Skip navigation
All People > TMACUL > Tiago MACUL's Blog > 2016 > April
2016

203.png

http://www.newsoneplace.com/article/1892871510/ca-technologies-kicks-annual-volunteer-initiative-action-pty

 

(Source: CA Pty Ltd) SYDNEY, 21 April 2016 - CA Technologies has kicked off its annual CA Together in Action employee volunteer initiative. CA employees in Australia, and around the globe, will take time out of their workday to give back by participating in community-based, environmentally-focused projects that include Cooking for a Cause with OzHarvest, a bush regeneration day with Ryde Council and a clothing donation drive for Dress for Success. 'We are excited to be celebrating the 11th anniversary of CA Together in Action,' said... ▶ Full story on wn.com

Comando da CA Technologies no Brasil e América Latina é dividido - Portal Eletrolar.com

 

 

Com a ida de Laércio Albuquerque para a Cisco, a CA Technologies dividiu entre dois executivos o comando das operações do Brasil e da América Latina, que eram acumuladas por Albuquerque.

Além de Cláudia Vasquez, que já havia sido anunciada como nova responsável pela região, a filial brasileira da companhia americana de softwares nomeou o executivo Marcel Bakker para comandar os negócios no país.

Na CA desde 2014, ele já comandou a divisão de produtos de segurança para a América Latina e também foi responsável pela atendimento às grandes contas da empresa.

“O principal objetivo é manter um ritmo de crescimento consistente”, disse Cláudia ao Valor. A executiva não citou números porque a empresa está em período de silêncio antes da divulgação dos resultados do 1º trimestre. A estimativa é que a CA tenha receita de cerca de US$ 1,5 bilhão no Brasil, o maior mercado da companhia na América Latina.

De acordo com Claudia, a estratégia da CA tem sido buscar crescimento fora de suas áreas tradicionais de atuação (o segmento financeiro e o setor de telecomunicações). Entre os setores destacados por ela estão varejo, manufatura, saúde e educação.

Conhecida por seus sistemas para equipamentos do tipo mainframe, a CA vem, ao longo dos últimos anos, investindo para embarcar na onda da chamada “transformação digital” — nome pomposo para as mudanças feitas pelas companhias para se manter competitivas frente à concorrência com empresas nascidas na internet. Segundo Bakker, essa é a grande oportunidade para a companhia no país, já que esse tipo de projeto tem recebido atenção mesmo em um cenário de redução nos orçamentos das empresas.

 

 

Fonte: Valor Econômico

 

 


CA Technologies anuncia novo presidente no Brasil com foco na transformação digital | VOIT

 

…cada vez mais ávidos por uma boa experiência. A CA está ao lado dessas empresas para fazê-las cada dia mais inovadoras e, para isso, consideramos fundamental termos uma estrutura para dar consultoria em tecnologia para nossos clientes”, diz Marcel Bakker.

Para o posto que vinha sendo ocupado por Bakker na Diretoria de Vendas – Platinum Division, a CA anuncia Marcel Lima. Ele atuou anteriormente como account director para soluções Agile, DevOps e Segurança na CA Brasil. Com foco no crescimento e desenvolvimento dos negócios. A CA anuncia também as novas lideranças para as soluções DevOps, cuja vice-presidência será chefiada por João Fábio Valentin, antes responsável pela área de Enterprise Management e pela área de Agile Management, que passa a ser liderada por Francisco Dal Fabbro, que anteriormente respondia por IT Business Management.

América Latina
“Por meio de nossa nova estrutura, planejamos acelerar o crescimento da CA Technologies na região, que tem ocupado papel de destaque nos negócios globais da companhia”, explica Claudia.

Looking for CA Service Desk professionals for Atos India Pune location

Send the resumes to Prasad Swamy prasad.swamy@atos.net

Around 5+ yrs of experience

 

Atos Global Homepage

English version: CA SDM: status transition end user update status to WIP

 

Algumas vezes nós temos por padrão no CA SDM a opção de fechar o ticket ou deixar aberto.

 

usuario_incident_RE.jpg

 

 

Ou podemos reabrir um ticket fechado.

 

usuario_incident_REOPEN.jpg

 

MAS, como podemos atualizar para "Em Atendimento" e fazer o SLA continuar?

 

ST_WIP.jpg

 

Siga os passos abaixo e veja como realizar a configuração

 

 

ImagemDescrição
CASDM_Login.jpg01. Login como usuário final no CA Service Desk Manager
usuario_home.jpg02. Abra Incidentes
usuario_incident_list.jpg03. Selecione algum ticket com status is RESOLVIDO - "RE"
usuario_incident_emandamento.jpg

04. Está é uma imagem que mostra o botão "Em Atendimento" com a possibilidade onde o usuário final pode atualizar o status.

usuario_incident_emandamento_update.jpg05. Finalmente... Atualização da tela

Como fazer:

CASDM_Login.jpg06. Login como administrador
CASDM_Menu_Adm_ServiceDesk.jpg07. Service Desk
CASDM_Menu_Adm_ServiceDesk_SIP.jpg

08. Solicitação/Incidente/Problema

CASDM_Menu_Adm_ServiceDesk_SIP_status.jpg

10. Selecione Transições de Incidente

StatusTransitionLIst.jpg11. A lista de transição será apresentada
EditStatusTransition.jpg

12. Edite a transição de Status

EditStatusTransition_2.jpg

 

13. Tipo de Transição


 

14. Criar
StatusTransitionType.jpg

15. Tipo que precisa

16. Salvar

CA Technologies Government Summit - Event Summary | Online Registration by Cvent

 

May 10, 2016 The Newseum, Washington, DC

 

Technology fuels. It fuels government, the economy, and consumerism.

So how can technology be used effectively to advance the way we interact, provide solutions, and govern across platforms?

On May 10, join CA Technologies as we convene government and industry experts to explore various proven models for your organization to proficiently embrace agile solutions, successfully maximize the benefits of product disruptors, and opportunely thrive in the application economy

 

Mike Gregoire
CEO, CA Technologies

 

Event Agenda
Hover over the sessions below for added information

 

7:30 - 8:30 AMRegistration & Networking Breakfast
8:30 - 8:40 AMWelcome Remarks
8:40 - 9:00 AMKeynote Address: Michael P. Gregoire, Chief Executive Officer, CA Technologies
9:00 - 9:50 AMMainstage Session
9:50 - 10:10 AMNetworking Break

Breakout Sessions

TRACK 1: Securing the Business of Government

TRACK 2: Digital Transformation: DevOps

TRACK 3: The Transforming Federal Landscape

10:10 - 11:00AM

Session 1-1 Enabling Transformational Security

Session 2-1: DevOps in Government

Session 3-1: A New Model for Government Purchasing

11:10 - 12:00 PM

Session 1-2: Data Sharing in an IoT World

Session 2-2: Test Data Management and Automation Best Practices

Session 3-2: Rethinking Your IT Budget

12:00 - 12:45 PMNetworking Luncheon
12:45 - 1:35 PM

Session 1-3: Perspectives on Multi-Factor Authentication

Session 2-3: It’s Automatic: Streamlining from Dev through Ops.

Session 3-3: Agile Transformation: Creating an Agile Agency

1:40 - 2:30 PMMaintage Session
2:30 - 3:15PMMainstage Session: Jennifer Pahlka, Founder, Code for America
3:15 - 3:30 PMClosing Remarks
3:30 - 4:30PMReception

 

Media
CA Technologies Government Summit is an on-the-record event and is open to members of the media who register in advance to cover it. Please register above and contact us with any special needs.

Dress Code
Leave your ties and jackets at home! The Summit is meant to be a break from the traditional conference- full of networking, conversation, and fun so business casual attire is encouraged.

Venue
CA Technologies is pleased to host the 2016 event at The Newseum's Knight Conference Center. Please visit www.thenewseum.com for more information.

Other Questions?
Let us know how we can help you prepare- contact us at events@govexec.com.

TMACUL

Privacy is the new security

Posted by TMACUL Champion Apr 13, 2016

Wayback in 2005, ICICI emerged as the first bank in India to launch a biometric ATM at Guntur district of Andhra Pradesh.

By: Prabhu Mallikarjunan | April 11, 2016 6:05 AM

on Privacy is the new security | The Financial Express

 

Wayback in 2005, ICICI emerged as the first bank in India to launch a biometric ATM at Guntur district of Andhra Pradesh. It absolved the need for PIN number by using thumb impression for identification, making it easier for people in rural areas to transact. More than a decade later, DCB Bank has now started an Aadhaar-based ATM facility, wherein, a customer can transact using his biometric details and Aadhar number, instead of PIN number and ATM card for authentication. The users don’t even need a card as long as they can remember their 12-digit Aadhaar number.
Much has changed in the Fintech space over the last few years and e-wallet services have emerged to drive the cashless economy. From online shopping to cab booking to hotel bookings and grocery shopping, everywhere is driven by apps. The application (App) economy has made fintech companies adopt identity authentication, secure single sign-on and device management in many emerging countries.

Vic Mankotia, vice-president, security and API management (Asia Pacific and Japan) at CA Technologies says that using biometric as one of the factors to log into a secure session is going to begin with mobile devices and that wallet service with a biometric would be better and secure.

“Many end-point devices today have biometrics built in. Users are using these to authenticate in this application economy to numerous applications. Will this start an advent of financial applications adopting these, yes, but only if there is a secure way to do this with no data leaving the device. The future is bright and adoption will take place in the smart metropolitan areas that are connected and then spread to other sectors,” Mankotia said.

However, it is noticed that in India, there is currently no entity who has availed this, while the banks and financial service companies recently have awarded request for proposals and are still discussing the overall architecture with select original equipment manufacturers and system integrators.

People are trading privacy and data security for convenience, adding to the digital privacy woe in the era of big data analytics and creating a challenge for businesses to secure their data. One of the most effective and convenient way is the Single Sign-On (SSO)—one log in and the user can access the data needed from multiple applications. Thus any data loss/theft issues needs to be fixed in a short span of time to avoid data being vulnerable for too long.

Mankotia says SSO can also prove to be prone to hacking—because hackers can access multiple applications with just one stolen cookie or session token. “If there was no data leaving the device, where the applications were not revealing personal identifiable data and if there was information shared it was with the users clear and written consent only, we would be in a position to manage our privacy.

Privacy is the new security,” he adds.

“We have to view security as business enabler rather than barrier. The security threats today cannot be managed by
archaic methods, it requires smarter software solutions, ensuring security of data and recovery of data.”

A research carried out by CA Technologies in association with research consulting firm TRPC on the readiness of 10 Asia Pacific & Japan (APJ) markets to thrive in the application economy indicates India is ranked 9th overall on parameters like internet and mobile infrastructure, government use and support of technology and innovation and business agility. Thus leaving space for a huge potential for improvement with the increasing smartphone users, internet penetration and app usage. The country was ranked no 2, only next to China as a market potential accelerator.

CA Technologies, which provides data security solutions through CA DataMinder, helps in minimising the chances of data loss by controlling the information— and access to it—at every point in the system. The company has also acquired Xceedium and IdMLogic and enhanced the security portfolio and innovative security solutions.

Commenting on how CA is adding value through its solution for the app economy, Mankotia said, “CA’s single sign-on secure SSO and flexible identity access management solutions provide organisations and enterprises to authenticate users and control access to web applications and portals.

It also scales to help meet growing business needs with flexible administration tools that can support either centralised or distributed administration.

(The writer was in Singapore at the invitation of CA Technologies)

Prepare to be disrupted - and to fight back - CIO New Zeal

 

Stephen Ponsford of Revera and Kenneth Arredondo of CA Technologies share some disruption survival strategies.

 

Divina ParedesDivina Paredes (CIO New Zealand)11 April, 2016 06:00

 

Stephen Ponsford says ICT teams have to should out loud and lead the way for the organisation in responding to major business technology shifts.

You have to be the “canaries in your coal mine,” says Ponsford, Senior Cloud Advisor, Chief Technology Office, at Revera.

He says the focus for New Zealand organisations is how to get into a position of fighting back from the technology side.

Ponsford shares lessons learned from his work at IT Heavy Hitters, a charity boxing event.

One of the things that can potentially happen to participants is having one’s teeth knocked out, or getting a black eye, he explains. "So you start thinking about your fight strategy, how do you fight back and what are the implications."

As he explains, if you get hit in boxing and your opponent stands back, he has just given you an opportunity to hit him.

“The secret when you attack is to be positive.”

So one question to ask, he says, is what are the things that allow disruption to happen to your industry and where do they come from?

“What are the fuel sources of disruption in your industry?”

As well, “What are the things you know are not right about your industry that are poten

“l can only guess where digital intelligence can take us,” he states, “but without doubt I can see many current jobs being done with digital intelligence.”

Read more: Why you need to constantly validate your cloud strategy

He thus calls on organisations to “get ready for the fight”.

Get a real pulse into the business, know what is going on in the business.

“Just get one piece of data and get it on a real-time dashboard,” he states.

“It is our job as leaders to set the course. This is what we want to do, where we would like to go.”

Perhaps there is a need to create a chief science role whose job is to “experiment get out there and have fun”, he says. “You can go to Alibaba right now and you can custom physical prototypes that will arrive in a few business days.”

“You can physically create things, like little sensors that cost 20 cents each and have them custom manufactured for your needs.”

“If they fall on the wayside, turn it off and move on. That comes with a culture of nobody wants to fail over and over again. But nobody should be so petrified of failing that they never try a new thing.”

Lessons from digital disrupters

Kenneth Arredondo of CA Technologies at the CIO100 event in Auckland.Kenneth Arredondo of CA Technologies at the CIO100 event in Auckland.

Kenneth Arredondo, president and general manager, Asia Pacific and Japan for CA Technologies, says enterprises can view digital disruption as a crisis or opportunity.

Read more: 'What do we get for our IT spending?': A CIO's response

"If traditional organisations don’t implement a new approach to transform their business, they will be left behind," he states.

He shares findings from the recent survey by Freeform Dynamics about enterprises thatembrace disruption as an opportunity.

These organisations are prepared for continued market disruption, according to the report.

The report, commissioned by CA Technologies, finds digital disrupters are 3.5 times more likely than their mainstream peers to recognise the importance of being a software driven business, and 2.5 times more likely to use agile software development techniques.

 

 

If traditional organisations don’t implement a new approach to transform their business, they will be left behind.

Kenneth Arredondo, CA Technologies

 

Using the power of software, these organisations exploit broader technology and customer trends to rapidly and cost effectively enhance existing products and services, or bring new digital offerings to market.

They also drive disruption within their own organisation. The changes, known collectively as ‘digital transformation’, will be disruptive. But the alternative is being continually constrained in their ability to succeed in the digital era.

Read more: How to build a change capable organisation

These organisations also learned from those who achieve the best results. The survey finds the top digital disrupter trait is having a high emphasis on emerging digital channels to the customer.

While customer engagement should never be the sole focus of digital transformation, it is an important part of it.

Digital disrupters are between two and three times more likely than mainstream organisations to regard emerging digital channels to the customers as critical to their business. These include newer areas such as wearable technology and Internet of Things, the report states.

They aim to provide optimal customer experience by providing consistent and harmonious interaction and capability across channels, both digital and traditional.

tial attack vectors?”

“Basically, get on the front foot and attack that,” he states. “It could be creating a brand or service that is essentially untouchable.”

Analytics is an exciting field to incorporate in this strategy, he says. He once saw a visualisation of a tennis game, where the players apply digital intelligence to any given opponent.

They know what shots are most successful, they know where they are most likely to hit back, he states. “They go into the game with unbelievable actionable intelligence on their opponent. And their opponent has no idea this is happening.

CA co-founder Russell Artzt now runs a digital startup | Newsday  Updated April 11, 2016 5:53 PM

By Ken Schachter  kenneth.schachter@newsday.com

Russell Artzt, co-founder of Computer Associates, launched Digital Associates, a software startup, a month after leaving CA. He is seen here on March 30, 2016. (Credit: Heather Walsh)

 

Russell Artzt, who helped draw the technology road map of CA Technologies for almost four decades, has launched a seven-person cloud software startup in Smithtown.

Artzt, 69, stepped down as vice chairman of CA, formerly known as Computer Associates, on Sept. 30 and launched Digital Associates the following month.

“I feel like I’m getting started again,” said Artzt, who co-founded CA,...

Uno studio CA Technologies rileva una forte diffusione dell'utilizzo delle API fra le aziende italiane - Data Manager - …

 

 

Uno studio CA Technologies rileva una forte diffusione dell'utilizzo delle API fra le aziende italiane

Data Manager

8-4-2016

Scienza e Tecnologia - Poche tuttavia le imprese in grado di sfruttarne a fondo il potenziale, come dimostra l'API Capability Index creato sulla base dei risultati emersi dalla  ricerca Uno studio internazionale ...

 

 

 

CA Technologies A study finds a strong widespread use of the API between the Italian companies

 

However, few companies are able to take full advantage of the potential, as evidenced by the API Capability Index created based on the research findings

An international study commissioned by CA Technologies photographing a widespread use of the Application Programming Interface (API) between the Italian companies as an essential element to the success of the economy applications. A quarter (26%) of respondents actually has already made activities that allow you to fully exploit the potential of these interfaces.

The international study "APIs and the Digital Enterprise: From Operational Efficiency to Digital Disruption" was conducted by Freeform Dynamics analyst firm specializing in computing, a world champion of 1442 IT managers and business leaders that included 506 European managers from Italy, Germany, France, Switzerland, Spain and the United Kingdom.

"The API is the essential ingredient for success in the Application Economy, as they offer the possibility to integrate secure systems, providing customers with a better customer experience multi-channel, quickly adapt applications and get a great return on investment in new digital opportunities. Not enough, however, to create the API to implement successful initiatives, must manage, monitor and ensure an appropriate level of security, otherwise it can cause serious problems such as the recent incidents recorded by some automakers in projects related to connected cars - car linked to Internet - or violation of some data of users of Snapchat two years ago, "said Fabrizio Tittarelli, CTO of CA Technologies Italy.

The Italian organizations recorded widespread adoption of APIs that enable web and mobile applications to access data and services in the network and on the Internet. The 85% of the sample uses the API to enable third-party developers, 82% for creating web applications, while 81% uses it to integrate back-office applications. 73% use the API to incorporate third-party services. Among the main levers, current and future, quoted on the adoption of the API, there is a need to develop the digital coverage (91%), to exploit the innovativeness of third party developers (87%), streamline chains supply and demand (86%) and providing new / better customer experience (85%). All these elements can contribute to the success of companies in the economy of the applications.

Despite the significant assumptions in favor of using the API, few of the respondents believe they have adequately addressed some critical issues. Only 17% of Italian organizations, for example, has found technology partners can provide professional and appropriate counseling services, while 24% say they have acquired a critical mass of developers as part of their projects dedicated to the API. But what is most striking is that only 28% were able to quantify the value of the API in terms of business.

The level of maturity of the Italian companies in the adoption of the API

The API Capability Index, an index created based on the results of the responses of 920 IT managers who participated in the study, shows that there is still much to be done to fully realize the benefits that a successful strategy can offer.

Respondents were asked to indicate whether their company possessed 10 enabling requirements for the use of the API, grouped into four categories: Lifecycle Support, Core Security, Run-time Environment and Operational Management. Each answer is assigned a score, then classified into three groups depending on the level of preparation and ability to use the API: 'Advanced', 'Base' or 'Restricted'.

In Italy, 26% of companies surveyed appears to be to one 'advanced' stage, ahead of Germany (22%) and France (23%), but behind the United Kingdom (41%) and Switzerland (33%). 30% of Italian organizations is a 'basic' level, while 44% appears to be to one 'small step'.

An analysis of the pan-European research results reveal a strong correlation between the level of skills and enabling requirements for the adoption of the API and the benefits resulting from these investments. On average, the pan-European organizations that are at an advanced level claim to have a chance two or three times to obtain significant advantages over their counterparts classified in a stadium 'limited'.

For example, 63% of European organizations to an 'advanced' level of use of the API claims to be able to guarantee a better customer experience, compared with 23% of users to a 'limited level'. Similarly, 62% of the level 'advanced' users has reduced the time of release of the app with the potential increase in revenue, compared with 25% of users to a 'limited level'. As for the expansion of the digital coverage - a crucial factor for the success of the applications in the economy - this goal has been achieved by a number of 'advanced enterprises' almost equal to three times of those in a stadium 'Limited' ( 57% versus 21%).

"The CA Technologies offers of API management solutions enable companies to maximize the use of the API, providing developers a secure environment and easy to use, in support of mobility initiatives and IoT on a large scale," he added Tittarelli.

European organizations possess advanced ability to use of the API are also able to apply a higher safety. The study shows that 74% of reality to an 'advanced' level has implemented special security measures to protect against cryptographic attacks called 'man-in-the-middle' which intercept legitimate transactions, compared with 21% of users to one 'limited' stadium.

If you want to receive free information on CA Technologies A study finds a strong widespread use of the API between the Italian companies leave your email address in the box below and sign up:

 

 

 

 

 

 

 

 

No entanto, poucas empresas são capazes de tirar o máximo partido do potencial, como evidenciado pela capacidade API índice criado com base nos resultados da investigação

Um estudo internacional encomendado pela CA Technologies fotografar um uso generalizado da Application Programming Interface (API) entre as empresas italianas como um elemento essencial para o sucesso das aplicações de economia. Um quarto (26%) dos entrevistados, na verdade, já fez atividades que lhe permitem explorar plenamente o potencial destas interfaces.

Os "APIs e do Digital Enterprise: De Eficiência Operacional para Digital Disruption" internacionais estudo foi conduzido por Freeform Dynamics empresa analista especializado em computação, um campeão do mundo de 1442 gerentes de TI e líderes empresariais que incluiu 506 gestores europeus da Itália, Alemanha, França, Suíça, Espanha e Reino Unido.

"A API é o ingrediente essencial para o sucesso na economia de aplicações, uma vez que oferecem a possibilidade de integrar sistemas seguros, oferecendo aos clientes uma melhor experiência do cliente multi-canal, se adaptar rapidamente aplicações e obter um grande retorno sobre o investimento em novas oportunidades digitais. Não o suficiente, porém, para criar a API para implementar iniciativas de sucesso, tem de gerir, acompanhar e assegurar um nível adequado de segurança, caso contrário, pode causar problemas graves, como os recentes incidentes registrados por algumas montadoras em projetos relacionados a carros conectados - carro ligadas à Internet - ou a violação de alguns dados de usuários de Snapchat dois anos atrás ", disse Fabrizio Tittarelli, CTO da CA Technologies Itália.

As organizações italianas registrados adopção generalizada de APIs que permitem web e aplicações móveis para acessar dados e serviços na rede e na Internet. O 85% da amostra usa a API para permitir que desenvolvedores de terceiros, 82% para a criação de aplicações web, enquanto 81% usa-o para integrar aplicações de back-office. 73% usam a API para incorporar serviços de terceiros. Entre as principais alavancas, atual e futura, cotadas na adoção da API, há uma necessidade de desenvolver a cobertura digital (91%), para explorar a capacidade de inovação dos desenvolvedores de terceiros (87%), organizar as redes oferta e procura (86%) e proporcionando uma melhor experiência nova / cliente (85%). Todos estes elementos podem contribuir para o sucesso das empresas na economia das aplicações.

Apesar dos pressupostos significativos em favor do uso da API, alguns dos entrevistados acreditam que eles têm abordado adequadamente algumas questões críticas. parceiros de tecnologia apenas 17% das organizações italianas, por exemplo, tem encontrado pode fornecer serviços de aconselhamento profissional e apropriadas, enquanto 24% dizem ter adquirido uma massa crítica de desenvolvedores como parte dos seus projectos dedicados à API. Mas o que é mais impressionante é que apenas 28% foram capazes de quantificar o valor da API em termos de negócios.

O nível de maturidade das empresas italianas na adoção da API

O Índice de Capacidade de API, um índice criado com base nos resultados das respostas de 920 gestores de TI que participaram no estudo, mostra que ainda há muito a ser feito para realizar plenamente os benefícios que uma estratégia bem sucedida pode oferecer.

Os entrevistados foram solicitados a indicar se a sua empresa possuía 10 requisitos de capacitação para o uso da API, agrupados em quatro categorias: Suporte do Ciclo de Vida, Core de segurança, em tempo de execução Ambiente e Gestão Operacional. Cada resposta é atribuída uma pontuação, em seguida, classificadas em três grupos, dependendo do nível de preparação e capacidade de usar a API: 'Avançado', 'Base' ou 'restrito'.

Na Itália, 26% das empresas pesquisadas parece ser a de um estágio "avançado", à frente da Alemanha (22%) e França (23%), mas atrás do Reino Unido (41%) e Suíça (33%). 30% das organizações italianas é um nível "básico", enquanto 44% parece ser a de um "pequeno passo".

Uma análise dos resultados da investigação pan-europeu revelam uma forte correlação entre o nível de habilidades e permitindo requisitos para a adoção da API e os benefícios resultantes desses investimentos. Em média, as organizações pan-europeus que estão em uma reivindicação de nível avançado para ter uma chance duas ou três vezes para obter vantagens significativas sobre os seus homólogos classificadas em um estádio 'limitado'.

Por exemplo, 63% das organizações europeias para um nível "avançado" de uso das reivindicações API para ser capaz de garantir uma melhor experiência do cliente, em comparação com 23% dos usuários 'a um nível limitado ". Da mesma forma, 62% do nível de usuários 'avançados' reduziu o tempo de lançamento do aplicativo com o potencial aumento de receita, em comparação com 25% dos usuários 'a um nível limitado ". Quanto à expansão da cobertura digital - um fator crucial para o sucesso das aplicações na economia - este objetivo foi alcançado por um número de quase igual a três vezes daqueles "empresas avançadas 'em um estádio' limitada '( 57% versus 21%).

"As ofertas da CA Technologies de soluções de gerenciamento de API permitem às empresas maximizar o uso da API, fornecendo aos desenvolvedores um ambiente seguro e fácil de usar, em apoio às iniciativas de mobilidade e Internet das coisas em grande escala", acrescentou Tittarelli.

organizações europeias possuem capacidade de uso da API avançado também são capazes de aplicar uma segurança maior. O estudo mostra que 74% da realidade a um nível "avançado" tem implementado medidas de segurança especiais para proteger contra ataques criptográficos chamados "man-in-the-middle", que interceptar transações legítimas, em comparação com 21% dos usuários a um estádio "limitado".

Se você quiser receber gratuitamente informações sobre a CA Technologies Um estudo constata um forte uso generalizado da API entre as empresas italianas deixar o seu endereço de e-mail na caixa abaixo e se inscrever:

Sintoma:

Não consigo editar nenhuma opção no gerenciamento de opções em um ambiente de Configuração convencional

 

Solução:

Execute o pdm_configure

 

 

 

 

Install CA SDM Using Conventional Configuration - CA Service Management - 14.1 - CA Technologies Documentation

TEC611880

 

  • Login support.ca.com

  • Selecione  o  "Download Center"

  • Selecione  em  "Products"  "All Products" - a lista de produtos aparecem de acordo com o seu perfil.

  • Na lista de downloads será apresentado os connectores. Por exemplo, CA Service Desk Manager você verá "Process Management for Workflows - CA Service Desk and CA CMDB Connectors".

 

  • Selecione o download cliecando nele e fará o download do iso.