SlideShare a Scribd company logo
World®
’16
Case	Study:	Jeweler’s	Mutual	Insurance	
Streamlines	Complex	Application	
Deployments	With	CA	Release	Automation
Tim	Dallmann - Platform	Engineer	- Jewelers	Mutual	Insurance	Co
DO5X07S
DEVOPS
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
INTRODUCTION
WHAT’S	THE	PROBLEM?
RESULTS
THE	JEWELERS	MUTUAL	SOLUTION
RELEASE	AUTOMATION	CHALLENGES
CA-RELEASE	AUTOMATION:	OUR	IMPLEMENTATION
1
2
3
4
5
6
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Introduction
Who	Is	Tim	Dallmann?
Professional
30+	Years	in	IT
Developer
Architect
Manager
Personal
Husband
Father
Drummer
Brewer
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Introduction
Who	Is	Jewelers	Mutual?
Company
>	100	years
Neenah,	WI
Employees:
250	Overall
60	in	IT
Commercial	
Lines
Jewelry	
Store
Craftsman
Personal	
Lines
Wedding	
Sets
Earrings
Watches
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Jewelers	Mutual	Technical	Landscape
Many	Environments	to	Manage
DEV01 DEV02 DEV03 DEV04
TEST01 TEST02 TEST03 TEST04 TEST05 TEST06
STAGE
INTEGRA-
TION
PROD
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Jewelers	Mutual	Technical	Landscape
Complex	system	integrations
Dependencies	that	impact	
deployments
A	large	inter-dependent	system
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Jewelers	Mutual	Technical	Landscape
A	diverse	set	of	artifacts	to	deploy
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What’s	the	Problem?	
Developers	spending	60%	
of	their	time	managing	
environmental	issues
Releases	are	large	and	
complex	– only	deployed	
once	each	month
Environmental	Stability	and	Complexity
RESULT:	Inability	to	
respond	quickly	to	change
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
A	Team	is	Born!
“Environment	Stabilization	Team”
1 Created	a	foundation	for	continuous	delivery:
§ Unit	testing	in	Jenkins	for	.Net and	Java	applications
§ Automated	lengthy	regression	test	scripts	with	HP	UFT
2 Realized	the	need	for	automation	tools:
§ UpGuard:	to	compare	environments	and	detect	unauthorized	changes
§ Puppet:	to	automate	the	infrastructure
§ CA	Release	Automation:	to	automate	deployment	activities
3 Created	a	dashboard	to	display	environment	status
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Release	Automation	Challenges
All	applications	are	part	of	a	larger	
dependent	system
Any	release	could	include	any	set	
of	applications,	requiring	
coordinated	deployment	activities
§ Shutdown
§ Queue	suspension
§ Backup
§ Deployment
§ Startup
What	makes	our	deployments	complicated?
Same	image	as	original	file	
but	in	different	colours than	
version	on	123RF.	Brand
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Release	Automation	Challenges
Other	goals
Notifications	of	
pauses,	failures	and	
release	progress
Health	check	of	the	
environment
Rollback	
capability
Validation	
testing
Pauses	for	manual	
operations
Tokenization	of	
configuration	files
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Release	Automation	Implementation
§ Less	than	7	weeks	to	go	from	
zero	to	Deploy!
§ Remote-led	POC	prior	to	
implementation
– Segregated	lab	environment
§ Servers	and	agents	installed	
prior	to	Services	arrival
Planning	for	success
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Jewelers	Mutual	CA	Release	Automation	Implementation
Getting	Started
1 Take	inventory	of	all	deployable	artifacts
2 Examine	how	they	are	deployed	today	(before	automation)
3 Determine	where	each	one	originates
4 Group	them	based	on	deployment	similarities
5 Create	a	flow	diagram	for	each	type	of	artifact
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example	Deployment	Flow	Diagram
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Single-Application	Approach
Coordinate	activities	between	all	
artifact	types:
§ Shutdown	process
§ Backup
§ Deployments
§ Restart	process
§ Notifications
§ Automated	testing
Modelling	the	entire	system	as	one	deployment	application
1 2
34
5
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Single-Application	Approach
All	artifacts	are	part	of	a	single	CA	Release	Automation	“application”
Components	alignment:
Modeling	the	entire	system	as	one	deployment	application
Component à Artifact	Type à Artifact	Definition à Server	Type(s)
Guidewire à WARFile à PolicyCenter à PC_Batch,	PC_Online
.Net à IISApp à PLPortal à WAP
.Net à WinApp à DashboardCons à BAT
.Net à WinSvc à PaymentService à EAS
Ratabase à RBDistro à RBDistro à RAT_Primary
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Single-Application	Approach
The	“General”	component:
§ Provides	common	flows	used	in	
multiple	processes
§ Health-check	activities	for	all	servers
§ Gathering	credentials	from	KeePass
§ Manual	stops	in	processes
§ Deployment-level	notifications
Common	“shared”	actions	and	flows
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Error	Handling	and	Logging
Check	Deploy	Status
Handle	Pause
§ Log	it
§ Email	It
§ User	Operation
Handle	Fail
§ Log	it
§ Email	it
§ Stop	deployment
Handle	Log	Messages
§ Log	it
Handle	Dash	Messages
§ Build	REST	Operation
§ Send	to	Dashboard
Handle	Error	Messages
§ Log	it
§ Email	it
§ User	Operation
Asynchronous	Process
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Deployment	Notifications
Self-subscribing	to	various	events:
§ Deployment	about	to	start	(warning	message)
§ Deployment	started
§ Deployment	steps	complete	(pre-validation)
§ Deployment	complete	(post-validation)	with	
status
§ Test	results
§ Database	Deployment	failures
§ Deployment	paused
Configurable	by	environment
Communicating	what	is	going	on
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Rollbacks
Pre-deploy
§ Get	the	latest	installed	version	of	each	
artifact
§ Create	a	package	with	those	artifacts
§ Create	a	deployment	plan	using	that	package
§ Create	a	rollback	deployment	and	attach	to	
the	current	deployment
On	failure	– rollback	deployment	
manually	invoked	
Recovering	from	disaster
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Health-Check
§ Run	during	Pre-Deploy
§ Each	component	has	it’s	own	health-check	flows
§ Some	“general”	health-check	flows	run	for	all	
server	types
§ Validates	things	like:
– MSDeploy is	installed
– Tomcat	instances	are	running
– IIS	running
– Enough	disk	space	for	deployment
Ensuring	the	environment	is	ready	for	deployment
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Dynamic	Step	Adjustment
§ Based	on	artifacts	in	
package
§ Removes	deployment	
steps	that	are	not	
needed
§ Why?		Even	un-used	
process	steps	take	time
Removing	Unneeded	Process	Steps
1
2
3 6
5
4 7
8
9
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Deployment	Template
Package	Creation
Health	Check
Remove	Steps
Create	Rollback
Initialization
Start	Error	Handler
Send	Notifications
Shutdown
Backup
Deploys
Start	Guidewire
GW	Admin	Imports
Start	Queues
Web	Apps	Online
Notifications
Stop	Error	Handler
Deployment
Validation	Testing
Integration	Testing
Post-Deploy
Major	steps	to	release
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Pros	and	Cons	of	the	Single-Application	Approach
Provides	a	framework	for	all	other	
deployment	types
Complex	dependencies,	including	manual	
steps,	are	accounted	for
Logging	and	error	handling	are	consistent	
across	all	artifact	deployments
Workflows	get	large	and	complex
Application	parameters	=	no	shared	
components
Breaking	the	workflow	means	you’ve	
broken	it	for	all	deployments
PROS CONS
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Task	
Enablement
Developers,	QA	Analysts,	and	
even	business	users	have	the	
ability	to	run	their	own	
deployments,	allowing	the	
deployment	team	to	focus	on	
growing	and	enhancing	release	
capabilities.
Environment	
Issues
Developers	rarely	need	to	
address	issues	with	
environments,	and	can	focus	
on	“real”	work	instead.
Release	
Frequency
What	used	to	be	a	single	
monthly	release	involving	
many	man-hours	of	effort	has	
evolved	to	1-2	releases	each	
week,	with	only	a	handful	of	
people	spending	45	minutes	of	
their	time.
Results
The	Impact	of	CA	Release	Automation
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
DO5X12S
EchoStar	Transforms	Complex	Software	Releases	to	
Customer	Network	Set	Top	Boxes	with	CA	RA	CDE
11/17/2016	at	01:45	pm
DO5X14S
HMS	Delivers	Sleek	Application	Deployments	via	CA	
Release	Automation
11/17/2016	at	03:45	pm
DO5T19S
GM	Financial	Builds	a	Sustainable,	Holistic,	Continuous	
Delivery	Practice
11/17/2016	at	04:30	pm
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Modernize	
App	Delivery
Integrated	CD
Theater	5	- DOV501P
Deliver	Test	
Data	Faster
Test	Data	Manager
Theater	5	- DOV511P
Deliver	
Better	Apps
Service	Virtualization
Theater	5	- DOV507P
Orchestrate	
Your	Release
Release	Automation
Theater	5	- DOV513P
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
DevOps	– Continuous	Delivery
For	more	information	on	DevOps	– Continuous	Delivery,	please	
visit:	http://cainc.to/PiTFpu

More Related Content

What's hot

Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
 
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
CA Technologies
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
CA Technologies
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
CA Technologies
 
Case Study: Nationwide Building Society's CA Test Data Manager Success Story
Case Study: Nationwide Building Society's CA Test Data Manager Success StoryCase Study: Nationwide Building Society's CA Test Data Manager Success Story
Case Study: Nationwide Building Society's CA Test Data Manager Success Story
CA Technologies
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
CA Technologies
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
CA Technologies
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
 
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
CA Technologies
 
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
CA Technologies
 
Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
CA Technologies
 
Tech Talk: Don't Forget Operations in Your Continuous Delivery Practice
Tech Talk: Don't Forget Operations in Your Continuous Delivery PracticeTech Talk: Don't Forget Operations in Your Continuous Delivery Practice
Tech Talk: Don't Forget Operations in Your Continuous Delivery Practice
CA Technologies
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
 
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementPre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
CA Technologies
 
Explore the State of Open Source Performance Testing in Continuous Delivery P...
Explore the State of Open Source Performance Testing in Continuous Delivery P...Explore the State of Open Source Performance Testing in Continuous Delivery P...
Explore the State of Open Source Performance Testing in Continuous Delivery P...
CA Technologies
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
 

What's hot (20)

Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
 
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
 
Case Study: Nationwide Building Society's CA Test Data Manager Success Story
Case Study: Nationwide Building Society's CA Test Data Manager Success StoryCase Study: Nationwide Building Society's CA Test Data Manager Success Story
Case Study: Nationwide Building Society's CA Test Data Manager Success Story
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
 
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
 
Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
 
Tech Talk: Don't Forget Operations in Your Continuous Delivery Practice
Tech Talk: Don't Forget Operations in Your Continuous Delivery PracticeTech Talk: Don't Forget Operations in Your Continuous Delivery Practice
Tech Talk: Don't Forget Operations in Your Continuous Delivery Practice
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementPre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
 
Explore the State of Open Source Performance Testing in Continuous Delivery P...
Explore the State of Open Source Performance Testing in Continuous Delivery P...Explore the State of Open Source Performance Testing in Continuous Delivery P...
Explore the State of Open Source Performance Testing in Continuous Delivery P...
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
 

Similar to Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deployments With CA Release Automation

Innovations™ Magazine October - December 2013
Innovations™ Magazine October - December 2013 Innovations™ Magazine October - December 2013
Innovations™ Magazine October - December 2013
T.D. Williamson
 
Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013
T.D. Williamson
 
Lightning Eliminators Customer Statements
Lightning Eliminators Customer StatementsLightning Eliminators Customer Statements
Lightning Eliminators Customer Statements
JoOnna Silberman
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
ReadWrite
 
Teenage Vaping is on the Rise: Vape Sensor Solutions SlideShare
Teenage Vaping is on the Rise: Vape Sensor Solutions SlideShareTeenage Vaping is on the Rise: Vape Sensor Solutions SlideShare
Teenage Vaping is on the Rise: Vape Sensor Solutions SlideShare
Extreme Networks
 
Carmen DeArdo - CarmenDeArdo_HowDevOpsIsEnablingLeanApplicationDevelopment
Carmen DeArdo - CarmenDeArdo_HowDevOpsIsEnablingLeanApplicationDevelopmentCarmen DeArdo - CarmenDeArdo_HowDevOpsIsEnablingLeanApplicationDevelopment
Carmen DeArdo - CarmenDeArdo_HowDevOpsIsEnablingLeanApplicationDevelopment
Carmen DeArdo
 
Carmen DeArdo DOES2015 DevOps Enterprise Summit
Carmen DeArdo DOES2015  DevOps Enterprise Summit Carmen DeArdo DOES2015  DevOps Enterprise Summit
Carmen DeArdo DOES2015 DevOps Enterprise Summit
Carmen DeArdo
 
Webinar - ServiceNow and SolarWinds: Improving IT Operations Together
Webinar - ServiceNow and SolarWinds:  Improving IT Operations TogetherWebinar - ServiceNow and SolarWinds:  Improving IT Operations Together
Webinar - ServiceNow and SolarWinds: Improving IT Operations Together
SolarWinds
 
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteMidway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Ignyte Assurance Platform
 
CloudEndure Technology Introduction For Partners
CloudEndure Technology Introduction For PartnersCloudEndure Technology Introduction For Partners
CloudEndure Technology Introduction For Partners
The Rudder Group
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration Painless
JoAnna Cheshire
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Citrin Cooperman
 
DOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application Development
DOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application DevelopmentDOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application Development
DOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application Development
Gene Kim
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
 
business_news_u_can_use_2015_q4
business_news_u_can_use_2015_q4business_news_u_can_use_2015_q4
business_news_u_can_use_2015_q4
MaryStarr
 
Cloud Solutions
Cloud SolutionsCloud Solutions
Cloud Solutions
advance20002
 
Farwest Insulation SOQ - 2016.5
Farwest Insulation SOQ - 2016.5Farwest Insulation SOQ - 2016.5
Farwest Insulation SOQ - 2016.5
David Trueblood
 
YES WE CAN: Innovating out of a recession (Dr. Norman Lewis)
YES WE CAN: Innovating out of a recession (Dr. Norman Lewis)YES WE CAN: Innovating out of a recession (Dr. Norman Lewis)
YES WE CAN: Innovating out of a recession (Dr. Norman Lewis)
LSx Festival of Technology
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
EMC
 
Distracted Driving: Understanding Your Corporate Risk and What to Do About It
Distracted Driving: Understanding Your Corporate Risk and What to Do About ItDistracted Driving: Understanding Your Corporate Risk and What to Do About It
Distracted Driving: Understanding Your Corporate Risk and What to Do About It
Matthew Howard
 

Similar to Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deployments With CA Release Automation (20)

Innovations™ Magazine October - December 2013
Innovations™ Magazine October - December 2013 Innovations™ Magazine October - December 2013
Innovations™ Magazine October - December 2013
 
Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013
 
Lightning Eliminators Customer Statements
Lightning Eliminators Customer StatementsLightning Eliminators Customer Statements
Lightning Eliminators Customer Statements
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
 
Teenage Vaping is on the Rise: Vape Sensor Solutions SlideShare
Teenage Vaping is on the Rise: Vape Sensor Solutions SlideShareTeenage Vaping is on the Rise: Vape Sensor Solutions SlideShare
Teenage Vaping is on the Rise: Vape Sensor Solutions SlideShare
 
Carmen DeArdo - CarmenDeArdo_HowDevOpsIsEnablingLeanApplicationDevelopment
Carmen DeArdo - CarmenDeArdo_HowDevOpsIsEnablingLeanApplicationDevelopmentCarmen DeArdo - CarmenDeArdo_HowDevOpsIsEnablingLeanApplicationDevelopment
Carmen DeArdo - CarmenDeArdo_HowDevOpsIsEnablingLeanApplicationDevelopment
 
Carmen DeArdo DOES2015 DevOps Enterprise Summit
Carmen DeArdo DOES2015  DevOps Enterprise Summit Carmen DeArdo DOES2015  DevOps Enterprise Summit
Carmen DeArdo DOES2015 DevOps Enterprise Summit
 
Webinar - ServiceNow and SolarWinds: Improving IT Operations Together
Webinar - ServiceNow and SolarWinds:  Improving IT Operations TogetherWebinar - ServiceNow and SolarWinds:  Improving IT Operations Together
Webinar - ServiceNow and SolarWinds: Improving IT Operations Together
 
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteMidway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
 
CloudEndure Technology Introduction For Partners
CloudEndure Technology Introduction For PartnersCloudEndure Technology Introduction For Partners
CloudEndure Technology Introduction For Partners
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration Painless
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
DOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application Development
DOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application DevelopmentDOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application Development
DOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application Development
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
 
business_news_u_can_use_2015_q4
business_news_u_can_use_2015_q4business_news_u_can_use_2015_q4
business_news_u_can_use_2015_q4
 
Cloud Solutions
Cloud SolutionsCloud Solutions
Cloud Solutions
 
Farwest Insulation SOQ - 2016.5
Farwest Insulation SOQ - 2016.5Farwest Insulation SOQ - 2016.5
Farwest Insulation SOQ - 2016.5
 
YES WE CAN: Innovating out of a recession (Dr. Norman Lewis)
YES WE CAN: Innovating out of a recession (Dr. Norman Lewis)YES WE CAN: Innovating out of a recession (Dr. Norman Lewis)
YES WE CAN: Innovating out of a recession (Dr. Norman Lewis)
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
 
Distracted Driving: Understanding Your Corporate Risk and What to Do About It
Distracted Driving: Understanding Your Corporate Risk and What to Do About ItDistracted Driving: Understanding Your Corporate Risk and What to Do About It
Distracted Driving: Understanding Your Corporate Risk and What to Do About It
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 

Recently uploaded (20)

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 

Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deployments With CA Release Automation