VKSF 423 System Administration III Enterprise Computing and The Role of IT.

Slides:



Advertisements
Similar presentations
Tivoli Storage Manager v. 4.1 Executive Presentation.
Advertisements

Virtual Disk based Centralized Management for Enterprise Networks
Business Plug-In B4 MIS Infrastructures.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
The future of Desktops Transform Your Desktop with Virtualization.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Current Information Technology Issues Norbert Mika NJ Mika Consulting Inc.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Does IT Matter? Ken Peffers UNLV January 2005 IT as a Commodity—Carr Data Storage Data Storage Data Processing Data Processing Data Transport Data Transport.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Thin Client vs. Desktop Advantages and Disadvantages of Operating System Environments.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Greg Porter, MCITP: EA, Cal Poly October 17, 2010.
Comprehensive IT Consulting Services an innovative approach to business.
Selling Consolidation’s Value. Why Consolidate? Reduce Complexity Increase Productivity Reduce TCO Improve End User Experience Improve IT Performance.
Senior Design – Spring 2009 Richard Gory Focus: Networking & Web.
1.Training and education 2.Consulting 3.Travel 4.Hardware 5.Software Which of the following is not included in a firm’s IT infrastructure investments?
© 2009 VMware Inc. All rights reserved VMworld Update Ian Moore - Country Manager Ireland ie.linkedin.com/in/iantmooreiantmoore.
Cloud Computing.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Ben Hsu and Sangwon Kim.  Buy at current price (~28 dollars)  Sell at ~34 dollars.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
IT Infrastructure Chap 1: Definition
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Improving QAD Availability Through Virtualization Spring 2014 QAD Midwest User Group Meeting March 24, 2014 Itasca, IL Kirk Patten – Strategic Information.
Module 7: Fundamentals of Administering Windows Server 2008.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
An iterative approach to Desktop Virtualization By Mike Cave, Acting Chief Information Officer CA Department of Toxic Substances Control.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Carnegie Mellon University © Robert T. Monroe Management Information Systems Does IT Matter? Management Information Systems Robert.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Microsoft and Symantec
MidVision Enables Clients to Rent IBM WebSphere for Development, Test, and Peak Production Workloads in the Cloud on Microsoft Azure MICROSOFT AZURE ISV.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Copyright 2005 by Nicholas G. Carr. Nicholas G. Carr Does IT Matter?
1 Evolution and Revolution: Windows 7 and Desktop Virtualization Changing the Desktop Support Landscape Denise Harrison, CIO and Vice President.
VMware Mirage Desktop Deployment and Case Studies.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Breaking free from conventional thinking about CRM Presented by: Microsoft Dynamics CRM and HP platforms Plaza Dynamics Conventional Thinking: Integrated.
VKSF 423 System Administration III Service Deployment and the Virtualization of Services.
Cloud Computing Presented By: Mark Jordan. Agenda Definition Examples Which is Better Future.
Virtualization Explored
Chapter 7. Identifying Assets and Activities to Be Protected
Avenues International Inc.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Building a Virtual Infrastructure
What Do We Do? Managed IT services
Introduction to desktop virtualization
IT INFRASTRUCTURES Business-Driven Technologies
Agenda The current Windows XP and Windows XP Desktop situation
IBM Tivoli Storage Manager
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

VKSF 423 System Administration III Enterprise Computing and The Role of IT

Announcements Lab Overview The goal for the lab portion of this course is for you to form an “interesting” network that simulates some of the challenges that are facing enterprise system administrators today. Seven labs. Groups of three people, Each group will use eight PCs (two benches).

Lab Overview cont. Lab 1. VMWare configuration and installation of guest operating systems, configure core services: Servers should be mostly configurable from a client desktop. Lab 2. Authentication -PAM, RSA Secure ID *Lab 3. Virtualized Storage- Veritas Storage Central ? Lab 4. Clusters

Lab Overview cont. *Lab 5. Update Services/ Back-up and Restore SUS RIS Alteris Ghost *Lab 6. Terminal Services LTSP Citrix Windows Terminal Services *[1]Lab 7. Alternative Desktops[1] Sun Java desktop Lindows Xandros

Lab Topology (Under Development) PC #Client/ServerOperating SystemServices 1ServerChoiceCore services 2ServerHost: Win2k Guest: Linux 3ServerHost: Linux Guest: Win 2k 4ServerWin2kAD, SFU, VStorage 5Server 6ClientChoice 7ClientChoice 8ClientChoice

What is an “Enterprise” Many points of access Many devices Increasing reliance on Internet for: voice and centralized data stores. Scale Complexity

IBM’s Take on Security Enterprise issues eg>. The IRS has 5000 servers and 125,000 workstations. To manually install a patch takes on average 45 minutes/workstation. 125,000 * 45 minutes =93,750 hours 2000 hours/year= 47 employees fulltime $45,000/employee= $2,000,000/year

IBM’s Take on Security cont. T. Rowe Price 120 enterprise applications running on their network 3 to 5 accounts/person NYSDOL 1996 Zero PCs Federal medicare and medicaid system incompatibilities almost forced two PCs/desk. Supply chain issues relating to software licensing.

IBM’s Take on Security cont. Evolution of Disaster recovery From: flood or fire maintaining tape libraries To: Protection against “regional” disasters Highly resilient infrastructure (Internet outages) Awareness of business interdependencies Data explosion (including paper records) Complete primary facility loss Loss of personnel Old paradigm: Experience and react New Paradigm: anticipate and adjust

IT Doesn’t Matter Who is the author? What is their incentive? “Scarcity – not ubiquity – makes a business resource truly strategic. Companies gain an edge by having or doing something others can’t have or do.”

IT Doesn’t Matter cont. IT is now ubiquitous Other ubiquitous resources include: Electricity Railroads Natural gas Skilled, and literate workers Access to markets

IT Doesn’t Matter cont. How do you manage a ubiquitous resource? Focus on risk, not opportunities Spend less Follow, don’t lead Greatest risk with IT: Overspending Goal: provide computing resources to users like any other utility

IT Doesn’t Matter cont. IT as a utility comparable to electricity? Have we overbuilt capacity? Will standardization in IT lead to standardization in business process? Can strategic value be gained through the application of IT?

Carr’s New Rules For Management Because the opportunity to gain strategic value from IT are disappearing managers should do the following: Spend less. Follow, don’t lead. Focus on vulnerabilities, not opportunities.

Brown and Hagel Response Carr captures zeitgeist of managers. Broad lessons regarding IT: Extracting value from IT requires innovations in business practices. IT’s economic impact comes from incremental innovations rather than “big bang” initiatives. The strategic impact of IT investments comes from the cumulative effect of sustained initiatives to innovate business practices in the near term.

Brown and Hagel Response cont. It has never been true that IT matters in isolation. It only matters in the context of a concerted effort to innovate based on new possibilities and opportunities created by technology. Then it matters- and will continue to – a lot.