Remote Monitoring of Enterprise Systems
|
|
- Ross Stone
- 8 years ago
- Views:
Transcription
1 Remote Monitoring of Enterprise Systems A Step Towards Effec1ve Management of Cloud Based Services Johnson L Fisher, Director, IS Opera5ons May 28, 2015
2 Agenda Overview Current State Facility and Service Monitoring Enterprise System Monitoring History Transi5on Steps Impact on Services Conclusion Agenda
3 Overview Managing Data Centers and the services they support has become more complex due to the impact of virtualiza5on and the uncertain5es of what, when, and how much will be provisioned using cloud based services. The Monitoring of Cloud Based Services must be inherent part of the successful adop5on and Management of Cloud based services. Overview
4 Current State of Enterprise Systems Monitoring at KSU Data Center Facility Management: Data Center Facility Improvements Facility Monitoring & Management Tools Opera1ons Remote Data Center Monitoring: Updated Tools, Updated Procedures Opera5ons Control Center Implementa5on of Enterprise Monitoring Suite Enterprise Monitoring Suite: BMC Proac5veNet Performance Management CompuWare Data Center Real User Monitor New Relic End to End Transac5on Inspec5on Current State
5 Hot Aisle, Ceiling Air Return Data Center Facility Improvements CRAC Unit, Extension, Floor Air Supply
6 Opera1ons Control Center
7 Enterprise Monitoring History Complex Technology Stack Unsuccessful root cause analysis Time spent auemp5ng resolu5on Unnecessary Hardware Purchases Monitoring Tool Disconnect Oracle Grid SiteScan VMCenter Splunk Eagle- Eye Challenges
8 Enterprise Monitoring History - con1nued Process and Tool Deficiencies Challenges No event correla5on between tools No central Event Management Inconsistent Incident Management Silos Persist
9 Transi1on to Enterprise System Monitoring Opera1ons Remote Data Center Monitoring: Detailed Analysis of Data Center Ac5vity Iden5fied What Could Be Done Remotely Completed Required So]ware/Firmware Upgrades. Implementa5on of Improved Airflow Management IS Opera5ons Remote Procedures Manual Implemented Remote DC Monitoring Challenges
10 Transi1on to Enterprise System Monitoring Enterprise Monitoring System Implementa1on Ac5vity BMC Proac5veNet Performance Manager (BPPM) So]ware selected as our Single Pane of Glass Interviewed & Selected Consultant to Implement BPPM Procurement Tasks so]ware and hardware (including hardware design) Installa5on Hardware and so]ware Timeframe December 2013 January 2014 January February 2014 March April 2014 Project Summary Project Kick- off APM DC RUM & Synthe5c so]ware selected for end user monitoring Procurement Tasks so]ware and hardware (including hardware design) Installa5on Hardware and so]ware APM New Relic so]ware selected for end user monitoring Training BPPM & APM OCC So] Launch with BPPM Project Celebra5on March 2014 March 31, 2014 April March 2014 March April 2014 June 19, 2014 April October 2014 August 2014 October 31st 2014
11 Transi1on to Enterprise System Monitoring Enterprise Monitoring System Implementa1on 30+ Training Sessions 160+ Training Hours 744+ Consultant Hours 23 BPPM Specific Views with Graphs for Service Owners 17 Applica5ons monitored 50+ Transac5ons Monitored 56+ People Assigned 102 Patrol Agents Installed 2,400+ Events handled by OCC from BPPM Project Hours Project Summary
12 Transi1on to Enterprise System Monitoring Enterprise Monitoring System Implementa1on Opera1ons Control Center: Opera5ons Remote Monitoring Invi5ng Space for Informa5on Sharing Scorecard Review Cross Training Sessions Crea5on of a Flexible Space War Room Event Management Problem Analysis Incident Management Problem Management Project Summary - OCC
13 Opera1ons Control Center
14 Transi1on to Enterprise System Monitoring Enterprise Monitoring System Implementa1on Opera1ons Control Center: BPPM Heat Map Scorecard Review Help Desk Ticket Tail Network Monitor Cri5cal and Major Events; All Events Cisco Wireless Monitor Data Center Security Cameras Weather (Web Based and Cable Feed) Cable Feed Guest Feed Project Summary - OCC
15 Transi1on to Enterprise System Monitoring Enterprise Monitoring System Implementa1on Impact on Services: Real User Monitoring Synthe1c Transac1on Monitoring Collec1on of Baseline Data Focus on Ac1onable Informa1on Project Results For On Premise and Cloud based services
16 Conclusions Does Lights out decrease outages? Theory says yes, however, we have no sta5s5cs to support this. We have reduced Data Center traffic and access to the Data Center is a much cherished privilege. All working in the Data Center must do more planning. Does Remote Monitoring with Enterprise Monitoring tools assist with managing cloud based services: We believe the answer here is clearly yes. We can detect through Real User monitoring. We can measure transac5on 5ming. We can build models of normal baselines and signal events from divergences. Project Results
17 Conclusions Does Enterprise Monitoring improve the end user experience. We believe the answer is clearly yes. We know we discover RUM issues faster. We don t have a baseline from the past. We can measure Outages however, that number may increase just because we more accurately discover outages. We have detected ini5a5ng events that lead to outages. Some of these can be repaired before they cascade into an outage. o We can automa5cally repair (e.g. stop and restart a service) before the outage occurs. Project Results
18 Conclusions Summary Remote Monitoring embodies a mindset, a toolset, procedures, and a commitment to a different opera5onal model. This opera5onal model has the flexibility and approaches to support the effec5ve monitoring of cloud based or hybrid cloud sourced services. The effec5ve monitoring of cloud services along with procedures and the administra5ve and technical resources offer the best opportunity to effec5vely deploy and managed Cloud based Services. Project Results
19 Conclusions Ques1ons? Contacts Questions? Johnson Fisher, Director, Informa5on Services Opera5ons Enterprise Monitoring Core Team o Todd Ryan, Manager, Enterprise Monitoring o David Veits, Technical Lead o Amanda Kelley, System Administrator o Shelley Sherwin, Project Manager
FTC Data Security Standard
FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls
More informationUnified Monitoring with AppDynamics
Unified Monitoring with AppDynamics Dus$n Whi*le @AppDynamics 52% of Fortune 500 firms since 2000 are gone Application complexity is exploding Agile SOA Login Flight Status Search Flight Purchase Mobile
More informationEffec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
More informationHow To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9
Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may
More informationUAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationUrban Big Data Centre
Urban Big Data Centre Piyushimita Thakuriah (Vonu) Director, UBDC Professor and Ch2M Chair of Transport UNIVERSITY OF GLASGOW November 12, 2015 July 10, 2015 UBDC Partners Funded by ESRC Big Data Network
More informationIT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
More informationStream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More
Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton
More informationPervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements
OpAuditTM from is the first compliance management product on the market to successfully track manual controls and technical controls in the same workflow-based system. This ingenious solution gathers &
More informationHow To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
More informationSan Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL
San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant
More informationWhy Buy Eaton: Trusted Source to Manage Power
Why Buy Eaton: Trusted Source to Manage Power If you are responsible for power protec0on for small or medium data centers, Eaton can help you deliver a reliable power source for your business. Target Markets:
More informationAn Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network
More informationAppLogic and the Mainframe: The Ul7mate Private Cloud
MODERNIZE AND OPTIMIZE YOUR MAINFRAME S510 AppLogic and the Mainframe: The Ul7mate Private Cloud Sco@ Fagen Dis7nguished Engineer Chief Architect: Mainframe Abstract Mainframers have been using virtual
More informationIdentity and Access Positioning of Paradgimo
1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values
More informationBlue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager
Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager Oracle WebLogic J2EE on VMware Monitoring 203 Blue Medora LLC All rights reserved WebLogic on VMware Management
More informationFull visibility into Siebel CRM user experience with Compuware APM.
The success of an Oracle Siebel project relies on the ability to manage an increased level of complexity of today s heterogeneous landscapes. A typical implementation of Siebel, the business critical application
More informationHow To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook
How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply
More informationAn Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
More informationDTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
More informationDDC Sequencing and Redundancy
DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system
More informationIT Service Management. Asset Management. Statistics & ROI Equations
IT Service Management Asset Management Statistics & ROI Equations Foreword The sta(s(cs, equa(ons & informa(on included in this presenta(on are industry- standard (supported by Gartner, Inc as well as
More informationThe Real Score of Cloud
The Real Score of Cloud Mayur Sahni Sr. Research Manger IDC Asia/Pacific msahni@idc.com @mayursahni Digital Transformation Changing Role of IT Innova&on Informa&on Business agility Changing role of the
More informationPROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
More informationBig Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
More informationPower to the People: Analy0cs for All
Arijit Sengupta CEO, BeyondCore, Inc. Power to the People: Analy0cs for All " Ten patents related to Advanced Analytics, Privacy/Security and BPaaS. " Previously worked at Oracle, Microsoft, Yankee Group
More informationECIA RiSE Initiative. Risk Assessment Database
ECIA RiSE Initiative Risk Assessment Database Contents Background Planning Outcome Process (Training Slides) System in prac:ce Background BB audit & inspec:on process established differing approaches to
More informationAccelerating Application Performance on Virtual Machines
Accelerating Application Performance on Virtual Machines...with flash-based caching in the server Published: August 2011 FlashSoft Corporation 155-A W. Moffett Park Dr Sunnyvale, CA 94089 info@flashsoft.com
More informationVision Panels in Class A Fire Doors
Dear Industry Partners, Following the confirma1on of my appointment as Commissioner for the Department of Buildings this week, I want to again thank Mayor Rahm Emanuel and the City Council for the opportunity
More informationSplunk implementa-on. Our experiences throughout the 3 year journey
Splunk implementa-on Our experiences throughout the 3 year journey About us Harvard University University Network Services Group Serving over 2500 faculty and more than 18,000 students Jim Donn Management
More informationMission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology
Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi
More informationDomain Name System Security
Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is
More informationOnline Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
More informationAchieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More informationReducing Outages and Degradations. With Proactive Application Performance Monitoring. Ted Wilson VP Business Development SL Corporation ted@sl.
Reducing Outages and Degradations With Proactive Application Performance Monitoring Ted Wilson VP Business Development SL Corporation ted@sl.com Agenda Application Performance Monitoring What s All the
More informationComputer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
More informationHow Predic+ve Opera+onal Performance Can Transform a Services Organiza+on
How Predic+ve Opera+onal Performance Can Transform a Services Organiza+on Discover how one company reinvented its managed service business by using Splunk> to turn machine data into a Real Time Opera+ng
More informationFive Factors Driving Businesses to Rethink EDI on IBM i
Simplify and Accelerate e- Business Integra6on Five Factors Driving Businesses to Rethink EDI on IBM i EDI Change Drivers External Loca6ons, Partners, and Services Customers Suppliers / Service Providers
More informationDeveloping Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
More informationManufacturing Operations Management
Manufacturing Operations Management Paul Barber Director Lighthouse Systems During this presenta.on! In over 80 Can factories In 27 countries 15 languages! 1000s of users will be using our so;ware, to:!
More informationProgram Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,
More informationThe Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework. FASP Annual Conference October 29, 2015
The Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework FASP Annual Conference October 29, 2015 Dr. Jayna Jenkins, Florida PS/RtI Project EARLY WARNING SYSTEMS AND THE
More informationPhone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
More informationHelp Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
More informationDEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING
DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial
More informationGraduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
More informationRange of Organiza7onal Approaches
Status of Design and Implementa7on Plan for UH System and Mānoa Organiza7onal Changes and Consolida7ons to Improve the Efficiency and Effec7veness of Support Services Presenta7on to UH Board of Regents
More informationSUMMIT. November 2010
SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and
More informationBPO. Accerela*ng Revenue Enhancements Through Sales Support Services
BPO Accerela*ng Revenue Enhancements Through Sales Support Services What is BPO? Business Process Outsorcing (BPO) is the process of outsourcing specific business func6ons to a third- party service provider
More informationPrivate Cloud Website Solu2on
Private Cloud Website Solu2on Who We Are 2 HighPoint Solu1ons is a premier provider of specialized Management and IT services dedicated to the Life Sciences and Healthcare industries. Since 2000, our business
More informationReducing Outages and Degradations. With Proactive Application Performance Monitoring. Ted Wilson VP Business Development SL Corporation ted@sl.
Reducing Outages and Degradations With Proactive Application Performance Monitoring Ted Wilson VP Business Development SL Corporation ted@sl.com Agenda Application Performance Monitoring What s All the
More informationLegacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
More informationSolving today's integra@on challenges with Oracle SOA Suite, and Oracle Coherence
Solving today's integra@on challenges with Oracle SOA Suite, and Oracle Coherence Asaf Lev Sales Consul@ng asaf.lev@oracle.com Agenda Industry Trends Oracle SOA Suite Oracle Coherence Oracle Service Bus
More informationSplunk for Networking and SDN
Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking
More informationWorldwide Application Performance Management Software 2013 Vendor Shares
Competitive Analysis Worldwide Application Performance Management Software 2013 Vendor Shares Melinda-Carol Ballou Rohit Mehra Tim Grieser Mary Johnston Turner IDC OPINION The worldwide application performance
More informationMigrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
More informationChange Management Strategies to Increase Adop5on of Systems, Programs and Processes
Change Management Strategies to Increase Adop5on of Systems, Programs and Processes Theresa Rabe, Deputy Director of HR, County of San Mateo Jay Krishnan, Director, Product Marke5ng, GuideSpark October
More informationconfigurability compares with typical SIEM & Log Management systems Able to install collectors on remote sites rather than pull all data
Software Comparison Sheet SIEM & Log OpViewTM from Software leverages a completely new database architecture to deliver the most flexible monitoring system available on the market today. This award-winning
More informationconfigurability compares with typical Asset Monitoring systems Able to install collectors on remote sites rather than pull all data
Software Comparison Sheet OpViewTM from Software leverages a completely new database architecture to deliver the most flexible monitoring system available on the market today. This award-winning solution
More informationSecurity Leadership: Preven4ng and Responding to Future Cyber A<acks. Mark Seward, Sr. Director, Security and Compliance
Security Leadership: Preven4ng and Responding to Future Cyber A
More informationPerformance Management. Ch. 8 The Strategy Implementa9on Mechanism. Chiara Demar9ni UNIVERSITY OF PAVIA. mariachiara.demar9ni@unipv.
UNIVERSITY OF PAVIA! Performance Management Ch. 8 The Strategy Implementa9on Mechanism Chiara Demar9ni mariachiara.demar9ni@unipv.it Master in Interna+onal Business and Economics! Defini9on Strategy implementa9on
More informationITDays Security issues
ITDays Security issues Malicious Intrusion, are we concerned in our Organiza;on? 7 steps to evaluate your situa;on! Christophe Bianco - Christophe Rosenkranz Paul Jung November 2014 1 Agenda Are you concerned?
More informationProtec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
More informationMAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
More informationApril 20 th 2011, Internet2 Spring Member Mee5ng Aaron Brown Internet2. Circuit Monitoring for DYNES
April 20 th 2011, Internet2 Spring Member Mee5ng Aaron Brown Internet2 Circuit Monitoring for DYNES Dynamic Circuits Scien5fic disciplines require greater network capacity and predictably to cope with
More informationCase Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
More informationData Center 2020. DC planning for the next 5 10 years. Copyright 2004-2013 Experture and Robert Frances Group, all rights reserved
DC planning for the next 5 10 years Topics to be Discussed Introduc=on Indirect Drivers Technology Direct Drivers Data Center DC Management DC Opera=ons s and Disaster Recovery 2 Introduc=on The future
More informationCloud Infrastructure Services Survey: Key UK Takeaways. Survey conducted by
Cloud Infrastructure Services Survey: Key UK Takeaways Survey conducted by Despite Understanding the Benefits of Cloud Compu7ng, UK IT Teams are Taking a Staged Approach with Migra7on NaviSite Europe Limited,
More informationThe Adop)on Pa-erns of Mobile Telephones by Micro and Small Enterprises in Ghana
The Adop)on Pa-erns of Mobile Telephones by Micro and Small Enterprises in Ghana Godfred Kwasi Frempong Science and Technology Policy Research Ins)tute gkfrempong@csir- stepri.org Introduc*on Development
More informationConvergence. The Enabler of the Intelligent Building. Willie O Connell MD Northern Europe CommScope
Convergence The Enabler of the Intelligent Building Willie O Connell MD Northern Europe CommScope Agenda ENTERPRISE NETWORKS: Challenges and Common Trends BUILDING: Focus on key issues and solutions LIVING
More informationNonprofits & Technology. Presented By:
Nonprofits & Technology Presented By: Presenter Informa1on Affiliations: Developed Conference Mobile app For Carolina Pain Society Mobile App Developer About Us: My name is Billy Goldfarb and I have developed
More informationKaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
More informationChannel Bytes. Accelera'ng Managed Services
Channel Bytes Accelera'ng Managed Services Housekeeping Webinar is being recorded. Slides and recording link will be available tomorrow.? Contact informa8on is provided at the end of the webinar. #channelbytes
More informationPrivileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
More informationAIS TECHNOLOGY SOLUTIONS GUIDE
AIS TECHNOLOGY SOLUTIONS GUIDE WHAT IS AIS AT TECH DATA? Advanced Infrastructure Solutions provide resellers with everything they need to keep their data centers up-to-date with the latest technology.
More informationISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps Agenda Security Enablement Concepts for BYOD & SaaS Cloud Apps! Intro and background! BYOD
More informationArchitec;ng Splunk for High Availability and Disaster Recovery
Copyright 2014 Splunk Inc. Architec;ng Splunk for High Availability and Disaster Recovery Dritan Bi;ncka BD Solu;on Architecture Disclaimer During the course of this presenta;on, we may make forward- looking
More informationConnec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
More informationHoneycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme
Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme managed by the Special EU Programmes Body. Web Analy*cs In
More informationBeyond Strategy: Building Your Mobile Capabili6es
Beyond Strategy: Building Your Mobile Capabili6es TASSCC Technology Educa6on Conference April 10, 2015 Presented by: Raj Polikepa6 Director of App Development Texas.gov Agenda ê Objec6ves of Mobile Strategy
More informationIT Asset Management Best Practices Using RFID. Stephen Schwartz
IT Asset Management Best Practices Using RFID Stephen Schwartz 1 Agenda IAITAM Functional Areas ITAM Best Practice Areas for RFID Asset Life Cycle Process Understanding Your Policies & Processes Suggested
More informationData Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM
Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute
More information2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
More informationAVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Management Expert September 2015 This presenta?on contains extracts from books that are: Copyright 2011 John Wiley & Sons,
More informationInforma.on Systems in Organiza.ons
Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core
More informationFixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
More informationMTD Keystone s Multiple Service Platforms
MTD s Multiple Service Platforms uses the Microso/ Office pla5orm and is an MS Access applica:on with integra:on to the common Microso/ Office applica:ons, namely Excel, Word, and Outlook. may be installed
More informationMaking Sense of Big Data. Dr. Thomas E. Potok Computa2onal Data Analy2cs Group Leader Oak Ridge Na2onal Laboratory potokte@ornl.
Making Sense of Big Data Dr. Thomas E. Potok Computa2onal Data Analy2cs Group Leader Oak Ridge Na2onal Laboratory potokte@ornl.gov 865-574- 0834 ORNL s Big Data Legacy Science National Security Energy
More informationROI Business Use Case. Cross-Enterprise Application Performance Management. Helps Reduce Costs & MTTR, Simplify Management, Improve Service Quality
ROI Business Use Case Cross-Enterprise Application Performance Management Helps Reduce Costs & MTTR, Simplify Management, Improve Service Quality Today s applications are complex, running across your network
More informationDisaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University
Disaster Recovery Planning and Implementa6on Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Agenda Background for York s I.T. Disaster Recovery Planning
More informationWebinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security
Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security With Iden>ty Expert and UnboundID Customer Bill Bonney Today s Speakers Bill Bonney Formerly Director,
More informationData Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
More informationChallenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS
Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project
More informationCompTIA A+ Partner Update October 21, 2015
CompTIA A+ Partner Update October 21, 2015 Agenda Cer;fica;on Update Industry & Job Role Changes Cer;fica;on Changes Posi;oning & Compe;;ve Comparisons Key Dates Marke;ng and Promo;ons 2 WHY CHANGE IT
More informationEmergency Management - County 911 Rescue Planning
Calcasieu Parish Communica0ons Past Present Future 1 Emergency Communica0on Past + Present + Future 2 3 4 5 Hurricane Timeline Ops Period 1 Activities: H-120 to H-96 6 Test EOC communica0ons ACTIVITIES:
More informationPrivacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
More informationThe author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Criminal Justice System State Administrative Agencies: Research
More informationHow to Use Splunk To Detect and Defeat Fraud, TheK And Abuse
Copyright 2015 Splunk Inc. How to Use Splunk To Detect and Defeat Fraud, TheK And Abuse Joe Goldberg Product Marke@ng, Splunk Young Cho Technical Product Marke@ng, Splunk Disclaimer During the course of
More information