SlideShare a Scribd company logo
World®
’16
Who’s	Minding	your	SSO	Store?
Jason	Wilcox	Sr.	Services	Architect
SCX16E
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
At	the	heart	of	your	enterprise	security	infrastructure	is	your	CA	Single	Sign	On	web	access	
management	environment.		Some	take	its	simplicity	for	granted,	the	silent	workhorse	that	
provides	a	great	user	experience	across	your	apps	with	high	performance	and	reliability.		But	
who	and	what	is	keeping	tabs	on	your	CA	SSO	application?
In	this	session,	we	will	explore	best	practices,	methods	and	tools	that	can	be	deployed	to	
monitor	the	health	of	your	mission	critical	web	access	management	solution.	We	will	cover:
The	key	aspects	of	what	impacts	the	performance	and	stability	of	your	CA	Single	Sign	On	
solution	How	to	trace	a	problem	to	root	cause	using	tools	like	CA	Trace	Log	Reader,	APM	for	SSO,	
Spylogix,	and	Splunk.	How	to	create	a	monitoring	and	alerting	strategy	for	your	CA	Single	Sing	On	
Solution.	How	to	use	monitoring	data	to	tune	and	optimize	your	CA	Single	Sign	On	Solution	
components
Jason	Wilcox
CA	technologies
Sr.	Services	Architect
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
WHO’S	TALKING	TO	MY	POLICY	SERVER,	AND	WHY	DO	I	CARE?
MST	=	T/ATT(S),	YES	MATH	MATTERS
ESTABLISHING	A	PROACTIVE	MONITORING	PROGRAM
WHAT	ARE	THE	SSO	KPI’S
HOW	DO	I	MONITOR	THOSE	KPI’S
BUY	WHY	DOES	IT	MATTER?
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agents	Connection
§ Web	Agent	opens	the	TCP	
connection	to	the	Policy	Server
– By	default,	under	load,	the	web	
agent	will	open	a	max	of	20	sockets
– Connections	are	“long-lived”
§ Policy	Server	closes	connections
– Idle	Timeout	(minutes)	in	
SMConsole
– Non-Idle	Timeout	via	
AgentConnectionMaxLifetime in	XPS	
Object
Agents	Open	the	Connection,	the	Policy	Server	Can	Close	the	Connection
Authorization
Authentication
Administration
Accounting
Administrative	UIUser	Store
Policy	Server
Protected Resources
Policy	Store
Web	Server
Web	Agent
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agent	Conversation
§ Individual	sockets	are	
synchronous	connections
§ Once	the	Web	Agent	“asks	a	
question”	to	the	policy	server,	
that	socket	connection	is	“busy”	
until	the	Policy	Server	responds
The	Conversation	is	a	Request/Response	Model,	No	Interruptions	Allowed
Authorization
Authentication
Administration
Accounting
Administrative	UIUser	Store
Policy	Server
Protected Resources
Policy	Store
Web	Server
Web	Agent
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agent	Security
§ Agent	API	initiates	a	connection	
with	the	Trusted	Host	Name	and	
Shared	Secret
– Handshake	includes	establishing	
encrypted	channel
– Retrieves	operational	parameters	
from	the	HCO
– Retrieves	configuration	parameters	
from	the	ACO	(Or	LocalConfig)
The	Conversation	Starts	with	Authentication,	and	Created	an	Encrypted	Channel
Authorization
Authentication
Administration
Accounting
Administrative	UIUser	Store
Policy	Server
Protected Resources
Policy	Store
Web	Server
Web	Agent
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Topics	they	Discuss
§ Over	this	TCP	connection	the	
Web	Agent	sends	the	following	
Agent	API	commands:
– isProtected()
– isAuthenticated()
– isAuthorized()
§ Not	the	only	commands	but	
those	are	the	primary	functions	
of	the	Agent.
Agent	to	Policy	Server	Communication	is	Primarily	Request/Response
Authorization
Authentication
Administration
Accounting
Administrative	UIUser	Store
Policy	Server
Protected Resources
Policy	Store
Web	Server
Web	Agent
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Policy	Server	responds
§ We	can	see	the	reactor	
thread	taking	these	
requests	and	putting	
them	in	the	queue
§ Now	on	the	other	end	
of	the	queue,	we	can	
see	what	are	called	
“Worker	threads”	to	
handle	the	work
When	the	Agent	Comes	Knocking,	Who	Answers?
Web	
Agent
Reactor	
Thread
Worker	
Thread
Policy	Server
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Configuring	Worker	Threads
§ The	worker	threads	are	
configured	here	in	the	
management	console
– default	is	for	20	worker	
threads	in	CA	SiteMinder	
R12.5x
§ How	many	do	you	need?
Threads	Never	Die,	Once	Reached	They	Will	Always	At	Max
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	Do	Worker	Threads	Do?
§ Worker	threads	do	the	work!
§ The	worker	threads	take	the	item	off	the	queue,	and	go	to	the	
User	Store,	Policy	Store,	Session	Store,	cache,	etc…	
§ Worker	threads	generate	assertions
§ Worker	threads	process	xml
§ Worker	threads	do	everything	the	policy	server	needs	to	do
Before	I	Can	tell	You	How	Many	You	Need,	We	Need	to	Know	What	they	are	Doing?
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thread	Locking
§ Similar	to	the	Agent	socket	request,	the	worker	thread	will	
continue	handling	the	request	until	it	is	complete.
– For	example,	if	the	worker	threads	need	to	do	an	isAuthenticate()	call,	
it	will	go	out	to	the	LDAP	directory	server.		The	worker	thread	will	be	
blocked	until	the	ldapsearch and	bind	is	complete.
– If	an	individual	worker	thread	needs	to	make	multiple	LDAP	calls,	those	
calls	are	processed	in	a	synchronous	manner	within	that	thread
– This	thread	cannot	be	used	for	anything	else	while	blocked
Worker	Threads	Start	a	Task	and	are	Busy	Until	the	Task	is	Completed	or	Times	Out
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Control
We	have	control	over	the	agent	
connections,	the	policy	server	
sockets,	and	the	number	and	
lifetime	of	each	of	them.
We	don’t	have	control	over	
how	long	a	task	takes	to	
complete.
Agents
Agents	initiate	a	secure	
connection	to	the	policy	server.	
Each	agent	connection	takes	up	
a	socket	on	the	policy	server.
Each	agent	connection	
performs	a	task,	and	is	busy	
until	that	task	is	completed.
Policy	Server
Policy	Servers	receive	requests	
from	the	agents	with	a	reactor	
thread.
The	reactor	thread	puts	
requests	in	the	queue	for	
worker	threads	to	work.
Worker	threads	perform	a	task	
and	are	blocked	until	the	task	is	
completed
Checkpoint
What	Do	We	Know	So	Far?
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
MST	=	t/att(s),	Yes	Math	Matters	
§ With	the	information	we	have,	we	can	build	a	predictive	
model	for	performance	and	capacity.
§ We	must	also	understand	the	impacts	of	throughput	on	that	
model,	and	the	impacts	of	latency	on	throughput.
§ Using	this	we	can	identify	Key	Performance	Indicators	that	
should	be	proactively	monitored,	managed,	and	reported	on.	
Remember	that	teacher	who	said	someday	this	will	save	your	life?	Yeah	it	won’t	but	math	still	matters
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Building	Our	Model
§ Throughput
– Total	transactions	per	second	the	policy	server	is	fulfilling	(per	second)
§ Latency
– How	long	does	each	transaction	take	to	be	processed
§ Thread	Latency – how	long	before	a	worker	thread	pulls	the	request	from	
the	queue
§ Execution	Latency	– how	much	time	does	that	worker	thread	take	in	
processing	the	request
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Relationship	of	Threads,	Throughput	and	Latency
§ On	any	system	with	a	set	number	of	threads,	throughput	
and	latency	are	interrelated
– As	latency	goes	up	the	throughput	goes	down
– As	throughput	goes	down	additional	requests	are	queued	causing	
increased	latency
Maximum	Server	Throughput	=	
!"#$%&'
()*	!,-	!./$	('$1)
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
We	Control	Threads,	but	Not	Thread	
or	Execution	Latency	
§ There	are	two	primary	reasons	for	Policy	Server	slowdown
1. Too	many	Agent	API	requests	coming	in	for	the	Policy	Server	
2. Response	time	from	the	user	directory
§ If	too	many	Agent	API	requests	are	coming	in,	the	thread	latency	will	
increase	if	there	aren’t	enough	threads	to	service	them	in	a	timely	
manner.
§ If	the	response	time	for	the	user	directory	increases	execution	latency	
increases,	which	in	turn	causes	thread	latency	to	increase.
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Too	Many	Agent	API	Requests	
§ A	single	web	page	doesn’t	mean	a	single	request.
§ HCO	settings	limiting	the	number	of	agent	connections	aren’t	applicable	
depending	on	the	apache	threading	model.
§ If	the	application	teams	have	configured	to	allow	2000	max	clients,	but	
you	are	saying	20	max	connections….it	will	be	2000	max	connections.
§ At	peak	times,	if	not	properly	managed,	your	web	servers	can	overload	
your	policy	server	and	significantly	increase	thread	latency.
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Directory	Latency	Affects	Throughput	which	
Affects	Single	Sign-On	Performance
§ Assumptions
– 15	threads
– Average	of	7	LDAP	queries	per	transaction	
– Average	LDAP	(including	the	network)	latency	is	10ms
– Goal:	125	transactions	/	sec
§ Average	transaction	time	must	be	at	least	70Ms	(LDAP)	+	30ms	processing	=	100	
ms (0.1	sec)
§ 15	threads	/	0.1	seconds	=	150	transactions	/	sec	maximum
§ When	LDAP	goes	to	15ms	the	maximum	throughput		drops	to	111	txns/sec
Using:				Maximum	Server	Throughput	=
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Keeping	Low	Transactional	Latency
§ Right	size	connections,	threads,	and	agent	ratio’s	for	load	and	hardware.
§ Minimize	custom	/	third	party	code	and	optimize	any	callouts	that	code	
makes	to	remote	systems
§ Use	smart	LDAP	searches	and	optimized	database	queries
§ Keep	Agent	to	Policy	server	and	Policy	server	to	user	directory	
connections	over	fast	connections	– possibly	in	same	datacenter
§ Work	with	user	directory	teams	to	ensure	the	directories	are	performing	
as	required
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Throughput
We	can	model	throughput	to	
properly	plan	for	capacity.
We	can	model	what	even	a	
small	change	in	the	network	or	
directory	performance	will	do.
We	can	use	these	models	to	
become	proactive	and	
predictive.
Thread	Latency
Can	be	affected	by	a	large	
volume	of	requests
Can	be	affected	by	high	
execution	latency
You	must	do	the	math	in	
advance	and	right	size	for	the	
expected	peak	loads
Execution	Latency
Poor	Policy	Design	can	increase	
calls	to	the	directory
SSO	is	usually	the	victim,	but	
unless	you	can	prove	it,	that	
doesn’t	matter.
Increasing	the	number	of	
threads	is	not	always	the	
answer.
Checkpoint
What	Do	We	Know	So	Far?
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	are	the	SSO	KPI’s
§ With	the	information	we	have,	we	can	build	a	predictive	
model	for	performance	and	capacity.
§ We	must	also	understand	the	impacts	of	throughput	on	that	
model,	and	the	impacts	of	latency	on	throughput.
§ Using	this	we	can	identify	Key	Performance	Indicators	that	
should	be	proactively	monitored,	managed,	and	reported	on.	
Knowledge	is	half	the	battle,	but	you	will	still	lose	if	that’s	all	you	have.
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	do	you	Need	Track?
User	Store	Access Policy	Store	Access Session Store	Access
Cache	Success	Rate Cache	Miss	Rate Socket	Counts
Max Queue	Length Current	Normal	Queue	Length High	Priority Queue	Length
Avg Authorization Time Avg Authentication	Time Avg Validation	Time
Avg IsProtected Time Max	Sockets Transaction	Counts
Agent	Transaction	Times Agent	Cache	settings
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
How	Can	We	Monitor	SSO	KPI’s
§ CA	SM	Trace	Tool
§ CA	OneView Monitor
§ CA	APM	for	SSO
§ SNMP	(Splunk,	UIM,	Any	tool	that	can	issue	SNMP	GET)
§ Spylogix for	CA	SSO
It’s	not	about	how	you	get	the	data,	but	what	you	do	with	it
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SM	Trace	Tool
Unlocking	the	Data	in	Your	CA	SSO	Logs
§ Load	and	parse	logs	from	all	
CA	SSO	components
§ Generates	reports	detailing	
performance	for	that	point	
in	time
§ Identifies	potential	
bottlenecks
§ Let’s	take	a	look!!!
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
OneView Monitor
§ Centrally	reports	KPI’s
§ Gathers	data	from	agents	and	policy	servers
§ You	need	to	record	and	gather	the	data
§ Let’s	take	a	look!!!
The	Data	is	there,	if	You	Go	and	Get	it
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	APM
When	You	Prefer	those	KPI’s	Wrapped	up	in	a	Bow
§ Built	in	CA	SSO	Dashboards
§ Know	instantly	if	there	is	a	
problem,	drill	down	to	RCA
§ Data	and	analysis	comes	to	
you.
§ Let’s	take	a	look!!!
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SNMP
Integrate	with	Your	Preferred	Tool
§ 60	Objects	accessible	by	
SNMP	GET
§ 17	Events	available	to	be	
sent	via	SNMP	Trap
§ Present	the	data	how	you	
want	it	presented
§ Let’s	look	at	some	samples	
from	Splunk!
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SpyLogix for	CA	SSO
Certified	CA	Solution
§ Full	Analytics	platform	for	
CA	SSO
§ Built	in	dashboards	for	
performance,	systems	
management	and	utilization
§ Focused	on	MTTR	and	
MTBSI
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Why	Does	it	Matter?	How	will	this	Data	Help	Me?
§ User’s	are	complaining	about	‘slow’	SSO	performance
– What	is	the	definition	of	slow?
– Can	you	show	what	the	performance	of	SSO	is	to	combat	that	
impression?
– Does	their	definition	of	slow	include	the	load	time	for	the	application	
page?	How	do	you	show	if	you	are	affecting	that?
– Can	you	show	historical	evidence	of	performance	and	stability?
§ Maybe	SSO	is	having	an	issue,	can	you	pinpoint	where	it	is?
Real	world	scenario’s
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Having	Access	to	the	Data	Improves	Your	Response
§ Here	are	graphs	showing	
the	customer	queue	depth
§ From	these	charts	we	can	
see	the	queue	keeps	
growing
– Either	the	load	has	increased,	
or
– The	backend	cannot	keep	up
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Now	I	Know	there	is	an	Issue,	What’s	Causing	it?
§ Need	to	answer	two	questions
– How	do	we	determine	which	of	the	two	conditions	the	Policy	Server	is	
in?
§ Are	we	queuing	the	request	because	there	are	too	many	incoming	
requests?
§ Are	we	queuing	the	request	because	the	transactions	are	taking	too	long	to	
process?
– How	can	we	easily	answer	those	questions?
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SM	Trace	Tool	is	Able	to	Identify	Slow	
LDAP	Response	Times
§ We	can	see	the	distribution	
of	LDAP	responses	which	
have	a	major	influence	on	
CA	SiteMinder	throughput
§ We	had	to	go	get	this	data,	
what	if	we	had	been	alerted	
when	the	average	started	
increasing,	before	users	
complained?
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
APM	for	CA	SSO	Shows	the	Same	Type	of	Slowdowns
§ We	see	a	different	
representation	of	the	same	
problem.	
§ But	instead	of	being	alerted	
to	the	problem	by	users,	
APM	for	SSO	can	alert	us	
before	becomes	a	problem.
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Establishing	a	Proactive	Monitoring	Program
§ We	cannot	rely	on	user	errors	to	tell	us	when	there	is	a	
problem,	its	often	too	late
§ You	must	have	the	data	readily	available	to	advertise	SSO’s	
success
§ You	must	have	the	data	readily	available	to	act	when	SSO	has	
an	issue.
Users	are	not	your	first	line	of	alerting
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Single	Sign-On	is	Mission	Critical
§ Single	Sign-On	touches	many	applications	across	the	
enterprise
– Both	internal	employee	and	Consumer	transactions
§ If	Single	Sign-On	stops,	the	applications	stop	as	well
§ When	a	problem	occurs	we	must	know	why	so	action	can	be	
taken
– Need	to	identify	problems	that	are	intermittent
– Need	to	identify	possible	problems	before	they	cause	outages
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Organizations	Need	to	Identify	Problems	Quickly
§ Single	Sign-On	can	cross	many	organizations	
– Application	teams
– Directory	teams
– Single	Sign-On	teams
§ When	a	problem	occurs	we	tend	to	play	organizational	blame	
games
§ Since	Single	Sign-On	touches	many	components	it	often	gets	
blamed	even	if	it	is	not	at	fault
38 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Many	Different	Ways	to	“Monitor”
§ “Monitor”	can	mean	many	different	things
– Components	Up	/	Down
– System	“health”	
– User	activity
– Administrative	Activity
§ Your	program	must	incorporate	elements	of	all	to	be	most	
effective
39 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Synthetic	Transactions	(CA	App	Synthetic	Monitor)	
§ Tools	to	Automatically	“login”	and	access	a	page
§ Sees	the	site	from	an	end	user	perspective
§ Be	careful	when	geographically	distributed
– The	monitor	becomes	the	failure	point
§ Be	careful	of	monitoring	becoming	the	biggest	user	of	the	
system.
40 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Synthetic	Transactions	(CA	App	Synthetic	Monitor)	
§ What	it	tells	you
– Is	your	website	responding	to	logins
– Login	transaction	and	first	page	load	times.
§ Benefits
– Looks	across	entire	site
§ Drawbacks
– Unknown	what	the	path	is	for	the	transaction
§ Failover,	round	robin,	internal	component	failures	are	hidden
– Can	create	extra	load	on	system
Tip:	a	single	website	on	each	policy	server	with	a	single	agent	that	only	communicates	to	that	policy	server
41 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
ServerErrorFile ACO	Setting
§ Existing	ACO	setting	to	either	display	a	friendly	HTML	page	or	
redirect	on	a	WebAgent Error
§ Use	the	redirect	ability	to	redirect	users	to	a	friendly	page	on	
a	separate	web	server	
– Create	a	separate	log	for	errors	for	all	agents	in	a	single	spot
– Collect	the	error	code	(Querystring)	
– Collect	the	referrer	(HTTP	headers)
§ Log	these	and	analyze	weekly.
42 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
ServerErrorFile ACO	Setting	
§ What	it	tells	you
– Has	a	Web	Agent	encountered	an	error
§ What	the	error	code	is
§ Which	website
§ Benefits
– Real	time	information	– can	trigger	an	alert	
– Useful	in	calculating	intermittent	issues
– Can	also	display	a	friendly	error	page
§ Drawbacks
– If	you	aren’t	analyzing	the	data,	there	is	no	value
43 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Network	Visualization	
(CA	Application	Delivery	Analysis	(ADA))
§ Network	Layer	Monitoring	tool
§ Plugs	into	network	switches	and	looks	at	TCP	Traffic
§ Can	examine	communications	to/from	multiple	systems	and	
understand	latency	of	these	components
44 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Network	Visualization	
(CA	Application	Delivery	Analysis	(ADA))
§ What	it	tells	you
– Latency	of	communications	between	multiple	components
§ Benefits
– Can	quickly	identify	component	have	trouble
– Can	identify	if	it	is	the	network	or	the	application
§ Drawbacks
– Not	included	in	Core	Single	Sign-On	License
– Not	a	Single	Sign-On	specific	solution
– Overkill	in	small	environments
45 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Key	Performance	Indicators
§ Oneview/APM/SNMP/SpyLogix
§ One	component	of	a	comprehensive	solution
§ Often	this	is	the	missing	component	in	a	comprehensive	
monitoring	solution.
46 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Step	1	– Baseline	Your	Environment
§ Once	you	have	chosen	your	toolset	identify	your	baseline
– Capture	data	without	alerting	for	2	– 4	weeks
§ Focus	on	a	timeframe	that	spans	key	peak	usage	periods
– Monthly	or	quarterly	spikes
§ Discuss	the	goals	with	your	customers	and	stakeholders
– They	often	have	insights	into	their	usage	that	you	may	not	know.
47 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Step	2	– Create	habits	to	review	data
§ Create	habits	and	carve	out	time	for	data	to	be	reviewed
– This	helps	identify	new	area’s	for	coverage
– Identifies	previously	unknown	and	unmonitored	errors
– The	more	you	review	a	system,	the	better	you	know	it
§ As	new	errors	are	found,	create	a	knowledge	base	and	keep	it	updated
– Share	that	data	and	steps	to	resolve.	The	more	people	that	know	the	better.	
This	is	about	ensuring	a	good	customer	experience.
§ Incentivize	finding	new	items.	Reward	your	team	for	finding	new	issues	
and	their	resolution,	make	it	cultural
48 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Step	3	– Create	alerts	based	on	the	baseline	data
§ When	performance	degraded	more	than	x%	warn
§ When	performance	degrades	more	than	XX%	alert
§ Warn	your	team	so	they	can	act	before	a	problem
§ Alert	broad	and	wide.	Transparency	builds	trust,	trust	builds	
confidence.
§ Continue	to	fine	tune	alerts
49 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Step	4	– Create	Dashboards
§ Create	dashboards	to	help	your	team	stay	on	top	of	the	
solution.
§ Identify	the	most	critical	items	and	put	them	in	first
§ Identify	the	most	troublesome	and	put	them	in	second
§ Make	sure	everyone	knows	how	to	get	to	them	and	how	to	
read	them.
50 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Step	5	– Advertise,	Engage,	and	Sell
§ Create	dashboards	for	your	‘customer’	to	see
– General	ones	that	are	across	the	whole	solution
– Specific	application	based	dashboards	for	larger	apps
§ Create	an	executive	report	and	send	it	out	regularly	to	your	customers,	
their	chain	of	command	and	your	chain	of	comment.	
– Advertise	your	success.	
§ Consider	a	subscription	model	to	your	successes	and	challenges
– Internal	twitter	feeds	where	customers	can	subscribe	and	just	see	what	is	
going	on.
51 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCX12E
Pre-Con	Ed:	Five	Easy	Steps	for	Migrating	to	
CA	Directory
11/15/2016	at	3:30	pm
SCT44T
Web	Access	Management	and	Federation	–
Two	Great	Tastes	that	Taste	Good	Together
11/16/2016	at	11:30	am
SCX20S
CA	Roadmap:	Authentication,	Single	Sign-
On,	Directory
11/17/2016 at 01:45	pm
52 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
We	Want	to	Hear	From	You!
§ IT	Central	is	a	leading	technology	review	site.		CA	has	them	to	
help	generate	product	reviews	for	our	Security	products.
§ ITCS	staff	will	be	at	most	sessions.	If	you	would	like	to		offer	a	
product	review,	please	ask	them	after	the	class,	or	go	by	their	
booth.
Note:
§ Only	takes	5-7	mins
§ You	have	total	control	over	the	review
§ It	can	be	anonymous,	if	required
53 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
54 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
55 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw

More Related Content

What's hot

Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
CA Technologies
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
 
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
CA Technologies
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
 
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementPre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
CA Technologies
 
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
CA Technologies
 
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
CA Technologies
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
 
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
CA Technologies
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
CA Technologies
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
CA Technologies
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
CA Technologies
 
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentBest Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
CA Technologies
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
CA Technologies
 
Agile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, SucceedAgile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, Succeed
CA Technologies
 
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
CA Technologies
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
CA Technologies
 
Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deploy...
Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deploy...Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deploy...
Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deploy...
CA Technologies
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
CA Technologies
 

What's hot (20)

Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementPre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
 
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
 
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
 
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentBest Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
 
Agile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, SucceedAgile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, Succeed
 
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
 
Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deploy...
Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deploy...Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deploy...
Case Study: Jeweler’s Mutual Insurance Streamlines Complex Application Deploy...
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
 

Similar to Pre-Con Ed: Who's minding the SSO store?

Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
CA Technologies
 
Building Software Where the Music Died
Building Software Where the Music DiedBuilding Software Where the Music Died
Building Software Where the Music Died
CA Technologies
 
Microservice Lifecycle Demo Presentation
Microservice Lifecycle Demo PresentationMicroservice Lifecycle Demo Presentation
Microservice Lifecycle Demo Presentation
Matt McLarty
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
CA Technologies
 
Pre-Con Ed: CA Live API Creator:  Build and Deploy Enterprise-class APIs With...
Pre-Con Ed: CA Live API Creator:  Build and Deploy Enterprise-class APIs With...Pre-Con Ed: CA Live API Creator:  Build and Deploy Enterprise-class APIs With...
Pre-Con Ed: CA Live API Creator:  Build and Deploy Enterprise-class APIs With...
CA Technologies
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
CA Technologies
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
CA Technologies
 
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
CA Technologies
 
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
CA Technologies
 
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep DivePre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
CA Technologies
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
CA Technologies
 
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
CA Technologies
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Technologies
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
CA Technologies
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
CA Technologies
 
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementPre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
CA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
 
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create ReportsPre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
CA Technologies
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
CA Technologies
 

Similar to Pre-Con Ed: Who's minding the SSO store? (20)

Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
 
Building Software Where the Music Died
Building Software Where the Music DiedBuilding Software Where the Music Died
Building Software Where the Music Died
 
Microservice Lifecycle Demo Presentation
Microservice Lifecycle Demo PresentationMicroservice Lifecycle Demo Presentation
Microservice Lifecycle Demo Presentation
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
 
Pre-Con Ed: CA Live API Creator:  Build and Deploy Enterprise-class APIs With...
Pre-Con Ed: CA Live API Creator:  Build and Deploy Enterprise-class APIs With...Pre-Con Ed: CA Live API Creator:  Build and Deploy Enterprise-class APIs With...
Pre-Con Ed: CA Live API Creator:  Build and Deploy Enterprise-class APIs With...
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
 
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...
 
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...
 
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep DivePre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
 
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an E...
 
CA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Datacom®/AD Installation/Upgrade and Maintenance
CA Datacom®/AD Installation/Upgrade and Maintenance
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
 
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementPre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
 
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create ReportsPre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Pre-Con Ed: Who's minding the SSO store?