Overview of how one college took control of its desktop environment using Microsoft's SCCM for imaging and improved user satisfaction, quality, and reduced support demands and costs.
SCCM Intune Windows 10 Co Management Architecture DecisionsAnoop Nair
SCCM Intune Windows 10 Co Management Architecture Decisions by Rajul and Anoop
https://www.anoopcnair.com/download-powerpoint-slides-bitpro-gab-2018-overview/
SCCM Intune Windows 10 Co Management Architecture DecisionsAnoop Nair
SCCM Intune Windows 10 Co Management Architecture Decisions by Rajul and Anoop
https://www.anoopcnair.com/download-powerpoint-slides-bitpro-gab-2018-overview/
Software metricsIntroduction
Attributes of Software Metrics
Activities of a Measurement Process
Types
Normalization of Metrics
Help software engineers to gain insight into the design and construction of the software
Activities of a Measurement Process
To answer this we need to know the size & complexity of the projects.
But if we normalize the measures, it is possible to compare the two
For normalization we have 2 ways-
Size-Oriented Metrics
Function Oriented Metrics
Part of a series introducing desktop delivery technologies. This talk introduced Remote Desktops Services (RDS) in Windows Server 2012. It explains what is Virtual Desktop Infrastructure (VDI), how applications are deliver, covers some key challenges including management and monitoring. It wraps up with where you can find out more including courses and MVA.
Cloud computing and Integration consists of hardware and software resources made available on the Internet as managed third-party services, in a pay-per-use model , offering scalability and close alignment to actual demand.
A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
Administering and configuring System Center Configuration Manager 2012 R2 SP1Unitek Eduation
-Configuring and deploying SCCM 2012 R2
-Data Quering using WQL and gathering collections
-Configuring Software and Hardware Inventory, asset intelligence and software metering.
Software metricsIntroduction
Attributes of Software Metrics
Activities of a Measurement Process
Types
Normalization of Metrics
Help software engineers to gain insight into the design and construction of the software
Activities of a Measurement Process
To answer this we need to know the size & complexity of the projects.
But if we normalize the measures, it is possible to compare the two
For normalization we have 2 ways-
Size-Oriented Metrics
Function Oriented Metrics
Part of a series introducing desktop delivery technologies. This talk introduced Remote Desktops Services (RDS) in Windows Server 2012. It explains what is Virtual Desktop Infrastructure (VDI), how applications are deliver, covers some key challenges including management and monitoring. It wraps up with where you can find out more including courses and MVA.
Cloud computing and Integration consists of hardware and software resources made available on the Internet as managed third-party services, in a pay-per-use model , offering scalability and close alignment to actual demand.
A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
Administering and configuring System Center Configuration Manager 2012 R2 SP1Unitek Eduation
-Configuring and deploying SCCM 2012 R2
-Data Quering using WQL and gathering collections
-Configuring Software and Hardware Inventory, asset intelligence and software metering.
GSS America\'s Workplace Services aim at equipping customer’s business with round-the-clock support, through its Global Operations Command Center (GOCC). Its comprehensive range of workplace services gives customers the ability to reduce their costs and improve their service levels. GSS intends to help global enterprises cut down on their infrastructure maintenance costs and provide access to expert skills.
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office Cicero, Inc.
Desktop Analytics is the new Quality Assurance “employee” delivering empirical, objective data about how your people, processes and technology help or hurt service delivery.
This file was recently published to the local community two months back. And now opening to the generic access. The document discusses about high level deployment scenario of VDI solution jointly formed by Microsoft & Citrix. A 700 user-base was assumed and a scalability of 4500 user-base scale-up model was provided using DELL & HP hardware.
Over the several years of experience on the Microsoft product SCCM, Easy Center Corp leveraged this expertise by focusing in the development of My Easy Center software. A new console to administer, easily and securely, the computer management key tool of Microsoft.
Agile and continuous delivery – How IBM Watson Workspace is builtVincent Burckhardt
Journey and transformations that we have been taking at IBM to implement Cloud Native application. Covers culture, architecture and pipeline changes. This presentation was given at IBM Connect 2017 in San Francisco in Feb 2017.
xRM is the natural evolution of CRM. Businesses are expanding their use of new generation CRM solutions to manage a wider range of scenarios, including asset management, prospect management, citizen management, and many more. Microsoft CRM sits on the .NET platform and because of that, it is much more than a traditional CRM product. Instead, think of Microsoft CRM is as a rapid development application with out of the box CRM functionality. The purpose of this session is to understand Microsoft's CRM strategy and how you get to market first with world class business solutions.
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld
VMworld 2013
Issy Ben-Shaul, VMware
Hanan Stein, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
My presentation on MMS2011 in Las Vegas. Would you like to gain additional insight to the various best practices that other Application Virtualization customers are doing? This session will provide you with an opportunity to obtain insight from Application Virtualization MVPs with over 10 years of experience in the field. The objective of the session is to expose you to the numerous best practices, challenges and solutions that have been witnessed in the field in Application Virtualization.
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld
VMworld 2013
Thirumalesh Reddy, VMware
Padmaja Vrudhula, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Continuous Delivery of a Cloud Deployment at a Large Telecommunications ProviderM Kevin McHugh
We deployed IBM SmartCloud Orchestrator at a Large Telecommunications Provider. We used Agile. This presentation details the decisions we made and lessons we learned over the course of the deployment.
Similar to Desktop Management Using Microsoft SCCM (20)
This presentation provides and overview of 34CFR668 for HEOA P2P requirements. It is offered in concert with an assessment program also on SlideShare and the post on blog.thehigheredcio.com.
Developing an IT Service Strategy Part 1 Describing the ChallengeJerry Bishop
Part 1 of this 2 part set covering the challenge of defining an IT Service Strategy. This presentation is supported by the posts at blog.thehigheredcio.com and is intended to be interactive with stakeholders.
Outlines the IT project Request process supported by the SharePoint file and Budget From also in SlideShare. follows the model outlined in previous uploads on IT governance and Portfolio Management
This presentation is intended to assist CIO's with setting up a formal IT Governance model for their college or university. There are two companion files also in Slideshare linked at the end of an IT Governance Committee Charter and an IT Project Governance Guideline.
IT Project Portfolio Planning Using ExcelJerry Bishop
To provide a simple and transparent paper-based method for setting up an IT project portfolio using Excel.
Excel Workbook for this presentation also in my Slideshare uploads.
This presentation was developed for the 2011 AFCOM Data Center World conference as a case study. It outlines the the decision by one college to not build a new data center and instead develop a strategy to leverage off premise solutions including the Cloud.
Overview of the emergence and advancement of crowdsourcing for commercial and social uses. Presentation mostly emphasizes current uses and the firms supporting the business model. Presenters are encourage to spend some time with a few of these sites as a clickworker to get a good understanding of the models.
This presentation depicts the comprehensive tiered support model developed for the implementation of Epic at Froedtert and Community Health and the Medical College of Wisconsin. The model demonstrates the relationship between hospital based support, informatics support, and technical support by IT. This approach was determined to be optimal in balancing the clinical requirements with the optimal technical support for the users.
This is a companion to the written Application Plan (Available on request). The presentation outlines the main elements of an application road map aimed at realizing the vision of a shared services model for Froedtert and Community Health and the Medical College of Wisconsin.
This presentation provide two approaches to addressing the lifecycle refresh requirements for a colleges multi-mediated teaching stations. The approach demonstrate show to solve the issues when it is budgetary and there is a need for consistency in the technology.
This presentation was used to obtain funding to refresh 50% of the desktop inventory (~1100 units) in FY11 and obtain support for increasing utilization of existing assets through improved computer lab scheduling.
This presentation was developed for NIACC to summarize the ~$17M BTOP stimulus grant award to the CINC community area network that CVTC is a member of and illustrate how NIACC might pursue similar grants. Several slides containing map images are intended to be shown directly from Google Earth KMZ recordings which can be requested.
Workshop on using Google's Advanced Search features to improve results. Works best when done as a workshop in a computer lab. Delivered several times to college faculty and staff with great results.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. This presentations supports telling the story of how one college reworked its desktop imaging and management strategy around Microsoft’s System Center Configuration Manager (SCCM) and related products to increase user satisfaction and dramatically reduce support demand and support costs. Additional information about the changes, tools and strategy can be found in The Higher Ed CIO blog. About
11. Historical Desktop Pain Points Computer labs had Deepfreeze replaced with a GPO approach to managing them Faculty had lost local admin in their labs Imaging a PC took ~2 hrs, 5+ hrs for several labs still may not be right Fixing the issues could take days Reimaging Labs could take weeks to get right impacting instruction
12. The Challenge Image any device (PC, laptop, tablet, Netbook, or server) from bare metal without errors Required Outcomes Improve user experience Shorten time to image Support scale Eliminate complexity Reduce support demand & cost Deliver self-service application installs It must be “Gute-Proof”
13. 3 Factors Driving the Strategy IT Staffing Model Complexity of Desktop Imaging Geography of College District
14. Staffing Model Imaging plan must allow for: Part-time entry-level techs Lower headcount Lower cost It must be “Gute-Proof” Kyle “The Gute” Gutenberger
15. Complexity of Desktop Scale 2200 PCs 37 models 5 platforms Growth Projections Mobile Devices Non-College Devices
18. Geography of College’s District 12 Campus Locations (Rural Western Wisconsin) 120 miles East-West and 70 miles North-South 10 Counties, 5500 square miles Rhode Island – 1214 square miles Delaware – 2026 square miles Connecticut – 5506 square miles Dispatching tech to the farthest remote campuses 2 hrs 15 min round trip (not counting stops) $126 direct costs (mileage and windshield time)
20. System Center Configuration Manager SCCM 2007 is a major upgrade of SMS functionality that provides features for OS Deployment Internet-based client management WSUS integration for software update management Service windows/collection variables
21. What is SCCM capable of? Configuration Management Patch management Software distribution Operating system deployment Hardware and software inventory Power Management
23. PXE Boot Pre-Boot Execution Environment Allows bare metal imaging Cuts imaging time in half Simplifies process
24. “Gute-Proof” Imaging What “Gute” has to know: Press F12, Bot from NIC PXE Password Lab or Staff Computer Computer Name “Gute” doesn’t have to know: What drivers are needed How to install the software What software is needed How to install the OS
26. Task Sequences Overview Core mechanism for controlling all OS deployment operations Sequence of steps to execute Steps prior to deploying new OS Steps to deploy new OS Steps after the new OS is deployed Completely hands-off for full automation of the process
29. Driver Packages View shows collections built by SCCM Admin Changes with Windows 7 Windows 7 dynamically pulls drivers from SCCM collection or web.
30. Application Virtualization - App-V Microsoft Application Virtualization (App-V) Allows less testing when packaging applications App-V packages can be applied to other OS’s with little or no change There is no “Install” or “Uninstall” so OS doesn’t get changed Packaging can be easier with some apps
33. Maintenance Process Labs: automated nightly maintenance sequence Wake on LAN Initiates Deepfreeze Thaws McAfee Updates Reapply DATs All software and updates get installed at that time Staff: automated real-time updates Monthly update cycle for patches and changes 3-tier model: test group, power users, all users 5-days to apply then updates are forced
34. Software Update Management Compliance assessment Security updates / vulnerability assessment Application updates Update deployment Full Microsoft update content Zero-day and routine deployments Simplified admin experience Manage non-Microsoft software updates OEMs and software vendors (ISVs) Internally-developed applications
37. Application Deployment Over the summer, 215 software applications were packaged SCCM made it easy to quickly and remotely deploy software to any college computer Many hours saved Improved service delivery
43. Current Changes Rolling Out Currently rolling out new Integrated Platform BranchCache User State Migration Toolkit (USMT) Application Compatibility Toolkit (ACT) Complete changes to Task Sequence Full Windows 7 Integration Collapse driver collections User Self-Service Web Site
44. Near Term Changes Simplify Toolset and Reduce Costs Migrate PGP Disk encryption over to Bitlocker Migrate McAfee Enterprise over to Forefront EndPoint Migrate Verdiem Surveyor power management to SCCM Rationalize Application Delivery Strategy Migrate some Citrix functions to App-V with Applocker Prepare for VMM and SCCM 2012 Complete Quick ROI/TCO on Windows Intune
Error-free imaging allowed us to save time and money.
We had a problem and we needed to solve it. The same problem many of you may be struggling with. The management of our desktop was a mess. Customer satisfaction was in the tank. We had more devices and more people to support. Due to budget cuts and high turnover, we had fewer desktop technicians, many with very little experience. We needed a way to simplify our imaging process. We chose to implement (rather re-implement, or correctly implement) SCCM (Microsoft’s System Center Configuration Manager) as our desktop management solution. It not only simplified our imaging process, it helped us in many other areas as well.What do I hope you take away from today’s presentation? If you are where we were a year ago, know there is a solution out there. We had a problem and we knew it. We made a commitment to solve it and we did. Are we special…NO…well, Jerry is, but I’m not. Our commitment was to deliver error free imaging. We were able to do that using SCCM.
Let me tell you how it was.
WHY?IT could not deliver consistent repeatable results when touching the desktopUsed Ghost, tried Altirus, moved everything to Citrix, used SCCM as ghost
The statement at the top of this slide was our initial goal using SCCM – to provide error free imaging. It allowed us to save time and money.
Our inventory was a nightmare. 5 different platforms, 37 different models.
This was our old way of imaging. It was complex and prone to errors.
This is our imaging process now. Out of the box, plug it in, PXE boot, name it, OU, collections, advertise software.
Round trip to-from River falls3 hours of windshield time and 130 miles3 hours of labor * $20 = $60130 miles @ .51 = $66Total trip cost = $126
A systems management solution by Microsoft for managing large groups of Windows-based computer systems. Configuration Manager provides remote control, patch management, software distribution, operating system deployment, network access protection, and hardware and software inventory.
Boot computers using a network interface independently of data storage devices (i.e. disks) or installed operating systems.
This is the task sequence Kren built.
Allows applications to be deployed in real-time to any client from a virtual application server. It removes the need for local installation of applications.
This is the Software Update module of SCCM. The updates are separated into test groups. Each test group for servers are done one day a month controlled by a maintenance window. Each test group for desktop are done each week after Patch Tuesday. The graph Compliant percentage of each separate update.
Your CIO wants to know how many Dell 780’s and 760’s we have…piece of cake…