SYDNEY, September 14, 2017 – – Automic Software, a leader in business automation software owned by CA Technologies (NASDAQ: CA) announced the release of its ‘Continuous Delivery Map’ - a dynamic, visual map of the DevOps and Continuous Delivery (CD) tool chains.
The Continuous Delivery Map takes the form of a metropolitan transit map where tools within the DevOps tool chain have been categorised and represented as stops along color-coded rail lines. Each stop features a specific tool found in the app ecosystem, and provides a brief explanation and links to additional documentation as well as the product's homepage. Accordingly, the different “lines” represent elements of the development and delivery process.
“Making sense of the huge variety and number of tools available for the modern software development process can be confusing,” said Matty Kaffeman, senior director, Automic, Asia Pacific & Japan. “The Continuous Delivery Map clarifies the role each of these tools plays within a CD context, and demonstrates how orchestration, which is at the heart of this guide, is critical to a successful modern software delivery practice.”
Providing a unique and simple format, this new interactive guide offers a standard reference tool that highlights the types of tools required for modern software delivery practices, with automation products like CA Automic Release Automation and CA Continuous Delivery Director which are core components to success.
“A variety of tools have emerged for each and every part of the software development lifecycle– not to mention others designed to securely, safely and predictably deliver applications to customers,” said Alan Shimel, editor-in-chief at DevOps.com. “CA Automic’s Continuous Delivery Map is the ultimate reference guide for the DevOps landscape.”
“The Continuous Delivery Map serves as a comprehensive resource on the leading tools in the DevOps market, including DBMaestro,” commented Yariv Tabac, co-founder, CEO, DBMaestro. “We look forward to seeing this tool see widespread use as it becomes a standard resource for the DevOps community.”
Automic business automation provides enterprises with the visibility, agility, speed and scalability needed to respond to today’s evolving technology landscape. This best-in-breed business automation product centrally manages the execution of all clients’ workloads across multiple applications and supporting infrastructure. To learn more about Automic’s offerings, visit: https://automic.com/products.
Tweet this: @automic introduces ‘Continuous Delivery Map’ visual guide of the #DevOps and #ContinuousDelivery tool chains http://bit.ly/2wLdu7x
About CA Technologies
CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com.
Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Hill+Knowlton Strategies for CA Technologies
(02) 9286 1243
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.