SlideShare a Scribd company logo
1 of 28
Download to read offline
Using Artificial Intelligence to power
Service Virtualization
Anand Kameswaran
DevOps: API Management and Application Development
CA Technologies
Principal, Product Manager
DO3T36T
@AnandKameswaran
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For Informational Purposes Only
Terms of this Presentation
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA
World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer
references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights
and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software
product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current
information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The
development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in
this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such
release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-
available basis. The information in this presentation is not deemed to be incorporated into any contract.
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Technology chat to review the details of how Artificial Intelligence is being used to
advance even further the power of CA Service Virtualization. Opaque Data
Processing (ODP) allows CA Service Virtualization to virtualize data in sufficient
detail when the format of the requests and responses is not known; eliminating
the need for a new data handler every time you encounter a new message format.
Make sure not to miss this firsthand look at the advances in ODP being showcased
during CA World 2015.
Anand
Kameswaran
CA Technologies
Principal, Product
Manager
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Any sufficiently advanced
technology is indistinguishable
from magic.
- Arthur C. Clarke
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ODP: True AI with Service Virtualization
 Virtualizes services without requiring any
knowledge or decoding of the service
protocols
 Applies a genome sequence alignment
algorithm, discovers byte-level patterns in
message protocols
 Virtualizes a much wider range of
protocols without requiring a new
data protocol handler
 Speed and accuracy with entropy weighting
and message clustering
Collaboration project between CA Labs, Swinburne University of Technology in Australia
and the CA Service Virtualization engineering and product teams
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The Big Problem - Constraints
“I can’t do anything until I have everything…
and I never have everything!”
ESB
!
!
! ! !
System Unavailable
x x x
x
Invalid data Access Fees
Incomplete
Development
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Service Virtualization Helps
“I have everything I need, when I need it!"
ESB
! ! !
System Unavailable Invalid data Access Fees
Incomplete
Development
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service Virtualization: How does it work?
CAPTURE PROCESS MODEL
Data Protocol Detection
Identification of Operation vs.
other data in transaction
Identification of Magic
Strings/Dates
De-Identify…
Record traffic between existing
systems
Create from engineering
specifications
From sources such as log files,
sample data, packet capture and
application insight files
Living, breathing “live” model
Sophisticated, contextual
behavior
Automatic handling for dynamic
properties
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service Virtualization: How does it work?
CAPTURE PROCESS MODEL
Record traffic between existing
systems
Create from engineering
specifications
From sources such as log files,
sample data, packet capture and
application insight files
Living, breathing “live” model
Sophisticated, contextual
behavior
Automatic handling for dynamic
properties
The DPH
Challenge
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The DPH Challenge
 Must know the protocol
‒ What if it is a proprietary protocol and the SME is no
longer available?
‒ What if the protocol is new, and there are no SMEs?
‒ What if you have a copybook and it is incomplete?
 Must be able to identify the operation, body and
syntax
 It takes time to add new protocol support
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ODP Essentials
 High accuracy on the 4 well known
protocols tested including IMS, LDAP, SOAP
and Twitter (REST)
 Speed and accuracy with Entropy Weighting +
Message Clustering
 The more data a service observes the more
intelligent it becomes
 Virtualizes services without requiring any
knowledge or decoding of the service protocols
 Applies a genome sequence alignment algorithm,
discovers byte-level patterns in message protocols
 Virtualizes a much wider range of protocols
without requiring a new DPH
Collaboration project between
CA Labs, Swinburne University of
Technology in Australia and the
CA Service Virtualization
engineering and product teams
BRINGS TRUE
ARTIFICIAL
INTELLIGENCE (AI)
TO SERVICE
VIRTUALIZATION
HIGH ACCURACY:
99.6 – 100%
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ODP Approach
Current
Approach
Opaque Data
Processing
OPAQUE VSE
raw bytes
request
response
CLIENT
machine
learning
match
VSE
Parse format delimit
request
response
CLIENT
matchdecode
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ODP Approach – Byte-Level Alignment
 Receive incoming request from client
 Apply byte-level alignment to transactions in recording to find
closest matching request (Needleman-Wunsch algorithm)
 Perform byte-string substitution in matching response
 Send modified response
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Entropy Weighting
Increases accuracy of
request matching
Weighs similar strings in a
message higher than
dissimilar strings
Assumption: The
“Type”/Operation of a
request is more important
to match before the
record information itself
For example: AddUser: 123456789012345
“Add User” – 7 bytes/higher priority
“123456789012345” - 15 bytes/lower priority
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ODP Approach with Entropy Weighting
Client
Opaque
Response
Generator
Transaction
Library
String
Substitution
Request
Generated
Response
Request
Matching
Response
Matching Response
Modified Response
Needleman-
Wunsch
Match
Client
Opaque
Response
Generator
Transaction
Library
String
Substitution
Request
Generated
Response
Request
Matching
Response
Matching Response
Modified Response
Calculate
Entropy
Weighing
Weighted
Needleman-
Wunsch
Match
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ODP Accuracy with Entropy Weights
Protocol
Simple Method
% Correct
Entropy Weights
% Correct Best Entropy Measure
IMS 77.4 100 Richness
CICS 100 100 Shannon/Richness
LDAP ASN.1 94.2 94.6 Shannon
LDAP Text 100 100 Shannon/Richness
Twitter (REST) 99.5 99.6 Shannon
SOAP 100 100 Any
NEW – ODP Visualization
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Capture Raw
Transactions
Cluster
Transactions
Playback
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Capture Raw Transactions
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Cluster Transactions
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Playback
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
When to Apply ODP
 ODP provides a turn key solution to virtualize
protocols otherwise not supported by CA Service
Virtualization
 When you need reasonable data and you do not
need to force specific behavior
 For encrypted messages, decryption needs to occur
before ODP analysis
 ODP currently treats all transactions as stateless
?
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Credits
to the team of engineers and researchers for their hard
work and determination in coming up with this innovative
way to address the ever-growing challenge of protocol
support.
Miao Du, Jean-Guy Schneider, Jun Han and John Grundy –
Faculty of Information and Communication Technologies,
Swinburne University of Technology, Australia
Steve Versteeg – Research Staff Member at CA Labs
Robert Williams Fmr Staff Software Engineer
Chris Kraus Sr. Principal Product Manager
Menka Goyal Sr. Principal Software Engineer
Stefana Muller Advisor, Product Management
Dr. Steve Versteeg
CA Labs
Ms. Miao Du
PhD Candidate
Dr. Jean-Guy Schneider
Prof. John Grundy
Prof. Jun Han
Robert Williams
Chris Kraus
Sr. Principal
Product Manager
CA Technologies
Thank you . . .
Menka Goyal
Sr. Principal
Software Engineer
CA Technologies
Stefana Muller
Advisor,
Product Management
CA Technologies
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
DO4T25T
Service Virtualization on Demand—Have Everything,
Whenever and Wherever Needed
11/18/2015 at 04:30 pm
DO4T03S Leading Your DevOps Enterprise Journey with Gene Kim 11/19/2015 at 10:30 am
DO3T24S
Accelerate DevTest with Microsoft® Azure™ and Service
Virtualization on Demand
11/19/2015 at 03:00 pm
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Service
Virtualization
DevOps
Theater 3
DevOps Sim
Experience
DevOps
Theater 3
Application
Test
DevOps
Theater 4
Cont. App.
Insight
DevOps
Theater 4
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow On Conversations At…
Smart Bar
DevOps
Theater 3 & 4
Tech Talks
DevOps
Theater 3 & 4
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionCA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
 
Case Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Case Study: Molina Medicaid Solutions Transforms Healthcare Through AutomationCase Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Case Study: Molina Medicaid Solutions Transforms Healthcare Through AutomationCA Technologies
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionCA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...CA Technologies
 
Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1CA Technologies
 
Driving Down Costs of z Systems™ Storage
Driving Down Costs of z Systems™ StorageDriving Down Costs of z Systems™ Storage
Driving Down Costs of z Systems™ StorageCA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?CA Technologies
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...CA Technologies
 
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...CA Technologies
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
 
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...CA Technologies
 
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresIt's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresCA Technologies
 
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...CA Technologies
 

What's hot (20)

The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization Adoption
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 
Case Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Case Study: Molina Medicaid Solutions Transforms Healthcare Through AutomationCase Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Case Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
 
Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1
 
Driving Down Costs of z Systems™ Storage
Driving Down Costs of z Systems™ StorageDriving Down Costs of z Systems™ Storage
Driving Down Costs of z Systems™ Storage
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
 
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
 
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresIt's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
 
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
 

Viewers also liked

artificial intelligence in power plants.
artificial intelligence in power plants.artificial intelligence in power plants.
artificial intelligence in power plants.8105268008
 
artiicial intelligence in power system
artiicial intelligence in power systemartiicial intelligence in power system
artiicial intelligence in power systempratikguptateddy
 
Artificial intelligence in power systems
Artificial intelligence in power systems Artificial intelligence in power systems
Artificial intelligence in power systems Riyas K H
 
Artificial Intelligence in Power Systems
Artificial Intelligence in Power SystemsArtificial Intelligence in Power Systems
Artificial Intelligence in Power SystemsSowmya T
 
Artificial intelligence in power plants
Artificial intelligence in power plantsArtificial intelligence in power plants
Artificial intelligence in power plantsvivekprajapatiankur
 
Toastmasters Secretary App
Toastmasters Secretary AppToastmasters Secretary App
Toastmasters Secretary AppMarta Soncodi
 
Building IoT App Prototypes
Building IoT App PrototypesBuilding IoT App Prototypes
Building IoT App PrototypesMarta Soncodi
 
TTN (The Things Network) Dallas at TM PMI Dallas - 17Dec16
TTN (The Things Network) Dallas at TM PMI Dallas - 17Dec16TTN (The Things Network) Dallas at TM PMI Dallas - 17Dec16
TTN (The Things Network) Dallas at TM PMI Dallas - 17Dec16Marta Soncodi
 
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?CA Technologies
 
Prototyping Workshop - Wireframes, Mockups, Prototypes
Prototyping Workshop - Wireframes, Mockups, PrototypesPrototyping Workshop - Wireframes, Mockups, Prototypes
Prototyping Workshop - Wireframes, Mockups, PrototypesMarta Soncodi
 
Power Quality Enhancement in Power Distribution system using Artificial intel...
Power Quality Enhancement in Power Distribution system using Artificial intel...Power Quality Enhancement in Power Distribution system using Artificial intel...
Power Quality Enhancement in Power Distribution system using Artificial intel...sundar balan
 
Hortonworks & Bilot Data Driven Transformations with Hadoop
Hortonworks & Bilot Data Driven Transformations with HadoopHortonworks & Bilot Data Driven Transformations with Hadoop
Hortonworks & Bilot Data Driven Transformations with HadoopMats Johansson
 
Top 3 Considerations for Machine Learning on Big Data
Top 3 Considerations for Machine Learning on Big DataTop 3 Considerations for Machine Learning on Big Data
Top 3 Considerations for Machine Learning on Big DataDatameer
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentationguestac67362
 
Arrow AI: Automated Customer Care
Arrow AI: Automated Customer CareArrow AI: Automated Customer Care
Arrow AI: Automated Customer CareUtkarsh Shukla
 
Artifical Intelligence in Customer Service
Artifical Intelligence in Customer ServiceArtifical Intelligence in Customer Service
Artifical Intelligence in Customer ServiceSam Hirsch
 
parlamind - NOAH16 London
parlamind - NOAH16 Londonparlamind - NOAH16 London
parlamind - NOAH16 LondonNOAH Advisors
 
Trucking demo w Spark ML - Paul Hargis - Hortonworks
Trucking demo w Spark ML - Paul Hargis - HortonworksTrucking demo w Spark ML - Paul Hargis - Hortonworks
Trucking demo w Spark ML - Paul Hargis - HortonworksKelly Kohlleffel
 
How Twitter Timeline works
How Twitter Timeline worksHow Twitter Timeline works
How Twitter Timeline worksAnn Smarty
 

Viewers also liked (20)

artificial intelligence in power plants.
artificial intelligence in power plants.artificial intelligence in power plants.
artificial intelligence in power plants.
 
artiicial intelligence in power system
artiicial intelligence in power systemartiicial intelligence in power system
artiicial intelligence in power system
 
Artificial intelligence in power systems
Artificial intelligence in power systems Artificial intelligence in power systems
Artificial intelligence in power systems
 
Artificial Intelligence in Power Systems
Artificial Intelligence in Power SystemsArtificial Intelligence in Power Systems
Artificial Intelligence in Power Systems
 
Artificial intelligence in power plants
Artificial intelligence in power plantsArtificial intelligence in power plants
Artificial intelligence in power plants
 
Eee ppt
Eee pptEee ppt
Eee ppt
 
Toastmasters Secretary App
Toastmasters Secretary AppToastmasters Secretary App
Toastmasters Secretary App
 
Building IoT App Prototypes
Building IoT App PrototypesBuilding IoT App Prototypes
Building IoT App Prototypes
 
TTN (The Things Network) Dallas at TM PMI Dallas - 17Dec16
TTN (The Things Network) Dallas at TM PMI Dallas - 17Dec16TTN (The Things Network) Dallas at TM PMI Dallas - 17Dec16
TTN (The Things Network) Dallas at TM PMI Dallas - 17Dec16
 
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
 
Prototyping Workshop - Wireframes, Mockups, Prototypes
Prototyping Workshop - Wireframes, Mockups, PrototypesPrototyping Workshop - Wireframes, Mockups, Prototypes
Prototyping Workshop - Wireframes, Mockups, Prototypes
 
Power Quality Enhancement in Power Distribution system using Artificial intel...
Power Quality Enhancement in Power Distribution system using Artificial intel...Power Quality Enhancement in Power Distribution system using Artificial intel...
Power Quality Enhancement in Power Distribution system using Artificial intel...
 
Hortonworks & Bilot Data Driven Transformations with Hadoop
Hortonworks & Bilot Data Driven Transformations with HadoopHortonworks & Bilot Data Driven Transformations with Hadoop
Hortonworks & Bilot Data Driven Transformations with Hadoop
 
Top 3 Considerations for Machine Learning on Big Data
Top 3 Considerations for Machine Learning on Big DataTop 3 Considerations for Machine Learning on Big Data
Top 3 Considerations for Machine Learning on Big Data
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentation
 
Arrow AI: Automated Customer Care
Arrow AI: Automated Customer CareArrow AI: Automated Customer Care
Arrow AI: Automated Customer Care
 
Artifical Intelligence in Customer Service
Artifical Intelligence in Customer ServiceArtifical Intelligence in Customer Service
Artifical Intelligence in Customer Service
 
parlamind - NOAH16 London
parlamind - NOAH16 Londonparlamind - NOAH16 London
parlamind - NOAH16 London
 
Trucking demo w Spark ML - Paul Hargis - Hortonworks
Trucking demo w Spark ML - Paul Hargis - HortonworksTrucking demo w Spark ML - Paul Hargis - Hortonworks
Trucking demo w Spark ML - Paul Hargis - Hortonworks
 
How Twitter Timeline works
How Twitter Timeline worksHow Twitter Timeline works
How Twitter Timeline works
 

Similar to Using Artificial Intelligence to power Service Virtualization

Introduction to CA Service Virtualization
Introduction to CA Service VirtualizationIntroduction to CA Service Virtualization
Introduction to CA Service VirtualizationCA Technologies
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...CA Technologies
 
Case Study: Rogers Communications Integrates CA API Management and CA Service...
Case Study: Rogers Communications Integrates CA API Management and CA Service...Case Study: Rogers Communications Integrates CA API Management and CA Service...
Case Study: Rogers Communications Integrates CA API Management and CA Service...CA Technologies
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...CA Technologies
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...CA Technologies
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Codemotion
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...CA Technologies
 
Blazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast AppsBlazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast AppsCA Technologies
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...CA Technologies
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...
Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...
Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...CA Technologies
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”CA Technologies
 
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...CA Technologies
 
Building regression tests to increase velocity and prevent things from “Going...
Building regression tests to increase velocity and prevent things from “Going...Building regression tests to increase velocity and prevent things from “Going...
Building regression tests to increase velocity and prevent things from “Going...CA Technologies
 
Tech Talk: Getting to Know Node.js
Tech Talk: Getting to Know Node.jsTech Talk: Getting to Know Node.js
Tech Talk: Getting to Know Node.jsCA Technologies
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned WayCA Technologies
 
Juniper Networks®, Tech Mahindra & CA Discuss New Perspectives & Partnership...
Juniper Networks®, Tech Mahindra & CA  Discuss New Perspectives & Partnership...Juniper Networks®, Tech Mahindra & CA  Discuss New Perspectives & Partnership...
Juniper Networks®, Tech Mahindra & CA Discuss New Perspectives & Partnership...CA Technologies
 

Similar to Using Artificial Intelligence to power Service Virtualization (20)

Introduction to CA Service Virtualization
Introduction to CA Service VirtualizationIntroduction to CA Service Virtualization
Introduction to CA Service Virtualization
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
 
Case Study: Rogers Communications Integrates CA API Management and CA Service...
Case Study: Rogers Communications Integrates CA API Management and CA Service...Case Study: Rogers Communications Integrates CA API Management and CA Service...
Case Study: Rogers Communications Integrates CA API Management and CA Service...
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
 
Blazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast AppsBlazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast Apps
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...
Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...
Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...
 
SnappyFlow Presentation.pdf
SnappyFlow Presentation.pdfSnappyFlow Presentation.pdf
SnappyFlow Presentation.pdf
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
 
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
 
Building regression tests to increase velocity and prevent things from “Going...
Building regression tests to increase velocity and prevent things from “Going...Building regression tests to increase velocity and prevent things from “Going...
Building regression tests to increase velocity and prevent things from “Going...
 
Tech Talk: Getting to Know Node.js
Tech Talk: Getting to Know Node.jsTech Talk: Getting to Know Node.js
Tech Talk: Getting to Know Node.js
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned Way
 
Juniper Networks®, Tech Mahindra & CA Discuss New Perspectives & Partnership...
Juniper Networks®, Tech Mahindra & CA  Discuss New Perspectives & Partnership...Juniper Networks®, Tech Mahindra & CA  Discuss New Perspectives & Partnership...
Juniper Networks®, Tech Mahindra & CA Discuss New Perspectives & Partnership...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Using Artificial Intelligence to power Service Virtualization

  • 1. Using Artificial Intelligence to power Service Virtualization Anand Kameswaran DevOps: API Management and Application Development CA Technologies Principal, Product Manager DO3T36T @AnandKameswaran #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only Terms of this Presentation © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if- available basis. The information in this presentation is not deemed to be incorporated into any contract.
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Technology chat to review the details of how Artificial Intelligence is being used to advance even further the power of CA Service Virtualization. Opaque Data Processing (ODP) allows CA Service Virtualization to virtualize data in sufficient detail when the format of the requests and responses is not known; eliminating the need for a new data handler every time you encounter a new message format. Make sure not to miss this firsthand look at the advances in ODP being showcased during CA World 2015. Anand Kameswaran CA Technologies Principal, Product Manager
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Any sufficiently advanced technology is indistinguishable from magic. - Arthur C. Clarke
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ODP: True AI with Service Virtualization  Virtualizes services without requiring any knowledge or decoding of the service protocols  Applies a genome sequence alignment algorithm, discovers byte-level patterns in message protocols  Virtualizes a much wider range of protocols without requiring a new data protocol handler  Speed and accuracy with entropy weighting and message clustering Collaboration project between CA Labs, Swinburne University of Technology in Australia and the CA Service Virtualization engineering and product teams
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Big Problem - Constraints “I can’t do anything until I have everything… and I never have everything!” ESB ! ! ! ! ! System Unavailable x x x x Invalid data Access Fees Incomplete Development
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Service Virtualization Helps “I have everything I need, when I need it!" ESB ! ! ! System Unavailable Invalid data Access Fees Incomplete Development
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Virtualization: How does it work? CAPTURE PROCESS MODEL Data Protocol Detection Identification of Operation vs. other data in transaction Identification of Magic Strings/Dates De-Identify… Record traffic between existing systems Create from engineering specifications From sources such as log files, sample data, packet capture and application insight files Living, breathing “live” model Sophisticated, contextual behavior Automatic handling for dynamic properties
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Virtualization: How does it work? CAPTURE PROCESS MODEL Record traffic between existing systems Create from engineering specifications From sources such as log files, sample data, packet capture and application insight files Living, breathing “live” model Sophisticated, contextual behavior Automatic handling for dynamic properties The DPH Challenge
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The DPH Challenge  Must know the protocol ‒ What if it is a proprietary protocol and the SME is no longer available? ‒ What if the protocol is new, and there are no SMEs? ‒ What if you have a copybook and it is incomplete?  Must be able to identify the operation, body and syntax  It takes time to add new protocol support
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ODP Essentials  High accuracy on the 4 well known protocols tested including IMS, LDAP, SOAP and Twitter (REST)  Speed and accuracy with Entropy Weighting + Message Clustering  The more data a service observes the more intelligent it becomes  Virtualizes services without requiring any knowledge or decoding of the service protocols  Applies a genome sequence alignment algorithm, discovers byte-level patterns in message protocols  Virtualizes a much wider range of protocols without requiring a new DPH Collaboration project between CA Labs, Swinburne University of Technology in Australia and the CA Service Virtualization engineering and product teams BRINGS TRUE ARTIFICIAL INTELLIGENCE (AI) TO SERVICE VIRTUALIZATION HIGH ACCURACY: 99.6 – 100%
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ODP Approach Current Approach Opaque Data Processing OPAQUE VSE raw bytes request response CLIENT machine learning match VSE Parse format delimit request response CLIENT matchdecode
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ODP Approach – Byte-Level Alignment  Receive incoming request from client  Apply byte-level alignment to transactions in recording to find closest matching request (Needleman-Wunsch algorithm)  Perform byte-string substitution in matching response  Send modified response
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Entropy Weighting Increases accuracy of request matching Weighs similar strings in a message higher than dissimilar strings Assumption: The “Type”/Operation of a request is more important to match before the record information itself For example: AddUser: 123456789012345 “Add User” – 7 bytes/higher priority “123456789012345” - 15 bytes/lower priority
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ODP Approach with Entropy Weighting Client Opaque Response Generator Transaction Library String Substitution Request Generated Response Request Matching Response Matching Response Modified Response Needleman- Wunsch Match Client Opaque Response Generator Transaction Library String Substitution Request Generated Response Request Matching Response Matching Response Modified Response Calculate Entropy Weighing Weighted Needleman- Wunsch Match
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ODP Accuracy with Entropy Weights Protocol Simple Method % Correct Entropy Weights % Correct Best Entropy Measure IMS 77.4 100 Richness CICS 100 100 Shannon/Richness LDAP ASN.1 94.2 94.6 Shannon LDAP Text 100 100 Shannon/Richness Twitter (REST) 99.5 99.6 Shannon SOAP 100 100 Any
  • 17. NEW – ODP Visualization
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Capture Raw Transactions Cluster Transactions Playback
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Capture Raw Transactions
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Cluster Transactions
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Playback
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD When to Apply ODP  ODP provides a turn key solution to virtualize protocols otherwise not supported by CA Service Virtualization  When you need reasonable data and you do not need to force specific behavior  For encrypted messages, decryption needs to occur before ODP analysis  ODP currently treats all transactions as stateless ?
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Credits to the team of engineers and researchers for their hard work and determination in coming up with this innovative way to address the ever-growing challenge of protocol support. Miao Du, Jean-Guy Schneider, Jun Han and John Grundy – Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia Steve Versteeg – Research Staff Member at CA Labs Robert Williams Fmr Staff Software Engineer Chris Kraus Sr. Principal Product Manager Menka Goyal Sr. Principal Software Engineer Stefana Muller Advisor, Product Management Dr. Steve Versteeg CA Labs Ms. Miao Du PhD Candidate Dr. Jean-Guy Schneider Prof. John Grundy Prof. Jun Han Robert Williams Chris Kraus Sr. Principal Product Manager CA Technologies Thank you . . . Menka Goyal Sr. Principal Software Engineer CA Technologies Stefana Muller Advisor, Product Management CA Technologies
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME DO4T25T Service Virtualization on Demand—Have Everything, Whenever and Wherever Needed 11/18/2015 at 04:30 pm DO4T03S Leading Your DevOps Enterprise Journey with Gene Kim 11/19/2015 at 10:30 am DO3T24S Accelerate DevTest with Microsoft® Azure™ and Service Virtualization on Demand 11/19/2015 at 03:00 pm
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Service Virtualization DevOps Theater 3 DevOps Sim Experience DevOps Theater 3 Application Test DevOps Theater 4 Cont. App. Insight DevOps Theater 4
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow On Conversations At… Smart Bar DevOps Theater 3 & 4 Tech Talks DevOps Theater 3 & 4
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15