CA TechnologiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for company name: CA Technologies returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Data Center Management
 •   Application Security
 •   Application Lifecycle Management(ALM)
 •   Application Management and Maintenance
 •   Data and Application Distribution
 •   Security Monitoring
 •   Testing and Analysis
 •   Access Control

Advertisement

ALL RESULTS
1 - 25 of 26 | Next Page

Key Capabilities of a Public Sector Service Virtualization Solution by CA Technologies

December 31, 2012 - (Free Research)
In this white paper, discover the four essential capabilities of service virtualization (SV), and how SV enables development teams to perform more precise, more realistic, and more requirements-driven testing. Read on to explore how service virtualization enables parallel development, testing across heterogeneous platforms, and more. 
(WHITE PAPER) READ ABSTRACT |

Inside the world of Web APIs, the cloud and mobile technology by CA Technologies

May 23, 2014 - (Free Research)
In this on-demand podcast, Rob Daigneau, practice lead for custom application development at Slalom Consulting, offers his expert insights into the world of Web application programming interfaces (APIs), the cloud and mobile technology. 
(PODCAST) READ ABSTRACT |

CA LISA Service Virtualization by CA Technologies

December 31, 2012 - (Free Research)
In this data sheet, explore business-critical information on service virtualization and how it allows your development team to move more quickly without sacrificing quality or testing. Read on to learn more about service virtualization platforms and your company. 
(WHITE PAPER) READ ABSTRACT |

Accelerate Application Delivery: Agile is Dead by CA Technologies

June 05, 2013 - (Free Research)
Join a software development evangelist in this expert webcast to explore how agile and TDD are limited by overarching restrictions on code complexity. Discover ways to move beyond agile and TDD and unlock the potential of your application development process. 
(WEBCAST) READ ABSTRACT |

CA Service Virtualization Overview by CA Technologies

April 30, 2012 - (Free Research)
This video gives an introduction to service virtualization and explores how it can give you access to all your application's dependent systems at any time during the build and test process. Watch to learn how you can accelerate the entire application development lifecycle by implementing service virtualization in your enterprise. 
(WEBCAST) READ ABSTRACT |

Crossing the DevOps chasm by CA Technologies

May 17, 2013 - (Free Research)
Every company wants to deliver apps faster and more cost efficiently, but development and operations remain separated by the challenging release step. Check out this white paper to learn how you can bridge the gaps in your delivery lifecycle in order to speed deployment times by adopting service virtualization, release automation, and more. 
(WHITE PAPER) READ ABSTRACT |

Service Virtualization and DevTest Cloud by CA Technologies

February 28, 2011 - (Free Research)
For many dev teams, the greatest barriers to project success are out of their control - lack of availability, stability, or capacity of development and test environments. This resource explores how leveraging a cloud platform can help solve these constraints by creating virtual test environments and simulating unavailable or costly test components. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: IAM - Key concepts and predictions for 2011 by CA Technologies

August 10, 2011 - (Free Research)
This expert e-guide discusses key trends that will significantly impact identity and access management concepts in 2011, and highlights the critical questions any organization must ask when selecting an IAM product. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript:  Planning Your Virtual Desktop Infrastructure by CA Technologies

August 01, 2011 - (Free Research)
Desktop virtualization and cloud computing are hot topics of discussion, but there are still some obstacles that companies must address become they can deploy this technology. This presentation transcript provides insight into the evolution of these IT models and offers advice to help you ensure implementation success. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

eGuide: ITSM basics and best practices by CA Technologies

July 05, 2011 - (Free Research)
This expert e-guide from SearchDataCenter.com is designed to help IT pros maintain efficiency without compromising service quality. Gain insight into how change management can free up time while improving availability and explore ten considerations for implementing this essential process. 
(EGUIDE) READ ABSTRACT |

Planning Your Virtual Desktop Infrastructure by CA Technologies

July 18, 2011 - (Free Research)
This webcast explains why conventional desktops are quickly being replaced by virtual ones. Discover how effective virtual desktop infrastructure can pave the way for cloud computing and learn how to realise the financial, efficiency, and agility advantages of this new IT model. 
(WEBCAST) READ ABSTRACT |

Getting Virtualization Back in Gear: Overcoming VM Stall Through 1:1 Virtualization by CA Technologies

June 15, 2011 - (Free Research)
The potential benefits of virtualization are well documented: increased agility, improved disaster recovery capability, and significant cost savings due to server consolidation. This whitepaper discusses 1:1 virtualization and the barriers of IT virtualization. 
(WHITE PAPER) READ ABSTRACT |

Extending CA IT Client Manager with CA Auto Suite for Data Centers by CA Technologies

June 15, 2011 - (Free Research)
Virtualization has already started to transform the data center from static to dynamic, and hybrid clouds promise to add elasticity as the next dimension. Read about new data center technology that addresses the new requirements needed to support the latest generation of dynamic data centers. 
(ANALYST BRIEF) READ ABSTRACT |

What’s New in CA Workload Automation by CA Technologies

June 15, 2011 - (Free Research)
tbd 
(WEBCAST) READ ABSTRACT |

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 23, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

You're Not Ready For Internal Cloud by CA Technologies

July 26, 2010 - (Free Research)
Most enterprise I&O shops lack the experience and maturity to manage an internal cloud environment. You can fast-track cloud learning with turnkey solutions for greenfield environments, but delivering an internal cloud will take years for most enterprise shops. Continue reading to learn more. 
(ANALYST REPORT) READ ABSTRACT |

CA Automation Suite Paves the Way for Cloud by CA Technologies

October 01, 2010 - (Free Research)
This white paper describes how virtualisation and cloud initiatives are creating new types of management challenges across physical and virtual data centre environments. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Virtual Data Center E-Zine Volume 7 by CA Technologies

December 27, 2010 - (Free Research)
Cloud computing has loads of potential for data centers -- the ability to pool resources, charge customers based on actual usage and tap into extra external capacity when needed. 
(EZINE)

Vendor Report: CA Technologies Virtualization Security by CA Technologies

December 10, 2010 - (Free Research)
CA Technologies offers a broad range of products which support customers in implementing Virtualization Security. CA Technologies specific strengths are not only that core security is provided but also IT service automation, assurance, management and other areas are covered as well. Continue reading this report to learn more. 
(ANALYST REPORT) READ ABSTRACT |

Survey Results: Security – An Essential Prerequisite for Successful Virtualization by CA Technologies

December 10, 2010 - (Free Research)
During September and October 2010 KuppingerCole conducted an independent survey of the status and plans for Virtualization Security amongst organizations. This survey shows that security is a key success factor to virtualization. Continue reading to learn more about the results. 
(ANALYST REPORT) READ ABSTRACT |

Content-Aware Identity & Access Management in a Virtual Environment by CA Technologies

June 01, 2010 - (Free Research)
Read this white paper to learn how CA Technologies Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage. 
(WHITE PAPER) READ ABSTRACT |

Smart Paper, Issue 2: Navigating the Path to Virtualisation by CA Technologies

July 28, 2010 - (Free Research)
This issue from Smart Paper explores virtualisation as an optimal solution for CIOs interested in increasing agility and efficiency in their business. Following a simple path, CIOs can migrate from a testing and development environment to a pure virtual or a hybrid production environment, thereby realizing the benefits of virtualisation. 
(EZINE)

Shedding Light on Cloud Computing by CA Technologies

January 01, 2010 - (Free Research)
Read this primer as Gregor Petri, Advisor Lean IT of TheCloudAcademy.com covers the various definitions of cloud computing, risks of cloud computing, the various types of cloud computing, cloud computing in an infrastructure context and more! 
(WHITE PAPER) READ ABSTRACT |

E-Book: Best Practices - How to implement and maintain enterprise user roles by CA Technologies

June 29, 2010 - (Free Research)
Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser. 
(EBOOK) READ ABSTRACT |

Privileged user management: It's time to take control by CA Technologies

October 01, 2009 - (Free Research)
IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 26 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts