CA

Displaying 1-40 of 225 results

  • White Papers // Oct 2011

    Recommendations for risk management

    As IT infrastructures become more complex, managing who, what, where, when and how IT resources and data are being accessed has never been more important. The IT department has a big job in managing technology, but today's businesses want IT to act more as a service provider ? one that...

    Provided By CA

  • White Papers // Aug 2011

    Cloud computing and virtualisation: Why IT automation matters.

    IT organisations can obviously see potential benefits from using cloud computing and virtualisation, from cost savings to a flexible infrastructure. But research from UBM TechWeb for CA shows that many IT administrators are struggling to realise this potential without the use of IT services automation. Can you remember why you...

    Provided By CA

  • White Papers // Aug 2011

    Establish and automate an end-to-end framework

    Despite its many departments and services, an enterprise can still work cohesively if it has a comprehensive process and the linked tools to support it. Good procedures and tools to manage processes can improve an organisation's agility, while also answering the immediate call from internal customers who might find the...

    Provided By CA

  • White Papers // Jul 2011

    Innovations in managing IT service quality

    The ongoing global economic recession has left no business, budget, or IT organization unscathed. Corporations, forced to do more with fewer resources, are demanding greater economies of scale. That sets expectations that IT organizations will remain lean yet deliver high-quality services and support. This requires IT organizations to develop more...

    Provided By CA

  • White Papers // Jul 2011

    How to assure customers of the quality and availability of business services

    As IT organisations are increasingly measured by their relationship to revenue, employee productivity and business success, the more they need to visualise, analyse and manage how the components in their IT environment impact business services. Read how CA Service Assurance addresses these key challenges and provides a comprehensive, unified understanding...

    Provided By CA

  • Case Studies // Jun 2011

    PGi Halves the Time-to-Market for New Products With Cloud Infrastructure Solutions From CA Technologies

    Premier Global Services, Inc. (PGi) is a software and services company delivering real-time virtual meetings, conferencing and collaboration solutions. Their challenge is To maintain its competitive advantage, PGi needs to continuously reinvent its solutions. However, lengthy IT provisioning processes were impacting the time-to-market for new customer offerings. Using CA 3TeraAppLogic...

    Provided By CA

  • White Papers // Mar 2011

    Increase Operational Efficiency - Enabling End-to-End Change Automation

    Because it often includes several siloed groups and responsibilities within the larger IT organization, comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. Many companies struggle to quickly and flexibly respond to change requests and...

    Provided By CA

  • Webcasts // Mar 2011

    The Evolution of Workload Automation

    This video discusses the benefits of workload automation such as reduced costs, improved agility and a more granular use of resources. Please view to learn more.

    Provided By CA

  • White Papers // Mar 2011

    Cloud Cross-CSU white paper: Can You Harness Cloud without Creating Storms?

    The role of IT isn't about to change ? it is already changing and at lightning speed. So how do you capitalize on powerful new technologies like cloud computing without the turbulence of rapid change? You start by gaining exceptional insight and control over your current physical and virtual environments....

    Provided By CA

  • White Papers // Mar 2011

    Catholic Health East Customer Success

    Business: Catholic Health East (CHE) includes 34 acute care hospitals, 14 assisted living facilities and 32 home health/hospice agencies as well as numerous other health services and centers. Co-sponsored by nine religious congregations and Hope Ministries, CHE is a US-based multi-institutional Catholic health system. Challenge: To ensure the effectiveness of...

    Provided By CA

  • Webcasts // Mar 2011

    Donors Choose 3Tera Video

    Learn more at www.donorschoose.org. Oliver Hurst-Hiller, CTO of DonorsChoose.org talks about why they moved to the cloud.

    Provided By CA

  • White Papers // Mar 2011

    Forrester - You're Not Ready for Internal Cloud

    Cloud computing ? a standardized, self-service, pay-per-use deployment model ? provides companies with rapid access to powerful and more flexible IT capabilities and at price points unreachable with traditional IT. Although many companies are benefitting from public cloud computing services today, the vast majority of enterprise infrastructure and operations (I&O)...

    Provided By CA

  • White Papers // Mar 2011

    IDC Report: CA Automation Suite Paves the Way for Cloud

    This white paper describes how virtualization and cloud initiatives are creating new types of management challenges across physical and virtual data center environments. It explains why standardization, automation, and integration of many processes and tools are needed to help IT teams become more productive and agile. It also describes...

    Provided By CA

  • Webcasts // Mar 2011

    IDC Webcast: Automation: Prerequisite for Cloud

    The promise and benefits of Cloud are impossible without automation. Join our moderator, Ryan Shopp and industry experts Mary Johnston Turner, Research Director - IDC and Stephen Elliot, VP Strategy - CA Technologies in an open discussion walking through the challenges, explaining pragmatic approaches to increase the odds of success...

    Provided By CA

  • White Papers // Mar 2011

    Webcast: Role of Automation in Cloud Computing. Featured analyst from RedMonk

    This webcast provides an analyst's perspective on cloud computing and the role of automation. It will discuss how to leverage both Public and Private Clouds with a Hybrid Cloud. Additionally it will introduce CA's new automation suite. View to learn more.

    Provided By CA

  • White Papers // Mar 2011

    Computer World Executive Report: The Best of Both Worlds: The Hybrid Cloud

    To handle the demands of modern business, CIOs must manage their internal data centers more effectively and learn how to leverage public cloud resources. The solution: a hybrid cloud strategy facilitated by a dynamic data center. Who knew that a video marketing campaign featuring a donkey, a baby and a...

    Provided By CA

  • White Papers // Mar 2011

    Workload Automation for the Cloud

    As cloud computing has become a strategic initiative for large enterprises, the new method of delivering and consuming IT services has forces its user to rethink domains like job scheduling that have long been considered mature and stable. This paper discusses workload automation and job scheduling as it pertains to...

    Provided By CA

  • Webcasts // Mar 2011

    Velocity Event: Accelerate your Journey to Virtualization and the Cloud

    Accelerate your Journey to Virtualization and the Cloud Published: 28 Dec 2010 CA Technologies recently invited four industry experts on virtualization and cloud computing to participate in a panel discussion. This executive seminar was beamed live in high definition to audiences in 30 cities across the US. This exceptional panel...

    Provided By CA

  • White Papers // Mar 2011

    Getting Virtualization Back in Gear: Overcoming VM Stall Through 1:1 Virtualization

    The potential benefits of virtualization are well documented: increased agility, improved disaster recovery capability, and significant cost savings due to server consolidation. However, many companies experience political and cultural barriers after virtualizing 15-30% of IT processes. IT leaders often cite security, compliance, and visibility as the primary concerns behind these...

    Provided By CA

  • White Papers // Mar 2011

    Virtualization Management and Trends (Forrester Research Study)

    In November 2009, CA commissioned Forrester Consulting to evaluate the impact, challenges, and requirements around the operational aspects of virtualization. The study confirms that virtualization is continuing to expand, and the technology introduces new levels of complexity that threaten the stability of services. As day-to-day production responsibility shifts from subject...

    Provided By CA

  • White Papers // Mar 2011

    Layered Tech Case Study

    Business: Layered Tech is a leader in managed hosting services with data centers in the US, Europe and Japan and clients ranging from Web startups to some of the world's largest consultancy firms. Challenge: As Layered Tech customers required more complex services, the cost of servicing them increased. They needed...

    Provided By CA

  • White Papers // Mar 2011

    Gartner Newsletter

    Cloud computing signifies a transformational approach in the way businesses consume and utilize IT resources. Based on the efficient use of on-demand computing, cloud computing is the logical evolution of efficiencies IT managers strive for as they manage the IT infrastructures they own today. In the future, virtualization and cloud...

    Provided By CA

  • Webcasts // Mar 2011

    ROI and Happy Online Customer Webcast

    Online customers are demanding a greater amount of Web services, delivered at faster speeds. But how do you balance the needs of these customers with shrinking IT budgets? Application Performance Management (APM) is the answer. Join CA and guest speaker Forrester Research, Inc. consultant Jonathan Lipsitz for this exclusive...

    Provided By CA

  • White Papers // Mar 2011

    CIOs Feel the pressure to optimize online experience

    In an exclusive survey, members of the CIO Forum on LinkedIn have weighed in on the business impact of application performance. These CIOs and IT leaders say they directly associate application performance with end-user and customer satisfaction, along with the potential to increase productivity and lower costs. Based on this...

    Provided By CA

  • Webcasts // Mar 2011

    Reporter Analyzer Webcast

    Traffic Analysis gives IT Professionals insight into how applications are impacting network performance. View this webcast to learn about Traffic Analysis as a vital component of service assurance.

    Provided By CA

  • White Papers // Mar 2011

    APM for IM x-sell whitepaper - Linking infrastructure management and application performance

    It is a common goal of IT departments across enterprises, government agencies and service providers to determine the most effective way to identify, locate and resolve problems affecting critical business applications. One way IT has attempted to achieve this goal is by forging a tighter bond between the activities of...

    Provided By CA

  • White Papers // Mar 2011

    NetQoS to IM and APM whitepaper

    IT professionals tasked with managing today's dynamic and increasingly complex local- and wide-area networks are often judged by how well they can optimize availability and performance to provide a high-quality user experience. Thanks in large part to advances in the areas of dual power supplies, failover technologies and redundant routes,...

    Provided By CA

  • White Papers // Mar 2011

    The 2010 Application Delivery Handbook

    While ensuring acceptable application delivery has always been important, it historically was not a top of mind issue for the majority of IT organizations. That changed several years ago when IT organizations began to develop a concerted focus on it. Throughout this handbook, the application delivery challenges and solutions of...

    Provided By CA

  • White Papers // Mar 2011

    Forrester Paper: The Total Economic Impact of CA Identity Manager

    In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). CA IM is used by organizations to provide automated user provisioning, user self-service for password resets, workflows for submitting and...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can I Adopt Cloud Computing While Maintaining Strong Security?

    In today's business landscape, enterprises are increasingly consuming IT services from the cloud, but even as they do, they're becoming more concerned with how they can ensure effective security of their data and services in the cloud-especially since they have limited direct control or visibility over them. At the same...

    Provided By CA

  • White Papers // Mar 2011

    The Arrival of 'Cloud Thinking': How and Why Cloud Computing Has Come of Age In Large Enterprises" (White paper, Management Insight Technologies)

    Much is being made of the "the cloud." The money it will save. The agility it will bring to computing. What is less obvious is how IT departments are actively employing cloud services today. How they are reacting to both public and private cloud initiatives. What it will mean over...

    Provided By CA

  • White Papers // Mar 2011

    The Emergence of SA in Enterprise IT - WP

    In June 2010, CA Technologies commissioned Forrester Consulting to evaluate issues surrounding the assurance of critical business services and applications. In surveying more than 150 IT professionals with direct responsibility for network, systems, and/or application delivery, Forrester found that all of these enterprises had fundamental issues around managing the performance...

    Provided By CA

  • White Papers // Mar 2011

    Defending Against Insider Threats to Reduce your IT Risk

    The threat of insider theft or malicious acts is significant and something all organizations must continually contend with. Organizations have users who have access to sensitive or confidential information that should not, and must not, be communicated outside the organization. They also have privileged users (administrators) who often possess complete...

    Provided By CA

  • White Papers // Mar 2011

    Vendor Report: CA Technologies Virtualization Security (KuppingerCole)

    Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization Security...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can I Overcome the Security Challenges of Today's Virtualized Infrastructures?

    According to Gartner, "through 2012, 60% of virtualized servers will be less secure than the physical servers they replace, dropping to 30% by Year End 2015." So regardless of how "physical" or "virtual" an infrastructure is, it's clear that the need for complete security management is paramount. Organizations hoping to...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can Identity and Access Management Help Improve My Compliance Programs?

    With the right technology in place, companies can provide evidence that their controls are effective, and compliance audits may thus be a less painful and expensive process. Organizations hoping to achieve this can begin by: Understanding the compliance lifestyle Implementing Content-aware IAM solution Leveraging compliance to improve business efficiency...

    Provided By CA

  • White Papers // Mar 2011

    Gartner Magic Quadrant for User Provisioning

    User-provisioning solutions are maturing in function and capability, and the user-provisioning market continues to consolidate. As some identity and access management (IAM) technologies approach a commoditylike state, the boundaries between core IAM products, such as user provisioning and companion product sets, are blurring. Core provisioning functionalities are similar across most...

    Provided By CA

  • Webcasts // Mar 2011

    Webinar: Powerful Control of Privileged Users

    In this webinar learn about Privileged User Management and why organizations need it. The challenges of Privileged User Management will be discussed as well as the CA Technologies solution for overcoming them. Please watch to learn more.

    Provided By CA

  • White Papers // Mar 2011

    CA Technology Brief: Content-aware IAM

    There are several key drivers for most IT organizations today. First, they must reduce risk, and maintain privacy of corporate and customer information. Second, they must comply with regulatory and industry mandates. Third, they must improve operational efficiencies. And, finally, they must enable the business for growth. A key...

    Provided By CA

  • White Papers // Mar 2011

    CA Solution Brief: Content Aware Identity and Access Management

    CA Content-Aware Identity and Access Management (IAM) solutions enable you to control user identities, access, and information use. You can achieve more effective compliance, reduce IT risk, and expand your customer and partner relationships to help grow your business. Managing the identities and access rights of those inside and...

    Provided By CA

  • Webcasts // Nov 2006

    CA Harvest Change Manager Plug-In for Eclipse Webcast

    The CA Harvest Change Manager Plug-in for Eclipse webcast will show participants how they can make the most from the latest major enhancements provided by the enhanced Eclipse Plug-in interface, which offers best-in-class integration into change management for developers using Eclipse-based development tools.

    Provided By CA

  • White Papers // Feb 2009

    Best Practices for Data Archiving

    Corporations depend on the flow of information to conduct their business. From accounting to production to marketing to personnel, the information procured, generated, organized, and stored by an organization represents a significant portion of the output of its workforce. Protecting that information from unexpected disasters is not only prudent, in...

    Provided By CA

  • White Papers // Sep 2008

    IDC White paper: How Project and Portfolio Management are Delivering Value to Organizations to Enhance Their Current Knowledge of PPM

    If you're still managing your IT projects and portfolios with spreadsheets, you may be falling behind. Disconnected, manual systems don't provide the visibility you need to make fact-based decisions in real time to better align IT with business objectives. In their August 2008 research report, How Project And Portfolio Management...

    Provided By CA

  • White Papers // Jun 2008

    Essential ITIL: What You Need to Succeed

    ITIL is about process. There are different approaches to process implementation based on which "Version" of ITIL one is inclined to adopt. But without debating the merits of ITIL "Versions," let's presume that any ITIL implementation discussion ultimately has roots in the principle of Process Improvement. Besides, ITIL v2 and...

    Provided By CA

  • White Papers // Sep 2009

    Effective Information Security: A Win-Win Proposition for the Enterprise and IT

    Driven by an accelerated increase in identity theft, consumer fraud, and other personal information - related thefts, industry groups and federal and state governments have taken aggressive steps to hold companies and their management accountable for confidential information disclosures. Similarly, enterprises are facing significant challenges in preventing the theft or...

    Provided By CA

  • Case Studies // Jun 2009

    Arcor Improves Service Levels for Around 3 Million DSL Customers With CA Spectrum IM and CA eHealth PM

    To survive in the competitive telecommunications sector, Arcor must be able to meet the service expectations of its customers. These service levels are dependent on the performance and availability of the company's IT infrastructure. Arcor's former disparate approach to systems monitoring and fault management was both costly and complex. Arcor...

    Provided By CA

  • Case Studies // Aug 2009

    Air Liquide Optimises Processing of 22,000 Daily IT Jobs With CA AutoSys WA

    Faced with ambitious growth and financial targets, Air Liquide needed to improve the efficiency of core business processes, including the generation of 150,000 invoices across the company's European operations at the end of each month. This meant taking a more automated approach to scheduling IT jobs. Using CA AutoSys Workload...

    Provided By CA

  • Case Studies // Jun 2009

    Telekom Austria Safeguards Service Levels for 17 Million Subscribers With CA eHealth Performance Manager

    Customer service levels and future business growth are dependent on the company's IT infrastructure, and especially its network. Following a network consolidation program, Telekom Austria needed to ensure that it could maintain performance and availability levels. Telekom Austria deployed CA eHealth Performance Manager to centrally monitor both its own and...

    Provided By CA

  • Case Studies // Jul 2009

    HCL Infinet Increases Competitive Advantage and Quality of Service With Integrated IT Management

    IT is fundamental to all HCL Infinet's customer service offerings. With hundreds of internal and customer devices to monitor, HCL Infinet needs end-to-end visibility to ensure it can maintain IT performance and availability. It also needs to be able to provide customers with visibility of service performance levels in real...

    Provided By CA

  • Case Studies // Dec 2009

    VR Netze Achieves Higher Service Levels Using CA eHealth and CA Spectrum

    Given the critical and 24x7 nature of VR Netze's client base, the company must provide a highly available network. With more than 18,000 IT devices to monitor and manage, this is not an easy task. The company needed a fault/event management solution that provided immediate visibility of any possible problems....

    Provided By CA

  • Tools & Templates // Mar 2010

    CA ARCserve Backup r12.5 ROI Calculator

    Now more than ever you're being called on to drive efficiencies, manage risk and do more with less, while at the same time, data ? and its value to your business ? is growing exponentially, compliance requirements for data accessibility are increasing and you have more remote offices requiring data...

    Provided By CA

  • Tools & Templates // Mar 2010

    CA ARCserve Backup with Data Deduplication

    Companies of all sizes today are facing the challenge of managing and protecting data that is growing at exponential rates. The explosion of email, power point and internet downloads means that there is more data to backup. They need to backup more data in the same backup window time and...

    Provided By CA

  • Case Studies // Dec 2009

    Swedish Council Maximises Budgets and Improves Public Services With Automated and Integrated It Management

    To ensure the region's 300-plus healthcare facilities receive high-quality and cost-effective IT services, VGR has consolidated its IT operations. With 45,000 workstations, 1,800 servers and around 1,000 systems/applications now supported centrally, VGR IT needed to increase automation and integration to remove cost and complexity. Working with CA and business consultants...

    Provided By CA

  • White Papers // Jun 2008

    IT Service Management Process Maps: Select Your Route to ITIL Best Practices

    The goal of IT Service Management is to improve service by optimizing technology, controlling costs and maximizing the time and talent of an organization's most valuable resource - its people. As such, ITIL provides an excellent vehicle for tackling the journey to service excellence. However, as a notoriously complex framework,...

    Provided By CA

  • White Papers // Oct 2008

    Discovery and the Configuration Management Database (CMDB)

    A Configuration Management Database (CMDB) forms the foundation for many processes that contribute to running, growing, and transforming the business. When running the business, a CMDB can reduce costs by helping to contain the effects of incidents, improve the process of change, and provide governance and predictability to operations. However,...

    Provided By CA

  • White Papers // Apr 2009

    Myths of the Configuration Management Data Base (CMDB)

    There are many things to consider when implementing a CMDB. The 13 myths described in this white paper, along with the variations described for each, have proven over time to impede the efforts of many. This can occur during the initial design and also as when the transition to adopting...

    Provided By CA

  • White Papers // Apr 2009

    The Value of Standards-based CMDB Federation

    SACM and CMS help an enterprise implement an overall strategy that aligns business and IT services accurately, with a minimum of resource investment, but to achieve those goals, a range of data sources must be integrated. Without an industry standard for integrating IT data sources, this integration is expensive, difficult...

    Provided By CA

  • White Papers // Mar 2009

    Applying the Work Breakdown Structure to the Project Management Lifecycle

    Project Managers are more frequently finding high value in the creation of Work Breakdown Structures (WBS) as they begin the process of project management. As an essential element of the Planning Process Group outlined in the PMBOK Guide - Third Edition, everyday practice is revealing with increasing regularity that creation...

    Provided By CA

  • White Papers // Apr 2009

    Data Loss Prevention Requirements Roadmap

    The creation and sharing of digital information within the typical enterprise continues to accelerate. Being able to effectively and efficiently exchange this information to and from any location or person is a prerequisite for every successful company today. There is an opportunity to raise awareness about the value and proper...

    Provided By CA

  • White Papers // Nov 2008

    Improving IT Economics: Thinking 'Lean'

    Applying 'Lean' principles originally designed in manufacturing and perfected by the likes of Toyota and Motorola better enables IT to identify and eradicate anything that is wasteful within IT management. In the words of 'Lean', anything wasteful is work that adds no value to a product or service that organizations...

    Provided By CA

  • White Papers // Sep 2007

    Best Practice Methodologies for the Project Management Office (PMO)

    This paper, the third in a four-part series from CA, discusses the three leading formalized project management methodologies - the Project Management Institute's (PMI) Management Book of Knowledge (PMBOK), the UK-born Projects in Controlled Environments (PRINCE2), and Control Objectives for Information and Related Technology (COBIT), from the Information Systems Audit...

    Provided By CA

  • Case Studies // Jan 2010

    DBS Enhances Its Competitive Advantage With CA Identity and Access Management Platform

    Headquartered in Singapore, DBS is a well-capitalised bank with "AA-" and "Aa1" credit ratings that are among the highest in the Asia-Pacific region. The accessibility and security of DBS' online corporate banking platform, DBS IDEAL, are key to its competitive advantage. As the industry continued to set new standards for...

    Provided By CA

  • Case Studies // Feb 2010

    Novo Nordisk Maximises Return on Its $500 Million Product Portfolio With CA Clarity PPM

    With no consolidated view of the 800 capital investment projects it ran every year, Novo Nordisk was finding it difficult to track both project status and performance against budget. With information often out of date and derived from a number of spreadsheets, Novo Nordisk needed a more effective approach to...

    Provided By CA

  • Case Studies // Jan 2010

    Baker Tilly Maximises the Time Spent on Fee-Earning Activities With CA EITM Solutions

    Baker Tilly wanted to maximise the time staff and partners spend with clients on fee-earning activities is vital to Baker Tilly's profitability. The challenge was to provide staff with continuous access to technology is key to this goal, which means minimising any IT downtime and maximising service and performance levels....

    Provided By CA

  • Case Studies // Jul 2009

    Schneider Electric Improves Security of Online Services for a Dozen B-to-B Customers With CA SiteMinder WAM

    Schneider Electric provides customers with access to a range of services and information via several Extranet sites. Any unauthorised access to this information could impact customer relationships. To maximise security and support future growth, Schneider Electric wanted to migrate from its existing proprietary identity and access management tool for Web-based...

    Provided By CA

  • Case Studies // Nov 2009

    Starwood Hotels and Resorts Safeguards Availability of Reservation System for Over 1,000 Hotels With Ca Wily Introscope

    Starwood's hotel reservation system is critical to customer satisfaction, and alerts the IT team to any glitches with a room booking, rate quote or reservation change. To safeguard the performance and availability of this SOA -based system, Starwood needs to be aware of any problems before they impact customers or...

    Provided By CA

  • Webcasts // Sep 2010

    Administering Multiple Databases: Part 1

    For DBAs who have to administer more than one database, keeping track of the details of each one can be confusing. Part 1 of this webcast series compares key concepts and implementation methods between CA Datacom, CA IDMSTM, and IBM DB2 for z/OS. Part 2 of the webcast delves into...

    Provided By CA

  • Webcasts // Sep 2010

    Administering Multiple Databases: Part 2

    For DBAs who have to administer more than one database, keeping track of the details of each one can be confusing. Part 1 of this webcast series compares key concepts and implementation methods between CA Datacom, CA IDMSTM, and IBM DB2 for z/OS. Part 2 of the webcast delves into...

    Provided By CA

  • Webcasts // Sep 2010

    Monetizing Data Management

    Organizations have lost millions due to poor data management practices, but remain unaware of the root causes of their losses. Unless IT professionals can monetize these lost opportunities and their related costs, gaining executive-level approval for basic data management investments will continue to be difficult. This sets up an unfortunate...

    Provided By CA

  • Webcasts // Sep 2010

    5 Physical Data Modeling Blunders and How to Avoid Them

    What's going on in the physical data model? How many people can or will update it to match the reality of what's going on in the databases? Who decides what goes into the physical model? In this presentation the presenter discusses 5 physical data modeling mistakes that cost you dearly:...

    Provided By CA

  • Webcasts // Sep 2010

    Mainframe-Hosted Workload Automation Web Services: The Next Step in Integration

    What's the hottest technology job out there today? Working on the mainframe at CA Technologies! Follow a cohort of just-out-of-college mainframers as they begin their journeys to becoming part of the best mainframe software team in the industry.

    Provided By CA

  • Webcasts // Oct 2010

    Mainframe Tape: A Technology for the New Millennium (Part 1)

    Tape technology, has been proclaimed a "Legacy technology" over the past decade. However, tape continues to thrive and to deliver value to organizations that use it. This is due to enhancements made to the technology itself in terms of operational performance, capacity and reliability. It also reflects a steady improvement...

    Provided By CA

  • Webcasts // Oct 2010

    The Emergence of Service Assurance in Enterprise IT

    As the complexity of IT environments continues to increase, the capability to balance that complexity with cost and end-user productivity has become more and more challenging. CA Technologies engaged Forrester Consulting to conduct primary research to understand the organizational readiness and obstacles facing enterprise IT organizations to advance from the...

    Provided By CA

  • Webcasts // Oct 2010

    Best Practices for Entitlement Certification by Michael Liou

    Entitlements certification, also known as attestation, is becoming an increasingly common approach to responding to compliance audits. This process of asking business managers to validate the need for employees' sensitive access allows organizations to demonstrate action which minimize security risk by identifying and eliminating unnecessary access. During this webcast, Michael...

    Provided By CA

  • Webcasts // Oct 2010

    Mainframe Disaster Recovery Old Concepts and New Challenges

    Listen to this webcast and hear Jon Toigo discuss this primer for data protection and data recovery in mainframe storage. Jon will examine the requirements and the challenges for building an effective mainframe storage data protection and recovery plan, with emphasis on techniques for auditing and testing the plan for...

    Provided By CA

  • Webcasts // Sep 2010

    Lab to Live: Smooth Virtualization Transitions

    Server virtualization is now within the grasp of any business and when properly implemented and managed, can help one save some serious money by reducing maintenance costs and minimizing the burden on the staff. But flipping the switch from the lab environment and going live is not the end of...

    Provided By CA

  • Webcasts // Sep 2010

    Effective Capture of Metadata Using CA ERwin Data Modeler

    In any enterprise, one of the major problems faced by the data management team is lack of the metadata information for all tables developed. Even if the data management team wants to publish the definitions of tables and attributes, the lack of metadata definitions limits them to publish only the...

    Provided By CA

  • Webcasts // Sep 2010

    Optimizing the Design of Your Data Warehouse

    Designing a data warehouse is a complicated process. It is typically done using PowerPoint, Excel, and CA ERwin Data Modeler. However, a key component of any data warehouse is the flow of data from source to reports. This session will present a way to use CA ERwin Data Modeler and...

    Provided By CA

  • Webcasts // Sep 2010

    Sneak Peak: CA ERwin Modeling r8 Preview Demonstration

    CA ERwin Modeling Release 8 will be coming out soon. This is the opportunity to get a sneak peak of this major release from one of the product managers. Neil Buchwalter will conduct a demonstrations of the new features and functions and allow time at the end for questions and...

    Provided By CA

  • Webcasts // Sep 2010

    The Zen of Metadata

    This is a discussion and on how to bring harmony between the data and the metadata with a presentation on how one Data Warehouse group used CA ERwin and other tools to accomplish that. This discussion will explore the use of certain ERwin Data Modeling tool features like UDP's, CA...

    Provided By CA