{"id":1821,"date":"2021-04-10T22:59:39","date_gmt":"2021-04-10T22:59:39","guid":{"rendered":"https:\/\/coldstreams.com\/appinventor\/?p=1821"},"modified":"2021-04-10T23:00:44","modified_gmt":"2021-04-10T23:00:44","slug":"2-3rds-of-programming-projects-expected-to-use-low-code-tools-by-2025","status":"publish","type":"post","link":"https:\/\/coldstreams.com\/appinventor\/2021\/04\/10\/2-3rds-of-programming-projects-expected-to-use-low-code-tools-by-2025\/","title":{"rendered":"2\/3rds of programming projects expected to use &#8220;low code&#8221; tools by 2025"},"content":{"rendered":"\r\n<p>App Inventor is a &#8220;low code&#8221;, visual software development tool. Such &#8220;drag and drop&#8221; programming tools enable non-programmers (and programmers) to create many types of applications without the details of traditional programming code.<\/p>\r\n<p>This leads to an important issue &#8211; will less trained\/less experienced programmers inadvertently introduce security problems in their applications?<\/p>\r\n<blockquote>\r\n<p>Gartner predicts that by the end of 2025, <a href=\"https:\/\/www.prnewswire.com\/in\/news-releases\/low-code-is-the-future-outsystems-named-a-leader-in-the-2019-gartner-magic-quadrant-for-enterprise-low-code-application-platforms-868871260.html\" target=\"_blank\" rel=\"noreferrer noopener\">over 65% of development projects<\/a> will use low-code builders. The field of low-code continues to expand. But what security implications does low-code introduce? <a href=\"https:\/\/devops.com\/low-code-to-become-commonplace-in-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">Low-code<\/a> refers to tools that enable application construction using visual programming models. Adopting drag-and-drop components instead of traditional code, <a href=\"https:\/\/devops.com\/demystifying-the-low-code-category\/\" target=\"_blank\" rel=\"noreferrer noopener\">no-code and low-code platforms<\/a> enables non-technical folks to construct their own workflows without as much help from IT. Yet, handing power to citizen developers with less security training can be risky. Plus, low-code platforms may hold compromised propriety libraries or leverage APIs that may unknowingly expose sensitive data to the outside world. There\u2019s also the possibility that low-code could <a href=\"https:\/\/devops.com\/5-steps-to-avoid-shadow-it-around-low-code\/\" target=\"_blank\" rel=\"noreferrer noopener\">increase shadow IT<\/a> if not governed well.<\/p>\r\n<\/blockquote>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/devops.com\/how-to-mitigate-low-code-security-risks\/\">How to Mitigate Low-Code Security Risks<\/a><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>App Inventor is a &#8220;low code&#8221;, visual software development tool. Such &#8220;drag and drop&#8221; programming tools enable non-programmers (and programmers) to create many types of applications without the details of traditional programming code. This leads to an important issue &#8211; will less trained\/less experienced programmers inadvertently introduce security problems in their applications? Gartner predicts that &hellip; <a href=\"https:\/\/coldstreams.com\/appinventor\/2021\/04\/10\/2-3rds-of-programming-projects-expected-to-use-low-code-tools-by-2025\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">2\/3rds of programming projects expected to use &#8220;low code&#8221; tools by 2025<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,10,11,12],"tags":[],"class_list":["post-1821","post","type-post","status-publish","format-standard","hentry","category-general","category-programming-method","category-software","category-stem-education"],"_links":{"self":[{"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/posts\/1821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/comments?post=1821"}],"version-history":[{"count":3,"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/posts\/1821\/revisions"}],"predecessor-version":[{"id":1824,"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/posts\/1821\/revisions\/1824"}],"wp:attachment":[{"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/media?parent=1821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/categories?post=1821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coldstreams.com\/appinventor\/wp-json\/wp\/v2\/tags?post=1821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}