Hi {{ session.user.profile.firstName }}

Managing Knowledge and Empowering Users in ITSM

Recorded Oct 10 2013 48 mins
Presented by
Chuck Darst, HP IT Service Portfolio Management; Susan Merriman, HP Software Professional Services
Presentation preview: Managing Knowledge and Empowering Users in ITSM
Recommended for you:
  • Date
  • Rating
  • Views
  • How good are your current test cases? How much coverage do they provide, and how do you know? And do your testers have the data they need, when they need it?

    In this webcast, we will discuss ways to:
    •create the optimum set of test cases, by importing requirements and existing tests from HP ALM, turning them into crystal clear requirements using visual flow charts and related tools
    •find or synthetically create the right test data, linking them with expected results and directly to each test cases
    •automate test execution where tests are automatically updated each time the requirements change, so you can eliminate testing bottlenecks.

    Learn how you can optimize your HP ALM investment - with the smallest test cases for maximum coverage, and with the right test data - to get you on your way to a faster, better delivery of high quality applications to market.
  • Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
  • What does “high availability” mean in practical terms? This webinar will detail what it takes to make your Subversion deployment highly available, including what you’ll need and some of the trade-offs to expect.
  • Hygienic design, regulations & compliances are increasing dramatically in the Food & Beverage market. Consequently, the questions raised are: how can you ensure food safety? How does Hygienic Design support the cleanability & Total Cost of Ownership of your plant? And with a practical example: What does a perfect flowmeter for liquids look like?

    As well as speakers from Bürkert, this webinar features presentations from Hein Timmerman of Diversey-Sealed Air & Patrick Wouters of Cargill. Both are members of the European Hygienic Engineering & Design Group, EHEDG.

    Patrick will discuss Cargill’s overall goal to provide high quality, safe food, every time, everywhere; to this end, hygienic design is an important pre-requisite. This accounts for the choice of flow meters. Although hygienic design is a critical element, it is more important to have a correct measurement of the flow. This control point is of utmost importance, to ensure that specified functionality is achieved & food safety & product quality is ensured.

    Hein will discuss Sealed Air’s Value Added Services on cleaning applications & cleaning validations, which includes remote monitoring tools & software platforms to support their end customers’ requirements for food safety & Total Cost of Ownership.

    Bürkert’s John van Loon will discuss their new technology, FLOWave. This answers the hygiene issues other systems could face, by employing surface acoustic waves in a stainless steel tube. As such FLOWave allows a flow measurement of liquids without any parts within the tube. Current methods in industrial flow measurement are mainly based on moving parts like paddle wheels or rigid fixtures such as a bluff body in the measurement tube. These flow metering systems have their specific weaknesses, limiting their range of applications. The measuring task must be fulfilled, reliably, throughout the entire life cycle of the device. Also, the daily operative handling effort should remain within reasonable limits.
  • In 2011 Mark Andreessen stated “software is eating the world." Fast-forward to 2015, and it’s mobility eating the world. Today's mobile applications ignite business innovation and customer engagement. Success means transforming IT while engaging the business in mobile. Join HP software ADM, and see the latest App Delivery Management innovations. Explore a fast path to mobile software innovation and time to market. Learn how to deliver amazing mobile apps with confidence now.
  • Last year, hackers targeted retail companies and their POS systems to steal vast amounts of credit card and financial data. This year, things have changed as cyber criminals are now going after identities, making data breaches much more personal. While credit cards can be easily replaced, personal identities cannot. This webinar looks at the major data breach trends in 2015. Who is doing the hacking, how they are doing it, and what industries are being targeted most. In addition, listeners can get a new understanding of how to approach to data security and “Secure the Breach”.
  • The SAP HANA Cloud Platform is a platform-as-a-service offering that allows SAP’s partners to build, deploy and operate applications in an open and standards-based cloud environment.. It is an in-memory cloud platform especially designed for today’s increasingly networked, mobile, social, and data-driven world.

    In this session we will outline the market opportunity for partners in SAP’s Financial Services industries, describe how to get started with the SAP HANA Cloud Platform and answer participants’ questions.

    •SAP HANA Cloud Platform Overview
    •Market opportunity
    •Use cases for Financial Services
    •How to get started
  • De plus en plus d’entreprises se lancent dans un vaste projet de migration de leurs applications et services dans le Cloud. Mais ces applications qui étaient auparavant protégées on-premise sont maintenant exposées aux menaces sur internet.
    Pour autant, il n’est pas opportun de remettre en question la pertinences de ces projets, il faut être capable de proposer le même niveau de sécurité, que l’application soit on-premise ou dans le Cloud.
    Le 6 octobre 2015 à 11h00, rejoignez Nicolas Massé, Senior Consultant chez CA Technologies, pour découvrir comment l'offre Sécurité & API de CA peut aider votre entreprise à accompagner ses projets de migration tout en assurant une sécurité optimale.
  • Learn how to take control of your data by using advanced encryption, centralized key management and cutting edge access controls and policies. In this session, Imam Sheikh, Dir. Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager will discuss how to proactively address PCI Compliance in the cloud, protect intellectual property and comply with data privacy and system integrity regulations. Join this informative webinar to learn about HOSTING and Vormetric data encryption security solutions and best practices that have helped leading Fortune 500 businesses protect their sensitive data across their private, public and hybrid cloud environments!

    What you'll learn:
    • How data encryption helps prevent data breaches
    • How to address PCI compliance requirements in the cloud
    • How to safeguard cardholder information that is stored in a variety of different databases and versions
    • The HOSTING and Vormetric approach to securing data in motion and at rest
  • See how CA manages and monitors our own CA SAP environment

    SAP applications and the business processes they enable often represent the very core of your business. Customers, partners, and employees expect availability, responsiveness and secure access, while the CEO expects that budget objectives will be met and efficiencies exploited to improve the bottom line. CA Technologies provides a robust portfolio of SAP certified IT management solutions which help reduce the cost and risk associated with delivering your SAP enabled business processes, while helping to enable the service levels needed for more optimal business operations.

    In this session you’ll learn:
    • The business drivers, technical challenges and importance of SAP in the daily works of CA
    • How CA manages its own SAP implementation with CA APM solutions

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Managing Knowledge and Empowering Users in ITSM
  • Live at: Oct 10 2013 1:00 pm
  • Presented by: Chuck Darst, HP IT Service Portfolio Management; Susan Merriman, HP Software Professional Services
  • From:
Your email has been sent.
or close
You must be logged in to email this