The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
You want to evolve your application development strategies to benefit from DevOps processes, cloud and container platforms, and microservices architectures. However, if you've built your core application infrastructure around traditional Java™ EE development approaches, the path forward might not be so clear.
Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) 7 allows you to re-imagine your Java applications and take full advantage of these new application approaches.
In this webcast you’ll learn:
• Trends and priorities in application development today
• What’s new with JBoss EAP 7
• How to move your Java EE applications into the cloud with Red Hat OpenShift Container Platform
2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
·The changing landscape of regulations and consumer behavior
·Technology transformations and new innovations that will influence the way you prepare for 2017
Take your digital strategy to the next level with new API management capabilities.
Leading analysts have recognized that robust API management is now fundamental to the delivery of a modern digital platform. To reflect this, Gartner released its first-ever Magic Quadrant for Full Life Cycle API Management in October 2016 to replace the existing Magic Quadrant for Application Services Governance. Clearly, the role of API management has grown both in prominence and scope.
Join this webinar to learn:
- What “full life cycle API management” means to your organization
- Why expanding the role of API management delivers more business value
- How to evaluate the new capabilities of full life cycle API management
All viewers will also benefit from a complimentary copy of Gartner’s Magic Quadrant for Full Life Cycle API Management, in which CA Technologies was named a leader and achieved the highest overall position for its ability to execute.
Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats?
Join this session with Scott Crawford, Research Director for Information Security, to find out why 451 Research has rated all 6 of 2017’s key security trends as “high impact.”
Organizations are frequently tempted to modify and adapt their Agile approaches as they become more experienced. As they then try and expand Agile use into other areas, or as they look for ways to integrate Agile and traditional project execution approaches they realize they are facing some unintended consequences. Join Andy Jordan, ProjectManagement.com as he discusses how best to look at options for enhancing or modifying Agile at your organization and how to ensure you aren’t causing future problems.
This session is approved for 1 Project Management Institute (PMI) PMP Credit.
Traditionally, test data management has involved copying, masking, and subsetting production data. While masking data does offer production-like data, it’s also slow, complex, and often error-prone, increasing the risk of sensitive information making it to less secure test environments.
View this event to discover how synthetic data generation can create realistic test data that contains no sensitive information. What’s more, this test data will contain the negative paths, future scenarios, and outliers not typically found in production, providing the data needed to maximize test coverage.
You will also learn:
-The drawbacks of using production data in testing, from compliance to provisioning time and quality
-How data visualization can be used to identify any data missing from production needed for rigorous testing
-How masking can be combined with synthetic data generation to plug any gaps in test data
When disaster strikes, your number one priority is fast recovery. But trying to determine the root cause of the problem can be a time consuming, manual process. Join this webinar with CA Technologies’ internal IT team, as they discuss how automation has helped them save time with disaster recovery through consistent, predicable processes – and enabled them to get up and running again seamlessly.
You will learn:
How to save money and time from outages – even when the worst happens
•How to shift your focus from manual problem solving to fast recovery through automation and repeatable processes
•How keeping an audit trail prevented the team from making the same mistakes in the future
Just a few years ago, The Coca-Cola Company (TCCC) was completely on-premises, looking for a way to move toward their cloud-first strategy. Watch TCCC’s presentation from MuleSoft’s Atlanta Summit to learn Coke’s journey with MuleSoft starting from evaluation to how they are currently taking an API-led approach to integration. With this, Coke is now creating great customer experiences and enabling their sales force to continue to lead through innovation.
Attendees will learn how TCCC is using MuleSoft to:
Implement a microservices architecture
Automate release management to accelerate time to production
Move from a COE to a Center for Enablement (C4E) to maximize reuse
Get a glimpse of the future of Persistent Memory - it's NOW! Join SNIA NVDIMM Special Interest Group in another in our series of webcasts on the NVDIMM Cookbook - how to incorporate NVDIMM into your systems and what non-volatile DIMM applications now available. We'll even highlight some of the "knobs" to turn to optimize use of NVDIMM in your applications to ease the way to simple, plug-n-play adoption!
Im Projektmanagement gehört ein regelmäßiges Reporting zum Tagesgeschäft. Durch den Einsatz von vorgefertigten Reports lassen sich im täglichen Projektmanagementgeschäft erhebliche Zeiteinsparungen erzielen.
In CA PPM finden sich eine Vielzahl von fertigen Reports zu den Themen Projekte, Ideen, Ressourcen, Finanzen, Portfolios, usw. Für Sonderfälle lassen sich auch Ad-Hoc-Reports je nach Bedarf schnell und einfach erstellen.
Aber nicht nur Reports helfen einem Projekt- oder Portfoliomanager, sondern auch Portlets und Dashboards, die mit Real-Time-Daten einen ständig aktuellen Aufschluss über die momentane Situation geben.
In diesem Seminar wird anhand von Beispielen aufgezeigt werden, wie Reporting die Aufgaben in CA PPM unterstützt.
Hierbei werden wir auf folgende Themen eingehen:
•Best Practice Einsatz von Analyse-Portlets und deren Konfigurationsmöglichkeiten.
•Best Practice Einsatz von Standardreports
•Erstellen von eigenen Ad-Hoc-Reports mit Auswertung unserer eigenen konfigurierten Datenfelder
•Erstellmöglichkeit von eigenen Drill-Down-Reports über den Report-Designer
Wir freuen uns darauf, Ihnen als Abschluss unserer Seminarreihe „CA PPM in der Praxis“ das Thema Reporting darstellen zu können, welches alle bisherigen Themen vereint.
In this session, we'll will cover the state of the art of docker container security. We'll also take a look at the future of container security. You'll learn:
-When you should use containers versus virtual machines
-What platform you should run your containers on
-How to maintain container separation
-What content should comprise your containers
-What the state of content signing is
Do you want faster time to market, improved quality, strategic alignment between IT and the business, and predictable delivery of features that customers actually want?
The secret to preventing and overcoming common organizational roadblocks (unrealistic plans, too many priorities, lack of commitment, late delivery, finger pointing and blame) is Big Room Planning. Big Room Planning is real-time, collaborative release planning, where you identify risks early, untangle dependencies, and effectively scope your work so you can prioritize and deliver value faster. If you have multiple development teams collaborating on time-sensitive projects, join CA Agile Central Services Architect, Carolina Weibring, on Thursday, January 5, 10am PT / 1pm ET, to learn:
•Why you should care about Big Room Planning
•How big room planning works: who participates, what you do, and why it’s worthwhile
•How to break down departmental silos and increase cross-functional collaboration
Following the presentation, we will have ample time for Q&A.
Recognizing important patterns in data, as they occur in real time, is critical to today’s enterprises. With complex event processing (CEP), organizations can recognize, understand, and react to business events faster by processing large volumes of inbound data.
Many critical CEP workloads require solutions that tolerate the failure of one or more processing nodes, while easily scaling to handle growing workloads. They must process a high volume, velocity, and variety of inbound data, infer the context, and take appropriate action in real time while adhering to stringent availability and scalability service level agreements.
In this on demand webcast, you'll learn:
• How an in-memory data grid can become the distributed working memory of a CEP engine, allowing it to scale dynamically from 2 to 100s of nodes and handle failure scenarios
• How sharding and data affinity can be used to obtain extreme performance
• How a message queuing platform can be used to optimize the distribution of data to multiple CEP engines
• Which use-cases are well suited to high-availability CEP
AWS reliability has improved to the point that many customers do not proactively architect for rare AWS outages. But outages do occur. In this meet-up, we'll provide an overview of the AWS Global Infrastructure, and discuss the recent outage in the AWS Sydney region and how some customers avoided any downtime, while others were completely down.
- Understand concepts of AWS Regions, AWS Availability Zones (AZs), and AWS Edge Locations
- Understand best practices related to High Availability (HA) in AWS
- Learnings from recent Sydney outage
- Examples of Dev9 cloud implementations where AWS HA was essential.
Traditionally, business process management (BPM) programs have focused on standardization and continuous improvement— but programs that require discovery, modeling, and analysis can result in long lead times. And businesses can no longer tolerate long implementations as they need to react quickly to changing customer expectations.
Red Hat® JBoss® BPM Suite can be integrated into a MSA (Microservice Architecture) to support frequent deployments, multiple concurrent versions, and flexible scaling; enabling IT to respond more quickly to the needs of the business.
Watch this webcast to learn how to:
• Embed business processes in microservices
• Support business transformation with frequent process deployments
• Choreograph microservices without controlling them
• Use tracking processes to implement SLA (Service Level Agreement) management
• Discover processes from events in a microservice architecture
Penetration Testing has long been used to help prevent data breaches, to understand security weaknesses on your network and to test security controls. An important and required process for many organizations, penetration testing needs to be planned for carefully.
Join our penetration testing expert for a discussion on the latest trends and considerations before your next pen-test.
The ability to deliver more products and services to market, more quickly, is an imperative many companies now face. And they turn to tools and methodologies like containers, APIs, and microservices to do just that. But, tools can be short-lived. Modernization transcends software—it's a core competency that companies need to develop and foster in order to remain competitive now and in the future. Tune in to learn latest modernization trends and how they are accelerating better digital transformation and application development and management.
While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.
Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
Shawn Carolan’s lightning talk:
Iconic consumer products seem obvious in hindsight, but crafting a “products that counts” from a blank canvas is a challenging climb filled with pitfalls. Uber early investor, venture capitalist and recovering entrepreneur Shawn Carolan argues that you need to boil down a product’s core purpose to a single sentence in order to gauge demand, scope ambitions, attract investors, align teams, speed execution, hire employees and get customers faster.
Jonas Kaufman’s lightning talk:
Safe drinking water is the product that counts the most. But today, millions of people lack access to it. Serial entrepreneur and social activist Jonas Kaufman will share the disruptive approach he’s come up with to provide clean drinking water to millions of people. He’ll also discuss how easy it is to get involved.
SC Moatti’s lighning talk:
How do you go about creating mobile products used by billions of people? What are the new rules shaping the future of connected technology? Drawing from her work experience as an executive at places like Facebook, Nokia, and Opera Software, as well as extensive interviews with executives at mobile pioneers such as Airbnb, Pandora, and Uber, SC Moatti lays out the three rules that every mobile product needs to be successful.
The ability to deliver more products and services to market, more quickly, is an imperative many companies now face. And they turn to tools and methodologies like containers, APIs, and microservices to do just that. But, tools can be short-lived. Modernization transcends software—it's a core competency that companies need to develop and foster in order to remain competitive now and in the future.
In this 2-part webinar series, you’ll learn about 3 field-tested and proven patterns to jump-start and sustain a culture of continuous modernization.
In this webinar, you'll learn:
- 3 patterns to jump-start application modernization.
- How to assess the right approach for your business.
- Where and how to apply the latest advancements in application development like microservices, containers, and APIs to your application modernization efforts.
Containers, OpenStack, and Hadoop are three of the most talked about topics in the industry today. This session will highlight some of the hot topics related to the convergence of containers and OpenStack including projects Magnum, Kolla and Calico. Join us and learn about new communities and products including Open Container Initiative (OCI), Cloud Native Computing Foundation (CNCF), Cisco NFVI and Mantl/Shipped. This session will also feature a deep-dive on how Hadoop can be deployed on OpenStack with the Hadoop-as-a-Service (HaaS) Cisco Validated Designs (CVD).
With the increased speed of business and the transitory nature of apps and services, agility is paramount. To meet this need, successful organizations have turned to DevOps philosophies and solutions based on microservices architectures (MSAs).
Application programming interfaces (APIs) are crucial in every MSA (Microservice Architecture) to link the various microservices. Solutions based on MSAs and DevOps are effective, but bring some challenges. While microservices allow flexible, agile deployments, they can be harder to manage and can create complex scenarios.
Watch and learn:
• How to establish effective continuous integration and delivery pipelines using Red Hat® OpenShift, Docker, and Kubernetes.
• How to get security, control, and visibility of the microservice APIs using the 3scale by Red Hat API management platform and the 3scale nginx-based API gateway running on Docker.
To cope with business demand, servers must be built – which is a highly manual process that often lacks standardization. Join this webinar with CA Technologies’ internal IT team, as they discuss how CA Process Automation enables them to automation core infrastructure tasks, including server deployment, maintenance and retirement – and saved their team 20 hours a day of manual work.
You will learn:
How CA Technologies’ internal IT team saves time automating triage and remediation
How workflows can be easily adapted to detect issues quickly
How new servers are now deployed within a matter of minutes with standardized builds and security protocols
Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.
Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:
-The status of the two-factor authentication market and what we can expect in the years to come
-The enterprise risk issues of using social media credentials to access to corporate resources
-The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
-The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
Join our webinar to learn the many advantages of using Ext JS components with React, including how:
-You can build a data-intensive, cross-platform web app leveraging the Ext JS component library and React
-To manage data and respond to events using React while rendering UI controls using Ext JS with React's tag-based JSX syntax
-You can lower your project risk and accelerate time to market
The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
IATA estimates that by 2034 there will be 7.3 billion air passengers globally, which is twice more than what we have today. Alongside economic forces and passenger demands, pressure on the aviation and travel industry remains as intense as ever.
Since launching in 2009, flydubai has strived to remove barriers to travel and enhance connectivity between different cultures. With 90 destinations in 44 countries, flydubai has embarked on a digital transformation journey to help enhance business agility, flexibility and the customer experience. Connecting and integrating your SaaS platforms, APIs and application networks is critical in today's digital world, regardless of industry.
Join Mohammed Ahteshamuddin, Vice President IT – Customer Experience & Passenger Services System, flydubai, and Paul Crerand, Director Solution Consulting, MuleSoft, on Thursday, December 8 at 10am (GMT) for a live webinar as they share their story and best practices.
Tester les performances de ses applications est essentiel pour garantir une expérience utilisateur de qualité. Comment capitaliser sur vos patrimoines JMeter ou Selenium ? Comment tester depuis le Cloud (ou on-premise) et s’affranchir des infrastructures d’injection ? Comment tirer profit de l’intégration avec une solution APM afin de faciliter et d’accélérer l’analyse des problèmes de performance ?
Le 19 janvier, rejoignez Olivier Laplace, Presales Architecte DevOps chez CA Technologies, pour comprendre comment la solution CA BlazeMeter permet de simplifier l’exécution et l’analyse de vos tests de performance.
High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.
This webcast will explore the latest advances in RAN, including:
• Which technologies will see the earliest deployments?
• How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
• Will mmWave networks change the game in the last mile?
• How far will the industry advance in real deployments in the next year or two?
• Where are companies participating in this ecosystem investing their money?
• Are there concerns for Return on Investment (ROI) that companies are trying to resolve?
Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
Adam Drobot, Chairman, OpenTechWorks, Inc.
Steven Glapa, VP of Marketing, Tarana Wireless
Robert Azzi, Executive Managing Partner. Argyle Griffin Group (Moderator)
Enterprises and service provider customers have more storage, networking, and cloud technology choices at their disposal than ever before, and aggressive technology adopters will gain a performance and agility edge over their rivals in 2017. All Flash Arrays, Object Storage and Disaster Recovery to Cloud/Disaster Recovery as a Service are key technologies transforming the storage landscape. These new innovations account for a relatively small amount of storage revenue today, but will gradually displace traditional disk based storage systems, ultimately opening up opportunities for new innovators. The pace of change in networking technology provides the speed, capacity and agility demanded by cloud, IoT, social media, content delivery and the fabric that makes digital transformation possible.
Join Al Sadowski, Research Vice President for Infrastructure, as he dives into what’s accelerating the virtualization of network applications and how traditional vendors will need to transform their “innovation supply chain” to produce product equivalents to highly scalable cloud infrastructure.
What does “high availability” mean in practical terms? Join our free webinar detailing what it takes to make your Git deployment highly available, including some of the trade-offs to expect. If you’ve got questions, this webinar is your chance to get answer from our Senior Product Manager and resident expert Doug Robinson.
You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
Custom software development and business automation have historically provided 2 equal but distinct paths to bring high-quality products to market. Each has its own benefits and trade-offs. Business process management (BPM) and business rules management systems (BRMS) provide a lightweight, modular platform that can be tailored for your organizational structure and technical architecture.
Red Hat® Consulting offers a Business Automation Practice—a design model that combines the rigor and security of software development with the speed and accessibility of business automation technology. The result? Businesses can develop better products, more quickly and fully evolve with DevOps.
Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.
Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
Over the past 20+ years, IT has mastered the art of collecting performance and user data. But to succeed in today’s application economy, you need to learn how to take this information and evolve into a data-driven business. Your success hinges on ensuring that every customer experience is the best it can be, and that means gaining insight across the vast complexity of your mobile, web and application environments. In this session, learn how analytics can sort the wheat from the chaff in your performance data to highlight key business insights that will separate you from your competitors and gain you a seat in the boardroom.
The convergence of mobile, social, big data, and cloud has increased demands on applications to react instantaneously to changes in data at a large scale. A delay of a few seconds can mean the difference between engaging or losing a customer.
Application performance is highly correlated to how quickly an app can access and process a variety of data types. It's crucial that data platforms provide high performance as data changes, scales out linearly to handle large data sets, and maintains data integrity and security.
Watch this webcast to learn about the market and data trends driving the need for computing and in-memory storage.
The pay TV, VOD, and IPTV market is still evolving in terms of content and pricing models, but the demographics of Africa and its large population are highly attractive to existing and new market participants. Internet penetration, supplemented by a significant uptake in smartphone adoption, has altered the manner in which Africa consumes video content. This growth will be further augmented by the availability of cheaper DTT services, data-saving video consumption options, and attractively packaged triple-play services. It is critical for market participants to gauge market trends, price sensitivity and growth opportunities while offering their services. Along with pricing and richness of content, strategic partnerships will play a key role in defining the market leader in the next five years.
The importance of facing, understanding, predicting and even mitigating uncertainty has been well acknowledged and studied in various fields such as philosophy, physics and finance. In terms of software and system engineering, due to the increasing complex of large-scale systems themselves, and the dynamic and unpredictable deployment and operation environments of such systems, increasing attentions have been given to address challenges of explicitly specifying and modeling uncertainty.
Uncertainty Modeling (UM) aims to promote and enable explicit specifications of uncertainty and uncertainty related concepts, at various contexts (e.g., developing large-scale Cyber-Physical Systems and Internet of Things, for different purposes (e.g., enabling uncertainty-wise requirements specifications, modeling, verification and validation, e.g., facilitating the definition of uncertainty-wise testing strategies), and at different phases of the development of such complex and uncertainty-inherent systems (e.g., requirements, architecture, design, testing and operation).
In the context of OMG, we see a diverse set of uncertainty modeling applications, such as 1) integrating with UML use cases, SysML Requirements Diagram, to enable requirements V&V, 2) capturing uncertainty as part of SysML or UML models to facilitate design and/or testing, 3) integrating with BPMN and other OMG standards to facilitate different kinds of analyses and generations.
OMG’s Uncertainty Modeling Request for Information (RFI) is currently open for responses. The RFI aims to solicit ideas, discussions, comments, recommendations, user needs and experiences about uncertainty modeling. Collected responses will be carefully analyzed and will be used to identify requirements, based on an RFP for an UM will be developed. Instructions for responding to this RFI are specified in the OMG Uncertainty Modeling Request for Information document (ad/16-09-02 (Uncertainty RFI)).
We invite you to join the conversation.
Synopsys, Inc. recently released Coverity 8.7, the latest version of the company's industry-leading static analysis tool and one of the core components of its Software Integrity Platform.
This webinar presents several imporant updates to enhance its security analysis and extend its utility to a broader audience, including organizations developing web and mobile applications and software systems for vehicles and other safety-critical systems.
- Enhances Android security analysis to detect critical vulnerabilities and weaknesses on the OWASP Top 10
- Expands desktop analysis with Integrated Development Environment (IDE) plugins for mobile and web application security testing
Web applications are becoming increasingly data-intensive and complex while users demand a great user experience, including blazingly fast speeds, across many device types.
In this webinar, we will show front-end and back-end developers how to dramatically improve the performance of your web applications by using Sencha Ext JS and Ext Speeder. See Extremely Heavy Industries (xh.io) demonstrate a sophisticated visualization app as it fluently analyzes millions of rows in real-time.
Join us and you will learn how to:
- Significantly improve application responsiveness without making any modifications to your front-end Ext JS application
- Accelerate your back-end data requests up to 10x by leveraging sophisticated in-memory, object-oriented techniques
- Quickly get started with database acceleration in standard J2EE environments
It takes more than Superman or his Justice League to develop and maintain an effective app monetization strategy. This is especially true in light of a recent report which found that 0.19 percent of all mobile game players contributed 48 percent of revenue. How can one identify the high-spend users while not alienating the remaining percentage that only have potential to spend within the app?
Ideally, one would customize app strategy according to type of user. Better still, each user would have her own strategy. Unfortunately this isn't a scalable solution to monetization.
In this webinar, you'll learn to:
* Customize your monetization strategy so that it's scalable
* Unlock the revenue potential of lower spending users
* Attract higher-spend users
* Negotiate monetization strategies without alienating current users
* Maximo Cavazzani, founder and CEO, Etermax (Trivia Crack)
* Eric Shashoua, CEO, Kiwi for Gmail
* Stewart Rogers, Director of Technology, VentureBeat
* Wendy Schuchart, Analyst, VentureBeat
Harnessing the Power of Agile at Scale with Big Room Planning
Many organisations are already using agile methodologies like Scrum, but largely at an individual team level.
But how do you ensure correlation and coordination between different agile teams? How do you ensure alignment between business strategy and execution level? And how do you provide business stakeholders with visibility to track the progress of ongoing projects and programmes – traditional and agile?
The secret to succeeding with Enterprise Scale Agile is Big Room Planning; real-time collaboration, where teams identify risks early, untangle dependencies, and effectively plan their work aligned to business priorities and customer needs.
In this webinar, Jonas Högstrand and Andrew Sales, will discuss:
•What benefits organisations can achieve with greater levels of business agility
•Why Big Room Planning is a core activity for succeeding with agile at scale and the agile behaviours it drives
•How Big Room Planning works, who participates, what you do and why it’s worthwhile
•How CA Agile Central supports Big Room Planning and provides visibility to track and steer the plans that are created
Learn how to achieve faster time to market, improved quality, strategic alignment between IT and the business, and predictable delivery of features that delight customers.