CA, Inc., formerly Computer Associates International, Inc., is one of the largest independent software corporations in the world. CA for short, is an American, multinational, publicly held company headquartered in New York, New York. The company creates systems software that runs in mainframe, distributed computing, virtual machine and cloud computing environments.Although the company once sold anti-virus and Internet security commercial software programs for personal computers during its venture into the business-to-consumer market, it remains primarily known for its business-to-business mainframe and distributed information technology infrastructure applications since the spin off of their security products into Total Defense. CA Technologies claims that its computer software products are used by a majority of the Forbes Global 2,000 companies.CA Technologies posted $4.4 billion in revenue for fiscal year 2010 and maintains 100 offices in more than 45 countries. The company employs 13,200 people , including 5,900 engineers in software development. CA holds more than 400 patents worldwide, and has more than 700 patent applications pending.In 2010 the company acquired eight companies to support its Cloud strategy: 3Tera, Nimsoft, NetQoS, Oblicore, Cassatt, 4Base Technology, Arcot Systems, and Hyperformix. Wikipedia.
News Article | May 10, 2017
Scaled Agile, Inc. (SAI), provider of SAFe®, the world’s leading framework for enterprise agility, today announced the induction of four new Fellows into the SAFe Fellow program: Mark Richards, Em Campbell-Pretty, Eric Willeke, and Harry Koehnemann, Ph.D. The SAFe Fellow achievement is Scaled Agile’s most prestigious distinction, recognizing individuals who have exhibited the highest level of mastery and thought leadership in the practice of SAFe. The four inductees have met the SAFe Fellow requirements based on their ongoing contribution to the evolution of the Framework, their demonstrated success in a broad range of implementations, and their willingness to share their expertise publicly through writing and speaking. “The SAFe Fellow program represents the ultimate achievement for those looking to advance Lean-Agile methods at enterprise scale with SAFe,” says Dean Leffingwell, creator of SAFe and Chief Methodologist. “If we are in a challenging situation—whether puzzling over the next generation framework or struggling to optimize a SAFe implementation—the Fellows are the folks we turn to.” Achieving SAFe Fellow status is a journey that requires years of practice and contribution. Prospective SAFe Fellows must be nominated by two existing Fellows, reviewed by all existing Fellows, and then finalized by the SAFe Fellow Nomination Committee. “With over 70 percent of US Fortune 100 enterprises adopting SAFe practices, and nearly 120,000 individuals trained and certified, the demand for high-level expertise and thought leadership has been enormous,” says Drew Jemilo, cofounder of Scaled Agile and SAFe Fellow Program Director. “The SAFe Fellow program is a key aspect of our enterprise enablement strategy, especially when it comes to supporting enterprises tackling highly complex and challenging implementations.” Scaled Agile is pleased to welcome the newest members of the program: —Mark Richards, SPCT, Partner, Context Matters Richards has been involved with SAFe since its inception, with a demonstrated commitment to remaining on the leading edge of the Agile Release Train (ART). He coached Australia’s first SAFe implementation at Telstra and has enabled successful implementations across the federal government, telecommunications, finance, insurance, and education industries. A prolific blogger (The Art of SAFe), Richards is also the developer of the widely used SAFe City simulation and has contributed to a number of areas of the Framework, most recently in the areas of metrics for SAFe and the ART Canvas in the SAFe Implementation Roadmap. —Em Campbell-Pretty, SPCT, Partner, Context Matters International speaker, avid blogger (prettyagile.com), and author of the book, "Tribal Unity," Campbell-Pretty has led transformations for public and private companies like RMIT University, Westpac, the Australian Taxation Office, ANZ, and Telstra, where she launched Australia’s first Agile Release Train. Her work has influenced the development of the Program Kanban system and fueled numerous SAFe case studies. —Eric Willeke, SPCT, Advisor, Enterprise Agility, CA Technologies A contributor to the Framework, Willeke has worked with a broad range of Fortune 500 companies, thousands of practitioners, and key leaders in the technology, media, insurance, financial services, and healthcare industries. His personal vision—to “help everybody on a project sleep better at night”—has shaped his passion for continuous improvement and unlocking human potential. Willeke has served on the program committee for the Agile 201x conference series and was the lead editor for the Proceedings of the Lean Software and Systems Conference (LSSC) series. —Harry Koehnemann, Ph.D., SPCT, Director of Technology, 321 Gang, Inc. Koehnemann helps organizations in the aerospace, defense, automotive, and medical industries adopt Lean-Agile methods and SAFe. He played a key role in the development of SAFe 4.0 for application to Lean systems engineering. More recently, Koehnemann worked with Scaled Agile on toolkits and white papers to provide practitioners with guidance on hardware and compliance concerns when adopting SAFe. Learn more about the SAFe Fellow program at scaledagile.com/safe-fellows. Based in Boulder, Colorado, Scaled Agile’s mission is to help system- and software-dependent enterprises achieve better outcomes, increase employee engagement, and improve business economics through adoption of Lean-Agile principles and practices based on the Scaled Agile Framework® (SAFe®). SAI supports over 120,000 practitioners of the Framework through training, certification, consulting services, and a global partner network that reaches over 35 countries and 350 cities. As a contributing member of the Pledge 1% corporate philanthropy movement, SAI also seeks to inspire, facilitate, and encourage other companies to make a positive impact in their community. Learn about Scaled Agile, and the Scaled Agile Framework, at scaledagile.com and scaledagileframework.com.
News Article | May 9, 2017
NEWTON, Mass. & PETACH TIKVA, Israel--(BUSINESS WIRE)--CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced the appointment of Marianne Budnik as chief marketing officer (CMO). Marianne will report to CyberArk CEO Udi Mokady, and be responsible for the global structure, strategy and execution of all aspects of CyberArk’s marketing efforts to broaden market reach and drive demand for the company’s market-leading privileged account security solutions. “Marianne brings tremendous technology industry experience and insight earned from working with a range of organizations at different stages of growth and maturity,” said Udi Mokady, chairman and CEO, CyberArk. “She has a proven track record for creating and leading effective global marketing initiatives that scale, and will be a valuable addition to our executive team. Her focus, energy and talent will be instrumental in continuing to differentiate CyberArk as a cyber security leader.” Budnik brings deep experience to CyberArk, having led creative, impactful global marketing strategies at SimpliVity (acquired by Hewlett Packard Enterprise), Acme Packet, Inc. (acquired by Oracle) and CA Technologies. As CMO at SimpliVity, she helped shape and drive demand for a new technology category, hyperconverged infrastructure, which drove customer value and the evolution of the organization from start-up to a high-growth industry leader. Prior to SimpliVity, Budnik served as CMO of Acme Packet where she helped expand market opportunities and increase brand value and visibility. Budnik also served as CMO at CA Technologies, and held multiple senior leadership positions at EMC Corporation. “CyberArk is a respected cyber security industry leader and a trusted advisor to thousands of organizations around the world,” said Budnik. “The incredible focus and discipline of this organization, which is clearly committed to innovation, value and customer satisfaction, makes CyberArk a stand-out global organization. Drawing on the drive and vision of this team, I am enthusiastic about what we can achieve together.” Budnik joins the CyberArk executive team as the company extends its position as the market leader, being consistently recognized for technology innovation by organizations such as SC Magazine, CRN and Government Security News. CyberArk has also been named a top place to work by Fortune Magazine and global research and consulting firm Great Place to Work, Boston Globe and the Boston Business Journal. About CyberArk CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including more than 45 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blog, or follow on Twitter via @CyberArk, LinkedIn or Facebook. Copyright © 2017 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.
News Article | May 12, 2017
— Market Highlights Global Identity & Access Management Market has seen tremendous opportunities in the future. High advancement in the field of technology and high adoption of automation in the business process is expected to drive the market of Identity & Access Management. In the past few years, the world has seen revolutionary technologies which has changed the whole process of data management. Companies are replacing their current technology infrastructure with new, more efficient products. IAM helps to organize the electronic identities more efficiency and gives the optimum control. Growing size of the organization, product expansion and geographical expansion are some of the key factors for the wide adoption of the IAM. Also, growing the market of IOT, automation and cyber security around the world is also helping the market of Identity & Access Management to grow. For the purpose of this study, Market Research Future has segmented the market of IAM into deployment, organization size and verticals. On the basis of deployment, the market has been segmented as on cloud and on premise. On cloud, the market has been further segmented as public cloud, private cloud and hybrid cloud. On the basis of the organization size, the market has been segments as SMEs and large enterprises. The Global IAM market is expected to grow at USD ~24 billion by the end of year 2022 with the ~16% of compound annual growth rate. Market Research Future Analysis: Market Research Future analysis shows that the market of IAM will grow with exponential growth during the forecast period. Automation in the IAM framework is attracting global attention and major companies such as Dell, Microsoft, Oracle among others have already added this in their product portfolio. In the coming years, it is expected that small organizations will also start adopting the IAM with much faster pace which they are currently adopting. Growing cloud market is one of the key driver for the adoption of IAM as most of the companies are upgrading their current infrastructure and adopting for cloud based services. Key Players: • F5 Networks (U.S.) • Amazon Web Services (U.S.) • HP (U.S.) • IBM (U.S.) • Microsoft Inc. (U.S.) • Oracle Corporation (U.S.) • Siemens AG (Germany) • Dell Inc. (U.S.) • CA Technologies (U.S.) • ForgeRock Inc. (U.S.) List of Tables Table 1 Global Identity & Access Management Market, By Deployment Table 2 Global Identity & Access Management Market, By Organization Size Table 3 Global Identity & Access Management Market, By Verticals Table 4 Global Identity & Access Management Market, By Regions Table 5 North America Identity & Access Management Market, By Country Table 6 North America Identity & Access Management Market, By Deployment Table 7 North America Identity & Access Management Market, By Organization Size Table 8 North America Identity & Access Management Market, By Verticals Table 9 Europe Identity & Access Management Market, By Country Table 10 Europe Identity & Access Management Market, By Deployment Table 11 Europe Identity & Access Management Market, By Organization Size Table 12 Europe Identity & Access Management Market, By Verticals Table 13 Asia-Pacific Identity & Access Management Market, By Country Table 14 Asia-Pacific Identity & Access Management Market, By Deployment Table 15 Asia-Pacific Identity & Access Management Market, By Organization Size Table 16 Asia-Pacific Identity & Access Management Market, By Verticals Table 17 Rest of The World Identity & Access Management Market, By Deployment Table 18 Rest of The World Identity & Access Management Market, By Organization Size Table 19 Rest of The World Identity & Access Management Market, By Verticals Related Report The global Virtual Desktop market is expected to grow at USD ~5 Billion by 2022, at ~9% of CAGR between 2016 and 2022 https://www.marketresearchfuture.com/reports/virtual-desktop-market-2639 About Market Research Future: At Market Research Future (MRFR), we enable our customers to unravel the complexity of various industries through our Cooked Research Report (CRR), Half-Cooked Research Reports (HCRR), Raw Research Reports (3R), Continuous-Feed Research (CFR), and Market Research & Consulting Services. For more information, please visit https://www.marketresearchfuture.com/reports/identity-access-management-market-2635
Agency: European Commission | Branch: H2020 | Program: CSA | Phase: INSO-4-2015 | Award Amount: 2.85M | Year: 2016
Science2Society creates, pilots and shares good practices, guidelines and training materials that improve awareness and practical performance in seven concrete university-industry-society interfacing schemes especially affected by Science 2.0 and open innovation. It covers a very wide range of interfacing / co-creation approaches (and the synergy between them) and advances far beyond the traditional role of the interface as a facilitator of knowledge transfer from university to business. Sound methodological frameworks will be combined with real life experience from practitioners in science and industry, making the transition from promising blueprints to actual change within some 3000 actors in Europe by 2020. Science2Society does not only collect knowledge and models; it deeply and innovatively analyses how these can be improved (using advanced methods pioneered in business practice such as process re-engineering, design thinking and change management) and runs substantial experiments to validate the created optimized interfacing schemes. A complete package of dissemination activities will ensure that these results measurably impact the performance of European universities (and other stakeholders) in this area. Our project brings together both practitioners as well as method and system experts; it brings together universities, industries, research & technology organizations and SMEs. The project is endorsed by large (EU-level) networks of peers and ecosystem partners, allowing the project to actually engage in direct dialogue during project execution with hundreds of actors far beyond the consortium itself. Moreover, by building and establishing a Community of Practice type Learning and Implementation Alliance, we will ensure that a self-sustained cross-sector community on the subject of Science 2.0-enabled innovation ecosystems (and the key role of universities interfacing with their ecosystem partners) will be in place and operational by the end of our project.
Agency: European Commission | Branch: H2020 | Program: RIA | Phase: ICT-07-2014 | Award Amount: 3.57M | Year: 2015
The most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. They have to deal with the security of the individual components as well as with the overall application security including the communications and the data flow between the components. The main objective of MUSA is to support the security-intelligent lifecycle management of distributed applications over heterogeneous cloud resources, through a security framework that includes: security-by-design mechanisms to allow application self-protection at runtime, and methods and tools for the integrated security assurance in both the engineering and operation of multi-cloud applications. The MUSA framework leverages security-by-design, agile and DevOps approaches in multi-cloud applications, and enables the security-aware development and operation of multi-cloud applications. The framework will be composed of a) an IDE for creating the multi-cloud application taking into account its security requirements together with functional and business requirements, b) a set of security mechanisms embedded in the multi-cloud application components for self-protection, c) an automated deployment environment that, based on an intelligent decision support system, will allow for the dynamic distribution of the components according to security needs, and d) a security assurance platform in form of a SaaS that will support multi-cloud application runtime security control and transparency to increase user trust. The project will demonstrate and evaluate the economic viability and practical usability of the MUSA framework in highly relevant industrial applications representative of multi-cloud application development potential in Europe. The project duration will be 36 months, with an overall budget of 3,574,190 euros.
Agency: European Commission | Branch: FP7 | Program: CP | Phase: ICT-2011.1.2 | Award Amount: 9.00M | Year: 2012
Current Clouds offer is becoming day by day wider providing a vibrant technical environment, where SMEs can create innovative solutions and evolve their services. Cloud promises cheap and flexible services to end-users at a much larger scale than before. However, Cloud business models and technologies are still in their initial hype and characterized by critical early stage issues, which pose specific challenges and require advanced software engineering methods.\nThe main goal of MODAClouds is to provide methods, a decision support system, an open source IDE and run-time environment for the high-level design, early prototyping, semi-automatic code generation, and automatic deployment of applications on multi-Clouds with guaranteed QoS.\nModel-driven development combined with novel model-driven risk analysis and quality prediction will enable developers to specify Cloud-provider independent models enriched with quality parameters, implement these, perform quality prediction, monitor applications at run-time and optimize them based on the feedback, thus filling the gap between design and run-time. Additionally, MODAClouds provides techniques for data mapping and synchronization among multiple Clouds.\nMODAClouds innovations thus are: (i)simplify Cloud provider selection favoring the emergence of European Clouds, (ii) avoid vendor lock-in problems supporting the development of Cloud enabled Future Internet applications, (iii) provide quality assurance during the application life-cycle and support migration from Cloud to Cloud when needed.\nThe research is multi-disciplinary and will be grounded on expertise from several research areas. MODAClouds consortium consists of highly recognized Universities and research institutions that will assure a sound scientific progress, SME partners providing expertise on modelling tools, and large companies that assure industry relevance. The MODAClouds approach and tools will be applied on four industrial cases from different domains.
Agency: European Commission | Branch: H2020 | Program: MSCA-ITN-ETN | Phase: MSCA-ITN-2014-ETN | Award Amount: 3.80M | Year: 2015
The consortium of this European Training Network (ETN) BigStorage: Storage-based Convergence between HPC and Cloud to handle Big Data will train future data scientists in order to enable them and us to apply holistic and interdisciplinary approaches for taking advantage of a data-overwhelmed world, which requires HPC and Cloud infrastructures with a redefinition of storage architectures underpinning them - focusing on meeting highly ambitious performance and energy usage objectives. There has been an explosion of digital data, which is changing our knowledge about the world. This huge data collection, which cannot be managed by current data management systems, is known as Big Data. Techniques to address it are gradually combining with what has been traditionally known as High Performance Computing. Therefore, this ETN will focus on the convergence of Big Data, HPC, and Cloud data storage, ist management and analysis. To gain value from Big Data it must be addressed from many different angles: (i) applications, which can exploit this data, (ii) middleware, operating in the cloud and HPC environments, and (iii) infrastructure, which provides the Storage, and Computing capable of handling it. Big Data can only be effectively exploited if techniques and algorithms are available, which help to understand its content, so that it can be processed by decision-making models. This is the main goal of Data Science. We claim that this ETN project will be the ideal means to educate new researchers on the different facets of Data Science (across storage hardware and software architectures, large-scale distributed systems, data management services, data analysis, machine learning, decision making). Such a multifaceted expertise is mandatory to enable researchers to propose appropriate answers to applications requirements, while leveraging advanced data storage solutions unifying cloud and HPC storage facilities.
Agency: European Commission | Branch: FP7 | Program: CP | Phase: ICT-2013.4.2 | Award Amount: 6.15M | Year: 2014
LeanBigData aims at addressing three open challenges in big data analytics: 1) The cost, in terms of resources, of scaling big data analytics for streaming and static data sources; 2) The lack of integration of existing big data management technologies and their high response time; 3) The insufficient end-user support leading to extremely lengthy big data analysis cycles. LeanBigData will address these challenges by:Architecting and developing three resource-efficient Big Data management systems typically involved in Big Data processing: a novel transactional NoSQL key-value data store, a distributed complex event processing (CEP) system, and a distributed SQL query engine. We will achieve at least one order of magnitude in efficiency by removing overheads at all levels of the big-data analytics stack and we will take into account technology trends in multicore technologies and non-volatile memories. Providing an integrated big data platform with these three main technologies used for big data, NoSQL, SQL, and Streaming/CEP that will improve response time for unified analytics over multiple sources and large amounts of data avoiding the inefficiencies and delays introduced by existing extract-transfer-load approaches. To achieve this we will use fine-grain intra-query and intra-operator parallelism that will lead to sub-second response times.Supporting an end-to-end big data analytics solution removing the four main sources of delays in data analysis cycles by using: 1) automated discovery of anomalies and root cause analysis; 2) incremental visualization of long analytical queries; 3) drag-and-drop declarative composition of visualizations; and 4) efficient manipulation of visualizations through hand gestures over 3D/holographic views.Finally, LeanBigData will demonstrate these results in a cluster with 1,000 cores in four real industrial use cases with real data, paving the way for deployment in the context of realistic business processes.
Ryu K.-S.,IBM |
Thomas L.,CA Technologies |
Yang S.-H.,IBM |
Nature Nanotechnology | Year: 2013
Spin-polarized currents provide a powerful means of manipulating the magnetization of nanodevices, and give rise to spin transfer torques that can drive magnetic domain walls along nanowires. In ultrathin magnetic wires, domain walls are found to move in the opposite direction to that expected from bulk spin transfer torques, and also at much higher speeds. Here we show that this is due to two intertwined phenomena, both derived from spin-orbit interactions. By measuring the influence of magnetic fields on current-driven domain-wall motion in perpendicularly magnetized Co/Ni/Co trilayers, we find an internal effective magnetic field acting on each domain wall, the direction of which alternates between successive domain walls. This chiral effective field arises from a Dzyaloshinskii-Moriya interaction at the Co/Pt interfaces and, in concert with spin Hall currents, drives the domain walls in lock-step along the nanowire. Elucidating the mechanism for the manipulation of domain walls in ultrathin magnetic films will enable the development of new families of spintronic devices. © 2013 Macmillan Publishers Limited. All rights reserved.