29 minute read
News Watch
by d2emerge
NEWSNEWS WATCHWATCH
Postman updates its API platform
The new and improved features include deeper integration with version control systems, all-new private API networks which provides a central directory of all internal APIs in an organization, and simplified API documentation and onboarding.
The new version of the platform also includes a new enterprise governance feature in which team members with the Community Manager role can now view all public collection links created by all team members in one place, with the ability to see who created which link and remove any links to collections that are not for public viewing.
Developers can now bring together key components with the definition of APIs including source code management, CI/CD, API gateways, and APM to help govern the entire API landscape, according to Postman.
Microsoft allows alternatives to passwords
Microsoft today announced that users of Outlook, OneDrive, Family Safety, and more can now opt out of using passwords and choose alternative authentication methods, predicting that “the future is passwordless. ”
This comes after the company announced that passwordless sign-in was generally available for commercial users, bringing the feature to enterprise organizations around the world.
Some of the alternative authentication methods that Microsoft now offers include Microsoft Authenticator app, Windows Hello, a security key, or a verification code sent to your phone or email.
Microsoft software users can now visit account .microsoft.com, sign in, and choose Advanced Security Options. Under “Additional Security, ” you’ll see “Passwordless Account. ” Select ‘Turn on. ’
Java 17 released with updates to LTS schedule
The latest release of Java is now available. Java 17 is a long-term support (LTS) release, the last of which was Java 11. According to Oracle, over 70 JDK Enhancement Proposals (JEPs) have been added to the language since Java 11.
With this LTS release, Oracle is also working to enhance support for customers. It worked with the developer community to improve LTS scheduling to give companies more flexibility on when to migrate to a new LTS version. The next LTS release will be Java 21 in September 2023, and this would change the LTS release cadence from three to two years.
In order to make it easier to access, Oracle has made changes to the Java license. Java 17 and subsequent Java release will be provided under a free-to-use license until a year after the next LTS release. The company will continue to provide OpenJDK releases under the GPL as well.
Another main focus of this release is accelerating Java adoption in cloud settings. Recently, the company introduced Java Management Service, which is an Oracle Cloud Infrastructure (OCI) service for managing Java runtimes and applications. According to the company, it provides visibility over Java deployments, highlights unplanned Java applications, and checks that the latest security patches have been applied.
Along with Java 17’s release, Oracle is updating Java Management Service with new language enhancements, library updates, support for Apple M1 Silicon, and removal and deprecation of legacy features.
Other enhancements in Java 17 include a macOS/AArch64 port, a new macOS rendering pipeline, sealed classes, and more.
Broken Access Control tops OWASP 2021 list
Broken Access Control has dethroned Injection as the top vulnerability in the OWASP 2021 list, whereas it previously held fifth place. The 34 Common Weakness Enumerations (CWEs) mapped to Broken Access Control had more occurrences in applications than any other category, according to the OWASP Top 10 2021.
Cryptographic Failures (which was previously known as Sensitive Data Exposure) moved up from third to second place. The renewed focus here is on failures related to cryptography which often leads to sensitive data exposure or system compromise.
Injection slid down to third, with Cross-site Scripting now qualifying as part of this category.
New categories of vulnerabilities this year included Insecure Design, Software and Data Integrity Failures, and Server-Side Request Forgery.
CodeSignal announces new IDE for dev hiring
CodeSignal, a technical recruiting company, announced today new advanced hiring assessment capabilities. The release features the new IDE designed to test candidates’ technical skills with real-world assessments.
With the new IDE, candi-
dates will have the opportunity to interact with code, files, a terminal, and a preview of their application. This allows them to experience the hiring process much like they would experience the actual job, providing a more familiar work environment and a similar experience to coding on local machines. According to CodeSignal, this better allows candidates to showcase their full skill set in a work-like environment, thus making the hiring process more efficient for both the applicant and the employer.
CodeSignal’s new IDE is also completely customizable, allowing employers and recruiters to set their own threshold for qualifications while creating unique assessments with comprehensive testing options for each open position. These upgrades were made possible by a $50 million Series C funding led by Index Ventures. This influx of funding brings CodeSignal’s total fund to $87.5 million.
New release of Tableau improves data prep
Tableau 2021.3 includes better ways to prepare and manage data, explore data through Tableau Server or Online site before sharing with others, and new custom sample workbooks.
Improvements to Tableau Prep include linked tasks, which will allow users to automate multiple flow jobs and ensure they happen in the right order, and the ability to generate missing rows based on dates, date times, or integers to fill in gaps in data.
Tableau Catalog updates include data quality warnings in subscription emails and the ability to see inherited descriptions within web authoring flows.
Tableau 2021.3 also introduces Personal Space, which allows users to stage content before sharing with others. “
Governance and security updates in Tableau 2021.3 include centralized row-level security and a new content type called virtual connections that allow users to create tables through a governed database connection, embed service account credentials, and extract data from data tables to reuse within Tableau Server and Tableau Online.
Another new addition is an improved integration with Slack to enable Tableau notifications directly through Slack. Users can be notified through Slack when a specific data threshold is triggered.
Elastic updates Stack, Cloud
Elastic has recently announced new capabilities and updates to the Elastic Stack and Elastic Cloud. The upgrades focus on simplifying data management and onboarding, as well as enabling users to achieve faster data insights.
Among the upgrades featured is native Google Cloud data source integration with Google Cloud Dataflow. This provides users with faster data ingestion in Elastic Cloud as well as a simplified data architecture. This integration allows users to easily and securely ingest Pub/Sub, Big Query, and Cloud Storage data into their Elastic Cloud deployments.
In addition, there have also been updates to Elasticsearch and Kibana that include: enhancements to runtime fields which gives users a new way to explore their data with the flexibility of schema on read and schema on write.
TypeScript 4.4 brings control flow analysis
Control flow analysis is available for aliased conditions and discriminants and it checks to see if a type guard has been used before a particular piece of code.
Another new feature is index signatures for symbol and template string patterns. Index signatures are used to describe objects that have properties which must use a certain type, but until now they could only be used on string and number keys.
Also, in TypeScript 4.4, the “unknown” type will be the default for catching variables. According to Microsoft, in JavaScript any type of value can be thrown and then caught in a catch clause, and in the past, TypeScript typed catch clause variables as “any, ” but once it added the “unknown” type, it realized it was a better choice than “any” for catch clauses. This release introduces a new flag called –useUnknownInCatchVariables that changes the default type to “unknown” from “any. ”
TypeScript 4.4 also added support for static blocks in classes, which is an upcoming ECMAScript feature. Static blocks can be used to write a sequence of statements with their own scope that are able to access private fields within a containing class. This allows developers to write more complex initialization code with the capabilities of writing statements, full access to a class’ internals, and not have to worry about leakage of variables.
The ‘ –help’ option has also been updated in this release with changes to descriptions of compiler options and updated colors and other visual separation.z
People on the move
n Kyndryl, the managed infrastructure services business spun off from IBM, has appointed Harsh Chugh as its new chief operating officer. Chugh comes with over 20 years of experience in engineering, management consulting, finance, and operations. Previously he was the chief financial officer of PlanSource, where he led several modernization efforts.
n Kit Colbert is being promoted to chief technology officer at VMware. He joined the company back in 2003 and led the creation of vMotion and Storage vMotion in VMware vSphere. At VMware he has held roles including Cloud CTO, general manager of VMware’s Cloud-Native Apps business, CTO of VMware’s end-user computing business, and lead architect of the VMware vRealize Operations Suite.
n CloudBees has announced that Dinesh Keswani will be taking on the role of the company’s chief technology officer. Previously, he worked at HSBC as CTO and before that held roles as vice president of engineering and information systems at GoDaddy and director of eCommerce, SaaS, and API platforms at Intuit.
Developers are gaining as it becomes more
BY JAKUB LEWKOWICZ
The edge is growing, and cloud providers know it. That’ s why they ’ re creating more tools to help with embedded programming.
According to IDC’ s research, edge computing is growing, with 73% of companies in 2021 saying that computing is a strategic initiative for them and they are already making investments to adopt it. Last year, especially, saw a lot of that growth, according to Dave McCarthy, the research vice president of Cloud and Edge Infrastructure Services at IDC.
Major cloud providers have already realized the potential for the technology and are adding edge capabilities to their toolkit, which now change the way developers can build for that technology.
“AWS was trying to ignore what was happening in the on-premises and edge world thinking that everything would go to the cloud, ” McCarthy said. “So they finally kind of realized that in some cases, cloud technologies, the cloud mindset, I think works in a lot of different places, but the location of where those resources are has to change. ”
For example, in December 2020, AWS came out with AWS Wavelength, which is a service that enables users to deliver ultra-low latency applications for 5G devices. In a way, AWS is embedding some of their cloud platform inside of telco networks such as Verizon, McCarthy explained.
Also, last year, AWS rewrote Greengrass, an open-source edge runtime, to be more friendly to cloud-native types of environments. Meanwhile, Microsoft is doing the same with its own IoT platform.
“This distribution of infrastructure is becoming more and more relevant. And the good news for developers is it gives them so much more flexibility than they had in the past; flexibility about saying, I don ’t have to compromise anymore because my cloud native kind of development strategy is limited to certain deployment locations. I can go all-in on cloud native, but now I have that freedom to deploy anywhere, ” McCarthy said.
Development for these types of devices has also significantly changed since its early stages.
At first, the world of embedded systems was that intelligent devices gathered info on the world. Then, AI was introduced and all of that data that was acquired began being processed in the cloud. Now, the world of edge computing is about moving real-time analysis to happen at the edge.
“Where edge computing came in was to marry the two worlds of IoT and AI or just this intelligence system concept in general, but to do it completely autonomously in these locations, ” McCarthy said. “Not only were you collecting that data, but you had the ability to understand it and take action, all within that sort of edge location. That opened the door to so many more things. ”
In the early days of the embedded software world, everything seemed very unique, which required specialized frameworks and a firm understanding of how to develop for embedded operating systems. That has now changed with the adoption of standardized development platforms, according to McCarthy.
Support for edge deployments
A lot more support for deployments at the edge can now be seen in cloud native and containerbased applications.
“The fact that the industry, in general, has started to align around Kubernetes as being the main orchestration platform for being able to do this just means that now it’ s easier for developers to think about building applications using that microservices mindset, they ’ re putting that code in containers with the ability to place those out at the edge, ” McCarthy said. “Before, if you were an embedded developer, you had to have this specialized skill set. Now, this is becoming more available to a wider set of developers that maybe didn ’t have that background. ”
< continued from page 7
Some of the more traditional enterprise environments, like VMware or Red Hat, also have been looking at how to extend their platforms to the edge. Their strategy, however, has been to take their existing products and figure out how to make them more edgefriendly.
In many cases, that means being able to support smaller configurations, being able to handle situations where the edge environment might be disconnected.
This is different from the approach of a company like SUSE, which has a strategy to create some edge-specific things, according to McCarthy. When you look at SUSE’ s Enterprise Linux, you know, they have created a micro version that’ s specifically designed for the edge.
“These are two different ways of tackling the same problem, ” McCarthy said. “Either way, I think they ’ re both trying to attack this from that perspective of let’ s create standardization with familiar tools so that developers don ’t have to relearn how to do things. In some respects, what you ’ re doing is abstracting some of the complexity of what might be at the edge, but give them that flexibility of deployment. ”
This standardization has proven essential because the further you move towards the edge, there is greater diversity in hardware types. Depending on the type of sensors being dealt with, there can be issues with communication protocols and data formats.
This happens especially in vertical industries such as manufacturing that already have legacy technology that needs to be brought into this new world, McCarthy said. However, this level of uniqueness is becoming rarer than before with less on the unique side and more being standardized.
Development requirements differ
Developing for the edge is different than for other form factors because edge devices have a longer lifespan than things that can be found in a data center, something that’ s always been true in the embedded world. Developers now have to think about the longer lifespan of both the hardware and the software that sits on top of it.
At the same time, though, the fast pace of today ’ s development world has driven the demand to deliver new features and functionalities faster, even for these devices, according to McCarthy.
That’ s why the edge space has seen the prevalence of device management capabilities offered by cloud providers that give enterprises information about whether they can turn off that device, update the firmware of that device, or change configurations.
In addition to elucidating the life cycle, device management also helps out with security, because it offers guidance on what data to pull back to a centralized location versus what can potentially be left out on the edge.
“This is so you can get a little bit more of that agility that you ’ ve seen in the cloud, and try to bring it to the edge, ” McCarthy said. “It will never be the same, but it’ s getting closer. ”
Decentralization a challenge
Developing for the edge still faces challenges due to its decentralization nature, which requires more monitoring and control than a traditional centralized computing model would need, according to Mrudul Shah, the CTO of Technostacks, a mobile app development company in the United States and India. Connectivity issues can cause major
Companies are seeing benefits in moving to the edge
Infinity Dish
Infinity Dish, which offers satellite television packages, has adopted edge computing in the wake of the transition to the remote workplace.
“We’ve found that edge computing offers comparable results to the cloud-based solutions we were using previously, but with some added benefits, ” said Laura Fuentes, operator of Infinity Dish. “In general, we’ve seen improved response times and latency during data processing. ”
Further, by processing data on a local device, Fuentes added that the company doesn’t need to worry nearly as much when it comes to data leaks and breaches as it did using cloud solutions.
Lastly, the transmission costs were substantially less than they would be otherwise.
However, Fuentes noted that there were some challenges with the adoption of edge.
On the flip side, we have noticed some geographic discrepancies when attempting to process data. Additionally, we had to put down a lot of capital to get our edge systems up and running — a challenge not all businesses will have the means to solve, ” Fuentes said.
Memento Memorabilia
Kane Swerner, the CEO and co-founder of Memento Memorabilia, said that as her company began implementing edge throughout the organization, hurdles and opportunities began to emerge.
Memento Memorabilia is a company that offers private signing sessions to guarantee authentic memorabilia from musicians, celebrities, actors, and athletes to fans.
“We can simply target desired areas by collaborating with local edge data centers without engaging in costly infrastructure development, ” Swerner said. “To top it all off, edge computing enables industrial and enterpriselevel companies to optimize operating efficiency, improve performance and safety, automate all core business operations, and guarantee availability most of the time. ” However, she said that one significant worry regarding IoT edge computing devices is that they might be exploited as an entrance point for hackers. Malware or other breaches can infiltrate the whole network via a single weak spot. z
setbacks on operations, and often the data that is processed at the edge is not discarded, which causes unnecessary data stuffing, Shah added.
The demand for application use cases at these different edge environments is certainly extending the need for developers to consider the requirements in that environment for that particular vertical industry, according to Michele Pelino, a principal analyst at Forrester.
Also, the industry has had a lot of device fragmentation, so there is going to be a wide range of vendors that say they can help out with one ’ s edge requirements.
“You need to be sure you know what your requirements are first, so that you can really have an apples to apples conversation because they are going to be each of those vendor categories that are going to come from their own areas of expertise to say, ‘ of course, we can answer your question, ’ but they may not be what you need, ” Pelino said.
Currently, for most enterprise use cases for edge computing, commodity hardware and software will suffice. When sampling rates are measured in milliseconds or slower, the norms are low-power CPUs, consumer-grade memory and storage, and familiar operating systems like Linux and Windows, according to Brian Gilmore, the director of IoT Product Management at InfluxData, an open-source time series database.
The analytics here are applied to data and events measured in human time, not scientific time, and vendors building for the enterprise edge are likely able to adapt applications and architectures built for desktops and servers to this new form factor.
“Any developer building for the edge needs to evaluate which of these edge models to support in their applications. This is especially important when it comes to time series data, analytics, and machine learning, ” Gilmore said. “Edge autonomy, informed by centralized — currently in the cloud — evaluation and coordination, and right-place right-time task execution in the edge, cloud, or somewhere in between, is a challenge that we, as developers of data analytics infrastructure and applications, take head on. ”
No two edge deployments the same
An edge architecture deployment asks for comprehensive monitoring, critical planning, and strategy as no two edge deployments are the same. It is next to impossible to get IT staff to a physical edge site, so deployments should be critically designed as a remote configuration to provide resilience, fault tolerance and self-healing capabilities, Technostacks ’ Shah explained.
In general, a lot of the requirements that developers need to account for will depend on the environment that edge use case is being developed for, according to Forrester ’ s Pelino.
“It’ s not that everybody is going in one specific direction when it comes to this. So you sort of have to think about the individual enterprise requirements for these edge use cases and applications with their developer approach, and sort of what makes sense, ” Pelino said.
To get started with their edge strategy, organizations need to first make sure that they have their foundation in place, usually starting with their infrastructure, IDC’ s McCarthy explained.
“So it means making sure that you have the ability to place applications where you need so that you have the management and control planes to address the hardware, the data, and the applications, ” McCarthy explained.
Companies also need to layer that framework for future expansion as the technology becomes even more prevalent.
“Start with the use cases that you need to address for analytics, for insight for different kinds of applications, where those environments need to be connected and enabled, and then say ok, these are the types of edge requirements I have in my organization, ” Forrester ’ s Pelino said. “Then you can speak to your vendor ecosystem about do I have the right security, analytics, and developer capabilities in-house, or do I need some additional help?”
When adopted correctly, edge environments can provide many benefits.
Low latency is one of the key benefits of computing at the edge, along with the ability to do AI and ML analytics in different locations which might have not been possible before, which can save cost by not sending everything to the cloud.
At the edge, data collection speeds can approach near-continuous analog to digital signal conversion outputs of millions of values per second, and maintaining that precision is key to many advanced use cases in signal processing and anomaly detection. In theory, this requires specific hardware and software considerations — FPGA, ASIC, DSP, and other custom processors, highly accurate internal clocks, hyper-fast memory, real-time operating systems, and low-level programming which eliminates internal latency, InfluxData ’ s Gilmore explained.
Despite popular opinion, the edge is beneficial for security
Security has come up as a key challenge for edge adoption because there are more connected assets that contain data, and there is also an added physical component for those devices to get hacked. But, it can also improve security.
“You see people are concerned about the fact that you ’ re increasing the attack surface, and there ’ s all of this chance for somebody to insert malware into the device. And unfortunately, we ’ ve seen examples of this in the news where devices have been compromised. But, there ’ s another side of that story, ” IDC’ s McCarthy said. “If you look at people who are concerned about data sovereignty, like having more control about where data lives and limiting the movement of data, there is another storyline here about the fact that edge actually helps security. ”
Security comes into play at many different levels of the edge environment. It is necessary at the point of connecting the device to the network, at the data insight analytics piece in terms of ensuring who gets access to it, and security of the device itself, Forrester ’ s
4 critical markers for success at the edge
A recent report by Wind River, a company that provides software for intelligent connected systems, found that there are four critical markers for successful intelligent systems: true
compute on the edge, a common workflow platform, AI/ML capabilities, and ecosystems of real-time applications.
The report “13 Characteristics of an Intelligent Systems Future” surveyed technology executives across various mission-critical industries and revealed the 13 requirements of the intelligent systems world for which industry leaders must prepare. The research found that 80% of these technology leaders desire intelligent systems success in the next five years.
True compute at the edge, by far the largest of the characteristics of the survey at 25.5% of the total share, is the ability of devices to fully function in near-latency-free mode on the farthest edge of the cloud, for example, a 5G network, an autonomous vehicle, or a highly remote sensor in a factory system.
The report stated that by 2030, $7 trillion of the U.S. economy will be driven by the machine economy, in which systems and business models increasingly engage in unlocking the power of data and new technology platforms. Intelligent systems are helping to drive the machine economy and more fully realize IoT, according to the report.
Sixty-two percent of technology leaders are putting into place strategies to move to an intelligent systems future, and 16% are already committed, investing, and performing strongly. It’s estimated that this 16% could realize at least four times higher ROI than their peers who are equally committed but not organized for success in the same way.
The report also found that the two main challenges for adopting an intelligent systems infrastructure are a lack of skills in this field and security concerns.
“So when we did the simulation work with about 500 executives, and said, look, here are the characteristics, play with them, we got like 4000 plus simulations, things like common workflow platform, having an ecosystem for applications that matter, were really important parts of trying to break that lack of skill or lack of human resource in this journey, ” said Michael Gale, Chief Marketing Officer at Wind River.
For some industries, the move to edge is essential for digital transformation, Gale added.
“Digital Transformation was an easy construct in finance, retail services business. It’s really difficult to understand in industrial because you don’t really have to have a lot of humans to be part of it. It’s a machine-based environment, ” Gale said. “I think it's a realization intelligence systems model is the transformation moment for the industrial sector. If you’re going to have a full lifecycle intelligence systems business, you’re going to be a leader. If you’re still trying to do old things, and wrap them with intelligent systems, you’re not going to succeed, you have to undergo this full transformational workflow. ” z
< continued from page 9 Pelino explained.
Also, these devices are now operating in global ecosystems, so organizations need to determine if they match the regulatory requirements of that area.
Security capabilities to address many of these concerns are now coming from the different cloud providers, and also chipset manufacturers offer different levels of security to their components.
In edge computing, any data traversing the network back to the cloud or data center can also be secured through encryption against malicious attacks, Technostacks ’ Shah added.
What constitutes edge is now expanding
The edge computing field, in general, is now expanding to fields such as autonomous driving, real-time insight into what’ s going on in a plant or a manufacturing environment, or even what’ s happening with particular critical systems in buildings or different spaces such as transportation or logistics, according to Pelino. It is growing in any business that has a real-time need or has distributed operations.
“When it comes to the more distributed operations, you see a lot happening in retail. If you think about typical physical retailers that are trying to close that gap between the commerce world, they have so much technology now being inserted into those environments, whether it’ s just the point of sale system, and digital signage, and inventory tracking, ” IDC’ s McCarthy said.
The edge is being applied to new use cases as well.
For example, Auterion builds drones that they can then give to fire services. Whenever there ’ s a fire, the drone immediately shoots and sends back footage of what is happening in that area before the fire department gets there and says what kind of fire to prepare for and to be able to scan whether there are any people in there. Another new edge use case is the unmanned Boeing MQ-25 aircraft that can connect with a fighter at over 500 miles per hour autonomously.
“While edge is getting a lot of attention it is still not a replacement for cloud or other computing models, it’ s really a complement, ” McCarthy said. “The more that you can distribute some of these applications and the infrastructure underneath, it just enables you to do things that maybe you were constrained on before. ”
Also, with remote work on the rise and the aggressive acceleration of businesses leveraging digital services, edge computing is imperative for a cheaper and reliable data processing architecture, according to Technostacks ’ Shah. z
With technology’s ongoing expansion
into the cloud and the edge, even as applications themselves grow in complexity, the needs of organizations that rely on software to power their businesses evolve and grow as well.
As we’ve been reporting in SD Times all year, security and governance are two areas in which a lot of time and money are being invested, and developers are increasingly asked to take on a larger role in the
development
life cycle. This year’s list of companies to watch reflect
those changes in the industry, as startups find gaps
to
fill and established companies pivot to areas of greater need.
Here’s the list of companies to keep an eye on in 2022.
APIsec
WHAT THEY DO: API security WHY WE’RE WATCHING: APIsec provides a fully automated API security testing platform, giving DevOps and Security teams continuous visibility and complete coverage for APIs. APIsec automates API testing, provides complete coverage of every endpoint and attack vector, and enables continuous visibility.
Cribl
WHAT THEY DO: Observability data collection and routing WHY WE’RE WATCHING: Cribl’s LogStream delivers a flexible solution to enable customers to choose what data they want to keep, in what format, in which data store — and the assurance that they can also choose to delay any or all of those decisions with a complete copy in very low cost storage.
Curiosity Software
WHAT THEY DO: Testing WHY WE’RE WATCHING: With its mantra of “Don’t trap business logic in a testing tool, ” Curiosity offers an open testing platform, and is creating a “traceability lab” that links technologies across the whole SDLC. If something changes in one place, the impact of this change should be identified across requirements, tests, data, and beyond.
Komodor
WHAT THEY DO: Kubernetes troubleshooting WHY WE’RE WATCHING: After raising $25 million, the company is positioning its platform as the single source of truth for understanding Kubernetes applications, whereas extant observability solutions tend to take an ops-centric view of things.
Lightstep
WHAT THEY DO: DevOps observability WHY WE’RE WATCHING: With a new beginning under the ServiceNow umbrella (it acquired Lightstep earlier this year), the company’s ex-Googlers built Change Intelligence software to enable any developer, operator or SRE to understand changes in their services’ health and what caused those changes. This, the company says, will deliver on the promise of AIOps — to automate the process of investigation changes within complex systems.
Mabl
WHAT THEY DO: Automated end-to-end testing WHY WE’RE WATCHING: Mabl is a low-code, intelligent test automation platform. Agile teams use mabl’s SaaS platform for automated end-to-end testing that integrates directly into the entire development life cycle. Its low-code UI makes it easy to create, execute, and maintain software tests. The company’s native auto-heal capability evolves tests with your changing UI, and comprehensive test results help users quickly resolve bugs before they reach production.
Push Technology
WHAT THEY DO: Intelligent event data platform WHY WE’RE WATCHING: Winners of 12 industry awards in 12 months, the company’s 6.7 release of its Diffusion platform raises the bar for messaging and event brokers.
Rezilion
WHAT THEY DO: Autonomous DevSecOps WHY WE’RE WATCHING: With $30 million in September Series A funding in its coffers, Rezilion will build out its Validate vulnerability platform based on the company’s Trust in Motion philosophy, and the company expects to add new solutions that help autonomously mitigate risk, patch detected vulnerabilities and dynamically manage attack surfaces.
Rookout
WHAT THEY DO: Live debugging WHY WE’RE WATCHING: The company this year launched its X-Ray Vision feature for debugging third-party code and of Agile Flame Graphs to profile distributed applications in production, its integration with Open Tracing, and its introduction of Live Logger. And, CTO Liran Haimovitch’s podcast “The ProductionFirst Mindset” is wildly popular.
Spin Technology
WHAT THEY DO: Application security and ransomware protection WHY WE’RE WATCHING: Spin Technology was highlighted as a Top 5 Online SaaS Backup Solutions for the Microsoft Office 365 ecosystem by the Data Center Infrastructure Group. Spin uses artificial intelligence to improve threat intelligence, prevention, prediction, and protection. It can also enable faster ransomware attack detection and response, as well as automate backup and recovery, while reducing the need for human cybersecurity experts and leading to time and effort savings for enterprise organizations.
Spectral
WHAT THEY DO: Code security WHY WE’RE WATCHING: Spectral’s platform helps developers ensure their code is secure by integrating with CI tools, by enabling their pre-commit tool to automate early issue detection, and by scanning during static builds with plugins for JAMStack, Webpack, Gatsby, Netlify and more.
Swimm
WHAT THEY DO: Code documentation WHY WE’RE WATCHING: Onboarding, outdated documentation and project switching all slow developers down. By syncing documentation with code, Swimm enables developers to get up to speed more quickly on the projects they’re assigned to.
Unqork
WHAT THEY DO: No-code platform WHY WE’RE WATCHING: Enterprisegrade no-code application platforms such as Unqork have radically expanded the scope and capabilities of no-code. These platforms empower large organizations to rapidly develop and effectively manage sophisticated, scalable solutions without writing a single line of code. Unqork late last year raised $207 million in funding, bringing the company’s valuation to $2 billion. z