SlideShare a Scribd company logo
Empowering Marketing Solutions Teams
Luke Lofgren, Acxiom Corporation
@netwiz123 #GalaxZ17
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 2
The Data Foundation For The World's Best Marketers
• Acxiom enables people-based marketing everywhere
through a simple, open approach to connecting systems
and data that drives seamless customer experiences and
higher ROI. We believe data is the key to creating
meaningful interactions at scale between consumers and
the brands they love.
• Making It Safe And Easy To Activate Data Anywhere:
Innovation is constantly driving fragmentation and creating
data silos within modern marketing departments, causing
consumers to experience far too many marketing messages
that are disconnected, untargeted, and wasteful.
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 3
About Luke
Luke’s career has grown with Acxiom for the last decade
and a half. At Acxiom Luke has served in release readiness,
performance testing, and capacity/performance
engineering analysis roles. Currently he serves as Expert
Infrastructure Architect focused on monitoring for Acxiom’s
IT Automation group. Luke holds 18 industry certifications
and has a BS in Business Information Systems from John
Brown University. He has presented at technology
conferences eight times from 2007 to 2014 including being
published in the International Computer Measurement
Group conference proceedings and returns from
presenting at GalaxZ16. Luke is home based in Erie PA with
his wife of 19 years and has five kids ranging from ages
from eight to 17.
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 4
Bias…
Strong architecture
Flexible extensibility
…that works.
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 5
Zenoss @
• Not the most variety of anyone here,
but targeting the full solution stack
• Started out at 5.0.x and I can say now
you’re missing out if your not on 5
• Using the WinRM and SSH for high-
capability agentless monitoring
• Bringing in network devices is showing
incredible modeling power of Zenoss
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 6
Zenoss @
• Legacy migration is rough; Zenoss legacy
support is deep and flexible
• We’ve been saying our legacy monitoring is
obsolete for over half a decade
• With Zenoss we actually finally completed it
• Pursuing light’s-out operations: focused
Monitoring Engineering/Architecture team and
self-service and highly leveraged CMDB
integration
…the Zenoss team is 2.5 people.
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 7
Zenoss @
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 8
Zenoss @
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 9
Marketing Services Solutions
• It’s the high complexity, highly
customized, client focus solutions
• Traditionally many reasons to try and
duplicate and minimize IT
• Frustrated by “central” outages they
don’t understand
• Tied to old approaches to managing IT
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 10
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 11
Goals for Marketing Services
• They know when they are impacted
• We know when they are impacted
• We satisfy their desire to know about:
• Who else is impacted
• What things are occurring that
may be impacting them
Journey
@JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 13
Populate using the CMDB
• Acxiom highly restricts CI updates
• Tags were a way around it
• Tags are a little two flexible
• Have now added a CI attribute
“monitored by”
@JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 14
Control using the CMDB
• Lights out monitoring operations
• Disable based on CI status
• Maintenance using change ticket
schedule
• Allow “maintenance status”
without risk
@JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 15
Jump using the CMDB
• Integration will merge
• ID link will track title
changes
• Accessible via API
• Updatable via ZenDMD
@JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 16
“Collapse” event management
• Auto-Ticket all events that
action is taken INCLUDING
Operations
• Essentially automating event
management by filtering
incidents
• No “operations”
management of
notifications 90%+
• Self-service email support
@JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 17
Tight integration inspires confidence
• Event Log updates in Zenoss
synchronized to tickets
• Ticket notes show if event is
closed (or reopened!)
• Can’t make the issue “go
away” by closing
• Routing for:
• Device
• Hardware
• Application
• Operations
• Onboarding
@JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 18
Windows Better Without An Agent
• Yes you’re trying to login to
Windows using Linux
• HTTP authenticated via AD has
payload encrypted
• Once you get WinRM, then:
• Exchange
• MS SQL
• Lync
• IIS
• All services…
• Powershell scripting opportunities
@JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 19
Linux via SSH with SNMP for hardware
• Get core security approval for account approach
• Do not use the account for automation activities
(no changes avoid audit questions)
• Certificate login
• Restricted origin login
• Can restrict what commands
(don’t recommend due to continued features)
• Now you’re there; you can extend
• Out of band agents or SNMP
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 20
Network: hidden strength
• So thoroughly integrated it disappears
• Network used to “jazzy”
charts/animation
• What having your network devices in
Zenoss provides is instant collaboration
• High amount of control and immediate
activation of changes wins them over
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 21
Healthcheck
• Escape being subject to browser
capability UI “hell”
• Make your speed of implementation
fast
• Escape authentication needs
• Easily hit all levels in your infrastructure
• Put the work in the hands of those who
know the app best
• Stop the debate of if a particular failure
is okay or not
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 22
API posting of events
• Effective device match: long to short, use of IP
• Don’t be dependent on your email infrastructure
/Groups/Client/[Team]/dedicated
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 23
• All events including the ones the Marketing Services team responds to
• Automatic ticketing of all events that require action
• Can be reviewed by marketing services team as well as IT teams trying to understand
an active situation
• Synchronized with CMDB:
• Company Name
• Tags or TBD
• Get into using the API:
I tweak scripts instead of
drag and drop.
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 24
External synthetic
• Minimal
entry
• Events if
can’t
reach
Arrival
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 26
Dejavu?
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 27
Service Status
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 28
Service Impact expectations
• Segregation of events at a device level
• Alert when things are actually affected
• Put events in context
• Drive the Acxiom Service Status
Dashboard
• Allow them to visualize a whole new
way to agree to SLAs
@netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 29
Goals for Marketing Services
• They know when they are impacted
• We know when they are impacted
• We satisfy their desire to know about:
• Who else is impacted
• What things are occurring that
may be impacting them
Empowering Marketing Solutions Teams

More Related Content

What's hot

ThousandEyes at Zendesk
ThousandEyes at ZendeskThousandEyes at Zendesk
ThousandEyes at Zendesk
ThousandEyes
 
Practical DMD Scripting
Practical DMD Scripting Practical DMD Scripting
Practical DMD Scripting
Zenoss
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
MarcoTechnologies
 
Delivering Predictable Financial Services Applications over the Internet with...
Delivering Predictable Financial Services Applications over the Internet with...Delivering Predictable Financial Services Applications over the Internet with...
Delivering Predictable Financial Services Applications over the Internet with...
ThousandEyes
 
Lack of Automation Ruins Lives
Lack of Automation Ruins LivesLack of Automation Ruins Lives
Lack of Automation Ruins Lives
Zenoss
 
Oracle Public Cloud Operations from ThousandEyes Connect
Oracle Public Cloud Operations from ThousandEyes ConnectOracle Public Cloud Operations from ThousandEyes Connect
Oracle Public Cloud Operations from ThousandEyes Connect
ThousandEyes
 
ThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes EMEA - WebEx Performance MonitoringThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes
 
ThousandEyes Overview
ThousandEyes Overview ThousandEyes Overview
ThousandEyes Overview
ThousandEyes
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
ThousandEyes
 
Monitoring Consumer Digital Experience
Monitoring Consumer Digital ExperienceMonitoring Consumer Digital Experience
Monitoring Consumer Digital Experience
ThousandEyes
 
Managing Network Performance Within and Beyond Your Enterprise
Managing Network Performance Within and Beyond Your EnterpriseManaging Network Performance Within and Beyond Your Enterprise
Managing Network Performance Within and Beyond Your Enterprise
ThousandEyes
 
ThousandEyes EMEA - Salesforce Monitoring Best Practices
ThousandEyes EMEA - Salesforce Monitoring Best PracticesThousandEyes EMEA - Salesforce Monitoring Best Practices
ThousandEyes EMEA - Salesforce Monitoring Best Practices
ThousandEyes
 
Microsoft Azure Identity and ThousandEyes
Microsoft Azure Identity and ThousandEyesMicrosoft Azure Identity and ThousandEyes
Microsoft Azure Identity and ThousandEyes
ThousandEyes
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best Practices
ThousandEyes
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
BAKOTECH
 
Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...
Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...
Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...
CA Technologies
 
Modernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusionModernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusion
Riverbed Technology
 
Reverse Path Visibility with Agent-to-Agent Tests
Reverse Path Visibility with Agent-to-Agent TestsReverse Path Visibility with Agent-to-Agent Tests
Reverse Path Visibility with Agent-to-Agent Tests
ThousandEyes
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
Rana Zayed
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify Availability
ThousandEyes
 

What's hot (20)

ThousandEyes at Zendesk
ThousandEyes at ZendeskThousandEyes at Zendesk
ThousandEyes at Zendesk
 
Practical DMD Scripting
Practical DMD Scripting Practical DMD Scripting
Practical DMD Scripting
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
 
Delivering Predictable Financial Services Applications over the Internet with...
Delivering Predictable Financial Services Applications over the Internet with...Delivering Predictable Financial Services Applications over the Internet with...
Delivering Predictable Financial Services Applications over the Internet with...
 
Lack of Automation Ruins Lives
Lack of Automation Ruins LivesLack of Automation Ruins Lives
Lack of Automation Ruins Lives
 
Oracle Public Cloud Operations from ThousandEyes Connect
Oracle Public Cloud Operations from ThousandEyes ConnectOracle Public Cloud Operations from ThousandEyes Connect
Oracle Public Cloud Operations from ThousandEyes Connect
 
ThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes EMEA - WebEx Performance MonitoringThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes EMEA - WebEx Performance Monitoring
 
ThousandEyes Overview
ThousandEyes Overview ThousandEyes Overview
ThousandEyes Overview
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
 
Monitoring Consumer Digital Experience
Monitoring Consumer Digital ExperienceMonitoring Consumer Digital Experience
Monitoring Consumer Digital Experience
 
Managing Network Performance Within and Beyond Your Enterprise
Managing Network Performance Within and Beyond Your EnterpriseManaging Network Performance Within and Beyond Your Enterprise
Managing Network Performance Within and Beyond Your Enterprise
 
ThousandEyes EMEA - Salesforce Monitoring Best Practices
ThousandEyes EMEA - Salesforce Monitoring Best PracticesThousandEyes EMEA - Salesforce Monitoring Best Practices
ThousandEyes EMEA - Salesforce Monitoring Best Practices
 
Microsoft Azure Identity and ThousandEyes
Microsoft Azure Identity and ThousandEyesMicrosoft Azure Identity and ThousandEyes
Microsoft Azure Identity and ThousandEyes
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best Practices
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...
Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...
Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...
 
Modernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusionModernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusion
 
Reverse Path Visibility with Agent-to-Agent Tests
Reverse Path Visibility with Agent-to-Agent TestsReverse Path Visibility with Agent-to-Agent Tests
Reverse Path Visibility with Agent-to-Agent Tests
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify Availability
 

Similar to Empowering Marketing Solutions Teams

Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
Bomgar
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
Check Point Software Technologies
 
The digital natives are coming
The digital natives are comingThe digital natives are coming
The digital natives are coming
Sean Massey
 
Maximizing Team Productivity with Microsoft Office 365
Maximizing Team Productivity with Microsoft Office 365Maximizing Team Productivity with Microsoft Office 365
Maximizing Team Productivity with Microsoft Office 365
SWC Technology Partners
 
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
Coforge (Erstwhile WHISHWORKS)
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
How to Deliver an Exceptional End User Experience in your Citrix Environment
How to Deliver an Exceptional End User Experience in your Citrix EnvironmentHow to Deliver an Exceptional End User Experience in your Citrix Environment
How to Deliver an Exceptional End User Experience in your Citrix Environment
eG Innovations
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Insight Technology, Inc.
 
Expression Cloud Development Framework for Developers
Expression Cloud Development Framework for DevelopersExpression Cloud Development Framework for Developers
Expression Cloud Development Framework for Developers
Matthew McKinney
 
Synectiks Microservice Platform
Synectiks Microservice PlatformSynectiks Microservice Platform
Synectiks Microservice Platform
Papu Bhattacharya
 
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
VMware Tanzu
 
Seamless erp
Seamless erpSeamless erp
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
LaurenWendler
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
Bomgar
 
How to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspectiveHow to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
eG Innovations
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
Christine Ackley
 
Silicon Valley Salesforce & Hybrid IT Strategy Breakfast
Silicon Valley Salesforce & Hybrid IT Strategy BreakfastSilicon Valley Salesforce & Hybrid IT Strategy Breakfast
Silicon Valley Salesforce & Hybrid IT Strategy BreakfastInformatica Cloud
 
roomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptxroomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptx
ThousandEyes
 

Similar to Empowering Marketing Solutions Teams (20)

Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
The digital natives are coming
The digital natives are comingThe digital natives are coming
The digital natives are coming
 
Maximizing Team Productivity with Microsoft Office 365
Maximizing Team Productivity with Microsoft Office 365Maximizing Team Productivity with Microsoft Office 365
Maximizing Team Productivity with Microsoft Office 365
 
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
How to Deliver an Exceptional End User Experience in your Citrix Environment
How to Deliver an Exceptional End User Experience in your Citrix EnvironmentHow to Deliver an Exceptional End User Experience in your Citrix Environment
How to Deliver an Exceptional End User Experience in your Citrix Environment
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
 
Expression Cloud Development Framework for Developers
Expression Cloud Development Framework for DevelopersExpression Cloud Development Framework for Developers
Expression Cloud Development Framework for Developers
 
Synectiks Microservice Platform
Synectiks Microservice PlatformSynectiks Microservice Platform
Synectiks Microservice Platform
 
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
 
Seamless erp
Seamless erpSeamless erp
Seamless erp
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 
How to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspectiveHow to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspective
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
 
Silicon Valley Salesforce & Hybrid IT Strategy Breakfast
Silicon Valley Salesforce & Hybrid IT Strategy BreakfastSilicon Valley Salesforce & Hybrid IT Strategy Breakfast
Silicon Valley Salesforce & Hybrid IT Strategy Breakfast
 
roomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptxroomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptx
 

More from Zenoss

DevOps Introduction - AWS Boston Meetup - AWS Presentation
DevOps Introduction - AWS Boston Meetup - AWS PresentationDevOps Introduction - AWS Boston Meetup - AWS Presentation
DevOps Introduction - AWS Boston Meetup - AWS Presentation
Zenoss
 
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
Zenoss
 
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss PresentationTransforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Zenoss
 
Zenoss as Core Element for Video QOS
Zenoss as Core Element for Video QOS Zenoss as Core Element for Video QOS
Zenoss as Core Element for Video QOS
Zenoss
 
Troubleshooting Zenoss: A Support Perspective
Troubleshooting Zenoss:  A Support PerspectiveTroubleshooting Zenoss:  A Support Perspective
Troubleshooting Zenoss: A Support Perspective
Zenoss
 
TransUnion's Impact of Impact
TransUnion's Impact of ImpactTransUnion's Impact of Impact
TransUnion's Impact of Impact
Zenoss
 
Skeptics in the Church of Data: Getting Evangelical
Skeptics in the Church of Data: Getting EvangelicalSkeptics in the Church of Data: Getting Evangelical
Skeptics in the Church of Data: Getting Evangelical
Zenoss
 
Leveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service ToolLeveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service Tool
Zenoss
 
IT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNowIT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNow
Zenoss
 
Developing ZenPacks the Right Way: Introducing the SDK
Developing ZenPacks the Right Way: Introducing the SDK Developing ZenPacks the Right Way: Introducing the SDK
Developing ZenPacks the Right Way: Introducing the SDK
Zenoss
 
Dev Talk: Event Manipulation and Testing
Dev Talk: Event Manipulation and Testing Dev Talk: Event Manipulation and Testing
Dev Talk: Event Manipulation and Testing
Zenoss
 
Demystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service AssuranceDemystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service Assurance
Zenoss
 
A Vision for Transformation
A Vision for TransformationA Vision for Transformation
A Vision for Transformation
Zenoss
 
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT MonitoringJason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Zenoss
 
My ZaaS Life - University of Maryland University College
My ZaaS Life - University of Maryland University CollegeMy ZaaS Life - University of Maryland University College
My ZaaS Life - University of Maryland University College
Zenoss
 
ZenPack Development with Jane Curry
ZenPack Development with Jane CurryZenPack Development with Jane Curry
ZenPack Development with Jane Curry
Zenoss
 
General Electric Migrates to Zenoss 5.0
General Electric Migrates to Zenoss 5.0General Electric Migrates to Zenoss 5.0
General Electric Migrates to Zenoss 5.0
Zenoss
 
Zenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDBZenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss
 
The Enterprise Shift & The World of IT - ServiceNow's Chris Pope
The Enterprise Shift & The World of IT - ServiceNow's Chris PopeThe Enterprise Shift & The World of IT - ServiceNow's Chris Pope
The Enterprise Shift & The World of IT - ServiceNow's Chris Pope
Zenoss
 
Migrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web ServicesMigrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web Services
Zenoss
 

More from Zenoss (20)

DevOps Introduction - AWS Boston Meetup - AWS Presentation
DevOps Introduction - AWS Boston Meetup - AWS PresentationDevOps Introduction - AWS Boston Meetup - AWS Presentation
DevOps Introduction - AWS Boston Meetup - AWS Presentation
 
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
 
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss PresentationTransforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
 
Zenoss as Core Element for Video QOS
Zenoss as Core Element for Video QOS Zenoss as Core Element for Video QOS
Zenoss as Core Element for Video QOS
 
Troubleshooting Zenoss: A Support Perspective
Troubleshooting Zenoss:  A Support PerspectiveTroubleshooting Zenoss:  A Support Perspective
Troubleshooting Zenoss: A Support Perspective
 
TransUnion's Impact of Impact
TransUnion's Impact of ImpactTransUnion's Impact of Impact
TransUnion's Impact of Impact
 
Skeptics in the Church of Data: Getting Evangelical
Skeptics in the Church of Data: Getting EvangelicalSkeptics in the Church of Data: Getting Evangelical
Skeptics in the Church of Data: Getting Evangelical
 
Leveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service ToolLeveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service Tool
 
IT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNowIT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNow
 
Developing ZenPacks the Right Way: Introducing the SDK
Developing ZenPacks the Right Way: Introducing the SDK Developing ZenPacks the Right Way: Introducing the SDK
Developing ZenPacks the Right Way: Introducing the SDK
 
Dev Talk: Event Manipulation and Testing
Dev Talk: Event Manipulation and Testing Dev Talk: Event Manipulation and Testing
Dev Talk: Event Manipulation and Testing
 
Demystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service AssuranceDemystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service Assurance
 
A Vision for Transformation
A Vision for TransformationA Vision for Transformation
A Vision for Transformation
 
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT MonitoringJason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
 
My ZaaS Life - University of Maryland University College
My ZaaS Life - University of Maryland University CollegeMy ZaaS Life - University of Maryland University College
My ZaaS Life - University of Maryland University College
 
ZenPack Development with Jane Curry
ZenPack Development with Jane CurryZenPack Development with Jane Curry
ZenPack Development with Jane Curry
 
General Electric Migrates to Zenoss 5.0
General Electric Migrates to Zenoss 5.0General Electric Migrates to Zenoss 5.0
General Electric Migrates to Zenoss 5.0
 
Zenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDBZenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDB
 
The Enterprise Shift & The World of IT - ServiceNow's Chris Pope
The Enterprise Shift & The World of IT - ServiceNow's Chris PopeThe Enterprise Shift & The World of IT - ServiceNow's Chris Pope
The Enterprise Shift & The World of IT - ServiceNow's Chris Pope
 
Migrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web ServicesMigrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web Services
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Empowering Marketing Solutions Teams

  • 1. Empowering Marketing Solutions Teams Luke Lofgren, Acxiom Corporation @netwiz123 #GalaxZ17
  • 2. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 2 The Data Foundation For The World's Best Marketers • Acxiom enables people-based marketing everywhere through a simple, open approach to connecting systems and data that drives seamless customer experiences and higher ROI. We believe data is the key to creating meaningful interactions at scale between consumers and the brands they love. • Making It Safe And Easy To Activate Data Anywhere: Innovation is constantly driving fragmentation and creating data silos within modern marketing departments, causing consumers to experience far too many marketing messages that are disconnected, untargeted, and wasteful.
  • 3. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 3 About Luke Luke’s career has grown with Acxiom for the last decade and a half. At Acxiom Luke has served in release readiness, performance testing, and capacity/performance engineering analysis roles. Currently he serves as Expert Infrastructure Architect focused on monitoring for Acxiom’s IT Automation group. Luke holds 18 industry certifications and has a BS in Business Information Systems from John Brown University. He has presented at technology conferences eight times from 2007 to 2014 including being published in the International Computer Measurement Group conference proceedings and returns from presenting at GalaxZ16. Luke is home based in Erie PA with his wife of 19 years and has five kids ranging from ages from eight to 17.
  • 4. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 4 Bias… Strong architecture Flexible extensibility …that works.
  • 5. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 5 Zenoss @ • Not the most variety of anyone here, but targeting the full solution stack • Started out at 5.0.x and I can say now you’re missing out if your not on 5 • Using the WinRM and SSH for high- capability agentless monitoring • Bringing in network devices is showing incredible modeling power of Zenoss
  • 6. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 6 Zenoss @ • Legacy migration is rough; Zenoss legacy support is deep and flexible • We’ve been saying our legacy monitoring is obsolete for over half a decade • With Zenoss we actually finally completed it • Pursuing light’s-out operations: focused Monitoring Engineering/Architecture team and self-service and highly leveraged CMDB integration …the Zenoss team is 2.5 people.
  • 7. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 7 Zenoss @
  • 8. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 8 Zenoss @
  • 9. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 9 Marketing Services Solutions • It’s the high complexity, highly customized, client focus solutions • Traditionally many reasons to try and duplicate and minimize IT • Frustrated by “central” outages they don’t understand • Tied to old approaches to managing IT
  • 10. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 10
  • 11. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 11 Goals for Marketing Services • They know when they are impacted • We know when they are impacted • We satisfy their desire to know about: • Who else is impacted • What things are occurring that may be impacting them
  • 13. @JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 13 Populate using the CMDB • Acxiom highly restricts CI updates • Tags were a way around it • Tags are a little two flexible • Have now added a CI attribute “monitored by”
  • 14. @JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 14 Control using the CMDB • Lights out monitoring operations • Disable based on CI status • Maintenance using change ticket schedule • Allow “maintenance status” without risk
  • 15. @JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 15 Jump using the CMDB • Integration will merge • ID link will track title changes • Accessible via API • Updatable via ZenDMD
  • 16. @JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 16 “Collapse” event management • Auto-Ticket all events that action is taken INCLUDING Operations • Essentially automating event management by filtering incidents • No “operations” management of notifications 90%+ • Self-service email support
  • 17. @JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 17 Tight integration inspires confidence • Event Log updates in Zenoss synchronized to tickets • Ticket notes show if event is closed (or reopened!) • Can’t make the issue “go away” by closing • Routing for: • Device • Hardware • Application • Operations • Onboarding
  • 18. @JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 18 Windows Better Without An Agent • Yes you’re trying to login to Windows using Linux • HTTP authenticated via AD has payload encrypted • Once you get WinRM, then: • Exchange • MS SQL • Lync • IIS • All services… • Powershell scripting opportunities
  • 19. @JohnSmith © 2017 All Rights Reserved CONFIDENTIAL 19 Linux via SSH with SNMP for hardware • Get core security approval for account approach • Do not use the account for automation activities (no changes avoid audit questions) • Certificate login • Restricted origin login • Can restrict what commands (don’t recommend due to continued features) • Now you’re there; you can extend • Out of band agents or SNMP
  • 20. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 20 Network: hidden strength • So thoroughly integrated it disappears • Network used to “jazzy” charts/animation • What having your network devices in Zenoss provides is instant collaboration • High amount of control and immediate activation of changes wins them over
  • 21. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 21 Healthcheck • Escape being subject to browser capability UI “hell” • Make your speed of implementation fast • Escape authentication needs • Easily hit all levels in your infrastructure • Put the work in the hands of those who know the app best • Stop the debate of if a particular failure is okay or not
  • 22. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 22 API posting of events • Effective device match: long to short, use of IP • Don’t be dependent on your email infrastructure
  • 23. /Groups/Client/[Team]/dedicated @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 23 • All events including the ones the Marketing Services team responds to • Automatic ticketing of all events that require action • Can be reviewed by marketing services team as well as IT teams trying to understand an active situation • Synchronized with CMDB: • Company Name • Tags or TBD • Get into using the API: I tweak scripts instead of drag and drop.
  • 24. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 24 External synthetic • Minimal entry • Events if can’t reach
  • 26. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 26 Dejavu?
  • 27. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 27 Service Status
  • 28. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 28 Service Impact expectations • Segregation of events at a device level • Alert when things are actually affected • Put events in context • Drive the Acxiom Service Status Dashboard • Allow them to visualize a whole new way to agree to SLAs
  • 29. @netwiz123 © 2017 All Rights Reserved CONFIDENTIAL 29 Goals for Marketing Services • They know when they are impacted • We know when they are impacted • We satisfy their desire to know about: • Who else is impacted • What things are occurring that may be impacting them