SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
System Management
Challenges
Michael Otey
President TECA, Inc.
Senior Contributing Editor
Windows IT Pro
SQL Server Pro
What This Session Covers
• Today’s datacenter requirements
• Challenges
– Managing Windows and Linux
– Management of virtual systems
– Monitoring and capacity planning
– Deploying and updating applications
– Preparing for containers and
microservices
– Keeping on top of inventory and licensing
– Cloud and hybrid cloud
Rapid Technology Changes
are Driving New IT Demands
• Vast increases in connectivity
– The mobile cloud connects 3.1 billion of 7.3 billion people worldwide
– They average 3 connected devices per person
– By 2025, 80% of the population will be
connected
• Explosive data growth
– Data growth – 30-50% per year
– IoT, Big Data, social, mobile data
• Rapid cloud adoption
– 90% of VMworld attendees had workloads
deployed in the public cloud
3
Today’s IT Requirements
• Agility
– Meeting quickly changing business
conditions
• Reducing complexity
• Increasing automation
• Consumerization of IT
• Reducing costs
– CapEX & OpEx
• Data control and security
Modern IT Infrastructure
• Heterogeneous “Best-of-Breed” implementation
• Virtualization
– The foundation of the modern data center
– Enables mobility
– Enhances flexibility
• Storage
– Scalability & flexibility
– Data storage efficiency – deduplication
– Snapshots & replication
• Cloud
– Flexibility & extensibility
– Disaster recovery
5
System Management
Challenges
Managing Windows & Linux
• Heterogeneous platforms are growing
– Standalone applications
– Microsoft’s recent adoption of Linux and open source
• User authentication
– Multiple authentication sources
– Build a centralized user directory and integrate standard
protocols such as SAML, OAuth 2.0, or Openid Connect
• Configuration management & automation
– Different tools and approaches
– Use personnel or cross platform tools like Chef and Puppet
• Log file management
– Differently formatted system and application log files
– Use open source or third party log management tools
Managing Windows & Linux
• Reduction of console sprawl
– Different platform management tools and
multiple support structures
– PowerShell
– Use open source &
third party tools
• Remote Access tools
– VMC, UltraVNC
Managing Virtual Systems
• Multiple hypervisors
– VMware vSphere & Hyper-V (60%-40%)
– Different management capabilities/tools
– Limited cross platform capabilities
• Siloed management
– Different personnel
• Lack of visibility
• Integration tools
– VMware has Multi-Hypervisor Manager
– Microsoft has VMM
– Third party tools
• Distributed Management Task Force (DMTF)
standards
Monitoring and Capacity
Planning
• Goal is improving capacity utilization
• Performance baselining multiple OSes and tools
• Virtualization hides capacity
• Creating service levels
• Under / Over provisioning
– Proper control mechanisms
• Forecasting business demand
– Analyzing the historical workload data
– Working in cooperation with business teams
Deploying and Updating
Applications
• Version differences
– Version control systems
• Multiple device support
– Workspace / VDI technologies
• Multiple platform targets
– Desktop, web, on-premise, cloud
– Cross platform tools
Containers and Microservices
• Moving away from legacy monolithic
applications
– Mode 2 – microservices
– Application redesign
• New to Windows environments
• Mixing legacy & mode 2 apps
• Different monitoring tools
• Docker provides a common
management experience
Inventory Management
• Virtual server sprawl
- Self-service VMs
• Users and developers
- Unexpected licensing
- BYOD management
- Inventory tools
- System Center
- Third party tools
Licensing
- Vendors use different licensing
- Products use different licensing
- Licensing is complicated
- Trend toward core licenses
- Virtualization further complicates
licensing
- Ongoing inventory is required
- Cloud and SaaS tend to simplify this
Challenges of Cloud Adoption
• Growing quickly
• Legacy Infrastructure
• Potentially lower performance
– Shared hardware
• Consolidation and pooling of
resources
– Giving up dedicated resources
• Adoption of new technologies
Integrating the Cloud and
Hybrid Cloud
• Moving legacy workloads
• Distributed applications
• Lack of expertise
• Multiple cloud providers
• Difficult to estimate costs
• Partners and third party tools
Key Takeways
• Be prepared for growth – more technology
changes are coming in the next few years
than ever before
• Linux & heterogenous virtualization will
grow
• Proper planning and tools are essential for
effective systems management
• The cloud is the future
– But that journey is a long one
– Hybrid cloud is the next practical step
KACE Systems
Management Appliance 7.0
(K1000)
Confidential19
• Scan in your new or
existing assets
• Multiple platform support
• Scan and GO!
• Free update to the K1
GO! app
Barcoding
Confidential20
• Pull data from multiple appliances
into single report
• No specialized hardware needed
Cross appliance reporting
Confidential21
Confidential22
• New easier to use wizard
• New features
• Multiple approvers
• Specific approver notifications
• Approval Timeout
• Customizable notifications
• Customize your templates with
HTML/markdown
Process enhancements & approval workflow
Confidential23
• My devices made easier
• Assign devices easier
• Multiple devices? No
problem
• Interactive feedback
• Get more info during
your install
Self-service software provisioning enhancements
Confidential24
• Hardware monitoring made
easier
• Real-time alerts
• Stay on top of your
environment
SNMP Trap Receiver
Confidential25
AirWatch integration
• Single pane of glass
• All your devices in one place
• Integrated asset management
• Assign mobile devices to users and
more
Confidential26
• Supports ESX 5.5 and 6.0
• Discover what VM’s are running
on your servers
• Get hardware/software details
from your VMware environment
• Get hardware usage available
VMware/Vcenter discovery
Confidential27
• My Profile
• More for your users
• See what
tickets/assets/devices
are assigned to you
Users
Confidential28
• Manually or automatically assign users to a device
• Control Panel > General > Device Assignment
• Synchronous occurs upon inventory
• Used in conjunction with user portal and “My Profile”
User/Machine assignment
Confidential29
• Installing software made easier
• Ability to leverage the software
catalog
• “Run Now” option added
• Publish for users
• Existing MI’s usable from
software portal
Managed Installs
Confidential31
• Blacklisting improvement
• Upgrade/Downgrade rights
• Asset Management Appliance licensing changes
• Agentless and grandfathering
• REST API’s/SDK
• Ability for 3rd parties to pull information about inventory, assets, scripting,
reporting, managed installs, and users
Software compliance/Licensing/API’s
KACE Systems
Deployment Appliance
4.0 (K2000)
Confidential33
• Native UEFI support
• Removes reliance on current workarounds (Legacy BIOS setting, thumb drives)
• Secure Boot still needs to be disabled
• Multicasting in Cisco networks
• Router vendors lack Pragmatic General Multicast (PGM) support
• PGM not designed to cross routers
• Internet Group Management Protocol (IGMP) is vendor agnostic
• IGMP can cross between routers/subnets
• Increased Windows deployment speed
• WIM and Kimage speeds 10% faster
KACE SDA Imaging Connectivity and Speed
Confidential34
• Major focus on underlying OS architecture
• Update to the K2000 Appliance 3.7 SP3 (3.7.345)
• Combined SDA and RSA codebase
• FreeBSD 10.0 to 10.3 for SDA
• FreeBSD 7 to 10.3 for RSA
• 32-bit to 64-bit for RSA
• RSA Hyper-V support
KACE SDA Infrastructure
Watch the webcast here:
http://bit.ly/2ilF7N6

Mais conteúdo relacionado

Mais procurados

Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...apprize360
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendorsapprize360
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloudnick_garrod
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
IntroductorytocomputingAnne Starr
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations managerBelarmino Tomicha
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup Ricoh India Limited
 
Cloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformCloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformBMC Software
 
#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networkingMicro Focus
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”MarketingArrowECS_CZ
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategyMicro Focus
 
Ad Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive MistakeAd Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive MistakeBMC Software
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Nederland
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active DirectoryZoho Corporation
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training Yuvaraj1986
 

Mais procurados (20)

Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
Introductorytocomputing
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Cloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformCloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management Platform
 
#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
 
Ad Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive MistakeAd Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive Mistake
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active Directory
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
SCOM 2012 service SaaS
SCOM 2012 service SaaSSCOM 2012 service SaaS
SCOM 2012 service SaaS
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 

Destaque

How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...Quest
 
cv-J_Angelico_20150926
cv-J_Angelico_20150926cv-J_Angelico_20150926
cv-J_Angelico_20150926John Angelico
 
Spaceships unit plan
Spaceships unit planSpaceships unit plan
Spaceships unit planJacqui Sharp
 
2 approaches to system development
2 approaches to system development2 approaches to system development
2 approaches to system developmentcymark09
 
Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...Engr. Md. Siddiqur Rahman Tanveer
 
Heart beat detector using arduino
Heart beat detector using arduinoHeart beat detector using arduino
Heart beat detector using arduinoVarshaa Khandagale
 
Microcontroller based heart rate meter
Microcontroller based heart rate meterMicrocontroller based heart rate meter
Microcontroller based heart rate meterChetana Nair
 
Environmental pollution control
Environmental pollution controlEnvironmental pollution control
Environmental pollution controlpriyanka odela
 
Systems Approach to Management
Systems Approach to ManagementSystems Approach to Management
Systems Approach to ManagementIshan Vyas
 
Management information system
Management  information systemManagement  information system
Management information systemRamya Sree
 
Power Point Animation
Power Point AnimationPower Point Animation
Power Point Animationjaspang
 
Heart beat monitor system PPT
Heart beat monitor system PPT Heart beat monitor system PPT
Heart beat monitor system PPT Anand Dwivedi
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTQuest
 
Management information system
Management information systemManagement information system
Management information systemSikander Saini
 

Destaque (15)

How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
 
1η παδ
1η παδ1η παδ
1η παδ
 
cv-J_Angelico_20150926
cv-J_Angelico_20150926cv-J_Angelico_20150926
cv-J_Angelico_20150926
 
Spaceships unit plan
Spaceships unit planSpaceships unit plan
Spaceships unit plan
 
2 approaches to system development
2 approaches to system development2 approaches to system development
2 approaches to system development
 
Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...
 
Heart beat detector using arduino
Heart beat detector using arduinoHeart beat detector using arduino
Heart beat detector using arduino
 
Microcontroller based heart rate meter
Microcontroller based heart rate meterMicrocontroller based heart rate meter
Microcontroller based heart rate meter
 
Environmental pollution control
Environmental pollution controlEnvironmental pollution control
Environmental pollution control
 
Systems Approach to Management
Systems Approach to ManagementSystems Approach to Management
Systems Approach to Management
 
Management information system
Management  information systemManagement  information system
Management information system
 
Power Point Animation
Power Point AnimationPower Point Animation
Power Point Animation
 
Heart beat monitor system PPT
Heart beat monitor system PPT Heart beat monitor system PPT
Heart beat monitor system PPT
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
 
Management information system
Management information systemManagement information system
Management information system
 

Semelhante a Your Biggest Systems Management Challenges – and How to Overcome Them

KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservicesLalit Kale
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)Tsz Wing Chu
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesfirzhan naqash
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterjmustac
 
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxgarkhot123
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles Nilay Shrivastava
 
Citrix XenServer Success
Citrix XenServer SuccessCitrix XenServer Success
Citrix XenServer SuccesseG Innovations
 
Big SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on HadoopBig SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on HadoopWilfried Hoge
 
Designing Microservices
Designing MicroservicesDesigning Microservices
Designing MicroservicesDavid Chou
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native StackApcera
 
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilizationFlex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilizationMike Ricca
 
The Art of Displaying Industrial Data
The Art of Displaying Industrial DataThe Art of Displaying Industrial Data
The Art of Displaying Industrial DataInductive Automation
 
RedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedis Labs
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceSudip Chatterjee
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to MicroservicesMahmoudZidan41
 

Semelhante a Your Biggest Systems Management Challenges – and How to Overcome Them (20)

KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservices
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenter
 
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles
 
Citrix XenServer Success
Citrix XenServer SuccessCitrix XenServer Success
Citrix XenServer Success
 
Big SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on HadoopBig SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on Hadoop
 
Designing Microservices
Designing MicroservicesDesigning Microservices
Designing Microservices
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
 
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilizationFlex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
 
The Art of Displaying Industrial Data
The Art of Displaying Industrial DataThe Art of Displaying Industrial Data
The Art of Displaying Industrial Data
 
RedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in Equinix
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business Intelligence
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
Un-clouding the cloud
Un-clouding the cloudUn-clouding the cloud
Un-clouding the cloud
 

Mais de Quest

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioQuest
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?Quest
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowQuest
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededQuest
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongQuest
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementQuest
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update ManagementQuest
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachQuest
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Quest
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingQuest
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Quest
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachQuest
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutQuest
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsQuest
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Quest
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemQuest
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryQuest
 

Mais de Quest (20)

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
 

Último

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Último (20)

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

Your Biggest Systems Management Challenges – and How to Overcome Them

  • 1. System Management Challenges Michael Otey President TECA, Inc. Senior Contributing Editor Windows IT Pro SQL Server Pro
  • 2. What This Session Covers • Today’s datacenter requirements • Challenges – Managing Windows and Linux – Management of virtual systems – Monitoring and capacity planning – Deploying and updating applications – Preparing for containers and microservices – Keeping on top of inventory and licensing – Cloud and hybrid cloud
  • 3. Rapid Technology Changes are Driving New IT Demands • Vast increases in connectivity – The mobile cloud connects 3.1 billion of 7.3 billion people worldwide – They average 3 connected devices per person – By 2025, 80% of the population will be connected • Explosive data growth – Data growth – 30-50% per year – IoT, Big Data, social, mobile data • Rapid cloud adoption – 90% of VMworld attendees had workloads deployed in the public cloud 3
  • 4. Today’s IT Requirements • Agility – Meeting quickly changing business conditions • Reducing complexity • Increasing automation • Consumerization of IT • Reducing costs – CapEX & OpEx • Data control and security
  • 5. Modern IT Infrastructure • Heterogeneous “Best-of-Breed” implementation • Virtualization – The foundation of the modern data center – Enables mobility – Enhances flexibility • Storage – Scalability & flexibility – Data storage efficiency – deduplication – Snapshots & replication • Cloud – Flexibility & extensibility – Disaster recovery 5
  • 7. Managing Windows & Linux • Heterogeneous platforms are growing – Standalone applications – Microsoft’s recent adoption of Linux and open source • User authentication – Multiple authentication sources – Build a centralized user directory and integrate standard protocols such as SAML, OAuth 2.0, or Openid Connect • Configuration management & automation – Different tools and approaches – Use personnel or cross platform tools like Chef and Puppet • Log file management – Differently formatted system and application log files – Use open source or third party log management tools
  • 8. Managing Windows & Linux • Reduction of console sprawl – Different platform management tools and multiple support structures – PowerShell – Use open source & third party tools • Remote Access tools – VMC, UltraVNC
  • 9. Managing Virtual Systems • Multiple hypervisors – VMware vSphere & Hyper-V (60%-40%) – Different management capabilities/tools – Limited cross platform capabilities • Siloed management – Different personnel • Lack of visibility • Integration tools – VMware has Multi-Hypervisor Manager – Microsoft has VMM – Third party tools • Distributed Management Task Force (DMTF) standards
  • 10. Monitoring and Capacity Planning • Goal is improving capacity utilization • Performance baselining multiple OSes and tools • Virtualization hides capacity • Creating service levels • Under / Over provisioning – Proper control mechanisms • Forecasting business demand – Analyzing the historical workload data – Working in cooperation with business teams
  • 11. Deploying and Updating Applications • Version differences – Version control systems • Multiple device support – Workspace / VDI technologies • Multiple platform targets – Desktop, web, on-premise, cloud – Cross platform tools
  • 12. Containers and Microservices • Moving away from legacy monolithic applications – Mode 2 – microservices – Application redesign • New to Windows environments • Mixing legacy & mode 2 apps • Different monitoring tools • Docker provides a common management experience
  • 13. Inventory Management • Virtual server sprawl - Self-service VMs • Users and developers - Unexpected licensing - BYOD management - Inventory tools - System Center - Third party tools
  • 14. Licensing - Vendors use different licensing - Products use different licensing - Licensing is complicated - Trend toward core licenses - Virtualization further complicates licensing - Ongoing inventory is required - Cloud and SaaS tend to simplify this
  • 15. Challenges of Cloud Adoption • Growing quickly • Legacy Infrastructure • Potentially lower performance – Shared hardware • Consolidation and pooling of resources – Giving up dedicated resources • Adoption of new technologies
  • 16. Integrating the Cloud and Hybrid Cloud • Moving legacy workloads • Distributed applications • Lack of expertise • Multiple cloud providers • Difficult to estimate costs • Partners and third party tools
  • 17. Key Takeways • Be prepared for growth – more technology changes are coming in the next few years than ever before • Linux & heterogenous virtualization will grow • Proper planning and tools are essential for effective systems management • The cloud is the future – But that journey is a long one – Hybrid cloud is the next practical step
  • 19. Confidential19 • Scan in your new or existing assets • Multiple platform support • Scan and GO! • Free update to the K1 GO! app Barcoding
  • 20. Confidential20 • Pull data from multiple appliances into single report • No specialized hardware needed Cross appliance reporting
  • 22. Confidential22 • New easier to use wizard • New features • Multiple approvers • Specific approver notifications • Approval Timeout • Customizable notifications • Customize your templates with HTML/markdown Process enhancements & approval workflow
  • 23. Confidential23 • My devices made easier • Assign devices easier • Multiple devices? No problem • Interactive feedback • Get more info during your install Self-service software provisioning enhancements
  • 24. Confidential24 • Hardware monitoring made easier • Real-time alerts • Stay on top of your environment SNMP Trap Receiver
  • 25. Confidential25 AirWatch integration • Single pane of glass • All your devices in one place • Integrated asset management • Assign mobile devices to users and more
  • 26. Confidential26 • Supports ESX 5.5 and 6.0 • Discover what VM’s are running on your servers • Get hardware/software details from your VMware environment • Get hardware usage available VMware/Vcenter discovery
  • 27. Confidential27 • My Profile • More for your users • See what tickets/assets/devices are assigned to you Users
  • 28. Confidential28 • Manually or automatically assign users to a device • Control Panel > General > Device Assignment • Synchronous occurs upon inventory • Used in conjunction with user portal and “My Profile” User/Machine assignment
  • 29. Confidential29 • Installing software made easier • Ability to leverage the software catalog • “Run Now” option added • Publish for users • Existing MI’s usable from software portal Managed Installs
  • 30. Confidential31 • Blacklisting improvement • Upgrade/Downgrade rights • Asset Management Appliance licensing changes • Agentless and grandfathering • REST API’s/SDK • Ability for 3rd parties to pull information about inventory, assets, scripting, reporting, managed installs, and users Software compliance/Licensing/API’s
  • 32. Confidential33 • Native UEFI support • Removes reliance on current workarounds (Legacy BIOS setting, thumb drives) • Secure Boot still needs to be disabled • Multicasting in Cisco networks • Router vendors lack Pragmatic General Multicast (PGM) support • PGM not designed to cross routers • Internet Group Management Protocol (IGMP) is vendor agnostic • IGMP can cross between routers/subnets • Increased Windows deployment speed • WIM and Kimage speeds 10% faster KACE SDA Imaging Connectivity and Speed
  • 33. Confidential34 • Major focus on underlying OS architecture • Update to the K2000 Appliance 3.7 SP3 (3.7.345) • Combined SDA and RSA codebase • FreeBSD 10.0 to 10.3 for SDA • FreeBSD 7 to 10.3 for RSA • 32-bit to 64-bit for RSA • RSA Hyper-V support KACE SDA Infrastructure
  • 34. Watch the webcast here: http://bit.ly/2ilF7N6