SlideShare a Scribd company logo
1 of 24
How to Self-Provision over WLAN with
Intel® vPro™ Technology
June 2013
Omer Livne, Intel IT
2
Legal Notices
Copyright © 2013 Intel Corporation. All rights reserved.
This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
* Other names and brands may be claimed as the property of others.
Copyright © 2013 Intel Corporation. All rights reserved.
3
Introduction
Intel IT supports a worldwide computing
environment that includes more than
100,000 PCs across 63 countries. More
than 80 percent of the devices are
mobile PCs that connect wirelessly to
our network.
Managing and securing these
environments is a key IT priority.
Intel IT has deployed Intel® vPro™
technology across our enterprise in
order to help maintain, manage, and
protect these PCs.
80% MOBILE DEVICES
CONNECTED WIRELESSLY TO OUR NETWORK
Intel IT supports
>100,000 PCs
Copyright © 2013 Intel Corporation. All rights reserved.
4
Background
To activate the Intel® Active Management Technology (Intel® AMT) feature of Intel®
vPro™ Technology, we provision the PCs using Intel® Setup and Configuration
Software (Intel® SCS).
Provisioning is required to be able to take advantage of the capabilities within Intel
AMT. When employees are issued a new or replacement PC, the PC is provisioned
by technicians in our IT service centers.
Employees that participate
in our Bring Your Own
(BYO) PC program might
also bring in a PC that is
un-provisioned.
Typically provisioning is
handled automatically in
the course of installing
and configuring the OS
build.
On occasion, a PC may
need to have the
provisioning reinstalled
after delivery to the
employee.
Copyright © 2013 Intel Corporation. All rights reserved.
Self-Provisioning
Challenge
5
The Challenge
We needed an easy way for technicians to
provision Ultrabooks™ devices that do not
have wired Ethernet ports.
We wanted to create a simple and efficient
way for employees to be able to self-
provision their PCs, without having to take
the PC to an IT Service Center.
Intel IT created a tool that allows our
technicians and employees to self-provision
systems over the WLAN.
Employees can now use this tool to self-
provision their PC, regardless of whether it’s a
corporate-issued PC or a Bring-Your-Own PC.
6 Copyright © 2013 Intel Corporation. All rights reserved.
Why This Is Important
Once the user’s PC is provisioned, our IT Service
Center staff can help manage and troubleshoot
issues on the PC.
This allows them to provide the same level of
service regardless of whether it is a WLAN-only
corporate-owned device or an employee’s Bring-
Your-Own (BYO) PC.
As employees bring in more WLAN-only BYO
devices, such as Ultrabook™ devices and
Windows*-based tablets with Intel® Architecture,
we expect to see more employees utilizing this
tool and subsequently requiring less support
from our IT Service Center.
7 Copyright © 2013 Intel Corporation. All rights reserved.
Host-Based
Configuration
on Demand
8
How It Works
Host-Based Configuration on Demand
(HBCoD) is a tool that utilizes the host-based
configuration ability in Intel® Setup and
Configuration Software, which is provided by
the Intel® Active Management Technology
Configuration Utility (ACU).
The tool is available through our intranet
software library and is available to all
employees.
When run, the tool copies the necessary files to
the employee’s PC and executes a batch file
that performs several functions before running
ACUConfig.exe to provision the client.
9 Copyright © 2013 Intel Corporation. All rights reserved.
10
The Technical Details
HBCoD self-provisioning process consists of
four major steps:
1. HBCoD copies the necessary files to
the local hard drive into c:temp
2. HBCoD launches a batch file with the
necessary instructions
3. The batch file sets the value for
variables used in the commands
4. The commands use the variables to
perform two configurations of the
system with logging and error checking
Copyright © 2013 Intel Corporation. All rights reserved.
11
Step 1:
Copy the necessary file to the local hard drive
In our case, we have chosen to copy the necessary files to c:temp, but any
location will work. The files that need to be copied are:
• ACU.dll
• ACUConfig.exe
• ConfigureNowHBC.bat
• Initial HBC.xml
This can be done using a batch file called HBCoD.BAT, which is written as such:
: HBCOD stands for Host-Based Configuration on Demand
: This batch file copies the SCS configurator files to the local machine into the
: C:tempACU_Configurator folder
: And triggers configuration by running ConfigureNow.bat that contains the configuration
commands
@echo off
xcopy %~dp0.. "c:tempACU_Configurator" /e /i /h /d /y
c:
cd tempACU_Configurator
Start ConfigureNowHBC.bat
Copyright © 2013 Intel Corporation. All rights reserved.
12
Step 2:
Launch a batch file with the necessary instructions
The last line of the HBCoD.BAT file
Start ConfigureNowHBC.bat
executes another batch file named
ConfigureNowHBC.BAT.
This batch file is used to perform steps 3 and 4.
Copyright © 2013 Intel Corporation. All rights reserved.
13
Steps 3 and 4:
Set Variable values and execute commands with
logging and error checking
At a high-level, this batch file performs the following functions:
1. Checks for and creates (if necessary) C:IntelAMTlogs directory
2. Sets the MyServer variable to the FQDN of the appropriate provisioning server
3. Sets the MyProfile variable to the Remote Configuration Service (RCS) profile to be used
by the provisioning server
4. Sets the MyConfigFile variable to the XML file that contains the provisioning profile,
Initial HBC.xml
5. Performs an initial configuration over the WLAN using a temporary profile to enable
wireless Intel® Active Management Technology using the ConfigAMT switch for
ACUConfig.exe
6. Performs a final RCS configuration that properly configures the client using the
ConfigViaRCSOnly switch for ACUConfig.exe
7. Performs error checking
Copyright © 2013 Intel Corporation. All rights reserved.
14
Steps 3 and 4:
Set Variable values and execute commands with
logging and error checking
The primary functions are 5 and 6.
5. Performs an initial configuration over the WLAN using a temporary profile to
enable wireless Intel® Active Management Technology using the ConfigAMT
switch for ACUConfig.exe
6. Performs a final RCS configuration that properly configures the client using the
ConfigViaRCSOnly switch for ACUConfig.exe
Note that in function 5, the client is provisioned with an initial configuration using a
digest password and another password used to encrypt the XML file, both of which
are in this case, P@ssw0rd.
Use the ACUWizard.exe to create the Initial HBC.XML file and refer to the Intel®
Setup and Configuration Software Deployment Guide for more information.
Copyright © 2013 Intel Corporation. All rights reserved.
15
HBC.XML Configuration
Below is an example of how the initial HBC.XML file is configured:
Copyright © 2013 Intel Corporation. All rights reserved.
16
Remote Configuration Service Server Configuration
In function 6 (below) the system is configured again from the RCS server during
which the digest password is either removed or replaced, depending on the
configuration of the provisioning profile “MyProfile” on the RCS provisioning server
“MyServer”.
6. Performs a final RCS configuration that properly configures the client using the
ConfigViaRCSOnly switch for ACUConfig.exe
If detailed logging and error checking are not required, the batch file can be
simplified considerably by editing the file to perform only functions 5 and 6
without the use of variables.
Copyright © 2013 Intel Corporation. All rights reserved.
17
Contents of ConfigureNowHBC.bat:
cd..
Color FC
echo ************************************************************
echo This action takes about 2-5 minutes.
echo It may take longer depending on bandwidth
echo and distance from the configuration server.
echo !!!Very important: You have to be connected via Wireless LAN!!!
echo If you haven't already done so,
echo DISCONNECT LAN and CONNECT to WLAN now
echo and wait until you get an IP address
echo ************************************************************
PAUSE
Color f
If exist %SystemDrive%IntelAMTlogs goto Cont
MD %SystemDrive %IntelAMTlogs
:Cont
SET APPNAME=AMTHBCOD
SET MyServer="[FQDN of your provisioning server]"
SET MyProfile="[name of desired RCS profile]"
SET MyConfigFile="Initial HBC.xml"
:DecryptionPassword in command below matches the password used in SCS to encrypt the XML file
Call ACUConfig.exe /verbose /output console /output file %SystemDrive %IntelAMTlogsHBOCLog.txt
ConfigAMT %MyConfigFile% /DecryptionPassword P@ssw0rd
IF NOT ERRORLEVEL 0 GOTO ERROR
Call ACUConfig.exe /verbose /output console /output file %SystemDrive %IntelAMTlogsRCSLog.txt
ConfigViaRCSOnly %MyServer% %MyProfile%
SET INSTALLATIONERRORLEVEL=%ERRORLEVEL%
ECHO %DATE%:%TIME% - %APPNAME% ConfigViaRCSOnly returned: [%INSTALLATIONERRORLEVEL%]
Copyright © 2013 Intel Corporation. All rights reserved.
The sample text for the
ConfigureNowHBC.bat file
is located here.
18
Contents of ConfigureNowHBC.bat:
:-----------------------------
IF "%ERRORLEVEL%" == "0" Goto ENDGood
IF "%ERRORLEVEL%" == "32" Goto ENDGood
IF "%ERRORLEVEL%" == "101" Goto ENDGood
IF "%ERRORLEVEL%" == "108" Goto ENDGood
:ERROR
Color FC
echo *************************************
echo Please check the error message above.
echo *************************************
GOTO EndErr
:EndErr
Color FC
SET INSTALLATIONERRORLEVEL=%ERRORLEVEL%
ECHO %DATE%:%TIME% - %APPNAME% installation returned: [%INSTALLATIONERRORLEVEL%]
echo This program will now exit
PAUSE
EXIT /b 1
:ENDGood
Color A
echo *************************************
echo Congrats! You are now AMT configured
echo *************************************
echo
echo *************************************
echo This program will now exit
echo *************************************
PAUSE
EXIT 0
Copyright © 2013 Intel Corporation. All rights reserved.
The sample text for the
ConfigureNowHBC.bat file
is located here.
19
Learn More
Intel® Setup and Configuration Software (Intel® SCS)
Intel® Setup and Configuration Software (Intel® SCS) allows you to discover, set up and configure, and
maintain a secure connection to every managed device on your network. Using Intel SCS is an easy
process for unlocking the features and the value of systems with Intel® processors with Intel® vPro™
technology. Download the free software or view the training wizard online.
Intel® vPro™ Technology: Proven Value in Four Use Cases
To increase our ability to maintain, manage, and protect PCs while decreasing management costs, in
2011 Intel IT completed deployment of Intel® vPro™ technology across the entire enterprise. We have
evaluated the business value of four use cases based on Intel vPro technology that have been
deployed at Intel.
• An enterprise-scale solution for remote management of self-encrypting drives
• Remote passphrase reset
• Keyboard-Video-Mouse (KVM) remote control
• ISO mounts
In each case, we found that Intel vPro technology reduces management costs and decreases
downtime, resulting in greater employee productivity.
Copyright © 2013 Intel Corporation. All rights reserved.
20
Learn More
Managing Intel® Solid-State Drives Using Intel® vPro™ Technology
Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE)
solution to replace our current software-based WDE solution on systems with self-encrypting drives.
Compared to software-based WDE, our new hardware-based WDE solution improves user experience,
increases encryption compliance, and reduces support issues. This new solution is based on two
Intel® technologies: self-encrypting Intel® Solid-State Drives and Intel® Active Management
Technology, part of Intel® vPro™ technology.
Configuration Tips for Managing Mobile PCs with Intel® vPro™ Technology
To improve our ability to use certain remote management features of Intel® Active Management
Technology (Intel® AMT) a component of Intel® vPro™ technology, Intel IT worked with Intel’s
software development team to develop ways to enhance Intel® Setup and Configuration Software
(Intel® SCS), a tool used with Intel AMT. By combining the updated version that resulted, Intel SCS 7,
with our existing client management console, we created a highly available, agile configuration and
maintenance environment for our mobile systems. This solution improves our ability to configure and
maintain mobile PCs on demand with Intel AMT and keep them configured throughout their on-the-
go life cycles for our customers.
Copyright © 2013 Intel Corporation. All rights reserved.
Discover Intel IT’s strategies and initiatives that are accelerating Intel’s growth
and delivering business value.
IT Annual Performance Report
2012 Initiatives and 2013 Priorities
www.intel.com/go/ITAnnualReport
Learn more about Intel IT’s initiatives at www.intel.com/IT
Sharing Intel IT Best
Practices with the World
Assessment Tools
CIO and IT PerspectiveIT Papers
IT-to-IT Community
Thank You
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology

More Related Content

What's hot

Easergy studio realeasenotesv8_0_0
Easergy studio realeasenotesv8_0_0Easergy studio realeasenotesv8_0_0
Easergy studio realeasenotesv8_0_0M_ORTIZ
 
IBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM India Smarter Computing
 
ESM High Availability Module User's Guide
ESM High Availability Module User's GuideESM High Availability Module User's Guide
ESM High Availability Module User's GuideProtect724gopi
 
Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Principled Technologies
 
T310 spec sheet
T310 spec sheetT310 spec sheet
T310 spec sheetagoesimam
 
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi Italia
 
Intel Knights Landing Slides
Intel Knights Landing SlidesIntel Knights Landing Slides
Intel Knights Landing SlidesRonen Mendezitsky
 
Ex 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenEx 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenĐô GiẢn
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemBetselove
 
Scale Up Performance with Intel® Development
Scale Up Performance with Intel® DevelopmentScale Up Performance with Intel® Development
Scale Up Performance with Intel® DevelopmentIntel IT Center
 
Chapter_2_CCNA2
Chapter_2_CCNA2Chapter_2_CCNA2
Chapter_2_CCNA2sunabozu
 

What's hot (19)

Easergy studio realeasenotesv8_0_0
Easergy studio realeasenotesv8_0_0Easergy studio realeasenotesv8_0_0
Easergy studio realeasenotesv8_0_0
 
IBM Flex System x240 Compute Node (E5-2600 v2)
IBM Flex System x240 Compute Node (E5-2600 v2)IBM Flex System x240 Compute Node (E5-2600 v2)
IBM Flex System x240 Compute Node (E5-2600 v2)
 
IBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23E
 
IBM Flex System x220 Compute Node
IBM Flex System x220 Compute NodeIBM Flex System x220 Compute Node
IBM Flex System x220 Compute Node
 
ESM High Availability Module User's Guide
ESM High Availability Module User's GuideESM High Availability Module User's Guide
ESM High Availability Module User's Guide
 
Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...
 
Installing Aix
Installing AixInstalling Aix
Installing Aix
 
T310 spec sheet
T310 spec sheetT310 spec sheet
T310 spec sheet
 
Aix install
Aix installAix install
Aix install
 
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
Intel Knights Landing Slides
Intel Knights Landing SlidesIntel Knights Landing Slides
Intel Knights Landing Slides
 
Intel
IntelIntel
Intel
 
Ex 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenEx 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chen
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Clear Linux OS - Architecture Overview
Clear Linux OS - Architecture OverviewClear Linux OS - Architecture Overview
Clear Linux OS - Architecture Overview
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
 
Scale Up Performance with Intel® Development
Scale Up Performance with Intel® DevelopmentScale Up Performance with Intel® Development
Scale Up Performance with Intel® Development
 
Chapter_2_CCNA2
Chapter_2_CCNA2Chapter_2_CCNA2
Chapter_2_CCNA2
 

Viewers also liked

Game designer hunt or how recruitment actually works
Game designer hunt or how recruitment actually worksGame designer hunt or how recruitment actually works
Game designer hunt or how recruitment actually worksDevGAMM Conference
 
Délibération de Prescription PLU.pdf
Délibération de Prescription PLU.pdfDélibération de Prescription PLU.pdf
Délibération de Prescription PLU.pdfjuxjux
 
Review Paper 11: KADASTER 3D UNTUK PENGOPTIMALAN PENDAFTARAN TANAH TERHADAP P...
Review Paper 11: KADASTER 3D UNTUK PENGOPTIMALAN PENDAFTARAN TANAH TERHADAP P...Review Paper 11: KADASTER 3D UNTUK PENGOPTIMALAN PENDAFTARAN TANAH TERHADAP P...
Review Paper 11: KADASTER 3D UNTUK PENGOPTIMALAN PENDAFTARAN TANAH TERHADAP P...National Cheng Kung University
 
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsEvaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsIT@Intel
 
Feel the origin - コーヒーの生産を知ろう
Feel the origin - コーヒーの生産を知ろうFeel the origin - コーヒーの生産を知ろう
Feel the origin - コーヒーの生産を知ろうYuma Kawano
 
Organizationl analysis using service to transform learning
Organizationl analysis   using service to transform learningOrganizationl analysis   using service to transform learning
Organizationl analysis using service to transform learningVicki Whiting
 
Hasil Diskusi Pra Rakerkesnas Provinsi Sulawesi Barat
Hasil Diskusi Pra Rakerkesnas Provinsi Sulawesi BaratHasil Diskusi Pra Rakerkesnas Provinsi Sulawesi Barat
Hasil Diskusi Pra Rakerkesnas Provinsi Sulawesi BaratMuh Saleh
 
Customer first - obsługa klienta w kanałach cyfrowych
Customer first - obsługa klienta w kanałach cyfrowychCustomer first - obsługa klienta w kanałach cyfrowych
Customer first - obsługa klienta w kanałach cyfrowychSquiz Poland
 
Profil Kesehatan Kabupaten Mamasa Tahun 2015
Profil Kesehatan Kabupaten Mamasa Tahun 2015Profil Kesehatan Kabupaten Mamasa Tahun 2015
Profil Kesehatan Kabupaten Mamasa Tahun 2015Muh Saleh
 
European mobile game market
European mobile game marketEuropean mobile game market
European mobile game marketICO Partners
 
Kickstarter and Games - September 2012
Kickstarter and Games - September 2012Kickstarter and Games - September 2012
Kickstarter and Games - September 2012ICO Partners
 
Profil kesehatan Sulawesi Barat 2015
Profil kesehatan Sulawesi Barat 2015Profil kesehatan Sulawesi Barat 2015
Profil kesehatan Sulawesi Barat 2015Muh Saleh
 
Visi misi dan tujuan puskesmas
Visi misi dan tujuan puskesmasVisi misi dan tujuan puskesmas
Visi misi dan tujuan puskesmasismail1981
 

Viewers also liked (20)

1st step
1st step1st step
1st step
 
Game designer hunt or how recruitment actually works
Game designer hunt or how recruitment actually worksGame designer hunt or how recruitment actually works
Game designer hunt or how recruitment actually works
 
Délibération de Prescription PLU.pdf
Délibération de Prescription PLU.pdfDélibération de Prescription PLU.pdf
Délibération de Prescription PLU.pdf
 
Review Paper 11: KADASTER 3D UNTUK PENGOPTIMALAN PENDAFTARAN TANAH TERHADAP P...
Review Paper 11: KADASTER 3D UNTUK PENGOPTIMALAN PENDAFTARAN TANAH TERHADAP P...Review Paper 11: KADASTER 3D UNTUK PENGOPTIMALAN PENDAFTARAN TANAH TERHADAP P...
Review Paper 11: KADASTER 3D UNTUK PENGOPTIMALAN PENDAFTARAN TANAH TERHADAP P...
 
THE_7_BASIC_ETHICS_OF_LIFE
THE_7_BASIC_ETHICS_OF_LIFETHE_7_BASIC_ETHICS_OF_LIFE
THE_7_BASIC_ETHICS_OF_LIFE
 
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsEvaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
 
Feel the origin - コーヒーの生産を知ろう
Feel the origin - コーヒーの生産を知ろうFeel the origin - コーヒーの生産を知ろう
Feel the origin - コーヒーの生産を知ろう
 
Bab ii
Bab iiBab ii
Bab ii
 
Organizationl analysis using service to transform learning
Organizationl analysis   using service to transform learningOrganizationl analysis   using service to transform learning
Organizationl analysis using service to transform learning
 
The Choice is Yours
The Choice is YoursThe Choice is Yours
The Choice is Yours
 
Lightupcoffee
LightupcoffeeLightupcoffee
Lightupcoffee
 
Hasil Diskusi Pra Rakerkesnas Provinsi Sulawesi Barat
Hasil Diskusi Pra Rakerkesnas Provinsi Sulawesi BaratHasil Diskusi Pra Rakerkesnas Provinsi Sulawesi Barat
Hasil Diskusi Pra Rakerkesnas Provinsi Sulawesi Barat
 
Customer first - obsługa klienta w kanałach cyfrowych
Customer first - obsługa klienta w kanałach cyfrowychCustomer first - obsługa klienta w kanałach cyfrowych
Customer first - obsługa klienta w kanałach cyfrowych
 
Profil Kesehatan Kabupaten Mamasa Tahun 2015
Profil Kesehatan Kabupaten Mamasa Tahun 2015Profil Kesehatan Kabupaten Mamasa Tahun 2015
Profil Kesehatan Kabupaten Mamasa Tahun 2015
 
European mobile game market
European mobile game marketEuropean mobile game market
European mobile game market
 
Analisa permasalahan Pada Pemetaan Partisipatif
Analisa permasalahan Pada Pemetaan PartisipatifAnalisa permasalahan Pada Pemetaan Partisipatif
Analisa permasalahan Pada Pemetaan Partisipatif
 
Your time start now
Your time start nowYour time start now
Your time start now
 
Kickstarter and Games - September 2012
Kickstarter and Games - September 2012Kickstarter and Games - September 2012
Kickstarter and Games - September 2012
 
Profil kesehatan Sulawesi Barat 2015
Profil kesehatan Sulawesi Barat 2015Profil kesehatan Sulawesi Barat 2015
Profil kesehatan Sulawesi Barat 2015
 
Visi misi dan tujuan puskesmas
Visi misi dan tujuan puskesmasVisi misi dan tujuan puskesmas
Visi misi dan tujuan puskesmas
 

Similar to How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology

E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case Intel IT Center
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Techtechnext1
 
Oracle forms and reports 11g installation on linux
Oracle forms and reports 11g installation on linuxOracle forms and reports 11g installation on linux
Oracle forms and reports 11g installation on linuxVenu Palakolanu
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureJim St. Leger
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Ceph Community
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetupHaidee McMahon
 
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...Kuralamudhan Ramakrishnan
 
Технологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхТехнологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхFujitsu Russia
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013IntelAPAC
 
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersITExamAnswers.net
 
NFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkNFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkMichelle Holley
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Michelle Holley
 
PowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUGPowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUGTaylor Riggan
 
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...Intel IT Center
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
Технологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиТехнологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиCisco Russia
 
Omni path-fabric-software-architecture-overview
Omni path-fabric-software-architecture-overviewOmni path-fabric-software-architecture-overview
Omni path-fabric-software-architecture-overviewDESMOND YUEN
 

Similar to How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology (20)

E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Tech
 
Oracle forms and reports 11g installation on linux
Oracle forms and reports 11g installation on linuxOracle forms and reports 11g installation on linux
Oracle forms and reports 11g installation on linux
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetup
 
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
 
Технологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхТехнологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данных
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013
 
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
 
NFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkNFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function Framework
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...
 
Howto Pxeboot
Howto PxebootHowto Pxeboot
Howto Pxeboot
 
PowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUGPowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUG
 
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
SR-IOV Introduce
SR-IOV IntroduceSR-IOV Introduce
SR-IOV Introduce
 
Технологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиТехнологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связи
 
Omni path-fabric-software-architecture-overview
Omni path-fabric-software-architecture-overviewOmni path-fabric-software-architecture-overview
Omni path-fabric-software-architecture-overview
 

More from IT@Intel

IT@Intel: Creating Smart Spaces with All-in-Ones
IT@Intel:  Creating Smart Spaces with All-in-OnesIT@Intel:  Creating Smart Spaces with All-in-Ones
IT@Intel: Creating Smart Spaces with All-in-OnesIT@Intel
 
Unlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsUnlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsIT@Intel
 
Intel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIntel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIT@Intel
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the GoIT@Intel
 
Enterprise Video Hosting: Introducing the Intel Video Portal
Enterprise Video Hosting:  Introducing the Intel Video PortalEnterprise Video Hosting:  Introducing the Intel Video Portal
Enterprise Video Hosting: Introducing the Intel Video PortalIT@Intel
 
Jamming on Collaboration
Jamming on CollaborationJamming on Collaboration
Jamming on CollaborationIT@Intel
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsIT@Intel
 
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelDeploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelIT@Intel
 
Nurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessNurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessIT@Intel
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecurityIT@Intel
 
It tools slideshare
It tools slideshareIt tools slideshare
It tools slideshareIT@Intel
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security SurviveIT@Intel
 

More from IT@Intel (13)

IT@Intel: Creating Smart Spaces with All-in-Ones
IT@Intel:  Creating Smart Spaces with All-in-OnesIT@Intel:  Creating Smart Spaces with All-in-Ones
IT@Intel: Creating Smart Spaces with All-in-Ones
 
Unlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsUnlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and Analytics
 
Intel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIntel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformation
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the Go
 
Enterprise Video Hosting: Introducing the Intel Video Portal
Enterprise Video Hosting:  Introducing the Intel Video PortalEnterprise Video Hosting:  Introducing the Intel Video Portal
Enterprise Video Hosting: Introducing the Intel Video Portal
 
Jamming on Collaboration
Jamming on CollaborationJamming on Collaboration
Jamming on Collaboration
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
 
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelDeploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
 
Nurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessNurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through Mindfulness
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
It tools slideshare
It tools slideshareIt tools slideshare
It tools slideshare
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security Survive
 

Recently uploaded

Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 

Recently uploaded (20)

Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 

How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology

  • 1. How to Self-Provision over WLAN with Intel® vPro™ Technology June 2013 Omer Livne, Intel IT
  • 2. 2 Legal Notices Copyright © 2013 Intel Corporation. All rights reserved. This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others. Copyright © 2013 Intel Corporation. All rights reserved.
  • 3. 3 Introduction Intel IT supports a worldwide computing environment that includes more than 100,000 PCs across 63 countries. More than 80 percent of the devices are mobile PCs that connect wirelessly to our network. Managing and securing these environments is a key IT priority. Intel IT has deployed Intel® vPro™ technology across our enterprise in order to help maintain, manage, and protect these PCs. 80% MOBILE DEVICES CONNECTED WIRELESSLY TO OUR NETWORK Intel IT supports >100,000 PCs Copyright © 2013 Intel Corporation. All rights reserved.
  • 4. 4 Background To activate the Intel® Active Management Technology (Intel® AMT) feature of Intel® vPro™ Technology, we provision the PCs using Intel® Setup and Configuration Software (Intel® SCS). Provisioning is required to be able to take advantage of the capabilities within Intel AMT. When employees are issued a new or replacement PC, the PC is provisioned by technicians in our IT service centers. Employees that participate in our Bring Your Own (BYO) PC program might also bring in a PC that is un-provisioned. Typically provisioning is handled automatically in the course of installing and configuring the OS build. On occasion, a PC may need to have the provisioning reinstalled after delivery to the employee. Copyright © 2013 Intel Corporation. All rights reserved.
  • 6. The Challenge We needed an easy way for technicians to provision Ultrabooks™ devices that do not have wired Ethernet ports. We wanted to create a simple and efficient way for employees to be able to self- provision their PCs, without having to take the PC to an IT Service Center. Intel IT created a tool that allows our technicians and employees to self-provision systems over the WLAN. Employees can now use this tool to self- provision their PC, regardless of whether it’s a corporate-issued PC or a Bring-Your-Own PC. 6 Copyright © 2013 Intel Corporation. All rights reserved.
  • 7. Why This Is Important Once the user’s PC is provisioned, our IT Service Center staff can help manage and troubleshoot issues on the PC. This allows them to provide the same level of service regardless of whether it is a WLAN-only corporate-owned device or an employee’s Bring- Your-Own (BYO) PC. As employees bring in more WLAN-only BYO devices, such as Ultrabook™ devices and Windows*-based tablets with Intel® Architecture, we expect to see more employees utilizing this tool and subsequently requiring less support from our IT Service Center. 7 Copyright © 2013 Intel Corporation. All rights reserved.
  • 9. How It Works Host-Based Configuration on Demand (HBCoD) is a tool that utilizes the host-based configuration ability in Intel® Setup and Configuration Software, which is provided by the Intel® Active Management Technology Configuration Utility (ACU). The tool is available through our intranet software library and is available to all employees. When run, the tool copies the necessary files to the employee’s PC and executes a batch file that performs several functions before running ACUConfig.exe to provision the client. 9 Copyright © 2013 Intel Corporation. All rights reserved.
  • 10. 10 The Technical Details HBCoD self-provisioning process consists of four major steps: 1. HBCoD copies the necessary files to the local hard drive into c:temp 2. HBCoD launches a batch file with the necessary instructions 3. The batch file sets the value for variables used in the commands 4. The commands use the variables to perform two configurations of the system with logging and error checking Copyright © 2013 Intel Corporation. All rights reserved.
  • 11. 11 Step 1: Copy the necessary file to the local hard drive In our case, we have chosen to copy the necessary files to c:temp, but any location will work. The files that need to be copied are: • ACU.dll • ACUConfig.exe • ConfigureNowHBC.bat • Initial HBC.xml This can be done using a batch file called HBCoD.BAT, which is written as such: : HBCOD stands for Host-Based Configuration on Demand : This batch file copies the SCS configurator files to the local machine into the : C:tempACU_Configurator folder : And triggers configuration by running ConfigureNow.bat that contains the configuration commands @echo off xcopy %~dp0.. "c:tempACU_Configurator" /e /i /h /d /y c: cd tempACU_Configurator Start ConfigureNowHBC.bat Copyright © 2013 Intel Corporation. All rights reserved.
  • 12. 12 Step 2: Launch a batch file with the necessary instructions The last line of the HBCoD.BAT file Start ConfigureNowHBC.bat executes another batch file named ConfigureNowHBC.BAT. This batch file is used to perform steps 3 and 4. Copyright © 2013 Intel Corporation. All rights reserved.
  • 13. 13 Steps 3 and 4: Set Variable values and execute commands with logging and error checking At a high-level, this batch file performs the following functions: 1. Checks for and creates (if necessary) C:IntelAMTlogs directory 2. Sets the MyServer variable to the FQDN of the appropriate provisioning server 3. Sets the MyProfile variable to the Remote Configuration Service (RCS) profile to be used by the provisioning server 4. Sets the MyConfigFile variable to the XML file that contains the provisioning profile, Initial HBC.xml 5. Performs an initial configuration over the WLAN using a temporary profile to enable wireless Intel® Active Management Technology using the ConfigAMT switch for ACUConfig.exe 6. Performs a final RCS configuration that properly configures the client using the ConfigViaRCSOnly switch for ACUConfig.exe 7. Performs error checking Copyright © 2013 Intel Corporation. All rights reserved.
  • 14. 14 Steps 3 and 4: Set Variable values and execute commands with logging and error checking The primary functions are 5 and 6. 5. Performs an initial configuration over the WLAN using a temporary profile to enable wireless Intel® Active Management Technology using the ConfigAMT switch for ACUConfig.exe 6. Performs a final RCS configuration that properly configures the client using the ConfigViaRCSOnly switch for ACUConfig.exe Note that in function 5, the client is provisioned with an initial configuration using a digest password and another password used to encrypt the XML file, both of which are in this case, P@ssw0rd. Use the ACUWizard.exe to create the Initial HBC.XML file and refer to the Intel® Setup and Configuration Software Deployment Guide for more information. Copyright © 2013 Intel Corporation. All rights reserved.
  • 15. 15 HBC.XML Configuration Below is an example of how the initial HBC.XML file is configured: Copyright © 2013 Intel Corporation. All rights reserved.
  • 16. 16 Remote Configuration Service Server Configuration In function 6 (below) the system is configured again from the RCS server during which the digest password is either removed or replaced, depending on the configuration of the provisioning profile “MyProfile” on the RCS provisioning server “MyServer”. 6. Performs a final RCS configuration that properly configures the client using the ConfigViaRCSOnly switch for ACUConfig.exe If detailed logging and error checking are not required, the batch file can be simplified considerably by editing the file to perform only functions 5 and 6 without the use of variables. Copyright © 2013 Intel Corporation. All rights reserved.
  • 17. 17 Contents of ConfigureNowHBC.bat: cd.. Color FC echo ************************************************************ echo This action takes about 2-5 minutes. echo It may take longer depending on bandwidth echo and distance from the configuration server. echo !!!Very important: You have to be connected via Wireless LAN!!! echo If you haven't already done so, echo DISCONNECT LAN and CONNECT to WLAN now echo and wait until you get an IP address echo ************************************************************ PAUSE Color f If exist %SystemDrive%IntelAMTlogs goto Cont MD %SystemDrive %IntelAMTlogs :Cont SET APPNAME=AMTHBCOD SET MyServer="[FQDN of your provisioning server]" SET MyProfile="[name of desired RCS profile]" SET MyConfigFile="Initial HBC.xml" :DecryptionPassword in command below matches the password used in SCS to encrypt the XML file Call ACUConfig.exe /verbose /output console /output file %SystemDrive %IntelAMTlogsHBOCLog.txt ConfigAMT %MyConfigFile% /DecryptionPassword P@ssw0rd IF NOT ERRORLEVEL 0 GOTO ERROR Call ACUConfig.exe /verbose /output console /output file %SystemDrive %IntelAMTlogsRCSLog.txt ConfigViaRCSOnly %MyServer% %MyProfile% SET INSTALLATIONERRORLEVEL=%ERRORLEVEL% ECHO %DATE%:%TIME% - %APPNAME% ConfigViaRCSOnly returned: [%INSTALLATIONERRORLEVEL%] Copyright © 2013 Intel Corporation. All rights reserved. The sample text for the ConfigureNowHBC.bat file is located here.
  • 18. 18 Contents of ConfigureNowHBC.bat: :----------------------------- IF "%ERRORLEVEL%" == "0" Goto ENDGood IF "%ERRORLEVEL%" == "32" Goto ENDGood IF "%ERRORLEVEL%" == "101" Goto ENDGood IF "%ERRORLEVEL%" == "108" Goto ENDGood :ERROR Color FC echo ************************************* echo Please check the error message above. echo ************************************* GOTO EndErr :EndErr Color FC SET INSTALLATIONERRORLEVEL=%ERRORLEVEL% ECHO %DATE%:%TIME% - %APPNAME% installation returned: [%INSTALLATIONERRORLEVEL%] echo This program will now exit PAUSE EXIT /b 1 :ENDGood Color A echo ************************************* echo Congrats! You are now AMT configured echo ************************************* echo echo ************************************* echo This program will now exit echo ************************************* PAUSE EXIT 0 Copyright © 2013 Intel Corporation. All rights reserved. The sample text for the ConfigureNowHBC.bat file is located here.
  • 19. 19 Learn More Intel® Setup and Configuration Software (Intel® SCS) Intel® Setup and Configuration Software (Intel® SCS) allows you to discover, set up and configure, and maintain a secure connection to every managed device on your network. Using Intel SCS is an easy process for unlocking the features and the value of systems with Intel® processors with Intel® vPro™ technology. Download the free software or view the training wizard online. Intel® vPro™ Technology: Proven Value in Four Use Cases To increase our ability to maintain, manage, and protect PCs while decreasing management costs, in 2011 Intel IT completed deployment of Intel® vPro™ technology across the entire enterprise. We have evaluated the business value of four use cases based on Intel vPro technology that have been deployed at Intel. • An enterprise-scale solution for remote management of self-encrypting drives • Remote passphrase reset • Keyboard-Video-Mouse (KVM) remote control • ISO mounts In each case, we found that Intel vPro technology reduces management costs and decreases downtime, resulting in greater employee productivity. Copyright © 2013 Intel Corporation. All rights reserved.
  • 20. 20 Learn More Managing Intel® Solid-State Drives Using Intel® vPro™ Technology Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution improves user experience, increases encryption compliance, and reduces support issues. This new solution is based on two Intel® technologies: self-encrypting Intel® Solid-State Drives and Intel® Active Management Technology, part of Intel® vPro™ technology. Configuration Tips for Managing Mobile PCs with Intel® vPro™ Technology To improve our ability to use certain remote management features of Intel® Active Management Technology (Intel® AMT) a component of Intel® vPro™ technology, Intel IT worked with Intel’s software development team to develop ways to enhance Intel® Setup and Configuration Software (Intel® SCS), a tool used with Intel AMT. By combining the updated version that resulted, Intel SCS 7, with our existing client management console, we created a highly available, agile configuration and maintenance environment for our mobile systems. This solution improves our ability to configure and maintain mobile PCs on demand with Intel AMT and keep them configured throughout their on-the- go life cycles for our customers. Copyright © 2013 Intel Corporation. All rights reserved.
  • 21. Discover Intel IT’s strategies and initiatives that are accelerating Intel’s growth and delivering business value. IT Annual Performance Report 2012 Initiatives and 2013 Priorities www.intel.com/go/ITAnnualReport
  • 22. Learn more about Intel IT’s initiatives at www.intel.com/IT Sharing Intel IT Best Practices with the World Assessment Tools CIO and IT PerspectiveIT Papers IT-to-IT Community