Regina Technology Innovation Day
-
Upload
acrodex -
Category
Technology
-
view
10 -
download
1
description
Transcript of Regina Technology Innovation Day
Welcome!Wireless access for this room: IP_Guest Username: Guest Password: Agree
Please take some time to visitour vendor exhibits.
Tuesday, September 27, 2011Morning
• 8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits
• 9:00 – 9:15 Acrodex Welcome Address• 9:15 – 10:15 Getting Your Organization
Cloud-Ready: Fully Virtualizing Your Infrastructure
• 10:15 – 10:45 Desktop Virtualization – Case Study
• 10:50 – 11:20 Blackberry in the Enterprise – RIM Information Session
• 11:30 – 12:30 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session
• 12:00 – 12:45 Lunch & Vendor Exhibits
Afternoon• 12:45 – 1:30 Software Asset Management• 1:30 – 2:15 Collaborate, Communicate –
Integrating a UC Platform and Mobile Devices
• 2:15 – 3:00 Implementing CRM in Your Environment
• 3:00 – 3:15 Refreshment Break and Transition to Breakout Sessions
• 3:15 – 3:45 Mobility Management – LANDesk Information Session
• 3:55 – 4:25 Megatrends in IT – HP Information Session
• 4:30 – 5:00 Reflections and Closing Remarks
• 5:00 – 7:00 Cocktail Reception
Welcoming Address
Tim Sterzer Senior Sales Team Lead
We invite you to tweet using:
#TechDays
Special thanks to…
Greg HuttonSystems Engineer
Getting Your Organization Cloud Ready:
Fully Virtualizing Your Infrastructure
Definition
Cloud Deployment Models
Cloud Computing is a way of doing computing
Cloud ServiceProviders
Hybrid CloudComposition of 2 or more interoperable clouds, enabling data and application portability
Public CloudAccessible over the Internet for general consumption
Private CloudOperated solely for an organization, typically within the firewall
EnterprisesBridging
How can I use the cloud? IT as a Service
Infrastructure as a Service VMware vCloud Express
Platform as a Service VMware vFabric
Software as a Service VMware Horizon Application Manager
DR as a Service VMware Site Recovery Manager
Desktop as a Service VMware View
The Journey To The Cloud
Cloud Interested
Cloud Ready
Early Private Cloud
Mature Private Cloud
Enterprise Hybrid Cloud
Public Cloud Experimentation Public Cloud Adoption
and Commitment
Business Critical/Tier-1 Applications
Yeah, but… Performance?
Security & Compliance
Support
No worries, 95% of apps match or
exceed native performance on vSphere
vShield, security and compliance at the hypervisor
Alliance partnerships improve support• Oracle, SAP, IBM,
Microsoft
Private Cloud Building Blocks
Virtualization Servers Storage Network
Orchestration Management tools that eliminate manual administration
without increasing costs and reducing variability of IT resource maintenance
Self-Service Portal Access to a system that enables on-demand
consumption of IT services
Desirable Characteristics
Secure Performant Scalable Agile Elastic Reliable Device & Location Independent Manageable Does not increase costs
Links
http://www.acrodex.com
http://www.vmware.com/solutions/business-critical-apps/
http://communities.vmware.com/community/vmtn/vmug
Dave HunterAssociate Director of IT Sercives
VMWare Virtualization at Red Deer College
Red Deer CollegeBackground• 7500 students• 700 Faculty and Staff• Centrally located• Strong Community Presence• Many Business Partners –BCTL• Donald School of Business
RDC IT Services• 35 IT Personnel• Banner ERP running on Oracle• Several Hundred MSSQL Databases in a cluster• 150 Servers
• 90% Windows based• 8% Solaris• 2% Linux
• 1800 desktops – replace one third each year• HDS AMS 1000 SAN Storage – 35 TB• Cisco Switches end to end -10 GB backbone
RDC Server Virtualization
• Virtualized 90 of 150 servers 3 years ago• Two Dell R900s in HA – 256 GB RAM• This year we moved to HP Blade Servers• C7000 chassis• BL490 blades – 4 for servers – 128 GB
RDC Application Virtualization
• Softgrid – 4 years ago• 95 % of apps virtualized• Moved to Thin App – smaller foot print in image
RDC VDI• Spent two years investigating• Looked at Citrix, Microsoft Hyper V and VMWare
• Citrix was cost prohibitive • Microsoft Hyper V not robust enough (RDP)
• VMWare was the logical choice for us• Already had expertise• An extension of what we were already doing• PCoIP• VMWare VDI Infrastructure Cost (1/3)
RDC VDI• Partner with a Proven Solution Provider • We engaged VMWare early in the process
• We were able to get some huge cost benefits• Selected Wyse P20 Thin clients
• All hardware including PCoIP chip• No extra OS to manage
• VMWare ESXi 4.1• VMWare View 4.6• During readiness for Pilot we switched from XP to
Windows 7 64 bit – less overhead• Rolled out 100 pilot desktops
RDC VDI – Recent Events• Purchased a Separate SAN
• Selected a NetApp FAS 3200 Series• Rolled out 500 Desktops
• Our New School of Business – Faculty and Staff• Learning Information Commons - Students• Students took us up on Anything from anywhere on
any device. (50/50 first week)• Upgraded 14 blades to Dual Six Core CPUs
• Was cheaper than adding more blades
• Loaded each blade with 144 GB RAM
Lessons Learned• Don’t rush – Plan, Plan, Plan
• Don’t set unrealistic time lines – allow for unforeseen issues• SAN Performance
• Not just about IOPS• Configuration - Optimization• When we turned on the 100 pilot desktops we brought
down our SAN• Be willing to adapt and change quickly – things don’t always
go according to plans• NIC Driver brought down our entire Virtualized environment• Softgrid ThinApp• Windows XP Windows 7• New SAN
What’s Next• 2nd SAN
• DR• Upgrade to version 5 Parallel environments• Rollout up to 1200 desktops
• Older desktops first (5 years old), dept by dept• Replace laptops with VDI or Mobile Thin Client• Possible Provider of VDI to Central Alberta
• VDI in the Cloud
Thank You
Morning Break #Tech Days
Morning • 8:30 – 9:00 Registration – Morning
Refreshments & Vendor Exhibits• 9:00 – 9:15 Acrodex Welcome Address• 9:15 – 10:15 Getting Your Organization
Cloud-Ready: Fully Virtualizing Your Infrastructure
• 10:15 – 10:45 Desktop Virtualization – Case Study
• 10:50 – 11:20 Blackberry in the Enterprise – RIM Information Session
• 11:30 – 12:30 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session
• 12:00 – 12:45 Lunch & Vendor Exhibits
Afternoon• 12:45 – 1:30 Software Asset Management• 1:30 – 2:15 Collaborate, Communicate –
Integrating a UC Platform and Mobile Devices
• 2:15 – 3:00 Implementing CRM in Your Environment
• 3:00 – 3:15 Refreshment Break and Transition to Breakout Sessions
• 3:15 – 3:45 Mobility Management – LANDesk Information Session
• 3:55 – 4:25 Megatrends in IT – HP Information Session
• 4:30 – 5:00 Reflections and Closing Remarks
• 5:00 – 7:00 Cocktail Reception
BlackBerry for BusinessLeading Products and Solutions for Business Mobility
September 2011
BlackBerry and Our Position in the Enterprise Market
What CIOs are telling us…
• My company must be able to do more with smartphones than email and phone calls
• Smartphones are walking in the door with employees of all levels, creating new expectations and user requests
• Consumer innovations in mobile and web have raised the bar for enterprise user experience
• Marketing wants a strong mobile consumer presence• All of my company’s applications must go mobile, but the
presentation is different than desktop• Enterprise imperatives (manageability, scalability, security)
cannot be sacrificed purely for individual user experience.
RIM Confidential | 31
BlackBerry Remains the Enterprise Leader
RIM Confidential | 32 Source: ABI Research, Enterprise Smartphones – August 2010
Enterprise Market Share - Shipments
RIM Fast Facts
RIM Confidential | 33
• #1 Smartphone brand in US, Canada, Latin America and the UK for calendar 20101
• 175+ countries• 600+ carriers and distribution
partners• 400,000+ registered BlackBerry
developers• 250,000+ active BlackBerry
Enterprise Servers• 150,000,000+ devices sold to
date 13,200,000+ devices shipped in Q1 GY12 alone
• 67,000,000+ subscribers today
1 IDC Worldwide Mobile Phones Quarterly Tracker - Final data - Q4 2010
16% Year Over Year growth for Q112
Innovating and Supporting the Personal Liable Trend in Enterprise
Key Enterprise Shift
RIM Confidential | 35
There is a key shift in how devices are being deployed within the enterprise from corporate-liable device distribution to a consumer liable device distribution model. An opportunity exists to address this shift
IDC expects worldwide shipments of consumer liable devices to grow by 17.9% to reach 56.7 million units representing 56% of business smartphone shipments by 2013.
IDC Worldwide CMD forecast 2009-2013
Common Specifications (not including Curve):
11 mm thick480 X 360, 246 DPI
800MHz Processor and GPU
512MB RAM + 512MB storage
5.0 MP Camera / VGA video
NFC & Accelerometer
10.5 mm thick640X480, 287 DPI
TouchscreenNFC
8GB storage
15mm thick640X480, 253 DPI
Touchscreen8GB storage
11.5mm thick3.69” 800X480, 253 DPI
Touchscreen4GB storage
• 1.2 GHz Processor and GPU• 768 MB RAM• 5.0 MP Camera / 720p
• Magnetometer & Accelerometer• Wi-Fi & GPS• Wi-Fi Hotspot capable
Bold 9900/9930 (Bold Touch)
Torch 9810 Torch 9850/9860 (All Touch Torch)
Curve 9350/9360 (Curve)
New BlackBerry Smartphone Lineup
New BlackBerry OS 7
Breakthrough performance.
Powerful new experiences.
Innovative apps.
Staying true to the proven security, data efficiency and deep integration of BlackBerry smartphones
• Powerful Graphics
Performance
• Smoothest Touch Experience
• Blazing fast Web Browser
• Voice Activated Universal
Search
• Near Field
Communications
• Augmented Reality
• Stunning Pictures and
Video
• BBM 6
• Music Storefront
• Docs to Go Premium
• BlackBerry Balance
• BlackBerry Protect
The BlackBerry PlayBook Tablet
1. Uncompromised Web Browsing2. BlackBerry® Bridge™3. Ultra Portable4. True Multitasking5. HDMI Output
6. BlackBerry Smartphone Notifications7. Full Touch Front Display8. High Resolution Dual Cameras9. Wireless Software Updates10.Free Premium Documents to Go Suite
Supporting Personal Liable BlackBerryHow to get started – Step #1
RIM Confidential | 39
BlackBerry Enterprise Server Express• Download BlackBerry® Enterprise Server Express
today from BlackBerry.com
• Activate users with no license cost
Benefits• Advanced IT control for employees who buy
their own BlackBerry and want to connect• Access to business applications,
synchronizing email, calendar, contacts, tasks, memos and more
• Industry-leading security and manageability• Maximize employee productivity through
enterprise connectivity with personal BlackBerry handhelds
RIM Confidential | 40
BlackBerry® Balance™ technology enables BlackBerry smartphones to be used for business and personal purposes without compromise.*
• Realize cost savings through employee purchased devices
• Secure company data on devices that are not owned by the organization
• Manage IT policies that define a line between work and personal data
• Stay connected to work and life with the convenience of a single device
Requires handheld software version 6.0 and BlackBerry Enterprise Server (or Express) 5.0.3
Supporting Personal Liable BlackBerryHow to get started – Step #2
RIM Confidential | 41
BlackBerry Multi-Device Platform Management* - Helping customers manage the mix of mobile devices entering the enterprise
Provides a single device management interface for BlackBerry smartphones as well as other non-BlackBerry smartphones
General Capabilities• Centralized Admin Console• User and Group Management• Device Activation• Settings and Policy Definition• Software Deployments• Device Inventory
*Will be available through a future software release at the end of 2011
Supporting Personal Liable BlackBerryHow to get started – Step #3
Business and Personal Productivity Driven by BlackBerry
Business Software
Avoid Missed Calls and Expensive Cellular Minutes
RIM Confidential | 43
• One office identity and extension dialing
• Voice over Wi-Fi® • Automatic network handoff
between Wi-Fi and wireless networks
• Move calls manually between desk & smartphone, Wi-Fi & mobile networks
• Desk phone features• Add participants to conference
calls
BlackBerry® Mobile Voice System will unify desk phone features with BlackBerry® smartphones.
MVS Teaser: http://us.blackberry.com/apps-software/business/blackberry_mvs/
Business Collaboration on the Go
RIM Confidential | 44
• Extend existing Instant Messaging systems to your BlackBerry smartphones
• Improve returns of the overall Instant Messaging implementation
• In some cases, improve productivity for free (Turn on BlackBerry Messenger, OCS)
Access Microsoft SharePoint, Office Communication, Lotus Collaboration and more on BlackBerry
BlackBerry SharePoint Demo: http://ca.blackberry.com/business/software/Sharepoint_BB_WMV2.swf
The BlackBerry Business Difference1. We are the world’s most committed business mobility leader and partner
2. We provide the industry’s only end-to-end business mobility solution
3. We are continuing our focus on innovation
Our Unique Position
Our Superior Product
Addressing a Broader Audience
• Our leadership, legacy and focus on serving the needs of business customers
• Our commitment and focus on wireless
• Our end-to-end solution - built on a trusted, secure, efficient platform that enables real-time communication, and leverages our customers’ existing partnerships and investments
• Our support for and collaboration with customers at each stage on the path to mobility
• Our ongoing innovation and focus on extending the value of BlackBerry into the future
• Our focus on addressing the needs of the consumer in organizations
RIM Confidential | 45
Questions?
RIM Confidential | 46
Thank youFor more information please contact:
Chad MooreChannel Account Manager
Keith AasenConsulting System Engineer, Virtualization
Beyond Storage Efficiency and Automated Data
protection in Virtual Environments
NetApp Confidential - Internal Use Only
Unified Storage
CIFSNFS
NAS
FCP iSCSIFCoE
SAN
Unified Data Access
HTTP REST
Object
FAS6200 SeriesFAS3200 SeriesFAS2000 Series
Common Storage Portfolios
NetApp Confidential - Internal Use Only
Symmetrix
VMAXClariion
VNXSymmetrix
VMAXeClariion
VNXeClariion
Isilon Single Protocol Hardware equates to functionality Disjointed architectures & integration Operational variances
EVA
LeftHand
3Par
Ibrix
StorageWorks
EqualLogic
Compellent
EMC Clariion
PowerVault
Simplicity
NetApp Confidential
136TB
136 drives
FAS2020
68TB
68 drives
FAS2040
FAS2000 Series ONE operating environment ONE set of data services ONE management ONE set of processes
2880 TB
1440 drives
FAS6280
FAS6210
2400 TB
1200 drives
FAS6200 Series
FAS6240
2880 TB
1440 drives
FAS3200 Series
FAS3210
480TB
240 drives
FAS3270
1920 TB
960 drives
FAS3240
1200 TB
600 drives
Hardware is Merely a Means to Scale
NetApp Confidential - Internal Use Only
Natively multiprotocolArchitectural repeatabilityOperational consistency
2.4 - 2.9PB
FAS6200
480TB – 1.9PB
FAS3200
68 - 272TB
FAS2000
Virtualize 3rd
Party Arrays
V-Series
X - YTB
VM
Ontap-v VSA
Data Ontap
NetApp® Storage Portfolio
Unified Data Services
FAS6200 SeriesFAS3200 SeriesFAS2000 Series
SnapVault D2D Backup
NFSNFS Procotol
iSCSIIP-based SAN
SnapMirror
IP-based Data Replication
FlexClones
Smart Clones
Snapshots
Instant Backup
CIFS
File Server Consolidation
SnapLockWORM storage
MultiStoreStorage Isolation
DeduplicationDedup
NetApp Confidential - Internal Use Only
Efficiency
Comprehensive Efficiency
NetApp Confidential
Data Growth
$
TB
Snapshot® Technology
SATA / Flash Cache
RAID-DP®
Thin provisioning
Virtual copies
Thin replication
Deduplication
Storage
Application integration
Storage management automation
Integrated data protection
Service automation
Operations
Compression
Efficiency is Built In
NetApp Confidential
Efficiency is Built In
NetApp Confidential
Efficiency is Built In
NetApp Confidential
Traditional Enterprise RAID Arrays
Virtual Environments
NetApp Confidential
Traditional Enterprise RAID Arrays
Virtual Environments
NetApp Confidential
Duplicate Data Is Eliminated
All Protocol & All Datasets
NetApp Confidential
FCP Storage
iSCSI Storage
CIFS Storage
NFS StorageAll Protocols, All Datasets
Enterprise Data
Mid-tier Data
Industry Averages
NetApp Confidential
65NetApp Confidential
Virtual Storage Tiering
Data Placement Challenge
Data should be fast when hot, and low cost when it’s cold
Objective:Intelligently place “hot” data on the highest performing media
10-20%
“Hot” Data
Primary Storage Pool: All data – hot and cold
NetApp’s Criteria for Effective Tiering
Serve data when it’s hot
Use high cost media (Flash) efficiently
Enable SATA as primary tier
Work out of the box with default settings
Efficient
Simple
Real-Time
A Better Approach: Intelligent Caching
Real-time data promotion
Optimized for Flash
Scale performance on demand
– No data movement
Highly granular (4KB)
Highly efficient
Simple to install and requires no administration
Physical Storage
Virtual Storage Tier
Data-driven • Real-time • Self-managing
010101011001011
Start with “Right” cost storage technology
The NetApp Virtual Storage Tier Intelligent Caching Enabled
Physical
TierCapacity
010101011001011
010101011001011
010101011001011
010101011001011
010101011001011
Virtualize for efficiency– Dedup, thin provisioning, etc.
Add performance– Promote hot data on-demand
Virtualize
Virtual Storage Tier Performance
NetApp FAS Array
Dedupe Disk Storage
VM
VST - FlashCache
VM
1
ESX Cluster
VM VMVM VM
321
VM VM VM VM
4 65 7 8
VST in a Virtual Environment
EMC Complexity
NetApp Confidential
NetApp Simplicity
NetApp Confidential
NetApp Confidential - Internal Use Only
“True” Storage Virtualization
NetApp MultiStoreSecure IP Space Discrete, private secure
network partition Logical partitions within the
NetApp array
Secure VLAN Interface Securely maps VLANs directly
to IP spaces
Network VLAN Used to logically partition
networks Separates broadcast domains
NetApp provides the industry’s only complete tool set for providing path isolation from the disk through the network. This level of security is mandatory for multi-tenant environments.
Virtual Storage Controller
Customer B
Virtual Storage Controller
Customer C
Data
Data
Data
Data
Data
Data
Virtual Storage Controller
Customer A
Data
Data
Data
MultiStore®
NetApp MultiStore & vFilers
NetApp Confidential - Internal Use Only
Abstracted access via vFilers (virtual arrays)– vFiler storage service profiles unbind data from hardware
DataMotion non-disruptive mobility & migration Centralized cluster management
Data Ontap
vFilervFiler vFilervFilervFilervFilervFilervFilervFilervFilervFiler
Next-Gen Data Ontap Cluster-Mode
NetApp Confidential - Internal Use Only
Scale Out Storage Architecture for Non-Stop Operations– Supports 24 storage nodes
Abstracted access via vFilers (virtual arrays) Centralized cluster management
Data Ontap 8.1 C-Mode
vFiler
vFiler
vFiler
Key C-Mode values
Non-disruptive– Upgrade, replace, rebalance,
expand, all without disrupting workloads
Scalable containers– Scale up, scale out, scale down– Petabytes of data; billions of
objects
NetApp Confidential - Internal Use Only
Storage Offloaded Data Protection
RAID the Foundation of Data Protection
NetApp Confidential - Internal Use Only
RAID 5 RAID 6 RAID 10 RAID-DP
Cost Low Low High Low
Performance Low Low High High
Resiliency Low High Med High
RAID-DP enables ‘Set it & Forget it’ simplicity– Highest performance and data protection– Industry leading efficiency (87.5% default utilization)
Solution design simplicity & standardization
Storage tiering simplified– Enabled based on type of medium not a matrix comprised of
mediums & RAID types
Traditional Business Continuance Strengths
– Let’s you sleep at night
Weaknesses– Loads of hardware– Many operations
Several copies Thick transfers Stored in multiple
formats
The accepted pain of doing business
Day to Day workloads
Production
1st Point of Recovery
Dedupe
Disk Backup
Long-Term Archive
Compressed
Tape
Archive Backup
Identical HW as
Production
DR
Replication
Introduce NetApp Arrays
1st Point of Recovery
Dedupe
Disk Backup
Day to Day workloads
Production
Identical HW as
Production
DR
Long-Term Archive
Compressed
Tape
Archive Backup Replication
Strengths– Same process
that you know
Weaknesses– Same process
that you know
The process of making copies of data in order to meet legal compliance requirements
1st Point of Recovery
Dedupe
Disk Backup
Day to Day workloads +
Dedupe
Production
Dedupe DR
DR
Long-Term Archive
Compressed
Tape
Archive Backup Replication
Introduce NetApp Arrays
Strengths– Production & DR
storage is reduced by 50%
– Same process
Weaknesses– Same process
The process of making copies of data in order to meet legal compliance requirements
Introduce NetApp Arrays
Backup on production Array– Eliminates backup array– Instant backups & restores– Backups automatically
transferred offsite DR with backup points stored
on a single array
NetApp Multi-Purpose Integrated Data Protection
Long-Term Archive
Compressed
Tape
Day to Day workloads +
Dedupe
1st Point of Recovery
Production
Dedupe DR +Offsite
Backups
Offsite Backup
& DR
Archive DedupeReplication
Backup
Introduce NetApp Arrays
Backup on production Array– Eliminates backup array– Instant backups & restores– Backups automatically
transferred offsite
Long-term archive or DR Array
NetApp Multi-Purpose Integrated Data Protection
Dedupe DR+ Backups
Long-Term Archive
Production
Archive
Day to Day workloads +
Dedupe
1st Point of Recovery
Production
DedupeReplication
Lunch Break #Tech Days
Morning • 8:30 – 9:00 Registration – Morning
Refreshments & Vendor Exhibits• 9:00 – 9:15 Acrodex Welcome Address• 9:15 – 10:15 Getting Your Organization
Cloud-Ready: Fully Virtualizing Your Infrastructure
• 10:15 – 10:45 Desktop Virtualization – Case Study
• 10:50 – 11:20 Blackberry in the Enterprise – RIM Information Session
• 11:30 – 12:30 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session
• 12:00 – 12:45 Lunch & Vendor Exhibits
Afternoon• 12:45 – 1:30 Software Asset Management• 1:30 – 2:15 Collaborate, Communicate –
Integrating a UC Platform and Mobile Devices
• 2:15 – 3:00 Implementing CRM in Your Environment
• 3:00 – 3:15 Refreshment Break and Transition to Breakout Sessions
• 3:15 – 3:45 Mobility Management – LANDesk Information Session
• 3:55 – 4:25 Megatrends in IT – HP Information Session
• 4:30 – 5:00 Reflections and Closing Remarks
• 5:00 – 7:00 Cocktail Reception
Beyond Storage Efficiency and Automated Data
protection in Virtual Environments
A Little About Me
My experience lies in the licensing of software, whether in licensing agreements, basic office applications, servers, desktops, ERP or virtual licensing.
I started my technology career-path with KEPCO in San Antonio, Texas as an educational materials sales representative. My career continued for Soft Options in Calgary where I learned about large software licensing contracts by servicing clients like TCPL, Chevron, and Amoco (BP). I finished my time in Calgary working for WellPoint Systems which was an ISV for the oil and gas Sector.
For the last 4.5 years I have been with Acrodex as a software solutions specialist, sales manager and now territory manager building a team of like minded individuals in our prairie offices both in Regina and Winnipeg.
MCP, CSP, VSP – 14 years experience in software licensing
CHALLENGES.
today more than ever businesses are faced with tight economic circumstances, challenged more than ever to do more with less… technology has never been more important to business strategy and survival.
But Which Technology And How Do I Manage IT?
Urban sprawl, also known as suburban sprawl, is a multifaceted concept, which includes the spreading outwards of a city and its suburbs to its outskirts to low-density and auto-dependent development on rural land, high segregation of uses (e.g. stores and residential), and various design features that encourage car dependency.[1]
In the last 15 years, As high speed connectivity increases + device technology advances to do more in smaller devices =Infrastructure sprawl.
Point Of Reference To The Problem
Is Software Licensing Complex?
Licensing Terms and ConditionsEULA – End User License AgreementPUR – Product Use Rights
Licensing Agreements- MBSA- EA- Select Plus- ELP- TLP or CLP- EAP- ECI- Easy Licensing- Campus / Student- Open License
Licensing Reference Terms- Cores- Per Server- Per Processor (physical or Virtual)- Std, Ent, Datacenter- OSE – Operating System Environment- CAL – Client Access License- Device CAL vs. User CAL- Concurrent User- Perpetual vs. subscription- Qualified Desktop- License certificate- OSE – operating system environment- VDI – virtual desktop infrastructure- Instance- Line of business- Training Lab
Maintenance Types- Maintenance- SA- Subscription Adv.
Software Licensing Was Suppose To Be Simpler
Bottom Line benefits of Volume Licensing
- Saves time in ordering process
- Saves money in volume discounts
- Many have resource bundled in (HUP, technical support, new version rights)
What Is The Key Or Keys ?
Know what your “License Entitlement” provides
Have a system in place to help you manage 1) what is deployed.2) what you are licensed to deploy.
SAM Optimization Model By Role
Server Counts Use To Be Simple
User Devices Use To Be Simple
Why would I count my company phones ?
Opportunities and Issues
Motorola XoomApple Ipad 2Asus Eee PadHP SlateLG G-SlateViewSonic ViewpadSamsung Galaxy TabRIM BB Playbook
Tablets Are New – Don’t They Arrive Licensed ?
Tools To Help You Manage Assets
Landesk Asset Lifecycle Manager Microsoft - System Center Configuration
Manager (Asset Intelligence) CA – IT Asset Manager IBM - Tivoli
Cloud Services Questions – taken from Google I need a productivity solution that’s easy to deploy and doesn’t require the ongoing maintenance of desktop software.
I want a solution that meets my needs today and automatically gets better over time.
I need a productivity solution that I can rely on.
I need technology that was built with security in mind.
My employees need to collaborate seamlessly across organizational, geographical and linguistic barriers.
I want my employees to move faster without being slowed down by inflexible technology.
My employees need to use a wide range of mobile phones and tablets including Android, Blackberry, iPhone and Windows
Mobile.
My employees need to do more from mobile devices than just send emails.
I want a simple licensing model that is cost-effective and predictable.
I want to spend half as much on IT as I do today.
Full SAM EngagementSAM Baseline SAM
Assessment
SAM Deployment Planning
Inventory of deployed Microsoft assets, review of corresponding customer license documentation, virtual, hosted, or cloud-based solutions, and identification of any opportunities for improvement.
Review of customer’s existing processes against
SAM Optimization Model framework, identifying
improvement opportunities and associated ROI.
Provides deployment assistance for processes and technologies to support key SAM areas, including deployment, metering, inventory and control. Special focus on solutions deploying Microsoft technologies including System Center, MDOP AIS, or MAP.
Preset SAM Assessment results to the customerPreset SAM Assessment results to the customer
Reconcile and validate collected data and document resultsReconcile and validate collected data and document results
Collect all relevant data to address the 10 key competencies and conduct customer interviews Collect all relevant data to address the 10 key competencies and conduct customer interviews
Define the what , where, when, who & how of the engagementDefine the what , where, when, who & how of the engagement
SAM Assessment Framework Overview
Planning
Data Gathering
Data Analysis
Presentation
BASIC STANDARDIZEDSAM ThroughoutOrganization
SAM ImprovementPlan
Hardware & Software Inventory
Accuracy of Inventory
License Entitlement Records
Periodic Evaluations
SAM OperationsMgmt & Interfaces
Acquisition Processes
Deployment Processes
Retirement Processes
Project Manager assigned but SAM roles &
responsibilities not defined
No SAM development or communication plan
No centralized inventory or
< 68% assets in central inventory
Manual inventory; no discovery tools
Procurement manages contracts; not accessed
by IT managers
IT operations managed on ad-hoc basis
SAM not considered part of M&A risk plan and company integration
Assets purchased on a per project basis; without
a review of current availability
Assets deployed by end-users in distributed
locations; no centralized IT
Software is retired with hardware and is not
harvested or reassigned
Direct SAM responsibility is identified throughout
organization
SAM plan is defined and approved
> 68% - 95% of assets in inventory
Inventory sources reconciled annually
Complete entitlement records exist across
organization
Annual sign-off on SAM reports
Operations manages separate asset
inventories
Software purchases use approved vendors
Only approved software is deployed
Unused software is harvested (where the
license allows) and tracked within a centrally controlled
inventory
Each functional group actively manages SAM
SAM Improvement is demonstrated
> 95% - 98% of assets in Inventory
Inventory sources reconciled quarterly
Entitlement records reconciled with vendor
records
Quarterly sign-off on SAM reports
Operations manages associated asset
inventory
Software purchases based on
deployment/entitlement reconciliation
Software deployment reports are accessible to
stakeholdersCentrally controlled inventory
of harvested licenses is maintained & available for
reuse. Deployment & license records are updated
SAM responsibilities defined in job
descriptions across organization
SAM goals part of executive scorecard; reviewed regularly
> 99% of assets in inventory
Dynamic discovery tools provide near real-time
deployment details
SAM entitlement system interfaces with vendor entitlement to track
usage
System reconciliations and ITAM report available
on demand
All business units follow the same strategy,
process & technology for SAM
All purchases are made using a pre-defined asset
catalog; based on metered usage
Software is dynamically available to users on
demandAutomated process w/
centralized control & tracking of all installed software, harvest options, internal
reassignment and disposal
RATIONALIZED
DYNAMIC
SAM Assessment Engagement SAM Optimization Model – Maturity levels
SAM – Program Features
Gap Analysis
License Reconciliation
License Harvesting
Lifecycle Assessment
Security checks
License compliance
Reporting
Security Policies and configurations
Application management and updating
Comprehensive reporting
Benefits of Software Asset Management
Software Compliance
Productivity Gains
Expanded risk mitigation
Control over IT infrastructure
Simplified IT management
Optimized Software deployment
Streamlined License Acquisition
Increased Security
Peace of Mind
Our Approach to SAM
Long Term Customer Engagement
Strategy
Full SAM Services
Industry Best Practices
Key Metrics and Reports
Compliance and Optimization
Collaborate, Communicate
Integrating a UC Platform and Mobile Devices
Ojasvi BansalUnified Communications Solution Specialist
Mark GelsominiCorporate Director Information Technologies
Acrodex UC Solution
UC Solutions & Services: Consulting Services Design and Architecture Deployment Services Professional Services Managed Services Training Services Triage Services: Single Point Of Contact For
Hardware, Software Or Service Escalation Regardless Of Vendor
The world of business is evolving. Evolve with it.
Single Source Provider: Enhancing End User Experience
Multiple communication modalities
Different interfaces and technologies
Lack of integration (due to product End of Life)
Multiple vendors supporting voice, data and network applications
Customers are investigating Network upgrades to SIP
Clients are requiring mobile convergence
Voice MailDesk Phone
FaxE-Mail Cell Phone
VideoConferencing
What Is Unified Communications?
It’s Just a Fancy Word for Voice
over IP.
It’s Just a Fancy Word for Voice
over IP.
It’s Voicemail in Your Email.
It’s Voicemail in Your Email.
It’s Just Skype.It’s Just Skype.
Whatever It Is, It’s More
Than I Need.
Whatever It Is, It’s More
Than I Need.
It’s Definitely Not for Small
Businesses Like Mine.
It’s Definitely Not for Small
Businesses Like Mine.
It’s Big, Complex, and Expensive.
It’s Big, Complex, and Expensive.
It’s Patching Things Together That Don’t
Work Together.
It’s Patching Things Together That Don’t
Work Together.
Unified Communications – The Myths
“Unified Communications solutions bring together voice, messaging, video, and desktop applications to enable
companies to quickly adapt to market changes, increase productivity, improve competitive advantage and deliver
a rich-media experience across any workspace.”
“Unified Communications solutions bring together voice, messaging, video, and desktop applications to enable
companies to quickly adapt to market changes, increase productivity, improve competitive advantage and deliver
a rich-media experience across any workspace.”
115
What Is Unified Communications?
Components of Unified Communications
• Communications: Voice, data, and video• Messaging: Voice, email, video, and IM• Conferencing: Online, audio, and video• Application integration: Microsoft Office and
CRM• Presence: IP phone, desktop clients, and call
connectors• Common user experience: Desktop, phone,
and mobility
• Communications: Voice, data, and video• Messaging: Voice, email, video, and IM• Conferencing: Online, audio, and video• Application integration: Microsoft Office and
CRM• Presence: IP phone, desktop clients, and call
connectors• Common user experience: Desktop, phone,
and mobility
Using Unified Communications, You Can…
Secure My Business
Work from Anywhere
Be More Productive
Serve Customers Better
Connect Everyone
Connect Collaborate
Total Economic Impact (Example)
Forrester Study Shows >500% ROI in Three Years
The study shows the following benefits for a 4,000 employee organization over a three-year period: Benefit Result
Payback Period Two months
Improved Productivity 13 min saved/day/employee ($20 million)
Saved Travel Costs 23% reduction ($15 million)
Reduced Time to Complete Projects 10% reduction ($15 million)
Shortened Sales Cycle 20% time saved ($5 million)
Reduced Dial-in Conferencing 50% reduction ($0.6 million)
Reduced Telephony Charges 40% reduction ($1.2 million)
Source: Forrester, 2007
Underground Communications Mark Gelsomini
Corporate Director IT
TSX: DPM
AGENDA
Who is Dundee Precious Metals Inc.?
Technology
Network Topology
Wi-Fi Coverage
Software- Push to Talk, Paging
Aeroscout Project
DUNDEE PRECIOUS METALS
Dundee Precious Metals (DPM:TSX) is a Canadian-based, international mining company engaged in the acquisition, exploration, development, mining and processing of precious metal properties.
DPM’s business objectives are to identify, acquire, finance, develop and operate low-cost, long-life mining properties.
With a dynamic global operation, DPM decided that a more strategic, centralized approach to IT was necessary to support the emerging business requirements.
“TAKING THE LID OFF”
Paper reporting at end of shift
Supervisor interaction 1-2 /shift
Limited knowledge of shift delays
Slow response time to process interruptions
Reactive Maintenance
Small picture view
Poor coordination
Poor use of resources
Lost time locating equipment/materials etc. from shift to shift
Real time display of information
Supervisor dispatched to critical shift problems
Delays identified in real time
Problems identified immediately
Real time equipment health monitoring
See activities in whole mine in real time
Coordination through CCR with big picture
Resources utilized to optimize shift results
Real time equipment and materials tracking
OLD WAY NEW WAY
122
DPM GLOBAL IT VISION\MISSION STATEMENT
“To deliver reliable business-centric IT solutions,
infrastructure and services through leadership and
partnership with DPM operations globally to maximizing
efficiency, streamlining processes, while supporting
corporate objectives.”
THE TECHNOLOGY
High speed fiber optic data link coupled with a 50 – 110 Volt (touchable) low power consumption power line bring high speed data line to any point where some form of communication device has to be placed.
Wi-Fi based communication
Wi-Fi clients, Wi-Fi based Push To Talk system
Wired clients (Controllers, Cameras, FANs)
RFID/Wi-Fi based location tracking
ENABLING TECHNOLOGIES
Mobile Equipment
Industrial Controller
s
VoIP Clients
Cameras
Tablet
Wireless tags
Access Point
Access Point
Site LAN Network
DESIGN
Boxes are connected with fiber optic cables and can be separated up to 10Km
Wired clients are connected to the boxes with up to 100m copper cable
BOX is rated for IP67 (Industrial)
All industrial connectors
FOB is fully detachable
Industrial Wi-Fi clients (Yellow)
THE TECHNOLOGY PICTURE
Standard IP Telephone
• In an IP67 Protected box
• With Visual Ringer
Places
• Refuge Chambers
• Shafts
• Pumps
• Transformer Bays
• Ore-Passes
UNDER GROUND CABLE LAYOUT
CABLE LAYOUT
WI-FI COVERAGE
PUSH TO TALK AND PAGING
All Wi-Fi phones have Push To Talk capabilities
Push to Talk application will have following features
Unlimited numbers of channels
Emergency button
Listening to more than one channel (For Safety department)
Channel filtering
Paging is software which give the opportunity to send audio and text messages to group or all phones
COMMUNICATIONS- WIRELESS ETHERNET
Access point
Wi-Fi phone
132
PUSH TO TALK AND PAGING
AEROSCOUT LOCATION TRACKING
Wi-Fi/RFID based
Tags will be installed in lamps
Tags will be installed in all vehicles
Entry/Exit events
Business events
Vehicle location
Where we have people working
Location history
Location reports
Safety
HOW DOES IT WORK?
1) Active RFID tags and/or standard wireless devices send a tiny wireless signal at a regular interval
2) Signal is received by the Wi-Fi wireless network (or location receivers), and is sent to an Engine
3) The Engine uses multiple algorithms to determine location, and sends asset data (location, status, etc.) to enterprise software
4) Enterprise software uses location and status data to display maps, enable searches, create alerts, manage assets, etc.
135
LOCATION DASHBOARD
CHALLENGES
Improve local and global communications
Simplicity in use
Significant communication limitation between groups
Improve health and safety
Production improvement
Equipment tracking capability
SOLUTIONS
Allows quick identification of problem and locations for rapid response to mine emergencies
Enhanced communication between surface and underground operations thus improving equipment and manpower utilization/allocation/reassignment and maintenance
Use of small portable Wi-Fi phone units provides ease of use for timely response to production and safety needs
Underground and surface tracking of equipment
A single number follows the person anywhere in the world
Integrated voice mail and email
Global help desk
BENEFITS
Minimizes expensive cell phone traffic
All users will be able to communicate seamlessly anywhere in the world (one product does it all)
Rapid response to changing underground situations to maximize material movement
Decreases equipment downtime through better information on location and repairs required
ACHIEVEMENTS AND AWARDS
May 2010 Microsoft Momentum Magazine Cover Story
• “Gold Standard”
Awarded “Most Innovative Company 2010” from Cisco Europe
Finalist “Most Innovative Business Impacting Network of the Year”
First mining company to deploy non-proprietary communication technologies in the mines
Created three way integration with Cisco VoIP, Tandberg and OCS
Implementing CRM in Your Environment
Shan McArthurVP of Technology, Adxstudio
Afternoon Break #Tech Days
Morning • 8:30 – 9:00 Registration – Morning
Refreshments & Vendor Exhibits• 9:00 – 9:15 Acrodex Welcome Address• 9:15 – 10:15 Getting Your Organization
Cloud-Ready: Fully Virtualizing Your Infrastructure
• 10:15 – 10:45 Desktop Virtualization – Case Study
• 10:50 – 11:20 Blackberry in the Enterprise – RIM Information Session
• 11:30 – 12:30 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session
• 12:00 – 12:45 Lunch & Vendor Exhibits
Afternoon• 12:45 – 1:30 Software Asset Management• 1:30 – 2:15 Collaborate, Communicate –
Integrating a UC Platform and Mobile Devices
• 2:15 – 3:00 Implementing CRM in Your Environment
• 3:00 – 3:15 Refreshment Break and Transition to Breakout Sessions
• 3:15 – 3:45 Mobility Management – LANDesk Information Session
• 3:55 – 4:25 Megatrends in IT – HP Information Session
• 4:30 – 5:00 Reflections and Closing Remarks
• 5:00 – 7:00 Cocktail Reception
Mobility Management – LANDesk Information Session
Don MossChannel Systems Engineer
LANDesk Software Confidential
The Leader in Helping Simplify & Control IT Complexity› LANDesk named a “Leader” in the 2010 Gartner Magic Quadrant
for systems lifecycle management› One of only two vendors on the three
Magic Quadrants for management, endpoint security, and service desk (Gartner 2010)
› 698% return on investment within 3 years; payback in 5 months (IDC 2011)
› LANDesk saves over $32,022 per 100 users, per year (IDC 2010)
Partners› Apple, Credant, Cognizant, IBM, Intel,
Kaspersky, Lenovo, Microsoft, Wipro› 400+ certified VARs/system integrators
worldwide
LANDesk Software
LANDesk Software Confidential
The LANDesk “complete” SolutionGartner Magic Quadrant
PC Configuration Life Cycle Management ToolsJan 2011
“LANDesk has one of the most complete products in terms of overall functionality, and the code base is solid and stable. LANDesk benefited this year from an increased weight on managing non-Windows clients…
LANDesk has a strong OEM partnership with VMware for its Thinapp product. LANDesk has tight integration with a fairly large number of customers using the application virtualization offering”
LANDesk Software Confidential
Your Extended Team
LANDesk Software Confidential
Delivering Value
LANDesk Software Confidential
Delivering Value
Their Challenges?
LANDesk Software Confidential
Asset Lifecycle
Management
IT ServiceManagementVirtualization
Management
Power &InfrastructureManagement
Management Automation
Platform
SystemsLifecycle
Management
Endpoint Security & Compliance
> LANDesk Management and Security Suite
LANDesk Software Confidential
1. What is mobility?
2. What’s driving the need to manage mobility?
3. What are the three keys to managing the mobile enterprise
4. How can I see mobile devices on my network and who they belong to?
5. How can I manage and secure the corporate data on my user’s devices?
6. What is LANDesk’s approach to mobility?
7. How do we get started?
151
Agenda> We’ll Answer 7 Questions:
LANDesk Software Confidential
> What is Mobility?
Consider: Mobile Users
By 2015, there will be nearly one mobile device for every person alive. Projections indicate there will be over 7.1 billion mobile-connected devices—approximately equal to the world’s population in 2015 (7.2 billion). 1
By 2013, more than a third of the world’s workforce will consist of mobile workers, potentially 1.2 billion people. 2
Mobile Devices In the fourth quarter of 2010, 100 million smartphone
units shipped compared to 92 million PC units. For the first time, smartphones outshipped PCs. 3
Apple will ship 43.7 million iPads in 2011 and 63.3 million in 2012, up from an estimated 14 million in 2010. 4
LANDesk Software Confidential
Tablets market share will rise from 6% to 23% by 2015…
…desktop shares will drop from 32% in 2010 to 18% by 2015
New OS’s will offer a different experience driven by applications to provide functions
2009 – Microsoft represents 84% of PC Operating Systems
2010 and beyond – Tablets and smartphones will be substitutes for PCs
…in the future, Users will opt for one PC and a mix of tablets and smartphones
Endpoint Transformation – Mobile DevicesComputing Devices
Projected percentage of unit sales in US
Source: Forrester Research, The Wall Street Journal-6/9/10
LANDesk Software Confidential
Multiple Tipping Points
Dig
ital N
ativ
e Li
fest
yle
(Alw
ays c
onne
cted
, soc
ial a
nd
mul
ti-ta
skin
g)
IT Consumerization
(App-driven, consumer-owned,
co-mingled data)
User Is The New Endpoint(Tech savvy, platform-transparent,
user vs. device management)
Separation of Work and Personal
Work Time
Personal Time
Business Personal5-7 Years
Ago
Work Calendar
Work ContactsWork Cell
Phone
Work Desktop
Corp. Servers
Personal Calendar
Personal Cell
Phone
Personal Contacts
Personal Computer
Personal Storage
IT Dilemma
IT Involvement
Digital Lifestyle
Business Personal
Today
Time
Contacts
Mobile Apps
Social Network
Calendar
Personal Storage
Corp. Servers
Laptop
Smart Phone
IT Involvement
IT Dilemma
Cloud Storage & Apps
LANDesk Software Confidential
Why Should You Care?“By 2013, those corporate IT
departments that have not enabled a diverse population of devices and end-user choices through
emphasis on manageability, policy enforcement and security
evaluations will become hopelessly outmoded and struggle to function.
This will cause chaos and substantially raise the total cost of ownership of the organization. ”
http://www.thestreet.com/story/10970787/2/15-tech-trends-to-emerge-by-2014.html
LANDesk Software Confidential
1. See and know what you have
2. Set and enforce effective IT policy
3. Manage and secure anywhere, anytime
Managing the Mobile Enterprise
> What Are The 3 Keys To Succeed?
LANDesk Software Confidential
Discovery and Inventory
20+ years of experience
Know what you have and what’s
connecting to your network
Discover any device accessing
your corporate data
Company owned vs. Employee owned devices
Know What You Have – Greater Visibility
> How Can I See Mobile Devices?
LANDesk Software Confidential
Security Stats – Where and How
Security breach information is taken from datalossdb.com – an online database of reported worldwide security breaches
Data• Data Encryption Policies• Extended Media Encryption
• Shadow Copy
Patch • OS Patching• App Patching (Beyond MS)
• Cross Platform Patching
A Layered Security Solution is Key
Malware• Buffer Overflow• Application Control
• HIPS/Whitelisting• Antivirus/anti-spyware
Knowledge & Verification
Configuration • Security Configuration• Device Control Policies
• Agent Persistence• Firewall
Discovery
MobileManagement
• Executive Dashboard• Reporting
• Alerting• Compliance
• Cloud Services Appliance• Location Based Policies
• Anti-bridging Tech.• Mobile Devices
• Distributed Discovery• Discover firewalled devices
• Real-time Discovery• WAP Discovery
Protection
Patch
Policy
Proof
ProcessAutomation
• Process Diagrams• IT Workflows
• Business ProcessProcess
LANDesk Software Confidential
‘Oh That Guy’
The Sum of All Fears:
Nomadic
Early Adopter w/ Multiple Devices
Want access to be more productive
A ‘Jailbreaker’
Policy ‘Skirter’ / Ignores policy
LANDesk Software Confidential
The LANDesk Answer
Start with heterogeneous management Common management infrastructure
Single “pane of glass” management help you consolidate technology
Process integration
Include multi-layered security 5 Powers – Protection, Patch, Policy, Proof and
Process
Top it off with software and service management
Laying The Foundation for Mobility Management
> How do you focus on the user?
LANDesk Software Confidential
Manage and Secure through the Cloud
Data encryption
Manage and Secure through
the cloud – Cloud Service Appliance
Mobile or location aware policies› Host Intrusion Protection System (HIPS)› USB Blocking› Shadow Copying› System & Application Patching
> Distributed Enterprise
LANDesk Cloud Services
Appliance
LANDesk Software Confidential
Leverage LANDesk Competencies
Platform
Agentless discovery and management for employee-owned devices
Single Agent-based management to greater management and security features
Automated management activities
LANDesk Mobility Management Strategy> What Is LANDesk’s Mobility Approach?
LANDesk Software Confidential
> First Generation
> Leverages Existing Email Infrastructure
> View it by user and by device
> Multi-platform
> Basic management and security capabilities
Agentless – Email Client Layer
Exchange & Blackberry Enterprise Server (BES)
LANDesk Software Confidential
Discovery…How it works…
New device configures ActiveSync client
Mobile devices appear in the consoleDiscovery runs…Blackberry provisioned with BES
landesk
mtemple
****************
My LANDesk e-mail
LANDesk Software Confidential
Where do we go from here?
LANDesk Software Confidential
> Next Gen
> OEM
> Apple MDM SDK
> Leverage management standards as they develop
Single Agent – Managed Mobility
Agent-based & Management Layer
LANDesk Software Confidential
Policy Management for OEMs
LANDesk Software Confidential
Summary Question & Answers
Megatrends in IT – HP Information Session
Neil ThompsonSolutions Architect
Closing Address
Tim SterzerSenior Sales Team Lead
Special thanks to…
Questions