vulnerability?
Introduction: The integration of Artificial Intelligence into the software development lifecycle (SDLC) is no longer a futuristic concept but a present-day reality. AI-powered coding assistants like…
Introduction: The integration of Artificial Intelligence into the software development lifecycle (SDLC) is no longer a futuristic concept but a present-day reality. AI-powered coding assistants like…
The AI-Powered Developer: Your New Cybersecurity Secret Weapon or Your Next Greatest Vulnerability?
Introduction: The integration of Artificial Intelligence into the software development lifecycle (SDLC) is no longer a futuristic concept but a present-day reality. AI-powered coding assistants like GitHub Copilot and Amazon CodeWhisperer are revolutionizing how code is written, promising unparalleled productivity. However, this new paradigm introduces a critical vector for security vulnerabilities, as developers may blindly trust AI-generated code without understanding the underlying security implications.
undercodetesting.com
November 6, 2025 at 7:16 AM
Everybody can reply
The OWASP AppSec Deep Dive: Your Blueprint for SDLC Security Domination
Introduction: The modern software development lifecycle (SDLC) is the new front line in cybersecurity. With high-profile talks at events like OWASP Global AppSec highlighting critical gaps in Software Composition Analysis…
Introduction: The modern software development lifecycle (SDLC) is the new front line in cybersecurity. With high-profile talks at events like OWASP Global AppSec highlighting critical gaps in Software Composition Analysis…
The OWASP AppSec Deep Dive: Your Blueprint for SDLC Security Domination
Introduction: The modern software development lifecycle (SDLC) is the new front line in cybersecurity. With high-profile talks at events like OWASP Global AppSec highlighting critical gaps in Software Composition Analysis (SCA), SAST implementation, and software supply chain security, organizations must move beyond reactive measures. This article provides a technical blueprint for building a proactive, hardened security posture directly into your development pipelines.
undercodetesting.com
November 6, 2025 at 2:38 AM
Everybody can reply
Episode 0201 - Council Data Breach Hundreds of Residents' Details Shared
YouTube video by TheSocialCredit
youtu.be
November 5, 2025 at 9:04 PM
Everybody can reply
1 likes
#Cybersecurity Tip:
Build security into the #Software Development Life Cycle (SDLC) from day one. Require developers to run an ongoing security testing plan (unit, integration, system, regression), capture evidence, and fix flaws fast. Tailor test depth to #risk and document outcomes.
Build security into the #Software Development Life Cycle (SDLC) from day one. Require developers to run an ongoing security testing plan (unit, integration, system, regression), capture evidence, and fix flaws fast. Tailor test depth to #risk and document outcomes.
November 5, 2025 at 6:06 PM
Everybody can reply
5 likes
There is a common agreement in the industry that new best practices for coding and software engineering are emerging as a result of adopting AI to accelerate the SDLC.
#ai #development
dev.to/eabait/how-a...
#ai #development
dev.to/eabait/how-a...
How AI Coding Agents Are Reshaping Developer Workflows
By Esteban S. Abait — November 2025 The following article is what I would call the summarization of...
dev.to
November 5, 2025 at 2:46 PM
Everybody can reply
1 likes
Implementasi CI/CD dan Containerization untuk Portabilitas Aplikasi Dalam siklus Systems development life cycle (SDLC), salah satu tantangan paling persisten adalah “environmental inconsistency” perbedaan… Continue reading on Medium »
Interest | Match | Feed
Interest | Match | Feed
Origin
medium.com
November 5, 2025 at 4:50 AM
Everybody can reply
Implementasi CI/CD dan Containerization untuk Portabilitas Aplikasi Dalam siklus Systems development life cycle (SDLC), salah satu tantangan paling persisten adalah “environmental inconsistency...
#containerization #linux #windows #docker #github
Origin | Interest | Match
#containerization #linux #windows #docker #github
Origin | Interest | Match
Implementasi CI/CD dan Containerization untuk Portabilitas Aplikasi
Dalam siklus Systems development life cycle (SDLC), salah satu tantangan paling persisten adalah “environmental inconsistency” perbedaan…
medium.com
November 5, 2025 at 4:50 AM
Everybody can reply
1 likes
It has taken forever for me to get Linux permissions right with AI agents with both new and existing files and directories across the entire SDLC I’ve got implemented. Each time I think I have it right the next time I run my scripts to create a new project something else doesn’t have permission.
November 4, 2025 at 2:20 PM
Everybody can reply
being poor is so expensive (sometimes jsut in time tho) like... i wanna be working on my project but i'm working on getting test runners working locally and tests for the test runners and the other infra fjadsklfadsklfsd so i can keep working on my main project w/good SDLC
but if had money? github
but if had money? github
November 4, 2025 at 7:28 AM
Everybody can reply
5 likes