SlideShare una empresa de Scribd logo
1 de 34
Descargar para leer sin conexión
System Management
Challenges
Michael Otey
President TECA, Inc.
Senior Contributing Editor
Windows IT Pro
SQL Server Pro
What This Session Covers
• Today’s datacenter requirements
• Challenges
– Managing Windows and Linux
– Management of virtual systems
– Monitoring and capacity planning
– Deploying and updating applications
– Preparing for containers and
microservices
– Keeping on top of inventory and licensing
– Cloud and hybrid cloud
Rapid Technology Changes
are Driving New IT Demands
• Vast increases in connectivity
– The mobile cloud connects 3.1 billion of 7.3 billion people worldwide
– They average 3 connected devices per person
– By 2025, 80% of the population will be
connected
• Explosive data growth
– Data growth – 30-50% per year
– IoT, Big Data, social, mobile data
• Rapid cloud adoption
– 90% of VMworld attendees had workloads
deployed in the public cloud
3
Today’s IT Requirements
• Agility
– Meeting quickly changing business
conditions
• Reducing complexity
• Increasing automation
• Consumerization of IT
• Reducing costs
– CapEX & OpEx
• Data control and security
Modern IT Infrastructure
• Heterogeneous “Best-of-Breed” implementation
• Virtualization
– The foundation of the modern data center
– Enables mobility
– Enhances flexibility
• Storage
– Scalability & flexibility
– Data storage efficiency – deduplication
– Snapshots & replication
• Cloud
– Flexibility & extensibility
– Disaster recovery
5
System Management
Challenges
Managing Windows & Linux
• Heterogeneous platforms are growing
– Standalone applications
– Microsoft’s recent adoption of Linux and open source
• User authentication
– Multiple authentication sources
– Build a centralized user directory and integrate standard
protocols such as SAML, OAuth 2.0, or Openid Connect
• Configuration management & automation
– Different tools and approaches
– Use personnel or cross platform tools like Chef and Puppet
• Log file management
– Differently formatted system and application log files
– Use open source or third party log management tools
Managing Windows & Linux
• Reduction of console sprawl
– Different platform management tools and
multiple support structures
– PowerShell
– Use open source &
third party tools
• Remote Access tools
– VMC, UltraVNC
Managing Virtual Systems
• Multiple hypervisors
– VMware vSphere & Hyper-V (60%-40%)
– Different management capabilities/tools
– Limited cross platform capabilities
• Siloed management
– Different personnel
• Lack of visibility
• Integration tools
– VMware has Multi-Hypervisor Manager
– Microsoft has VMM
– Third party tools
• Distributed Management Task Force (DMTF)
standards
Monitoring and Capacity
Planning
• Goal is improving capacity utilization
• Performance baselining multiple OSes and tools
• Virtualization hides capacity
• Creating service levels
• Under / Over provisioning
– Proper control mechanisms
• Forecasting business demand
– Analyzing the historical workload data
– Working in cooperation with business teams
Deploying and Updating
Applications
• Version differences
– Version control systems
• Multiple device support
– Workspace / VDI technologies
• Multiple platform targets
– Desktop, web, on-premise, cloud
– Cross platform tools
Containers and Microservices
• Moving away from legacy monolithic
applications
– Mode 2 – microservices
– Application redesign
• New to Windows environments
• Mixing legacy & mode 2 apps
• Different monitoring tools
• Docker provides a common
management experience
Inventory Management
• Virtual server sprawl
- Self-service VMs
• Users and developers
- Unexpected licensing
- BYOD management
- Inventory tools
- System Center
- Third party tools
Licensing
- Vendors use different licensing
- Products use different licensing
- Licensing is complicated
- Trend toward core licenses
- Virtualization further complicates
licensing
- Ongoing inventory is required
- Cloud and SaaS tend to simplify this
Challenges of Cloud Adoption
• Growing quickly
• Legacy Infrastructure
• Potentially lower performance
– Shared hardware
• Consolidation and pooling of
resources
– Giving up dedicated resources
• Adoption of new technologies
Integrating the Cloud and
Hybrid Cloud
• Moving legacy workloads
• Distributed applications
• Lack of expertise
• Multiple cloud providers
• Difficult to estimate costs
• Partners and third party tools
Key Takeways
• Be prepared for growth – more technology
changes are coming in the next few years
than ever before
• Linux & heterogenous virtualization will
grow
• Proper planning and tools are essential for
effective systems management
• The cloud is the future
– But that journey is a long one
– Hybrid cloud is the next practical step
KACE Systems
Management Appliance 7.0
(K1000)
Confidential19
• Scan in your new or
existing assets
• Multiple platform support
• Scan and GO!
• Free update to the K1
GO! app
Barcoding
Confidential20
• Pull data from multiple appliances
into single report
• No specialized hardware needed
Cross appliance reporting
Confidential21
Confidential22
• New easier to use wizard
• New features
• Multiple approvers
• Specific approver notifications
• Approval Timeout
• Customizable notifications
• Customize your templates with
HTML/markdown
Process enhancements & approval workflow
Confidential23
• My devices made easier
• Assign devices easier
• Multiple devices? No
problem
• Interactive feedback
• Get more info during
your install
Self-service software provisioning enhancements
Confidential24
• Hardware monitoring made
easier
• Real-time alerts
• Stay on top of your
environment
SNMP Trap Receiver
Confidential25
AirWatch integration
• Single pane of glass
• All your devices in one place
• Integrated asset management
• Assign mobile devices to users and
more
Confidential26
• Supports ESX 5.5 and 6.0
• Discover what VM’s are running
on your servers
• Get hardware/software details
from your VMware environment
• Get hardware usage available
VMware/Vcenter discovery
Confidential27
• My Profile
• More for your users
• See what
tickets/assets/devices
are assigned to you
Users
Confidential28
• Manually or automatically assign users to a device
• Control Panel > General > Device Assignment
• Synchronous occurs upon inventory
• Used in conjunction with user portal and “My Profile”
User/Machine assignment
Confidential29
• Installing software made easier
• Ability to leverage the software
catalog
• “Run Now” option added
• Publish for users
• Existing MI’s usable from
software portal
Managed Installs
Confidential31
• Blacklisting improvement
• Upgrade/Downgrade rights
• Asset Management Appliance licensing changes
• Agentless and grandfathering
• REST API’s/SDK
• Ability for 3rd parties to pull information about inventory, assets, scripting,
reporting, managed installs, and users
Software compliance/Licensing/API’s
KACE Systems
Deployment Appliance
4.0 (K2000)
Confidential33
• Native UEFI support
• Removes reliance on current workarounds (Legacy BIOS setting, thumb drives)
• Secure Boot still needs to be disabled
• Multicasting in Cisco networks
• Router vendors lack Pragmatic General Multicast (PGM) support
• PGM not designed to cross routers
• Internet Group Management Protocol (IGMP) is vendor agnostic
• IGMP can cross between routers/subnets
• Increased Windows deployment speed
• WIM and Kimage speeds 10% faster
KACE SDA Imaging Connectivity and Speed
Confidential34
• Major focus on underlying OS architecture
• Update to the K2000 Appliance 3.7 SP3 (3.7.345)
• Combined SDA and RSA codebase
• FreeBSD 10.0 to 10.3 for SDA
• FreeBSD 7 to 10.3 for RSA
• 32-bit to 64-bit for RSA
• RSA Hyper-V support
KACE SDA Infrastructure
Watch the webcast here:
http://bit.ly/2ilF7N6

Más contenido relacionado

La actualidad más candente

RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
RES Software Nederland
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
Anne Starr
 

La actualidad más candente (20)

Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud2809 Five compelling reasons for creating a CICS Cloud
2809 Five compelling reasons for creating a CICS Cloud
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
Introductorytocomputing
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Cloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformCloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management Platform
 
#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
 
Ad Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive MistakeAd Hoc Automation is an Expensive Mistake
Ad Hoc Automation is an Expensive Mistake
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active Directory
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
SCOM 2012 service SaaS
SCOM 2012 service SaaSSCOM 2012 service SaaS
SCOM 2012 service SaaS
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 

Destacado

cv-J_Angelico_20150926
cv-J_Angelico_20150926cv-J_Angelico_20150926
cv-J_Angelico_20150926
John Angelico
 
Spaceships unit plan
Spaceships unit planSpaceships unit plan
Spaceships unit plan
Jacqui Sharp
 
2 approaches to system development
2 approaches to system development2 approaches to system development
2 approaches to system development
cymark09
 
Environmental pollution control
Environmental pollution controlEnvironmental pollution control
Environmental pollution control
priyanka odela
 
Management information system
Management  information systemManagement  information system
Management information system
Ramya Sree
 
Power Point Animation
Power Point AnimationPower Point Animation
Power Point Animation
jaspang
 

Destacado (15)

How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange ...
 
1η παδ
1η παδ1η παδ
1η παδ
 
cv-J_Angelico_20150926
cv-J_Angelico_20150926cv-J_Angelico_20150926
cv-J_Angelico_20150926
 
Spaceships unit plan
Spaceships unit planSpaceships unit plan
Spaceships unit plan
 
2 approaches to system development
2 approaches to system development2 approaches to system development
2 approaches to system development
 
Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...Continuous heart rate and body temperature monitoring system using arduino un...
Continuous heart rate and body temperature monitoring system using arduino un...
 
Heart beat detector using arduino
Heart beat detector using arduinoHeart beat detector using arduino
Heart beat detector using arduino
 
Microcontroller based heart rate meter
Microcontroller based heart rate meterMicrocontroller based heart rate meter
Microcontroller based heart rate meter
 
Environmental pollution control
Environmental pollution controlEnvironmental pollution control
Environmental pollution control
 
Systems Approach to Management
Systems Approach to ManagementSystems Approach to Management
Systems Approach to Management
 
Management information system
Management  information systemManagement  information system
Management information system
 
Power Point Animation
Power Point AnimationPower Point Animation
Power Point Animation
 
Heart beat monitor system PPT
Heart beat monitor system PPT Heart beat monitor system PPT
Heart beat monitor system PPT
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
 
Management information system
Management information systemManagement information system
Management information system
 

Similar a Your Biggest Systems Management Challenges – and How to Overcome Them

Citrix XenServer Success
Citrix XenServer SuccessCitrix XenServer Success
Citrix XenServer Success
eG Innovations
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business Intelligence
Sudip Chatterjee
 

Similar a Your Biggest Systems Management Challenges – and How to Overcome Them (20)

KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservices
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenter
 
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles
 
Citrix XenServer Success
Citrix XenServer SuccessCitrix XenServer Success
Citrix XenServer Success
 
Big SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on HadoopBig SQL 3.0 - Fast and easy SQL on Hadoop
Big SQL 3.0 - Fast and easy SQL on Hadoop
 
Designing Microservices
Designing MicroservicesDesigning Microservices
Designing Microservices
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
 
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilizationFlex Cloud Hosting - Reduce server sprawl and optimize server utilization
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
 
The Art of Displaying Industrial Data
The Art of Displaying Industrial DataThe Art of Displaying Industrial Data
The Art of Displaying Industrial Data
 
RedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in Equinix
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business Intelligence
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
Un-clouding the cloud
Un-clouding the cloudUn-clouding the cloud
Un-clouding the cloud
 

Más de Quest

Más de Quest (20)

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
 

Último

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
anilsa9823
 

Último (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

Your Biggest Systems Management Challenges – and How to Overcome Them

  • 1. System Management Challenges Michael Otey President TECA, Inc. Senior Contributing Editor Windows IT Pro SQL Server Pro
  • 2. What This Session Covers • Today’s datacenter requirements • Challenges – Managing Windows and Linux – Management of virtual systems – Monitoring and capacity planning – Deploying and updating applications – Preparing for containers and microservices – Keeping on top of inventory and licensing – Cloud and hybrid cloud
  • 3. Rapid Technology Changes are Driving New IT Demands • Vast increases in connectivity – The mobile cloud connects 3.1 billion of 7.3 billion people worldwide – They average 3 connected devices per person – By 2025, 80% of the population will be connected • Explosive data growth – Data growth – 30-50% per year – IoT, Big Data, social, mobile data • Rapid cloud adoption – 90% of VMworld attendees had workloads deployed in the public cloud 3
  • 4. Today’s IT Requirements • Agility – Meeting quickly changing business conditions • Reducing complexity • Increasing automation • Consumerization of IT • Reducing costs – CapEX & OpEx • Data control and security
  • 5. Modern IT Infrastructure • Heterogeneous “Best-of-Breed” implementation • Virtualization – The foundation of the modern data center – Enables mobility – Enhances flexibility • Storage – Scalability & flexibility – Data storage efficiency – deduplication – Snapshots & replication • Cloud – Flexibility & extensibility – Disaster recovery 5
  • 7. Managing Windows & Linux • Heterogeneous platforms are growing – Standalone applications – Microsoft’s recent adoption of Linux and open source • User authentication – Multiple authentication sources – Build a centralized user directory and integrate standard protocols such as SAML, OAuth 2.0, or Openid Connect • Configuration management & automation – Different tools and approaches – Use personnel or cross platform tools like Chef and Puppet • Log file management – Differently formatted system and application log files – Use open source or third party log management tools
  • 8. Managing Windows & Linux • Reduction of console sprawl – Different platform management tools and multiple support structures – PowerShell – Use open source & third party tools • Remote Access tools – VMC, UltraVNC
  • 9. Managing Virtual Systems • Multiple hypervisors – VMware vSphere & Hyper-V (60%-40%) – Different management capabilities/tools – Limited cross platform capabilities • Siloed management – Different personnel • Lack of visibility • Integration tools – VMware has Multi-Hypervisor Manager – Microsoft has VMM – Third party tools • Distributed Management Task Force (DMTF) standards
  • 10. Monitoring and Capacity Planning • Goal is improving capacity utilization • Performance baselining multiple OSes and tools • Virtualization hides capacity • Creating service levels • Under / Over provisioning – Proper control mechanisms • Forecasting business demand – Analyzing the historical workload data – Working in cooperation with business teams
  • 11. Deploying and Updating Applications • Version differences – Version control systems • Multiple device support – Workspace / VDI technologies • Multiple platform targets – Desktop, web, on-premise, cloud – Cross platform tools
  • 12. Containers and Microservices • Moving away from legacy monolithic applications – Mode 2 – microservices – Application redesign • New to Windows environments • Mixing legacy & mode 2 apps • Different monitoring tools • Docker provides a common management experience
  • 13. Inventory Management • Virtual server sprawl - Self-service VMs • Users and developers - Unexpected licensing - BYOD management - Inventory tools - System Center - Third party tools
  • 14. Licensing - Vendors use different licensing - Products use different licensing - Licensing is complicated - Trend toward core licenses - Virtualization further complicates licensing - Ongoing inventory is required - Cloud and SaaS tend to simplify this
  • 15. Challenges of Cloud Adoption • Growing quickly • Legacy Infrastructure • Potentially lower performance – Shared hardware • Consolidation and pooling of resources – Giving up dedicated resources • Adoption of new technologies
  • 16. Integrating the Cloud and Hybrid Cloud • Moving legacy workloads • Distributed applications • Lack of expertise • Multiple cloud providers • Difficult to estimate costs • Partners and third party tools
  • 17. Key Takeways • Be prepared for growth – more technology changes are coming in the next few years than ever before • Linux & heterogenous virtualization will grow • Proper planning and tools are essential for effective systems management • The cloud is the future – But that journey is a long one – Hybrid cloud is the next practical step
  • 19. Confidential19 • Scan in your new or existing assets • Multiple platform support • Scan and GO! • Free update to the K1 GO! app Barcoding
  • 20. Confidential20 • Pull data from multiple appliances into single report • No specialized hardware needed Cross appliance reporting
  • 22. Confidential22 • New easier to use wizard • New features • Multiple approvers • Specific approver notifications • Approval Timeout • Customizable notifications • Customize your templates with HTML/markdown Process enhancements & approval workflow
  • 23. Confidential23 • My devices made easier • Assign devices easier • Multiple devices? No problem • Interactive feedback • Get more info during your install Self-service software provisioning enhancements
  • 24. Confidential24 • Hardware monitoring made easier • Real-time alerts • Stay on top of your environment SNMP Trap Receiver
  • 25. Confidential25 AirWatch integration • Single pane of glass • All your devices in one place • Integrated asset management • Assign mobile devices to users and more
  • 26. Confidential26 • Supports ESX 5.5 and 6.0 • Discover what VM’s are running on your servers • Get hardware/software details from your VMware environment • Get hardware usage available VMware/Vcenter discovery
  • 27. Confidential27 • My Profile • More for your users • See what tickets/assets/devices are assigned to you Users
  • 28. Confidential28 • Manually or automatically assign users to a device • Control Panel > General > Device Assignment • Synchronous occurs upon inventory • Used in conjunction with user portal and “My Profile” User/Machine assignment
  • 29. Confidential29 • Installing software made easier • Ability to leverage the software catalog • “Run Now” option added • Publish for users • Existing MI’s usable from software portal Managed Installs
  • 30. Confidential31 • Blacklisting improvement • Upgrade/Downgrade rights • Asset Management Appliance licensing changes • Agentless and grandfathering • REST API’s/SDK • Ability for 3rd parties to pull information about inventory, assets, scripting, reporting, managed installs, and users Software compliance/Licensing/API’s
  • 32. Confidential33 • Native UEFI support • Removes reliance on current workarounds (Legacy BIOS setting, thumb drives) • Secure Boot still needs to be disabled • Multicasting in Cisco networks • Router vendors lack Pragmatic General Multicast (PGM) support • PGM not designed to cross routers • Internet Group Management Protocol (IGMP) is vendor agnostic • IGMP can cross between routers/subnets • Increased Windows deployment speed • WIM and Kimage speeds 10% faster KACE SDA Imaging Connectivity and Speed
  • 33. Confidential34 • Major focus on underlying OS architecture • Update to the K2000 Appliance 3.7 SP3 (3.7.345) • Combined SDA and RSA codebase • FreeBSD 10.0 to 10.3 for SDA • FreeBSD 7 to 10.3 for RSA • 32-bit to 64-bit for RSA • RSA Hyper-V support KACE SDA Infrastructure
  • 34. Watch the webcast here: http://bit.ly/2ilF7N6