This document discusses using System Center Service Manager 2012 to enable self-service private cloud management. It provides an overview of IT service management for the cloud and how ITSM can support both business users and datacenter administrators. It demonstrates how Service Manager can be used to define service catalogs, automate request workflows using Orchestrator runbooks, and integrate with other System Center products like Virtual Machine Manager to deploy virtual machines and services. The goal is to provide IT as a service and enable self-service provisioning and management of cloud resources through standardized and automated processes.
You don’t have to embrace the Private Cloud to take advantage of the powerful tools in SC2012!
View C/D/H’s slide deck and learn how to enable an automated helpdesk solution with Service Manager, the Self-Service Portal, Orchestrator, Configuration Manager, and Operations Manager.
Let us help you automate simple, repetitive, but time consuming tasks so you can focus on strategic projects like operating system deployment, proactive monitoring, and standardization!
Infrastructure components configure and deploy 24 hiapc fabrizio volpeFabrizio Volpe
Infrastructure components configure and deploy
In collaboration with IEEE Computer Society, the Cloud Security Alliance and Dell, Microsoft is hosting a 24 Hours in a Private Cloud virtual event
Intergen Twilight Seminar: Infrastructure Management made easyIntergen
The deployment, management and operation of software and infrastructure across organisations is critical to ensure you get the maximum benefit from your investments.
Microsoft recognises that this extends from the desktop to the datacentre and that it is a critical factor for organisations wanting information technology to be an enabler for their business. The Microsoft Systems Centre Suite provides management of physical, virtual and mobile IT environments for enterprises and mid-sized organisations.
This session was presented by industry recognised experts Mark Fenwick and Andrew Kosmadakis and includes information from the recent Microsoft Management Summit.
If you are a CFO/CIO or have responsibility for Infrastructure Management and deployment then this presentation should be of interest to you.
Great news for Systems Center 2012 customers. With the aim of making System Center more cloud-friendly, Microsoft has made changes to the way that the licensing model for this popular product works. What used to be an extremely complex licensing system has been made much easier for clients to understand and manage. This presentation provides a quick overview of what these key updates are and work with a Softchoice Microsoft specialist to understand your needs under this new model moving forward.
You don’t have to embrace the Private Cloud to take advantage of the powerful tools in SC2012!
View C/D/H’s slide deck and learn how to enable an automated helpdesk solution with Service Manager, the Self-Service Portal, Orchestrator, Configuration Manager, and Operations Manager.
Let us help you automate simple, repetitive, but time consuming tasks so you can focus on strategic projects like operating system deployment, proactive monitoring, and standardization!
Infrastructure components configure and deploy 24 hiapc fabrizio volpeFabrizio Volpe
Infrastructure components configure and deploy
In collaboration with IEEE Computer Society, the Cloud Security Alliance and Dell, Microsoft is hosting a 24 Hours in a Private Cloud virtual event
Intergen Twilight Seminar: Infrastructure Management made easyIntergen
The deployment, management and operation of software and infrastructure across organisations is critical to ensure you get the maximum benefit from your investments.
Microsoft recognises that this extends from the desktop to the datacentre and that it is a critical factor for organisations wanting information technology to be an enabler for their business. The Microsoft Systems Centre Suite provides management of physical, virtual and mobile IT environments for enterprises and mid-sized organisations.
This session was presented by industry recognised experts Mark Fenwick and Andrew Kosmadakis and includes information from the recent Microsoft Management Summit.
If you are a CFO/CIO or have responsibility for Infrastructure Management and deployment then this presentation should be of interest to you.
Great news for Systems Center 2012 customers. With the aim of making System Center more cloud-friendly, Microsoft has made changes to the way that the licensing model for this popular product works. What used to be an extremely complex licensing system has been made much easier for clients to understand and manage. This presentation provides a quick overview of what these key updates are and work with a Softchoice Microsoft specialist to understand your needs under this new model moving forward.
TechEd 2012 NA - MGT332 - fighting fire to the cloud!wwwally
IT Admins are responding to incidents on a day-to-day basis, but management wants to shift to service monitoring. The biggest mismatch there is the maturity level and misconception that technology will fix the GAP. We know that’s not true! Walter Eikenboom shows you how to get from component monitoring to LOB application monitoring with Microsoft System Center Operations Manager 2012 and changing the operational paradigm to a private cloud service connecting System Center Orchestrator and System Center Service Manager 2012, creating processes to get your infrastructure to a private cloud. Stop fighting fire and start building your cloud today!
Key Benefits of Virtualization:
*Recover quickly from disasters such as virus attacks, software bugs, and network outages
*Reduce management costs by up to 300%
*Save up to twice the cost of virtualization in power consumption savings alone
*Drasically reduce cooling and footprint needs
2010 Software Licensing and Pricing Survey Results and 2011 PredictionsFlexera
2010 Software Licensing and Pricing Survey Results and 2011 Predictions by Amy Konary, Director, Software Pricing and Licensing, IDC
Presented at SoftSummit 2010
TechEd 2012 NA - MGT332 - fighting fire to the cloud!wwwally
IT Admins are responding to incidents on a day-to-day basis, but management wants to shift to service monitoring. The biggest mismatch there is the maturity level and misconception that technology will fix the GAP. We know that’s not true! Walter Eikenboom shows you how to get from component monitoring to LOB application monitoring with Microsoft System Center Operations Manager 2012 and changing the operational paradigm to a private cloud service connecting System Center Orchestrator and System Center Service Manager 2012, creating processes to get your infrastructure to a private cloud. Stop fighting fire and start building your cloud today!
Key Benefits of Virtualization:
*Recover quickly from disasters such as virus attacks, software bugs, and network outages
*Reduce management costs by up to 300%
*Save up to twice the cost of virtualization in power consumption savings alone
*Drasically reduce cooling and footprint needs
2010 Software Licensing and Pricing Survey Results and 2011 PredictionsFlexera
2010 Software Licensing and Pricing Survey Results and 2011 Predictions by Amy Konary, Director, Software Pricing and Licensing, IDC
Presented at SoftSummit 2010
A perspective on cloud computing and enterprise saa s applicationsGeorge Milliken
A perspective on Cloud computing and SaaS for Enterprise applications by a SaaS industry veteran.
Please make sure you read the speakers notes, there's a significant amount of content there.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
MS TechDays 2011 - Self-Service Private Cloud Management through Integrated Processes with Service Manager 2012
1. SINGAPORE
INFRASTRUCTURE, ADVANCED
Maarten Goet
System Center MVP, The Netherlands
Self-Service
Private Cloud
management
through
integrated
processes
with Service
Manager 2012
2. Agenda
Introduction
IT Service Management for the Cloud
ITSM from the perspective of the ..
– Business User (cloud consumer)
– Datacenter Admin (service provider)
Summary
Questions
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
3. IT Service Management for the Cloud
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
4. Taxonomy of Cloud Services
Infrastructure Platform Software
(On-Premise) (as a Service) (as a Service) (as a Service)
You manage
Applications Applications Applications Applications
Data You manage Data Data Data
Runtime Runtime Runtime Runtime
Other Manages
Middleware Middleware Middleware Middleware
You manage
Other Manages
O/S O/S O/S O/S
Virtualization Virtualization Virtualization Virtualization
Other Manages
Servers Servers Servers Servers
Storage Storage Storage Storage
Networking Networking Networking Networking
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
5. Pay no attention to the
Man Behind the Curtain
As you move up the stack, what you are responsible for
lessens and trust in others increases
Consumers
– Consumer agrees SLA with the Service Provider for the solution
components that they are not responsible for
Service Provider
– Provides “IT as a Service” to the consumer, key requirements are
standardization, self-service, automation and compliance
– ITSM key to enabling the Service Provider to deliver to SLA
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
6. Achieving IT as a Service objectives
Automation
MOF
ITaaS Objectives
Self-Service Reduce Costs
Increase Service Levels
ITIL Faster Time to Delivery
Provide More Data
Standardisation More Transparency
Compliance
COBIT
Compliance
Process Design Implementation
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
7. IT Service Management for the ..
.. Business User (cloud consumer)
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
8. Business Datacenter Admin
“Service Consumer” “Service Provider”
10. IT Service Management for the ..
.. Datacenter Admin (service provider)
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
11. Business Datacenter Admin
“Service Consumer” “Service Provider”
12. Providing IT as a Service
Datacenter Admin
“Service Provider”
13. Cloud Fabric Management
System Center 2012
DEMONSTRATION
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
14. Typical requests
Capability Description
Request New Cloud Request creation of a new cloud
Request New Establish quotas, establish cost/chargeback model and service level
“Service Package” agreements for specific groups of users
Request New VM Allow user to request creation of one or more virtual machines in a given
(from template) cloud
Retire/extend expiry of a Allow user to extend the time in which a given virtual machine or service
virtual machine or service is available
New Service Request the deployment of an standard (pre-configured) service into a
(from template) cloud using a VMM service template and configuration
Request deployment of a Request the deployment of a new service
New Service
Request Access Request access to a cloud, virtual machine or service (essentially add user
to AD group)
Request update to Request configuration change or update for an existing VM, Service or
service/VM/cloud Cloud
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
15. System Center 2012
supporting the customer
Service Catalog
Self-service Portal
– Request New Virtual Machine
– Request access to existing cloud based resources
– Request extension for virtual machines and services
– Request configuration change
Workflow automation
Approvals and Notifications
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
16. Service Manager enables Self Service
Reports &
Dashboards
E-Mail &
Portal Other Clients
Excel
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
17. Creating a Service Request
SCSM 2012 Service Request Portal allows user to select
what they need from a Catalog, indicates cost, expected
time to delivery and agreed SLA
– Administrators or privileged users will always be able to
create virtual machines and services outside of the Service
Request functionality
All new virtual machines will be discovered by SCOM
and appear in the SCSM console after synchronisation
A report can be used to list the services and virtual
machines for which there is no corresponding change
request
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
18. Approval
The administrator can vary the approval process
according to a wide range of different parameters,
examples include:
– Who is making the request
– The cloud or environment into which it is to be
deployed
– The virtual machine or service template that is being
used
Standard requests with minimal business impact
can be delegated to line manager or automatically
approved
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
19. Deployment
For virtual machines, the service request will capture all
of the information necessary for deployment
For services, administrators or privileged users will
customize service configuration prior to deployment
– The service request will outline what is needed “I want the
CRM system in the marketing cloud, the hours of operation
are… “
– The administrator will determine the configuration settings,
number of servers that should be initially deployed (or can
scale to) etc.
Further approval may be required other types of request
– Deployment may also be authorized to occur on a specific
date or time
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
20. Providing IT as a Service
Self-service capability for the consumer
Standardization in terms of the services available
to consumers
Using automation wherever possible to reduce
costs, improve efficiency and ensure consistency
ITSM for the Private Cloud Fabric
Governance, Risk and Compliance (GRC)
…All of which drive Service Level Agreements (SLA)
and the level of service that can be provided to the
consumer
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
29. Service Catalog demonstration
Request a service
DEMONSTRATION
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
30. System Center 2012
supporting the service provider
Service Catalog Definition
Workflow automation
Integrated CMDB
Service Level Management
Change and Release Management
Integrated Incident Ticketing
Datacenter Reporting
Governance, Risk and Compliance (*)
(*) via GRC Management Pack (downloadable solution accelerator)
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
31. Providing IT as a Service
Need to understand the business processes
– Who is able to make the request
– What information is needed for each request and how
it is used
– How the request is approved and who is involved in the
processes
– What happens once the request is approved
Capture the manual components of this process in
a SCSM Service Request Template
Create System Center Orchestrator 2012 run books
to support the elements of the processes that can
be automated
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
32. DW Portal: Role-based Access, Self Service
PRESENTATION
Service Catalog: Service and Request Offerings
IT Service Offerings
CMDB
Models / Objects: Request Processing:
DATA
Quota, Access, Costs, Business Business process WF engine Notifications
Templates, VMs, Events
CMDB enables
Services, Clouds, Subscriptions Request Processes
WI activities Approvals
standardisation
Runbooks Monitor Invoke
and compliance
WORKFLOW
Orchestrator: IT process drive automation
Request processes
Connectors automationAutomation Run
books
Integration Packs
Other IT
OM VMM Systems
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
33. CMDB enables standardization
Service & Request Offerings 1. Connectors import
4 VMM cloud objects,
VMM templates and
SLA Private Cloud Applications Users SCO runbooks
Knowledge VM Service Access 2. SM templates
Provisioning Provisioning Requests capture business
Schedule
process and the role
Request Fix for Request Quota
Request Cloud of runbooks within
5 Cost Service Increase
the process
User Roles
Business Process 3. Models and
defaults standardise
2 Data and Process Templates
3 Self service models and offerings
(standardised configurations) defaults 4. Specify interaction
Review Runbook Email with users – create
(Quotas, access tiers, costs) questions and map to
Review Runbook Email Work Items
CMDB data
Review Runbook Email Review Runbook Email
5. Configure access
roles to the offerings
1 CMDB Objects
Data Sources
(OM, AD, VMM,
Runbooks Clouds Templates Services VMs Fabric Users SCO, CM)
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
34. Workflow: Request Processes Drive Automation
Service Catalog - Request Offering 1. SCO Connector syncs
Runbook data to CMDB
2. Create Runbook
activity with parameters
mapped to properties
3. Create request
3 template which includes
CMDB 4 Runbook activity and is
added to Service Catalog
Request Template
4. User creates SR from
Service Request 5 request offering
5. Runbook invoked
Invoke with user inputs
SCO Web Service
6. SM workflow
monitors RB status
Monitor
SM Runbooks Folder
Runbook Activity SM Runbook Items 6
SCO Runbook
2 SCO SCO Runbook
Connector SCO Runbook
1
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
35. Service Request Templates Request Offering maps User
Service Offerings is a collection of
defines business processes Input to Service Request
requests
Template
Author Author Author
Request Template Request Offerings Service Offerings
Processes defined Dynamic Service
here drives Request Form Catalog Portal
automation on the Portal home page
Request triggers Workflows, Role-based
approvals, notifications as defined access
by processes in templates
Integrated CMDB
Runbooks Clouds Templates Services VMs Fabric Users
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
36. Scenario: automated Self Service requests
Import Configure Request Service Runbook Service
Runbooks Request Service Request Invoked Request
Offering Created Completed
SM Admin End User
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
37. Service Catalog demonstration
Defining a request
DEMONSTRATION
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
38. Managing Data
• Reduce downtime, lower time to resolution
Center Services • Improve reliability
• Make it easier to manage compliance and risk
• Provide Service within agreed SLA
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
39. System Center 2012
an altogether better solution
When an issue is detected on VM Host Server (either platform)
– SCOM automatically creates an alert
SCSM automatically creates an Incident in response to this alert
– SCO runs a standard set of diagnostics and automatically updates the
incident with those results
– Helpdesk analyst notified by email and takes ownership of the incident
– Investigates / determines that a change needs to be made to the host
Creates Change Request in SCSM
– Approver(s) receive notification
– Review and approve change request through SCSM Portal
– SCO executes Runbook, suspends monitoring, arranges for fix to be
applied and reinstates monitoring once system ready
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
40. Summary
System Center 2012 makes a compelling
integrated solution for Cloud Management
– Able to support differing business needs and
requirements
– Provide powerful features and functionality which
support the needs of the consumer as well as the
service provider
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands
41. Enroll in Microsoft Virtual Acadamy today
Why Enroll, other than it being free?
The MVA helps improve your IT skill set and advance your career with a free, easy to access
training portal that allows you to learn at your own pace, focusing on Microsoft
technologies.
What Do I get for enrolment?
► Free training to make you become the Cloud-Hero in my Organization
► Help mastering your Training Path and get the recognition
► Connect with other IT Pros and discuss The Cloud
Where do I Enrol?
www.microsoftvirtualacademy.com
Then tell us what you think. TellTheDean@microsoft.com
Self-Service Private Cloud management with System Center Service Manager 2012
INFRASTRUCTURE, ADVANCED // Maarten Goet // System Center MVP, The Netherlands