SlideShare a Scribd company logo
System Management
Challenges
Michael Otey
President TECA, Inc.
Senior Contributing Editor
Windows IT Pro
SQL Server Pro
What This Session Covers
• Today’s datacenter requirements
• Challenges
– Managing Windows and Linux
– Management of virtual systems
– Monitoring and capacity planning
– Deploying and updating applications
– Preparing for containers and
microservices
– Keeping on top of inventory and licensing
– Cloud and hybrid cloud
Rapid Technology Changes
are Driving New IT Demands
• Vast increases in connectivity
– The mobile cloud connects 3.1 billion of 7.3 billion people worldwide
– They average 3 connected devices per person
– By 2025, 80% of the population will be
connected
• Explosive data growth
– Data growth – 30-50% per year
– IoT, Big Data, social, mobile data
• Rapid cloud adoption
– 90% of VMworld attendees had workloads
deployed in the public cloud
3
Today’s IT Requirements
• Agility
– Meeting quickly changing business
conditions
• Reducing complexity
• Increasing automation
• Consumerization of IT
• Reducing costs
– CapEX & OpEx
• Data control and security
Modern IT Infrastructure
• Heterogeneous “Best-of-Breed” implementation
• Virtualization
– The foundation of the modern data center
– Enables mobility
– Enhances flexibility
• Storage
– Scalability & flexibility
– Data storage efficiency – deduplication
– Snapshots & replication
• Cloud
– Flexibility & extensibility
– Disaster recovery
5
System Management
Challenges
Managing Windows & Linux
• Heterogeneous platforms are growing
– Standalone applications
– Microsoft’s recent adoption of Linux and open source
• User authentication
– Multiple authentication sources
– Build a centralized user directory and integrate standard
protocols such as SAML, OAuth 2.0, or Openid Connect
• Configuration management & automation
– Different tools and approaches
– Use personnel or cross platform tools like Chef and Puppet
• Log file management
– Differently formatted system and application log files
– Use open source or third party log management tools
Managing Windows & Linux
• Reduction of console sprawl
– Different platform management tools and
multiple support structures
– PowerShell
– Use open source &
third party tools
• Remote Access tools
– VMC, UltraVNC
Managing Virtual Systems
• Multiple hypervisors
– VMware vSphere & Hyper-V (60%-40%)
– Different management capabilities/tools
– Limited cross platform capabilities
• Siloed management
– Different personnel
• Lack of visibility
• Integration tools
– VMware has Multi-Hypervisor Manager
– Microsoft has VMM
– Third party tools
• Distributed Management Task Force (DMTF)
standards
Monitoring and Capacity
Planning
• Goal is improving capacity utilization
• Performance baselining multiple OSes and tools
• Virtualization hides capacity
• Creating service levels
• Under / Over provisioning
– Proper control mechanisms
• Forecasting business demand
– Analyzing the historical workload data
– Working in cooperation with business teams
Deploying and Updating
Applications
• Version differences
– Version control systems
• Multiple device support
– Workspace / VDI technologies
• Multiple platform targets
– Desktop, web, on-premise, cloud
– Cross platform tools
Containers and Microservices
• Moving away from legacy monolithic
applications
– Mode 2 – microservices
– Application redesign
• New to Windows environments
• Mixing legacy & mode 2 apps
• Different monitoring tools
• Docker provides a common
management experience
Inventory Management
• Virtual server sprawl
- Self-service VMs
• Users and developers
- Unexpected licensing
- BYOD management
- Inventory tools
- System Center
- Third party tools
Licensing
- Vendors use different licensing
- Products use different licensing
- Licensing is complicated
- Trend toward core licenses
- Virtualization further complicates
licensing
- Ongoing inventory is required
- Cloud and SaaS tend to simplify this
Challenges of Cloud Adoption
• Growing quickly
• Legacy Infrastructure
• Potentially lower performance
– Shared hardware
• Consolidation and pooling of
resources
– Giving up dedicated resources
• Adoption of new technologies
Integrating the Cloud and
Hybrid Cloud
• Moving legacy workloads
• Distributed applications
• Lack of expertise
• Multiple cloud providers
• Difficult to estimate costs
• Partners and third party tools
Key Takeways
• Be prepared for growth – more technology
changes are coming in the next few years
than ever before
• Linux & heterogenous virtualization will
grow
• Proper planning and tools are essential for
effective systems management
• The cloud is the future
– But that journey is a long one
– Hybrid cloud is the next practical step
KACE Systems
Management Appliance 7.0
(K1000)
Confidential19
• Scan in your new or
existing assets
• Multiple platform support
• Scan and GO!
• Free update to the K1
GO! app
Barcoding
Confidential20
• Pull data from multiple appliances
into single report
• No specialized hardware needed
Cross appliance reporting
Confidential21
Confidential22
• New easier to use wizard
• New features
• Multiple approvers
• Specific approver notifications
• Approval Timeout
• Customizable notifications
• Customize your templates with
HTML/markdown
Process enhancements & approval workflow
Confidential23
• My devices made easier
• Assign devices easier
• Multiple devices? No
problem
• Interactive feedback
• Get more info during
your install
Self-service software provisioning enhancements
Confidential24
• Hardware monitoring made
easier
• Real-time alerts
• Stay on top of your
environment
SNMP Trap Receiver
Confidential25
AirWatch integration
• Single pane of glass
• All your devices in one place
• Integrated asset management
• Assign mobile devices to users and
more
Confidential26
• Supports ESX 5.5 and 6.0
• Discover what VM’s are running
on your servers
• Get hardware/software details
from your VMware environment
• Get hardware usage available
VMware/Vcenter discovery
Confidential27
• My Profile
• More for your users
• See what
tickets/assets/devices
are assigned to you
Users
Confidential28
• Manually or automatically assign users to a device
• Control Panel > General > Device Assignment
• Synchronous occurs upon inventory
• Used in conjunction with user portal and “My Profile”
User/Machine assignment
Confidential29
• Installing software made easier
• Ability to leverage the software
catalog
• “Run Now” option added
• Publish for users
• Existing MI’s usable from
software portal
Managed Installs
Confidential31
• Blacklisting improvement
• Upgrade/Downgrade rights
• Asset Management Appliance licensing changes
• Agentless and grandfathering
• REST API’s/SDK
• Ability for 3rd parties to pull information about inventory, assets, scripting,
reporting, managed installs, and users
Software compliance/Licensing/API’s
KACE Systems
Deployment Appliance
4.0 (K2000)
Confidential33
• Native UEFI support
• Removes reliance on current workarounds (Legacy BIOS setting, thumb drives)
• Secure Boot still needs to be disabled
• Multicasting in Cisco networks
• Router vendors lack Pragmatic General Multicast (PGM) support
• PGM not designed to cross routers
• Internet Group Management Protocol (IGMP) is vendor agnostic
• IGMP can cross between routers/subnets
• Increased Windows deployment speed
• WIM and Kimage speeds 10% faster
KACE SDA Imaging Connectivity and Speed
Confidential34
• Major focus on underlying OS architecture
• Update to the K2000 Appliance 3.7 SP3 (3.7.345)
• Combined SDA and RSA codebase
• FreeBSD 10.0 to 10.3 for SDA
• FreeBSD 7 to 10.3 for RSA
• 32-bit to 64-bit for RSA
• RSA Hyper-V support
KACE SDA Infrastructure
Watch the webcast here:
http://bit.ly/2ilF7N6

More Related Content

What's hot

Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
apprize360
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
apprize360
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Micro Focus
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud
nick_garrod
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
Introductorytocomputing
Anne Starr
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
Belarmino Tomicha
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
Ricoh India Limited
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
Microsoft TechNet - Belgium and Luxembourg
 
Cloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformCloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management Platform
BMC Software
 
#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking
Micro Focus
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
MarketingArrowECS_CZ
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
Micro Focus
 
Ad Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive MistakeAd Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive Mistake
BMC Software
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Nederland
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active Directory
Zoho Corporation
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus
 
SCOM 2012 service SaaS
SCOM 2012 service SaaSSCOM 2012 service SaaS
SCOM 2012 service SaaS
M Senthil Kumar
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
Anne Starr
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
Yuvaraj1986
 

What's hot (20)

Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
Introductorytocomputing
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Cloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformCloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management Platform
 
#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
 
Ad Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive MistakeAd Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive Mistake
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active Directory
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
SCOM 2012 service SaaS
SCOM 2012 service SaaSSCOM 2012 service SaaS
SCOM 2012 service SaaS
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 

Viewers also liked

How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
Quest
 
1η παδ
1η παδ1η παδ
1η παδ
mariaerotokritaki
 
cv-J_Angelico_20150926
cv-J_Angelico_20150926cv-J_Angelico_20150926
cv-J_Angelico_20150926John Angelico
 
Spaceships unit plan
Spaceships unit planSpaceships unit plan
Spaceships unit planJacqui Sharp
 
2 approaches to system development
2 approaches to system development2 approaches to system development
2 approaches to system developmentcymark09
 
Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...
Engr. Md. Siddiqur Rahman Tanveer
 
Heart beat detector using arduino
Heart beat detector using arduinoHeart beat detector using arduino
Heart beat detector using arduino
Varshaa Khandagale
 
Microcontroller based heart rate meter
Microcontroller based heart rate meterMicrocontroller based heart rate meter
Microcontroller based heart rate meter
Chetana Nair
 
Environmental pollution control
Environmental pollution controlEnvironmental pollution control
Environmental pollution controlpriyanka odela
 
Systems Approach to Management
Systems Approach to ManagementSystems Approach to Management
Systems Approach to Management
Ishan Vyas
 
Management information system
Management  information systemManagement  information system
Management information systemRamya Sree
 
Power Point Animation
Power Point AnimationPower Point Animation
Power Point Animationjaspang
 
Heart beat monitor system PPT
Heart beat monitor system PPT Heart beat monitor system PPT
Heart beat monitor system PPT
Anand Dwivedi
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
Quest
 
Management information system
Management information systemManagement information system
Management information system
Sikander Saini
 

Viewers also liked (15)

How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
 
1η παδ
1η παδ1η παδ
1η παδ
 
cv-J_Angelico_20150926
cv-J_Angelico_20150926cv-J_Angelico_20150926
cv-J_Angelico_20150926
 
Spaceships unit plan
Spaceships unit planSpaceships unit plan
Spaceships unit plan
 
2 approaches to system development
2 approaches to system development2 approaches to system development
2 approaches to system development
 
Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...
 
Heart beat detector using arduino
Heart beat detector using arduinoHeart beat detector using arduino
Heart beat detector using arduino
 
Microcontroller based heart rate meter
Microcontroller based heart rate meterMicrocontroller based heart rate meter
Microcontroller based heart rate meter
 
Environmental pollution control
Environmental pollution controlEnvironmental pollution control
Environmental pollution control
 
Systems Approach to Management
Systems Approach to ManagementSystems Approach to Management
Systems Approach to Management
 
Management information system
Management  information systemManagement  information system
Management information system
 
Power Point Animation
Power Point AnimationPower Point Animation
Power Point Animation
 
Heart beat monitor system PPT
Heart beat monitor system PPT Heart beat monitor system PPT
Heart beat monitor system PPT
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
 
Management information system
Management information systemManagement information system
Management information system
 

Similar to Your Biggest Systems Management Challenges – and How to Overcome Them

KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
Quest
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservices
Lalit Kale
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
Tsz Wing Chu
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
firzhan naqash
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
C/D/H Technology Consultants
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenter
jmustac
 
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
garkhot123
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles
Nilay Shrivastava
 
Citrix XenServer Success
Citrix XenServer SuccessCitrix XenServer Success
Citrix XenServer SuccesseG Innovations
 
Big SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on HadoopBig SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on Hadoop
Wilfried Hoge
 
Designing Microservices
Designing MicroservicesDesigning Microservices
Designing Microservices
David Chou
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
Apcera
 
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilizationFlex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
Mike Ricca
 
The Art of Displaying Industrial Data
The Art of Displaying Industrial DataThe Art of Displaying Industrial Data
The Art of Displaying Industrial Data
Inductive Automation
 
RedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in Equinix
Redis Labs
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceSudip Chatterjee
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
MahmoudZidan41
 
Un-clouding the cloud
Un-clouding the cloudUn-clouding the cloud
Un-clouding the cloud
Davinder Kohli
 

Similar to Your Biggest Systems Management Challenges – and How to Overcome Them (20)

KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservices
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenter
 
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles
 
Citrix XenServer Success
Citrix XenServer SuccessCitrix XenServer Success
Citrix XenServer Success
 
Big SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on HadoopBig SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on Hadoop
 
Designing Microservices
Designing MicroservicesDesigning Microservices
Designing Microservices
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
 
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilizationFlex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
 
The Art of Displaying Industrial Data
The Art of Displaying Industrial DataThe Art of Displaying Industrial Data
The Art of Displaying Industrial Data
 
RedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in Equinix
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business Intelligence
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
Un-clouding the cloud
Un-clouding the cloudUn-clouding the cloud
Un-clouding the cloud
 

More from Quest

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
Quest
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
Quest
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
Quest
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Quest
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
Quest
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
Quest
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
Quest
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
Quest
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
Quest
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
Quest
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Quest
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
Quest
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
Quest
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
Quest
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
Quest
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
Quest
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Quest
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
Quest
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
Quest
 

More from Quest (20)

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
 

Recently uploaded

Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 

Recently uploaded (20)

Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 

Your Biggest Systems Management Challenges – and How to Overcome Them

  • 1. System Management Challenges Michael Otey President TECA, Inc. Senior Contributing Editor Windows IT Pro SQL Server Pro
  • 2. What This Session Covers • Today’s datacenter requirements • Challenges – Managing Windows and Linux – Management of virtual systems – Monitoring and capacity planning – Deploying and updating applications – Preparing for containers and microservices – Keeping on top of inventory and licensing – Cloud and hybrid cloud
  • 3. Rapid Technology Changes are Driving New IT Demands • Vast increases in connectivity – The mobile cloud connects 3.1 billion of 7.3 billion people worldwide – They average 3 connected devices per person – By 2025, 80% of the population will be connected • Explosive data growth – Data growth – 30-50% per year – IoT, Big Data, social, mobile data • Rapid cloud adoption – 90% of VMworld attendees had workloads deployed in the public cloud 3
  • 4. Today’s IT Requirements • Agility – Meeting quickly changing business conditions • Reducing complexity • Increasing automation • Consumerization of IT • Reducing costs – CapEX & OpEx • Data control and security
  • 5. Modern IT Infrastructure • Heterogeneous “Best-of-Breed” implementation • Virtualization – The foundation of the modern data center – Enables mobility – Enhances flexibility • Storage – Scalability & flexibility – Data storage efficiency – deduplication – Snapshots & replication • Cloud – Flexibility & extensibility – Disaster recovery 5
  • 7. Managing Windows & Linux • Heterogeneous platforms are growing – Standalone applications – Microsoft’s recent adoption of Linux and open source • User authentication – Multiple authentication sources – Build a centralized user directory and integrate standard protocols such as SAML, OAuth 2.0, or Openid Connect • Configuration management & automation – Different tools and approaches – Use personnel or cross platform tools like Chef and Puppet • Log file management – Differently formatted system and application log files – Use open source or third party log management tools
  • 8. Managing Windows & Linux • Reduction of console sprawl – Different platform management tools and multiple support structures – PowerShell – Use open source & third party tools • Remote Access tools – VMC, UltraVNC
  • 9. Managing Virtual Systems • Multiple hypervisors – VMware vSphere & Hyper-V (60%-40%) – Different management capabilities/tools – Limited cross platform capabilities • Siloed management – Different personnel • Lack of visibility • Integration tools – VMware has Multi-Hypervisor Manager – Microsoft has VMM – Third party tools • Distributed Management Task Force (DMTF) standards
  • 10. Monitoring and Capacity Planning • Goal is improving capacity utilization • Performance baselining multiple OSes and tools • Virtualization hides capacity • Creating service levels • Under / Over provisioning – Proper control mechanisms • Forecasting business demand – Analyzing the historical workload data – Working in cooperation with business teams
  • 11. Deploying and Updating Applications • Version differences – Version control systems • Multiple device support – Workspace / VDI technologies • Multiple platform targets – Desktop, web, on-premise, cloud – Cross platform tools
  • 12. Containers and Microservices • Moving away from legacy monolithic applications – Mode 2 – microservices – Application redesign • New to Windows environments • Mixing legacy & mode 2 apps • Different monitoring tools • Docker provides a common management experience
  • 13. Inventory Management • Virtual server sprawl - Self-service VMs • Users and developers - Unexpected licensing - BYOD management - Inventory tools - System Center - Third party tools
  • 14. Licensing - Vendors use different licensing - Products use different licensing - Licensing is complicated - Trend toward core licenses - Virtualization further complicates licensing - Ongoing inventory is required - Cloud and SaaS tend to simplify this
  • 15. Challenges of Cloud Adoption • Growing quickly • Legacy Infrastructure • Potentially lower performance – Shared hardware • Consolidation and pooling of resources – Giving up dedicated resources • Adoption of new technologies
  • 16. Integrating the Cloud and Hybrid Cloud • Moving legacy workloads • Distributed applications • Lack of expertise • Multiple cloud providers • Difficult to estimate costs • Partners and third party tools
  • 17. Key Takeways • Be prepared for growth – more technology changes are coming in the next few years than ever before • Linux & heterogenous virtualization will grow • Proper planning and tools are essential for effective systems management • The cloud is the future – But that journey is a long one – Hybrid cloud is the next practical step
  • 19. Confidential19 • Scan in your new or existing assets • Multiple platform support • Scan and GO! • Free update to the K1 GO! app Barcoding
  • 20. Confidential20 • Pull data from multiple appliances into single report • No specialized hardware needed Cross appliance reporting
  • 22. Confidential22 • New easier to use wizard • New features • Multiple approvers • Specific approver notifications • Approval Timeout • Customizable notifications • Customize your templates with HTML/markdown Process enhancements & approval workflow
  • 23. Confidential23 • My devices made easier • Assign devices easier • Multiple devices? No problem • Interactive feedback • Get more info during your install Self-service software provisioning enhancements
  • 24. Confidential24 • Hardware monitoring made easier • Real-time alerts • Stay on top of your environment SNMP Trap Receiver
  • 25. Confidential25 AirWatch integration • Single pane of glass • All your devices in one place • Integrated asset management • Assign mobile devices to users and more
  • 26. Confidential26 • Supports ESX 5.5 and 6.0 • Discover what VM’s are running on your servers • Get hardware/software details from your VMware environment • Get hardware usage available VMware/Vcenter discovery
  • 27. Confidential27 • My Profile • More for your users • See what tickets/assets/devices are assigned to you Users
  • 28. Confidential28 • Manually or automatically assign users to a device • Control Panel > General > Device Assignment • Synchronous occurs upon inventory • Used in conjunction with user portal and “My Profile” User/Machine assignment
  • 29. Confidential29 • Installing software made easier • Ability to leverage the software catalog • “Run Now” option added • Publish for users • Existing MI’s usable from software portal Managed Installs
  • 30. Confidential31 • Blacklisting improvement • Upgrade/Downgrade rights • Asset Management Appliance licensing changes • Agentless and grandfathering • REST API’s/SDK • Ability for 3rd parties to pull information about inventory, assets, scripting, reporting, managed installs, and users Software compliance/Licensing/API’s
  • 32. Confidential33 • Native UEFI support • Removes reliance on current workarounds (Legacy BIOS setting, thumb drives) • Secure Boot still needs to be disabled • Multicasting in Cisco networks • Router vendors lack Pragmatic General Multicast (PGM) support • PGM not designed to cross routers • Internet Group Management Protocol (IGMP) is vendor agnostic • IGMP can cross between routers/subnets • Increased Windows deployment speed • WIM and Kimage speeds 10% faster KACE SDA Imaging Connectivity and Speed
  • 33. Confidential34 • Major focus on underlying OS architecture • Update to the K2000 Appliance 3.7 SP3 (3.7.345) • Combined SDA and RSA codebase • FreeBSD 10.0 to 10.3 for SDA • FreeBSD 7 to 10.3 for RSA • 32-bit to 64-bit for RSA • RSA Hyper-V support KACE SDA Infrastructure
  • 34. Watch the webcast here: http://bit.ly/2ilF7N6