SlideShare a Scribd company logo
1 of 67
Download to read offline
World®
’16
Pre-Con	Ed:	Taking	the	"Hard"	out	
of	Hardware	Asset	Management
Kim	Rasmussen
Sr.	Principal	Engineering	Services	Architect	– CA	Technologies
AMX26E
AGILE	MANAGEMENT
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
With	so	much	attention	on	software	compliance,	is	the	
art	of	managing	hardware	assets	taking	a	backseat?	This	
session	takes	a	deep	look	into	how	to	best	leverage	CA	IT	
Asset	Manager	- CA	Asset	Portfolio	Management	to	more	
effectively	manage	your	hardware	assets.	You	will	not	
only	learn	about	how	to	better	use	the	core	features,	but	
you'll	also	get	into	the	nitty	gritty	of	how	to	employ	some	
of	the	more	obscure	capabilities	that	could	provide	
significant	return	on	your	efforts.
CA	Technologies	-
Sr.	Principal	
Engineering	Services	
Architect	
Kim	
Rasmussen
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
IT	ASSET	MANAGEMENT	CHALLENGES
CA	IT	ASSET	MANAGER
BEING	SUCCESSFUL	WITH	ASSET	MANAGEMENT
USE	CASE	:	RECEIVE	ASSET
USE	CASE	:	RELOCATE	ASSET
USE	CASE	:	RETIRE	ASSET
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
IT	Asset	Management	Challenges
How	do	you	figure	out	what	
software	and	hardware	you	have?
How	do	I	get	the	assets	where	I	
need	them	so	I	don’t	buy	more?
Can	I	reduce	the	number	of	assets	
I	support,	the	number	of	vendors?		
Can	I	reduce	the	costs	and	risks	of	
license	audits?
Business	Objectives Business	Challenges
Know	what	IT	
assets	we	have
Unaware	of	available	
assets	and	software	
licenses
IDENTIFY
Manage	IT	assets	
effectively
Organization	over	
purchased	IT	assets
OPTIMIZE
Proactively	manage	
vendors
Exposed	to	risks	from	
license	audits	and	auto-
renewals
RESPOND
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Hardware	Asset	Management	
Goals
MEET	INCREASING	EXPECTATIONS AUTOMATE	THE	DAY-TO-DAY	
OPTIMIZE	THE	ASSET	BASE
IMPROVE	OPERATIONAL	AND	
FINANCIAL	MANAGEMENT
§ Redeploy	available	assets
§ Avoid	unnecessary	purchases
§ Identifying	Missing	and	Unauthorized	
assets
§ Hardware	refresh	every	two	
to	four	years…ongoing	and	often	in	
large	batches
§ Migration	to	new	OS’s	
(Windows	7/8/10)
From	request	through	procurement	to	
retirement	and	disposal
Customers	expect	client	management	
systems	
to	support	large	
scale	deployments
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
IT	Asset	Management	Challenges
§ Optimize	your	IT	spending
§ All	IT	spending	should	support	a	business	
§ All	IT	spending	should	have	a	business	purpose
§ Ensure	we	own	what	we	use	
§ Ensure	we	use	what	we	own	
Hardware	asset	management	is	the	foundation	– Why	?
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
IT	Asset	Management	Challenges
§ Data	Quality	is	key
– You	have	to	trust	the	input	to	trust	the	output	
§ Process	=	better	data	quality
§ Automation	=	better	and	consistent	data	quality
§ User	engagement	=	better	data	quality		
Data	Quality	is	key
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
IT	Asset	Management	Challenges
§ Look	at	the	industry
– IAITAM			(http://iaitam.org/)
§ Offers	Certifications
§ Industry	leaders
– ITAM	Review	- 12	Box	meth		(https://www.itassetmanagement.net/)
§ 12	Box	method		- Free	at	the	moment
§ Will	have	Certifications	later	
– ITIL
§ Configuration	management	
§ Asset	management	as	a	discipline	
Implementing	Processes
ITIL	is	a	trademark	of	AXELOS	LTD
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
IT	Asset	Management	Challenges
§ CA	Services	– Content	Pack	for	ITIL	best	practices	*
§ Build	your	own
– More	work
– Use	the	above	processes	as	base
§ You	should	implement	it	in	phases
§ Make	the	process	work	before	you	start	loading	old	data
– Else	you	will	get	a	“blind	spot”	between	the	load	and	process	control	
Implementing	Processes
* http://www.ca.com/us/collateral/service-offering/ca-it-asset-manager-implementation-services.html
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.11 @CAWORLD					#CAWORLD
Pre-Con	Ed:	Taking	the	"Hard"	out	of	
Hardware	Asset	Management
CA	IT	Asset	Manager	(CA	ITAM)
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	IT	Asset	Manager
IT	Asset	Management	
(ITAM)	is	the	management	
and	reconciliation	of	the	
physical,	financial	and	
contractual	life-cycle	
attributes	of	IT	assets	
(hardware	and	software)	to	
enable	the	delivery	of	cost-
efficient,	timely	business	
knowledge	to	better	
manage	and	control	the	
business	and	operational	
aspects	of	IT.
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	IT	Asset	Manager	
§ Comprehensive	hardware	&	software	
asset	lifecycle	management
§ Maximize	the	value	of	your	IT	assets
§ Manage	vendors	better
§ Increase	software	compliance
§ Physical	and	virtual	assets
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	IT	Asset	Manager
§ You	can	not do	good	Software asset	management	without	good	Hardware
asset	management
§ You	can	do	good	Hardware asset	management	without	doing	Software
asset	management
§ Savings	in	both	Hardware	and	Software	asset	management
§ Highest	Risk	in	compliances	is	in	Software
Hardware	asset	management	is	the	foundation
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	IT	Asset	Manager
§ Hardware	asset	management	provides	
business	context
– Assets	
§ Cost	center	
§ Location	
§ Default	/	owned	assets
– Users
§ Cost	center	
§ Location	
§ Default	/	owned	assets
– Organization	
Hardware	asset	management	is	the	foundation
Region
Country
Location
All
Division
Company
Cost	Center
Group
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	IT	Asset	Manager
§ Optimize	your	IT	spending
§ All	spending	should	support	a	main	business	purpose
§ Ensure	we	own	what	we	use	
§ Ensure	we	use	what	we	own	
Hardware	asset	management	is	the	foundation	– Why	?
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	IT	Asset	Manager
Reference	Data
Source
(E.g.	Cost	Centers)
Hardware	
Reconciliation
And	Enrichment
Reference/Ownership	Data
Owned	Data	Source
(E.g.	Hardware	Assets)
Owned	Data	Source
(E.g.	Software	Licenses)
Owned	Data	
Source
(E.g.	Software	
Contracts)
CA	ITAM	
– Asset
Portfolio
Management
CA	ITAM	– Software	Asset	Management
Discovered	Data	Source
(E.g.	DDMi)
Discovered	Data	Source
(E.g.	CA	Client	
Automation)
Discovered	Data	Source
(E.g.	SCCM)
Reference	Data	– Organizational	Structure
Reference	Data	– Geographical	Structure
Owned	Data	– Contacts
Discovered	Data	– Hardware	Devices
Enriched	Hardware	Assets
- Contact
- Location
- Cost	center
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Data	integration
CA	Client	Automation	(Servers)
CA	ITAM	- CA	Asset	Portfolio	
Management	12.8
SCCM	(WS)
SCCM	(WS)
Trailblazer CA	ITAM	–
Software	Asset	
Management
Software	Asset	
Management	
Connectors
Data	Coordination	Service
Enriched	device	data
Hardware	
Reconciliations
Data	Coordination	Service	
Base	discovery	data
MDB
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.19 @CAWORLD					#CAWORLD
Pre-Con	Ed:	Taking	the	"Hard"	out	of	
Hardware	Asset	Management
Use	case	#1	:	Receive	Asset
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Sample	order	process
YES
NO
Request
Delivered	&	Invoiced Change	order	created AvailableFulfill	from	Inventory
Ordered
Check	Availability
Pending	
Fulfillment
Approved
Pending	Approval
Received
Create	asset	?
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ When	do	we	create	the	Asset	record	?
– When	ordering	the	asset	at	the	vendor	
– Vendor	order	confirmation
– Vendor	shipping	confirmation
– On	receipt	of	asset
– On	first	inventory
– Combination	?
Create	asset	record
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ Order	time	/	Order	confirmation
– PRO
§ Follow	the	Asset	right	form	the	order	time
– CON
§ Changes	may	occur	after	order
– What	if	the	model	is	slightly	different
– What	is	the	delivery	is	a	different	quantity
Create	asset	record	– cont.
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ Vendor	Shipping	Confirmation
– PRO
§ You	know	what	the	vendor	has	sent
§ Can	be	automated	with	advance	shipping	notice	(ASN)
§ Use	Receive	process	to	validate	the	vendor	shipment
§ Data	is	entered	once	- at	the	vendor	site
– CON
§ Cannot	follow	asset	from	the	order	time
§ ASN	has	no	standard	format	and	might	miss	crucial	data
§ Might	be	missing	company	specific	attributes	Asset	Name,	Host	name,	User	etc.
– Recommend	combining	this	with	a	Pre-stage	process	at	the	vendor		
Create	asset	record	– cont.
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ Receive	time
– PRO
§ Only	register	what	you	receive
– CON
§ Requires	more	training	for	the	receive	people	
§ Extended	Write	access	to	the	Core	asset	attributes
§ Will	not	catch	things	that	were	delivered,	but	not	received
– Typically	you	are	charged	what	was	sent	to	you
Create	asset	record	– cont.
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ First	Inventory	time
– PRO
§ Easy	creation
§ No	problem	having	the	right	Reconciliation	data	matching
§ Built	in	feature	of	CA	ITAM	
– CON
§ Does	not	catch	purchases	that	are	not	inventoried	(in	use)	
§ Will	be	missing	business	context	
– Should	be	flagged	for	further	data	creation	(e.g.	using	the	Asset	Status	or	the	
Asset	Class)
Create	asset	record	– cont.
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ Use	ASN
– Ensures	the	data	creates	at	the	source
– Basis	for	automation	
– Require	a	Vendor	involvement	both	for	staging	the	pc	
and	for	data	captured
§ Barcode,	Serial	number,	host	name	etc.
§ Receive	process	should	only	be	validation
– preferable	just	a	Barcode	scan,		mobile	look	up	to	confirm	data	and	
receive
– Remember	to	put	location	and	status	a	warehoused	for	allocation	later
Create	asset	record	– CA	recommendations
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ Order	number	should	“just”	be	an	attribute	on	the	
assed	or	a	Attachment	on	the	asset
– Delivery	can	change	after	order	is	given	
§ If	you	choose	to	create	Assets	at	Inventory	time
– Ensure	process	to	add	business	context
§ Flag	the	Asset	as	New	or	Discovery	data	only
– Weekly	reports	on	Assets	missing	data	(need	attention)
Create	asset	record	– CA	recommendations	– cont.
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets	
Implementation	tips		
1. ASN	Import
2. Scaled	down	Receive	
WEB	view
3. Create	from	
Reconciliation
4. Reporting	on	
Reconciliation	data
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ Only	take	the	hardware	assets	(laptops)
1)	ASN	– Import
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
1)	ASN	– Import			cont.
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
1)	ASN	– Import			cont.
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
§ Daily	import
1)	ASN	– Import			cont.
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
2)	Scaled	down	Web	UI
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
2)	Scaled	down	Web	UI	– Cont.
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
3)	Create	from	Reconciliation
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
3)	Create	from	Reconciliation		cont.
38 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets
4)	Reporting	on	Reconciliation	Data
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.39 @CAWORLD					#CAWORLD
Pre-Con	Ed:	Taking	the	"Hard"	out	of	
Hardware	Asset	Management
Use	case	#2:	Relocate	an	Asset
40 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	asset
41 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	asset
§ The	IMAC	process
– Install	- Move	- Add	- Change	
– When	the	asset	is	“in	production”
– Main	purpose	is	to	keep	an	accurate	asset	register	
§ Location
§ Organization	
§ Status
§ User	
The	IMAC	process
42 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	asset
§ IMAC	is	engaged	every	time	an	asset	takes	on	a	new	role
– Received	->	Warehouse
§ Might	be	part	of	Receive,	but	the	IMAC	process	applies
– Warehouse	->	User
– Re-image	
– Disposal
– To	and	from	Repair	
The	IMAC	process		- cont.
43 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	asset
§ Can	be	self	service	or	an	IT	Technician
– Need	a	process	to	ensure	data	quality
§ Encouragement	
§ End-user	needs	correct	data	(e.g.		Only	shipping	address	for	the	user	is	the	Asset	Location)
– Needs	to	be	a	natural	and	easy	process
§ Needs	to	be	intuitive	and	foolproof
§ 98%	do	not	type	wrong
– Triggered	by	inventory	change	(e.g.	IP	changes	->	Survey	of	where	the	asset	
has	been	moved	to)
§ Could	be	Service	Desk-based
– Share	most	data
The	IMAC	process
44 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Receiving	Assets	
Implementation	tips		
1. Service	Desk	integration
2. “Mobile	interface”		-
Scaled	view
3. Email	to	user
4. Event	handling	and	
automation
45 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	Asset
§ Service	desk	
– Change	order
The	IMAC	process
46 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	Asset
The	IMAC	process
47 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	Asset
The	IMAC	process
48 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	Asset
“Mobile	interface”
49 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	Asset
Notify	User	on	move
50 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Relocate	an	Asset
Notify	User	on	move
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.51 @CAWORLD					#CAWORLD
Pre-Con	Ed:	Taking	the	"Hard"	out	of	
Hardware	Asset	Management
Use	Case	#3:	Retire	Asset
52 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Retire	Asset
53 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Retire	Asset
§ Why	should	I	not	delete	the	asset	record?
– Proof	that	you	had	the	asset
– Retain	history	on	Asset
– Record	“proper	disposal”
§ Destroy	company	data
§ Uninstall	software
§ Remove	all	company	labels	!!!
§ Before	handing	it	over	
– Document	who	now	has	ownership
– Ensure	traceability
– To	prevent	negative	repercussions
§ Damage	to	company	reputation
§ Fines	for	alleged	wrong	disposal
When	the	asset	no	longer	has	business	value
54 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Retire	Asset
Implementation	tips		
1. Unlinking	automation
2. Report	on	reappearing	
Assets
55 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Retire	Asset	– ITIL	Pack
56 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Retire	Asset
§ When	a	Asset	is	set	to	“Disposed	of”
– Set	inactive
– Unlink	Discovery	data		(Discovery	record	should	be	deleted)
57 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Retire	Asset
2)	Reporting	on	re-appearing	assets
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.58 @CAWORLD					#CAWORLD
Pre-Con	Ed:	Taking	the	"Hard"	out	of	
Hardware	Asset	Management
Being	Successful	with	Asset	Management
59 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Being	Successful	with	Asset	Management
§ Show	off
– Many	times	we	forget	to	show	the	great	results	we	achieve
– Prove	your	worth
– Build	an	easy	overview	with	progress
– Show	bounties	
§ We	just	saved	$$$	on	changing	the	process	for	Request
§ We	avoided	bad	brand	recognition	by	ensuring	correct	Oracle	licensing	
– Visibility	=>	more/easier	funding
§ Make	everything	about	the	Business!
60 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Being	Successful	with	Asset	Management
§ Find	the	right	Project	Sponsor
– Funding	is	key
– C-level	support	is	needed
– Typically	in	the	CFO,	not	CTO	organization
– Use	results	to	secure	further	funding	
– If	you	do	your	job	–>	they	will	support	you	in	everything
§ Be	proud	of	your	work
– Showing	you	care	builds	credibility	and	trust	
– Ownership	enforces	will	to	deliver	quality	data
61 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Being	Successful	with	Asset	Management
§ Be	critical	of	your	work
– Quality	of	data	is	key
– Always	use	common	sense	as	part	of	data	validation
– If	you	do	not	trust	the	data,	you	can	not	shine	
§ Understand	your	data
– In	order	to	check	the	quality	you	need	to	know:
§ How	the	data	is	collected
§ How	the	data	is	processed	
§ How	the	data	is	used	and	by	whom
§ WHY	you	collect	the	data!
62 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Being	Successful	with	Asset	Management
§ Share	your	work
– Many	other	operations	could	benefit	from	your	data
– Make	Asset	Management	the	“data	cornerstone”
§ Makes	it	sticky
– The	more	the	data	is	used,	the	higher	the	interest	in	managing	data	
§ QUALITY	OF	DATA!
– Best	use	of	business	resources	
§ Money,	staff,	equipment
63 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Hardware	Asset	Management	is	not	as	boring	as	you	think.
If	you	make	it	your	mission	to	provide	good	data	based	on	the	business,	people	
will	understand	the	importance	of	the	data	and	they	will	support	the	mission.
Asset	management	data	is	valuable	information	for	business	strategy	and	
decision-making.
Make	it	easy	to	understand,	easy	to	use,	and	automate	as	much	as	you	can.
Make	the	tools	support	your	needs,	not	the	other	way	around.
Summary
64 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
AMX23E	 CA	Software	Asset	Management	- Key	Customer	Topics 11/15/2016	at	3:30	pm
AMX21S
Case	Study:	Create	Time	out	of	Thin	Air	- Automate	and	
Stop	Manual	Software	License	Compliance
11/16/2016	at	3:00	pm
AMX122S
Case	Study:	Taking	IT	Asset	Management	to	the	Next	
Level	With	Process	Automation
11/17/2016	at	3:45	pm
65 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Service	Desk	
and	Support	
Analyst	xFlow	
Experience	
Software	and	
Hardware	Asset	
Management
Request	
Management	
and	Self-service
Management	
Insights	–
Reporting	and	
Dashboards
66 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
67 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com

More Related Content

What's hot

Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...CA Technologies
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyCA Technologies
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
 
Transforming your organization to be Value Focused
Transforming your organization to be Value FocusedTransforming your organization to be Value Focused
Transforming your organization to be Value FocusedCA Technologies
 
Agile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, SucceedAgile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, SucceedCA Technologies
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
 
Pre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational IntelligencePre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational IntelligenceCA Technologies
 
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...CA Technologies
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Technologies
 
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...CA Technologies
 
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...CA Technologies
 
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMTracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMCA Technologies
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a ServiceCA Technologies
 
Portfolio Management Best Practices
Portfolio Management Best PracticesPortfolio Management Best Practices
Portfolio Management Best PracticesCA Technologies
 
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...CA Technologies
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsCA Technologies
 
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...CA Technologies
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentCA Technologies
 

What's hot (20)

Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
Transforming your organization to be Value Focused
Transforming your organization to be Value FocusedTransforming your organization to be Value Focused
Transforming your organization to be Value Focused
 
Agile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, SucceedAgile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, Succeed
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
Pre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational IntelligencePre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational Intelligence
 
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
 
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
 
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
 
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMTracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APM
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
 
Portfolio Management Best Practices
Portfolio Management Best PracticesPortfolio Management Best Practices
Portfolio Management Best Practices
 
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
 
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
 

Viewers also liked

Learn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusLearn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusCA Technologies
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementCA Technologies
 
Ca automation suite screen shots 2
Ca automation suite screen shots 2Ca automation suite screen shots 2
Ca automation suite screen shots 2David Resnic
 
New Electricity Highway, Antero Reilander, Vaasa Wind 2015
New Electricity Highway, Antero Reilander, Vaasa Wind 2015New Electricity Highway, Antero Reilander, Vaasa Wind 2015
New Electricity Highway, Antero Reilander, Vaasa Wind 2015Fingrid Oyj
 
Data and The Electricity Grid
Data and The Electricity GridData and The Electricity Grid
Data and The Electricity GridPaul De Martini
 
Linking wholesale and retail market – through smart grid
Linking wholesale and retail market – through smart gridLinking wholesale and retail market – through smart grid
Linking wholesale and retail market – through smart gridFingrid Oyj
 
Infrastructure no 6
Infrastructure no 6Infrastructure no 6
Infrastructure no 6Santi Ch.
 
Health index and on line condition monitoring ELVIS event Marcus Stenstrand
Health index and on line condition monitoring ELVIS event Marcus StenstrandHealth index and on line condition monitoring ELVIS event Marcus Stenstrand
Health index and on line condition monitoring ELVIS event Marcus StenstrandFingrid Oyj
 
ELVIS transmission line maintenance ELVIS event. Vesa Malinen
ELVIS transmission line maintenance ELVIS event. Vesa MalinenELVIS transmission line maintenance ELVIS event. Vesa Malinen
ELVIS transmission line maintenance ELVIS event. Vesa MalinenFingrid Oyj
 
Daily Snapshot - 22nd March 2017
Daily Snapshot - 22nd March 2017Daily Snapshot - 22nd March 2017
Daily Snapshot - 22nd March 2017Tracxn
 
IBM Support for CIM and the Common Grid Model Exchange Standard
IBM Support for CIM and the Common Grid Model Exchange StandardIBM Support for CIM and the Common Grid Model Exchange Standard
IBM Support for CIM and the Common Grid Model Exchange StandardNada Reinprecht
 
Transforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsTransforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsSteve Ray
 
Sunshine(tm) : CEA Operation Manual
Sunshine(tm) : CEA Operation Manual Sunshine(tm) : CEA Operation Manual
Sunshine(tm) : CEA Operation Manual Angelenar Devilar
 
Insight Asset Management for JIRA Service Desk
Insight Asset Management for JIRA Service DeskInsight Asset Management for JIRA Service Desk
Insight Asset Management for JIRA Service DeskAmbientia
 
NPTI 15th batch Indian electricity grid code (IEGC)
NPTI 15th batch Indian electricity grid code (IEGC)NPTI 15th batch Indian electricity grid code (IEGC)
NPTI 15th batch Indian electricity grid code (IEGC)Ravi Pohani
 

Viewers also liked (20)

Learn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusLearn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From Olympus
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
 
Ca automation suite screen shots 2
Ca automation suite screen shots 2Ca automation suite screen shots 2
Ca automation suite screen shots 2
 
NMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_BukowskiNMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_Bukowski
 
New Electricity Highway, Antero Reilander, Vaasa Wind 2015
New Electricity Highway, Antero Reilander, Vaasa Wind 2015New Electricity Highway, Antero Reilander, Vaasa Wind 2015
New Electricity Highway, Antero Reilander, Vaasa Wind 2015
 
IEEE APE
IEEE APEIEEE APE
IEEE APE
 
Timing Challenges in the Smart Grid
Timing Challenges in the Smart GridTiming Challenges in the Smart Grid
Timing Challenges in the Smart Grid
 
Data and The Electricity Grid
Data and The Electricity GridData and The Electricity Grid
Data and The Electricity Grid
 
Linking wholesale and retail market – through smart grid
Linking wholesale and retail market – through smart gridLinking wholesale and retail market – through smart grid
Linking wholesale and retail market – through smart grid
 
Sustainable off-grid cooling for Telecom
Sustainable off-grid cooling for TelecomSustainable off-grid cooling for Telecom
Sustainable off-grid cooling for Telecom
 
Infrastructure no 6
Infrastructure no 6Infrastructure no 6
Infrastructure no 6
 
Health index and on line condition monitoring ELVIS event Marcus Stenstrand
Health index and on line condition monitoring ELVIS event Marcus StenstrandHealth index and on line condition monitoring ELVIS event Marcus Stenstrand
Health index and on line condition monitoring ELVIS event Marcus Stenstrand
 
ELVIS transmission line maintenance ELVIS event. Vesa Malinen
ELVIS transmission line maintenance ELVIS event. Vesa MalinenELVIS transmission line maintenance ELVIS event. Vesa Malinen
ELVIS transmission line maintenance ELVIS event. Vesa Malinen
 
Daily Snapshot - 22nd March 2017
Daily Snapshot - 22nd March 2017Daily Snapshot - 22nd March 2017
Daily Snapshot - 22nd March 2017
 
IBM Support for CIM and the Common Grid Model Exchange Standard
IBM Support for CIM and the Common Grid Model Exchange StandardIBM Support for CIM and the Common Grid Model Exchange Standard
IBM Support for CIM and the Common Grid Model Exchange Standard
 
Transforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsTransforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid models
 
Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4
 
Sunshine(tm) : CEA Operation Manual
Sunshine(tm) : CEA Operation Manual Sunshine(tm) : CEA Operation Manual
Sunshine(tm) : CEA Operation Manual
 
Insight Asset Management for JIRA Service Desk
Insight Asset Management for JIRA Service DeskInsight Asset Management for JIRA Service Desk
Insight Asset Management for JIRA Service Desk
 
NPTI 15th batch Indian electricity grid code (IEGC)
NPTI 15th batch Indian electricity grid code (IEGC)NPTI 15th batch Indian electricity grid code (IEGC)
NPTI 15th batch Indian electricity grid code (IEGC)
 

Similar to Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management

Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...CA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...CA Technologies
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2CA Technologies
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Technologies
 
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsPre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsCA Technologies
 
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...CA Technologies
 
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerCA Technologies
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA DatacomCA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
 
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersPre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersCA Technologies
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowCA Technologies
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesCA Technologies
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps CA Technologies
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®CA Technologies
 
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...CA Technologies
 
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...CA Technologies
 
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...CA Technologies
 

Similar to Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management (20)

Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and Maintenance
 
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal resultsPre-Con Ed: Configuring CA Workload Automation AE for optimal results
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
 
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
 
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
 
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersPre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
 
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
 
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
 
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management