Sprint uses CA Performance Management to monitor over 50,000 network devices and 2 million interfaces across its 40,000 physical locations. It groups interfaces and devices by site and function to create dashboards and scorecards for network planning, operations, and engineering teams. Key dashboards include interface and group views using tables and trend graphs. Scorecards provide a summary view of metric projections and utilization for interface bundles across the network. The flexible grouping allows limitless reporting combinations to meet various user needs.
Business Transformation: Reframing Strategic Advantage through APIsCA Technologies
Competitive advantage has traditionally been deeply rooted in industry structure. But the growing importance of digitization and informational assets has blurred industry boundaries, driving businesses to operate in unfamiliar yet thriving digital ecosystems. And it’s the API that has provided businesses the building blocks to transform and compete in this new interconnected world. Join Mohan Subramaniam, Associate Professor of Strategy, Carroll School of Management and Harvard Business Review author, to discuss this paradigm shift from industries to ecosystems, the importance of informational assets vs. physical assets, and why APIs are key drivers for capturing value in this new digital marketplace.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
This 3 hour hands-on session covered the key aspects of how CA Service Operations Insight can integrate and correlate information from your many domain management tools into cohesive service models, monitor and manage your operations at the service level, and transform your NOC into a 21st century Business Operations Center.
Topics covered include:
Product Architecture and Overview
Centralized Event Management
UIM (Nimsoft) Integration
Event Enrichment
Cross-Domain Correlation
Integrating SNMP data sources
Notifications and Escalations
Managing to the Service
Service Modeling / Alert Propagation
Advanced Topics / Troubleshooting
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
CA Mobile App Analytics combines app performance management, developer analytics and usage analytics in a single tool. In this session, you will see how to use CA Mobile App Analytics to understand the overall user experience of your mobile application. The analytics provided will enable you to continuously improve the user experience of your mobile app, a critical part of achieving the coveted 5-Star rating. Attendees will be provided a detailed overview of the solution, along with an instructor lead demo showing how easy it is to take an existing iOS mobile application and add the power of CA Mobile Analytics with CA Application Performance Management integration.
For more information, please visit http://cainc.to/Nv2VOe
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...CA Technologies
The global economy continues to exponentially change and develop, shifting the focus and importance of identity – identity of both people and “things.” As these changes continue, the real challenge is that the classic approaches for identity and access management and governance are becoming less effective, yet many organizations are still struggling with the basics. With shifts towards adaptive authentication, continuous authentication, contextual authorization and the need for more tighter alignment with the business so as to both facilitate and protect, this session will discuss effective strategies for success.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...CA Technologies
Are you making the most of the fact that your service management program is IT's face to the business? It's not enough to drive user adoption--they must want to use it. We need to put the consumer first in all interactions with IT, whether via a user interface or direct person-to-person. Hear the whys and hows of successfully deploying, innovating and modernizing self-service and service catalogs to make the most business impact.
For more information, please visit http://cainc.to/Nv2VOe
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
We live and work in a cyber-world where our physical entity and logical identities are disjointed and vulnerable. We don’t know how our logical identity and data is being accessed and by who. With the advent of IoT and “Digitization of All Things” business and the proliferation of data, there is even more exposure of this logical persona and potential for a breach.
In this presentation we discuss with consideration to IoT:
-What really is at stake in terms of enterprise risk, security and privacy
-What challenges are experienced and what Security Controls can be put in
-What tangible security solutions exist and can be used in an IoT world
For more information, please visit http://cainc.to/Nv2VOe
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...CA Technologies
The application economy has a voracious appetite for “new, better, faster” features, experiences and products. Customers, both internal and external, are impatient as IT teams struggle to move quickly while maintaining high standards. Join this session to learn how CA Release Automation coupled with a new Continuous Delivery solution to be announced at CA World can help you discover new levels of success.
For more information, please visit http://cainc.to/Nv2VOe
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?CA Technologies
Cyber-attacks damage an organization far beyond the breached data. The ripple effect is felt on your relations with customers, investors and employees. This security panel will discuss how being compliant doesn’t mean you are secure and how complacency around mainframe security will come back to bite you! Most IT security departments today struggle to meet organizational demands, especially with limited resources and budgets. Yet in todays' interconnected datacenter, we have to ask - is your team unaware of both malicious and accidental attack vectors now targeting mainframe data? Gain some insight from our experts; and come prepared to ask your own questions too!
For more information, please visit http://cainc.to/Nv2VOe
Business Transformation: Reframing Strategic Advantage through APIsCA Technologies
Competitive advantage has traditionally been deeply rooted in industry structure. But the growing importance of digitization and informational assets has blurred industry boundaries, driving businesses to operate in unfamiliar yet thriving digital ecosystems. And it’s the API that has provided businesses the building blocks to transform and compete in this new interconnected world. Join Mohan Subramaniam, Associate Professor of Strategy, Carroll School of Management and Harvard Business Review author, to discuss this paradigm shift from industries to ecosystems, the importance of informational assets vs. physical assets, and why APIs are key drivers for capturing value in this new digital marketplace.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
This 3 hour hands-on session covered the key aspects of how CA Service Operations Insight can integrate and correlate information from your many domain management tools into cohesive service models, monitor and manage your operations at the service level, and transform your NOC into a 21st century Business Operations Center.
Topics covered include:
Product Architecture and Overview
Centralized Event Management
UIM (Nimsoft) Integration
Event Enrichment
Cross-Domain Correlation
Integrating SNMP data sources
Notifications and Escalations
Managing to the Service
Service Modeling / Alert Propagation
Advanced Topics / Troubleshooting
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
CA Mobile App Analytics combines app performance management, developer analytics and usage analytics in a single tool. In this session, you will see how to use CA Mobile App Analytics to understand the overall user experience of your mobile application. The analytics provided will enable you to continuously improve the user experience of your mobile app, a critical part of achieving the coveted 5-Star rating. Attendees will be provided a detailed overview of the solution, along with an instructor lead demo showing how easy it is to take an existing iOS mobile application and add the power of CA Mobile Analytics with CA Application Performance Management integration.
For more information, please visit http://cainc.to/Nv2VOe
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...CA Technologies
The global economy continues to exponentially change and develop, shifting the focus and importance of identity – identity of both people and “things.” As these changes continue, the real challenge is that the classic approaches for identity and access management and governance are becoming less effective, yet many organizations are still struggling with the basics. With shifts towards adaptive authentication, continuous authentication, contextual authorization and the need for more tighter alignment with the business so as to both facilitate and protect, this session will discuss effective strategies for success.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...CA Technologies
Are you making the most of the fact that your service management program is IT's face to the business? It's not enough to drive user adoption--they must want to use it. We need to put the consumer first in all interactions with IT, whether via a user interface or direct person-to-person. Hear the whys and hows of successfully deploying, innovating and modernizing self-service and service catalogs to make the most business impact.
For more information, please visit http://cainc.to/Nv2VOe
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
We live and work in a cyber-world where our physical entity and logical identities are disjointed and vulnerable. We don’t know how our logical identity and data is being accessed and by who. With the advent of IoT and “Digitization of All Things” business and the proliferation of data, there is even more exposure of this logical persona and potential for a breach.
In this presentation we discuss with consideration to IoT:
-What really is at stake in terms of enterprise risk, security and privacy
-What challenges are experienced and what Security Controls can be put in
-What tangible security solutions exist and can be used in an IoT world
For more information, please visit http://cainc.to/Nv2VOe
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...CA Technologies
The application economy has a voracious appetite for “new, better, faster” features, experiences and products. Customers, both internal and external, are impatient as IT teams struggle to move quickly while maintaining high standards. Join this session to learn how CA Release Automation coupled with a new Continuous Delivery solution to be announced at CA World can help you discover new levels of success.
For more information, please visit http://cainc.to/Nv2VOe
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?CA Technologies
Cyber-attacks damage an organization far beyond the breached data. The ripple effect is felt on your relations with customers, investors and employees. This security panel will discuss how being compliant doesn’t mean you are secure and how complacency around mainframe security will come back to bite you! Most IT security departments today struggle to meet organizational demands, especially with limited resources and budgets. Yet in todays' interconnected datacenter, we have to ask - is your team unaware of both malicious and accidental attack vectors now targeting mainframe data? Gain some insight from our experts; and come prepared to ask your own questions too!
For more information, please visit http://cainc.to/Nv2VOe
Protecting the Software-Defined Data Center from Data BreachCA Technologies
In this session, learn:
Security Requirements for our next generation software defined data centers
VMware NSX™, VMware’s network virtualization platform, and how it protects the software defined data center
CA Privileged Access Manager for VMware NSX™, and how it protects the management plane of VMware NSX™
For more information, please visit http://cainc.to/Nv2VOe
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
Please join us for a detailed education session on the newest hybrid cloud monitoring capabilities in CA Unified Infrastructure Management. We will explore how CA Unified Infrastructure Management continues to deliver on its vision of powerful, unified monitoring that is easy to set up, administer and use. This session will cover the new hybrid cloud monitoring capabilities and monitoring public cloud (AWS), private cloud (OpenStack), hyperconverged infrastructure (Nutanix) and containers (Docker). With comprehensive monitoring coverage of the technologies that are driving the evolution of modern data centers, IT operations now has the tools to quickly pinpoint and troubleshoot problems that span private and public clouds.
For more information, please visit http://cainc.to/Nv2VOe
The role of servers in your organization has changed substantially—with their uses, requirements and complexity all increasing dramatically in recent years. Many of the traditional server monitoring software, tools and techniques that worked in the past don’t suffice any more. This slide deck looks at some of the most pressing challenges administrators face in ensuring optimal server performance, and it offers insights into the tools and strategies required to address these demands.
For more information on how CA Technologies can help, please visit: http://cainc.to/4wNOmB
Automate Hadoop Jobs with Real World Business ImpactCA Technologies
Have you ever wondered how you might simplify and automate Hadoop batch processing for faster implementation and more accurate big data analytics?
With CA Workload Automation, you can simplify and automate Hadoop batch processing for faster implementation and more accurate big data analytics.
For more information, please visit http://cainc.to/Nv2VOe
Achieving a Successful Identity Management and Governance Deployment The Flor...CA Technologies
Florida Blue recently undertook a large-scale identity management deployment in order to help improve their business agility and increase efficiencies. In doing so, they faced a number of common challenges. This session will cover these critical considerations and the methodology Florida Blue followed to approach their project and the strategies and tactics that they chose to adopt. Most importantly, it will show the benefits to the business that they have achieved, and the lessons that were learned during this complex process.
For more information, please visit http://cainc.to/Nv2VOe
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
Please join us as we discuss the need for advanced authentication for Mainframe, as well as any concerns and expectations surrounding its use.
For more information, please visit http://cainc.to/Nv2VOe
Using Artificial Intelligence to power Service VirtualizationCA Technologies
Technology chat to review the details of how Artificial Intelligence is being used to advance even further the power of CA Service Virtualization. Opaque Data Processing (ODP) allows CA Service Virtualization to virtualize data in sufficient detail when the format of the requests and responses is not known; eliminating the need for a new data handler every time you encounter a new message format. Make sure not to miss this firsthand look at the advances in ODP being showcased during CA World 2015.
For more information, please visit http://cainc.to/Nv2VOe
API Management SaaS 2.0: Growing with the Digital EconomyCA Technologies
CA API Management SaaS Offers enterprises a SaaS or Hybrid open, analytics-
and API-enabled platform that features greater control over "last mile" API access; simpler integration with existing systems and processes; and analytical insight into business trends, exceptions and risks. For more information, please visit http://cainc.to/Nv2VOe
CA Mobile Content Management – for smart mobile collaborationCA Technologies
Learn how CA Mobile Content Management (CA MCM) enables knowledge workers to work productively on the go and enterprises to achieve security exactly where and when needed.
For more information on Management Cloud solutions from CA Technologies, please visit: http://bit.ly/1wEnPhz
Automate and Accelerate Software Development Time and Deliver Superior Busine...CA Technologies
This session focuses on how CA Endevor® Software Change Manager (CA Endevor® SCM) meets the software change management requirements and helps boost efficiency in the mainframe environment.
This session highlights the most recent product enhancements and some exciting plans for the future.
For more information, please visit http://cainc.to/Nv2VOe
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
Corporate boards and audit committees are taking a greater interest in cybersecurity and plans to mitigate related risks. Headline-grabbing data breaches are prevalent. Shareholders and oversight bodies are concerned about the potential impact to their organizations’ financial well-being and reputation.
Today, cyber adversaries are well-organized and well-funded, and they are more able to enter commercial and governmental organizations than ever before. No company has the capability and capacity to prevent all attacks. The only way to operate securely is to assume a breach has occurred, is occurring and will occur. This requires “complicate, detect and respond” mindset when developing and automating controls.
For more information, please visit http://cainc.to/Nv2VOe
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
Let’s take a look at how the CA Identity Portal can provide a centralized point for everything related to user identities and application access. It provides convenient access requests with request tracking, through access to the application itself using the enhanced applications launcher, to certification of the existing access. Most importantly, it also provides an outstanding user experience, along with identity security. Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Business Transformation: PwC Presents Its Viewpoint on the Integration FabricCA Technologies
While cloud and digital devices enable 24/7 anywhere, anytime access, these same technologies introduce complex integration challenges. Traditional integration technologies can't keep pace. They are typically costly and brittle and perpetuate dated processes and organizational and governance structures.
Savvy organizations are transforming their integration approaches through innovative technologies combined with organizational and governance change to create a seamless, secure and interconnected ecosystem that can rapidly respond to change.
We present PwC's viewpoint on how to help organizations combine tools, accelerators and business transformation coupled with a new view of integration "roles" that is at the heart of helping business units leverage the flexible tools of the integration fabric and continue to accelerate time to market.
For more information, please visit http://cainc.to/Nv2VOe
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...CA Technologies
In the application economy, companies that have mainframe systems continue to need to evolve to meet the ever-growing demands of customers and consumers. Come join our leadership team to hear what new innovation and investment is being made to keep your team current on the mainframe and hear the direction we are taking for the future across our portfolio to support your mainframe applications, data, security and infrastructure.
For more information, please visit http://cainc.to/Nv2VOe
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
Can you easily identify exactly what files are regulated or sensitive data on the Mainframe? If not, stop by and listen to our experts show you how you can.
For more information, please visit http://cainc.to/Nv2VOe
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
The CA PPM microsessions offer an opportunity for CA PPM product management to present a perspective on a particular feature or functional area that is currently being considered for an upcoming release with the goal of collecting feedback in an intimate and interactive forum. In this session, the focal point will be CA PPM budgeting and forecasting. CA PPM product management will be available immediately following the session for additional Q&A on the topic at hand. (Due to the nature of these sessions, please limit your organization’s attendance to only one session of this type to allow others the chance to participate.) Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCA Technologies
Many IT service management (ITSM) organizations focus on individuals owning and resolving incidents and problems. Recent CA Technologies research points to a team approach to ITSM becoming more mainstream. Hear about these findings, and Marsh and McLennan present their successful team approach to problem management. This session will likely get you considering a similar approach in your ITSM organization.
For more information, please visit http://cainc.to/Nv2VOe
Agile is a methodology that businesses use to deliver customer value faster. It involves changing organizational structure, processes, ceremonies and culture to be customer-centric and transparent, and it emphasizes continual improvement as well as operating at a faster cadence. Agile started as a software movement based on learnings from Lean manufacturing, and grew from an emphasis on a single, cross-functional team to enterprise scale agile, which can be applied across tens to hundreds of cross-functional teams delivering value based on a shared, prioritized backlog of customer value.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...CA Technologies
Learn exactly what is possible with CA Service Management to enable self-sufficiency of your business consumers. Also see how these same capabilities can be leveraged by support analysts and other IT service management (ITSM) power users.
For more information, please visit http://cainc.to/Nv2VOe
Pour les lecteurs qui souhaitent suivre la création d'un logiciel en mode Devops, voici une approche intéressante, en effent en début de chaque sprint, je publierai une vidéo qui présente les objectifs du sprint et à la fin de chaque sprint, je publierais une vidéo présentant les points abordés et les réalisations obtenues.
Protecting the Software-Defined Data Center from Data BreachCA Technologies
In this session, learn:
Security Requirements for our next generation software defined data centers
VMware NSX™, VMware’s network virtualization platform, and how it protects the software defined data center
CA Privileged Access Manager for VMware NSX™, and how it protects the management plane of VMware NSX™
For more information, please visit http://cainc.to/Nv2VOe
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
Please join us for a detailed education session on the newest hybrid cloud monitoring capabilities in CA Unified Infrastructure Management. We will explore how CA Unified Infrastructure Management continues to deliver on its vision of powerful, unified monitoring that is easy to set up, administer and use. This session will cover the new hybrid cloud monitoring capabilities and monitoring public cloud (AWS), private cloud (OpenStack), hyperconverged infrastructure (Nutanix) and containers (Docker). With comprehensive monitoring coverage of the technologies that are driving the evolution of modern data centers, IT operations now has the tools to quickly pinpoint and troubleshoot problems that span private and public clouds.
For more information, please visit http://cainc.to/Nv2VOe
The role of servers in your organization has changed substantially—with their uses, requirements and complexity all increasing dramatically in recent years. Many of the traditional server monitoring software, tools and techniques that worked in the past don’t suffice any more. This slide deck looks at some of the most pressing challenges administrators face in ensuring optimal server performance, and it offers insights into the tools and strategies required to address these demands.
For more information on how CA Technologies can help, please visit: http://cainc.to/4wNOmB
Automate Hadoop Jobs with Real World Business ImpactCA Technologies
Have you ever wondered how you might simplify and automate Hadoop batch processing for faster implementation and more accurate big data analytics?
With CA Workload Automation, you can simplify and automate Hadoop batch processing for faster implementation and more accurate big data analytics.
For more information, please visit http://cainc.to/Nv2VOe
Achieving a Successful Identity Management and Governance Deployment The Flor...CA Technologies
Florida Blue recently undertook a large-scale identity management deployment in order to help improve their business agility and increase efficiencies. In doing so, they faced a number of common challenges. This session will cover these critical considerations and the methodology Florida Blue followed to approach their project and the strategies and tactics that they chose to adopt. Most importantly, it will show the benefits to the business that they have achieved, and the lessons that were learned during this complex process.
For more information, please visit http://cainc.to/Nv2VOe
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
Please join us as we discuss the need for advanced authentication for Mainframe, as well as any concerns and expectations surrounding its use.
For more information, please visit http://cainc.to/Nv2VOe
Using Artificial Intelligence to power Service VirtualizationCA Technologies
Technology chat to review the details of how Artificial Intelligence is being used to advance even further the power of CA Service Virtualization. Opaque Data Processing (ODP) allows CA Service Virtualization to virtualize data in sufficient detail when the format of the requests and responses is not known; eliminating the need for a new data handler every time you encounter a new message format. Make sure not to miss this firsthand look at the advances in ODP being showcased during CA World 2015.
For more information, please visit http://cainc.to/Nv2VOe
API Management SaaS 2.0: Growing with the Digital EconomyCA Technologies
CA API Management SaaS Offers enterprises a SaaS or Hybrid open, analytics-
and API-enabled platform that features greater control over "last mile" API access; simpler integration with existing systems and processes; and analytical insight into business trends, exceptions and risks. For more information, please visit http://cainc.to/Nv2VOe
CA Mobile Content Management – for smart mobile collaborationCA Technologies
Learn how CA Mobile Content Management (CA MCM) enables knowledge workers to work productively on the go and enterprises to achieve security exactly where and when needed.
For more information on Management Cloud solutions from CA Technologies, please visit: http://bit.ly/1wEnPhz
Automate and Accelerate Software Development Time and Deliver Superior Busine...CA Technologies
This session focuses on how CA Endevor® Software Change Manager (CA Endevor® SCM) meets the software change management requirements and helps boost efficiency in the mainframe environment.
This session highlights the most recent product enhancements and some exciting plans for the future.
For more information, please visit http://cainc.to/Nv2VOe
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
Corporate boards and audit committees are taking a greater interest in cybersecurity and plans to mitigate related risks. Headline-grabbing data breaches are prevalent. Shareholders and oversight bodies are concerned about the potential impact to their organizations’ financial well-being and reputation.
Today, cyber adversaries are well-organized and well-funded, and they are more able to enter commercial and governmental organizations than ever before. No company has the capability and capacity to prevent all attacks. The only way to operate securely is to assume a breach has occurred, is occurring and will occur. This requires “complicate, detect and respond” mindset when developing and automating controls.
For more information, please visit http://cainc.to/Nv2VOe
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
Let’s take a look at how the CA Identity Portal can provide a centralized point for everything related to user identities and application access. It provides convenient access requests with request tracking, through access to the application itself using the enhanced applications launcher, to certification of the existing access. Most importantly, it also provides an outstanding user experience, along with identity security. Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Business Transformation: PwC Presents Its Viewpoint on the Integration FabricCA Technologies
While cloud and digital devices enable 24/7 anywhere, anytime access, these same technologies introduce complex integration challenges. Traditional integration technologies can't keep pace. They are typically costly and brittle and perpetuate dated processes and organizational and governance structures.
Savvy organizations are transforming their integration approaches through innovative technologies combined with organizational and governance change to create a seamless, secure and interconnected ecosystem that can rapidly respond to change.
We present PwC's viewpoint on how to help organizations combine tools, accelerators and business transformation coupled with a new view of integration "roles" that is at the heart of helping business units leverage the flexible tools of the integration fabric and continue to accelerate time to market.
For more information, please visit http://cainc.to/Nv2VOe
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...CA Technologies
In the application economy, companies that have mainframe systems continue to need to evolve to meet the ever-growing demands of customers and consumers. Come join our leadership team to hear what new innovation and investment is being made to keep your team current on the mainframe and hear the direction we are taking for the future across our portfolio to support your mainframe applications, data, security and infrastructure.
For more information, please visit http://cainc.to/Nv2VOe
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
Can you easily identify exactly what files are regulated or sensitive data on the Mainframe? If not, stop by and listen to our experts show you how you can.
For more information, please visit http://cainc.to/Nv2VOe
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
The CA PPM microsessions offer an opportunity for CA PPM product management to present a perspective on a particular feature or functional area that is currently being considered for an upcoming release with the goal of collecting feedback in an intimate and interactive forum. In this session, the focal point will be CA PPM budgeting and forecasting. CA PPM product management will be available immediately following the session for additional Q&A on the topic at hand. (Due to the nature of these sessions, please limit your organization’s attendance to only one session of this type to allow others the chance to participate.) Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCA Technologies
Many IT service management (ITSM) organizations focus on individuals owning and resolving incidents and problems. Recent CA Technologies research points to a team approach to ITSM becoming more mainstream. Hear about these findings, and Marsh and McLennan present their successful team approach to problem management. This session will likely get you considering a similar approach in your ITSM organization.
For more information, please visit http://cainc.to/Nv2VOe
Agile is a methodology that businesses use to deliver customer value faster. It involves changing organizational structure, processes, ceremonies and culture to be customer-centric and transparent, and it emphasizes continual improvement as well as operating at a faster cadence. Agile started as a software movement based on learnings from Lean manufacturing, and grew from an emphasis on a single, cross-functional team to enterprise scale agile, which can be applied across tens to hundreds of cross-functional teams delivering value based on a shared, prioritized backlog of customer value.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...CA Technologies
Learn exactly what is possible with CA Service Management to enable self-sufficiency of your business consumers. Also see how these same capabilities can be leveraged by support analysts and other IT service management (ITSM) power users.
For more information, please visit http://cainc.to/Nv2VOe
Pour les lecteurs qui souhaitent suivre la création d'un logiciel en mode Devops, voici une approche intéressante, en effent en début de chaque sprint, je publierai une vidéo qui présente les objectifs du sprint et à la fin de chaque sprint, je publierais une vidéo présentant les points abordés et les réalisations obtenues.
DPDK Summit 2015 - Sprint - Arun RajagopalJim St. Leger
DPDK Summit 2015 in San Francisco.
Presentation by Arun Rajagopal, Sprint, and Sameh Gobriel, Intel.
For additional details and the video recording please visit www.dpdksummit.com.
Hiranandani Fortune City, Panvel, is a new vibrant township being developed in Panvel. True to its ethos of fostering 'global communities', Hiranandani Fortune City , houses well planned residences and retail stores with access to schools, hospitals, global cuisines, spread over 350 acres. Along with it, is also the 222-acre Multi-service SEZ, where over 20 million sq. ft. of corporate activities are planned to come up over the next 5 years. Come 2020, and we will see Hiranandani Fortune City as the most favourite township of Mumbaikars, in Navi Mumbai. Living up to the philosophy of Live, Work, and Play.
Hiranandani Fortune City, Panvel will lead the development of the Vashi- Panvel- Alibaug micro geography, resulting in rapid economic & infrastructure development, key among them being
Navi Mumbai International Airport
8 Lane Sion-Panvel Expressway
Upcoming Mumbai Trans Harbour Link
Upcoming CST-PANVEL fast Suburban Corridor
Upcoming Water Transport from Radio Club Ferry Wharf to NMIA/ Belapur.
Metro Link
Railways - Panvel - Karjat Route extended to passenger traffic
We are confident that with the above initiatives & infrastructure development projects initiated by the Government, Panvel will be the next frontier of development of Mumbai.
Hiranandani Fortune City is easily accessible by Road and Rail. The township is located between the Old Mumbai - Pune Highway (NH4) and the Mumbai Pune Expressway and is accessible from both these roads. It is also strategically located in close proximity to the recently announced second Mumbai International Airport at Navi Mumbai.
The webinar covers:
• The origin and need for security and privacy in IoT devices
• Elements of the IoT Trust Framework
• Plans for implementation and certification
This webinar was presented by Scott S. Perry CPA and Online Trust Alliance:
Scott Perry is Principle of Scott S. Perry CPA, an expert with more than 25 years of experience as a manager, senior manager and director on the audit firms. A national consulting firm has led him to drive his own licensed, nationally operating CPA firm based in Bellevue, Washington specializing in Cybersecurity Audits.
Craig Spiezle is Executive director of Online Trust Alliance (OTA), a recognized authority on trust and the convergence of privacy, security and interactive marketing promoting a privacy practices, balanced public policy, end-to-end security and data stewardship. Currently Craig is on board Identity Theft Council and a member of InfraGuard a partnership between the Federal Bureau of Investigation and private sector.
Link of the recorded session published on YouTube: https://youtu.be/K3KZHWHO8bg
How Verizon Uses Disruptive Developments for Organized ProgressMongoDB
With the advent of new database engines and constant data growth, the traditional way of database management has reached the next evolutionary/revolutionary phase. Every disruption in a continuum can lead to disorganized progress in any big organization. This session talks about how Verizon IT is assimilating this new disruptive model and leveraging its abilities to sustain organized progress and transform the way IT acts as a business enabler. We will discuss some of our early use cases -- such as VZ Web, our online employee portal -- and what it was like to bring in and embrace MongoDB at a Fortune 15 company.
Stuart Elby, PhD
VP, Network Architecture & Technology
Chief Technologist,
Verizon Digital Media Services
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
2009 Sprint Developers Conference - Location Based Services - Best Practices ...Sean Barbeau
Discussion of various aspects of mobile app development surrounding location-based services, including intelligent use of GPS to conserve battery life and reducing network data transfer.
Storm Telematics deploys advanced fleet and asset optimization solutions with sophisticated analytic reporting and dashboard tools. This allows for the delivery of greater operational efficiencies and cost savings to be delivered to our clients. The following Buyer's Guide is provided as a courtesy to assist in identifying critical elements as part of a due diligence process in selecting a solution provider. Enjoy.
Consensus Policy Resource Community
Remote Access Policy1. Overview
Remote access to our corporate network is essential to maintain our Team’s productivity, but in many cases this remote access originates from networks that may already be compromised or are at a significantly lower security posture than our corporate network. While these remote networks are beyond the control of Hypergolic Reactions, LLC policy, we must mitigate these external risks the best of our ability.2. Purpose
The purpose of this policy is to define rules and requirements for connecting to <Company Name>'s network from any host. These rules and requirements are designed to minimize the potential exposure to <Company Name> from damages which may result from unauthorized use of <Company Name> resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical <Company Name> internal systems, and fines or other financial liabilities incurred as a result of those losses.
3. Scope
This policy applies to all <Company Name> employees, contractors, vendors and agents with a <Company Name>-owned or personally-owned computer or workstation used to connect to the <Company Name> network. This policy applies to remote access connections used to do work on behalf of <Company Name>, including reading or sending email and viewing intranet web resources. This policy covers any and all technical implementations of remote access used to connect to <Company Name> networks.
4. Policy
It is the responsibility of <Company Name> employees, contractors, vendors and agents with remote access privileges to <Company Name>'s corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to <Company Name>.
General access to the Internet for recreational use through the <Company Name> network is strictly limited to <Company Name> employees, contractors, vendors and agents (hereafter referred to as “Authorized Users”). When accessing the <Company Name> network from a personal computer, Authorized Users are responsible for preventing access to any <Company Name> computer resources or data by non-Authorized Users. Performance of illegal activities through the <Company Name> network by any user (Authorized or otherwise) is prohibited. The Authorized User bears responsibility for and consequences of misuse of the Authorized User’s access. For further information and definitions, see the Acceptable Use Policy.
Authorized Users will not use <Company Name> networks to access the Internet for outside business interests.
For additional information regarding <Company Name>'s remote access connection options, including how to obtain a remote access login, free anti-virus software, troubleshooting, etc., go to the Remote Access Services website (company url).
4.1 Requirements
4.1.1 Secure remote access must be strictly controlled with encryption (i.e., Virt ...
The Seven Deadly Sins of Incident ResponseLancope, Inc.
According to a recent study from Cisco, organizations show high levels of confidence in their security policies; but when it comes to their ability to scope and contain compromises, their confidence drops significantly.
Such statistics demonstrate that organizations continue to struggle with incident response.
Join Lancope’s security researcher, Brandon Tansey, and 451 Research’s senior analyst, Javvad Malik, to learn how to avoid The Seven Deadly Sins of Incident Response, and what you can do to improve your organization’s security posture.
Sins include:
- Lack of visibility/not understanding your environment
- Inability to separate the signal from the noise
- Modeling use cases on defenses, not attackers
HADR Best Practices (High Availability Disaster Recovery)Rocket Software
Learn from the many HADR implementations where Rocket has assisted! Best Practices for stability, replication, emergency failover, maintenance and many other uses will be presented.
Fast Data Overview for Data Science Maryland MeetupC. Scyphers
An overview of Open Source Fast Data platforms (Spark, Kafka, HBase, Impala, Apex, H20, Druid, Flink, Storm, Samza, ElasticSearch, Lucene, Solr, SMACK, PANCAKE)
Similar to Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Assurance with CA Performance Management (20)
In medicine - an MRI can quickly reveal a hidden ailment and actionable insight to get better. For IT and business leaders whose key concern with the mainframe is the platform costs and lean operations - the CA Mainframe Resource Intelligene reveals multiple sources of hidden mainframe costs and operational inefficiencies along with actionable recommendations.View this slideshare to understand how this new SaaS offering from CA brings together automation, speed, analytics and mainframe expertise of 40+ years. CA Mainframe Resource Intelligence reports answer your CIO’s toughest questions about mainframe optimization and potential for digital transformation.
For more information, please contact your account director or mainframe specialist at:
http://ow.ly/PALG50htHgF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
For more information on Mainframe, please visit: http://ow.ly/GwKO50gkixl
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Here at CA Technologies, our development teams share many of the same challenges producing quality software as our customers.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
This session will cover how The Home Depot built quality into its software development as it migrated from waterfall to agile delivery.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Privileged Access in a World on TimeCA Technologies
Today there are more privileged users than ever before. Providing access is not optional it is a business necessity. But how do you avoid excessive access? Providing the right access at the right time is the formula for reducing your risk and securing a world of data. At FedEx empowering the right people at the right time is not only good business, but it's also good security.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
As one of the most forward thinking critical infrastructure companies in the UK, SGN is blazing a trail by becoming the first UK critical infrastructure company to run 100% in the cloud and using innovative IoT technologies to revolutionize the management of gas pipelines. To manage the risk, SGN embarked on a mission to shape the attack path of intruders. In this session, Mo Ahddoud, CISO at SGN will share how he used a technique called attack path mapping to put privileged access at the center of SGN's digital transformation.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
Around the globe, citizens are demanding 24/7 access to government, and this is driving a dramatic re-architecture of public services putting citizens in control, increasing participation and access to services. From two different parts of the world, The State of Louisiana & The State of Amazonas in Brazil have both become centers for innovation. In this session, they will share and demonstrate how they are designing a government built to change and breaking down silos to make the citizen the center of government.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Keynote: Making Security a Competitive AdvantageCA Technologies
Keynote: Making Security a Competitive Advantage
For more information on Security, please visit: http://cainc.to/CAW17-Security
For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps For more information on Veracode, please visit: http://community.veracode.com
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Providers Can Capitalize
For more information on MSP, please visit: http://ow.ly/CrAA50gbyfJ
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational Efficiency and Scalability
For more information on MSP, please visit: http://ow.ly/oQ1o50gby0m
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting Your Customer’s Modern Software Factory
For more information on MSP, please visit: http://ow.ly/kWsH50gbxYh
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformation Play for Service Providers
For more information: Download the white paper, “Five Technologies for the Built-to-Change Business—and How You Can Monetize Them” at: https://www.ca.com/content/dam/ca/us/files/white-paper/five-technologies-built-to- change-business.pdf
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
Stay connected at: http://ow.ly/d0f350g68Bq Thank you.
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
In this roadmap session, join us to explore how bleeding-edge data science algorithms are now being incorporated in real life into CA Mainframe Operational Intelligence to better predict performance issues and prevent costly downtime and capacity spikes across the IT landscape. See how you can get real-time insight to what may happen sooner and in-depth guidance on what you should do about it. And, learn how to use open tools that can pull in data feeders from other systems, to improve results. Whether you’re a mainframe novice or a seasoned operations expert, you'll find new tools can improve your SLA performance, MTTR and more.
For more information on Mainframe, please visit: http://ow.ly/pbDM50g68zT
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
With great power comes great responsibility. Mainframes have both: the power of data and transactions that run the application economy, and the responsibility to keep that data protected. Join this roadmap session to learn from CA data privacy leaders and see the future of the data-centric security strategy, covering key products such as CA Data Content Discovery for z/OS, CA Compliance Event Manager and more. Learn how to enhance your data privacy and simplify regulatory compliance, plus get a view into the roadmap of what's to come in the mainframe security and compliance portfolio.
For more information on Mainframe, please visit: http://ow.ly/Ik2H50g66cN
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
The promise of blockchain, or specifically distributed ledger technology, has captured the attention of business and IT leaders across multiple industries. Now is the time to move from hype to reality. This session will examine use cases of pioneering companies that apply blockchain in a multi-party entity environment with immutable smart contracts. We’ll share how some DevSecOps requirements are fundamentally different for blockchain pilots and full deployment—from getting started with the right development environment to concerns of security, encryption and operational visibility. We will also discuss integration of blockchain with existing systems of record and the use of shadow blockchain as an evolutionary step towards adoption. Join this session to learn more about developing, deploying, and securing blockchain.
For more information on Mainframe, please visit: http://ow.ly/VnBh50g66bO
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
In this keynote session, hear from Ashok Reddy, GM for CA Mainframe to learn how you can establish digital trust using the power of the new IBM Z and the Modern Software Factory to become a digital enterprise. CIO’s can deliver better economics and TCO. IT operations teams can enable self-driving mainframe data centers to deliver 100% SLA’s. CISO’s and auditors can protect sensitive data to avoid fines tied to GDPR and regulations. Enterprise Architects and Developers can use the same open, modern DevSecOps toolset, mobile-to-mainframe. And, get a sneak peek at new innovations: Mainframe as a Service and Blockchain which can put you in the driver’s seat to transform the way your company does business. Joining Ashok will be key leaders from IBM, General Motors, and Southwest Gas who will share their perspectives on digital transformation.
Stay connected at http://ow.ly/4NOy50g63Ji
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Assurance with CA Performance Management
1. Case Study: Sprint Monitors Its Mega-Network for
Voice/Video/Data Service Assurance with CA
Performance Management
Mike Peterson
Sprint
Wireless Core Planner
Session Number
General Business Case – Capacity Management and Performance
Size and Scope of Environment
Value of Grouping – Pattern Matching, network ‘slice’ (by, site, interface groupings, vendor, flows, etc)
Dashboards – IM Table Top (If time allows MultiView, canned [interface, device, group]
Scorecards – Aggregates, sites, flows
Data Extraction – OpenAPI – Tableau
Planning - Place augments in time with a capacity that allows for cost effective incremental growth. Try to time capital expenditures to the last minute without EVER causing a constraint.
Reporting – Should be easy to understand and have relevant impact, the executive levels don’t live and breath this stuff like engineers do
Tracking flows from A to Z, especially useful during troubleshooting, it is nearly difficult to find issues in data paths using only top n
40,000 locations - Cell towers to aggregating POPs to regional data centers to national data centers
Devices – many devices unique to carriers (gateways, MME, etc.)
Linear regression / least squares – near (90 day), short (180 day) and long term (365 day) projections.
Standard Dev & baseline for interface utilization, errors, discards, mem, CPU, etc.
Notifications – Email and SNMP traps
Operations – Fault and performance
Engineering – Planning and performance
Our experience with eHealth showed that building reports through searching had serious limitations. The first was the limit of how many could be selected, the other was the painful process of actually performing the search.
While using eHealth it became quite clear that we should try to ensure that as many elements as possible were contained in groups.
Group labeling and structure was going to important if downstream customers were to be able to use CAPM.
There are many open and closed source platforms that can collect SNMP, we’ve found the group administration to be the most powerful asset. During an internal demonstration management was able to see the value immediately.
The design of our network in some ways informed us how to structure the groups. If it exists in the network it must be performing a function, therefore that function can be described and in turn that description can be the name of a group.
The big “Ah Ha” was when we figured out how groups can be reported in the scorecards. Assumptions that were made on group structure were in some ways wrong and some of the group structures we built had to be scraped.
Reference groups allow for new interface groupings to be built without having to replicate the rule sets. Example – We might have groups that contain router to firewall links at every site, if we need a group that contains those links in a top level group all we have to do is build references.
IM Table (Top) is like a Swiss army knife, just about every metric family is available to view, works equally well on interfaces and devices, performance or capacity.
(Assume we have an example of metric projection) – Even though management dislikes Top N reports, they still have value to operations (NOC)
We have other versions of this view that aren’t locked to groups, that allows extremely focused views of specific interface (or device) groupings