Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Regina Technology Innovation Day

1.722 visualizaciones

Publicado el

Complete slide presentation of the Regina Technology Innovation Day Sep 27, 2011

Publicado en: Tecnología, Empresariales
  • Get access to 16,000 woodworking plans, Download 50 FREE Plans... ■■■ http://tinyurl.com/y3hc8gpw
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • There are over 16,000 woodworking plans that comes with step-by-step instructions and detailed photos, Click here to take a look  http://ishbv.com/tedsplans/pdf
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • Sé el primero en recomendar esto

Regina Technology Innovation Day

  1. 1. Welcome!<br />Please take some time to visitour vendor exhibits.<br />Wireless access for this room: IP_GuestUsername: Guest Password: Agree<br />
  2. 2. Tuesday, September 27, 2011<br />Morning <br />Afternoon<br />8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits<br />9:00 – 9:15 Acrodex Welcome Address<br />9:15 – 10:15 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure<br />10:15 – 10:45 Desktop Virtualization – Case Study<br />10:50 – 11:20 Blackberry in the Enterprise – RIM Information Session<br />11:30 – 12:30 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session<br />12:00 – 12:45 Lunch & Vendor Exhibits<br />12:45 – 1:30 Software Asset Management<br />1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices<br />2:15 – 3:00 Implementing CRM in Your Environment<br />3:00 – 3:15 Refreshment Break and Transition to Breakout Sessions<br />3:15 – 3:45 Mobility Management – LANDesk Information Session<br />3:55 – 4:25 Megatrends in IT – HP Information Session<br />4:30 – 5:00 Reflections and Closing Remarks<br />5:00 – 7:00 Cocktail Reception<br />
  3. 3. Welcoming Address<br />Tim Sterzer <br />Senior Sales Team Lead<br />
  4. 4. We invite you to tweet using:<br />#TechDays<br />
  5. 5. Special thanks to…<br />
  6. 6. Greg Hutton<br />Systems Engineer<br />
  7. 7. Getting Your Organization Cloud Ready:Fully Virtualizing Your Infrastructure<br />
  8. 8. Definition<br />
  9. 9. Cloud Deployment Models<br />Cloud Computing is a way of doing computing<br />Cloud ServiceProviders<br />Bridging<br />Enterprises<br />Hybrid Cloud<br />Composition of 2 or more interoperable clouds, enabling data and application portability<br />Public Cloud<br />Accessible over the Internet for general consumption<br />Private Cloud<br />Operated solely for an organization, typically within the firewall<br />
  10. 10. How can I use the cloud?<br />IT as a Service<br /><ul><li>Infrastructure as a Service</li></ul>VMware vCloud Express<br /><ul><li>Platform as a Service</li></ul>VMware vFabric<br /><ul><li>Software as a Service</li></ul>VMware Horizon Application Manager<br /><ul><li>DR as a Service</li></ul>VMware Site Recovery Manager<br /><ul><li>Desktop as a Service</li></ul>VMware View<br />
  11. 11. The Journey To The Cloud<br />Public Cloud Experimentation<br />Public Cloud Adoption and Commitment<br />
  12. 12. Business Critical/Tier-1 Applications<br />Yeah, but…<br />No worries,<br />Performance?<br />Security & Compliance<br />Support<br />95% of apps match or exceed native performance on vSphere<br />vShield, security and compliance at the hypervisor<br />Alliance partnerships improve support<br /><ul><li>Oracle, SAP, IBM, Microsoft</li></li></ul><li>Private Cloud Building Blocks<br />Virtualization<br />Servers<br />Storage<br />Network<br />Orchestration<br />Management tools that eliminate manual administration without increasing costs and reducing variability of IT resource maintenance<br />Self-Service Portal<br />Access to a system that enables on-demand consumption of IT services<br />
  13. 13. Desirable Characteristics<br />Secure<br />Performant<br />Scalable<br />Agile<br />Elastic<br />Reliable<br />Device & Location Independent<br />Manageable<br />Does not increase costs<br />
  14. 14. Links<br />http://www.acrodex.com<br />http://www.vmware.com/solutions/business-critical-apps/<br />http://communities.vmware.com/community/vmtn/vmug<br />
  15. 15. Dave Hunter<br />Associate Director of IT Sercives<br />
  16. 16. VMWare Virtualization at Red Deer College<br />
  17. 17. Red Deer College<br />Background<br />7500 students<br />700 Faculty and Staff<br />Centrally located<br />Strong Community Presence<br />Many Business Partners –BCTL<br />Donald School of Business<br />
  18. 18. RDC IT Services<br />35 IT Personnel<br />Banner ERP running on Oracle<br />Several Hundred MSSQL Databases in a cluster<br />150 Servers<br /><ul><li>90% Windows based
  19. 19. 8% Solaris
  20. 20. 2% Linux</li></ul>1800 desktops – replace one third each year<br />HDS AMS 1000 SAN Storage – 35 TB<br />Cisco Switches end to end -10 GB backbone<br />
  21. 21. RDC Server Virtualization<br />Virtualized 90 of 150 servers 3 years ago<br /><ul><li>Two Dell R900s in HA – 256 GB RAM
  22. 22. This year we moved to HP Blade Servers
  23. 23. C7000 chassis
  24. 24. BL490 blades – 4 for servers – 128 GB</li></li></ul><li>RDC Application Virtualization<br />Softgrid – 4 years ago<br /><ul><li>95 % of apps virtualized
  25. 25. Moved to Thin App – smaller foot print in image</li></li></ul><li>RDC VDI<br />Spent two years investigating<br />Looked at Citrix, Microsoft Hyper V and VMWare<br /><ul><li>Citrix was cost prohibitive
  26. 26. Microsoft Hyper V not robust enough (RDP)</li></ul>VMWare was the logical choice for us<br /><ul><li>Already had expertise
  27. 27. An extension of what we were already doing
  28. 28. PCoIP
  29. 29. VMWare VDI Infrastructure Cost (1/3)</li></li></ul><li>RDC VDI<br />Partner with a Proven Solution Provider <br />We engaged VMWare early in the process<br /><ul><li>We were able to get some huge cost benefits</li></ul>Selected Wyse P20 Thin clients<br /><ul><li>All hardware including PCoIP chip
  30. 30. No extra OS to manage</li></ul>VMWare ESXi 4.1<br />VMWare View 4.6<br />During readiness for Pilot we switched from XP to Windows 7 64 bit – less overhead<br />Rolled out 100 pilot desktops<br />
  31. 31. RDC VDI – Recent Events<br />Purchased a Separate SAN<br /><ul><li>Selected a NetApp FAS 3200 Series</li></ul>Rolled out 500 Desktops<br /><ul><li>Our New School of Business – Faculty and Staff
  32. 32. Learning Information Commons - Students
  33. 33. Students took us up on Anything from anywhere on any device. (50/50 first week)</li></ul>Upgraded 14 blades to Dual Six Core CPUs<br /><ul><li>Was cheaper than adding more blades</li></ul>Loaded each blade with 144 GB RAM<br />
  34. 34. Lessons Learned<br />Don’t rush – Plan, Plan, Plan<br /><ul><li>Don’t set unrealistic time lines – allow for unforeseen issues</li></ul>SAN Performance <br /><ul><li>Not just about IOPS
  35. 35. Configuration - Optimization
  36. 36. When we turned on the 100 pilot desktops we brought down our SAN</li></ul>Be willing to adapt and change quickly – things don’t always go according to plans<br /><ul><li>NIC Driver brought down our entire Virtualized environment
  37. 37. Softgrid  ThinApp
  38. 38. Windows XP  Windows 7
  39. 39. New SAN</li></li></ul><li>What’s Next<br />2nd SAN<br /><ul><li>DR</li></ul>Upgrade to version 5 Parallel environments<br />Rollout up to 1200 desktops <br /><ul><li>Older desktops first (5 years old), dept by dept</li></ul>Replace laptops with VDI or Mobile Thin Client<br />Possible Provider of VDI to Central Alberta<br /><ul><li>VDI in the Cloud </li></li></ul><li>Thank You<br />
  40. 40. Morning Break #Tech Days<br />Morning <br />Afternoon<br />8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits<br />9:00 – 9:15 Acrodex Welcome Address<br />9:15 – 10:15 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure<br />10:15 – 10:45 Desktop Virtualization – Case Study<br />10:50 – 11:20 Blackberry in the Enterprise – RIM Information Session<br />11:30 – 12:30 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session<br />12:00 – 12:45 Lunch & Vendor Exhibits<br />12:45 – 1:30 Software Asset Management<br />1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices<br />2:15 – 3:00 Implementing CRM in Your Environment<br />3:00 – 3:15 Refreshment Break and Transition to Breakout Sessions<br />3:15 – 3:45 Mobility Management – LANDesk Information Session<br />3:55 – 4:25 Megatrends in IT – HP Information Session<br />4:30 – 5:00 Reflections and Closing Remarks<br />5:00 – 7:00 Cocktail Reception<br />
  41. 41. BlackBerry for Business<br />Leading Products and Solutions for Business Mobility<br />September 2011<br />
  42. 42. BlackBerry and Our Position in the Enterprise Market<br />
  43. 43. What CIOs are telling us…<br /><ul><li>My company must be able to do more with smartphones than email and phone calls
  44. 44. Smartphones are walking in the door with employees of all levels, creating new expectations and user requests
  45. 45. Consumer innovations in mobile and web have raised the bar for enterprise user experience
  46. 46. Marketing wants a strong mobile consumer presence
  47. 47. All of my company’s applications must go mobile, but the presentation is different than desktop
  48. 48. Enterprise imperatives (manageability, scalability, security) cannot be sacrificed purely for individual user experience.</li></ul>RIM Confidential | 31<br />
  49. 49. BlackBerry Remains the Enterprise Leader<br />Enterprise Market Share - Shipments<br />Source: ABI Research, Enterprise Smartphones – August 2010<br />RIM Confidential | 32<br />
  50. 50. RIM Fast Facts<br /><ul><li>#1 Smartphone brand in US, Canada, Latin America and the UK for calendar 20101
  51. 51. 175+ countries
  52. 52. 600+ carriers and distribution partners
  53. 53. 400,000+ registered BlackBerry developers
  54. 54. 250,000+ active BlackBerry Enterprise Servers
  55. 55. 150,000,000+ devices sold to date 13,200,000+ devices shipped in Q1 GY12 alone
  56. 56. 67,000,000+ subscribers today</li></ul>16% Year Over Year growth for Q112<br />1IDC Worldwide Mobile Phones Quarterly Tracker - Final data - Q4 2010 <br />RIM Confidential | 33<br />
  57. 57. Innovating and Supporting the Personal Liable Trend in Enterprise<br />
  58. 58. Key Enterprise Shift<br />There is a key shift in how devices are being deployed within the enterprise from corporate-liable device distribution to a consumer liable device distribution model. An opportunity exists to address this shift<br />IDC expects worldwide shipments of consumer liable devices to grow by 17.9%to reach 56.7 million units representing 56% of business smartphone shipments by 2013.<br />IDC Worldwide CMD forecast 2009-2013 <br />RIM Confidential | 35<br />
  59. 59. New BlackBerry Smartphone Lineup<br />Curve 9350/9360 (Curve)<br />Torch 9810 <br />Torch 9850/9860 (All Touch Torch)<br />Bold 9900/9930 (Bold Touch)<br />11 mm thick<br />480 X 360, 246 DPI<br />800MHz Processor and GPU<br />512MB RAM + 512MB storage<br />5.0 MP Camera / VGA video<br />NFC & Accelerometer<br />11.5mm thick<br />3.69” 800X480, 253 DPI<br />Touchscreen<br />4GB storage<br />10.5 mm thick<br />640X480, 287 DPI Touchscreen<br />NFC<br />8GB storage<br />15mm thick<br />640X480, 253 DPI<br /> Touchscreen<br />8GB storage<br />Common Specifications (not including Curve):<br />
  60. 60. New BlackBerry OS 7<br />Staying true to the proven security, data efficiency and deep integration of BlackBerry smartphones<br />Breakthrough performance.<br />Powerful new experiences.<br />Innovative apps.<br /><ul><li>BBM 6
  61. 61. Music Storefront
  62. 62. Docs to Go Premium
  63. 63. BlackBerry Balance
  64. 64. BlackBerry Protect
  65. 65. Powerful Graphics Performance
  66. 66. Smoothest Touch Experience
  67. 67. Blazing fast Web Browser
  68. 68. Voice Activated Universal Search
  69. 69. Near Field Communications
  70. 70. Augmented Reality
  71. 71. Stunning Pictures and Video</li></li></ul><li>The BlackBerry PlayBook Tablet<br />Uncompromised Web Browsing<br />BlackBerry® Bridge™<br />Ultra Portable<br />True Multitasking<br />HDMI Output<br />BlackBerry Smartphone Notifications<br />Full Touch Front Display<br />High Resolution Dual Cameras<br />Wireless Software Updates<br />Free Premium Documents to Go Suite<br />
  72. 72. Supporting Personal Liable BlackBerryHow to get started – Step #1<br />BlackBerry Enterprise Server Express<br />Download BlackBerry® Enterprise Server Express today from BlackBerry.com<br />Activate users with no license cost<br />Benefits<br /><ul><li>Advanced IT control for employees who buy their own BlackBerry and want to connect
  73. 73. Access to business applications, synchronizing email, calendar, contacts, tasks, memos and more
  74. 74. Industry-leading security and manageability
  75. 75. Maximize employee productivity through enterprise connectivity with personal BlackBerry handhelds</li></ul>RIM Confidential | 39<br />
  76. 76. Supporting Personal Liable BlackBerryHow to get started – Step #2<br />BlackBerry® Balance™ technology enables BlackBerry smartphones to be used for business and personal purposes without compromise.*<br /><ul><li>Realize cost savings through employee purchased devices
  77. 77. Secure company data on devices that are not owned by the organization
  78. 78. Manage IT policies that define a line between work and personal data
  79. 79. Stay connected to work and life with the convenience of a single device</li></ul>Requires handheld software version 6.0 and BlackBerry Enterprise Server (or Express) 5.0.3<br />RIM Confidential | 40<br />
  80. 80. Supporting Personal Liable BlackBerryHow to get started – Step #3<br />BlackBerry Multi-Device Platform Management* - Helping customers manage the mix of mobile devices entering the enterprise<br />Provides a single device management interface for BlackBerry smartphones as well as other non-BlackBerry smartphones<br />General Capabilities<br /><ul><li>Centralized Admin Console
  81. 81. User and Group Management
  82. 82. Device Activation
  83. 83. Settings and Policy Definition
  84. 84. Software Deployments
  85. 85. Device Inventory</li></ul>RIM Confidential | 41<br />*Will be available through a future software release at the end of 2011<br />
  86. 86. Business and Personal Productivity Driven by BlackBerry Business Software<br />
  87. 87. Avoid Missed Calls and Expensive Cellular Minutes<br /><ul><li>One office identity and extension dialing
  88. 88. Voice over Wi-Fi®
  89. 89. Automatic network handoff between Wi-Fi and wireless networks
  90. 90. Move calls manually between desk & smartphone, Wi-Fi & mobile networks
  91. 91. Desk phone features
  92. 92. Add participants to conference calls</li></ul>BlackBerry® Mobile Voice System will unify desk phone features with BlackBerry® smartphones. <br />MVS Teaser: http://us.blackberry.com/apps-software/business/blackberry_mvs/<br />RIM Confidential | 43<br />
  93. 93. Business Collaboration on the Go<br /><ul><li>Extend existing Instant Messaging systems to your BlackBerry smartphones
  94. 94. Improve returns of the overall Instant Messaging implementation
  95. 95. In some cases, improve productivity for free (Turn on BlackBerry Messenger, OCS)</li></ul>Access Microsoft SharePoint, Office Communication, Lotus Collaboration and more on BlackBerry <br />BlackBerry SharePoint Demo: http://ca.blackberry.com/business/software/Sharepoint_BB_WMV2.swf<br />RIM Confidential | 44<br />
  96. 96. The BlackBerry Business Difference<br />We are the world’s most committed business mobility leader and partner<br />We provide the industry’s only end-to-end business mobility solution<br />We are continuing our focus on innovation<br /><ul><li>Our leadership, legacy and focus on serving the needs of business customers
  97. 97. Our commitment and focus on wireless</li></ul>Our Unique Position<br /><ul><li>Our end-to-end solution - built on a trusted, secure, efficient platform that enables real-time communication, and leverages our customers’ existing partnerships and investments
  98. 98. Our support for and collaboration with customers at each stage on the path to mobility</li></ul> Our Superior Product<br /><ul><li>Our ongoing innovation and focus on extending the value of BlackBerry into the future
  99. 99. Our focus on addressing the needs of the consumer in organizations</li></ul>Addressing a Broader Audience<br />RIM Confidential | 45<br />
  100. 100. Questions?<br />RIM Confidential | 46<br />
  101. 101. Thank you<br />For more information please contact:<br />Chad Moore<br />Channel Account Manager<br />chamoore@rim.com<br />
  102. 102. Keith Aasen<br />Consulting System Engineer, Virtualization<br />
  103. 103. Beyond Storage Efficiency and Automated Data protection in Virtual Environments<br />
  104. 104. NetApp Confidential - Internal Use Only<br />Unified Storage<br />
  105. 105. Unified Data Access<br />NAS<br />SAN<br />Object<br />CIFS<br />NFS<br />FCP<br />FCoE<br />HTTP<br />REST<br />iSCSI<br />FAS6200 Series<br />FAS3200 Series<br />FAS2000 Series<br />
  106. 106. Common Storage Portfolios<br />Symmetrix VMAX<br />Clariion<br />VNX<br />Symmetrix<br />VMAXe<br />Clariion<br />VNXe<br />Clariion<br />Isilon<br />EVA<br />LeftHand<br />3Par<br />Ibrix<br />StorageWorks<br />EqualLogic<br />Compellent<br />EMC Clariion<br />PowerVault<br />Single Protocol<br />Hardware equates to functionality<br />Disjointed architectures & integration<br />Operational variances<br />NetApp Confidential - Internal Use Only<br />
  107. 107. Simplicity<br />NetApp Confidential <br />FAS6280<br />FAS6240<br />FAS6210<br />2880 TB<br />1440 drives<br />FAS3270<br />FAS3240<br />2880 TB<br />1440 drives<br />FAS3210<br />FAS2040<br />2400TB<br />1200 drives<br />FAS2020<br />FAS6200 Series<br />1920TB<br />960 drives<br />1200TB<br />600 drives<br />136TB<br />136 drives<br />FAS3200 Series<br />68TB<br />68 drives<br />480TB<br />240 drives<br /><ul><li>ONE operating environment
  108. 108. ONE set of data services
  109. 109. ONE management
  110. 110. ONE set of processes</li></ul>FAS2000 Series<br />
  111. 111. Hardware is Merely a Means to Scale<br />NetApp Confidential - Internal Use Only<br />Data Ontap<br />V-Series<br />FAS6200<br />FAS3200<br />FAS2000<br />Ontap-v VSA<br />VM<br />X - YTB<br />68 - 272TB<br />Virtualize 3rd<br />Party Arrays<br />480TB– 1.9PB<br />2.4- 2.9PB<br /><ul><li>Natively multiprotocol
  112. 112. Architectural repeatability
  113. 113. Operational consistency</li></ul>NetApp® Storage Portfolio<br />
  114. 114. Unified Data Services<br />SnapMirror<br />Deduplication<br />Dedup<br /> Instant Backup<br /> File Server<br /> Consolidation<br /> Smart Clones<br /> D2D Backup<br />IP-based SAN<br />Storage Isolation<br />SnapVault<br />iSCSI<br />CIFS<br />Snapshots<br />MultiStore<br />FlexClones<br /> IP-based Data<br /> Replication<br />NFS Procotol<br />WORM storage<br />NFS<br />SnapLock<br />FAS6200 Series<br />FAS3200 Series<br />FAS2000 Series<br />
  115. 115. NetApp Confidential - Internal Use Only<br />Efficiency<br />
  116. 116. Comprehensive Efficiency<br />NetApp Confidential <br />Storage<br />Operations<br />Data Growth<br /><ul><li>Application integration
  117. 117. Storage management automation
  118. 118. Integrated data protection
  119. 119. Service automation</li></ul>SATA / Flash Cache<br />RAID-DP®<br />Thin provisioning<br />$<br />Snapshot® Technology<br />Deduplication <br />Thin replication<br />Virtual copies<br />Compression<br />TB<br />
  120. 120. Efficiency is Built In<br />NetApp Confidential <br />
  121. 121. Efficiency is Built In<br />NetApp Confidential <br />
  122. 122. Efficiency is Built In<br />NetApp Confidential <br />
  123. 123. Virtual Environments<br />NetApp Confidential <br />Traditional Enterprise RAID Arrays<br />
  124. 124. Virtual Environments<br />Duplicate Data <br />Is Eliminated<br />Traditional Enterprise RAID Arrays<br />NetApp Confidential <br />
  125. 125. All Protocol & All Datasets<br />NetApp Confidential <br />FCP Storage<br />iSCSI Storage<br />CIFS Storage<br />All Protocols, All Datasets<br />NFS Storage<br />Enterprise Data<br />Mid-tier Data<br />
  126. 126. Industry Averages<br />NetApp Confidential <br />
  127. 127. 65<br />NetApp Confidential <br />Virtual Storage Tiering<br />
  128. 128. Data Placement Challenge<br />Primary Storage Pool: <br />All data – hot and cold<br />Objective:<br />Intelligently place “hot” data on the highest performing media<br /> “Hot” Data<br />10-20%<br />Data should be fast when hot, and low cost when it’s cold<br />
  129. 129. NetApp’s Criteria for Effective Tiering<br />Real-Time <br /><ul><li>Serve data when it’s hot
  130. 130. Use high cost media (Flash) efficiently
  131. 131. Enable SATA as primary tier</li></ul>Efficient<br />Simple<br /><ul><li>Work out of the box with default settings</li></li></ul><li>A Better Approach: Intelligent Caching<br />Real-time data promotion<br /><ul><li>Optimized for Flash
  132. 132. Scale performance on demand</li></ul>No data movement<br /><ul><li>Highly granular (4KB)
  133. 133. Highly efficient
  134. 134. Simple to install and requires no administration</li></ul>Data-driven • Real-time • Self-managing<br />Virtual Storage Tier<br />Physical Storage<br />
  135. 135. The NetApp Virtual Storage Tier Intelligent Caching Enabled<br /><ul><li>Start with “Right” cost storage technology
  136. 136. Virtualize for efficiency
  137. 137. Dedup, thin provisioning, etc.
  138. 138. Add performance
  139. 139. Promote hot data on-demand</li></ul>01010<br />10110<br />01011<br />Virtual Storage Tier<br />Performance<br />PhysicalTier<br />01010<br />10110<br />01011<br />01010<br />10110<br />01011<br />01010<br />10110<br />01011<br />01010<br />10110<br />01011<br />Capacity<br />01010<br />10110<br />01011<br />Virtualize<br />
  140. 140. 1<br />3<br />2<br />1<br />4<br />6<br />5<br />7<br />8<br />ESX Cluster<br />VM<br />VM<br />VM<br />VM<br />VM<br />VM<br />VM<br />VM<br />NetApp FAS Array<br />VST - FlashCache<br />VM<br />Dedupe Disk Storage<br />VM<br />VST in a Virtual Environment<br />
  141. 141. EMC Complexity<br />NetApp Confidential <br />
  142. 142. NetApp Simplicity<br />NetApp Confidential <br />
  143. 143. NetApp Confidential - Internal Use Only<br />“True” Storage Virtualization<br />
  144. 144. NetAppMultiStore<br />Customer A<br />Data<br />Data<br />Data<br />Data<br />Data<br />Data<br />Data<br />Data<br />Data<br />Virtual Storage Controller<br />Secure IP Space<br /><ul><li>Discrete, private secure network partition
  145. 145. Logical partitions within the NetApp array</li></ul>Secure VLAN Interface<br /><ul><li>Securely maps VLANs directly to IP spaces</li></ul>Network VLAN<br /><ul><li> Used to logically partition networks
  146. 146. Separates broadcast domains</li></ul>MultiStore®<br />Customer B<br />Customer C<br />Virtual Storage Controller<br />Virtual Storage Controller<br />NetApp provides the industry’s only complete tool set for providing path isolation from the disk through the network. This level of security is mandatory for multi-tenant environments.<br />
  147. 147. NetAppMultiStore & vFilers<br /><ul><li>Abstracted access via vFilers (virtual arrays)
  148. 148. vFiler storage service profiles unbind data from hardware
  149. 149. DataMotion non-disruptive mobility & migration
  150. 150. Centralized cluster management</li></ul>vFiler<br />vFiler<br />vFiler<br />vFiler<br />vFiler<br />vFiler<br />vFiler<br />vFiler<br />vFiler<br />vFiler<br />vFiler<br />Data Ontap<br />NetApp Confidential - Internal Use Only<br />
  151. 151. Next-Gen Data Ontap Cluster-Mode<br />NetApp Confidential - Internal Use Only<br /><ul><li>Scale Out Storage Architecture for Non-Stop Operations
  152. 152. Supports 24 storage nodes
  153. 153. Abstracted access via vFilers (virtual arrays)
  154. 154. Centralized cluster management</li></ul>vFiler<br />vFiler<br />vFiler<br />Data Ontap 8.1 C-Mode<br />
  155. 155. Key C-Mode values <br /><ul><li>Non-disruptive
  156. 156. Upgrade, replace, rebalance, expand, all without disrupting workloads
  157. 157. Scalable containers
  158. 158. Scale up, scale out, scale down
  159. 159. Petabytes of data; billions of objects</li></li></ul><li>NetApp Confidential - Internal Use Only<br />Storage Offloaded Data Protection<br />
  160. 160. RAID the Foundation of Data Protection<br />NetApp Confidential - Internal Use Only<br /><ul><li>RAID-DP enables ‘Set it & Forget it’ simplicity
  161. 161. Highest performance and data protection
  162. 162. Industry leading efficiency (87.5% default utilization)
  163. 163. Solution design simplicity & standardization
  164. 164. Storage tiering simplified
  165. 165. Enabled based on type of medium not a matrix comprised of mediums & RAID types</li></li></ul><li>Traditional Business Continuance<br />Strengths<br />Let’s you sleep at night<br />Weaknesses<br />Loads of hardware<br />Many operations<br />Several copies<br />Thick transfers<br />Stored in multiple formats<br />The accepted pain of doing business<br />Tape<br />Archive<br />Backup<br />Replication<br />Production<br />DR<br />Disk Backup<br />Day to Day workloads<br />1st Point of Recovery<br />Dedupe<br />Long-Term Archive<br />Compressed<br />Identical HW as Production<br />
  166. 166. Introduce NetApp Arrays<br /><ul><li>The process of making copies of data in order to meet legal compliance requirements</li></ul>Tape<br />Archive<br />Backup<br />Replication<br />Disk Backup<br />Production<br />DR<br />Strengths<br />Same process that you know<br />Weaknesses<br />Same process that you know<br />Long-Term Archive<br />Compressed<br />1st Point of Recovery<br />Dedupe<br />Day to Day workloads<br />Identical HW as Production<br />
  167. 167. Introduce NetApp Arrays<br /><ul><li>The process of making copies of data in order to meet legal compliance requirements</li></ul>Tape<br />Archive<br />Backup<br />Replication<br />Disk Backup<br />Production<br />DR<br />Strengths<br />Production & DR storage is reduced by 50%<br />Same process<br />Weaknesses<br />Same process<br />Long-Term Archive<br />Compressed<br />1st Point of Recovery<br />Dedupe<br />Day to Day workloads +<br />Dedupe<br />Dedupe DR<br />
  168. 168. Introduce NetApp Arrays<br />NetApp Multi-Purpose Integrated Data Protection<br />Archive<br />Dedupe<br />Replication<br />Tape<br />Backup on production Array<br />Eliminates backup array<br />Instant backups & restores<br />Backups automatically transferred offsite<br />DR with backup points stored on a single array<br />Production<br />Offsite Backup<br />& DR<br />Backup<br />Long-Term Archive<br />Compressed<br />Day to Day workloads + Dedupe<br />1st Point of Recovery<br />Dedupe DR +<br />Offsite Backups<br />
  169. 169. Introduce NetApp Arrays<br />NetApp Multi-Purpose Integrated Data Protection<br />Production<br />Backup on production Array<br />Eliminates backup array<br />Instant backups & restores<br />Backups automatically transferred offsite<br />Long-term archive or DR Array<br />Dedupe<br />Replication<br />Production<br />Archive<br />Dedupe DR+ Backups<br />Long-Term Archive<br />Day to Day workloads +<br />Dedupe<br />1st Point of Recovery<br />
  170. 170. Lunch Break #Tech Days<br />Morning <br />Afternoon<br />8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits<br />9:00 – 9:15 Acrodex Welcome Address<br />9:15 – 10:15 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure<br />10:15 – 10:45 Desktop Virtualization – Case Study<br />10:50 – 11:20 Blackberry in the Enterprise – RIM Information Session<br />11:30 – 12:30 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session<br />12:00 – 12:45 Lunch & Vendor Exhibits<br />12:45 – 1:30 Software Asset Management<br />1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices<br />2:15 – 3:00 Implementing CRM in Your Environment<br />3:00 – 3:15 Refreshment Break and Transition to Breakout Sessions<br />3:15 – 3:45 Mobility Management – LANDesk Information Session<br />3:55 – 4:25 Megatrends in IT – HP Information Session<br />4:30 – 5:00 Reflections and Closing Remarks<br />5:00 – 7:00 Cocktail Reception<br />
  171. 171. Beyond Storage Efficiency and Automated Data protection in Virtual Environments<br />
  172. 172. A Little About Me<br />My experience lies in the licensing of software, whether in licensing agreements, basic office applications, servers, desktops, ERP or virtual licensing. <br />I started my technology career-path with KEPCO in San Antonio, Texas as an educational materials sales representative. My career continued for Soft Options in Calgary where I learned about large software licensing contracts by servicing clients like TCPL, Chevron, and Amoco (BP). I finished my time in Calgary working for WellPoint Systems which was an ISV for the oil and gas Sector.<br />For the last 4.5 years I have been with Acrodex as a software solutions specialist, sales manager and now territory manager building a team of like minded individuals in our prairie offices both in Regina and Winnipeg. <br />MCP, CSP, VSP – 14 years experience in software licensing<br />
  173. 173. CHALLENGES.<br />today more than ever businesses are faced with tight economic circumstances, challenged more than ever to do more with less… technology has never been more important to business strategy and survival.<br />
  174. 174. But Which Technology And How Do I Manage IT?<br />
  175. 175. Point Of Reference To The Problem<br />Urban sprawl, also known as suburban sprawl, is a multifaceted concept, which includes the spreading outwards of a city and its suburbs to its outskirts to low-density and auto-dependent development on rural land, high segregation of uses (e.g. stores and residential), and various design features that encourage car dependency.[1]<br />In the last 15 years, <br />As high speed connectivity increases + <br />device technology advances to do more in smaller devices =<br />Infrastructure sprawl.<br />
  176. 176. Is Software Licensing Complex?<br />Licensing Agreements<br /><ul><li>MBSA
  177. 177. EA
  178. 178. Select Plus
  179. 179. ELP
  180. 180. TLP or CLP
  181. 181. EAP
  182. 182. ECI
  183. 183. Easy Licensing
  184. 184. Campus/ Student
  185. 185. Open License</li></ul>Licensing Reference Terms<br /><ul><li>Cores
  186. 186. Per Server
  187. 187. Per Processor (physical or Virtual)
  188. 188. Std, Ent, Datacenter
  189. 189. OSE – Operating System Environment
  190. 190. CAL – Client Access License
  191. 191. Device CAL vs. User CAL
  192. 192. Concurrent User
  193. 193. Perpetual vs. subscription
  194. 194. Qualified Desktop
  195. 195. License certificate
  196. 196. OSE – operating system environment
  197. 197. VDI – virtual desktop infrastructure
  198. 198. Instance
  199. 199. Line of business
  200. 200. Training Lab</li></ul>Licensing Terms and Conditions<br />EULA – End User License Agreement<br />PUR – Product Use Rights<br />Maintenance Types<br /><ul><li>Maintenance
  201. 201. SA
  202. 202. Subscription Adv.</li></li></ul><li>Software Licensing Was Suppose To Be Simpler<br />Bottom Line benefits of Volume Licensing<br /><ul><li>Saves time in ordering process
  203. 203. Saves money in volume discounts
  204. 204. Many have resource bundled in (HUP, technical support, new version rights)</li></li></ul><li>What Is The Key Or Keys ?<br />Know what your “License Entitlement” provides<br />Have a system in place to help you manage <br />1) what is deployed.<br />2) what you are licensed to deploy.<br />
  205. 205. SAM Optimization Model By Role<br />
  206. 206. Server Counts Use To Be Simple<br />
  207. 207. User Devices Use To Be Simple<br />
  208. 208. Why would I count my company phones ?<br />
  209. 209. Opportunities and Issues<br />
  210. 210. Tablets Are New – Don’t They Arrive Licensed ? <br />Motorola Xoom<br />Apple Ipad 2<br />Asus Eee Pad<br />HP Slate<br />LG G-Slate<br />ViewSonicViewpad<br />Samsung Galaxy Tab<br />RIM BB Playbook<br />
  211. 211. Tools To Help You Manage Assets<br />Landesk Asset Lifecycle Manager<br />Microsoft - System Center Configuration Manager (Asset Intelligence)<br />CA – IT Asset Manager<br />IBM - Tivoli<br />
  212. 212. Cloud Services Questions – taken from Google<br /><ul><li>I need a productivity solution that’s easy to deploy and doesn’t require the ongoing maintenance of desktop software.
  213. 213. I want a solution that meets my needs today and automatically gets better over time.
  214. 214. I need a productivity solution that I can rely on.
  215. 215. I need technology that was built with security in mind.
  216. 216. My employees need to collaborate seamlessly across organizational, geographical and linguistic barriers.
  217. 217. I want my employees to move faster without being slowed down by inflexible technology.
  218. 218. My employees need to use a wide range of mobile phones and tablets including Android, Blackberry, iPhone and Windows Mobile.
  219. 219. My employees need to do more from mobile devices than just send emails.
  220. 220. I want a simple licensing model that is cost-effective and predictable.
  221. 221. I want to spend half as much on IT as I do today. </li></li></ul><li>Full SAM Engagement<br />SAM Baseline<br />SAM Assessment<br />Review of customer’s existing processes against SAM Optimization Model framework, identifying improvement opportunities and associated ROI.<br />Inventory of deployed Microsoft assets, review of corresponding customer license documentation, virtual, hosted, or cloud-based solutions, and identification of any opportunities for improvement. <br />SAM Deployment Planning<br />Provides deployment assistance for processes and technologies to support key SAM areas, including deployment, metering, inventory and control. Special focus on solutions deploying Microsoft technologies including System Center, MDOP AIS, or MAP.<br />
  222. 222. SAM Assessment Framework Overview<br />Planning<br />Define the what , where, when, who & how of the engagement<br />Data Gathering<br />Collect all relevant data to address the 10 key competencies and conduct customer interviews <br />Data Analysis<br />Reconcile and validate collected data and document results<br />Presentation<br />Preset SAM Assessment results to the customer<br />
  223. 223. SAM Assessment Engagement SAM Optimization Model – Maturity levels<br />BASIC<br />STANDARDIZED<br />RATIONALIZED<br />DYNAMIC<br />Project Manager assigned but SAM roles & responsibilities not defined<br />Direct SAM responsibility is identified throughout organization<br />SAM responsibilities defined in job descriptions across organization<br />Each functional group actively manages SAM<br />No SAM development or communication plan<br />SAM plan is defined and approved<br />SAM Improvement is demonstrated<br />SAM goals part of executive scorecard; reviewed regularly<br />No centralized inventory or < 68% assets in central inventory<br />> 68% - 95% of assets in inventory<br />> 95% - 98% of assets in Inventory<br />> 99% of assets in inventory<br />Dynamic discovery tools provide near real-time deployment details<br />Manual inventory; no discovery tools<br />Inventory sources reconciled annually<br />Inventory sources reconciled quarterly<br />Procurement manages contracts; not accessed by IT managers<br />Complete entitlement records exist across organization<br />Entitlement records reconciled with vendor records<br />SAM entitlement system interfaces with vendor entitlement to track usage<br />System reconciliations and ITAM report available on demand<br />IT operations managed on ad-hoc basis<br />Annual sign-off on SAM reports<br />Quarterly sign-off on SAM reports<br />SAM not considered part of M&A risk plan and company integration<br />All business units follow the same strategy, process & technology for SAM<br />Operations manages separate asset inventories<br />Operations manages associated asset inventory<br />Assets purchased on a per project basis; without a review of current availability<br />Software purchases based on deployment/entitlement reconciliation<br />All purchases are made using a pre-defined asset catalog; based on metered usage<br />Software purchases use approved vendors<br />Assets deployed by end-users in distributed locations; no centralized IT<br />Software deployment reports are accessible to stakeholders<br />Software is dynamically available to users on demand<br />Only approved software is deployed<br />Centrally controlled inventory of harvested licenses is maintained & available for reuse. Deployment & license records are updated<br />Unused software is harvested (where the license allows) and tracked within a centrally controlled inventory<br />Automated process w/ centralized control & tracking of all installed software, harvest options, internal reassignment and disposal<br />Software is retired with hardware and is not harvested or reassigned<br />
  224. 224. SAM – Program Features<br /><ul><li>Gap Analysis
  225. 225. License Reconciliation
  226. 226. License Harvesting
  227. 227. Lifecycle Assessment
  228. 228. Security checks
  229. 229. License compliance
  230. 230. Reporting
  231. 231. Security Policies and configurations
  232. 232. Application management and updating
  233. 233. Comprehensive reporting</li></li></ul><li>Benefits of Software Asset Management<br /><ul><li>Software Compliance
  234. 234. Productivity Gains
  235. 235. Expanded risk mitigation
  236. 236. Control over IT infrastructure
  237. 237. Simplified IT management
  238. 238. Optimized Software deployment
  239. 239. Streamlined License Acquisition
  240. 240. Increased Security
  241. 241. Peace of Mind</li></li></ul><li>Our Approach to SAM<br /><ul><li>Long Term Customer Engagement
  242. 242. Strategy
  243. 243. Full SAM Services
  244. 244. Industry Best Practices
  245. 245. Key Metrics and Reports
  246. 246. Compliance and Optimization</li></li></ul><li>Collaborate, Communicate Integrating a UC Platform and Mobile Devices<br />
  247. 247. OjasviBansal<br />Unified Communications Solution Specialist<br />Mark Gelsomini<br />Corporate Director Information Technologies<br />
  248. 248. Acrodex UC Solution <br />The world of business is evolving. Evolve with it.<br /><ul><li>UC Solutions & Services:
  249. 249. Consulting Services
  250. 250. Design and Architecture
  251. 251. Deployment Services
  252. 252. Professional Services
  253. 253. Managed Services
  254. 254. Training Services
  255. 255. Triage Services: Single Point Of Contact For Hardware, Software Or Service Escalation Regardless Of Vendor</li></li></ul><li>Single Source Provider: Enhancing End User Experience<br />Video<br />Conferencing<br />Cell Phone<br />E-Mail<br />Fax<br />Voice Mail<br />Desk Phone<br />Multiple communication modalities<br />Different interfaces and technologies<br />Lack of integration (due to product End of Life)<br />Multiple vendors supporting voice, data and network applications<br />Customers are investigating Network upgrades to SIP<br />Clients are requiring mobile convergence<br />
  256. 256.
  257. 257. What Is Unified Communications?<br />
  258. 258. Unified Communications – The Myths<br />It’s Just Skype.<br />It’s Voicemail in Your Email.<br />It’s Big, Complex, and Expensive.<br />It’s Definitely Not for Small Businesses Like Mine.<br />It’s Just a Fancy Word for Voice over IP.<br />Whatever It Is, It’s More Than I Need.<br />It’s Patching Things Together That Don’t Work Together.<br />
  259. 259. What Is Unified Communications? <br />“Unified Communications solutions bring together voice, messaging, video, and desktop applications to enable companies to quickly adapt to market changes, increase productivity, improve competitive advantage and deliver a rich-media experience across any workspace.”<br />115<br />
  260. 260. Components of Unified Communications<br />Communications: Voice, data, and video<br />Messaging: Voice, email, video, and IM<br />Conferencing: Online, audio, and video<br />Application integration: Microsoft Office and CRM<br />Presence: IP phone, desktop clients, and call connectors<br />Common user experience: Desktop, phone, and mobility<br />
  261. 261. Using Unified Communications, You Can…<br />Connect Everyone<br />Serve Customers Better<br />Collaborate<br />Connect<br />Be More Productive<br />Secure My Business<br />Work from <br />Anywhere<br />
  262. 262. Total Economic Impact (Example)<br />Forrester Study Shows >500% ROI in Three Years <br />The study shows the following benefits for a 4,000 employee organization over a three-year period: <br />Source: Forrester, 2007<br />
  263. 263. TSX: DPM<br />Underground Communications Mark GelsominiCorporate Director IT <br />
  264. 264. Agenda<br />Who is Dundee Precious Metals Inc.?<br />Technology<br />Network Topology<br />Wi-Fi Coverage <br />Software- Push to Talk, Paging <br />Aeroscout Project<br />
  265. 265. Dundee Precious Metals <br />Dundee Precious Metals (DPM:TSX) is a Canadian-based, international mining company engaged in the acquisition, exploration, development, mining and processing of precious metal properties. <br />DPM’s business objectives are to identify, acquire, finance, develop and operate low-cost, long-life mining properties.<br />With a dynamic global operation, DPM decided that a more strategic, centralized approach to IT was necessary to support the emerging business requirements.<br />
  266. 266. “Taking the Lid Off”<br />OLD WAY<br />NEW WAY<br />Paper reporting at end of shift<br />Supervisor interaction 1-2 /shift<br />Limited knowledge of shift delays<br />Slow response time to process interruptions<br />Reactive Maintenance<br />Small picture view<br />Poor coordination <br />Poor use of resources<br />Lost time locating equipment/materials etc. from shift to shift<br />Real time display of information<br />Supervisor dispatched to critical shift problems<br />Delays identified in real time<br />Problems identified immediately<br />Real time equipment health monitoring<br />See activities in whole mine in real time<br />Coordination through CCR with big picture<br />Resources utilized to optimize shift results<br />Real time equipment and materials tracking<br />122<br />
  267. 267. DPM Global IT VisionMission Statement<br />“To deliver reliable business-centricIT solutions, infrastructure and services through leadershipand partnershipwith DPM operations globally to maximizing efficiency, streamlining processes, while supporting <br />corporate objectives.”<br />
  268. 268. The Technology <br />High speed fiber optic data link coupled with a 50 – 110 Volt (touchable) low power consumption power line bring high speed data line to any point where some form of communication device has to be placed.<br />Wi-Fi based communication<br />Wi-Fi clients, Wi-Fi based Push To Talk system<br />Wired clients (Controllers, Cameras, FANs)<br />RFID/Wi-Fi based location tracking<br />
  269. 269. Enabling Technologies<br />
  270. 270. Design<br />Boxes are connected with fiber optic cables and can be separated up to 10Km<br />Wired clients are connected to the boxes with up to 100m copper cable<br />BOX is rated for IP67 (Industrial)<br />All industrial connectors<br />FOB is fully detachable<br />Industrial Wi-Fi clients (Yellow) <br />
  271. 271. The technology Picture<br />Standard IP Telephone<br />In an IP67 Protected box<br />With Visual Ringer<br />Places<br />Refuge Chambers<br />Shafts<br />Pumps<br />Transformer Bays<br />Ore-Passes<br />
  272. 272. Under Ground Cable Layout<br />
  273. 273. Cable Layout<br />
  274. 274. Wi-Fi Coverage<br />
  275. 275. Push to talk and Paging<br />All Wi-Fi phones have Push To Talk capabilities<br />Push to Talk application will have following features<br />Unlimited numbers of channels<br />Emergency button<br />Listening to more than one channel (For Safety department)<br />Channel filtering<br />Paging is software which give the opportunity to send audio and text messages to group or all phones<br />
  276. 276. Communications- Wireless ethernet<br />Access point<br />Wi-Fi phone<br />132<br />
  277. 277. Push to talk and Paging <br />
  278. 278. Aeroscout Location Tracking <br />Wi-Fi/RFID based<br />Tags will be installed in lamps<br />Tags will be installed in all vehicles<br />Entry/Exit events<br />Business events<br />Vehicle location<br />Where we have people working<br />Location history<br />Location reports<br />Safety<br />
  279. 279. How Does it Work?<br />1) Active RFID tags and/or standard wireless devices send a tiny wireless signal at a regular interval<br />2) Signal is received by the Wi-Fi wireless network (or location receivers), and is sent to an Engine<br />3) The Engine uses multiple algorithms to determine location, and sends asset data (location, status, etc.) to enterprise software<br />4) Enterprise software uses location and status data to display maps, enable searches, create alerts, manage assets, etc.<br />135<br />
  280. 280. Location Dashboard<br />
  281. 281. Challenges <br />Improve local and global communications<br />Simplicity in use <br />Significant communication limitation between groups<br />Improve health and safety <br />Production improvement<br />Equipment tracking capability<br />
  282. 282. Solutions<br />Allows quick identification of problem and locations for rapid response to mine emergencies<br />Enhanced communication between surface and underground operations thus improving equipment and manpower utilization/allocation/reassignment and maintenance <br />Use of small portable Wi-Fi phone units provides ease of use for timely response to production and safety needs <br />Underground and surface tracking of equipment<br />A single number follows the person anywhere in the world<br />Integrated voice mail and email<br />Global help desk<br />
  283. 283. Benefits<br />Minimizes expensive cell phone traffic<br />All users will be able to communicate seamlessly anywhere in the world (one product does it all)<br />Rapid response to changing underground situations to maximize material movement<br />Decreases equipment downtime through better information on location and repairs required<br />
  284. 284. Achievements and Awards<br />May 2010 Microsoft Momentum Magazine Cover Story<br />“Gold Standard”<br />Awarded “Most Innovative Company 2010”from Cisco Europe<br />Finalist “Most Innovative Business Impacting Network of the Year”<br />First mining company to deploy non-proprietary communicationtechnologies in the mines<br />Created three way integrationwith Cisco VoIP, Tandberg and OCS<br />
  285. 285. Implementing CRM in Your Environment <br />Shan McArthur<br />VP of Technology, Adxstudio<br />
  286. 286. Afternoon Break #Tech Days<br />Morning <br />Afternoon<br />8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits<br />9:00 – 9:15 Acrodex Welcome Address<br />9:15 – 10:15 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure<br />10:15 – 10:45 Desktop Virtualization – Case Study<br />10:50 – 11:20 Blackberry in the Enterprise – RIM Information Session<br />11:30 – 12:30 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session<br />12:00 – 12:45 Lunch & Vendor Exhibits<br />12:45 – 1:30 Software Asset Management<br />1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices<br />2:15 – 3:00 Implementing CRM in Your Environment<br />3:00 – 3:15 Refreshment Break and Transition to Breakout Sessions<br />3:15 – 3:45 Mobility Management – LANDesk Information Session<br />3:55 – 4:25 Megatrends in IT – HP Information Session<br />4:30 – 5:00 Reflections and Closing Remarks<br />5:00 – 7:00 Cocktail Reception<br />
  287. 287. Mobility Management – LANDesk Information Session<br />
  288. 288. Don Moss<br />Channel Systems Engineer<br />
  289. 289. LANDesk Software<br />The Leader in Helping Simplify & Control IT Complexity<br />LANDesk named a “Leader” in the 2010 Gartner Magic Quadrant for systems lifecycle management<br />One of only two vendors on the three Magic Quadrants for management, endpoint security, and service desk (Gartner 2010)<br />698% return on investment within 3 years; payback in 5 months (IDC 2011)<br />LANDesk saves over $32,022 per 100 users, per year (IDC 2010)<br />Partners<br />Apple, Credant, Cognizant, IBM, Intel, Kaspersky, Lenovo, Microsoft, Wipro<br />400+ certified VARs/system integrators worldwide<br />
  290. 290. The LANDesk “complete” Solution<br />Gartner Magic Quadrant<br />PC Configuration Life Cycle Management Tools<br />Jan 2011 <br />“LANDesk has one of the most complete products in terms of overall functionality, and the code base is solid and stable. LANDesk benefited this year from an increased weight on managing non-Windows clients…<br />LANDesk has a strong OEM partnership with VMware for its Thinapp product. LANDesk has tight integration with a fairly large number of customers using the application virtualization offering”<br />
  291. 291. Your Extended Team<br />
  292. 292. Delivering Value<br />
  293. 293. Delivering Value<br />Their Challenges?<br />
  294. 294. >LANDesk Management and Security Suite<br />Systems<br />Lifecycle<br />Management<br />Power &<br />Infrastructure<br />Management<br />Endpoint Security & Compliance<br />Management AutomationPlatform<br />Asset <br />Lifecycle<br />Management<br />Virtualization<br />Management<br />IT Service<br />Management<br />
  295. 295. What is mobility?<br />What’s driving the need to manage mobility?<br />What are the three keys to managing the mobile enterprise<br />How can I see mobile devices on my networkand who they belong to? <br />How can I manage and secure the corporate data on my user’s devices?<br />What is LANDesk’s approach to mobility?<br />How do we get started?<br />151<br />Agenda<br />>We’ll Answer 7 Questions:<br />
  296. 296. >What is Mobility?<br />Consider:<br /><ul><li>Mobile Users
  297. 297. By 2015, there will be nearly one mobile device for every person alive. Projections indicate there will be over 7.1 billion mobile-connected devices—approximately equal to the world’s population in 2015 (7.2 billion). 1
  298. 298. By 2013, more than a third of the world’s workforce will consist of mobile workers, potentially 1.2 billion people. 2
  299. 299. Mobile Devices
  300. 300. In the fourth quarter of 2010, 100 million smartphone units shipped compared to 92 million PC units. For the first time, smartphones outshippedPCs. 3
  301. 301. Apple will ship 43.7 million iPads in 2011 and 63.3 million in 2012, up from an estimated 14 million in 2010. 4</li></li></ul><li>Endpoint Transformation – Mobile Devices<br />Computing Devices<br />Projected percentage of unit sales in US<br /><ul><li>2009 – Microsoft represents 84% of PC Operating Systems
  302. 302. Tablets market share will rise from 6% to 23% by 2015…
  303. 303. 2010 and beyond – Tablets and smartphones will be substitutes for PCs
  304. 304. …desktop shares will drop from 32% in 2010 to 18% by 2015
  305. 305. …in the future, Users will opt for one PC and a mix of tablets and smartphones
  306. 306. New OS’s will offer a different experience driven by applications to provide functions</li></ul>Source: Forrester Research, The Wall Street Journal-6/9/10<br />
  307. 307. Multiple Tipping Points<br />IT Consumerization<br />(App-driven, consumer-owned, co-mingled data)<br />Digital Native Lifestyle<br />(Always connected, social and multi-tasking)<br />User Is The New Endpoint<br />(Tech savvy, platform-transparent, user vs. device management) <br />
  308. 308. Separation of Work and Personal<br />5-7 Years Ago<br />Business<br />Personal<br />Corp. Servers<br />Personal Storage<br />Personal Time<br />Work Time<br />Work Desktop<br />Personal Computer<br />Personal Calendar<br />Work Calendar<br />Work Contacts<br />Work Cell Phone<br />Personal Cell Phone<br />Personal Contacts<br />IT Involvement<br />IT Dilemma<br />
  309. 309. Digital Lifestyle<br />Today<br />Business<br />Personal<br />Mobile Apps<br />Personal Storage<br />Corp. Servers<br />Smart Phone<br />Calendar<br />Laptop<br />Social Network<br />Contacts<br />Time<br />Cloud Storage & Apps<br />IT Involvement<br />IT Dilemma<br />
  310. 310. Why Should You Care?<br />“By 2013, those corporate IT departments that have not enabled a diverse population of devicesandend-user choicesthrough emphasis on manageability, policy enforcement and security evaluations will become hopelessly outmoded and struggle to function. <br />This will cause chaos and substantially raise the total cost of ownership of the organization. ”<br />http://www.thestreet.com/story/10970787/2/15-tech-trends-to-emerge-by-2014.html<br />
  311. 311. See and know what you have<br />Set and enforce effective IT policy<br />Manage and secure anywhere, anytime<br />Managing the Mobile Enterprise<br />>What Are The 3 Keys To Succeed?<br />
  312. 312. Know What You Have – Greater Visibility<br />>How Can I See Mobile Devices?<br />Discovery and Inventory<br />20+ years of experience <br />Know what you have and what’s connecting to your network<br />Discover any device accessing yourcorporate data<br />Company owned vs. Employee owned devices<br />
  313. 313. Security Stats – Where and How<br />Security breach information is taken from datalossdb.com – an online database of reported worldwide security breaches<br />
  314. 314. A Layered Security Solution is Key<br />Process<br />Automation<br />Process<br /><ul><li>Executive Dashboard
  315. 315. Reporting
  316. 316. Alerting
  317. 317. Compliance
  318. 318. Process Diagrams
  319. 319. IT Workflows
  320. 320. Business Process</li></ul>Knowledge & <br />Verification<br />Proof<br /><ul><li>Data Encryption Policies
  321. 321. Extended Media Encryption
  322. 322. Shadow Copy</li></ul>MobileManagement <br /><ul><li>Cloud Services Appliance
  323. 323. Location Based Policies
  324. 324. Anti-bridging Tech.
  325. 325. Mobile Devices</li></ul>Policy<br />Configuration<br /><ul><li>Buffer Overflow
  326. 326. Application Control
  327. 327. HIPS/Whitelisting
  328. 328. Antivirus/anti-spyware</li></ul>Patch<br />Patch<br /><ul><li>Security Configuration
  329. 329. Device Control Policies
  330. 330. Agent Persistence
  331. 331. Firewall</li></ul>Data<br /><ul><li>OS Patching
  332. 332. App Patching (Beyond MS)
  333. 333. Cross PlatformPatching</li></ul>Protection<br />Malware<br /><ul><li>Distributed Discovery
  334. 334. Discover firewalled devices
  335. 335. Real-time Discovery
  336. 336. WAP Discovery</li></ul>Discovery<br />
  337. 337. The Sum of All Fears: <br />‘Oh That Guy’<br /><ul><li>Nomadic
  338. 338. Early Adopter w/ Multiple Devices
  339. 339. Want access to be more productive
  340. 340. A‘Jailbreaker’
  341. 341. Policy ‘Skirter’ / Ignores policy</li></li></ul><li>The LANDesk Answer<br />
  342. 342. Laying The Foundation for Mobility Management<br />>How do you focus on the user?<br /><ul><li>Start with heterogeneous management
  343. 343. Common management infrastructure
  344. 344. Single “pane of glass” management help you consolidate technology
  345. 345. Process integration
  346. 346. Include multi-layered security
  347. 347. 5 Powers – Protection, Patch, Policy, Proof and Process
  348. 348. Top it off with software and service management</li></li></ul><li>Manage and Secure through the Cloud<br />>Distributed Enterprise<br />Data encryption<br />Manage and Secure through the cloud – Cloud Service Appliance<br />Mobile or location aware policies<br />Host Intrusion Protection System (HIPS)<br />USB Blocking<br />Shadow Copying<br />System & Application Patching<br />LANDesk Cloud Services Appliance<br />
  349. 349. LANDesk Mobility Management Strategy<br />>What Is LANDesk’s Mobility Approach?<br />Leverage LANDesk Competencies<br /><ul><li>Platform
  350. 350. Agentless discovery and management for employee-owned devices
  351. 351. Single Agent-based management to greater management and security features
  352. 352. Automated management activities</li></li></ul><li>Agentless – Email Client Layer<br />Exchange & Blackberry Enterprise Server (BES)<br />>First Generation<br />>Leverages Existing Email Infrastructure<br />>View it by user and by device<br />>Multi-platform<br />>Basic management and security capabilities<br />
  353. 353. Discovery…How it works…<br />Mike.temple@landesk.com<br />landesk<br />mtemple<br />****************<br />My LANDesk e-mail<br />Mobile devices appear in the console<br />New device configures ActiveSync client<br />Blackberry provisioned with BES<br />Discovery runs…<br />
  354. 354. Where do we go from here?<br />
  355. 355. Single Agent – Managed Mobility<br />Agent-based & Management Layer<br />>Next Gen<br />>OEM<br />>Apple MDM SDK<br />>Leverage management standards as they develop<br />
  356. 356. Policy Management for OEMs<br />
  357. 357. <ul><li>Summary
  358. 358. Question & Answers</li></li></ul><li>Megatrends in IT – HP Information Session<br />
  359. 359. Neil Thompson<br />Solutions Architect<br />
  360. 360. Closing Address<br />Tim Sterzer<br />Senior Sales Team Lead<br />
  361. 361. Special thanks to…<br />
  362. 362. Questions<br />Tim Sterzer<br />Tim.Sterzer@acrodex.com<br />

×