Join thousands of engaged IT professionals in the application management community on BrightTALK. Interact with your peers in relevant webinars and videos on the latest trends and best practices for application lifecycle management, application performance management and application development.
You want to evolve your application development strategies to benefit from DevOps processes, cloud and container platforms, and microservices architectures. However, if you've built your core application infrastructure around traditional Java™ EE development approaches, the path forward might not be so clear.
Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) 7 allows you to re-imagine your Java applications and take full advantage of these new application approaches.
In this webcast you’ll learn:
• Trends and priorities in application development today
• What’s new with JBoss EAP 7
• How to move your Java EE applications into the cloud with Red Hat OpenShift Container Platform
Join independent analyst and blogger, Gabe Knuth, as he discusses the current state of storage, how we got there and the benefits of flash storage with the VP and Chief Architect at Pure Storage, Vaughn Stewart. Tune in now and learn what sets one storage vendor apart from its competitors.
Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.
Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
·The changing landscape of regulations and consumer behavior
·Technology transformations and new innovations that will influence the way you prepare for 2017
Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats?
Join this session with Scott Crawford, Research Director for Information Security, to find out why 451 Research has rated all 6 of 2017’s key security trends as “high impact.”
Organizations are frequently tempted to modify and adapt their Agile approaches as they become more experienced. As they then try and expand Agile use into other areas, or as they look for ways to integrate Agile and traditional project execution approaches they realize they are facing some unintended consequences. Join Andy Jordan, ProjectManagement.com as he discusses how best to look at options for enhancing or modifying Agile at your organization and how to ensure you aren’t causing future problems.
This session is approved for 1 Project Management Institute (PMI) PMP Credit.
Traditionally, test data management has involved copying, masking, and subsetting production data. While masking data does offer production-like data, it’s also slow, complex, and often error-prone, increasing the risk of sensitive information making it to less secure test environments.
View this event to discover how synthetic data generation can create realistic test data that contains no sensitive information. What’s more, this test data will contain the negative paths, future scenarios, and outliers not typically found in production, providing the data needed to maximize test coverage.
You will also learn:
-The drawbacks of using production data in testing, from compliance to provisioning time and quality
-How data visualization can be used to identify any data missing from production needed for rigorous testing
-How masking can be combined with synthetic data generation to plug any gaps in test data
When disaster strikes, your number one priority is fast recovery. But trying to determine the root cause of the problem can be a time consuming, manual process. Join this webinar with CA Technologies’ internal IT team, as they discuss how automation has helped them save time with disaster recovery through consistent, predicable processes – and enabled them to get up and running again seamlessly.
You will learn:
How to save money and time from outages – even when the worst happens
•How to shift your focus from manual problem solving to fast recovery through automation and repeatable processes
•How keeping an audit trail prevented the team from making the same mistakes in the future
Agile is here to stay, waterfall’s not going away anytime soon, and more and more organizations are creating hybrid project execution models that combine both. What does that mean at the portfolio level? If you’re struggling to manage a portfolio of different project approaches, if you have executives looking for common reporting metrics, or if you have frustrated project teams, this webcast is for you. Join PPM expert Andy Jordan as he explains:
•Value based reporting that ignores the project execution approach
•The importance of flexibility in portfolio planning and delivery
•The need to create an environment that supports both Agile and waterfall
•Some simple steps you can take today to improve hybrid portfolios
The future of portfolio management will include both Agile and waterfall, unless you’ve mastered them both you need to attend this webinar.
We’ve been counting, measuring, assessing and reallocating IT assets since time began, or at least since IT time began. Now that we’ve moved into a world where Service Management is foundational to IT Asset Management (ITAM), do we still have to employ the resources (time, people, tools, etc.) involved in ITAM? After all, isn’t Configuration Management the same thing, only better? Do I need both disciplines? Isn’t ITAM really a function of Finance or Audit? As an ITAM professional, should I be worrying about my future employment prospects? Join George Spalding, EVP from Pink Elephant as he ponders the answers to these questions.
Spreadsheet Integration is a necessity when it comes to easily and efficiently getting your business data into Oracle EBS and maintaining it in the long term. It is overwhelming when you start researching the options to know when it is appropriate to use tools such as SQL*Loader, Dataloader, WebADI, More4Apps AIW (Application Interface Wizard) or alternatively a prebuilt end user solution.
Join our technical expert Carlos Urtubia as he discusses the advantages and disadvantages of each of these options.
Just a few years ago, The Coca-Cola Company (TCCC) was completely on-premises, looking for a way to move toward their cloud-first strategy. Watch TCCC’s presentation from MuleSoft’s Atlanta Summit to learn Coke’s journey with MuleSoft starting from evaluation to how they are currently taking an API-led approach to integration. With this, Coke is now creating great customer experiences and enabling their sales force to continue to lead through innovation.
Attendees will learn how TCCC is using MuleSoft to:
Implement a microservices architecture
Automate release management to accelerate time to production
Move from a COE to a Center for Enablement (C4E) to maximize reuse
Get a glimpse of the future of Persistent Memory - it's NOW! Join SNIA NVDIMM Special Interest Group in another in our series of webcasts on the NVDIMM Cookbook - how to incorporate NVDIMM into your systems and what non-volatile DIMM applications now available. We'll even highlight some of the "knobs" to turn to optimize use of NVDIMM in your applications to ease the way to simple, plug-n-play adoption!
Datacenters are at the core of the Digital Transformation revolution. Operators are increasingly adopting new technologies and techniques to ensure they remain relevant and competitive in the new world of IT. Pacesetters are driving efficiency, agility and connectivity, while automation, rackscale architectures, cloud-based analytics and distributed resiliency are also evolving rapidly.
Join Andy Lawrence, Research Vice President for Datacenters, to examine how these evolving datacenter technologies will shape the market and competitive landscape in 2017.
Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.
In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
Im Projektmanagement gehört ein regelmäßiges Reporting zum Tagesgeschäft. Durch den Einsatz von vorgefertigten Reports lassen sich im täglichen Projektmanagementgeschäft erhebliche Zeiteinsparungen erzielen.
In CA PPM finden sich eine Vielzahl von fertigen Reports zu den Themen Projekte, Ideen, Ressourcen, Finanzen, Portfolios, usw. Für Sonderfälle lassen sich auch Ad-Hoc-Reports je nach Bedarf schnell und einfach erstellen.
Aber nicht nur Reports helfen einem Projekt- oder Portfoliomanager, sondern auch Portlets und Dashboards, die mit Real-Time-Daten einen ständig aktuellen Aufschluss über die momentane Situation geben.
In diesem Seminar wird anhand von Beispielen aufgezeigt werden, wie Reporting die Aufgaben in CA PPM unterstützt.
Hierbei werden wir auf folgende Themen eingehen:
•Best Practice Einsatz von Analyse-Portlets und deren Konfigurationsmöglichkeiten.
•Best Practice Einsatz von Standardreports
•Erstellen von eigenen Ad-Hoc-Reports mit Auswertung unserer eigenen konfigurierten Datenfelder
•Erstellmöglichkeit von eigenen Drill-Down-Reports über den Report-Designer
Wir freuen uns darauf, Ihnen als Abschluss unserer Seminarreihe „CA PPM in der Praxis“ das Thema Reporting darstellen zu können, welches alle bisherigen Themen vereint.
In this session, we'll will cover the state of the art of docker container security. We'll also take a look at the future of container security. You'll learn:
-When you should use containers versus virtual machines
-What platform you should run your containers on
-How to maintain container separation
-What content should comprise your containers
-What the state of content signing is
Do you want faster time to market, improved quality, strategic alignment between IT and the business, and predictable delivery of features that customers actually want?
The secret to preventing and overcoming common organizational roadblocks (unrealistic plans, too many priorities, lack of commitment, late delivery, finger pointing and blame) is Big Room Planning. Big Room Planning is real-time, collaborative release planning, where you identify risks early, untangle dependencies, and effectively scope your work so you can prioritize and deliver value faster. If you have multiple development teams collaborating on time-sensitive projects, join CA Agile Central Services Architect, Carolina Weibring, on Thursday, January 5, 10am PT / 1pm ET, to learn:
•Why you should care about Big Room Planning
•How big room planning works: who participates, what you do, and why it’s worthwhile
•How to break down departmental silos and increase cross-functional collaboration
Following the presentation, we will have ample time for Q&A.
Recognizing important patterns in data, as they occur in real time, is critical to today’s enterprises. With complex event processing (CEP), organizations can recognize, understand, and react to business events faster by processing large volumes of inbound data.
Many critical CEP workloads require solutions that tolerate the failure of one or more processing nodes, while easily scaling to handle growing workloads. They must process a high volume, velocity, and variety of inbound data, infer the context, and take appropriate action in real time while adhering to stringent availability and scalability service level agreements.
In this on demand webcast, you'll learn:
• How an in-memory data grid can become the distributed working memory of a CEP engine, allowing it to scale dynamically from 2 to 100s of nodes and handle failure scenarios
• How sharding and data affinity can be used to obtain extreme performance
• How a message queuing platform can be used to optimize the distribution of data to multiple CEP engines
• Which use-cases are well suited to high-availability CEP
Traditionally, business process management (BPM) programs have focused on standardization and continuous improvement— but programs that require discovery, modeling, and analysis can result in long lead times. And businesses can no longer tolerate long implementations as they need to react quickly to changing customer expectations.
Red Hat® JBoss® BPM Suite can be integrated into a MSA (Microservice Architecture) to support frequent deployments, multiple concurrent versions, and flexible scaling; enabling IT to respond more quickly to the needs of the business.
Watch this webcast to learn how to:
• Embed business processes in microservices
• Support business transformation with frequent process deployments
• Choreograph microservices without controlling them
• Use tracking processes to implement SLA (Service Level Agreement) management
• Discover processes from events in a microservice architecture
Penetration Testing has long been used to help prevent data breaches, to understand security weaknesses on your network and to test security controls. An important and required process for many organizations, penetration testing needs to be planned for carefully.
Join our penetration testing expert for a discussion on the latest trends and considerations before your next pen-test.
Mobility in 2017 is all about 5G, which is not just another “G” – its scope is far larger. Previous G’s focused on increasing bandwidth and latency to support Mobile Internet consumption patterns accelerated by universal adoption of smart devices. The revolutionary attributes of 5G converge the latest innovations in network, cloud, and devices in a way that has never been done before. 5G’s impact will be far reaching across industries generating massive value not possible in previous technology shifts. Ultra-broadband communication and computing power will combine and extend across networks and devices such that information and computing power will be instantaneously available.
Join Brian Partridge, Research Vice President for Mobility, as he explores how this will catalyze a wave of innovation in applications, services and functions built to run on the new 5G infrastructure.
Containers, OpenStack, and Hadoop are three of the most talked about topics in the industry today. This session will highlight some of the hot topics related to the convergence of containers and OpenStack including projects Magnum, Kolla and Calico. Join us and learn about new communities and products including Open Container Initiative (OCI), Cloud Native Computing Foundation (CNCF), Cisco NFVI and Mantl/Shipped. This session will also feature a deep-dive on how Hadoop can be deployed on OpenStack with the Hadoop-as-a-Service (HaaS) Cisco Validated Designs (CVD).
With the increased speed of business and the transitory nature of apps and services, agility is paramount. To meet this need, successful organizations have turned to DevOps philosophies and solutions based on microservices architectures (MSAs).
Application programming interfaces (APIs) are crucial in every MSA (Microservice Architecture) to link the various microservices. Solutions based on MSAs and DevOps are effective, but bring some challenges. While microservices allow flexible, agile deployments, they can be harder to manage and can create complex scenarios.
Watch and learn:
• How to establish effective continuous integration and delivery pipelines using Red Hat® OpenShift, Docker, and Kubernetes.
• How to get security, control, and visibility of the microservice APIs using the 3scale by Red Hat API management platform and the 3scale nginx-based API gateway running on Docker.
To cope with business demand, servers must be built – which is a highly manual process that often lacks standardization. Join this webinar with CA Technologies’ internal IT team, as they discuss how CA Process Automation enables them to automation core infrastructure tasks, including server deployment, maintenance and retirement – and saved their team 20 hours a day of manual work.
You will learn:
How CA Technologies’ internal IT team saves time automating triage and remediation
How workflows can be easily adapted to detect issues quickly
How new servers are now deployed within a matter of minutes with standardized builds and security protocols
The next wave of cloud computing is coming, and it is going to take the shape of serving distinct enterprise needs in an on-demand fashion. It is normal for enterprise IT departments to provision or procure IaaS, PaaS or SaaS services now. That in turn means that a larger galaxy of business needs and operational complexities will be tackled as the next way to monetize cloud infrastructure. The trickle of specialized providers doing boutique services such as disaster recovery as a service, compliance as a service and database as a service could well become a flood.
Join Kelly Morgan, Research Vice President for Services as she uncovers what service providers will need to change in order to gain a competitive advantage in 2017, and what the sources of demand for multi-tenant datacenters will be in the coming year.
Join our webinar to learn the many advantages of using Ext JS components with React, including how:
-You can build a data-intensive, cross-platform web app leveraging the Ext JS component library and React
-To manage data and respond to events using React while rendering UI controls using Ext JS with React's tag-based JSX syntax
-You can lower your project risk and accelerate time to market
Whether they are ready for it or not, IT Operations teams have the Internet of Things, including BYOD devices such as smart watches, added to their list of responsibilities. With employees bringing in potentially compromised devices, it's time for enterprise IT to understand their environment and not just tick the compliance box. On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence. A new monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents! Tune in for a technical deep-dive into the network impact of IoT, how to make the most of your data from connected devices, and how to mitigate potential security and threat risks involved.
The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
IATA estimates that by 2034 there will be 7.3 billion air passengers globally, which is twice more than what we have today. Alongside economic forces and passenger demands, pressure on the aviation and travel industry remains as intense as ever.
Since launching in 2009, flydubai has strived to remove barriers to travel and enhance connectivity between different cultures. With 90 destinations in 44 countries, flydubai has embarked on a digital transformation journey to help enhance business agility, flexibility and the customer experience. Connecting and integrating your SaaS platforms, APIs and application networks is critical in today's digital world, regardless of industry.
Join Mohammed Ahteshamuddin, Vice President IT – Customer Experience & Passenger Services System, flydubai, and Paul Crerand, Director Solution Consulting, MuleSoft, on Thursday, December 8 at 10am (GMT) for a live webinar as they share their story and best practices.
Increase security effectiveness and maintain dev agility
Three certainties in 2017: organizations worldwide will continue to increase their use of open source software; new open source security vulnerabilities will be discovered; exploits of open source vulnerabilities will occur.
With dev teams under constant pressure to accelerate application delivery and with security resources often scarce, organizations need more effective ways to determine which open source vulnerabilities to fix first and the options available to reduce risk during remediation.
Join Black Duck VP of Security Strategy Mike Pittenger as he discusses strategies and emerging best practices for risk-ranking open source vulnerabilities. He will cover:
- the most important considerations in prioritizing open source security issues
- ways to determine the risk associated with a discovered open source vulnerability
- options for dealing with open source security vulnerabilities beyond simply replacing the component
High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.
This webcast will explore the latest advances in RAN, including:
• Which technologies will see the earliest deployments?
• How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
• Will mmWave networks change the game in the last mile?
• How far will the industry advance in real deployments in the next year or two?
• Where are companies participating in this ecosystem investing their money?
• Are there concerns for Return on Investment (ROI) that companies are trying to resolve?
Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
Adam Drobot, Chairman, OpenTechWorks, Inc.
Steven Glapa, VP of Marketing, Tarana Wireless
Robert Azzi, Executive Managing Partner. Argyle Griffin Group (Moderator)
Enterprises and service provider customers have more storage, networking, and cloud technology choices at their disposal than ever before, and aggressive technology adopters will gain a performance and agility edge over their rivals in 2017. All Flash Arrays, Object Storage and Disaster Recovery to Cloud/Disaster Recovery as a Service are key technologies transforming the storage landscape. These new innovations account for a relatively small amount of storage revenue today, but will gradually displace traditional disk based storage systems, ultimately opening up opportunities for new innovators. The pace of change in networking technology provides the speed, capacity and agility demanded by cloud, IoT, social media, content delivery and the fabric that makes digital transformation possible.
Join Al Sadowski, Research Vice President for Infrastructure, as he dives into what’s accelerating the virtualization of network applications and how traditional vendors will need to transform their “innovation supply chain” to produce product equivalents to highly scalable cloud infrastructure.
Dealing with server management is often very different from managing client devices in the enterprise. In this session we will demonstrate some of the tools and solutions we use to successfully manage servers in the enterprise. We will also discuss how you can integrate Flexera Software's Corporate Software Inspector into your enterprise client management strategy.
You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
Custom software development and business automation have historically provided 2 equal but distinct paths to bring high-quality products to market. Each has its own benefits and trade-offs. Business process management (BPM) and business rules management systems (BRMS) provide a lightweight, modular platform that can be tailored for your organizational structure and technical architecture.
Red Hat® Consulting offers a Business Automation Practice—a design model that combines the rigor and security of software development with the speed and accessibility of business automation technology. The result? Businesses can develop better products, more quickly and fully evolve with DevOps.
Advancements in infrastructure and platform technologies with growing availability of innovative business models has inclined the focus on user-centric service delivery mechanisms by redefining the very nature of IT strategy within a business organization. Companies that wish to pave the way for a successful digital transformation journey must shed conventional thinking and embrace towards an agile approach to IT operations and have a reliable and intelligent Ecosystem. So, to start with, we ask ourselves How and What should we look for in a partner?
When a manufacturer wants a Wifi Module for the next generation of smart phone, the design engineers turn to Mouser Electronics to find the exact module they need. As a worldwide, leading authorized distributor of electronic components and semiconductors, Mouser specializes in the rapid introduction of new products and technologies for more than 600 manufacturers.
With neither Inside Sales nor Outside Sales teams, new customers discover Mouser through the detailed product pages on the many country specific websites. Most sales are completed online and with 7 million active products and information on 14 million obsolete/unavailable products. Mouser.com serves as a primary reference for anyone designing a circuit. Mouser’s product data is a critical differentiator and is elemental to Mouser’s growth and success in providing engineers and buyers with product data that is highly searchable, complete, and accurate.
Join this webinar to hear Hayne Shumate, SVP of Internet Business from Mouser Electronics, Matt Weinke of Infoverity, and Prash Chandramohan of Informatica share:
-Product information management (PIM) requirements that help Mouser sustain 20% annual growth
-How Mouser uses Informatica MDM Product 360 to maintain high-quality, detailed electronics data so that customers can quickly find, select and buy the components that meet their specifications
-Best practices from Infoverity and their Quickstart framework that helps companies like Mouser start small and scale with their PIM implementations
-Lessons learned from this experience, and the next steps in Mouser’s PIM journey
Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.
Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
Over the past 20+ years, IT has mastered the art of collecting performance and user data. But to succeed in today’s application economy, you need to learn how to take this information and evolve into a data-driven business. Your success hinges on ensuring that every customer experience is the best it can be, and that means gaining insight across the vast complexity of your mobile, web and application environments. In this session, learn how analytics can sort the wheat from the chaff in your performance data to highlight key business insights that will separate you from your competitors and gain you a seat in the boardroom.
The convergence of mobile, social, big data, and cloud has increased demands on applications to react instantaneously to changes in data at a large scale. A delay of a few seconds can mean the difference between engaging or losing a customer.
Application performance is highly correlated to how quickly an app can access and process a variety of data types. It's crucial that data platforms provide high performance as data changes, scales out linearly to handle large data sets, and maintains data integrity and security.
Watch this webcast to learn about the market and data trends driving the need for computing and in-memory storage.
The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
The importance of facing, understanding, predicting and even mitigating uncertainty has been well acknowledged and studied in various fields such as philosophy, physics and finance. In terms of software and system engineering, due to the increasing complex of large-scale systems themselves, and the dynamic and unpredictable deployment and operation environments of such systems, increasing attentions have been given to address challenges of explicitly specifying and modeling uncertainty.
Uncertainty Modeling (UM) aims to promote and enable explicit specifications of uncertainty and uncertainty related concepts, at various contexts (e.g., developing large-scale Cyber-Physical Systems and Internet of Things, for different purposes (e.g., enabling uncertainty-wise requirements specifications, modeling, verification and validation, e.g., facilitating the definition of uncertainty-wise testing strategies), and at different phases of the development of such complex and uncertainty-inherent systems (e.g., requirements, architecture, design, testing and operation).
In the context of OMG, we see a diverse set of uncertainty modeling applications, such as 1) integrating with UML use cases, SysML Requirements Diagram, to enable requirements V&V, 2) capturing uncertainty as part of SysML or UML models to facilitate design and/or testing, 3) integrating with BPMN and other OMG standards to facilitate different kinds of analyses and generations.
OMG’s Uncertainty Modeling Request for Information (RFI) is currently open for responses. The RFI aims to solicit ideas, discussions, comments, recommendations, user needs and experiences about uncertainty modeling. Collected responses will be carefully analyzed and will be used to identify requirements, based on an RFP for an UM will be developed. Instructions for responding to this RFI are specified in the OMG Uncertainty Modeling Request for Information document (ad/16-09-02 (Uncertainty RFI)).
We invite you to join the conversation.