Application Architecture Summit is a multi-vendor online event where experts explore application platforms, frameworks and tools for low-hassle and light-speed app development, testing, delivery and security.
 
Topics to include:
 
       - APIs & Microservices To Fuel Innovation
Today's apps increasingly rely on APIs and microservices for agile access to data, security, and 100s of innovative cloud-based servicers. Learn 2020’s best practices for using and managing APIs.
 
        - Low-Code Development for Fast Omnichannel Apps
Best ways to use low-code, no-code model-driven platforms to design and deliver apps quickly and easily. Build once, use across mobile, tablet and web.
 
- RPA and Automated Process Flows
Streamline complex processes with robotic process automation and visual UIs. Build end-to-end process-es & apps across legacy, on-prem and cloud.
 
- Kubernetes, Containers and Serverless
Many companies are embrac-ing cloud-native architectures. Explore how F2000s leverage these along-side valuable legacy apps, data and other assets.
 
- Enterprise-Class DevOps is Here
Align developers and IT ops. Speed the new agile app lifecycle - from design, test, launch, orchestrate & management.
 

- AI, Machine Learning for Smarter, Stickier Apps 

Hora

18:00 - 19:00 hs GMT+1

Organizador

Application Architecture Summit
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 772 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020