CA

Displaying 1-40 of 219 results

  • White Papers // Oct 2011

    Recommendations for risk management

    As IT infrastructures become more complex, managing who, what, where, when and how IT resources and data are being accessed has never been more important. The IT department has a big job in managing technology, but today's businesses want IT to act more as a service provider ? one that...

    Provided By CA

  • White Papers // Aug 2011

    Cloud computing and virtualisation: Why IT automation matters.

    IT organisations can obviously see potential benefits from using cloud computing and virtualisation, from cost savings to a flexible infrastructure. But research from UBM TechWeb for CA shows that many IT administrators are struggling to realise this potential without the use of IT services automation. Can you remember why you...

    Provided By CA

  • White Papers // Aug 2011

    Establish and automate an end-to-end framework

    Despite its many departments and services, an enterprise can still work cohesively if it has a comprehensive process and the linked tools to support it. Good procedures and tools to manage processes can improve an organisation's agility, while also answering the immediate call from internal customers who might find the...

    Provided By CA

  • White Papers // Jul 2011

    Innovations in managing IT service quality

    The ongoing global economic recession has left no business, budget, or IT organization unscathed. Corporations, forced to do more with fewer resources, are demanding greater economies of scale. That sets expectations that IT organizations will remain lean yet deliver high-quality services and support. This requires IT organizations to develop more...

    Provided By CA

  • White Papers // Jul 2011

    How to assure customers of the quality and availability of business services

    As IT organisations are increasingly measured by their relationship to revenue, employee productivity and business success, the more they need to visualise, analyse and manage how the components in their IT environment impact business services. Read how CA Service Assurance addresses these key challenges and provides a comprehensive, unified understanding...

    Provided By CA

  • Case Studies // Jun 2011

    PGi Halves the Time-to-Market for New Products With Cloud Infrastructure Solutions From CA Technologies

    Premier Global Services, Inc. (PGi) is a software and services company delivering real-time virtual meetings, conferencing and collaboration solutions. Their challenge is To maintain its competitive advantage, PGi needs to continuously reinvent its solutions. However, lengthy IT provisioning processes were impacting the time-to-market for new customer offerings. Using CA 3TeraAppLogic...

    Provided By CA

  • White Papers // Mar 2011

    Cloud Cross-CSU white paper: Can You Harness Cloud without Creating Storms?

    The role of IT isn't about to change ? it is already changing and at lightning speed. So how do you capitalize on powerful new technologies like cloud computing without the turbulence of rapid change? You start by gaining exceptional insight and control over your current physical and virtual environments....

    Provided By CA

  • White Papers // Mar 2011

    Catholic Health East Customer Success

    Business: Catholic Health East (CHE) includes 34 acute care hospitals, 14 assisted living facilities and 32 home health/hospice agencies as well as numerous other health services and centers. Co-sponsored by nine religious congregations and Hope Ministries, CHE is a US-based multi-institutional Catholic health system. Challenge: To ensure the effectiveness of...

    Provided By CA

  • Webcasts // Mar 2011

    Donors Choose 3Tera Video

    Learn more at www.donorschoose.org. Oliver Hurst-Hiller, CTO of DonorsChoose.org talks about why they moved to the cloud.

    Provided By CA

  • White Papers // Mar 2011

    Forrester - You're Not Ready for Internal Cloud

    Cloud computing ? a standardized, self-service, pay-per-use deployment model ? provides companies with rapid access to powerful and more flexible IT capabilities and at price points unreachable with traditional IT. Although many companies are benefitting from public cloud computing services today, the vast majority of enterprise infrastructure and operations (I&O)...

    Provided By CA

  • White Papers // Mar 2011

    Layered Tech Case Study

    Business: Layered Tech is a leader in managed hosting services with data centers in the US, Europe and Japan and clients ranging from Web startups to some of the world's largest consultancy firms. Challenge: As Layered Tech customers required more complex services, the cost of servicing them increased. They needed...

    Provided By CA

  • White Papers // Mar 2011

    Gartner Newsletter

    Cloud computing signifies a transformational approach in the way businesses consume and utilize IT resources. Based on the efficient use of on-demand computing, cloud computing is the logical evolution of efficiencies IT managers strive for as they manage the IT infrastructures they own today. In the future, virtualization and cloud...

    Provided By CA

  • Webcasts // Mar 2011

    ROI and Happy Online Customer Webcast

    Online customers are demanding a greater amount of Web services, delivered at faster speeds. But how do you balance the needs of these customers with shrinking IT budgets? Application Performance Management (APM) is the answer. Join CA and guest speaker Forrester Research, Inc. consultant Jonathan Lipsitz for this exclusive...

    Provided By CA

  • White Papers // Mar 2011

    CIOs Feel the pressure to optimize online experience

    In an exclusive survey, members of the CIO Forum on LinkedIn have weighed in on the business impact of application performance. These CIOs and IT leaders say they directly associate application performance with end-user and customer satisfaction, along with the potential to increase productivity and lower costs. Based on this...

    Provided By CA

  • Webcasts // Mar 2011

    Reporter Analyzer Webcast

    Traffic Analysis gives IT Professionals insight into how applications are impacting network performance. View this webcast to learn about Traffic Analysis as a vital component of service assurance.

    Provided By CA

  • White Papers // Mar 2011

    APM for IM x-sell whitepaper - Linking infrastructure management and application performance

    It is a common goal of IT departments across enterprises, government agencies and service providers to determine the most effective way to identify, locate and resolve problems affecting critical business applications. One way IT has attempted to achieve this goal is by forging a tighter bond between the activities of...

    Provided By CA

  • White Papers // Mar 2011

    NetQoS to IM and APM whitepaper

    IT professionals tasked with managing today's dynamic and increasingly complex local- and wide-area networks are often judged by how well they can optimize availability and performance to provide a high-quality user experience. Thanks in large part to advances in the areas of dual power supplies, failover technologies and redundant routes,...

    Provided By CA

  • White Papers // Mar 2011

    The 2010 Application Delivery Handbook

    While ensuring acceptable application delivery has always been important, it historically was not a top of mind issue for the majority of IT organizations. That changed several years ago when IT organizations began to develop a concerted focus on it. Throughout this handbook, the application delivery challenges and solutions of...

    Provided By CA

  • White Papers // Mar 2011

    Increase Operational Efficiency - Enabling End-to-End Change Automation

    Because it often includes several siloed groups and responsibilities within the larger IT organization, comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. Many companies struggle to quickly and flexibly respond to change requests and...

    Provided By CA

  • Webcasts // Mar 2011

    The Evolution of Workload Automation

    This video discusses the benefits of workload automation such as reduced costs, improved agility and a more granular use of resources. Please view to learn more.

    Provided By CA

  • White Papers // Mar 2011

    Forrester Paper: The Total Economic Impact of CA Identity Manager

    In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). CA IM is used by organizations to provide automated user provisioning, user self-service for password resets, workflows for submitting and...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can I Adopt Cloud Computing While Maintaining Strong Security?

    In today's business landscape, enterprises are increasingly consuming IT services from the cloud, but even as they do, they're becoming more concerned with how they can ensure effective security of their data and services in the cloud-especially since they have limited direct control or visibility over them. At the same...

    Provided By CA

  • White Papers // Mar 2011

    The Arrival of 'Cloud Thinking': How and Why Cloud Computing Has Come of Age In Large Enterprises" (White paper, Management Insight Technologies)

    Much is being made of the "the cloud." The money it will save. The agility it will bring to computing. What is less obvious is how IT departments are actively employing cloud services today. How they are reacting to both public and private cloud initiatives. What it will mean over...

    Provided By CA

  • White Papers // Mar 2011

    The Emergence of SA in Enterprise IT - WP

    In June 2010, CA Technologies commissioned Forrester Consulting to evaluate issues surrounding the assurance of critical business services and applications. In surveying more than 150 IT professionals with direct responsibility for network, systems, and/or application delivery, Forrester found that all of these enterprises had fundamental issues around managing the performance...

    Provided By CA

  • White Papers // Mar 2011

    IDC Report: CA Automation Suite Paves the Way for Cloud

    This white paper describes how virtualization and cloud initiatives are creating new types of management challenges across physical and virtual data center environments. It explains why standardization, automation, and integration of many processes and tools are needed to help IT teams become more productive and agile. It also describes...

    Provided By CA

  • Webcasts // Mar 2011

    IDC Webcast: Automation: Prerequisite for Cloud

    The promise and benefits of Cloud are impossible without automation. Join our moderator, Ryan Shopp and industry experts Mary Johnston Turner, Research Director - IDC and Stephen Elliot, VP Strategy - CA Technologies in an open discussion walking through the challenges, explaining pragmatic approaches to increase the odds of success...

    Provided By CA

  • White Papers // Mar 2011

    Webcast: Role of Automation in Cloud Computing. Featured analyst from RedMonk

    This webcast provides an analyst's perspective on cloud computing and the role of automation. It will discuss how to leverage both Public and Private Clouds with a Hybrid Cloud. Additionally it will introduce CA's new automation suite. View to learn more.

    Provided By CA

  • White Papers // Mar 2011

    Computer World Executive Report: The Best of Both Worlds: The Hybrid Cloud

    To handle the demands of modern business, CIOs must manage their internal data centers more effectively and learn how to leverage public cloud resources. The solution: a hybrid cloud strategy facilitated by a dynamic data center. Who knew that a video marketing campaign featuring a donkey, a baby and a...

    Provided By CA

  • White Papers // Mar 2011

    Workload Automation for the Cloud

    As cloud computing has become a strategic initiative for large enterprises, the new method of delivering and consuming IT services has forces its user to rethink domains like job scheduling that have long been considered mature and stable. This paper discusses workload automation and job scheduling as it pertains to...

    Provided By CA

  • Webcasts // Mar 2011

    Velocity Event: Accelerate your Journey to Virtualization and the Cloud

    Accelerate your Journey to Virtualization and the Cloud Published: 28 Dec 2010 CA Technologies recently invited four industry experts on virtualization and cloud computing to participate in a panel discussion. This executive seminar was beamed live in high definition to audiences in 30 cities across the US. This exceptional panel...

    Provided By CA

  • White Papers // Mar 2011

    Getting Virtualization Back in Gear: Overcoming VM Stall Through 1:1 Virtualization

    The potential benefits of virtualization are well documented: increased agility, improved disaster recovery capability, and significant cost savings due to server consolidation. However, many companies experience political and cultural barriers after virtualizing 15-30% of IT processes. IT leaders often cite security, compliance, and visibility as the primary concerns behind these...

    Provided By CA

  • White Papers // Mar 2011

    Virtualization Management and Trends (Forrester Research Study)

    In November 2009, CA commissioned Forrester Consulting to evaluate the impact, challenges, and requirements around the operational aspects of virtualization. The study confirms that virtualization is continuing to expand, and the technology introduces new levels of complexity that threaten the stability of services. As day-to-day production responsibility shifts from subject...

    Provided By CA

  • White Papers // Mar 2011

    Ponemon Survey: Security of Cloud Computing Users

    CA and Ponemon Institute are pleased to present the results of the Security of Cloud Computing Users study. This paper represents the first of a two-part series on security of cloud applications, infrastructure and platforms. We also have a second study that focuses on cloud computing providers located in the...

    Provided By CA

  • White Papers // Mar 2011

    Defending Against Insider Threats to Reduce your IT Risk

    The threat of insider theft or malicious acts is significant and something all organizations must continually contend with. Organizations have users who have access to sensitive or confidential information that should not, and must not, be communicated outside the organization. They also have privileged users (administrators) who often possess complete...

    Provided By CA

  • White Papers // Mar 2011

    Vendor Report: CA Technologies Virtualization Security (KuppingerCole)

    Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization Security...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can I Overcome the Security Challenges of Today's Virtualized Infrastructures?

    According to Gartner, "through 2012, 60% of virtualized servers will be less secure than the physical servers they replace, dropping to 30% by Year End 2015." So regardless of how "physical" or "virtual" an infrastructure is, it's clear that the need for complete security management is paramount. Organizations hoping to...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can Identity and Access Management Help Improve My Compliance Programs?

    With the right technology in place, companies can provide evidence that their controls are effective, and compliance audits may thus be a less painful and expensive process. Organizations hoping to achieve this can begin by: Understanding the compliance lifestyle Implementing Content-aware IAM solution Leveraging compliance to improve business efficiency...

    Provided By CA

  • White Papers // Mar 2011

    Gartner Magic Quadrant for User Provisioning

    User-provisioning solutions are maturing in function and capability, and the user-provisioning market continues to consolidate. As some identity and access management (IAM) technologies approach a commoditylike state, the boundaries between core IAM products, such as user provisioning and companion product sets, are blurring. Core provisioning functionalities are similar across most...

    Provided By CA

  • Webcasts // Mar 2011

    Webinar: Powerful Control of Privileged Users

    In this webinar learn about Privileged User Management and why organizations need it. The challenges of Privileged User Management will be discussed as well as the CA Technologies solution for overcoming them. Please watch to learn more.

    Provided By CA

  • White Papers // Mar 2011

    CA Technology Brief: Content-aware IAM

    There are several key drivers for most IT organizations today. First, they must reduce risk, and maintain privacy of corporate and customer information. Second, they must comply with regulatory and industry mandates. Third, they must improve operational efficiencies. And, finally, they must enable the business for growth. A key...

    Provided By CA

  • Webcasts // Nov 2006

    CA Harvest Change Manager Plug-In for Eclipse Webcast

    The CA Harvest Change Manager Plug-in for Eclipse webcast will show participants how they can make the most from the latest major enhancements provided by the enhanced Eclipse Plug-in interface, which offers best-in-class integration into change management for developers using Eclipse-based development tools.

    Provided By CA

  • White Papers // Jun 2008

    Essential ITIL: What You Need to Succeed

    ITIL is about process. There are different approaches to process implementation based on which "Version" of ITIL one is inclined to adopt. But without debating the merits of ITIL "Versions," let's presume that any ITIL implementation discussion ultimately has roots in the principle of Process Improvement. Besides, ITIL v2 and...

    Provided By CA

  • White Papers // Apr 2009

    Data Loss Prevention Requirements Roadmap

    The creation and sharing of digital information within the typical enterprise continues to accelerate. Being able to effectively and efficiently exchange this information to and from any location or person is a prerequisite for every successful company today. There is an opportunity to raise awareness about the value and proper...

    Provided By CA

  • White Papers // Jun 2008

    IT Service Management Process Maps: Select Your Route to ITIL Best Practices

    The goal of IT Service Management is to improve service by optimizing technology, controlling costs and maximizing the time and talent of an organization's most valuable resource - its people. As such, ITIL provides an excellent vehicle for tackling the journey to service excellence. However, as a notoriously complex framework,...

    Provided By CA

  • White Papers // Oct 2008

    Discovery and the Configuration Management Database (CMDB)

    A Configuration Management Database (CMDB) forms the foundation for many processes that contribute to running, growing, and transforming the business. When running the business, a CMDB can reduce costs by helping to contain the effects of incidents, improve the process of change, and provide governance and predictability to operations. However,...

    Provided By CA

  • White Papers // Apr 2009

    Myths of the Configuration Management Data Base (CMDB)

    There are many things to consider when implementing a CMDB. The 13 myths described in this white paper, along with the variations described for each, have proven over time to impede the efforts of many. This can occur during the initial design and also as when the transition to adopting...

    Provided By CA

  • White Papers // Apr 2009

    The Value of Standards-based CMDB Federation

    SACM and CMS help an enterprise implement an overall strategy that aligns business and IT services accurately, with a minimum of resource investment, but to achieve those goals, a range of data sources must be integrated. Without an industry standard for integrating IT data sources, this integration is expensive, difficult...

    Provided By CA

  • White Papers // Mar 2009

    Applying the Work Breakdown Structure to the Project Management Lifecycle

    Project Managers are more frequently finding high value in the creation of Work Breakdown Structures (WBS) as they begin the process of project management. As an essential element of the Planning Process Group outlined in the PMBOK Guide - Third Edition, everyday practice is revealing with increasing regularity that creation...

    Provided By CA

  • White Papers // Feb 2009

    Best Practices for Data Archiving

    Corporations depend on the flow of information to conduct their business. From accounting to production to marketing to personnel, the information procured, generated, organized, and stored by an organization represents a significant portion of the output of its workforce. Protecting that information from unexpected disasters is not only prudent, in...

    Provided By CA

  • White Papers // Sep 2008

    IDC White paper: How Project and Portfolio Management are Delivering Value to Organizations to Enhance Their Current Knowledge of PPM

    If you're still managing your IT projects and portfolios with spreadsheets, you may be falling behind. Disconnected, manual systems don't provide the visibility you need to make fact-based decisions in real time to better align IT with business objectives. In their August 2008 research report, How Project And Portfolio Management...

    Provided By CA

  • White Papers // Nov 2008

    Improving IT Economics: Thinking 'Lean'

    Applying 'Lean' principles originally designed in manufacturing and perfected by the likes of Toyota and Motorola better enables IT to identify and eradicate anything that is wasteful within IT management. In the words of 'Lean', anything wasteful is work that adds no value to a product or service that organizations...

    Provided By CA

  • White Papers // Sep 2007

    Best Practice Methodologies for the Project Management Office (PMO)

    This paper, the third in a four-part series from CA, discusses the three leading formalized project management methodologies - the Project Management Institute's (PMI) Management Book of Knowledge (PMBOK), the UK-born Projects in Controlled Environments (PRINCE2), and Control Objectives for Information and Related Technology (COBIT), from the Information Systems Audit...

    Provided By CA

  • Case Studies // Dec 2009

    Swedish Council Maximises Budgets and Improves Public Services With Automated and Integrated It Management

    To ensure the region's 300-plus healthcare facilities receive high-quality and cost-effective IT services, VGR has consolidated its IT operations. With 45,000 workstations, 1,800 servers and around 1,000 systems/applications now supported centrally, VGR IT needed to increase automation and integration to remove cost and complexity. Working with CA and business consultants...

    Provided By CA

  • White Papers // Sep 2009

    Effective Information Security: A Win-Win Proposition for the Enterprise and IT

    Driven by an accelerated increase in identity theft, consumer fraud, and other personal information - related thefts, industry groups and federal and state governments have taken aggressive steps to hold companies and their management accountable for confidential information disclosures. Similarly, enterprises are facing significant challenges in preventing the theft or...

    Provided By CA

  • Case Studies // Aug 2009

    Air Liquide Optimises Processing of 22,000 Daily IT Jobs With CA AutoSys WA

    Faced with ambitious growth and financial targets, Air Liquide needed to improve the efficiency of core business processes, including the generation of 150,000 invoices across the company's European operations at the end of each month. This meant taking a more automated approach to scheduling IT jobs. Using CA AutoSys Workload...

    Provided By CA

  • Case Studies // Dec 2009

    VR Netze Achieves Higher Service Levels Using CA eHealth and CA Spectrum

    Given the critical and 24x7 nature of VR Netze's client base, the company must provide a highly available network. With more than 18,000 IT devices to monitor and manage, this is not an easy task. The company needed a fault/event management solution that provided immediate visibility of any possible problems....

    Provided By CA

  • Case Studies // Nov 2009

    Starwood Hotels and Resorts Safeguards Availability of Reservation System for Over 1,000 Hotels With Ca Wily Introscope

    Starwood's hotel reservation system is critical to customer satisfaction, and alerts the IT team to any glitches with a room booking, rate quote or reservation change. To safeguard the performance and availability of this SOA -based system, Starwood needs to be aware of any problems before they impact customers or...

    Provided By CA

  • Case Studies // Jan 2010

    DBS Enhances Its Competitive Advantage With CA Identity and Access Management Platform

    Headquartered in Singapore, DBS is a well-capitalised bank with "AA-" and "Aa1" credit ratings that are among the highest in the Asia-Pacific region. The accessibility and security of DBS' online corporate banking platform, DBS IDEAL, are key to its competitive advantage. As the industry continued to set new standards for...

    Provided By CA

  • Case Studies // Feb 2010

    Novo Nordisk Maximises Return on Its $500 Million Product Portfolio With CA Clarity PPM

    With no consolidated view of the 800 capital investment projects it ran every year, Novo Nordisk was finding it difficult to track both project status and performance against budget. With information often out of date and derived from a number of spreadsheets, Novo Nordisk needed a more effective approach to...

    Provided By CA

  • Case Studies // Jan 2010

    Baker Tilly Maximises the Time Spent on Fee-Earning Activities With CA EITM Solutions

    Baker Tilly wanted to maximise the time staff and partners spend with clients on fee-earning activities is vital to Baker Tilly's profitability. The challenge was to provide staff with continuous access to technology is key to this goal, which means minimising any IT downtime and maximising service and performance levels....

    Provided By CA

  • Webcasts // Mar 2010

    Analyst Webcast: Managing IT's Business Value With Service Portfolio Management

    Service portfolio management has become an important component in any Information Technology company. It helps IT organizations to be more systematic in demonstrating, and maximizing IT's business value. One can use the business technology services as a common reference point for IT, and one can find answers for questions such...

    Provided By CA

  • Webcasts // Jul 2010

    Improving Data Management Via High Quality Definitions

    Data modeling tools, and many other tools, are containers for definitions. Yet very little attention has been given to the content of definitions. This webcast explores what goes in to producing high quality definitions, and gives practical guidance on how to achieve them. Definition is explained as process as well...

    Provided By CA

  • Webcasts // May 2010

    Increase Your Sales With the New CA ARCserve Backup and CA ARCserve D2D r15

    The customer's environment is constantly changing due to data growth, application deployment & upgrades, server virtualization, and remote office expansion. Customers need one's help in making sure they have the right tools for the right situation to better manage these changes while ensuring that their data is protected, recoverable and...

    Provided By CA

  • Webcasts // May 2010

    CA IDMS Server r17 Improves Performance and Scalability

    The attendee of this webcast will find out how the new features in CA IDMS Server r17 improve performance, scalability, platform support, standards compliance, and usability. The ODBC driver can now communicate directly to CA IDMS and supports ODBC 3.5 and 64-bit Windows. The JDBC driver now supports JDBC 4.0...

    Provided By CA

  • Webcasts // May 2010

    CA Mainframe Output and Enterprise Report Management Latest Trends

    Need to secure the information and prevent loss of data for compliance purposes? The attendee of this webcast "The CA Output and Enterprise Report Management (CA ERM)" development team will hear about the latest trends, including how to use CA ERM products to address compliance level encryption issues, how to...

    Provided By CA

  • Webcasts // May 2010

    Linux on System z: How Do I Get Started?

    While many organizations have made the strategic decision to consolidate workloads to Linux on System z to drive down total cost of application ownership, some often struggle with the planning process of where to begin. The attendee of this informative webcast will learn best practices to guide him on his...

    Provided By CA

  • Webcasts // May 2010

    TCP Connection Durations: What Can They Tell You?

    CA NetMaster Network Management for TCP/IP provides new information on connection durations, which will help the attendee learn who is using the network, what are they using it for and how are they using it - vital information for network management.

    Provided By CA

  • Webcasts // Jul 2010

    Sunny Skies Ahead - Evolving Your Security Infrastructure for the Cloud

    As global enterprises weigh the risks against the rewards of cloud computing, security has come out as the top issue. And while the trust model for cloud computing is the same, there are still real concerns around data loss and the underlying security processes utilized by the cloud provider.

    Provided By CA

  • Webcasts // Jul 2010

    Technical Partner Community Call - CA ARCserve Backup r15 Product Overview

    CA ARCserve Backup r15 goes beyond backup, giving small and medium-sized businesses highly reliable data protection with centralized management that make sense, no matter how complex the customers data or IT infrastructure is - at a fraction of the cost of the competition. Reduce the customer's backup storage by up...

    Provided By CA

  • Webcasts // Jul 2010

    Deploying CA Aion BRE Technology in a Web Application Framework

    With most new applications implemented on the Web or as Web services, it is critical to tie mainframe server deployments to Web and Java objects. CA Aion BRE r11 exposes CA Aion components running in the CA Aion mainframe MAES facility to Java programs. By using J2EE Connection Architecture (JCA)...

    Provided By CA

  • Webcasts // Jul 2010

    How a Fortune 500 Company Increased Sales by Millions Using CA Aion BRE

    Does the organization have valuable information hidden in the raw data stored in the databases? Come to this session to hear how a Fortune 500 company used CA Aion Business Rules Expert (BRE) to uncover complex rules describing relationships between client characteristics, business cycle timing and client purchasing behavior, and...

    Provided By CA

  • Webcasts // Jul 2010

    Application Modernization Framework

    This session discusses modernization efforts which should deliver a genuinely modernized application environment, not just a new technology platform. Key to making this shift is a framework that integrates knowledge discovery with forward engineering across business, service, application, implementation, deployment, and technology views.

    Provided By CA

  • Webcasts // Jul 2010

    Automate Repetitive/Competitive Development Tasks

    For QA or other kinds of reporting or automation/simplification of development or coordination tasks, the CA Gen API is a widely underused but extremely powerful tool. A number of solutions built using the API will be presented. Such development tasks using the native API are quite complex and that complexity...

    Provided By CA

  • Webcasts // Jul 2010

    Building the Business Case for CA Gen

    This session will help the attendee position to management their business case for implementing CA Gen, showing business value propositions that correlate back to primary enterprise goals. It reviews the roles and responsibilities of the CXO suite and articulates how CA Gen can be an enabler to support their responsibilities.

    Provided By CA

  • Webcasts // Jul 2010

    Hear It Here! the Customer Conversion Experience With CA Testing Tools

    If one hasn't converted to CA Application Quality and Testing Tools, it's time to reconsider. CA's products, conversion methodology and business case for converting from other vendors of application quality and testing tools keeps getting better. Tune in for this interactive session with Sharon Manno of Blue Cross, Blue Shield...

    Provided By CA

  • Webcasts // Jul 2010

    Effective Service Design Is a "Creature" of Habit

    Several of Stephen Covey's "7 habits of Highly Effective People" have direct correlation to designing an effective service. Habit 2 "Begin with the End in Mind" reminds one to have a vision of completeness and excellence prior to beginning any effort. For effective service design that means understanding the complete...

    Provided By CA

  • Webcasts // Jul 2010

    SOA Architecture and Engineering Framework

    This session will describe an architecture and engineering framework for Service Oriented Architecture (SOA) based on a detailed reference model that underpins and integrates reference architecture, life cycle processes including governance and organization. Following such a framework reduces risk and improves results for implementing SOA.

    Provided By CA

  • Webcasts // Jul 2010

    SOA for CA Gen

    CA Gen possesses unique capabilities for implementing CA Gen applications in a service oriented architecture. This session will describe key concepts and principles of a Service Oriented Architecture (SOA) and where CA Gen capabilities can be applied most effectively. Following such an architecture reduces risk and improves results for implementing...

    Provided By CA

  • Webcasts // Jul 2010

    Web Site Story - A CA Gen Love Story

    In 5 elapsed months, the presenter converted 400 GUI screens to 3500 web objects including integrating to the anti-hacking software and incorporating different skins/themes per client as well as incorporating the CA Gen Web Generation pages into the existing >3000 JSP, ASP web pages, menu flows and integration with JAVA...

    Provided By CA

  • Webcasts // Jul 2010

    Backing Out DB2 for z/OS Transactions

    When unwanted changes make their way into the DB2 for z/OS production environment, whether malicious or accidental, the challenge is to find the fastest, easiest, and most effective way to restore the system. While there are many ways this can be done, CA Log Analyzer can make backing out unwanted...

    Provided By CA