The average sentiment for articles published by this News Source are below.

Anger: Red
Disgust: Olive
Fear: Green
Joy: Gold
Sadness: Blue
View Post

Flex your apps muscles with Mobile SDK 1.5 for CA Mobile API Gateway

In Science & Nature, Security by CA TechnologiesLeave a Comment

Tech News Keywords:

The CA Mobile API Gateway (MAG) product team has a mission: to continually push the envelope in creating innovative resources that help developers succeed – while also maintaining the robust security protocols that we’re known for. That’s why we are pleased to announce the release of a new feature set in Mobile SDK version 1.5 that gets us closer to that vision. This includes support for our developer audience’s most requested functionalities: external API calls, multi-threaded API calls, and a dynamic framework iOS SDK. Let’s dig into each of these new capabilities further. Strengthening developers with speed and security Developers can now execute more types of API calls and access a wi... Read More
View Post

ICT as driver for achieving the Sustainable Development Goals

In Business, Education, Emerging Technology, Government, Healthcare by CA TechnologiesLeave a Comment

Tech News Keywords: , , , , , ,

Today marks the launch of the third edition of the EU ICT Sustainable Development Goals (SDGs) Benchmark report from SustainAbility and CSR Europe, supported by Huawei, unveiled during the Sustainability and Innovation Conference in Brussels. The event brought together key stakeholders in Europe and beyond including leaders from business, cities, civil society and government to discuss how technology can help towards achieving the UN SDGs to drive sustainable economic growth and development. The benchmark report clearly shows a high correlation with ICT performance in the EU, as innovation and advances in industrial processes rely on good infrastructure amongst other things. ICT has the potential to transform the manufactur... Read More
View Post

Cybersecurity starts in the C-Suite

In Business, Events, Government, Science & Nature, Security by CA TechnologiesLeave a Comment

Tech News Keywords: , , ,

A recent survey of 580 IT security professionals at the 2017 Black Hat USA conference found that 67 percent—or about two-thirds—of respondents believe their own organizations would face a major breach in the next year. This alone isn’t necessarily a shocking statistic. A quick scan of recent headlines provides an abundance of evidence of how sophisticated and widespread today’s cyber attacks have become. And there’s no sign of attacks slowing down. According to the Identity Theft Resource Center,... Read More
View Post

Secure your apps so they won’t let you down this holiday season

In Business, Government, Legal, Security by CA TechnologiesLeave a Comment

Tech News Keywords: , , , ,

Security breaches and software failures have made headlines throughout 2017; most recently, several airlines using the same check-in software saw major delays due to network issues, stranding thousands of customers at airports across the globe. With apps being one of the most vulnerable gateways for both security and performance issues, now is the time to start thinking about how to get ready for the holiday season. Salesforce predicts... Read More
View Post

DevOps: A more civilized approach to building applications

In Business, Government, Security by CA TechnologiesLeave a Comment

Tech News Keywords: ,

In business, we tend to use the word philosophy to describe a set of beliefs or principles that a company, organization or team uses to guide them. For example, some would describe Agile or DevOps as a philosophy to software development. Strictly speaking, this is not entirely incorrect—but it’s quite different than the type of philosophy first explored by Socrates, Plato and the like. The original form of philosophy was literally seen as the “love of wisdom—in Greek, “philo-“ means “love” and “-sophos,” is translated to “wisdom.” This love of wisdom began in ancient Greece in the 6th century BCE with folks such as Pythagoras, Thales and of course Socrates, and has evolved and matured in the mill... Read More
View Post

CA Champagne Blog Series: Safety and SAFe – bringing agile to our people  

In Business, Government, Science & Nature by CA TechnologiesLeave a Comment

Tech News Keywords: ,

In the second of our series of blogs about the CA Technologies agile transformation, Sri Parthasarathy and Skip Angel talk about the importance of investing in people as part of a transformation, and establishing a safe environment to nurture employee confidence to change. In our first Champagne blog post, we talked about people needing a purpose and a reason for change. People also need a clear vision of... Read More
View Post

Reasons to celebrate Customer Experience Day

In Business by CA TechnologiesLeave a Comment

Tech News Keywords: , ,

Happy Customer Experience Day! October 3 is CX Day, a day founded by the Customer Experience Professionals Organization (CXPA) to shine a light on customer experience. Annual celebrations are great times to stand back and reflect on how far we’ve come and CX Day is no exception. I’ve looked back and am proud of CA’s progress over the past several years.  Here are some things that stand out: Our Net Promoter Score (NPS), an industry standard measure of customer loyalty, continues to trend upward year-over-year for the past four years. Our product NPS scores have increased significantly year-over-year... Read More
View Post

CA champagne blog series: meeting our customer needs faster with an agile business

In Business by CA TechnologiesLeave a Comment

Tech News Keywords:

How does a 42-year-old business become disruptive? This is the first of a series of blogs in which our Enterprise Agility Advisors will discuss the CA Technologies business agility transformation, including an overview of the program and its impact across the organization and for CA technologies customers. So how does a 42-year-old business turn the tables when one of its key markets is steadily shrinking? In the last two years, CA Technologies has reduced time to market, increased customer satisfaction, boosted innovation, and increased employee engagement. And we’ve achieved all this thanks to an agile transformation. H... Read More
View Post

Container standards: What it means for DevOps teams

In Business, Science & Nature by CA TechnologiesLeave a Comment

Tech News Keywords: , , ,

Choosing a container service from today’s multitude of options  (Docker, CoreOS-RKT, Linux Containers, Jetpack, Solaris Zones, Kurma, BSD Jails) is a difficult decision. The choice of service can determine software compatibility, motivating the move to a container standard. History After years of containers being standard free, a mass container standardizing initiative has taken hold. Many leading tech companies have joined forces to create “The Open Container Initiative” or OCI. Th... Read More
View Post

WhoZoo: Graph-powered insights into your organization

In Business, Government, Start Up by CA TechnologiesLeave a Comment

Tech News Keywords:

We are living in a world replete with all kinds of networks. Your personal network consists of new and old relationships with people like your colleagues, managers, customers, and even competitors, or with various projects, products, and software. Data about these relationships has become the lifeblood of an enterprise. While plenty of data about these advanced networks exists, harnessing it is another issue altogether. Finding the right person in a large, distributed organization is a challenge. The old, hierarchical org charts provide few options and quickly go out-of-date. It’s often easy to see who reports to who – but difficult to determine a colleague’s strengths and responsibilities or to understand how people truly c... Read More
View Post

Maturing your Privileged Access Management with Gartner recommendations

In Business, Government, Science & Nature, Security by CA TechnologiesLeave a Comment

Tech News Keywords: ,

By Michael Dullea, Senior Director of Product Management In our previous blog about Gartner’s Market Guide for Privileged Access Management (ID: G00315141), 2017, we discussed a couple of the key recommendations that Gartner made. Let us look at the implications of these recommendations and understand why they assume significanc... Read More
View Post

CA adds market-leading API monitoring to its portfolio by acquiring Runscope

In Business by CA TechnologiesLeave a Comment

Tech News Keywords: ,

CA Technologies today announced it has acquired Runscope Inc., a San Francisco based provider of SaaS API monitoring solutions. The acquisition complements CA Digital Experience Insights monitoring and analytics SaaS solution by adding a best-in-class API monitoring solution that allows DevOps teams to collaborate and to improve performance of applications that rely on the use of APIs. Current state of the SaaS API monitoring market Modern organizations have a constant stream of interactions happening between customers, partners and different applications in the... Read More
View Post

Don’t let software defects scare you this Halloween (or ever)

In Business, Events by CA TechnologiesLeave a Comment

Page Views:

Let’s face it, software defects are scary. Hardly a week goes by without news of some company’s software problems making headlines. I won’t give specific examples here (as you’ve likely seen them yourself) but flights grounded, personal data exposed, even years of medical research called into question—these are just some of the side effects of poor software quality. These defects can destroy your company’s reputation, harm customer relationships and eat away at revenues—causing more damage than a horde of zombies in Walking Dead. Yet despite all the focus in the industry around initiatives like DevOps, ... Read More
View Post
Number of Items Identified: 11
Item #Item NameScoreItem Classification
1padlock0.757restraint (chains), fastener, lock, padlock
2lock0.81
3fastener0.906
4restraint (chains)0.906
5locker0.676restraint (chains), fastener, locker
6blue color0.928
7ultramarine color0.727

How Security by Design can strengthen Europe’s cybersecurity

In Business, Events, Government, Security by CA TechnologiesLeave a Comment

Tech News Keywords: , ,

The European Commission recently released a range of documents to increase cybersecurity across the union. Each of these recognizes the key role industry will need to play. At CA Technologies, we strongly agree and welcome these proposals. We specifically believe a focus on cybersecurity-by-design will further increase security as every business or government is becoming a modern software factory. The Modern Software Factory: Security at its core Every business is becoming software-driven. Industries leverage connected technologies and applications to drive competitive advantage in the marketplace. Companies must act with speed to deliver quality user experiences for their customers. However, for many companies, security ... Read More
View Post

The #1 Way to Kill Business Agility

In Business by CA TechnologiesLeave a Comment

Page Views:

It doesn’t matter what industry you’re in — the pace of change is frenetic, resulting in enormous pressure to deliver more of the right stuff, faster and better than ever before. Responding to this pressure requires business agility and effective collaboration. However, one nagging, all-too-common problem stands in the way of this reality: ineffective meetings. While meetings remain one of the fastest, high-bandwidth ways to quickly solve complex problems and achieve alignment, if executed poorly, they’re agility killers. Agile Practices Agile practices like Scrum are supposed to solve this problem. Scrum very clearly calls for only five meetings that, collectively, take aro... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1welder0.684person, welder
2person0.684
3weld0.637joint, weld
4joint0.637
5ultramarine color0.992

Building advanced analytics into a Modern Software Factory

In Business, Events, Government, Science & Nature, Security by CA TechnologiesLeave a Comment

Tech News Keywords: , , ,

Digital natives like Amazon, Google and Facebook know the power of data. Whether identifying predictive insights, prescriptive actions or, ultimately, mind-blowing customer experiences, data is increasingly the fuel that drives competitive differentiation and marketplace success. And we’re in the early stages of an artificial intelligence and machine learning revolution that’s rising from an advanced analytics foundation. But if you’re not a digital native, where do you begin? For many companies, the first step in retooling is exposing the myriad data assets available, from existing transactional data to currently untapped operational data (aka dark data) to the online data that was previously thought of as inconseque... Read More
View Post

“Avoid future sticker shock” with your Privileged Access Management Security Solution

In Government, Security by CA TechnologiesLeave a Comment

Tech News Keywords:

By Michael Dullea, Senior Director of Product Management Gartner recently published the Market Guide for Privileged Access Management (ID: G00315141), 2017. Gartner highlights the trends that are shaping the cybersecurity market and provides some recommendations in choosing the right solution. Specifically, Gartner states “Avoid future sticker shock when extending deployments by planning ahead for evolving requirements over the next two to three years; and force vendors to provide pricing for expected features that you may need to buy.”... Read More
View Post

Actionable insights from leading DevOps practitioners

In Business, Government, Science & Nature, Security by CA TechnologiesLeave a Comment

Tech News Keywords:

As DevOps continues to mature, it’s incumbent of practitioners, vendors and thought-leaders alike to share their insights and guidance. Especially when those opinions challenge the status-quo, promote fresh thinking and stimulate on-going debate and discussion. One such contribution is CA Technologies DevOps Perspectives — an eBook devoted to providing actionable and independent guidance on many aspects of DevOps, including culture, metrics, automation and tooling. In our sixth edition, we examine the theme of DevOps maturity and the innovat... Read More
View Post
Number of Items Identified: 4
Item #Item NameScoreItem Classification
1carousel0.726mechanical device, carousel
2mechanical device0.726
3amusement park0.706
4azure color1

Top 7 reasons why you need to be at CA World 2017

In Business, Education, Events, Gaming, Government, Science & Nature, Security by CA TechnologiesLeave a Comment

Tech News Keywords: , , , , , ,

It’s that time of the year again – we’re gearing up for CA World in Las Vegas! There’s a lot of exciting stuff on the agenda this year. Here are some reasons why you should definitely join us at Mandalay Bay Resort and Casino on November 13-17. 1. Gain a competitive edge through Pre-conference education There are over 400 sessions where you can make the most of your investment in CA solutions. You can, for example, jumpstart your agile learning with hands-on training from certified experts at the CA Agile Academy, or distinguish yourself from the rest of the crowd with CA Certifications. Check out what’s available and pi... Read More
View Post

Network Operations and Analytics from CA Technologies wins EMA Innovator Award

In Science & Nature by CA TechnologiesLeave a Comment

Tech News Keywords:

By Shamus McGillicuddy, Senior Analyst, Enterprise Management Associates (EMA) Network Operations and Analytics from CA Technologies has been named a winner of Enterprise Management Associates’ Innovator Award, which recognizes products and services that demonstrate true innovation in the IT industry and address the most critical challenges IT organizations face today. Enterprise networks are more dynamic and unpredictable than they have ever been, thanks in part to software-defined networking (SDN), network virtualization, and cloud technology. Enterprise Management Ass... Read More
View Post

The superorganism of the Continuous Delivery pipeline

In Government, Healthcare, Science & Nature by CA TechnologiesLeave a Comment

Tech News Keywords: , ,

Here’s an interesting fact: there are about 10 quadrillion ants on the planet, comprising up to 25 percent of the earth’s animal biomass. That’s a scary population of ants. But, thankfully, they are not bringing mass chaos to the planet because their colonies operate as well-orchestrated superorganisms—pooling resources to accomplish things for the greater good of the colony. And the cool thing is that they make better decisions and fewer mistakes operating together. Check out the three ant behaviors any good DevOps team should acquire. Ant behavior #1: Specialized roles working seamlessly Both an ant colon... Read More
View Post

Active testing with network monitoring is a recipe for success

In Business by CA TechnologiesLeave a Comment

Tech News Keywords:

When I make my truly amazing spaghetti sauce, I always get an exceptional result when I continuously test the flavor throughout the cooking process to make sure everything is working as planned. Testing during rather than at the end of a process is just as important when it comes to network operations. It gives organizations the opportunity to address blips in network behavior before they impact the user experience or application performance. Tried and tested Active testing and the ability to react quickly on any network anomalies or degradations are particularly valuable resources given the dynamic nature of today’s networks. Thanks to advances in technology, such as SDN and cl... Read More
View Post

Are you mastering the Modern Software Factory?

In Business, Government, Science & Nature, Security by CA TechnologiesLeave a Comment

Tech News Keywords: , , , ,

It used to be that the best companies were built to last. But today, the most competitive firms are built to change. They’re built on software that allows them to thrive in a climate of constant disruption, short innovation cycles, and ever-changing customer expectations. Modern companies don’t just use software; they’re powered by a ‘Modern Software Factory’ – a whole new way of designing and operationalizing software development to drive competitive advantage. Master your software factory to out-compete and out-perform The digital economy demands that businesses understand customer needs, incubate new ideas, nurture innovation, and get the right products and services to market – all a... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1supercomputer0.893machine, computer, digital computer, supercomputer
2digital computer0.893
3computer0.981
4machine0.981
5server (computer)0.849machine, computer, server (computer)
6bottle green color0.884

A system built for trust

In Business, Events, Government, Security by CA TechnologiesLeave a Comment

Tech News Keywords: , , ,

This summer has been an exciting one for companies transforming to digital businesses with IBM’s release of the groundbreaking z14 – indeed, our mission-essential community never stops moving! In Part 1 of this series, I shared why we in the vendor community believe the new IBM z is a game changer, creating a new System of Trust. As part 2 of this series, I’d like to explain what business and IT leaders should know about CA’s support for the new z14. At CA, it is our goal to support you from day one as you evaluate a new z14 system or as you plan to upgrade providing software that delivers new fe... Read More
View Post
Number of Items Identified: 4
Item #Item NameScoreItem Classification
1cell0.737
2spheroid shaped0.609
3indigo color0.952
4blue color0.694

The Moon Has Its Own Paparazzi

In Education, Government, Science & Nature by CA Technologies

Tech News Keywords: , , , ,

For seven years, the Lunar Reconnaissance Orbiter has circled the moon, hovering just miles above its pock-marked surface. And every day, the craft’s on-board camera snaps over 600 photographs of the satellite’s craters, dunes, and mountains, helping scientists understand lunar geology and topography. But that’s not the only reason to photograph the moon.“It’s also just because [the images] are beautiful,” says Mark Robinson, the lead scientist running the Lunar Reconnaissance Orbiter Camera at Arizona State University’s School of Earth and Space Exploration. “They show the grandeur of the moon, what landscapes look like on another world that’s only three days away.” Of course, cameras aboard spacecraft ... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1paper0.63
2camping0.611
3fabric0.666
4tent0.626
5shelter0.627
6blue color0.891

Mind-Bending Sculptures Made From Hundreds of Stock Photos

In Business, Mobile Technology, Science & Nature by CA Technologies

Tech News Keywords:

Type “beach” into Google search and you’ll get 2.1 billion hits. That includes more photos than you could ever possibly look at, made by professionals and amateurs, using everything from iPhones to satellites. The images quickly smear into a blur of blue and yellow. Photographer Anastasia Samoylova celebrates this over saturation of  images in Landscape Sublime. She combines generic photos gleaned from the Internet to create sculptures that prove there’s not much discovery when you can just Google everything. “These environments are already premeditated for us,” says Samoylova. “The photographs create a separate reality.” Samoylova starts each sculpture with a search for a generic term l... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1ligament (of body)0.744
2dessert0.666
3nutrition0.667
4food0.667
5rose color0.963

How to Make Baby Bees and Other Weird Stuff Great to Eat

In Education, Government, Science & Nature by CA Technologies

Page Views:

Brian Finke loves food. No, really. He loves it. “Feed me anything,” he says, “and I’ll eat it.” That includes bee larvae. And ants. He actually enjoyed those.Finke isn’t a foodie. He’s a photographer. He spent last summer shooting The Science of Delicious for National Geographic. The trip took him from a lab in Florida where scientists engineer tastier tomatoes to an experimental food workshop in Toronto where people inhale flavor clouds. And that was the normal stuff. The weird stuff included a visit to Louisiana State University, where scientists study catfish to better understand taste. The whiskered bottom-feeders navigate murky water using tens of thousands of tastebuds that cove... Read More
View Post

This Couple’s Idea of a Romantic Getaway Is Chasing Tornadoes

In Business, Government by CA Technologies

Tech News Keywords: ,

Tim Moxon knew from the start that his relationship with Cammie Czuchnicki would ensure some storms. It’s to be expected when you fall for a woman who dreams of chasing tornadoes across the Midwest.Soon after the British photographers started dating, they found themselves staring down a storm roaring through Nebraska. It was exciting—and harrowing. “The noise and the wind—it attacked all your senses at the same time,” Czuchnicki says. “It got to a point where we couldn’t shut the doors. We’re like ‘Get in the caaaaar!'” They’ve since photographed more than 200 twisters and tempests, driving tens of thousands of miles through tornado alley each year. You could say they’re obsessed. ... Read More
View Post
Number of Items Identified: 11
Item #Item NameScoreItem Classification
1purple color0.688
2candy egg0.604food, nutrition, delicacy, sweet, candy egg
3candy0.693
4sweet0.694
5delicacy0.695
6nutrition0.695
7food0.696
8heart0.603figure, heart
9figure0.603

Glittery Skulls and Other Bizarre Things Arizonans Love Shooting

In Energy, Gaming, Government by CA Technologies

Tech News Keywords: , ,

There are any number of ways to pass the time or let off steam. Go for a run. Watch a little TV. Blast the hell out of a disembodied glittering skull.All of these are A-OK in Arizona, where the state Bureau of Land Management lets people open fire on public land, as long as folks clean up after themselves. Some do. Others don’t. They leave a trail of bullet-riddled propane tanks, fire extinguishers, mannequin heads, and anything else you can imagine. William LeGoullon spends a fair amount of time driving around the desert looking for this stuff. He brings the most interesting bits back to his studio in Phoenix, where he photographs it against a plain background. His ongoing series, (Un)Intended Targets, is a c... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1pavilion0.673shelter, tent, pavilion
2tent0.887
3shelter0.891
4circus tent0.625shelter, circus tent
5gray color0.781

The Frantic Development Devouring China’s Natural World

In Business, Legal by CA Technologies

Tech News Keywords:

China covers 3.6 million square miles, and most of the country’s 1.3 billion people fill its eastern half. But a building boom is pushing those urban centers westward, radically remaking the landscape.French photographer Julien Chatelin’s documents the transformation in his series China West. Mountains give way to cities as skyscrapers and shopping malls rise like “modern day mirages of economic progress and development, stuck between the emptiness of the desert and the shells of a modern city,” he says. Chatelin hit upon the idea in 2013 after reading about a $2.2 billion effort to raze the mountains around Lanzhou and expand the capital of Gansu by about 500 square miles. The plan seemed to hi... Read More
View Post

Space Photos of the Week: Purple Haze Star Cluster, All in Your Brain

In Uncategorized by CA Technologies

Tech News Keywords:

Click through the gallery to see this week’s helping of the best the universe has to offer. And if you need more when you’re done but can’t wait until the next one, here’s the entire collection. [responsivevoice_button voice="US English Female" buttontext="Play"] Go to Source Author: WIRED Photo Department... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1hillside0.714nature, slope, hillside
2slope0.851
3nature0.89
4azure color0.988

These 3-D Shapes Are All Madness and Zero Photoshop

In Business, Education, Events by CA Technologies

Tech News Keywords: ,

Photoshop makes it easy for even casual photographers to create mesmerizing tricks of the eye. Charlie Kitchen wants no truck with that. He’s old-school, and crafts his illusions entirely within the camera.The Texan made these mind-bending photos using a large format film camera and stencils. Each took days. “My tendency has always been to put a lot of—sometimes too much—work into anything I do,” he says. He started fiddling with the idea three years ago after taking up large format photography. Kitchen liked the time it takes to focus the lens, compose the frame, and expose the image. But he wanted to do something more with it, and drew inspiration from the Hannah Whitaker‘s experimental in-camera collages. ... Read More
View Post

QuakeCon: 2,800 Gamers, 72 Hours, One Intensifying Smell

In Events, Government by CA Technologies

Tech News Keywords: ,

QuakeCon, considers itself “the Woodstock of gaming.” The event, held every year in Dallas, draws 2,800 nerds to a hotel conference, where they play video games for 72 hours. So it’s nothing like Woodstock. The only thing they have in common is the funky aroma.“The last day, it did have a bit of a smell,” says photographer Laura Buckman. “What did you think would happen when mostly men don’t shower and play video games for three days?” Buckman lives in Dallas and has a thing for quirky conventions, and checking out QuakCon was just too good to pass up. “I wanted to see the physical community that came together from such a solitary activity,” she says. The first QuakeCon drew just 32 people. ... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1person0.741
2coal black color0.964
3black color0.734
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
154450.262145MALE0.5

What It’s Like to Photograph the President (Hint: Be Quick)

In Business, Government by CA Technologies

Tech News Keywords: , , ,

When you’re the president, every moment of your day is booked. After all, you’re the leader of the free world, you’re guest-editing WIRED, and there’s a ton of copy to read after dinner. That doesn’t leave much time to sit for photos. Christopher Anderson knew he’d have to work fast.You wouldn’t know it looking at the remarkable images in the latest issue of WIRED, which Obama guest-edited. The images present the president while also revealing something about the man holding that title. Anderson wasn’t interested in making another pretty portrait of the commander in chief. “I wanted the photograph to feel more intimate,” he says. “I wanted the viewer to feel like they were being introduced to him in a way ... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1electrical circuit0.665electrical device, electrical circuit
2electrical device0.875
3device0.875
4printed circuit0.605electrical device, computer circuit, printed circuit
5computer circuit0.765
6module (computer)0.6electrical device, computer circuit, module (computer)
7emerald color0.908
8bottle green color0.647

You’ll Never See Earth From Space. But This Book Is Close

In Business by CA Technologies

Tech News Keywords: , , ,

Seeing Earth from space is breathtaking. You can’t look at an image like The Blue Marble and not feel small marveling at a fragile planet set against the vastness of space. Nor can you look at any of the thousands of images snapped by satellites and not feel awed by the beauty of Earth—and troubled by humanity’s ability to alter it.Writer Frank White calls this “the overview effect,” and you experience something like it scrolling through Benjamin Grant’s riveting Instagram feed Daily Overview. Each day, the New Yorker posts an image curated from Google Earth. “The scale is pretty absurd,” says Grant. “It shows us something that we really couldn’t get otherwise.” Grant started combin... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1mortarboard0.682headdress, cap, mortarboard
2cap0.682
3headdress0.683
4candelabra0.615device, holder, candelabra
5holder0.615
6device0.615
7bottle green color0.955

Let the data tell the story: Insights through accurate information

In Business, Events, Government by CA Technologies

Tech News Keywords: , ,

Have you noticed how adding to the craziness of the current election cycle is the fact that polls are all over the board? Whether you’re Independent, Democrat or Republican you have to be scratching your head wondering what’s going on. Looking at poll numbers from Rasmussen released in the weeks after the party conventions in July, one would think the Citizenry was changing its collective mind every seven days. One thing is for sure—both candidates must be struggling with how to spend campaign funds. How can they make sound decisions on where to direct resources with such volatile data? Say that, according to polls, you’re 1 point behind in Colorado. That’s striking distance and a good place to spend campaign dol... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1writing table0.623furniture, writing table
2table0.681
3furniture0.682
4room0.63
5claret red color0.812
6reddish orange color0.658

Is SMS out-of-band authentication out of time?

In Government, Security by CA Technologies

Tech News Keywords: , , ,

News articles and blogs have covered the revised guidelines for digital authentication that were recently published for preview by the National Institute of Standards and Technology (NIST). These guidelines, found in NIST Special Publication 800-63-3, have attracted a lot of attention because based on the current draft, out-of-band authentication techniques that employ SMS messages are considered deprecated. While this does not mean they cannot be used, the overall direction is clear: the NIST specification indicates such techniques “may no longer be allowed in future releases of this guidance,” and additionally suggests that “implementers of new systems should consider alternative authenticators” (section 5.1.3.2). ... Read More
View Post

Three reasons IT Operations needs to be more Agile

In Business, Government, Science & Nature by CA Technologies

Tech News Keywords: , ,

For decades IT operations has often been viewed as something of a back-office technology function. But all this has changed. Now IT (including operations) is front and center in helping organization forge new business models and disrupt markets. As a result, IT operations must adapt to support the application-driven business needs. A successful agile operations transformation boils down to three essential requirements – speed, quality and scale. Speed Thrills With business now being driven by a complex mix of highly experiential software services, it’s essential that any problems are detected and resolved quickly. This can be difficult because monitoring systems generally lack the ability to provide un... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification

I see predictive capacity planning in your future

In Business, Events by CA Technologies

Tech News Keywords: ,

I know our latest IT comic is a bit of an exaggeration – it’s not only to make you chuckle but also think. How do you plan for infrastructure capacity when the business delivers new requirements to you? Is most of that time planning consumed by manually gathering all the performance data needed to then input into spreadsheets or calculate on your own? The importance of capacity planning has been known for some time now but it may be more prevalent than ever before in today’s fast-paced mobile age where being first to market with business services can determine a company’s success or failure. When infrastructure bottlenecks wreak havoc with a day one application launch, the repercussions of rolling back a customer-fa... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1ventilator0.705device, ventilator
2device0.705
3black color0.778
4gray color0.772

How to stop dodging drones in your data center

In Business, Emerging Technology, Events, Science & Nature by CA Technologies

Tech News Keywords: , ,

How are you monitoring the capacity and power consumption of thousands of different data center components? Are you ready to launch a drone to help you get a view of your data center like Kip? How would you like to aggregate, normalize and visualize your operational data in real-time? With the average organization using dozens of different tools to manage their data center operations, integration is a major consideration for any DCIM implementation. When implemented effectively, DCIM can deliver value – and deliver it quickly. DCIM does that? DCIM not only enables improved operations, greater agility, and lower risk, but also can rapidly accelerate such tasks as data collection and routine calculations and analys... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1video display0.708
2electronic device0.745
3device0.747
4blue color0.789
5ultramarine color0.61

Find your zen with proactive IT monitoring

In Emerging Technology by CA Technologies

Tech News Keywords:

Monitoring and managing IT Infrastructure doesn’t have to be as stressful as Kip thinks. We often see IT administrators in a firefighting mode, trying to resolve performance and availability issues. Typically this happens as an IT organization is stuck in a “reactive” mode. Every time an issue is identified by an end user, the team hustles to find the root cause of the issue across various IT Infrastructure elements such as servers, networks and cloud services with multiple monitoring tools and siloed views. While this reactive troubleshooting is occurring, there is tremendous pressure on IT to resolve the issue quickly, as in the application economy customers can switch to a competitor in a heartbeat. IT cannot affor... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1neon lamp0.695device, neon lamp
2lamp0.7
3device0.755
4keyhole0.664
5coal black color0.737
6black color0.706

IT infrastructure can power up customer experience. Is yours ready?

In Business by CA Technologies

Tech News Keywords:

Delivering exceptional and differentiated customer experience through multichannel software applications is the ultimate battleground for businesses in today’s application economy. Modern customers want to engage through the platform of their choice, are unforgiving in terms of experience quality and would even switch to a competitor in a heartbeat. But all applications require the right mix of high performing IT infrastructure elements to run on or to even exceed end user expectations. IT needs to step up their game amidst the rising complexity due to the amalgamation of legacy and newer technologies such as cloud and big data. No wonder, according to Aberdeen Group, 41 percent of organizations list rising user demand fo... Read More
View Post
Number of Items Identified: 2
Item #Item NameScoreItem Classification
1blackboard0.984
2gray color0.999

Will big data reveal IT skills gaps in your organization?

In Business, Government, Science & Nature by CA Technologies

Tech News Keywords:

Big data technologies is a great opportunity for companies to tap in to a pool of information that can help them create new services, improve customer experience and ultimately, increase revenue. But getting those results could require some companies to boost the talent pool within their IT organizations. Data science, database management and predictive analysis skills represent just a few areas of expertise needed to fully realize the benefits of big data. Today IT and business leaders realize undertaking big data initiatives will also mandate they replenish the skill sets in their organization either by training existing staff or seeking out new talent for hire. In search of skills According to a... Read More
View Post
Number of Items Identified: 14
Item #Item NameScoreItem Classification
1support0.614
2device0.674
3gray color0.88
4ultramarine color0.616

Hit the Snooze Button on False Alarms

In Business, Events, Government by CA Technologies

Tech News Keywords: , ,

What wakes your team up at night? Another false alarm like Gary just experienced in the comic above? How would you like to put an end to simplistic, availability -based alarms across siloed tools and reduce the number of sleepless nights for your team? We all know that many of the alarms which Kip and Gary experience are false positives. Your teams are wasting precious time chasing down these alarms because they have to track down every single one of them, across multiple disconnected tools and then verify if it was real or false. While they’re doing that, there’s a good chance that they’ll miss another alarm that they should have been paying more attention to. Here’s a few real life benefits our customers have achieved by... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1desk0.924furniture, table, desk
2table0.924
3furniture0.924
4ultramarine color0.798
5sage green color0.672

If you want to deliver a phenomenal user experience, put your finger down

In Business, Science & Nature by CA Technologies

Tech News Keywords: ,

How often have you seen your team play the “blame games” like Kip and Gary’s team are in the comic above? Your application or service performance goes down and everyone takes out their point tools to resolve the issue. The server guys says it’s not the server issue, network folks tell you everything is running smooth on their side, the data center team says the energy utilization is optimal and so on. You begin to think maybe you needed to be more rigorous with your capacity planning? As all these blame games and thoughts happen in parallel, representing a massive loss in staff productivity. Further, while all this reactive troubleshooting is occurring, the outage duration continues to grow, meaning the customer experience... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1field lens0.685optical device, field lens
2optical device0.897
3device0.897
4closeup lens0.673optical device, closeup lens
5coal black color0.841
6black color0.606

DCIM: it’s the business for long-term planning

In Business by CA Technologies

Tech News Keywords: , ,

When I recently bought an industrial grade instant read thermometer for my grilling endeavors, I wasn’t just thinking about the upcoming birthday party for my husband. I was also thinking about the hundreds of family meals and dinner parties that would follow. I was thinking long-term and I was acting strategically. Data center decision-makers need to take a similar approach when deploying a DCIM solution. Yes, DCIM can deliver rapid results in the short-term, but it really turns up the heat with the realization of long-term benefits. In order to unlock these benefits, organizations need a clear strategy from the outset. All too often, DCIM is seen as a tactical IT or facilities solution, not a strategic business program.... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1sleeve0.849
2short sleeve0.648
3pique of dress0.601fabric, pique of dress
4fabric0.715
5purplish blue color0.948
6bottle green color0.678

Been there, done that, got the application economy T-shirt

In Business, Government, Science & Nature by CA Technologies

Tech News Keywords: ,

If you’re looking for an appropriate slogan to adorn the T-shirts worn by your dedicated and talented IT operations teams, it might be, “The application economy is coming – look busy!” And why not – we operate in a software-driven economy where businesses that deliver innovation the fastest will win – so better hustle, right? When you think about IT operations and managing infrastructure, being “busy” has always come with the territory. As each wave of technology arrives and implants itself within the business fabric, our teams of skilled pros operating in silos scramble to ensure the underlying infrastructure supports it. No mean task considering the eclectic mix of technologies accumulated over decades of enterpr... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1key (keyboard)0.72lever, key (keyboard)
2lever0.72
3keyboard0.893device, keyboard
4device0.893
5computer keyboard0.648device, computer keyboard
6blue color0.977

A trick or a treat: What’s your mainframe cybersecurity posture?

In Business, Events, Government, Legal, Security by CA Technologies

Tech News Keywords: , , , ,

Cybersecurity, the mainframe and Halloween actually have more in common than one might think. October is National Cybersecurity Awareness month, dedicated to reminding individuals and businesses that we all need to do our part to make sure that our online lives are kept safe and secure. Indeed, the cybersecurity scope is wide, from the pre-teen chatting on their mobile device to the global business processing billions of dollars of customer transactions on their mainframe. This month also brings Halloween, also known as “Allhallowtide,” “All Hallows’ Eve,” or “All Saints’ Eve” in some countries. It’s about remembering the dead, including saints and the faithful departed. And it’s about ghosts and ghouls and oth... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1comet0.743
2blue color0.782
3gray color0.732

CA Technologies completes acquisition of BlazeMeter

In Business, Government by CA Technologies

Tech News Keywords:

With the completion of the BlazeMeter acquisition, CA Technologies further extends our continuous delivery market leadership by bringing BlazeMeter’s talents and expertise into CA’s Continuous Delivery Business Unit. We are thrilled to integrate the amazing people, technology and best practices of BlazeMeter into CA’s growing DevOps portfolio – all of which is designed to accelerate digital transformation in the application economy. I believe we are at the epicenter of the application economy, changing the way software development, testing and delivery are done. Software teams are under intense pressure to bring new innovations to market more quickly, at higher quality and with a breakthrough user experiences, while simult... Read More
View Post

The true price of mainframe altruism

In Business by CA Technologies

Tech News Keywords:

Believing in the “greater good” is an altruistic view that many of us (at least the optimists amongst us) strive to achieve in our lives, whether at work or play. That’s why at CA, we believe in the greater good of the mainframe ecosystem for our customers. More specifically, I’d like to tell you about CA’s ongoing participation with IBM to collaborate on a variety of installation-related improvements on the z/OS platform. On October 4th, IBM announced z/OS platform software enhancements to help drive improvements in installation, configuration and deployment, along with functions that are intended to enable independent software vendors (ISVs) to use them. Many of the functions designed to meet these re... Read More
View Post
Number of Items Identified: 3
Item #Item NameScoreItem Classification
1playroom0.966room, playroom
2room0.966
3reddish orange color0.836

Driven by customers and data: Being a CA intrapreneur

In Business, Government, Start Up by CA Technologies

Tech News Keywords:

This interview continues the dialog with Jin Zhang, a CA Technologies intrapreneur who leads the forty2.io team within the CA Accelerator incubation program. Q: In your first interview on life as an Intrapreneur we talked about consulting with customers to identify if the problem that your solution solves is one that is worth solving. At what point are you confident that you have a conclusive answer/result? Quantifying the business opportunity is an important topic and there are many well-known publications out there to help guide entrepreneurs. I want to share one learning from my personal experience, and that it is to focus on how big the problem is. During interviews, many will confirm the problem you ... Read More
View Post
Number of Items Identified: 4
Item #Item NameScoreItem Classification
1underclassman (sopomore/school)0.772person, underclassman (sopomore, school)
2person0.773
3ultramarine color0.95

HP ALM customers, CA is here to help you transition

In Business, Government, Healthcare, Science & Nature, Security by CA Technologies

Tech News Keywords: , , , , ,

As you might have already heard, last week HPE announced the “spin-merge” of its non-core software assets with Micro Focus, a software company based in the UK, in a transaction worth around $8.8 billion. The software assets included in the spin-merge include its application delivery management, big data and enterprise security. HPE has been in the news many times in the past year – from the split of HP into HP and HPE, to the HPE Services spin-merge with CSC, and now the divestment of a major portion of its software portfolio. No matter how they spin it, HPE is losing in the IT software market and have even stated that these software tools are great assets, but not part of their core strategy. This leads to a murky s... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1scraper0.603tool, scraper
2tool0.724
3measuring stick0.629
4device0.629

Integrated DevOps optics: No room for vendor myopia

In Government, Security by CA Technologies

Tech News Keywords: , ,

In some instances, this willingness to subjugate potential revenue prospects and look beyond competitive conflicts takes a very long time to materialize. Unsurprisingly, this typically doesn’t benefit the technology consumer. Take for instance the IT security market. It took literally decades for vendors to agree that sharing information about widespread attacks and resulting anti-virus signatures was more useful for practitioners, and ultimately solutions providers themselves, than pursuing purely independent strategies. Last time I checked there was still plenty of room for competition in that space. Brightest names in DevOps joining forces Thankfully, in the domain of DevOps tooling and automation, it h... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1puzzle0.846
2star0.66figure, star
3figure0.66
4maroon color0.723

Learning from Brexit: Are you prepared for unexpected change?

In Business, Education, Events, Government, Legal, Science & Nature by CA Technologies

Tech News Keywords: , , , ,

In my daughter’s final year at university, she wrote a thesis on how well prepared small and mid-sized companies were for big changes. For me, it was no surprise that she found very few of them actually had strategies that would help them cope with significant change. And I have no doubt that many larger enterprises are, to this day, similarly unprepared. Having said that, how do you prepare for the truly unexpected? It seems like very few people actually believed a majority of Brits would vote to leave the EU in the recent “Brexit” referendum. Consequently, the British government and people now appear rather uncertain about what is going to happen next. I have personally experienced this kind of unexpected change at ... Read More
View Post
Number of Items Identified: 13
Item #Item NameScoreItem Classification
1football quarterback0.925person, contestant, football (soccer) player, American football player, football quarterback
2American football player0.953
3football (soccer) player0.953
4player0.953
5contestant0.953
6person0.953
7American football0.758contact sport, American football
8football0.83
9contact sport0.83
10sport0.831
11alizarine red color0.81
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
124180.394433MALE0.0474259

Stay on offense with a proactive network performance management strategy

In Business by CA Technologies

Page Views:

It’s football season again, and I don’t want to miss a single game! Thanks to mobile streaming, multi-channel recording and interactive TV, I can catch all the action when, where and how I want. Well, that’s the theory. Every on-demand digital service relies on the performance of a complex array of network and infrastructure components. Just one break in the chain and the user experience will be disrupted and you’ll miss that amazing one-handed catch in the end zone. Today’s consumers won’t settle for second best; the experience has to be top of the league all the time, every time. But meeting these expectations is getting harder. Modern hosting and networking approaches, such as cloud and software-defined netwo... Read More
View Post
Number of Items Identified: 16
Item #Item NameScoreItem Classification
1internal-combustion engine0.67
2engine0.671
3motor0.675
4machine0.675
5device0.717
6purplish blue color0.98

Is agility the new strategy holy grail?

In Business, Emerging Technology, Government by CA Technologies

Tech News Keywords:

As a watch enthusiast, I follow with interest the ever growing number of watch “micro-brands” that are appearing, boasting high quality Swiss movements and innovative designs. It is now possible to produce watches that compete with the high-end Swiss brands at a fraction of the cost. The new manufacturers are agile and able to adapt to market feedback in near realtime, which is often difficult for existing leaders. It is obvious why it makes sense for new, purely digital market entrants to keep at the cutting edge of digital transformation – they need to drive market share. But why do organizations that have been around for decades and are already turning economic profits need to embark on a digital transformation jo... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1basement0.712supporting structure, support, basement
2support0.712
3supporting structure0.712
4partition0.647room, partition
5room0.801
6light brown color0.929
7beige color0.676

Sappi Group optimizes IT operations on three continents with CA PPM SaaS

In Business, Events by CA Technologies

Page Views:

Sappi’s IT department is located across multiple sites on three continents. IT is the backbone of the company’s global business processes. IT-based solutions support production as well as purchasing and global sales. Standardization needed to improve global processes The global IT department initiates and manages a variety of projects. In the past individual solutions for project management, applications and infrastructure were used. These had grown over the years and many had been modified to meet local requirements. In addition, individual solutions were always being integrated into the Sappi infrastructure as a result of acquisitions, so that the respective departments could continue to work... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1computer user0.833person, computer user
2person0.92
3woman at work0.66person, woman at work
4reddish orange color0.974
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
124180.61814FEMALE0.970688

The ultimate loser in PSD2 is the consumer

In Business, Legal, Security by CA Technologies

Tech News Keywords: , ,

One of the great mistakes is to judge policies and programs by their intentions rather than their results.  — Milton Friedman The Payment Services Directive 2 (PSD2) is designed to create a single and efficient market for payments. It would do this by creating a more competitive playing field that offered consumers more choices for payment at lower costs while also improving security. A tall order to be sure, but after the release of the draft technical requirements one has to wonder if the intent and desire to combat fraud will come at the expense of consumers rather than benefit them. The bearer of bad news In the draft technical requirements for PSD2, the European Bank... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1partition0.78
2clean room0.601
3room0.602
4gray color1

What happens when the disruptors get disrupted?

In Business, Government by CA Technologies

Tech News Keywords: , ,

Comedians love cheap shots. Right now, one of the easiest laughs to be had is at the expense of Web-native businesses that are perceived as being dead-in-the-water. Mention Ask Jeeves or Myspace to a tipsy audience and you’re onto a winner. Done right though, a joke on this theme can be used to satirize the hubris displayed by today’s tech giants―the digital disruptors who seem invincible in the knowledge that they are the future and they always will be. Here’s the thing: funny as it now seems, Myspace was once the future. Disruption is not a one-time deal As I pointed out in a recent post about blockchain technology, the application economy is all about continuous cycles ... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1reset button0.678device, controller, electric switch, push button, reset button
2push button0.896
3electric switch0.896
4controller0.896
5device0.896
6bottle green color0.815
7coal black color0.686

Simply having APIs is not enough

In Business, Events, Finance, Security by CA Technologies

Tech News Keywords: , , ,

For several years now, the conventional wisdom among both business and DevOps professionals has been that well-designed APIs are a key contributor to the delivery of successful digital projects. In fact, our study from 2015 showed that almost all “digital disrupters” – companies at the leading edge of innovation – had leveraged APIs to achieve twice the revenue growth of their mainstream counterparts. Digging deeper, the research also showed that the best predictor of success is not just having APIs, but having them in the context of a properly managed and coordinated API program. APIs accelerate innovation, which in turn leads to the great digital experiences that make consumers and shareholders take notice. ... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1ignition switch0.725controller, electric switch, ignition switch
2electric switch0.73
3controller0.782
4lock0.695restraint (chains), lock
5restraint (chains)0.695
6ash grey color0.826
7gray color0.698

Security is still an afterthought with IoT and Mobile

In Science & Nature, Security by CA Technologies

Tech News Keywords: , , ,

From a browser far away from the vehicle itself, in a different country, a hacker was able to access data about the car and its owner, in addition to gaining control of the car’s HVAC system so he could turn on the heater, A/C or climate-controlled seats. For those of us working in technology, the Leaf exploit is not surprising at all. You’ll find numerous similar examples of published exploits in automotive, retail, energy, social media, and numerous other sectors. What is surprising is that we’re seeing the number of these exploits increase. Security demands are not what they used to be In the digital world, demands on security have changed. IT security pros are no longer tasked with ... Read More
View Post

Where do you keep your complexity?

In Business, Government, Healthcare by CA Technologies

Tech News Keywords: ,

If it feels like everything is too complicated, it’s not you. Sixty-seven percent of Generation Xers agree that life has become much too complicated. If you’re anything like me, you struggle daily just trying to figure stuff out. I’m often amazed that people with less of a technical thought process than I have can even get by. It’s not the hard stuff either. For example, last night, my wife watched me try to figure out why a TiVo season pass wasn’t recording properly. Twenty minutes. That’s what it took to figure out something that’s supposed to “just work”. Complexity around TV watching might be considered a first-world problem but when complexity impacts customer acquisition or employee satisfact... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1automated teller machine0.821device, automated teller machine
2machine0.823
3device0.942
4locker0.696device, fastener, locker
5fastener0.696
6orange color1

Unexpected Consequences and the Growth of Transactional Workloads

In Business, Education, Finance, Healthcare, Mobile Technology by CA Technologies

Tech News Keywords: , , , , ,

One of my college professors once rebuffed a comment I made in a sociology lecture about “unknown factors” with the statement, “the unexpected doesn’t happen very often.” I am sorry to say that, in my immaturity, I led the class in a chorus of derisive laughter. He was an engineer by training and I guess still had delusions of control. In my experience, the “unexpected” happens far more frequently than we think it should and results in unintended consequences. This is mainly because of our limited ability to anticipate the future behavior of complex systems. And although something about “unexpected” usually implies “bad”, there are many cases of beneficial outcomes. Fo... Read More
View Post

This Week in Cloud, July 11, 2013

In Business, Events, Gaming, Government, Healthcare, Legal, Mobile Technology, Security by CA Technologies

Tech News Keywords: , , , , , , , , ,

TechInsights Report: Cloud Succeeds, Now What? Luth Research and Vanson Bourne recently conducted a survey of companies that are currently using cloud services to get specifics on how cloud computing is being used, top problems or successes, and how its use changes as IT teams gain more experience. Download the white paper which details the results. Cloud News A recent survey by the Ponemon Institute of 781 IT and data security practitioners reveals that mobile devices and cloud computing pose the greatest data prote... Read More

Insurance Case Study: Managing a Virtual Performance Budget

In Business by CA Technologies

Page Views:

We just published a new case study from a leading Insurance (Property & Casualty) provider, which we think neatly outlines the advantages of using Service Virtualization to help manage performance of a complex, multi-tier application. In this example, the company basically breaks apart an application-wide Performance Test into all of the steps that make it up, and assigns a target time for each step that makes up that application workflow. The decomposed target time for each step makes up a “Performance Budget” that contributes to the overall performance time. ... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1readout0.753electronic device, readout
2electronic device0.84
3device0.841
4scoreboard0.668
5cardiac monitor0.635
6green color0.809
7purple color0.619

Keep IoT security close to your heart

In Education, Events, Government, Healthcare, Security by CA Technologies

Tech News Keywords: , ,

While the Internet of Things is still an emerging phenomenon, it has already attracted something of a backlash. There’s even a Twitter account (the name of which I cannot repeat on a family blog) dedicated to poking fun at the sillier side of IoT. Generally, this means embarrassing security breaches and pointless connectivity in consumer goods. It’s all good fun for tech boosters and skeptics alike but somehow misses the point about the real benefits and even the true risks of IoT. Connecting a range of everyday devices creates enormous opportunities for organizations to do any number of great things—improve customer service, optimize product performance, and maximize efficiency to name a few. But the risks of potentially ex... Read More
View Post

What will it take to combat global cybercrime?

In Business, Events, Government, Legal, Security by CA Technologies

Tech News Keywords: , , , ,

This week’s theme for National Cyber Security Awareness Month is “Recognizing and Combating Cybercrime,” an issue we must examine at the global level. In a previous blog, I noted that cybercrime results in more than $440 billion being stolen from the world economy on an annual basis. Cybercrime continues to grow at an exponential rate. Given the vast range of threats and malicious actors, as well as the growth in the number of connected devices worldwide, addressing cybercrime will require stronger partnerships between industry and government. WEF Cybercrime Project progress to date Establishing an effective framework for these partnerships is the goal of the World Economic Forum (WEF) C... Read More
View Post
Number of Items Identified: 12
Item #Item NameScoreItem Classification
1splashboard0.608
2device0.768
3machine0.675
4ash grey color0.942
5gray color0.913

CA applauds the new U.S. Automated Vehicle Policy

In Events, Government, Security by CA Technologies

Tech News Keywords: , , ,

Last week, the U.S. Department of Transportation released its Federal Automated Vehicles Policy. The policy recognizes the immense promise that automated vehicles hold for improving safety and efficiency in our nation’s transportation system. Indeed, the policy document claims that the “development of advanced automated vehicle safety technologies, including fully self-driving cars, may prove to be the greatest personal transportation revolution since the popularization of the personal automobile nearly a century ago.” However, the policy, which includes performance guidance for automated vehicles, also recognizes the significant risks inherent in this burgeoning technology, such as those associated privacy, system sa... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1cockhorse (toy horse)0.812
2cookie cutter0.68utensil, cookie cutter
3utensil0.68
4earplug0.604
5plug0.607
6azure color0.896

DNC hack was not the only cybersecurity discussion at the convention

In Business, Finance, Government, Science & Nature, Security by CA Technologies

Tech News Keywords: , , , , , , , , ,

It’s safe to say cybersecurity played a pretty significant role at the Democratic National Convention in Philadelphia last week. The hack of the Democratic National Committee (DNC) illustrates how cyberattacks can not only cause financial and reputational damage, but also how they could potentially impact a presidential election campaign. Stopping attackers who gain the “keys to the kingdom” While we don’t yet know with certainty the means by which the cyber attackers gained access to the DNC, odds are strong that identities were compromised along the way.  This calls for increased focus on identity and access management technologies.  In particular, privileged access management technologie... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1Tesla coil0.816electrical device, Tesla coil
2electrical device0.816
3device0.816
4azure color0.79
5blue color0.63

How national economies can enhance their competitiveness in the 21st century

In Business, Finance, Government, Security, Start Up by CA Technologies

Tech News Keywords: , , , , , ,

The Economist Intelligence Unit released results from a survey sponsored by CA Technologies that highlights what start-ups, enterprises and governments think about the prospects for growth in the app economy. I’d like to focus on what the results show about how governments are investing in the application economy and what they can do to further accelerate digital transformation. Survey results offer a roadmap for policymakers Governments across the globe clearly recognize that digital transformation holds the promise of transforming their national economies and enhancing national competitiveness in the 21st century. No industry, and no economy has been untouched by technological... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1night-light0.718device, light source, night-light
2light source0.718
3device0.718
4L-plate (learners plate for car)0.697
5ultramarine color0.808
6purplish blue color0.754

Behind-the-scenes cybersecurity talks at the Republican National Convention

In Business, Government, Legal, Security by CA Technologies

Tech News Keywords: , , , , , , ,

Although there was a lot of discussion about safety and national security last week during the Republican National Convention (RNC) in Cleveland, cybersecurity policy did not feature heavily in floor speeches. Donald Trump discussed the challenge of corporate intellectual property theft in his acceptance speech, but otherwise, cybersecurity policy received scant attention in prime time, despite its importance to American citizens’ safety and financial well-being, and the growth of the application economy. Where cybersecurity did get ample attention was during off-the-floor forums and in the GOP party platform, which was approved at the convention. Protecting privacy while sharing data The pl... Read More
View Post
Number of Items Identified: 13
Item #Item NameScoreItem Classification
1cash register0.658box, cash register
2box0.658
3device0.605
4blue color0.825
5ultramarine color0.775

What it takes to protect the nation’s critical infrastructure and data

In Business, Events, Government, Security by CA Technologies

Tech News Keywords: , , ,

Last week I had the honor of testifying as an IT industry representative before the U.S. House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. I shared with the committee insights and views on what it will take to increase industry participation in cyber threat information sharing programs authorized under the Cybersecurity Act of 2015. There are no organizations more supportive of protecting our nation’s critical infrastructure information systems than companies in the IT industry. And the elements within the Cybersecurity Act 2015 put forward substantial measures for protecting our country and its citizens. The Department of Homeland Security, with whom we wo... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1closeup lens0.794optical device, closeup lens
2optical device0.916
3device0.945
4lens system0.67optical device, lens system
5aperture (camera)0.614device, controller, aperture (camera)
6controller0.614

Body cameras and digital democracy

In Education, Government, Legal, Security by CA Technologies

Tech News Keywords: , , ,

The arrival of (the British version of) Wired magazine into my life made quite an impression in the mid ’90s, as it delivered a wealth of articles on the Utopian potential of digital technology and did so right before the Web started to become a central part of all our lives. I distinctly recall an article predicting the Internet of Things (which was referred to as “the embedded Internet”). There was also a piece on how ubiquitous security cameras, far from being a threat to privacy, would revolutionize society by allowing us to all be constantly looking out for each other. When I described this article to my journalism school friends, they scoffed, unable to picture a society in which there was free and universal access to ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1sounding board0.736enclosure, sounding board
2enclosure0.736
3tartan (clothing)0.677fabric, tartan (clothing)
4fabric0.697
5brick red color0.956

How DHS’s CDM program can help mitigate cyber risk

In Business, Events, Government, Security by CA Technologies

Tech News Keywords: , , , , , , ,

Whether you work in cybersecurity for the public sector or commercial arena, you know that while IT advanced rapidly over the past 25 years, security often took a back seat. As a result, we were left with gaps and vulnerabilities that were easily exploited in breaches like the one at the Office of Personnel Management or the New York dam. Where security was applied, it was simply bolted on, rather than built into the systems or applications. These legacy systems have been and continue to be at risk. Last week I participated in two security panels during the CA Technologies Government Summit in Washington, D.C. One of my colleagues on a panel, Matt Brown, a vice president at KCG (acquired by ManTech), cited the current state... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1skylight0.825framework, window, skylight
2window0.828
3framework0.828
4light brown color0.895
5blue color0.773

CA Technologies Government Summit: Thinking creatively inside the box

In Business, Government, Mobile Technology, Science & Nature, Security by CA Technologies

Tech News Keywords: , , , ,

Some may consider “thinking creatively inside the box” an oxymoron, yet it was a call to action for more than 300 federal, state and local government attendees of the CA Technologies Government Summit, held last week at the Newseum in Washington, D.C. Taking a cue from his own artistic journey, Phil Hansen challenged the audience to “embrace the shake” or embrace limitations and tap into new creative possibilities. Shifting perspective on limitations and seeing them as opportunities is especially apt for government agencies restrained by limited budgets and resources. New perspectives also are needed to rapidly develop government public-facing IT services, explained Jennifer Pahlka with Code for America. Solutions a... Read More
View Post
Number of Items Identified: 12
Item #Item NameScoreItem Classification
1panpipe0.633device, musical instrument, panpipe
2pipe0.633
3musical instrument0.653
4device0.733
5triangle0.623figure, polygon, triangle
6polygon0.623
7figure0.623
8nail0.601device, fastener, nail
9fastener0.601
10blue color0.915
11ultramarine color0.604

DevOps in government – real deal or house of cards?

In Business, Events, Government by CA Technologies

Tech News Keywords: , , ,

It’s good to hear that the DevOps movement is gaining momentum within the public-sector. While it’s not exactly new, a few agencies have adopted the principles or dipped their toes in the water. The adoption challenge, as is usually the case for government departments, can’t easily be associated with a single word – be that culture, technology or process – it’s often a combination of many things, including perhaps the toughest nut to crack – budget. Busting budgets and failing fast Like it or not, government agencies have to deal with shrinking IT budgets; it’s the one constant and agencies are under increased scrutiny to ensure money is spent wisely. Unlike private sector companies w... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1communication system0.863
2system0.863
3telecommunication system0.648
4telecommunication0.7
5medium0.7
6coal black color0.769

In banking, apps and security must mix

In Business, Government, Healthcare, Security by CA Technologies

Tech News Keywords: , ,

In the application economy, there is a clear need to balance openness and security. Organizations working to provide the best, most competitive services possible need to quickly deliver feature-rich apps that constantly evolve to address emerging needs and to simply work better. Inevitably, this means opening up IT systems that have previously been kept locked down behind the enterprise firewall. And this means increasing the risk of unauthorized access. For some organizations, the urgency of opening up to the app economy is so great that it far outweighs the risks involved. Witness the API security mistakes certain high-profile companies have made. But in sectors where IT systems are especially sensitive―healthcare and banking,... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1buckle0.692device, fastener, buckle
2fastener0.692
3device0.693
4webbing0.684fabric, webbing
5fabric0.685
6ultramarine color0.952
7blue color0.777

How to end what ails online commerce

In Business, Legal, Security by CA Technologies

Tech News Keywords: , ,

A recent report from Juniper research states that global online fraud is on pace to top $25 billion by 2020. And new data from a report by SalesCycle reveals that the average shopping cart abandonment rate across the globe was 74% in Q1 2016 with Asia Pacific having the highest abandonment rate at 75.9%, despite having the highest sales shares by region. This paints a less-than-ideal picture for the banks, card issuers and merchants in the eCommerce game. Historically, banks would focus their attention on the security practices associated with online payment transactions to help build their customers’ trust – like finding ways of balancing the risks and costs of their fraud rates. Fast forward to today’s digita... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1chicken wire0.643fabric, net, chicken wire
2net0.675
3fabric0.74
4chainlink fence0.632barrier, chainlink fence
5fence0.653
6barrier0.653
7azure color0.972

Don’t underestimate the strength of the blockchain

In Business, Events, Government, Healthcare, Legal, Science & Nature by CA Technologies

Tech News Keywords: ,

One of the great challenges of digital transformation is that it is not a one-time thing. You can’t simply complete a company-wide digital initiative then rest on your laurels, content that the future is secure. The digital age is about continual change, constant disruption and the semi-regular emergence of completely new technology paradigms. Miss out on a relevant innovation and your organization could fall behind the competition. The recent hype around microservices is a great example of this. Blockchain seems to be a good candidate for the next big digital thing. Right now, it’s at the early stages of public consciousness and industry understanding. Ask someone in your organization about it and you’ll likely get a reply ... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1printed circuit0.898electrical device, computer circuit, printed circuit
2computer circuit0.965
3electrical device0.965
4circuit board0.645electrical device, computer circuit, circuit board
5bottle green color0.974
6jade green color0.772

Open banking APIs have arrived

In Business, Finance, Government, Security, Start Up by CA Technologies

Tech News Keywords: , , , ,

Almost two years ago, my colleague David Bressler mused that in the near future, banks and other financial institutions would have to start thinking like software companies, develop open API programs, and transform themselves into platforms – or risk becoming irrelevant in the application economy. That time has come. Since his article was published, the traditional banking paradigm has been shaken up by a trifecta of three converging trends that are acting as catalysts for change in the finance industry: Surging customer expectations. The speed and user experience of today’s mobile apps and cloud services have taught today’s customers to expect higher levels of convenience and utility from every ... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1buckle0.729device, fastener, buckle
2fastener0.729
3device0.729
4webbing0.678fabric, webbing
5fabric0.679
6ultramarine color0.935
7blue color0.844

3D Secure for addressing card-not-present fraud

In Business, Government, Legal, Security by CA Technologies

Tech News Keywords: , ,

Participants of the recent North America Fraud Forum in Chicago asked a lot of questions about how best to tackle Card-not-present (CNP) fraud. Based on responses, a clear answer is to battle CNP fraud using a 3D Secure (3DS) solution. 3DS cheerleaders are often met with naysayers who voice concerns about customer friction and the resulting loss in revenue after implementation, so my goal here is to give a high-level understanding of a customer-friendly, frictionless and streamlined 3D Secure solution. Card-not-present fraud in the e-commerce space is the bane of consumers, banks, and merchants, and a primary focus is to cost effectively control CNP fraud from the transaction initiation point. Concerns are heightened since... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1backboard0.648device, support, backboard
2support0.649
3device0.649
4tool0.6
5lemon yellow color0.964

EMV and risk-based authentication

In Business, Events, Legal, Science & Nature, Security by CA Technologies

Tech News Keywords: , , , ,

The financial services industry and consumers in the United States (U.S.) are finally seeing the arrival of EMV chip cards with the upcoming October 1, 2015, liability shift. This transition provides a foundation for the next generation of payments because it helps reduce counterfeit card fraud, improves international card acceptance, and is expected to help establish the acceptance infrastructure needed to support other emerging chip technology for payments. While payments have never been safer as the U.S. payments industry adopts EMV chip card technology, criminals have never been smarter.  Increasing counterfeit card fraud in the U.S. has been the primary reason the industry business case works for the marketplace now along wi... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1touch screen0.856electronic device, video display, touch screen
2video display0.859
3electronic device0.915
4device0.942
5personal digital assistant0.629electronic device, personal digital assistant
6blue color1

How secure are SMS one-time passwords?

In Business, Events, Legal, Mobile Technology, Science & Nature, Security by CA Technologies

Tech News Keywords: , , , , , ,

Online and mobile banking are a part of our day-to-day lives as they offer the freedom to bank anytime and anywhere. But if there’s money involved, scammers will unfortunately always follow. If you are an online banking user, you might be familiar with receiving a one-time password (OTP) via SMS from your bank to your mobile phone every time you log in or transfer money from your online account. You might also have been unlucky enough to have been a victim of the Eurograbber scam in Europe back in 2012, which has more recently made its way to the Middle East. Last April, the Krebson Security blog was one of the first sources to mention the “Sandroid” botnet, which intercepted around 28,000 text messages of customers a... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1burglar alarm0.76device, burglar alarm
2device0.888
3push button0.622device, controller, electric switch, push button
4electric switch0.643
5controller0.649
6ultramarine color0.729
7emerald color0.656

Right-sizing IT capacity for the application economy

In Business, Events, Gaming, Healthcare, Security by CA Technologies

Tech News Keywords: , , ,

Everyone loves a bargain. In our house, we are always on the look out for discounts on the latest sports gear and tech gadgets. But for some retailers, the consumer desire to get a good deal can turn sour – especially on peak shopping days like Black Friday and Cyber Monday. As Best Buy recently discovered to its cost during Thanksgiving weekend, with website technical issues resulting in an extended outage. Best Buy is not the first business to become a victim of its own success. Recently it was SimCity 5 gamers and healthcare.gov users that were blighted by online performance issues. Although the name of the organization might have changed, the nature of the problem hasn’t. Matching infrastructure capacity to p... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1plaque0.803
2memory device0.71
3device0.712
4gray color0.979
5charcoal color0.777

Hardware savings, productivity improvements and case studies – Oh my!

In Business, Events, Finance, Government, Healthcare by CA Technologies

Tech News Keywords: ,

Are your executives demanding IT budget spend reductions without sacrificing the quality of service delivery? Are you expected to rationalize your infrastructure investments based on the importance of business services? Are you getting the most “bang” for your buck when it comes to utilization rates of your current infrastructure? If you answered “yes” to any one of these questions, then capacity planning is a practice you should considering adopting. Read on to learn how companies in every industry from healthcare to finance to telecom to government have overcome the same IT and business challenges you may be facing by building a successful capacity planning practice with a little help from CA Techno... Read More
View Post
Number of Items Identified: 14
Item #Item NameScoreItem Classification
1person0.636
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
124180.702753MALE0.952574

Drive user adoption with a little ’emotional skeuomorphism’

In Business, Government, Science & Nature, Security by CA Technologies

Tech News Keywords: , , ,

User experience is about more than where buttons are or what fonts to use. User experience is about weaving the experience of using a technology product into consumer behavior to improve the value the consumer gets from the product. Sometimes the habits we build up around a task are what holds us back from improving. Personally, I like to hand wash dishes even though I own a dishwasher. I know it’s a comfort thing that I think is related to taking care of myself. I make up the phrase ’emotional skeuomorphism’ as I wrote this post. In my mind, it’s the emotional latticework that UX designers need to put in place in order to help customers transition to a digital model. It’s similar to how digital-buttons use... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1pylon0.893tower, pylon
2tower0.893
3power line0.704device, transmission line, power line
4transmission line0.886
5device0.886
6gray color0.858
7steel blue color0.789

How following NIST guidelines can help guard against security breaches

In Government, Science & Nature, Security by CA Technologies

Tech News Keywords:

The timing of the National Institute of Standards and Technology (NIST) Framework For Improving Critical Infrastructure Cybersecurity couldn’t be more relevant for an upcoming Webcast that I will be leading with one of my colleagues. Recent reports such as CNN Money’s on energy grid hacks and others citing nation state attacks show the threat is real and defense is mandatory. CA Technologies has spoken to a number of companies that are in the early stages of planning to update their cybersecurity infrastructure and controls to more closely align with the NIST guidelines. If you work in or around cybersecurity for your organization, it is important that you understand the Framework’s standards, guidelines and practices... Read More
View Post

Winning new friends and efficiencies through integration

In Business, Energy, Government, Science & Nature by CA Technologies

Tech News Keywords: , , , ,

When I moved to my new house in Massachusetts, I was keen to meet my neighbors and become part of my community as soon as possible. I joined the gym. I signed up to the chess club. I took my kids to Little League. As a result, I didn’t just gain a new home, I gained a whole bunch of new friends – and met some formidable chess players. Integrating management with data While this is a personal story of integration, the same lessons apply to your data center operations. If you deploy a new management system in your data center, you get, well, a new system. But if you go on to integrate it, you can tap into a host of new processes and new metrics – and a host of new efficiencies too. Beyond integra... Read More
View Post

Global Energy Prices and Demand Drive Need for Good Energy Management in Data Center

In Business, Energy, Events, Science & Nature by CA Technologies

Tech News Keywords: , ,

Although global energy prices have risen more slowly than initially anticipated, overall the long-term trend for energy prices will be a slow and steady incline. According to IEA, some countries like Germany the prices have grown significantly (more than doubled in the past 10 years) and other regions like the US they have remained relatively constant. However, the demand for electricity is growing globally and many electricity providers struggle to keep up. In addition, countries including China and Brazil continue to experience rapid economic growth, increasing the rate of electricity demand growth. Due to the trends of increasing energy demand and also increasing price, there has been a propagation of interest and work on energ... Read More
View Post

Will new electricity regulations impact the data center?

In Business, Energy, Events, Government, Science & Nature by CA Technologies

Tech News Keywords: , ,

With the advent of new cap-and-trade regulations in California, like the recent Network World article mentions, some data center operators are also wondering what the impact of new electricity-related regulations will be for Data Centers? Other articles, however, reassure us that the cap-and-trade rules along with new carbon regulations on coal will have negligible impact on data centers in the near-term. New coal regulations are set to minimally impact electricity prices because they only apply to new coal power plants, and there aren’t any new coal power plants planned due to the much cheaper methane supply available and previous pollution regulations. A great article on this was written by Yevgeniy Sverdlik “New coal-plant regulat... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1teacher0.927person, teacher
2person0.927
3claret red color0.899
4sage green color0.687

This Week in Cloud, June 13, 2013: The cloud security gap, Study finds cloud reduces energy consumption, Cloud computing myths. And more…

In Business, Education, Events, Gaming, Security by CA Technologies

Tech News Keywords: , , , , , ,

Sir Richard Branson Interview! Sir Richard Branson, founder and chairman of Virgin Group, discusses how he has been able to foster innovation by giving his employees the ability to be creative, take chances, and learn from failure in this interview from CA World. Cloud News – A new survey sponsored by Microsoft reveals that while many small and medium businesses worry about security and data privacy in the cloud, once they made the move to cloud, they find it more secure and private than their previous on-premise system, according to this InformationWeek article. – A recent survey by comScore revealed that 94% of UK cloud users found that the cloud has... Read More
View Post
Number of Items Identified: 4
Item #Item NameScoreItem Classification
1classroom0.954room, classroom
2room0.954
3pink color0.875
4reddish orange color0.602

Be a “know-it-all” at this year’s CA World

In Business, Education, Security by CA Technologies

Tech News Keywords: , , ,

No one likes a “know-it-all” but secretly we all want to be one (admit it…). So now here’s your chance at this year’s CA World. We’ve re-introduced our pre-conference education sessions, bumping them up with 100 percent more content from last year. You’ve asked, we’ve listened In previous years, CA held its pre-conference sessions on Monday and Tuesday before the conference officially kicked off. It was then taken it down to just half a day before bringing it back up to a full day last year. So many sessions, so little time This year, we’re offering you more than 600 business, technical and best practice sessions to choose from, enabling you to tailor you... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1blackboard0.878
2teacher0.614person, teacher
3person0.615
4gray color0.615
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
124180.609308MALE0.0109869

Preparing for the future with STEM

In Business, Education, Events, Government, Science & Nature, Security by CA Technologies

Tech News Keywords: , , , ,

What does the future hold for the next generation and how can we address today’s underemployment in STEM skills? As a child, what did you want to be when you grew up? An astronaut? A vet? These options were achievable given the correct blend of attitude, application and, to some degree, skill. Yet, according to a report by Microsoft, the current generation of young people may be destined for jobs that don’t even exist yet. How then, can they prepare themselves for what the future employment market holds? The frightening pace of technological advancement has meant that new types of jobs are created every day, with each requiring a new and unique skillset. According to the US Department of Labour, around 65 percent... Read More
View Post

Should we be doing more to keep our digital darlings?

In Business, Education, Government, Science & Nature by CA Technologies

Tech News Keywords: ,

That van could attract attention in most cities. Across Europe, we are witnessing a shortfall in the number of people with the skills required for the application economy, with an estimated 756,000 ICT jobs going unfilled by 2020. European cities are fighting to attract and retain digital talent. Compare this with the situation in Asia. Here, STEM students (those studying science, technology, engineering or maths) can account for up to 20% of the student population, whereas in Europe, this percentage is only around 2%*. Make no mistake: these tech clusters in cities are thriving. London’s Tech City, for example, recently celebrated its fifth anniversary and a string of achievements, not least a tenfold increase in the vol... Read More
View Post
Number of Items Identified: 3
Item #Item NameScoreItem Classification
1snowboard0.666
2azure color0.855

32 pieces of #AdviceToMyYoungerSelf from women at CA

In Business, Events, Government, Start Up by CA Technologies

Tech News Keywords: , ,

As CA’s CMO Lauren Flaherty pointed out in her recent blog post, it’s 2016 and women occupy only 9% of management positions and account for only 14% of senior management positions at Silicon Valley startups. When you’re making big decisions, you should not only have half of the human population in the planning. One of the ways to tackle this gender gap issue is to encourage young women to believe in themselves more and show them successful female role models. To celebrate the International Women’s Day, we asked women at CA Technologies what kind of career and life advice they would give to their younger selves. Below are some examples. We’ll be tweeting out more through @CAInc later this this week with the hasht... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1air bubble0.658
2bubble0.753
3spheroid shaped0.652
4photosphere (suns surface)0.623
5emerald color0.805
6blue color0.707

Let’s become an agile society

In Business, Education, Government, Science & Nature, Security by CA Technologies

Tech News Keywords: , , , , ,

When a ship carrying Syrian refugees sank off the coast of Lesbos on October 28, 2015, the world saw a global human need and overwhelming sadness and tragedy. It was a mounting geopolitical crisis – and, if the many thousands of volunteers were any indicator, the world wanted to help. Lesbos is a symbol of the opportunity and challenge in front of us today. On one hand, thanks to high tech news sites, people became immediately aware of the crisis unfolding, and many were spurred to action. On the other hand, not all of that potential help was realized. Government and NGO resources weren’t activated to their full capacity, people’s skills weren’t adequately deployed, and the crisis continues to mount. The Four... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1computer user0.792person, computer user
2person0.793
3azure color0.888
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
144350.433981FEMALE0.993307

How women in software could change the world

In Business, Government, Healthcare, Science & Nature, Start Up by CA Technologies

Tech News Keywords: , ,

As a technologist and a mom of three girls, I often think about how to encourage more young girls and women to pursue STEM (science, technology, engineering and math) careers. A recent “Women in Technology” breakfast at CA World ’15 featured Talia Milgrom-Elcott, executive director of 100Kin10, who shared a recent finding about one way to inspire more women to be interested in technology. With a mission of training 100,000 new STEM teachers in the U.S. by 2021, 100Kin10 runs a series of programs to recruit math, science and engineering majors. Typically, the attendance at technology-oriented conferences is predominantly male. But Milgrom-Elcott found that when they started running seminars that show how technology can addres... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1toothbrush0.878toiletry, toothbrush
2toiletry0.878
3carnation color0.755
4pink color0.691

Barbie doesn’t think math is hard anymore

In Business, Education, Government by CA Technologies

Tech News Keywords: , , , ,

Not so long ago Barbie used to say, “math is hard”. The world has changed a lot since then. The diversity discussion is happening. More companies are recognizing that diverse teams make better products. This topic was on the table during the second annual Women in Tech breakfast, organized by CA Technologies and PwC at CA World in Las Vegas. CA’s Chief Marketing Officer Lauren Flaherty moderated a panel discussion with Christine Goldberg, (PwC, Co-Founder of Women in Technology Program), Talia Milgrom-Elcott (Executive Director and Co-Founder, 100Kin10), Angela Tucci (General Manager, Agile Management, CA), and Telle Whitney (Presiden... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1people0.626person, people
2person0.683
3jade green color0.699
4olive green color0.679

CA hosts entrepreneurs in Springboard Tech Hub Bootcamp

In Business, Government, Security, Start Up by CA Technologies

Tech News Keywords: , , ,

If you’re not familiar with Springboard Enterprises, it’s a network of experts that engage with and advance scalable startups. Over the past fifteen years, they have coached almost 600 companies to raise $6.8 billion in funding, creating tens of thousands of new jobs, and generating billions in annual revenue. Assisting start up growth 81% of all of the Springboard companies are still operating or were acquired, and eleven have had IPOs. The competition for a place in a bootcamp class is fierce, with more than 100 applicants for ten places. The ultimate objective is to assist these startups –specifically their founders and/or C-level execs – to access capital, partnerships, and navigate through an in... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1racket0.785sports implement, racket
2sports implement0.786
3blue color0.968

Why women should work in IT

In Business, Events, Government, Science & Nature by CA Technologies

Tech News Keywords: , , , , ,

Life in the corporate jungle isn’t always easy. With International Women’s Day just gone and March being Women’s History Month, it’s important to remember how far we’ve come but also how far we still have to go. But unlike Meg Griffith in the 1988 film Working Girl, women don’t have to rely on their boss breaking a limb in order to get their so-called “break”. While this may be an extreme example and would most likely never happen in the real world, companies are more compelled than ever to attract women in senior roles – especially in industries such as IT where women are outnumbered by men. What CA brings to the table CA Technologies offers women a great career ... Read More