Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementCA Technologies
The document discusses using CA IT Asset Manager to manage hardware asset lifecycles. It recommends creating asset records when receiving advance shipping notices from vendors to automate data entry. Upon physical receipt, the receive process should validate the shipment against the notice through barcode scanning or mobile lookups. This allows capturing asset details at the source and ensures reconciliation data is available to create meaningful asset records.
Pre-Con Ed: Five Easy Steps for Migrating to CA DirectoryCA Technologies
The document discusses the five steps for migrating a user store or policy store from an existing directory, such as LDAP or a database, to CA Directory. The five steps are: 1) architecting the new CA Directory environment; 2) migrating the schema; 3) migrating the data; 4) testing applications; and 5) going live with the new directory. Migrating from a database may involve additional tasks compared to migrating from LDAP, such as converting database fields to attributes and tables to object classes.
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...CA Technologies
The document discusses CA Service Management's new Jaspersoft reporting engine. It provides an overview of the technology change from the previous CA Business Intelligence 4.1 to the new Jaspersoft reporting technology, CA Business Intelligence Jaspersoft Reports Server 6.2. It outlines some of the key benefits of the new technology, including being lightweight, easy to use and administer, and supporting complex reports and dashboards. It also describes the out-of-the-box report content available, recommended learning resources, and demo sessions at the CAWorld conference.
Robbie Rivera shared his experience leading Cisco's agile transformation journey. He discussed how Cisco, with over 70,000 employees, hundreds of development teams, and thousands of applications, transformed to become more lean and agile using CA tools like CA Agile Central and CA Project & Portfolio Management. Key aspects of the transformation included establishing a continuous delivery platform, digitizing and automating processes, and training teams in agile methodologies like Scrum and SAFe. CA tools helped enable agile practices and improved outcomes like faster delivery speed across the organization.
Transforming your organization to be Value FocusedCA Technologies
The document discusses transforming organizations to be value-focused. It defines value as importance, worth or usefulness as perceived by stakeholders. To be value-focused, an organization must pay attention to what it perceives as valuable outcomes rather than just executing tasks. The document recommends defining measurable goals and outcomes, understanding the full value stream, limiting work-in-progress, becoming coaches who enable people, and using insights to continually improve.
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentCA Technologies
This document discusses best practices for upgrading a CA Single Sign-On (CA SSO) environment. It recommends thoroughly planning the upgrade, cleaning up and potentially rebuilding the policy store, upgrading policy servers and testing the new environment. Specific steps discussed include involving stakeholders, using CA services for assessments, checking for legacy code, validating platform support, improving monitoring and thoroughly testing the new environment, including applications. The presenter notes their own organization's upgrade resulted in significant performance improvements and lessons learned are being used to improve products and services.
Agile Communities of Practice: Set Up, Sustain, SucceedCA Technologies
The document discusses how to set up, sustain, and succeed with communities of practice (CoPs). It defines CoPs and provides examples. It outlines 12 steps to create a successful CoP, including identifying the community and members, getting stakeholder buy-in, creating a charter, launching meetings, and evaluating impact. Benefits of CoPs include knowledge sharing, collaboration, and innovation. Current challenges and next steps for the author's CoP at IHS Markit are also reviewed.
This document discusses key factors for successfully implementing a software asset management (SAM) program. It identifies defining the program, establishing partnerships, focusing on key processes, thorough contract and data management, and an entitlement-centric approach as critical success factors. The document provides guidance on each factor, such as setting expectations, understanding internal and external partnerships, and challenges around data collection, integration and quality.
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementCA Technologies
The document discusses using CA IT Asset Manager to manage hardware asset lifecycles. It recommends creating asset records when receiving advance shipping notices from vendors to automate data entry. Upon physical receipt, the receive process should validate the shipment against the notice through barcode scanning or mobile lookups. This allows capturing asset details at the source and ensures reconciliation data is available to create meaningful asset records.
Pre-Con Ed: Five Easy Steps for Migrating to CA DirectoryCA Technologies
The document discusses the five steps for migrating a user store or policy store from an existing directory, such as LDAP or a database, to CA Directory. The five steps are: 1) architecting the new CA Directory environment; 2) migrating the schema; 3) migrating the data; 4) testing applications; and 5) going live with the new directory. Migrating from a database may involve additional tasks compared to migrating from LDAP, such as converting database fields to attributes and tables to object classes.
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...CA Technologies
The document discusses CA Service Management's new Jaspersoft reporting engine. It provides an overview of the technology change from the previous CA Business Intelligence 4.1 to the new Jaspersoft reporting technology, CA Business Intelligence Jaspersoft Reports Server 6.2. It outlines some of the key benefits of the new technology, including being lightweight, easy to use and administer, and supporting complex reports and dashboards. It also describes the out-of-the-box report content available, recommended learning resources, and demo sessions at the CAWorld conference.
Robbie Rivera shared his experience leading Cisco's agile transformation journey. He discussed how Cisco, with over 70,000 employees, hundreds of development teams, and thousands of applications, transformed to become more lean and agile using CA tools like CA Agile Central and CA Project & Portfolio Management. Key aspects of the transformation included establishing a continuous delivery platform, digitizing and automating processes, and training teams in agile methodologies like Scrum and SAFe. CA tools helped enable agile practices and improved outcomes like faster delivery speed across the organization.
Transforming your organization to be Value FocusedCA Technologies
The document discusses transforming organizations to be value-focused. It defines value as importance, worth or usefulness as perceived by stakeholders. To be value-focused, an organization must pay attention to what it perceives as valuable outcomes rather than just executing tasks. The document recommends defining measurable goals and outcomes, understanding the full value stream, limiting work-in-progress, becoming coaches who enable people, and using insights to continually improve.
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentCA Technologies
This document discusses best practices for upgrading a CA Single Sign-On (CA SSO) environment. It recommends thoroughly planning the upgrade, cleaning up and potentially rebuilding the policy store, upgrading policy servers and testing the new environment. Specific steps discussed include involving stakeholders, using CA services for assessments, checking for legacy code, validating platform support, improving monitoring and thoroughly testing the new environment, including applications. The presenter notes their own organization's upgrade resulted in significant performance improvements and lessons learned are being used to improve products and services.
Agile Communities of Practice: Set Up, Sustain, SucceedCA Technologies
The document discusses how to set up, sustain, and succeed with communities of practice (CoPs). It defines CoPs and provides examples. It outlines 12 steps to create a successful CoP, including identifying the community and members, getting stakeholder buy-in, creating a charter, launching meetings, and evaluating impact. Benefits of CoPs include knowledge sharing, collaboration, and innovation. Current challenges and next steps for the author's CoP at IHS Markit are also reviewed.
This document discusses key factors for successfully implementing a software asset management (SAM) program. It identifies defining the program, establishing partnerships, focusing on key processes, thorough contract and data management, and an entitlement-centric approach as critical success factors. The document provides guidance on each factor, such as setting expectations, understanding internal and external partnerships, and challenges around data collection, integration and quality.
Pre-Con Ed: Covering Your "Assets" - Don't get Caught with Your [Software] Pa...CA Technologies
The document discusses using connectors in CA IT Asset Manager to collect software asset management data from multiple sources. It describes the different types of data sources, including primary sources that create device records and enrichment sources that add additional data to existing records. It emphasizes finding the right data sources to collect the necessary metrics for effective software license compliance calculations. Standard connectors are available for common inventory and license data sources, while custom connectors can be created for other sources. The Data Coordination Service acts as an out-of-the-box enrichment source to consolidate asset data.
Matthew K. Miller of CA Technologies presented on CA Identity Suite's real-time identity analytics capabilities. The suite provides comprehensive dashboards and reports that give insights into identity lifecycles and processes. This allows managers to analyze performance, identify bottlenecks, and ensure service level goals are met. The analytics features also improve productivity and operational excellence across the enterprise.
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...CA Technologies
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Service Operations Insight to Expedite IT Alignment With the Business and Business Service Monitoring
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...CA Technologies
The document discusses how to use the Gateway Migration Utility to manage and migrate configurations between different environments for CA API Gateway. It covers migration concepts like exporting policies and resources, using mappings to define how resources are imported, and templating for environmental resources. The presentation provides an overview of these concepts and demonstrates how to use mappings in the utility to automate the migration process.
The document discusses monitoring the performance of a CA Single Sign-On (SSO) solution. It describes the key aspects that impact SSO performance, including the number of agent connections, worker threads, and latency of tasks like user authentication. Mathematical models are presented showing the relationships between throughput, latency, and threads. The document recommends establishing monitoring of key performance indicators (KPIs) like authorization time, transaction counts, and cache performance to optimize and maintain a high-performing SSO solution. Tools mentioned for monitoring SSO include CA Trace Tool, CA OneView Monitor, CA APM for SSO, and Spylogix.
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...CA Technologies
This document provides an overview and summary of a presentation on integrating CA Project & Portfolio Management (PPM) with Microsoft Project (MSP). The presentation covers what's new in the MSP interface in recent CA PPM releases, including changes to resource pools and custom view saving. It also discusses best practices for default project settings, field mappings, performance tips, and scheduling considerations for the integration. Specific objects like tasks, resources, and assignments are mapped between the two systems.
Pre-Con Ed: Better Big Data Analytics with CA Workload Automation for HadoopCA Technologies
The document discusses how CA Workload Automation Advanced Integration for Hadoop can be used to integrate Hadoop with traditional workload automation jobs. It provides instructions on installing and configuring the software, describes the types of Hadoop jobs that can be automated including HDFS, Hive, Pig and Sqoop, and provides examples of defining HDFS, Sqoop, Pig and other Hadoop jobs that can then be integrated into workload automation workflows and schedules. The integration allows big data analytics workflows running on Hadoop to be managed alongside other workload automation jobs.
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyCA Technologies
This document summarizes a presentation about making deployments of the CA Identity Suite incredibly easy. It discusses using the CA Identity Suite Virtual Appliance to install and integrate the full Identity Suite in under 30 minutes. It also discusses using Deployment Xpress to easily deploy use cases within the Identity Suite with just a few clicks by selecting from a marketplace of available use cases. The presentation includes demos of both the virtual appliance and Deployment Xpress.
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
This document summarizes a presentation about governing privileged access using CA Identity Suite. It discusses the need for privileged access governance to improve security and compliance. CA Identity Suite provides automated provisioning, access certification, and access requests to help customers implement an enterprise-wide approach to privileged access management. The presentation demonstrates how CA Identity Suite integrates with CA Privileged Access Management to provide a one stop shop for identity services.
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsCA Technologies
This hands-on lab will provide experience with CA Workload Automation advanced integration agents for Hadoop, Informatica, and MSSQL Server. Attendees will learn about the capabilities of these agents and use them to create automated business processes. The lab overview outlines creating a business process using agent job types, initiating the process, and troubleshooting any failures.
CA Project & Portfolio Management: Business IntelligenceCA Technologies
The document discusses best practices for business intelligence reporting in CA PPM. It provides an overview of the different reporting options in CA PPM, including portlets, dashboards, ad hoc views, ad hoc reports, Jaspersoft reports, and additional third party reporting tools. It then covers key features of advanced reporting in CA PPM, considerations and challenges, and best practices. Some of the challenges discussed are limitations of domains for advanced queries, inability to migrate ad hoc views between environments for SaaS customers, and performance impacts of including unnecessary fields in ad hoc views. The document aims to help both business information providers and consumers get the most out of PPM reporting.
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
The document discusses how CA identity and access management solutions can help enable and secure Office 365 environments. It describes how CA Single Sign-On can provide single sign-on to Office 365. It also explains how CA Advanced Authentication can enhance security by adding two-factor authentication or risk-based authentication to Office 365 logins. Finally, it covers how CA Identity Manager can automate user provisioning and deprovisioning between identity sources and Office 365.
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
This document summarizes a presentation about CA Identity Service, which is described as a next generation identity-as-a-service solution for hybrid enterprises. It simplifies the workforce experience through single sign-on and self-service access to applications. It can be deployed in a SaaS-first model or integrate with on-premises identity investments. The presentation demonstrates how to federate an application and provides an overview of user provisioning, access management, and security benefits.
TechTalk: API Management and Service Virtualization Working Hand in HandCA Technologies
This document summarizes a tech talk about how CA API Management and CA Service Virtualization can work together. The talk discusses how API Management provides API gateways and portals and Service Virtualization provides virtualized services. It then demonstrates how the two products can be used together, such as providing a directory of virtual services, automatically switching between real and virtual environments, and generating virtual services from transactions on the API gateway.
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
The document discusses the importance of governing privileged user access and reducing security risks. It describes CA's approach to privileged access governance, which involves automating provisioning and de-provisioning of privileged accounts, implementing access requests and access certification processes, and integrating these capabilities with CA Identity Suite for comprehensive user governance across all access types. Integrating identity management and privileged access management allows for improved compliance, security and elimination of product silos.
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...CA Technologies
This document contains the slides from a workshop on policy creation and management using the CA API Gateway. The workshop covers topics such as the basics of policy, policy creation, policy management, and more advanced uses including leveraging external APIs and authorization standards like OAuth and OpenID Connect. The slides include an introduction to the CA API Gateway, what policies are, how to create and manage them, examples of simple policies, and how to integrate APIs with OAuth.
Strategies for DevOps in the API and Microservices WorldCA Technologies
The document discusses strategies for implementing DevOps in an API and microservices environment. It outlines some of the challenges companies face when transitioning to microservices, including lack of agility and dependencies between services. It then provides several strategies for DevOps success, such as starting with a smaller initial project to learn microservices, focusing on reducing the size and dependencies of deliverables to enable faster deployment, and considering replacing rather than upgrading services. The conclusion emphasizes learning to build and deploy small, with attention to dependencies, in order to balance speed, safety and time to market.
Doug Dockery, a senior director at CA Technologies, gave a presentation about implementing Scrum teams effectively. He discussed that while many organizations have implemented Scrum at the team level, they still face problems. His presentation covered ensuring teams execute on the right priorities by connecting their work to business value. The agenda included focusing on team execution, prioritizing by value, and connecting value to execution.
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...CA Technologies
This document discusses how CA Cleanup and CA Identity Governance can help organizations reduce the cost and effort of mainframe security. It provides an overview of how CA Cleanup automates the process of identifying and removing unused and unnecessary access entitlements from the mainframe security database. Implementing CA Cleanup as part of a phased approach is recommended to continuously clean up access rights over time. Role-based access control best practices are also discussed to further streamline access management after an initial cleanup.
The document discusses best practices for portfolio management using CA Project & Portfolio Management (CA PPM). It recommends capturing investment candidates, properly categorizing investments, agreeing on standard metrics and priorities, and tracking investments against business metrics. It outlines steps in portfolio management including identification, categorization, prioritization, balancing, and performance management. The presentation provides an overview of how to use CA PPM to support portfolio management.
CA Project & Portfolio Management Resource Management Best PracticesCA Technologies
The document discusses resource management best practices for project and portfolio management. It covers the four As of resource management: availability, allocations, assignments, and actuals. Availability refers to how much time a resource can work. Allocations represent the agreement between resource and project managers. Assignments are estimates of work. Actuals reconcile time spent against estimates. The document provides examples and recommendations for effectively using these aspects of resource management.
Pre-Con Ed: Covering Your "Assets" - Don't get Caught with Your [Software] Pa...CA Technologies
The document discusses using connectors in CA IT Asset Manager to collect software asset management data from multiple sources. It describes the different types of data sources, including primary sources that create device records and enrichment sources that add additional data to existing records. It emphasizes finding the right data sources to collect the necessary metrics for effective software license compliance calculations. Standard connectors are available for common inventory and license data sources, while custom connectors can be created for other sources. The Data Coordination Service acts as an out-of-the-box enrichment source to consolidate asset data.
Matthew K. Miller of CA Technologies presented on CA Identity Suite's real-time identity analytics capabilities. The suite provides comprehensive dashboards and reports that give insights into identity lifecycles and processes. This allows managers to analyze performance, identify bottlenecks, and ensure service level goals are met. The analytics features also improve productivity and operational excellence across the enterprise.
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...CA Technologies
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Service Operations Insight to Expedite IT Alignment With the Business and Business Service Monitoring
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...CA Technologies
The document discusses how to use the Gateway Migration Utility to manage and migrate configurations between different environments for CA API Gateway. It covers migration concepts like exporting policies and resources, using mappings to define how resources are imported, and templating for environmental resources. The presentation provides an overview of these concepts and demonstrates how to use mappings in the utility to automate the migration process.
The document discusses monitoring the performance of a CA Single Sign-On (SSO) solution. It describes the key aspects that impact SSO performance, including the number of agent connections, worker threads, and latency of tasks like user authentication. Mathematical models are presented showing the relationships between throughput, latency, and threads. The document recommends establishing monitoring of key performance indicators (KPIs) like authorization time, transaction counts, and cache performance to optimize and maintain a high-performing SSO solution. Tools mentioned for monitoring SSO include CA Trace Tool, CA OneView Monitor, CA APM for SSO, and Spylogix.
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...CA Technologies
This document provides an overview and summary of a presentation on integrating CA Project & Portfolio Management (PPM) with Microsoft Project (MSP). The presentation covers what's new in the MSP interface in recent CA PPM releases, including changes to resource pools and custom view saving. It also discusses best practices for default project settings, field mappings, performance tips, and scheduling considerations for the integration. Specific objects like tasks, resources, and assignments are mapped between the two systems.
Pre-Con Ed: Better Big Data Analytics with CA Workload Automation for HadoopCA Technologies
The document discusses how CA Workload Automation Advanced Integration for Hadoop can be used to integrate Hadoop with traditional workload automation jobs. It provides instructions on installing and configuring the software, describes the types of Hadoop jobs that can be automated including HDFS, Hive, Pig and Sqoop, and provides examples of defining HDFS, Sqoop, Pig and other Hadoop jobs that can then be integrated into workload automation workflows and schedules. The integration allows big data analytics workflows running on Hadoop to be managed alongside other workload automation jobs.
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyCA Technologies
This document summarizes a presentation about making deployments of the CA Identity Suite incredibly easy. It discusses using the CA Identity Suite Virtual Appliance to install and integrate the full Identity Suite in under 30 minutes. It also discusses using Deployment Xpress to easily deploy use cases within the Identity Suite with just a few clicks by selecting from a marketplace of available use cases. The presentation includes demos of both the virtual appliance and Deployment Xpress.
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
This document summarizes a presentation about governing privileged access using CA Identity Suite. It discusses the need for privileged access governance to improve security and compliance. CA Identity Suite provides automated provisioning, access certification, and access requests to help customers implement an enterprise-wide approach to privileged access management. The presentation demonstrates how CA Identity Suite integrates with CA Privileged Access Management to provide a one stop shop for identity services.
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsCA Technologies
This hands-on lab will provide experience with CA Workload Automation advanced integration agents for Hadoop, Informatica, and MSSQL Server. Attendees will learn about the capabilities of these agents and use them to create automated business processes. The lab overview outlines creating a business process using agent job types, initiating the process, and troubleshooting any failures.
CA Project & Portfolio Management: Business IntelligenceCA Technologies
The document discusses best practices for business intelligence reporting in CA PPM. It provides an overview of the different reporting options in CA PPM, including portlets, dashboards, ad hoc views, ad hoc reports, Jaspersoft reports, and additional third party reporting tools. It then covers key features of advanced reporting in CA PPM, considerations and challenges, and best practices. Some of the challenges discussed are limitations of domains for advanced queries, inability to migrate ad hoc views between environments for SaaS customers, and performance impacts of including unnecessary fields in ad hoc views. The document aims to help both business information providers and consumers get the most out of PPM reporting.
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
The document discusses how CA identity and access management solutions can help enable and secure Office 365 environments. It describes how CA Single Sign-On can provide single sign-on to Office 365. It also explains how CA Advanced Authentication can enhance security by adding two-factor authentication or risk-based authentication to Office 365 logins. Finally, it covers how CA Identity Manager can automate user provisioning and deprovisioning between identity sources and Office 365.
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
This document summarizes a presentation about CA Identity Service, which is described as a next generation identity-as-a-service solution for hybrid enterprises. It simplifies the workforce experience through single sign-on and self-service access to applications. It can be deployed in a SaaS-first model or integrate with on-premises identity investments. The presentation demonstrates how to federate an application and provides an overview of user provisioning, access management, and security benefits.
TechTalk: API Management and Service Virtualization Working Hand in HandCA Technologies
This document summarizes a tech talk about how CA API Management and CA Service Virtualization can work together. The talk discusses how API Management provides API gateways and portals and Service Virtualization provides virtualized services. It then demonstrates how the two products can be used together, such as providing a directory of virtual services, automatically switching between real and virtual environments, and generating virtual services from transactions on the API gateway.
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
The document discusses the importance of governing privileged user access and reducing security risks. It describes CA's approach to privileged access governance, which involves automating provisioning and de-provisioning of privileged accounts, implementing access requests and access certification processes, and integrating these capabilities with CA Identity Suite for comprehensive user governance across all access types. Integrating identity management and privileged access management allows for improved compliance, security and elimination of product silos.
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...CA Technologies
This document contains the slides from a workshop on policy creation and management using the CA API Gateway. The workshop covers topics such as the basics of policy, policy creation, policy management, and more advanced uses including leveraging external APIs and authorization standards like OAuth and OpenID Connect. The slides include an introduction to the CA API Gateway, what policies are, how to create and manage them, examples of simple policies, and how to integrate APIs with OAuth.
Strategies for DevOps in the API and Microservices WorldCA Technologies
The document discusses strategies for implementing DevOps in an API and microservices environment. It outlines some of the challenges companies face when transitioning to microservices, including lack of agility and dependencies between services. It then provides several strategies for DevOps success, such as starting with a smaller initial project to learn microservices, focusing on reducing the size and dependencies of deliverables to enable faster deployment, and considering replacing rather than upgrading services. The conclusion emphasizes learning to build and deploy small, with attention to dependencies, in order to balance speed, safety and time to market.
Doug Dockery, a senior director at CA Technologies, gave a presentation about implementing Scrum teams effectively. He discussed that while many organizations have implemented Scrum at the team level, they still face problems. His presentation covered ensuring teams execute on the right priorities by connecting their work to business value. The agenda included focusing on team execution, prioritizing by value, and connecting value to execution.
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...CA Technologies
This document discusses how CA Cleanup and CA Identity Governance can help organizations reduce the cost and effort of mainframe security. It provides an overview of how CA Cleanup automates the process of identifying and removing unused and unnecessary access entitlements from the mainframe security database. Implementing CA Cleanup as part of a phased approach is recommended to continuously clean up access rights over time. Role-based access control best practices are also discussed to further streamline access management after an initial cleanup.
The document discusses best practices for portfolio management using CA Project & Portfolio Management (CA PPM). It recommends capturing investment candidates, properly categorizing investments, agreeing on standard metrics and priorities, and tracking investments against business metrics. It outlines steps in portfolio management including identification, categorization, prioritization, balancing, and performance management. The presentation provides an overview of how to use CA PPM to support portfolio management.
CA Project & Portfolio Management Resource Management Best PracticesCA Technologies
The document discusses resource management best practices for project and portfolio management. It covers the four As of resource management: availability, allocations, assignments, and actuals. Availability refers to how much time a resource can work. Allocations represent the agreement between resource and project managers. Assignments are estimates of work. Actuals reconcile time spent against estimates. The document provides examples and recommendations for effectively using these aspects of resource management.
The document discusses application portfolio management in mining and presents a classification reference model mapping vendor solutions to business capabilities. It begins by covering application portfolio management and the need for an industry reference model given the specialized nature of mining applications. An application classification model is then developed by researching 91 vendors and 323 applications. The model maps applications across 5 levels based on their purpose. Finally, the document explores how the reference model can be used for customer rationalization, analyzing vendor solution spread, and vendor comparison.
Learn How CA Services Can Help You Optimize Your PPM JourneyCA Technologies
The document discusses how CA Services can help customers optimize their project portfolio management (PPM) journey. It outlines an agenda for a session that will discuss techniques for gaining adoption and growing PPM maturity. Topics include on-premise vs software as a service (SaaS) solutions, value realization roadmaps, and maturity assessments. The presentation emphasizes that defining business outcomes drives adoption and value. It recommends customers work with CA Services to conduct assessments, develop a migration plan with the right focus areas, and communicate effectively throughout the process to optimize their PPM solution journey.
CA PPM 15.1 Panel Session: Improving Customers’ Lives With the Latest ReleaseCA Technologies
The document summarizes a panel session on improving customers' lives with the latest release of CA PPM 15.1. The panel will discuss how CA PPM 15.1 provides adaptive project management capabilities to deliver simplicity and accessibility. Customers will share how 15.1 has benefited their business. CA experts will discuss how existing customers can upgrade and utilize the new features. The session will also include a demonstration of the new adaptive project management features in 15.1 and a panel discussion.
Case Study: From Excel to PPM – IDEXX’s Move to Better Manage Its BusinessCA Technologies
IDEXX Laboratories moved from managing its $30 million project portfolio in Excel spreadsheets to using CA Project & Portfolio Management (CA PPM) to gain better visibility and management. With CA PPM, IDEXX can now manage the intake, planning, and critical resource decisions for its IT project portfolio. The implementation was phased and helped IDEXX adopt capabilities like time reporting, resource management, and full portfolio planning to overcome previous challenges.
Case Study: Learn how Standard Chartered Bank used training, advocacy and the...CA Technologies
Case Study: Learn how Standard Chartered Bank used training, advocacy and the right change management approach to get 17,000 users in business and IT to adopt the latest CA PPM solutions
4.16.2013 Prj & Port Mgmt SftDev - What is Application Portfolio Management -...IBM Rational
Series Name: Project and Portfolio Management Software Development
Webcast Title: What is Application Portfolio Management - For Governance & Compliance
Date: 4.16.2013
Presenter: Per Kroll
Pre-Con Ed: CA Project & Portfolio Management: The Lost Art of User AdoptionCA Technologies
The document discusses the importance of user adoption for project and portfolio management (PPM) solutions. It notes that while companies spend money implementing PPM tools, user adoption is often overlooked, leading to low usage of the tools and poor data quality. The document outlines some of the common challenges to user adoption, such as designing tools in a vacuum without user input. It then provides recommendations for improving adoption through leadership support, effective communication, training programs tailored to different user types, and creating a positive environment for users.
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...CA Technologies
Exelon upgraded their CA PPM solution to address growing data volumes, increased processing times, and the need to migrate additional utilities onto the platform. The upgrade involved migrating to the latest CA PPM version, offloading legacy data to a new archival database to reduce transactional data sizes and improve reporting speeds, and implementing an annual archival process to stay on supported versions. The upgraded solution improved processing times, reduced data volumes by 60%, and positioned the Work Planning and Tracking platform to be used across all Exelon utilities.
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITBob Rhubart
The document discusses Oracle Enterprise Architecture and IT-as-a-Service. It provides the NIST definition of cloud computing which describes cloud models as enabling on-demand access to shared configurable computing resources that can be rapidly provisioned. The definition notes the essential characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also lists the common cloud service models of SaaS, PaaS, and IaaS and deployment models of public cloud, private cloud, community cloud, and hybrid cloud. Finally, it outlines how cloud computing impacts different layers of IT architecture from a business, application, information, and technology perspective.
Pre-Con Ed: Deeper Performance Insights with CA Cross-Enterprise APMCA Technologies
CA Cross-Enterprise APM provides end-to-end visibility of application performance across distributed and mainframe environments. It allows users to see transactions across mobile, web, and mainframe components. The presentation discusses how to configure CA SySView on the mainframe to integrate with CA Cross-Enterprise APM to provide metrics and transaction tracing across environments. It also overviewed some of the dashboards and tracing capabilities in CA Cross-Enterprise APM to analyze performance issues.
Roadmap Session: Achieve DevOps on the Mainframe for Faster Time to MarketCA Technologies
This document summarizes a presentation about achieving DevOps on the mainframe for faster time to market. It discusses how mainframes play a critical role in digital transformation. It then outlines CA's end-to-end mainframe DevOps solution, which spans development, testing, deployment, and operations. The solution is designed to improve business agility through reduced time to market and maintenance time. It also demonstrates continuous development, testing and delivery capabilities. The presentation recommends related sessions and demos at the conference.
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...CA Technologies
This document provides an overview of key features in CA Release Automation, including artifact-driven deployments, shared components, environments, and environment tokens. It demonstrates how these features can be used to optimize continuous delivery practices by providing flexibility, reusability, and environment-specific configuration. The presentation includes definitions of each feature and how they benefit release automation, as well as best practices for implementing them.
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
This document summarizes a presentation about tips and tricks for using CA Workload Automation DE. It discusses customizing the desktop client by setting defaults for objects, using the monitoring view search feature, useful reporting tips, maintaining DE server logs, and recommended documentation. The presentation provides demonstrations of these tips and tricks and recommends related sessions to attend.
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...CA Technologies
Pre-Con Education: Changing End Points Getting You Down While Trying to Create and Consume Virtual Services? Using CA APIM and CA Service Virtualization Together
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...CA Technologies
Williams established a DevOps model based on Gartner's layered testing strategy using CA Technologies tools. Gartner recommends shifting testing left by focusing on business logic testing using mocking, service virtualization, and reusable scripts. This reduces GUI testing and allows teams to get quality products to market more quickly. Williams implemented Agile Requirements Designer to design test cases, Test Data Manager for data virtualization, and AppTest for test automation to achieve continuous integration based on Gartner's strategy.
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...CA Technologies
This document discusses application performance management (APM) and how CA APM provides a comprehensive view of the end user experience and underlying application performance across environments. It describes how CA APM monitors transactions from end users and devices through networks, servers, databases and other components to understand performance from both an outside-in and inside-out perspective. Finally, it highlights research showing that CA APM helps organizations speed up issue triage and improve user experiences compared to other APM solutions.
Organizational and Technical Strategies for Achieving the Lean-Agile EnterpriseCA Technologies
Francis Kelly discusses organizational and technical strategies for achieving the lean agile enterprise. He outlines the need for leadership to embrace lean-agile mindsets and values, implement lean-agile practices such as SAFe, and lead the implementation to achieve business results like faster time to market and increased productivity. Specifically, he discusses applying practices at the team, program, and portfolio levels to synchronize flow and maximize value delivery.
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
This document summarizes a presentation about tips and tricks for using CA Workload Automation DE Edition. It discusses customizing the desktop client by setting defaults, using the monitoring view search feature, useful reporting tips, maintaining DE server logs, and recommended documentation. The presentation provides demonstrations of these tips to help attendees more effectively use scheduling, reporting, and other features of CA Workload Automation DE.
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...CA Technologies
This document discusses how CA App Experience Analytics can be used to monitor websites and analyze customer experience. It describes how JavaScript injection allows the tool to collect analytics from user browsers. The presentation then demonstrates how to quickly set up monitoring for a new web app by adding it in the CA AXA console and inserting a code snippet. Users can view collected analytics to help optimize customer journeys and improve digital performance.
Pre-Con Ed: CA API Gateway: Developing Custom Policies to Secure Your Enterpr...CA Technologies
This document summarizes a presentation about developing custom policies to secure enterprise APIs using CA API Gateway. The presentation covers an introduction to services, policies, and assertions in API Gateway and how they are used to secure APIs. It then demonstrates securing an API in a live demo and discusses performance considerations and troubleshooting policies. The agenda includes introductions to core concepts, securing an API, performance factors, and troubleshooting.
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...CA Technologies
This document provides an overview of a presentation on CA App Experience Analytics. The presentation discusses how the app economy is transforming customer experiences and the importance of optimizing the omnichannel customer experience. It also summarizes CA App Experience Analytics' key capabilities, which include user experience analytics, performance analytics, and data visualization tools. The benefits highlighted are improved user experiences, faster resolution times, and increased development productivity.
Tech Talk: Want to get in on the Secret? How fast is your Directory?CA Technologies
Greg Vickery from CA Technologies presented on CA Directory performance. He discussed why performance is important for directory services, how CA Directory has consistently outperformed competitors in testing, and factors that influence performance such as hardware, configuration, and operations. Vickery also covered advanced replication features in CA Directory that ensure fast and accurate data synchronization across servers.
Tracking Message Flows in DataPower With CA APMCA Technologies
The document discusses tracking message flows through IBM DataPower gateway appliances. It provides an introduction to DataPower appliances and how they are used. It then discusses how to monitor performance metrics on DataPower to troubleshoot issues. Finally, it explains how to instrument DataPower transactions by creating tracking events within processing policies, and sending those events to an external monitoring point to analyze transaction workflows.
Hands-On Lab: Master REST APIs in CA Application Performance ManagementCA Technologies
This document discusses automating the deployment of CA Application Performance Management (CA APM) agents using REST APIs. It describes how a QA engineer named Julie wants to simplify agent management. It outlines retrieving an agent package from the CA APM Command Center using REST calls, preparing a PowerShell script to download and extract the package, and executing the script to automate agent deployment. The goal is to demonstrate how to harness the Command Center APIs to manage CA APM agents through integration with deployment tools.
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...CA Technologies
Coty uses various CA tools like CA Service Operations Insight, CA APM, CA Spectrum, and CA Performance Management to transform their operations from event management to service operations management. Dan Ellsweig from Coty discusses how they built their production environment using these CA tools to monitor their global infrastructure across various platforms. He also briefly discusses Coty's evolution and their vision for the future of their operations.
Similar to Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Application Portfolio Management Accelerator (20)
In medicine - an MRI can quickly reveal a hidden ailment and actionable insight to get better. For IT and business leaders whose key concern with the mainframe is the platform costs and lean operations - the CA Mainframe Resource Intelligene reveals multiple sources of hidden mainframe costs and operational inefficiencies along with actionable recommendations.View this slideshare to understand how this new SaaS offering from CA brings together automation, speed, analytics and mainframe expertise of 40+ years. CA Mainframe Resource Intelligence reports answer your CIO’s toughest questions about mainframe optimization and potential for digital transformation.
For more information, please contact your account director or mainframe specialist at:
http://ow.ly/PALG50htHgF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
For more information on Mainframe, please visit: http://ow.ly/GwKO50gkixl
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Here at CA Technologies, our development teams share many of the same challenges producing quality software as our customers.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
This session will cover how The Home Depot built quality into its software development as it migrated from waterfall to agile delivery.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Privileged Access in a World on TimeCA Technologies
Today there are more privileged users than ever before. Providing access is not optional it is a business necessity. But how do you avoid excessive access? Providing the right access at the right time is the formula for reducing your risk and securing a world of data. At FedEx empowering the right people at the right time is not only good business, but it's also good security.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
As one of the most forward thinking critical infrastructure companies in the UK, SGN is blazing a trail by becoming the first UK critical infrastructure company to run 100% in the cloud and using innovative IoT technologies to revolutionize the management of gas pipelines. To manage the risk, SGN embarked on a mission to shape the attack path of intruders. In this session, Mo Ahddoud, CISO at SGN will share how he used a technique called attack path mapping to put privileged access at the center of SGN's digital transformation.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
Around the globe, citizens are demanding 24/7 access to government, and this is driving a dramatic re-architecture of public services putting citizens in control, increasing participation and access to services. From two different parts of the world, The State of Louisiana & The State of Amazonas in Brazil have both become centers for innovation. In this session, they will share and demonstrate how they are designing a government built to change and breaking down silos to make the citizen the center of government.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Keynote: Making Security a Competitive AdvantageCA Technologies
Keynote: Making Security a Competitive Advantage
For more information on Security, please visit: http://cainc.to/CAW17-Security
For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps For more information on Veracode, please visit: http://community.veracode.com
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Providers Can Capitalize
For more information on MSP, please visit: http://ow.ly/CrAA50gbyfJ
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational Efficiency and Scalability
For more information on MSP, please visit: http://ow.ly/oQ1o50gby0m
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting Your Customer’s Modern Software Factory
For more information on MSP, please visit: http://ow.ly/kWsH50gbxYh
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformation Play for Service Providers
For more information: Download the white paper, “Five Technologies for the Built-to-Change Business—and How You Can Monetize Them” at: https://www.ca.com/content/dam/ca/us/files/white-paper/five-technologies-built-to- change-business.pdf
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
Stay connected at: http://ow.ly/d0f350g68Bq Thank you.
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
In this roadmap session, join us to explore how bleeding-edge data science algorithms are now being incorporated in real life into CA Mainframe Operational Intelligence to better predict performance issues and prevent costly downtime and capacity spikes across the IT landscape. See how you can get real-time insight to what may happen sooner and in-depth guidance on what you should do about it. And, learn how to use open tools that can pull in data feeders from other systems, to improve results. Whether you’re a mainframe novice or a seasoned operations expert, you'll find new tools can improve your SLA performance, MTTR and more.
For more information on Mainframe, please visit: http://ow.ly/pbDM50g68zT
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
With great power comes great responsibility. Mainframes have both: the power of data and transactions that run the application economy, and the responsibility to keep that data protected. Join this roadmap session to learn from CA data privacy leaders and see the future of the data-centric security strategy, covering key products such as CA Data Content Discovery for z/OS, CA Compliance Event Manager and more. Learn how to enhance your data privacy and simplify regulatory compliance, plus get a view into the roadmap of what's to come in the mainframe security and compliance portfolio.
For more information on Mainframe, please visit: http://ow.ly/Ik2H50g66cN
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
The promise of blockchain, or specifically distributed ledger technology, has captured the attention of business and IT leaders across multiple industries. Now is the time to move from hype to reality. This session will examine use cases of pioneering companies that apply blockchain in a multi-party entity environment with immutable smart contracts. We’ll share how some DevSecOps requirements are fundamentally different for blockchain pilots and full deployment—from getting started with the right development environment to concerns of security, encryption and operational visibility. We will also discuss integration of blockchain with existing systems of record and the use of shadow blockchain as an evolutionary step towards adoption. Join this session to learn more about developing, deploying, and securing blockchain.
For more information on Mainframe, please visit: http://ow.ly/VnBh50g66bO
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
The document discusses how establishing digital trust can help companies become digital enterprises. It outlines barriers that companies face in areas like ensuring resources, assuring systems, delivering digital experiences, verifying people, and protecting data. The document provides best practices and CA technologies that can help companies optimize their platforms, assure systems through tools like AI and automation, deliver digital experiences through DevSecOps, verify people with identity management, and protect data with discovery tools. Following these practices can help companies transform to digital enterprises by establishing digital trust.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?