Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's AheadCA Technologies
The document discusses CA Endevor SCM Version 18. Key highlights include enhanced support for Java applications with long filenames, a focus on IT audit concerns, additional capabilities in the Eclipse user interface, streamlined web services implementation, and improvements to integration with Natural. Deprecated components were also removed to reduce overhead. The release was delivered incrementally over multiple feature packages, with a planned "GA-Complete" designation in early 2017. Recommended sessions and demos at the conference are also listed.
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...CA Technologies
This document discusses the role of software configuration management (SCM) in agile development methodology using CA Endevor. It begins with an overview of agile principles like collaboration over process and developing iteratively. It then discusses how SCM supports agile processes through features like branching and change control. The presentation explains how administrators can adapt Endevor's capabilities to their specific processes and transition development teams to agile at their own pace. It emphasizes that continuous engagement between teams and administrators breeds success with agile adoption.
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationCA Technologies
This document discusses several integrations between CA OPS/MVS and other CA products:
1. CA Automation Point integration allows bi-directional communication and automation between mainframe and distributed environments.
2. CA SYSVIEW integration enables CA OPS/MVS to receive performance alerts and gather data using SYSVIEW commands.
3. CA Workload Automation integrations allow scheduling information and events to be shared between ESP Edition, CA 7 Edition, and CA OPS/MVS for coordinated automation.
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...CA Technologies
The document discusses CA's real-time data audit and security solutions for mainframes, CA Data Content Discovery and CA Compliance Event Manager. CA Data Content Discovery scans mainframe data stores to find and classify regulated and sensitive data. CA Compliance Event Manager monitors mainframe security events and configuration changes in real time to detect vulnerabilities and policy violations. It also provides audit logging, reporting, and forensic capabilities. The solutions help customers improve compliance, reduce data security risks, and gain visibility into sensitive data and privileged user activity on the mainframe.
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...CA Technologies
CA InterTest and CA SymDump are mainframe debugging and fault management tools that provide interactive debugging and fault analysis reports. Release 10 includes streamlined installation into a single package, a combined Eclipse-based graphical user interface, support for new compilers and platforms, and enhanced debugging capabilities like save/restore of debugging commands. It aims to simplify use of the tools and integration with other CA solutions.
This document provides an overview of the CA Spool parameter file CAIQPARM, which allows customization of CA Spool settings. It discusses recommended settings for checkpoint data sets, spool data sets, the file transfer interface including XFER parameters, subsystem interface settings, and XEQOPT parameters. The presentation aims to help attendees more efficiently implement CA Spool features in their own environments.
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's AheadCA Technologies
The document discusses CA Endevor SCM Version 18. Key highlights include enhanced support for Java applications with long filenames, a focus on IT audit concerns, additional capabilities in the Eclipse user interface, streamlined web services implementation, and improvements to integration with Natural. Deprecated components were also removed to reduce overhead. The release was delivered incrementally over multiple feature packages, with a planned "GA-Complete" designation in early 2017. Recommended sessions and demos at the conference are also listed.
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...CA Technologies
This document discusses the role of software configuration management (SCM) in agile development methodology using CA Endevor. It begins with an overview of agile principles like collaboration over process and developing iteratively. It then discusses how SCM supports agile processes through features like branching and change control. The presentation explains how administrators can adapt Endevor's capabilities to their specific processes and transition development teams to agile at their own pace. It emphasizes that continuous engagement between teams and administrators breeds success with agile adoption.
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationCA Technologies
This document discusses several integrations between CA OPS/MVS and other CA products:
1. CA Automation Point integration allows bi-directional communication and automation between mainframe and distributed environments.
2. CA SYSVIEW integration enables CA OPS/MVS to receive performance alerts and gather data using SYSVIEW commands.
3. CA Workload Automation integrations allow scheduling information and events to be shared between ESP Edition, CA 7 Edition, and CA OPS/MVS for coordinated automation.
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...CA Technologies
The document discusses CA's real-time data audit and security solutions for mainframes, CA Data Content Discovery and CA Compliance Event Manager. CA Data Content Discovery scans mainframe data stores to find and classify regulated and sensitive data. CA Compliance Event Manager monitors mainframe security events and configuration changes in real time to detect vulnerabilities and policy violations. It also provides audit logging, reporting, and forensic capabilities. The solutions help customers improve compliance, reduce data security risks, and gain visibility into sensitive data and privileged user activity on the mainframe.
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...CA Technologies
CA InterTest and CA SymDump are mainframe debugging and fault management tools that provide interactive debugging and fault analysis reports. Release 10 includes streamlined installation into a single package, a combined Eclipse-based graphical user interface, support for new compilers and platforms, and enhanced debugging capabilities like save/restore of debugging commands. It aims to simplify use of the tools and integration with other CA solutions.
This document provides an overview of the CA Spool parameter file CAIQPARM, which allows customization of CA Spool settings. It discusses recommended settings for checkpoint data sets, spool data sets, the file transfer interface including XFER parameters, subsystem interface settings, and XEQOPT parameters. The presentation aims to help attendees more efficiently implement CA Spool features in their own environments.
Pre-Con Ed: Webhooks & Continuous Feedback with CA Application Lifecycle Cond...CA Technologies
This document discusses how CA Application Lifecycle Conductor (ALC) uses webhooks and a new event broker component to enable continuous feedback between different tools in the software development lifecycle. The event broker allows ALC to consume webhooks from various sources in a standardized way and produce webhooks to trigger actions in other tools. It also discusses how the mainframe webhook server enables mainframe tools like CA Endevor to produce webhooks to integrate with the rest of the DevOps toolchain.
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your OrganizationCA Technologies
This document summarizes an interactive session on mainframe DevOps practices. It discusses trends toward more agile development like daily/weekly releases and automated deployments. It prompts attendees to discuss challenges like onboarding new developers and modernizing testing. Examples include evolving test automation and management as well as application architectures using APIs. The session aims to share experiences and build a community around mainframe DevOps transformations.
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersCA Technologies
This presentation discusses improving mainframe performance event response times (MTTR) using CA SYSVIEW. Currently, responding to events takes a long time as different tools must be checked. The presentation proposes consolidating monitoring data from multiple tools into a single Mainframe Team Center view. This would allow faster triaging by providing relevant data in one place. It could also link metrics and configuration changes to help diagnose issues. Additional improvements like automated detection of abnormal patterns and simplified interfaces are suggested to further reduce MTTR. An interactive demo is provided.
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
This document provides an overview of new features and enhancements in CA Workload Automation ESP Edition 11.4. Key updates include improved zIIP processor support, performance metrics, Mainframe 2.0 compliance, and integration with CA OPS/MVS Event Management. Continuous delivery is used to deliver ongoing enhancements through incremental updates. Over 35 enhancements have already been delivered via PTF to the 11.4 base release.
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...CA Technologies
This document discusses new enhancements in CA Top Secret and CA ACF2, which are mainframe security products from CA Technologies. It begins with an agenda and overview of external security managers. Then it outlines upcoming end of support dates for some older versions of the products. The bulk of the document contrasts "the old" features with "the new" enhancements in recent versions. The enhancements provide improved compliance, auditing, role-based access control, password security, storage optimization, and administrative control capabilities.
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsCA Technologies
This document summarizes a presentation about advanced security controls in CA Top Secret and CA ACF2. It discusses the new CASECAUT resource class and how it can be used to control administrative functions at a granular level, such as restricting which users can modify passwords for other users. It provides examples of the specific authorizations needed to change password fields, bypass new password restrictions, manage digital certificates and keyrings, run utilities, and more. It also covers new granular controls for certificate administration using RDATALIB classes.
This document summarizes a presentation about migrating COBOL programs to version 5 and beyond. The presentation discusses what is new in COBOL 5, why migrations are difficult, and provides suggestions and best practices for testing programs during migration. It recommends attending other sessions at the conference on mainframe application development and DevOps.
Pre-Con Ed: CA View and CA Deliver Analytics Deep DiveCA Technologies
This document provides an overview of reporting tools available in CA View and CA Deliver. It discusses SARGRW and RMOGRW, which are reporting tools that can extract data about CA View and CA Deliver respectively. It provides examples of how these tools can be used to report on items like reports stored by application, backdated reports, job run times, and which jobs and reports are associated with different distribution IDs. The document also mentions other tools like SARBCH, CA Metric, SARTCHK, RMORPT, and RMORXB that can also generate reports for monitoring and analytics. An demo of running SARGRW and RMOGRW is included to illustrate sample report outputs.
The document discusses CA's Advanced Authentication Mainframe product. It introduces CA Advanced Authentication Mainframe, which provides two-factor authentication for mainframe access using RSA SecurID tokens, IBM Multi-Factor Authentication, and PIV/CAC smartcards. The architecture allows authentication to be integrated with CA's ESM products ACF2 and Top Secret. It also supports authentication fall back to passwords.
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IICA Technologies
This document provides an overview of the DBUTLTY utility in CA Datacom. It describes DBUTLTY as the batch program used to perform all utility functions for databases and system areas. The document outlines the major functions of DBUTLTY, including system area maintenance, CXX database definition maintenance, multi-user control, data handling, reporting, recovery, accounting, error handling, and resource measurement and monitoring. It provides examples of important DBUTLTY commands and tasks.
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...CA Technologies
The document discusses how digital transformation initiatives are redefining the role of IT operations. As companies adopt new technologies like cloud, analytics, microservices and software-defined networks, IT operations faces greater complexity in monitoring applications and infrastructure. This introduces more monitoring challenges and blind spots. The presentation argues that IT operations must adopt new approaches using predictive analytics to correlate user experiences, applications and infrastructure insights. It provides examples of how CA technologies help organizations achieve this through application performance management and infrastructure monitoring solutions.
Mainframe Application Modernization for Enterprise DevelopersCA Technologies
The document discusses mainframe application modernization using CA Gen. It notes that many organizations depend on legacy enterprise applications built in COBOL. The challenges are modernizing these complex applications quickly enough. Renewal is presented as a lower-risk approach to modernization compared to rewriting or replacing applications. CA Gen is described as an agile development tool that can accelerate modernization by transforming existing COBOL applications into the CA Gen environment through an automated extraction, analysis, refactoring and transformation process.
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create ReportsCA Technologies
The document discusses new features in CA SYSVIEW Performance Management that allow users to quickly and easily create reports and dashboards. Specifically, it mentions new out-of-the-box dashboards in Mainframe Team Center - Management that provide immediate value. It also demonstrates how to modify sample dashboards and view groups of CICS regions in dashboards. Enhanced documentation for reporting in CA SYSVIEW 14.24 is highlighted as well.
Hands-On Lab: CA OPS/MVS and System State ManagerCA Technologies
This document provides an abstract and agenda for a hands-on lab session about CA OPS/MVS and System State Manager. The session will apply skills from a previous class to set up a new system and configure resources using the new policy-based resource management introduced in CA OPS/MVS version 12.3. Attendees will learn how CA OPS/MVS manages mainframe resources through System State Manager with policy-based, cross-system resource management. Recommended related sessions and demos are also listed.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.CA Technologies
This document discusses API testing in a headless world where many modern APIs don't have user interfaces. It describes how following the user's journey through an application can provide more robust tests by testing the APIs that support the user interface. The presentation covers finding APIs, generating API tests automatically based on the order of APIs in the user journey, handling dynamic test data, and extending and embedding tests. It demonstrates these concepts using CA technologies for API discovery, test generation, and test customization.
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?CA Technologies
The document discusses testing applications that use a service bus. It notes that while the service bus provides a nice interface for clients, it makes testing difficult due to the complex connections ("spaghetti") behind the scenes. It recommends taking a incremental approach to testing by first focusing on component testing using service virtualization to eliminate dependencies, and then working towards more full end-to-end testing. The presentation provides strategies for establishing a stable and predictable testing environment to effectively test applications that incorporate a service bus.
What's New in CA Agile Requirements Designer?CA Technologies
The document provides an overview and agenda for a presentation on the new features in CA Agile Requirements Designer. It discusses the ability to now generate automation scripts, test data, and virtual endpoints directly from requirements and test cases stored as flows. It also covers new capabilities for risk-based testing using live system data to optimize test paths, and expanded integrations with tools like Jira, CA Agile Central, and HP ALM. Finally, it outlines upcoming features for data generation and management using a new DataBuilder tool, and storing test artifacts in big data cloud storage.
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...CA Technologies
This document summarizes a presentation about how CA Process Automation can help bridge the gap from alert suppression to mean time to resolution (MTTR) through enterprise orchestration. It discusses key IT trends, defines problems with current incident management processes, and how CA Process Automation introduces repeatability, consistency, and automation to improve MTTR. The presentation demonstrates how CA Process Automation integrates systems and orchestrates processes to streamline incident response and management. Customer case studies show how CA Process Automation helped lower costs and improve efficiencies.
Tracking Message Flows in DataPower With CA APMCA Technologies
The document discusses tracking message flows through IBM DataPower gateway appliances. It provides an introduction to DataPower appliances and how they are used. It then discusses how to monitor performance metrics on DataPower to troubleshoot issues. Finally, it explains how to instrument DataPower transactions by creating tracking events within processing policies, and sending those events to an external monitoring point to analyze transaction workflows.
CA Gen Updates: Application Modernization and What's NewCA Technologies
The document discusses upcoming changes and new features in CA Gen releases 8.5 and 8.6. Key highlights include:
- Inline code statements that allow native 3GL code or SQL in the model for more flexibility.
- Web services consumption functionality to easily integrate with modern APIs by calling SOAP web services from action diagrams.
- Distributed applications will be easier to upgrade in release 8.6 by installing only the latest CA Gen runtimes instead of regenerating applications.
- A free limited edition of CA Gen will be available for training and education purposes.
From Fantasy to Reality: Mobile to Mainframe Infrastructure VisibilityCA Technologies
This document summarizes a presentation about providing comprehensive infrastructure visibility across mobile, distributed, mainframe, and cloud environments using CA Unified Infrastructure Manager (CA UIM) for zSystems. The presentation discusses addressing the "silo" problem where different parts of an IT infrastructure are monitored separately, describes the state of the art in unified monitoring with CA UIM, and provides three use cases for how CA UIM can help operations managers by providing simplified lights-out management of mainframes, enabling non-mainframe experts to assist with triaging issues, and helping optimize mainframe costs through performance visibility.
Pre-Con Ed: Webhooks & Continuous Feedback with CA Application Lifecycle Cond...CA Technologies
This document discusses how CA Application Lifecycle Conductor (ALC) uses webhooks and a new event broker component to enable continuous feedback between different tools in the software development lifecycle. The event broker allows ALC to consume webhooks from various sources in a standardized way and produce webhooks to trigger actions in other tools. It also discusses how the mainframe webhook server enables mainframe tools like CA Endevor to produce webhooks to integrate with the rest of the DevOps toolchain.
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your OrganizationCA Technologies
This document summarizes an interactive session on mainframe DevOps practices. It discusses trends toward more agile development like daily/weekly releases and automated deployments. It prompts attendees to discuss challenges like onboarding new developers and modernizing testing. Examples include evolving test automation and management as well as application architectures using APIs. The session aims to share experiences and build a community around mainframe DevOps transformations.
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersCA Technologies
This presentation discusses improving mainframe performance event response times (MTTR) using CA SYSVIEW. Currently, responding to events takes a long time as different tools must be checked. The presentation proposes consolidating monitoring data from multiple tools into a single Mainframe Team Center view. This would allow faster triaging by providing relevant data in one place. It could also link metrics and configuration changes to help diagnose issues. Additional improvements like automated detection of abnormal patterns and simplified interfaces are suggested to further reduce MTTR. An interactive demo is provided.
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
This document provides an overview of new features and enhancements in CA Workload Automation ESP Edition 11.4. Key updates include improved zIIP processor support, performance metrics, Mainframe 2.0 compliance, and integration with CA OPS/MVS Event Management. Continuous delivery is used to deliver ongoing enhancements through incremental updates. Over 35 enhancements have already been delivered via PTF to the 11.4 base release.
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...CA Technologies
This document discusses new enhancements in CA Top Secret and CA ACF2, which are mainframe security products from CA Technologies. It begins with an agenda and overview of external security managers. Then it outlines upcoming end of support dates for some older versions of the products. The bulk of the document contrasts "the old" features with "the new" enhancements in recent versions. The enhancements provide improved compliance, auditing, role-based access control, password security, storage optimization, and administrative control capabilities.
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsCA Technologies
This document summarizes a presentation about advanced security controls in CA Top Secret and CA ACF2. It discusses the new CASECAUT resource class and how it can be used to control administrative functions at a granular level, such as restricting which users can modify passwords for other users. It provides examples of the specific authorizations needed to change password fields, bypass new password restrictions, manage digital certificates and keyrings, run utilities, and more. It also covers new granular controls for certificate administration using RDATALIB classes.
This document summarizes a presentation about migrating COBOL programs to version 5 and beyond. The presentation discusses what is new in COBOL 5, why migrations are difficult, and provides suggestions and best practices for testing programs during migration. It recommends attending other sessions at the conference on mainframe application development and DevOps.
Pre-Con Ed: CA View and CA Deliver Analytics Deep DiveCA Technologies
This document provides an overview of reporting tools available in CA View and CA Deliver. It discusses SARGRW and RMOGRW, which are reporting tools that can extract data about CA View and CA Deliver respectively. It provides examples of how these tools can be used to report on items like reports stored by application, backdated reports, job run times, and which jobs and reports are associated with different distribution IDs. The document also mentions other tools like SARBCH, CA Metric, SARTCHK, RMORPT, and RMORXB that can also generate reports for monitoring and analytics. An demo of running SARGRW and RMOGRW is included to illustrate sample report outputs.
The document discusses CA's Advanced Authentication Mainframe product. It introduces CA Advanced Authentication Mainframe, which provides two-factor authentication for mainframe access using RSA SecurID tokens, IBM Multi-Factor Authentication, and PIV/CAC smartcards. The architecture allows authentication to be integrated with CA's ESM products ACF2 and Top Secret. It also supports authentication fall back to passwords.
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IICA Technologies
This document provides an overview of the DBUTLTY utility in CA Datacom. It describes DBUTLTY as the batch program used to perform all utility functions for databases and system areas. The document outlines the major functions of DBUTLTY, including system area maintenance, CXX database definition maintenance, multi-user control, data handling, reporting, recovery, accounting, error handling, and resource measurement and monitoring. It provides examples of important DBUTLTY commands and tasks.
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...CA Technologies
The document discusses how digital transformation initiatives are redefining the role of IT operations. As companies adopt new technologies like cloud, analytics, microservices and software-defined networks, IT operations faces greater complexity in monitoring applications and infrastructure. This introduces more monitoring challenges and blind spots. The presentation argues that IT operations must adopt new approaches using predictive analytics to correlate user experiences, applications and infrastructure insights. It provides examples of how CA technologies help organizations achieve this through application performance management and infrastructure monitoring solutions.
Mainframe Application Modernization for Enterprise DevelopersCA Technologies
The document discusses mainframe application modernization using CA Gen. It notes that many organizations depend on legacy enterprise applications built in COBOL. The challenges are modernizing these complex applications quickly enough. Renewal is presented as a lower-risk approach to modernization compared to rewriting or replacing applications. CA Gen is described as an agile development tool that can accelerate modernization by transforming existing COBOL applications into the CA Gen environment through an automated extraction, analysis, refactoring and transformation process.
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create ReportsCA Technologies
The document discusses new features in CA SYSVIEW Performance Management that allow users to quickly and easily create reports and dashboards. Specifically, it mentions new out-of-the-box dashboards in Mainframe Team Center - Management that provide immediate value. It also demonstrates how to modify sample dashboards and view groups of CICS regions in dashboards. Enhanced documentation for reporting in CA SYSVIEW 14.24 is highlighted as well.
Hands-On Lab: CA OPS/MVS and System State ManagerCA Technologies
This document provides an abstract and agenda for a hands-on lab session about CA OPS/MVS and System State Manager. The session will apply skills from a previous class to set up a new system and configure resources using the new policy-based resource management introduced in CA OPS/MVS version 12.3. Attendees will learn how CA OPS/MVS manages mainframe resources through System State Manager with policy-based, cross-system resource management. Recommended related sessions and demos are also listed.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.CA Technologies
This document discusses API testing in a headless world where many modern APIs don't have user interfaces. It describes how following the user's journey through an application can provide more robust tests by testing the APIs that support the user interface. The presentation covers finding APIs, generating API tests automatically based on the order of APIs in the user journey, handling dynamic test data, and extending and embedding tests. It demonstrates these concepts using CA technologies for API discovery, test generation, and test customization.
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?CA Technologies
The document discusses testing applications that use a service bus. It notes that while the service bus provides a nice interface for clients, it makes testing difficult due to the complex connections ("spaghetti") behind the scenes. It recommends taking a incremental approach to testing by first focusing on component testing using service virtualization to eliminate dependencies, and then working towards more full end-to-end testing. The presentation provides strategies for establishing a stable and predictable testing environment to effectively test applications that incorporate a service bus.
What's New in CA Agile Requirements Designer?CA Technologies
The document provides an overview and agenda for a presentation on the new features in CA Agile Requirements Designer. It discusses the ability to now generate automation scripts, test data, and virtual endpoints directly from requirements and test cases stored as flows. It also covers new capabilities for risk-based testing using live system data to optimize test paths, and expanded integrations with tools like Jira, CA Agile Central, and HP ALM. Finally, it outlines upcoming features for data generation and management using a new DataBuilder tool, and storing test artifacts in big data cloud storage.
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...CA Technologies
This document summarizes a presentation about how CA Process Automation can help bridge the gap from alert suppression to mean time to resolution (MTTR) through enterprise orchestration. It discusses key IT trends, defines problems with current incident management processes, and how CA Process Automation introduces repeatability, consistency, and automation to improve MTTR. The presentation demonstrates how CA Process Automation integrates systems and orchestrates processes to streamline incident response and management. Customer case studies show how CA Process Automation helped lower costs and improve efficiencies.
Tracking Message Flows in DataPower With CA APMCA Technologies
The document discusses tracking message flows through IBM DataPower gateway appliances. It provides an introduction to DataPower appliances and how they are used. It then discusses how to monitor performance metrics on DataPower to troubleshoot issues. Finally, it explains how to instrument DataPower transactions by creating tracking events within processing policies, and sending those events to an external monitoring point to analyze transaction workflows.
Similar to Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage and Grow your Mainframe Testing Toolset with CA File Master Plus
CA Gen Updates: Application Modernization and What's NewCA Technologies
The document discusses upcoming changes and new features in CA Gen releases 8.5 and 8.6. Key highlights include:
- Inline code statements that allow native 3GL code or SQL in the model for more flexibility.
- Web services consumption functionality to easily integrate with modern APIs by calling SOAP web services from action diagrams.
- Distributed applications will be easier to upgrade in release 8.6 by installing only the latest CA Gen runtimes instead of regenerating applications.
- A free limited edition of CA Gen will be available for training and education purposes.
From Fantasy to Reality: Mobile to Mainframe Infrastructure VisibilityCA Technologies
This document summarizes a presentation about providing comprehensive infrastructure visibility across mobile, distributed, mainframe, and cloud environments using CA Unified Infrastructure Manager (CA UIM) for zSystems. The presentation discusses addressing the "silo" problem where different parts of an IT infrastructure are monitored separately, describes the state of the art in unified monitoring with CA UIM, and provides three use cases for how CA UIM can help operations managers by providing simplified lights-out management of mainframes, enabling non-mainframe experts to assist with triaging issues, and helping optimize mainframe costs through performance visibility.
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
The document discusses configuring analytics capabilities in the CA Identity Suite. It describes how to enable analytics tracking, define analytics views to gather metrics, and configure the CA Identity Analytics dashboard. The lab portion has steps to set up analytics tracking of Salesforce.com access requests, including metrics on managers approving access and departments requesting access, and showing SLA metrics on completed transactions.
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek CA Technologies
The document provides an overview of a sneak peek presentation on planned innovations to further extend the Mainframe Team Center to help manage events and automate IT operations. Some key points include:
- The presentation will discuss using machine learning and analytics to predict issues earlier, remediate problems faster through collaboration, and continuously improve operations.
- Planned innovations include advanced filtering of automation scripts, graphical displays of script relationships, and detecting out of sync configurations across systems.
- Examples of automated remediation solutions involve detecting anomalies and triggering corrective scripts, as well as leveraging historical data to increase automation efficiency and reduce problem resolution times.
The document discusses new features in version 4.0 of CA Test Data Manager. It describes enhancements to the product architecture including a new REST API and service-oriented architecture. New capabilities presented include tester self-service, a web-based portal, flat file data generation, integration with service virtualization, test match enhancements, and fast data masker improvements. The roadmap discusses further planned improvements.
Pre-Con Education: Winning at Continuous Delivery with Service VirtualizationCA Technologies
Regan Walker discusses how service virtualization is a critical component for continuous delivery and enables continuous testing. Service virtualization allows development, testing, integration and performance teams to work in parallel by simulating unavailable systems across the software development lifecycle. Walker explains how CA service virtualization works with tools like Test Data Manager and Release Automation to automate testing and meet the needs of agile teams.
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioCA Technologies
The document discusses CA's vision and roadmap for continuous delivery. It outlines CA's mission to help customers deliver software that delights their customers faster and with higher quality. It then discusses the need for continuous delivery, DevOps, and continuous testing to address challenges of speed, quality and scale in enterprise agile development. The rest of the document focuses on CA's portfolio of continuous delivery products that provide an integrated ecosystem for continuous delivery, including CA Release Automation, CA Test Data Manager, CA Service Virtualization and the new CA BlazeMeter performance testing platform.
Auto Integrate – DevTest Automation and Integration Best PracticesCA Technologies
The document summarizes a presentation about automation and integration best practices for DevTest. It discusses shifting testing left in the development cycle through automation frameworks. It also describes a new automation API in CA DevTest 10.0 that enables developers to automate the creation and editing of virtual services using a REST API. The presentation provides an overview of how the automation API can be utilized to integrate service virtualization into a build pipeline.
Kathy Hickey, VP of Product Management at CA Technologies, introduces CA's new Identity Service product. The Identity Service is an identity-as-a-service solution that aims to simplify the user experience, empower application owners, and help control and manage cloud identity sprawl in modern hybrid enterprises. It provides single sign-on, dynamic user provisioning and deprovisioning, and visibility into cloud application accounts and entitlements through bidirectional integrations. The presentation highlights the challenges of securing access in today's digital workplace and how the Identity Service balances security, agility and user experience.
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New FeaturesCA Technologies
This document discusses migrating to CA Release Automation 6.x to take advantage of new features. It covers the upgrade strategy, architecture, and best practices. The key points are:
- The upgrade strategy can be an in-place upgrade or migration to a new infrastructure.
- The architecture involves components like the Release Operations Center, execution servers, agents, and an artifact repository.
- Best practices for upgrading include planning the steps, testing upgrades, and setting rollback criteria.
CA Project & Portfolio Management Resource Management Best PracticesCA Technologies
The document discusses resource management best practices for project and portfolio management. It covers the four As of resource management: availability, allocations, assignments, and actuals. Availability refers to how much time a resource can work. Allocations represent the agreement between resource and project managers. Assignments are estimates of work. Actuals reconcile time spent against estimates. The document provides examples and recommendations for effectively using these aspects of resource management.
Pre-Con Ed: What's New in Service Virtualization V10.0?CA Technologies
The document provides an overview of the new features in CA Service Virtualization 10.0, including the ability to create virtual services and tests from existing virtual services, Swagger 2.0 specifications, WSDL, and request-response pairs. It also discusses new automation capabilities through a REST API integration, as well as integrations with CA Application Test, CA Agile Central, and CA API Management. Additional new mainframe capabilities are highlighted for CICS program visibility and the creation of virtual services and tests.
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...CA Technologies
The document discusses CA Service Operations Insight, a solution that integrates and correlates information from CA Technologies and third-party monitoring and service desk tools. It provides a unified dashboard, event management, service modeling capabilities, and ticket creation functionality. The presentation outlines the product's interfaces, new features in version 4.0 including improved connectors for CA UIM, APM, and Spectrum, and an enhanced maintenance toolkit. It positions CA Service Operations Insight as enabling service-driven automation through dynamic service modeling and impact-based incident response.
Tech Talk: CA API Gateway: Deploying Docker Container GatewaysCA Technologies
The document discusses deploying CA API Gateway using Docker containers. It begins with an introduction to the benefits of Docker environments like consistency, portability, and enabling microservices architecture. It then discusses how CA API Gateway can be deployed as a Docker container for simplified deployment. The presentation includes two demos, the first showing the CA API Gateway Docker container and the second demonstrating how it can be used for microservices through service discovery and API publishing/proxying. Recommended related sessions on DevOps, API management, and microservices are also listed.
Securing Mobile Payments: Applying Lessons Learned in the Real WorldCA Technologies
1) The document discusses best practices for securing mobile payments based on lessons learned, including mobile authentication using push notifications and biometrics, securing in-app purchases, leveraging real-time risk analytics, and securely provisioning cards to mobile wallets.
2) It outlines CA's strategy for secure mobile payments which includes solutions for mobile authentication, in-app purchases, mobile wallets, real-time risk scoring, and NFC mobile wallet provisioning with cardholder authentication.
3) The document provides details on CA's mobile authentication solutions, risk analytics network model which considers device reputation across banks, and mobile wallet provisioning flow which incorporates one-time passcodes for authentication.
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumCA Technologies
The document discusses how Insilicum leveraged Forty2.io, a bot mitigation solution developed by CA Technologies' accelerator program, to effectively protect its digital presence from bot attacks. It describes how Forty2.io uses analytics to identify bot threats in one click. The presentation provides an overview of CA's accelerator program, digital transformation opportunities, and how Forty2.io helped Insilicum maximize revenue and brand protection while improving customer experience. It concludes with a demo of Forty2.io's capabilities and a discussion of future product directions.
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...CA Technologies
Learn about how the CA Endevor® Software Change Manager product team enhanced their development process to incorporate the Ideation, Agile, and Incremental Delivery methodologies to create and deliver the right product features at the right time. Learn how you can get connected with these new processes! For more information, please visit http://cainc.to/Nv2VOe
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...CA Technologies
Does your company follow STIG requirements or have a set of security enforcement policies that require updates to your mainframe security products? Are your passwords encrypted at a level that exceeds your password change window in the event a security file is breached and copied? Learn more about what CA ACF2 and CA Top Secret offer to help you reduce the impacts of perimeter breaches and inadvertent data compromise and the new features added in r16 for the mainframe. For more information, please visit http://cainc.to/Nv2VOe
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA Technologies
CA ACF2 and CA Top Secret r15 have been out for 5 years – what enhancements have you missed? Come to this session to learn about r15 enhancements to help ease mainframe administration, compliance/audit related features and the road ahead. For more information, please visit http://cainc.to/Nv2VOe
See the latest and greatest advancements to further simply and unify the acquisition, installation and configuration of your mainframe software.
For more information, please visit http://cainc.to/Nv2VOe
Similar to Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage and Grow your Mainframe Testing Toolset with CA File Master Plus (20)
In medicine - an MRI can quickly reveal a hidden ailment and actionable insight to get better. For IT and business leaders whose key concern with the mainframe is the platform costs and lean operations - the CA Mainframe Resource Intelligene reveals multiple sources of hidden mainframe costs and operational inefficiencies along with actionable recommendations.View this slideshare to understand how this new SaaS offering from CA brings together automation, speed, analytics and mainframe expertise of 40+ years. CA Mainframe Resource Intelligence reports answer your CIO’s toughest questions about mainframe optimization and potential for digital transformation.
For more information, please contact your account director or mainframe specialist at:
http://ow.ly/PALG50htHgF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
For more information on Mainframe, please visit: http://ow.ly/GwKO50gkixl
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Here at CA Technologies, our development teams share many of the same challenges producing quality software as our customers.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
This session will cover how The Home Depot built quality into its software development as it migrated from waterfall to agile delivery.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Privileged Access in a World on TimeCA Technologies
Today there are more privileged users than ever before. Providing access is not optional it is a business necessity. But how do you avoid excessive access? Providing the right access at the right time is the formula for reducing your risk and securing a world of data. At FedEx empowering the right people at the right time is not only good business, but it's also good security.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
As one of the most forward thinking critical infrastructure companies in the UK, SGN is blazing a trail by becoming the first UK critical infrastructure company to run 100% in the cloud and using innovative IoT technologies to revolutionize the management of gas pipelines. To manage the risk, SGN embarked on a mission to shape the attack path of intruders. In this session, Mo Ahddoud, CISO at SGN will share how he used a technique called attack path mapping to put privileged access at the center of SGN's digital transformation.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
Around the globe, citizens are demanding 24/7 access to government, and this is driving a dramatic re-architecture of public services putting citizens in control, increasing participation and access to services. From two different parts of the world, The State of Louisiana & The State of Amazonas in Brazil have both become centers for innovation. In this session, they will share and demonstrate how they are designing a government built to change and breaking down silos to make the citizen the center of government.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Keynote: Making Security a Competitive AdvantageCA Technologies
Keynote: Making Security a Competitive Advantage
For more information on Security, please visit: http://cainc.to/CAW17-Security
For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps For more information on Veracode, please visit: http://community.veracode.com
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Providers Can Capitalize
For more information on MSP, please visit: http://ow.ly/CrAA50gbyfJ
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational Efficiency and Scalability
For more information on MSP, please visit: http://ow.ly/oQ1o50gby0m
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting Your Customer’s Modern Software Factory
For more information on MSP, please visit: http://ow.ly/kWsH50gbxYh
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformation Play for Service Providers
For more information: Download the white paper, “Five Technologies for the Built-to-Change Business—and How You Can Monetize Them” at: https://www.ca.com/content/dam/ca/us/files/white-paper/five-technologies-built-to- change-business.pdf
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
Stay connected at: http://ow.ly/d0f350g68Bq Thank you.
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
In this roadmap session, join us to explore how bleeding-edge data science algorithms are now being incorporated in real life into CA Mainframe Operational Intelligence to better predict performance issues and prevent costly downtime and capacity spikes across the IT landscape. See how you can get real-time insight to what may happen sooner and in-depth guidance on what you should do about it. And, learn how to use open tools that can pull in data feeders from other systems, to improve results. Whether you’re a mainframe novice or a seasoned operations expert, you'll find new tools can improve your SLA performance, MTTR and more.
For more information on Mainframe, please visit: http://ow.ly/pbDM50g68zT
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
With great power comes great responsibility. Mainframes have both: the power of data and transactions that run the application economy, and the responsibility to keep that data protected. Join this roadmap session to learn from CA data privacy leaders and see the future of the data-centric security strategy, covering key products such as CA Data Content Discovery for z/OS, CA Compliance Event Manager and more. Learn how to enhance your data privacy and simplify regulatory compliance, plus get a view into the roadmap of what's to come in the mainframe security and compliance portfolio.
For more information on Mainframe, please visit: http://ow.ly/Ik2H50g66cN
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
The promise of blockchain, or specifically distributed ledger technology, has captured the attention of business and IT leaders across multiple industries. Now is the time to move from hype to reality. This session will examine use cases of pioneering companies that apply blockchain in a multi-party entity environment with immutable smart contracts. We’ll share how some DevSecOps requirements are fundamentally different for blockchain pilots and full deployment—from getting started with the right development environment to concerns of security, encryption and operational visibility. We will also discuss integration of blockchain with existing systems of record and the use of shadow blockchain as an evolutionary step towards adoption. Join this session to learn more about developing, deploying, and securing blockchain.
For more information on Mainframe, please visit: http://ow.ly/VnBh50g66bO
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
The document discusses how establishing digital trust can help companies become digital enterprises. It outlines barriers that companies face in areas like ensuring resources, assuring systems, delivering digital experiences, verifying people, and protecting data. The document provides best practices and CA technologies that can help companies optimize their platforms, assure systems through tools like AI and automation, deliver digital experiences through DevSecOps, verify people with identity management, and protect data with discovery tools. Following these practices can help companies transform to digital enterprises by establishing digital trust.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.