Subscribe

IDS reveals ARIS development

Patricia Pieterse
By Patricia Pieterse, iWeek assistant editor
Johannesburg, 20 Jun 2008

IDS reveals ARIS development

Business process management (BPM) vendor IDS Scheer used its recent Processworld Europe conference to announce a further integration of its ARIS modelling suite with BMC Software's IT service management tools, says ITbusiness.ca.

The two companies had already worked together to develop BMC Discovery for Business Processes, which allows IT departments running BMC to automatically discover business process models from ARIS Business Architect and dynamically map them with IT services and infrastructure data stored in BMC Atrium CMDB.

This allows IT managers to determine which business processes are impacted when certain IT events occur, and allows them to plan and prioritise these events to minimise business impact.

McDowell sponsors conference

The McDowell Research Center for Global IT Management at the Bryan School of Business and Economics is co-sponsoring the ninth annual Global Information Technology Management Association (GITMA) conference, says UNCG.

The conference will take place from June 22 to 24 in Atlanta.

The conference features IT topics such as the nature of global IT outsourcing and offshoring of systems and resources, as well as cultural differences and global economic commerce. The conference alternates between the US and international locations.

CDW finds disparities

CDW Corporation has released its CDW User-Proof IT Security Report, a survey of business IT professionals, which reveals a disparity between the most common IT security headaches and business's deployment of solutions that could relieve them, says Business Wire.

Survey respondents said their most common problems stem from employees using the Internet inappropriately, using unapproved software, and circumventing security infrastructure and policies.

However, the study found companies lagged in their use of tools such as Internet content filtering or network auditing and visibility systems, which would help IT management spot and sometimes avoid such risky behaviour by network users.

Share