SecureCI 2013 Q4 Release

Introduction Quarter 4 for Coveros has been action packed for SecureCI™. We performed several major updates to our SecureCI™ version, bringing the software tools up to date, and making them more user and out-of-the-box friendly. For those unaware, SecureCI™ is an integrated stack of tools that provides version control, wiki, project/issue management, and code analysis […]

Read more
Force Mounting Drives in Cloud Formation on Windows

I’ve been doing a lot of AWS, EC2, Cloud Formation, Chef, and Windows lately. In particular, we’re building a Continuous Delivery pipeline that launches groups of machines to build up application stacks. I have a situation where I need to build Microsoft SQL Server machines in the Amazon EC2 cloud environment. In particular, the operations […]

Read more
What is Chef and why should I be using it?

Chef is a open source configuration and software integration framework that many organizations are actively investing in to simplify their operations.  Here at Coveros, we are using Chef to provision new instances of SecureCI. In many traditional organizations there is a natural division between our system administrators who are responsible for setting up servers and […]

Read more
Coveros releases new version of SecureCI™

SecureCI™, the industry’s first and only open-source continuous integration solution, just got better! Fairfax, VA., November 18, 2013 —  Coveros, the market leader in the delivery of secure, reliable software, announced today availability of the newest version of SecureCI™ which includes updated and integrated versions of best in class open source products for source code […]

Read more
Selectively Deploying Files from a Subversion Repository

During a recent project I needed to modify user interface (UI) files in a Subversion repository and then deploy them to a Tomcat server.  At first I recursively copied all of the files using a batch script, but because of the size of the repository this could take anywhere from 10 to 15 seconds.  That […]

Read more
Using Components with Known Vulnerabilities

One of the items on the 2013 OWASP Top Ten is “Using Components with Known Vulnerabilities.” It is new on this year’s list, debuting at number 9. OWASP lists at as being widespread and difficult to detect. The issue is that modern software is made up of dozens, if not hundreds, of third-party components. Even […]

Read more
Sharepoint Property bags

SharePoint Property Bag allows to store configurations settings at different levels of the SharePoint hierarchy outside of the application itself. Property bag is basically a hash table of key-value pair options. Property bag feature is available in Windows SharePoint services 3.0, SharePoint 2010 and SharePoint 2013. Property bag helps you to store meta data as key-value […]

Read more
Coping with Long Feedback Loops during Software Development

I recently had the opportunity to work on a software development project as part of a 300 person team.  On this team there were two types of developers: user interface (UI) developers and service developers.  In order to evaluate the effect of a code change, UI developers needed to deploy their modified JavaScript files to […]

Read more
X