SlideShare a Scribd company logo
1 of 209
WelcomeTo The CIO Breakfast! Please take some time to visitour vendor exhibits. Wireless access for this room: SSID: Guest Password: Acrodex1
TSX: DPM Mark GelsominiCorporate Director IT
Agenda Who is Dundee Precious Metals Inc.? Vision   The Technology  IT Transformation   End Result
Dundee Precious Metals  Dundee Precious Metals (DPM:TSX) is a Canadian-based, international mining company engaged in the acquisition, exploration, development, mining and processing of precious metal properties.  DPM’s business objectives are to identify, acquire, finance, develop and operate low-cost, long-life mining properties. With a dynamic global operation, DPM decided that a more strategic, centralized approach to IT was necessary to support the emerging business requirements.
DPM Global IT Visionission Statement “To deliver reliable business-centricIT solutions, infrastructure and services through leadershipand partnershipwith DPM operations globally to maximizing efficiency, streamlining processes, while supporting  corporate objectives.”
The Technology  High speed fiber optic data link coupled with a 50 – 110 Volt (touchable) low power consumption power line bring high speed data line to any point where some form of communication device has to be placed. Wi-Fi based communication Wi-Fi clients, Wi-Fi based Push To Talk system Wired clients (Controllers, Cameras, FANs) RFID/Wi-Fi based location tracking
Design Boxes are connected with fiber optic cables and can be separated up to 10Km Wired clients are connected to the boxes with up to 100m copper cable BOX is rated for IP67 (Industrial) All industrial connectors FOB is fully detachable Industrial Wi-Fi clients (Yellow)
The technology Picture Standard IP Telephone In an IP67 Protected box With Visual Ringer Places Refuge Chambers Shafts Pumps Transformer Bays Ore-Passes
Push to talk and Paging All Wi-Fi phones have Push To Talk capabilities Push to Talk application will have following features Unlimited numbers of channels Emergency button Listening to more than one channel (For Safety department) Channel filtering Paging is software which give the opportunity to send audio and text messages to group or all phones
The Mine Access point Wi-Fi phone 10
Change
IT Transformation  Strategic context What’s happening in  DPM right now? What’s effecting the team right now? Scope What can the team influence? What can the team not influence? Central question What do we want to  focus on and achieve As a team? Stakeholders/ Decision-making Who is accountable? Who is affected? How decisions get made? Major issues What are 2 or 3 key issues we need to address now to resolve the central question? Barriers to action What’s preventing the team from  executing the central question? Success measures When you have  achieved the central question how will you be able to measure it?
Layers of Productivity 5.     Make willing sacrifices for the good of the team 4.     Identify your part of the interdependent outcome 3.     Build greater-than-self outcomes which everyone can commit to 2.     Create an open environment to share divergent views Proactively contribute to an environment of trust
Which path to take?
Achievements and Awards May 2010 Microsoft Momentum Magazine Cover Story “Gold Standard” Awarded “Most Innovative Company 2010”from Cisco Europe Finalist “Most Innovative Business Impacting Network of the Year” First mining company to deploy non-proprietary communicationtechnologies in the mines Created three way integrationwith Cisco VoIP, Tandberg and OCS
Special thanks to…
Welcome! Please take some time to visitour vendor exhibits. Wireless access for this room: SSID: Guest	Password: Acrodex1
Thursday, September 29, 2011 Morning  Afternoon 8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits 9:00 – 9:10 Acrodex Welcome Address 9:10 – 9:50 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure 9:50 – 10:30 Desktop Virtualization – Case Study 10:30 – 10:40 Morning Break 10:40 – 11:20 Cloud Infrastructure Suite – VMWare Information Session 11:20 – 12:00 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session 12:00 – 12:45  Lunch & Vendor Exhibits 12:45 – 1:30 Software Asset Management 1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices 2:15 – 2:30 Afternoon Break 2:30 – 3:10 Mobility Management – LANDesk Information Session 3:10 – 3:50 Blackberry In The Enterprise – RIM Information Session 3:50 – 4:00 Reflections and Closing Remarks 4:00 – 6:00 Cocktail Reception
Welcoming Address Josh Payne  Senior Sales Lead Manitoba
We invite you to tweet using: #TechDays Follow us too! @Acrodex
Special thanks to…
Greg Hutton Systems Engineer
Getting Your Organization Cloud Ready:Fully Virtualizing Your Infrastructure
Definition
Cloud Deployment Models Cloud Computing is a way of doing computing Cloud ServiceProviders Bridging Enterprises Hybrid Cloud Composition of 2 or more interoperable clouds, enabling data and application portability Public  Cloud Accessible over the Internet for general consumption Private Cloud Operated solely for an organization, typically within the firewall
How can I use the cloud? IT as a Service ,[object Object],VMware vCloud Express ,[object Object],VMware vFabric ,[object Object],VMware Horizon Application Manager ,[object Object],VMware Site Recovery Manager ,[object Object],VMware View
The Journey To The Cloud Public Cloud Experimentation Public Cloud Adoption and Commitment
Where to start?
Business Critical/Tier-1 Applications Yeah, but… No worries, Performance Security & Compliance Support 95% of apps match or exceed native performance on vSphere vShield, security and compliance at the hypervisor Alliance partnerships improve support ,[object Object],[object Object]
Desirable Characteristics Secure Performant Scalable Agile Elastic Reliable Device & Location Independent Manageable Does not increase costs
Links http://www.acrodex.com http://www.vmware.com/solutions/business-critical-apps/ http://communities.vmware.com/community/vmtn/vmug
Dave Hunter Associate Director of IT Sercives
VMWare Virtualization at Red Deer College
Red Deer College Background 7500 students 700 Faculty and Staff Centrally located Strong Community Presence Many Business Partners –BCTL Donald School of Business
RDC IT Services 35 IT Personnel Banner ERP running on Oracle Several Hundred MSSQL Databases in a cluster 150 Servers ,[object Object]
8% Solaris
2% Linux1800 desktops – replace one third each year HDS AMS 1000 SAN Storage – 35 TB Cisco Switches end to end -10 GB backbone
RDC Server Virtualization Virtualized 90 of 150 servers 3 years ago ,[object Object]
This year we moved to HP Blade Servers
C7000 chassis
BL490 blades – 4 for servers – 128 GB,[object Object]
Moved to Thin App – smaller foot print in image,[object Object]
Microsoft Hyper V not robust enough (RDP)VMWare was the logical choice for us ,[object Object]
An extension of what we were already doing
PCoIP
VMWare VDI Infrastructure Cost (1/3),[object Object]
No extra OS to manageVMWare ESXi 4.1 VMWare View 4.6 During readiness for Pilot we switched from XP to Windows 7 64 bit – less overhead Rolled out 100 pilot desktops
RDC VDI – Recent Events Purchased a Separate SAN ,[object Object],Rolled out 500 Desktops ,[object Object]
Learning Information Commons - Students
Students took us up on Anything from anywhere on any device.  (50/50 first week)Upgraded 14 blades to Dual Six Core CPUs ,[object Object],Loaded each blade with 144 GB RAM
Lessons Learned Don’t rush – Plan, Plan, Plan ,[object Object],SAN Performance  ,[object Object]
Configuration - Optimization
When we turned on the 100 pilot desktops we brought down our SANBe willing to adapt and change quickly – things don’t always go according to plans ,[object Object]
Softgrid  ThinApp
Windows XP  Windows 7
New SAN,[object Object],[object Object]
Morning Break 		        #TechDays Morning  Afternoon 8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits 9:00 – 9:10 Acrodex Welcome Address 9:10 – 9:50 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure 9:50 – 10:30 Desktop Virtualization – Case Study 10:30 – 10:40 Morning Break 10:40 – 11:20 Cloud Infrastructure Suite – VMWare Information Session 11:20 – 12:00 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session 12:00 – 12:45  Lunch & Vendor Exhibits 12:45 – 1:30 Software Asset Management 1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices 2:15 – 2:30 Afternoon Break 2:30 – 3:10 Mobility Management – LANDesk Information Session 3:10 – 3:50 Blackberry In The Enterprise – RIM Information Session 3:50 – 4:00 Reflections and Closing Remarks 4:00 – 6:00 Cocktail Reception
Rob Wiens Corporate Account Executive, VMware
Cloud Infrastructure SuiteVMware Information Session
The New IT: Promises & Challenges        Empowered, Secure, Mobile Workforce ,[object Object],  New Generation of Enterprise Apps ,[object Object],Existing Apps SaaS Apps New Enterprise Apps            A More Flexible, Efficient Infrastructure ,[object Object]
Creating & spanning both internal and external resource poolsPublic Cloud Services Existing Datacenters
Companies are Increasingly Virtualizing Bus. Critical Apps  vSphere vSphere vSphere Accelerate AppTime to Market Improve AppQuality of Service Improve App Efficiency ,[object Object],>60% Virtualized ,[object Object]
Custom Java Apps
SharePoint
Exchange
SQL
Oracle 30% Virtualized ,[object Object],[object Object]
The IT Transformation Journey IT Production Business Production IT as a Service  Virtualization Becomes the Norm ~50% vSphere 4 generation 2011 2010 VI 3 generation 2009 40% 30%
The IT Transformation Journey IT Production Business Production IT as a Service  Virtualization Becomes the Norm Cloud Infrastructure Suite vSphere 5 generation Amplify ~50% Accelerate
vSphere 5: Accelerating the Path to 100% Virtualization 4x VMwarevSphere 5 VMware vSphere4 VMware Inf. 3 ESX 2 ESX 1 8 4 32 2 1 CPU (VCPUs) 256 64 1,000 3.6 2 Memory (GB per VM) 30 9 >36 .9 <.5 Network (Gb/s) 300,000  100,000 1,000,000 7,000 <5,000 IOPS
The First Comprehensive Cloud Infrastructure Suite Cloud Infrastructure Suite Policy, Reporting, Self-Service vCloud Director Virtualized Security &Edge Functions vShield Security  Monitoring & Management vCenter Operations vSphere 5  Business Continuity vCenter SRM High Performance Resource Control, Pooling & Scheduling
Complete Hybrid Cloud Stack ,[object Object]
 Increase automation through built-in intelligent policy managementOrganization: Marketing Organization: Finance ,[object Object]
 Enable secure, self-service to pre-defined IT services, with pay-for-useVirtual Datacenters Catalogs Virtual Datacenters Catalogs Users & Policies Users & Policies Compute Storage Network
Respond to Business Faster Trust Your Cloud Run Business Critical Apps with Confidence VMware Cloud Infrastructure Apps Agility Trust ,[object Object]
Resource Elasticity
Flexible Hybrid Cloud Management
Visibility into Sensitive Data
Efficient Protection Against Network Intrusions, and Viruses
 Performance Guarantees
Scalability and Performance
High Availability and Disaster Recovery
Broad Industry Support ,[object Object]
Provisioning of infra services  ? Availability = 99.% DR RTO = none Back up = none Storage capacity = 10 TB Performance = low I/O Security = low Availability = 99.9% DR RTO = 3 hour Back up = weekly Storage capacity = 10 TB Performance = Med I/O Security = Mid Availability = 99.0% DR RTO = none Back up = none Storage capacity = 10 TB Performance = low I/O Security = low Availability = 99.9% DR RTO = 3 hour Back up = weekly Storage capacity = 10 TB Performance = Med I/O Security = Mid Availability = 99.99% DR RTO = 1 hour Back up = daily Storage capacity = 10 TB Performance = High I/O Security = High Availability = 99.99% DR RTO = 1 hour Back up = daily Storage capacity = 10 TB Performance = High I/O Security = High Gold Bronze Silver Cloud Infrastructure(vSphere, vCenter, vShield, vCloud Director) ,[object Object]
Back up
Anti-virus
Firewall ,[object Object]
VMware’s Vision: Intelligent Policy ManagementDay N Problem– Ongoing Maintenance  ,[object Object],Availability = 99.% DR RTO = none Back up = none Storage capacity = 10 TB Performance = low I/O Security = low Availability = 99.9% DR RTO = 3 hour Back up = weekly Storage capacity = 10 TB Performance = Med I/O Security = Mid Availability = 99.99% DR RTO = 1 hour Back up = daily Storage capacity = 10 TB Performance = High I/O Security = High Gold Bronze Silver Cloud Infrastructure(vSphere, vCenter, vShield, vCloud Director)
VMware’s Vision: Intelligent Policy Management Day N Problem– Ongoing Maintenance  DRS: Load balances VMs across Hosts Storage DRS: Load Balances VMs across Storage Arrays Network & Storage IO controls: Ensures critical workloads get preferential access to Network and Storage IO vShield: Trust Zones stretch as VMs move ,[object Object]
Dynamic load balancing of resources to meet SLAs Availability = 99.% DR RTO = none Back up = none Storage capacity = 10 TB Performance = low I/O Security = low Availability = 99.9% DR RTO = 3 hour Back up = weekly Storage capacity = 10 TB Performance = Med I/O Security = Mid Availability = 99.99% DR RTO = 1 hour Back up = daily Storage capacity = 10 TB Performance = High I/O Security = High Gold Bronze Cloud Infrastructure(vSphere, vCenter, vShield, vCloud Director)
VMware’s Vision: Intelligent Policy Management Day N Problem– Ongoing Maintenance  NIC teaming & Multipathing: Recover from component failures HA and FT: Recover from Host or OS Failures Site Recovery Manager: Recover from Datacenter failures ,[object Object]
Dynamic Load Balancing of Resources to meet SLAs
Elegantly recover from FailureAvailability = 99.% DR RTO = none Back up = none Storage capacity = 10 TB Performance = low I/O Security = low Availability = 99.9% DR RTO = 3 hour Back up = weekly Storage capacity = 10 TB Performance = Med I/O Security = Mid Availability = 99.99% DR RTO = 1 hour Back up = daily Storage capacity = 10 TB Performance = High I/O Security = High Gold Bronze Silver Cloud Infrastructure(vSphere, vCenter, vShield, vCloud Director)
Run Business Critical Apps with Confidence Respond to Business Faster Trust Your Cloud What Products and Features Make This Possible?  vSphere 5.0 – Auto Deploy,  Storage DRS, Profile-Driven Storage vCenter Operations 1.0 vSphere 5.0 –  VMs Scale (32 vCPU , 1 TB RAM), ESXi Hypervisor vShield  App 5.0 ,[object Object]
Resource Elasticity
Flexible Hybrid Cloud Management
Visibility into Sensitive Data
Efficient Protection Against Network Intrusions, and Viruses
Performance Guarantees
Scalability and Performance
High Availability and Disaster Recovery
Broad Industry Support vSphere 5.0 – New HA SRM 5.0 – Replication, Failback vSphere Storage Appliance 1.0 –  HA and vMotion for all customers Heartbeat 6.4 vCloud Connector vSphere5.0 – Web Client, Server Appliance on Linux, iPad Client for vSphere vSphere 5.0 - Network and Storage IO Control  vShield App 5.0  Cloud Director 1.5 – Linked Clones vSphere5.0
Thank You
Keith Aasen Consulting System Engineer, Vertualization
Beyond Storage Efficiency and Automated Data protection in Virtual Environments
NetApp Confidential - Internal Use Only Unified Storage
Unified Data Access NAS SAN Object CIFS NFS FCP FCoE HTTP REST iSCSI FAS6200 Series FAS3200 Series FAS2000 Series
Common Storage Portfolios Symmetrix VMAX Clariion VNX Symmetrix VMAXe Clariion VNXe Clariion Isilon EVA LeftHand 3Par Ibrix StorageWorks EqualLogic Compellent EMC Clariion PowerVault Single Protocol Hardware equates to functionality Disjointed architectures & integration Operational variances NetApp Confidential - Internal Use Only
Simplicity NetApp Confidential  FAS6280 FAS6240 FAS6210 2880 TB 1440 drives FAS3270 FAS3240 2880 TB 1440 drives FAS3210 FAS2040 2400TB 1200 drives FAS2020 FAS6200 Series 1920TB 960 drives 1200TB 600 drives 136TB 136 drives FAS3200 Series 68TB 68 drives 480TB 240 drives ,[object Object]
ONE set of data services
ONE management
ONE set of processesFAS2000 Series
Hardware is Merely a Means to Scale NetApp Confidential - Internal Use Only Data Ontap V-Series FAS6200 FAS3200 FAS2000 Ontap-v VSA VM X - YTB 68 - 272TB Virtualize 3rd Party Arrays 480TB– 1.9PB 2.4- 2.9PB ,[object Object]
Architectural repeatability
Operational consistencyNetApp® Storage Portfolio
Unified Data Services SnapMirror Deduplication Dedup                Instant Backup                   File Server                   Consolidation                  Smart Clones                   D2D Backup IP-based SAN Storage Isolation SnapVault iSCSI CIFS Snapshots MultiStore FlexClones                  IP-based Data                     Replication NFS Procotol WORM storage NFS SnapLock FAS6200 Series FAS3200 Series FAS2000 Series
NetApp Confidential - Internal Use Only Efficiency
Comprehensive Efficiency NetApp Confidential  Storage Operations Data Growth ,[object Object]
Storage management automation
Integrated data protection
Service automationSATA / Flash Cache RAID-DP® Thin provisioning $ Snapshot® Technology Deduplication  Thin replication Virtual copies Compression TB
Efficiency is Built In NetApp Confidential
Efficiency is Built In NetApp Confidential
Efficiency is Built In NetApp Confidential
Virtual Environments NetApp Confidential  Traditional Enterprise RAID Arrays
Virtual Environments Duplicate Data  Is Eliminated Traditional Enterprise RAID Arrays NetApp Confidential
All Protocol & All Datasets NetApp Confidential  FCP Storage iSCSI Storage CIFS Storage All Protocols, All Datasets NFS Storage Enterprise Data Mid-tier Data
Industry Averages NetApp Confidential
81 NetApp Confidential  Virtual Storage Tiering
Data Placement Challenge Primary Storage Pool:  All data – hot and cold Objective: Intelligently place “hot” data on the highest performing media  “Hot” Data 10-20% Data should be fast when hot, and low cost when it’s cold
NetApp’s Criteria for Effective Tiering Real-Time   ,[object Object]
Use high cost media (Flash) efficiently
Enable SATA as primary tierEfficient Simple ,[object Object],[object Object]
Scale performance on demandNo data movement ,[object Object]
Highly efficient
Simple to install and requires no administrationData-driven   •   Real-time   •   Self-managing Virtual Storage Tier Physical Storage
The NetApp Virtual Storage Tier  Intelligent Caching Enabled ,[object Object]
Virtualize for efficiency
Dedup, thin provisioning, etc.
Add performance
Promote hot data on-demand01010 10110 01011 Virtual Storage Tier Performance PhysicalTier 01010 10110 01011 01010 10110 01011 01010 10110 01011 01010 10110 01011 Capacity 01010 10110 01011 Virtualize
1 3 2 1 4 6 5 7 8 ESX Cluster VM VM VM VM VM VM VM VM NetApp FAS Array VST - FlashCache VM Dedupe Disk Storage VM VST in a Virtual Environment
EMC Complexity NetApp Confidential
NetApp Simplicity NetApp Confidential
NetApp Confidential - Internal Use Only “True” Storage Virtualization
NetAppMultiStore Customer A Data Data Data Data Data Data Data Data Data Virtual Storage Controller Secure IP Space ,[object Object]
Logical partitions within the NetApp arraySecure VLAN Interface ,[object Object],Network VLAN ,[object Object]
 Separates broadcast domainsMultiStore® Customer B Customer C Virtual Storage Controller Virtual Storage Controller NetApp provides the industry’s only complete tool set for providing path isolation from the disk through the network. This level of security is mandatory for multi-tenant environments.
NetAppMultiStore & vFilers ,[object Object]
vFiler storage service profiles unbind data from hardware
DataMotion non-disruptive mobility & migration
Centralized cluster managementvFiler vFiler vFiler vFiler vFiler vFiler vFiler vFiler vFiler vFiler vFiler Data Ontap NetApp Confidential - Internal Use Only
Next-Gen Data Ontap Cluster-Mode NetApp Confidential - Internal Use Only ,[object Object]
Supports 24 storage nodes
Abstracted access via vFilers (virtual arrays)
Centralized cluster managementvFiler vFiler vFiler Data Ontap 8.1 C-Mode
Key C-Mode values  ,[object Object]
Upgrade, replace, rebalance, expand, all without disrupting workloads
Scalable containers
Scale up, scale out, scale down
Petabytes of data; billions of objects,[object Object]
RAID the Foundation of Data Protection NetApp Confidential - Internal Use Only ,[object Object]
Highest performance and data protection
Industry leading efficiency (87.5% default utilization)
Solution design simplicity & standardization
Storage tiering simplified
Enabled based on type of medium not a matrix comprised of mediums & RAID types,[object Object]
Introduce NetApp Arrays ,[object Object],Tape Archive Backup Replication Disk Backup Production DR Strengths Same process that you know Weaknesses Same process that you know Long-Term Archive Compressed 1st Point of Recovery Dedupe Day to Day workloads Identical HW as Production
Introduce NetApp Arrays ,[object Object],Tape Archive Backup Replication Disk Backup Production DR Strengths Production & DR storage is reduced by 50% Same process Weaknesses Same process Long-Term Archive Compressed 1st Point of Recovery Dedupe Day to Day workloads + Dedupe Dedupe DR
Introduce NetApp Arrays NetApp Multi-Purpose Integrated Data Protection Archive Dedupe Replication Tape Backup on production Array Eliminates backup array Instant backups & restores Backups automatically transferred offsite DR with backup points stored on a single array Production Offsite Backup & DR Backup Long-Term Archive Compressed Day to Day workloads + Dedupe 1st Point of Recovery Dedupe DR + Offsite Backups
Introduce NetApp Arrays NetApp Multi-Purpose Integrated Data Protection Production Backup on production Array Eliminates backup array Instant backups & restores Backups automatically transferred offsite Long-term archive or DR Array Dedupe Replication Production Archive Dedupe DR+ Backups Long-Term Archive Day to Day workloads + Dedupe 1st Point of Recovery
Lunch Break 		        #TechDays Morning  Afternoon 8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits 9:00 – 9:10 Acrodex Welcome Address 9:10 – 9:50 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure 9:50 – 10:30 Desktop Virtualization – Case Study 10:30 – 10:40 Morning Break 10:40 – 11:20 Cloud Infrastructure Suite – VMWare Information Session 11:20 – 12:00 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session 12:00 – 12:45  Lunch & Vendor Exhibits 12:45 – 1:30 Software Asset Management 1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices 2:15 – 2:30 Afternoon Break 2:30 – 3:10 Mobility Management – LANDesk Information Session 3:10 – 3:50 Blackberry In The Enterprise – RIM Information Session 3:50 – 4:00 Reflections and Closing Remarks 4:00 – 6:00 Cocktail Reception
Beyond Storage Efficiency and Automated Data protection in Virtual Environments
A Little About Me My experience lies in the licensing of software, whether in licensing agreements, basic office applications, servers, desktops, ERP or virtual licensing.   I started my technology career-path with KEPCO in San Antonio, Texas as an educational materials sales representative.  My career continued for Soft Options in Calgary where I learned about large software licensing contracts by servicing clients like TCPL, Chevron, and Amoco (BP). I finished my time in Calgary working for WellPoint Systems which was an ISV for the oil and gas Sector. For the last 4.5 years I have been with Acrodex as a software solutions specialist, sales manager and now territory manager building a team of like minded individuals in our prairie offices both in Regina and Winnipeg.    MCP, CSP, VSP – 14 years experience in software licensing
CHALLENGES. today more than ever businesses are faced with tight economic circumstances, challenged more than ever to do more with less… technology has never been more important to business strategy and survival.
But Which Technology And How Do I Manage IT?
Point Of Reference To The Problem Urban sprawl, also known as suburban sprawl, is a multifaceted concept, which includes the spreading outwards of a city and its suburbs to its outskirts to low-density and auto-dependent development on rural land, high segregation of uses (e.g. stores and residential), and various design features that encourage car dependency.[1] In the last 15 years,  As high speed connectivity increases +  device technology advances to do more in smaller devices = Infrastructure sprawl.
Is Software Licensing Complex? Licensing Agreements ,[object Object]
EA
Select Plus
ELP
TLP or CLP
EAP
ECI
Easy Licensing
Campus/ Student
Open LicenseLicensing Reference Terms ,[object Object]
Per Server
Per Processor (physical or Virtual)
Std, Ent, Datacenter
OSE – Operating System Environment
CAL – Client Access License
Device CAL vs. User CAL
Concurrent User
Perpetual vs. subscription
Qualified Desktop
License certificate
OSE – operating system environment
VDI – virtual desktop infrastructure
Instance
Line of business
Training LabLicensing Terms and Conditions EULA – End User License Agreement PUR – Product Use Rights Maintenance Types ,[object Object]
SA
Subscription Adv.,[object Object]
Saves money in volume discounts
Many have resource bundled in (HUP, technical support, new version rights),[object Object]
SAM Optimization Model By Role
Server Counts Use To Be Simple
User Devices Use To Be Simple

More Related Content

What's hot

Green Efficiency in IT
Green Efficiency in ITGreen Efficiency in IT
Green Efficiency in ITGary Adler
 
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefEvaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefInteractiveNEC
 
TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13kentdsorensen
 
Solutions for Service Providers Brief
Solutions for Service Providers BriefSolutions for Service Providers Brief
Solutions for Service Providers Brieflee_m_nolan
 
Managed services overview
Managed services overviewManaged services overview
Managed services overviewJim Crocco
 
ESDS_Corporate_Presentation
ESDS_Corporate_PresentationESDS_Corporate_Presentation
ESDS_Corporate_PresentationRakesh Bachhav
 
CloudCity Working Together Breakfast 9 April 2013
CloudCity Working Together Breakfast 9 April 2013CloudCity Working Together Breakfast 9 April 2013
CloudCity Working Together Breakfast 9 April 2013CollaborationWorks
 
Dimension Data - Company Profile
Dimension Data - Company ProfileDimension Data - Company Profile
Dimension Data - Company Profilekojoboy
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterpriseDell World
 
Sprint Cost Savings with Red Hat
Sprint Cost Savings with Red HatSprint Cost Savings with Red Hat
Sprint Cost Savings with Red HatVikas Grover
 
NEC UNIVERGE BLUE CONNECT - Brochure
NEC UNIVERGE BLUE CONNECT - BrochureNEC UNIVERGE BLUE CONNECT - Brochure
NEC UNIVERGE BLUE CONNECT - BrochureInteractiveNEC
 
Integrating Project Management with Service Management Best Practices Event B...
Integrating Project Management with Service Management Best Practices Event B...Integrating Project Management with Service Management Best Practices Event B...
Integrating Project Management with Service Management Best Practices Event B...Google
 
How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”Kenneth de Brucq
 
Richardson Eyres - IT Solutions & Services
Richardson Eyres - IT Solutions & ServicesRichardson Eyres - IT Solutions & Services
Richardson Eyres - IT Solutions & ServicesRichardson Eyres
 
Broadview-Networks-Brochure
Broadview-Networks-BrochureBroadview-Networks-Brochure
Broadview-Networks-BrochurePat McMichael
 

What's hot (20)

Green Efficiency in IT
Green Efficiency in ITGreen Efficiency in IT
Green Efficiency in IT
 
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefEvaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
 
TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13
 
Solutions for Service Providers Brief
Solutions for Service Providers BriefSolutions for Service Providers Brief
Solutions for Service Providers Brief
 
eloquent-brochure-full
eloquent-brochure-fulleloquent-brochure-full
eloquent-brochure-full
 
VDI Cost benefit analysis
VDI Cost benefit analysisVDI Cost benefit analysis
VDI Cost benefit analysis
 
Managed services overview
Managed services overviewManaged services overview
Managed services overview
 
Atkins case study
Atkins case studyAtkins case study
Atkins case study
 
ESDS_Corporate_Presentation
ESDS_Corporate_PresentationESDS_Corporate_Presentation
ESDS_Corporate_Presentation
 
CloudCity Working Together Breakfast 9 April 2013
CloudCity Working Together Breakfast 9 April 2013CloudCity Working Together Breakfast 9 April 2013
CloudCity Working Together Breakfast 9 April 2013
 
Dimension Data - Company Profile
Dimension Data - Company ProfileDimension Data - Company Profile
Dimension Data - Company Profile
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready Enterprise
 
Sprint Cost Savings with Red Hat
Sprint Cost Savings with Red HatSprint Cost Savings with Red Hat
Sprint Cost Savings with Red Hat
 
NEC UNIVERGE BLUE CONNECT - Brochure
NEC UNIVERGE BLUE CONNECT - BrochureNEC UNIVERGE BLUE CONNECT - Brochure
NEC UNIVERGE BLUE CONNECT - Brochure
 
Integrating Project Management with Service Management Best Practices Event B...
Integrating Project Management with Service Management Best Practices Event B...Integrating Project Management with Service Management Best Practices Event B...
Integrating Project Management with Service Management Best Practices Event B...
 
Cable & Wireless- Cisco
Cable & Wireless- CiscoCable & Wireless- Cisco
Cable & Wireless- Cisco
 
How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”
 
Transform IT services-
Transform IT services-Transform IT services-
Transform IT services-
 
Richardson Eyres - IT Solutions & Services
Richardson Eyres - IT Solutions & ServicesRichardson Eyres - IT Solutions & Services
Richardson Eyres - IT Solutions & Services
 
Broadview-Networks-Brochure
Broadview-Networks-BrochureBroadview-Networks-Brochure
Broadview-Networks-Brochure
 

Viewers also liked

Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation DayAcrodex
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604ISSA LA
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...festival ICT 2016
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...festival ICT 2016
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...festival ICT 2016
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsTrend Micro
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenbergISSA LA
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015festival ICT 2016
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.ISSA LA
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 

Viewers also liked (20)

Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation Day
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Microsoft
MicrosoftMicrosoft
Microsoft
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 

Similar to Winnipeg Technology Innovation Day

Hudson CIO Series - Cloud Computing
Hudson CIO Series - Cloud ComputingHudson CIO Series - Cloud Computing
Hudson CIO Series - Cloud Computingklwallace
 
Hudson CIO Series: 6 Reasons for Cloud Computing
Hudson CIO Series: 6 Reasons for Cloud ComputingHudson CIO Series: 6 Reasons for Cloud Computing
Hudson CIO Series: 6 Reasons for Cloud Computingguest51aa87
 
Light edge cloud computing
Light edge cloud computingLight edge cloud computing
Light edge cloud computingScott Riedel
 
LightEdge Solutions 2010 Vision
LightEdge Solutions 2010 VisionLightEdge Solutions 2010 Vision
LightEdge Solutions 2010 VisionKevin Schneider
 
LightEdge Cloud Computing
LightEdge Cloud ComputingLightEdge Cloud Computing
LightEdge Cloud ComputingScott Riedel
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing NowHudson IT
 
SpeedyCloud-Cloud Server, Infrastructure, Deployment, China.
SpeedyCloud-Cloud Server, Infrastructure, Deployment, China.SpeedyCloud-Cloud Server, Infrastructure, Deployment, China.
SpeedyCloud-Cloud Server, Infrastructure, Deployment, China.Zaighum Malik 赞谋
 
Innovating to Create a Brighter Future for AI, HPC, and Big Data
Innovating to Create a Brighter Future for AI, HPC, and Big DataInnovating to Create a Brighter Future for AI, HPC, and Big Data
Innovating to Create a Brighter Future for AI, HPC, and Big Datainside-BigData.com
 
Growing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringGrowing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringSaraPia5
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010chanwitcs
 
SpeedyCloud Technologies - Beijing, China
SpeedyCloud Technologies - Beijing, ChinaSpeedyCloud Technologies - Beijing, China
SpeedyCloud Technologies - Beijing, ChinaZaighum Malik 赞谋
 
Is10innovativetechnology8 120724150532-phpapp01
Is10innovativetechnology8 120724150532-phpapp01Is10innovativetechnology8 120724150532-phpapp01
Is10innovativetechnology8 120724150532-phpapp01Nuwan Vithanage
 
Dell Technologies - Company and Portfolio Introduction in 20 Minutes
Dell Technologies - Company and Portfolio Introduction in 20 MinutesDell Technologies - Company and Portfolio Introduction in 20 Minutes
Dell Technologies - Company and Portfolio Introduction in 20 MinutesDell Technologies
 
Toshiba Cloud Storage Products 2014
Toshiba Cloud Storage Products 2014Toshiba Cloud Storage Products 2014
Toshiba Cloud Storage Products 2014Mustafa Kuğu
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Do more clouds = better scalability, availability, flexibility
Do more clouds = better scalability, availability, flexibility Do more clouds = better scalability, availability, flexibility
Do more clouds = better scalability, availability, flexibility NuoDB
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderErik Ginalick
 

Similar to Winnipeg Technology Innovation Day (20)

Hudson CIO Series - Cloud Computing
Hudson CIO Series - Cloud ComputingHudson CIO Series - Cloud Computing
Hudson CIO Series - Cloud Computing
 
Hudson CIO Series: 6 Reasons for Cloud Computing
Hudson CIO Series: 6 Reasons for Cloud ComputingHudson CIO Series: 6 Reasons for Cloud Computing
Hudson CIO Series: 6 Reasons for Cloud Computing
 
Light edge cloud computing
Light edge cloud computingLight edge cloud computing
Light edge cloud computing
 
LightEdge Solutions 2010 Vision
LightEdge Solutions 2010 VisionLightEdge Solutions 2010 Vision
LightEdge Solutions 2010 Vision
 
LightEdge Cloud Computing
LightEdge Cloud ComputingLightEdge Cloud Computing
LightEdge Cloud Computing
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now
 
SpeedyCloud-Cloud Server, Infrastructure, Deployment, China.
SpeedyCloud-Cloud Server, Infrastructure, Deployment, China.SpeedyCloud-Cloud Server, Infrastructure, Deployment, China.
SpeedyCloud-Cloud Server, Infrastructure, Deployment, China.
 
Innovating to Create a Brighter Future for AI, HPC, and Big Data
Innovating to Create a Brighter Future for AI, HPC, and Big DataInnovating to Create a Brighter Future for AI, HPC, and Big Data
Innovating to Create a Brighter Future for AI, HPC, and Big Data
 
Growing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringGrowing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP Engineering
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
 
SpeedyCloud Technologies - Beijing, China
SpeedyCloud Technologies - Beijing, ChinaSpeedyCloud Technologies - Beijing, China
SpeedyCloud Technologies - Beijing, China
 
Jobs in the Cloud
 Jobs in the Cloud Jobs in the Cloud
Jobs in the Cloud
 
Is10innovativetechnology8 120724150532-phpapp01
Is10innovativetechnology8 120724150532-phpapp01Is10innovativetechnology8 120724150532-phpapp01
Is10innovativetechnology8 120724150532-phpapp01
 
Cloud asia 2012
Cloud asia 2012Cloud asia 2012
Cloud asia 2012
 
Dell Technologies - Company and Portfolio Introduction in 20 Minutes
Dell Technologies - Company and Portfolio Introduction in 20 MinutesDell Technologies - Company and Portfolio Introduction in 20 Minutes
Dell Technologies - Company and Portfolio Introduction in 20 Minutes
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Toshiba Cloud Storage Products 2014
Toshiba Cloud Storage Products 2014Toshiba Cloud Storage Products 2014
Toshiba Cloud Storage Products 2014
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Do more clouds = better scalability, availability, flexibility
Do more clouds = better scalability, availability, flexibility Do more clouds = better scalability, availability, flexibility
Do more clouds = better scalability, availability, flexibility
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Winnipeg Technology Innovation Day

  • 1. WelcomeTo The CIO Breakfast! Please take some time to visitour vendor exhibits. Wireless access for this room: SSID: Guest Password: Acrodex1
  • 2. TSX: DPM Mark GelsominiCorporate Director IT
  • 3. Agenda Who is Dundee Precious Metals Inc.? Vision The Technology IT Transformation End Result
  • 4. Dundee Precious Metals Dundee Precious Metals (DPM:TSX) is a Canadian-based, international mining company engaged in the acquisition, exploration, development, mining and processing of precious metal properties. DPM’s business objectives are to identify, acquire, finance, develop and operate low-cost, long-life mining properties. With a dynamic global operation, DPM decided that a more strategic, centralized approach to IT was necessary to support the emerging business requirements.
  • 5. DPM Global IT Visionission Statement “To deliver reliable business-centricIT solutions, infrastructure and services through leadershipand partnershipwith DPM operations globally to maximizing efficiency, streamlining processes, while supporting corporate objectives.”
  • 6. The Technology High speed fiber optic data link coupled with a 50 – 110 Volt (touchable) low power consumption power line bring high speed data line to any point where some form of communication device has to be placed. Wi-Fi based communication Wi-Fi clients, Wi-Fi based Push To Talk system Wired clients (Controllers, Cameras, FANs) RFID/Wi-Fi based location tracking
  • 7. Design Boxes are connected with fiber optic cables and can be separated up to 10Km Wired clients are connected to the boxes with up to 100m copper cable BOX is rated for IP67 (Industrial) All industrial connectors FOB is fully detachable Industrial Wi-Fi clients (Yellow)
  • 8. The technology Picture Standard IP Telephone In an IP67 Protected box With Visual Ringer Places Refuge Chambers Shafts Pumps Transformer Bays Ore-Passes
  • 9. Push to talk and Paging All Wi-Fi phones have Push To Talk capabilities Push to Talk application will have following features Unlimited numbers of channels Emergency button Listening to more than one channel (For Safety department) Channel filtering Paging is software which give the opportunity to send audio and text messages to group or all phones
  • 10. The Mine Access point Wi-Fi phone 10
  • 12. IT Transformation Strategic context What’s happening in DPM right now? What’s effecting the team right now? Scope What can the team influence? What can the team not influence? Central question What do we want to focus on and achieve As a team? Stakeholders/ Decision-making Who is accountable? Who is affected? How decisions get made? Major issues What are 2 or 3 key issues we need to address now to resolve the central question? Barriers to action What’s preventing the team from executing the central question? Success measures When you have achieved the central question how will you be able to measure it?
  • 13. Layers of Productivity 5. Make willing sacrifices for the good of the team 4. Identify your part of the interdependent outcome 3. Build greater-than-self outcomes which everyone can commit to 2. Create an open environment to share divergent views Proactively contribute to an environment of trust
  • 14. Which path to take?
  • 15. Achievements and Awards May 2010 Microsoft Momentum Magazine Cover Story “Gold Standard” Awarded “Most Innovative Company 2010”from Cisco Europe Finalist “Most Innovative Business Impacting Network of the Year” First mining company to deploy non-proprietary communicationtechnologies in the mines Created three way integrationwith Cisco VoIP, Tandberg and OCS
  • 17. Welcome! Please take some time to visitour vendor exhibits. Wireless access for this room: SSID: Guest Password: Acrodex1
  • 18. Thursday, September 29, 2011 Morning Afternoon 8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits 9:00 – 9:10 Acrodex Welcome Address 9:10 – 9:50 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure 9:50 – 10:30 Desktop Virtualization – Case Study 10:30 – 10:40 Morning Break 10:40 – 11:20 Cloud Infrastructure Suite – VMWare Information Session 11:20 – 12:00 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session 12:00 – 12:45 Lunch & Vendor Exhibits 12:45 – 1:30 Software Asset Management 1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices 2:15 – 2:30 Afternoon Break 2:30 – 3:10 Mobility Management – LANDesk Information Session 3:10 – 3:50 Blackberry In The Enterprise – RIM Information Session 3:50 – 4:00 Reflections and Closing Remarks 4:00 – 6:00 Cocktail Reception
  • 19. Welcoming Address Josh Payne Senior Sales Lead Manitoba
  • 20. We invite you to tweet using: #TechDays Follow us too! @Acrodex
  • 23. Getting Your Organization Cloud Ready:Fully Virtualizing Your Infrastructure
  • 25. Cloud Deployment Models Cloud Computing is a way of doing computing Cloud ServiceProviders Bridging Enterprises Hybrid Cloud Composition of 2 or more interoperable clouds, enabling data and application portability Public Cloud Accessible over the Internet for general consumption Private Cloud Operated solely for an organization, typically within the firewall
  • 26.
  • 27. The Journey To The Cloud Public Cloud Experimentation Public Cloud Adoption and Commitment
  • 29.
  • 30. Desirable Characteristics Secure Performant Scalable Agile Elastic Reliable Device & Location Independent Manageable Does not increase costs
  • 32. Dave Hunter Associate Director of IT Sercives
  • 33. VMWare Virtualization at Red Deer College
  • 34. Red Deer College Background 7500 students 700 Faculty and Staff Centrally located Strong Community Presence Many Business Partners –BCTL Donald School of Business
  • 35.
  • 37. 2% Linux1800 desktops – replace one third each year HDS AMS 1000 SAN Storage – 35 TB Cisco Switches end to end -10 GB backbone
  • 38.
  • 39. This year we moved to HP Blade Servers
  • 41.
  • 42.
  • 43.
  • 44. An extension of what we were already doing
  • 45. PCoIP
  • 46.
  • 47. No extra OS to manageVMWare ESXi 4.1 VMWare View 4.6 During readiness for Pilot we switched from XP to Windows 7 64 bit – less overhead Rolled out 100 pilot desktops
  • 48.
  • 50.
  • 51.
  • 53.
  • 55. Windows XP  Windows 7
  • 56.
  • 57. Morning Break #TechDays Morning Afternoon 8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits 9:00 – 9:10 Acrodex Welcome Address 9:10 – 9:50 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure 9:50 – 10:30 Desktop Virtualization – Case Study 10:30 – 10:40 Morning Break 10:40 – 11:20 Cloud Infrastructure Suite – VMWare Information Session 11:20 – 12:00 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session 12:00 – 12:45 Lunch & Vendor Exhibits 12:45 – 1:30 Software Asset Management 1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices 2:15 – 2:30 Afternoon Break 2:30 – 3:10 Mobility Management – LANDesk Information Session 3:10 – 3:50 Blackberry In The Enterprise – RIM Information Session 3:50 – 4:00 Reflections and Closing Remarks 4:00 – 6:00 Cocktail Reception
  • 58. Rob Wiens Corporate Account Executive, VMware
  • 59. Cloud Infrastructure SuiteVMware Information Session
  • 60.
  • 61. Creating & spanning both internal and external resource poolsPublic Cloud Services Existing Datacenters
  • 62.
  • 66. SQL
  • 67.
  • 68. The IT Transformation Journey IT Production Business Production IT as a Service Virtualization Becomes the Norm ~50% vSphere 4 generation 2011 2010 VI 3 generation 2009 40% 30%
  • 69. The IT Transformation Journey IT Production Business Production IT as a Service Virtualization Becomes the Norm Cloud Infrastructure Suite vSphere 5 generation Amplify ~50% Accelerate
  • 70. vSphere 5: Accelerating the Path to 100% Virtualization 4x VMwarevSphere 5 VMware vSphere4 VMware Inf. 3 ESX 2 ESX 1 8 4 32 2 1 CPU (VCPUs) 256 64 1,000 3.6 2 Memory (GB per VM) 30 9 >36 .9 <.5 Network (Gb/s) 300,000 100,000 1,000,000 7,000 <5,000 IOPS
  • 71. The First Comprehensive Cloud Infrastructure Suite Cloud Infrastructure Suite Policy, Reporting, Self-Service vCloud Director Virtualized Security &Edge Functions vShield Security Monitoring & Management vCenter Operations vSphere 5 Business Continuity vCenter SRM High Performance Resource Control, Pooling & Scheduling
  • 72.
  • 73.
  • 74. Enable secure, self-service to pre-defined IT services, with pay-for-useVirtual Datacenters Catalogs Virtual Datacenters Catalogs Users & Policies Users & Policies Compute Storage Network
  • 75.
  • 79. Efficient Protection Against Network Intrusions, and Viruses
  • 82. High Availability and Disaster Recovery
  • 83.
  • 84.
  • 87.
  • 88.
  • 89.
  • 90. Dynamic load balancing of resources to meet SLAs Availability = 99.% DR RTO = none Back up = none Storage capacity = 10 TB Performance = low I/O Security = low Availability = 99.9% DR RTO = 3 hour Back up = weekly Storage capacity = 10 TB Performance = Med I/O Security = Mid Availability = 99.99% DR RTO = 1 hour Back up = daily Storage capacity = 10 TB Performance = High I/O Security = High Gold Bronze Cloud Infrastructure(vSphere, vCenter, vShield, vCloud Director)
  • 91.
  • 92. Dynamic Load Balancing of Resources to meet SLAs
  • 93. Elegantly recover from FailureAvailability = 99.% DR RTO = none Back up = none Storage capacity = 10 TB Performance = low I/O Security = low Availability = 99.9% DR RTO = 3 hour Back up = weekly Storage capacity = 10 TB Performance = Med I/O Security = Mid Availability = 99.99% DR RTO = 1 hour Back up = daily Storage capacity = 10 TB Performance = High I/O Security = High Gold Bronze Silver Cloud Infrastructure(vSphere, vCenter, vShield, vCloud Director)
  • 94.
  • 98. Efficient Protection Against Network Intrusions, and Viruses
  • 101. High Availability and Disaster Recovery
  • 102. Broad Industry Support vSphere 5.0 – New HA SRM 5.0 – Replication, Failback vSphere Storage Appliance 1.0 – HA and vMotion for all customers Heartbeat 6.4 vCloud Connector vSphere5.0 – Web Client, Server Appliance on Linux, iPad Client for vSphere vSphere 5.0 - Network and Storage IO Control vShield App 5.0 Cloud Director 1.5 – Linked Clones vSphere5.0
  • 104. Keith Aasen Consulting System Engineer, Vertualization
  • 105. Beyond Storage Efficiency and Automated Data protection in Virtual Environments
  • 106. NetApp Confidential - Internal Use Only Unified Storage
  • 107. Unified Data Access NAS SAN Object CIFS NFS FCP FCoE HTTP REST iSCSI FAS6200 Series FAS3200 Series FAS2000 Series
  • 108. Common Storage Portfolios Symmetrix VMAX Clariion VNX Symmetrix VMAXe Clariion VNXe Clariion Isilon EVA LeftHand 3Par Ibrix StorageWorks EqualLogic Compellent EMC Clariion PowerVault Single Protocol Hardware equates to functionality Disjointed architectures & integration Operational variances NetApp Confidential - Internal Use Only
  • 109.
  • 110. ONE set of data services
  • 112. ONE set of processesFAS2000 Series
  • 113.
  • 116. Unified Data Services SnapMirror Deduplication Dedup Instant Backup File Server Consolidation Smart Clones D2D Backup IP-based SAN Storage Isolation SnapVault iSCSI CIFS Snapshots MultiStore FlexClones IP-based Data Replication NFS Procotol WORM storage NFS SnapLock FAS6200 Series FAS3200 Series FAS2000 Series
  • 117. NetApp Confidential - Internal Use Only Efficiency
  • 118.
  • 121. Service automationSATA / Flash Cache RAID-DP® Thin provisioning $ Snapshot® Technology Deduplication Thin replication Virtual copies Compression TB
  • 122. Efficiency is Built In NetApp Confidential
  • 123. Efficiency is Built In NetApp Confidential
  • 124. Efficiency is Built In NetApp Confidential
  • 125. Virtual Environments NetApp Confidential Traditional Enterprise RAID Arrays
  • 126. Virtual Environments Duplicate Data Is Eliminated Traditional Enterprise RAID Arrays NetApp Confidential
  • 127. All Protocol & All Datasets NetApp Confidential FCP Storage iSCSI Storage CIFS Storage All Protocols, All Datasets NFS Storage Enterprise Data Mid-tier Data
  • 128. Industry Averages NetApp Confidential
  • 129. 81 NetApp Confidential Virtual Storage Tiering
  • 130. Data Placement Challenge Primary Storage Pool: All data – hot and cold Objective: Intelligently place “hot” data on the highest performing media “Hot” Data 10-20% Data should be fast when hot, and low cost when it’s cold
  • 131.
  • 132. Use high cost media (Flash) efficiently
  • 133.
  • 134.
  • 136. Simple to install and requires no administrationData-driven • Real-time • Self-managing Virtual Storage Tier Physical Storage
  • 137.
  • 141. Promote hot data on-demand01010 10110 01011 Virtual Storage Tier Performance PhysicalTier 01010 10110 01011 01010 10110 01011 01010 10110 01011 01010 10110 01011 Capacity 01010 10110 01011 Virtualize
  • 142. 1 3 2 1 4 6 5 7 8 ESX Cluster VM VM VM VM VM VM VM VM NetApp FAS Array VST - FlashCache VM Dedupe Disk Storage VM VST in a Virtual Environment
  • 143. EMC Complexity NetApp Confidential
  • 144. NetApp Simplicity NetApp Confidential
  • 145. NetApp Confidential - Internal Use Only “True” Storage Virtualization
  • 146.
  • 147.
  • 148. Separates broadcast domainsMultiStore® Customer B Customer C Virtual Storage Controller Virtual Storage Controller NetApp provides the industry’s only complete tool set for providing path isolation from the disk through the network. This level of security is mandatory for multi-tenant environments.
  • 149.
  • 150. vFiler storage service profiles unbind data from hardware
  • 152. Centralized cluster managementvFiler vFiler vFiler vFiler vFiler vFiler vFiler vFiler vFiler vFiler vFiler Data Ontap NetApp Confidential - Internal Use Only
  • 153.
  • 155. Abstracted access via vFilers (virtual arrays)
  • 156. Centralized cluster managementvFiler vFiler vFiler Data Ontap 8.1 C-Mode
  • 157.
  • 158. Upgrade, replace, rebalance, expand, all without disrupting workloads
  • 160. Scale up, scale out, scale down
  • 161.
  • 162.
  • 163. Highest performance and data protection
  • 164. Industry leading efficiency (87.5% default utilization)
  • 165. Solution design simplicity & standardization
  • 167.
  • 168.
  • 169.
  • 170. Introduce NetApp Arrays NetApp Multi-Purpose Integrated Data Protection Archive Dedupe Replication Tape Backup on production Array Eliminates backup array Instant backups & restores Backups automatically transferred offsite DR with backup points stored on a single array Production Offsite Backup & DR Backup Long-Term Archive Compressed Day to Day workloads + Dedupe 1st Point of Recovery Dedupe DR + Offsite Backups
  • 171. Introduce NetApp Arrays NetApp Multi-Purpose Integrated Data Protection Production Backup on production Array Eliminates backup array Instant backups & restores Backups automatically transferred offsite Long-term archive or DR Array Dedupe Replication Production Archive Dedupe DR+ Backups Long-Term Archive Day to Day workloads + Dedupe 1st Point of Recovery
  • 172. Lunch Break #TechDays Morning Afternoon 8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits 9:00 – 9:10 Acrodex Welcome Address 9:10 – 9:50 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure 9:50 – 10:30 Desktop Virtualization – Case Study 10:30 – 10:40 Morning Break 10:40 – 11:20 Cloud Infrastructure Suite – VMWare Information Session 11:20 – 12:00 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session 12:00 – 12:45 Lunch & Vendor Exhibits 12:45 – 1:30 Software Asset Management 1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices 2:15 – 2:30 Afternoon Break 2:30 – 3:10 Mobility Management – LANDesk Information Session 3:10 – 3:50 Blackberry In The Enterprise – RIM Information Session 3:50 – 4:00 Reflections and Closing Remarks 4:00 – 6:00 Cocktail Reception
  • 173. Beyond Storage Efficiency and Automated Data protection in Virtual Environments
  • 174. A Little About Me My experience lies in the licensing of software, whether in licensing agreements, basic office applications, servers, desktops, ERP or virtual licensing. I started my technology career-path with KEPCO in San Antonio, Texas as an educational materials sales representative. My career continued for Soft Options in Calgary where I learned about large software licensing contracts by servicing clients like TCPL, Chevron, and Amoco (BP). I finished my time in Calgary working for WellPoint Systems which was an ISV for the oil and gas Sector. For the last 4.5 years I have been with Acrodex as a software solutions specialist, sales manager and now territory manager building a team of like minded individuals in our prairie offices both in Regina and Winnipeg. MCP, CSP, VSP – 14 years experience in software licensing
  • 175. CHALLENGES. today more than ever businesses are faced with tight economic circumstances, challenged more than ever to do more with less… technology has never been more important to business strategy and survival.
  • 176. But Which Technology And How Do I Manage IT?
  • 177. Point Of Reference To The Problem Urban sprawl, also known as suburban sprawl, is a multifaceted concept, which includes the spreading outwards of a city and its suburbs to its outskirts to low-density and auto-dependent development on rural land, high segregation of uses (e.g. stores and residential), and various design features that encourage car dependency.[1] In the last 15 years, As high speed connectivity increases + device technology advances to do more in smaller devices = Infrastructure sprawl.
  • 178.
  • 179. EA
  • 181. ELP
  • 183. EAP
  • 184. ECI
  • 187.
  • 189. Per Processor (physical or Virtual)
  • 191. OSE – Operating System Environment
  • 192. CAL – Client Access License
  • 193. Device CAL vs. User CAL
  • 198. OSE – operating system environment
  • 199. VDI – virtual desktop infrastructure
  • 202.
  • 203. SA
  • 204.
  • 205. Saves money in volume discounts
  • 206.
  • 208. Server Counts Use To Be Simple
  • 209. User Devices Use To Be Simple
  • 210. Why would I count my company phones ?
  • 212. Tablets Are New – Don’t They Arrive Licensed ? Motorola Xoom Apple Ipad 2 Asus Eee Pad HP Slate LG G-Slate ViewSonicViewpad Samsung Galaxy Tab RIM BB Playbook
  • 213. Tools To Help You Manage Assets Landesk Asset Lifecycle Manager Microsoft - System Center Configuration Manager (Asset Intelligence) CA – IT Asset Manager IBM - Tivoli
  • 214.
  • 215. I want a solution that meets my needs today and automatically gets better over time.
  • 216. I need a productivity solution that I can rely on.
  • 217. I need technology that was built with security in mind.
  • 218. My employees need to collaborate seamlessly across organizational, geographical and linguistic barriers.
  • 219. I want my employees to move faster without being slowed down by inflexible technology.
  • 220. My employees need to use a wide range of mobile phones and tablets including Android, Blackberry, iPhone and Windows Mobile.
  • 221. My employees need to do more from mobile devices than just send emails.
  • 222. I want a simple licensing model that is cost-effective and predictable.
  • 223.
  • 224. SAM Assessment Framework Overview Planning Define the what , where, when, who & how of the engagement Data Gathering Collect all relevant data to address the 10 key competencies and conduct customer interviews Data Analysis Reconcile and validate collected data and document results Presentation Preset SAM Assessment results to the customer
  • 225. SAM Assessment Engagement SAM Optimization Model – Maturity levels BASIC STANDARDIZED RATIONALIZED DYNAMIC Project Manager assigned but SAM roles & responsibilities not defined Direct SAM responsibility is identified throughout organization SAM responsibilities defined in job descriptions across organization Each functional group actively manages SAM No SAM development or communication plan SAM plan is defined and approved SAM Improvement is demonstrated SAM goals part of executive scorecard; reviewed regularly No centralized inventory or < 68% assets in central inventory > 68% - 95% of assets in inventory > 95% - 98% of assets in Inventory > 99% of assets in inventory Dynamic discovery tools provide near real-time deployment details Manual inventory; no discovery tools Inventory sources reconciled annually Inventory sources reconciled quarterly Procurement manages contracts; not accessed by IT managers Complete entitlement records exist across organization Entitlement records reconciled with vendor records SAM entitlement system interfaces with vendor entitlement to track usage System reconciliations and ITAM report available on demand IT operations managed on ad-hoc basis Annual sign-off on SAM reports Quarterly sign-off on SAM reports SAM not considered part of M&A risk plan and company integration All business units follow the same strategy, process & technology for SAM Operations manages separate asset inventories Operations manages associated asset inventory Assets purchased on a per project basis; without a review of current availability Software purchases based on deployment/entitlement reconciliation All purchases are made using a pre-defined asset catalog; based on metered usage Software purchases use approved vendors Assets deployed by end-users in distributed locations; no centralized IT Software deployment reports are accessible to stakeholders Software is dynamically available to users on demand Only approved software is deployed Centrally controlled inventory of harvested licenses is maintained & available for reuse. Deployment & license records are updated Unused software is harvested (where the license allows) and tracked within a centrally controlled inventory Automated process w/ centralized control & tracking of all installed software, harvest options, internal reassignment and disposal Software is retired with hardware and is not harvested or reassigned
  • 226.
  • 233. Security Policies and configurations
  • 235.
  • 238. Control over IT infrastructure
  • 243.
  • 247. Key Metrics and Reports
  • 248.
  • 249. OjasviBansal Unified Communications Solution Specialist Mark Gelsomini Corporate Director Information Technologies
  • 250.
  • 257.
  • 258.
  • 259. What Is Unified Communications?
  • 260. Unified Communications – The Myths It’s Just Skype. It’s Voicemail in Your Email. It’s Big, Complex, and Expensive. It’s Definitely Not for Small Businesses Like Mine. It’s Just a Fancy Word for Voice over IP. Whatever It Is, It’s More Than I Need. It’s Patching Things Together That Don’t Work Together.
  • 261. What Is Unified Communications? “Unified Communications solutions bring together voice, messaging, video, and desktop applications to enable companies to quickly adapt to market changes, increase productivity, improve competitive advantage and deliver a rich-media experience across any workspace.” 131
  • 262. Components of Unified Communications Communications: Voice, data, and video Messaging: Voice, email, video, and IM Conferencing: Online, audio, and video Application integration: Microsoft Office and CRM Presence: IP phone, desktop clients, and call connectors Common user experience: Desktop, phone, and mobility
  • 263. Using Unified Communications, You Can… Connect Everyone Serve Customers Better Collaborate Connect Be More Productive Secure My Business Work from Anywhere
  • 264. Total Economic Impact (Example) Forrester Study Shows >500% ROI in Three Years The study shows the following benefits for a 4,000 employee organization over a three-year period: Source: Forrester, 2007
  • 265. TSX: DPM Underground Communications Mark GelsominiCorporate Director IT
  • 266. Agenda Who is Dundee Precious Metals Inc.? Technology Network Topology Wi-Fi Coverage Software- Push to Talk, Paging Aeroscout Project
  • 267. Dundee Precious Metals Dundee Precious Metals (DPM:TSX) is a Canadian-based, international mining company engaged in the acquisition, exploration, development, mining and processing of precious metal properties. DPM’s business objectives are to identify, acquire, finance, develop and operate low-cost, long-life mining properties. With a dynamic global operation, DPM decided that a more strategic, centralized approach to IT was necessary to support the emerging business requirements.
  • 268. “Taking the Lid Off” OLD WAY NEW WAY Paper reporting at end of shift Supervisor interaction 1-2 /shift Limited knowledge of shift delays Slow response time to process interruptions Reactive Maintenance Small picture view Poor coordination Poor use of resources Lost time locating equipment/materials etc. from shift to shift Real time display of information Supervisor dispatched to critical shift problems Delays identified in real time Problems identified immediately Real time equipment health monitoring See activities in whole mine in real time Coordination through CCR with big picture Resources utilized to optimize shift results Real time equipment and materials tracking 138
  • 269. DPM Global IT Visionission Statement “To deliver reliable business-centricIT solutions, infrastructure and services through leadershipand partnershipwith DPM operations globally to maximizing efficiency, streamlining processes, while supporting corporate objectives.”
  • 270. The Technology High speed fiber optic data link coupled with a 50 – 110 Volt (touchable) low power consumption power line bring high speed data line to any point where some form of communication device has to be placed. Wi-Fi based communication Wi-Fi clients, Wi-Fi based Push To Talk system Wired clients (Controllers, Cameras, FANs) RFID/Wi-Fi based location tracking
  • 272. Design Boxes are connected with fiber optic cables and can be separated up to 10Km Wired clients are connected to the boxes with up to 100m copper cable BOX is rated for IP67 (Industrial) All industrial connectors FOB is fully detachable Industrial Wi-Fi clients (Yellow)
  • 273. The technology Picture Standard IP Telephone In an IP67 Protected box With Visual Ringer Places Refuge Chambers Shafts Pumps Transformer Bays Ore-Passes
  • 277. Push to talk and Paging All Wi-Fi phones have Push To Talk capabilities Push to Talk application will have following features Unlimited numbers of channels Emergency button Listening to more than one channel (For Safety department) Channel filtering Paging is software which give the opportunity to send audio and text messages to group or all phones
  • 278. Communications- Wireless ethernet Access point Wi-Fi phone 148
  • 279. Push to talk and Paging
  • 280. Aeroscout Location Tracking Wi-Fi/RFID based Tags will be installed in lamps Tags will be installed in all vehicles Entry/Exit events Business events Vehicle location Where we have people working Location history Location reports Safety
  • 281. How Does it Work? 1) Active RFID tags and/or standard wireless devices send a tiny wireless signal at a regular interval 2) Signal is received by the Wi-Fi wireless network (or location receivers), and is sent to an Engine 3) The Engine uses multiple algorithms to determine location, and sends asset data (location, status, etc.) to enterprise software 4) Enterprise software uses location and status data to display maps, enable searches, create alerts, manage assets, etc. 151
  • 283. Challenges Improve local and global communications Simplicity in use Significant communication limitation between groups Improve health and safety Production improvement Equipment tracking capability
  • 284. Solutions Allows quick identification of problem and locations for rapid response to mine emergencies Enhanced communication between surface and underground operations thus improving equipment and manpower utilization/allocation/reassignment and maintenance Use of small portable Wi-Fi phone units provides ease of use for timely response to production and safety needs Underground and surface tracking of equipment A single number follows the person anywhere in the world Integrated voice mail and email Global help desk
  • 285. Benefits Minimizes expensive cell phone traffic All users will be able to communicate seamlessly anywhere in the world (one product does it all) Rapid response to changing underground situations to maximize material movement Decreases equipment downtime through better information on location and repairs required
  • 286. Achievements and Awards May 2010 Microsoft Momentum Magazine Cover Story “Gold Standard” Awarded “Most Innovative Company 2010”from Cisco Europe Finalist “Most Innovative Business Impacting Network of the Year” First mining company to deploy non-proprietary communicationtechnologies in the mines Created three way integrationwith Cisco VoIP, Tandberg and OCS
  • 287. Afternoon Break #TechDays Morning Afternoon 8:30 – 9:00 Registration – Morning Refreshments & Vendor Exhibits 9:00 – 9:10 Acrodex Welcome Address 9:10 – 9:50 Getting Your Organization Cloud-Ready: Fully Virtualizing Your Infrastructure 9:50 – 10:30 Desktop Virtualization – Case Study 10:30 – 10:40 Morning Break 10:40 – 11:20 Cloud Infrastructure Suite – VMWare Information Session 11:20 – 12:00 Beyond Storage Efficiency and Automated Data Protection in Virtual Environments – NetApp Information Session 12:00 – 12:45 Lunch & Vendor Exhibits 12:45 – 1:30 Software Asset Management 1:30 – 2:15 Collaborate, Communicate – Integrating a UC Platform and Mobile Devices 2:15 – 2:30 Afternoon Break 2:30 – 3:10 Mobility Management – LANDesk Information Session 3:10 – 3:50 Blackberry In The Enterprise – RIM Information Session 3:50 – 4:00 Reflections and Closing Remarks 4:00 – 6:00 Cocktail Reception
  • 288. Mobility Management – LANDesk Information Session
  • 289. Don Moss Channel Systems Engineer
  • 290. LANDesk Software The Leader in Helping Simplify & Control IT Complexity LANDesk named a “Leader” in the 2010 Gartner Magic Quadrant for systems lifecycle management One of only two vendors on the three Magic Quadrants for management, endpoint security, and service desk (Gartner 2010) 698% return on investment within 3 years; payback in 5 months (IDC 2011) LANDesk saves over $32,022 per 100 users, per year (IDC 2010) Partners Apple, Credant, Cognizant, IBM, Intel, Kaspersky, Lenovo, Microsoft, Wipro 400+ certified VARs/system integrators worldwide
  • 291. The LANDesk “complete” Solution Gartner Magic Quadrant PC Configuration Life Cycle Management Tools Jan 2011 “LANDesk has one of the most complete products in terms of overall functionality, and the code base is solid and stable. LANDesk benefited this year from an increased weight on managing non-Windows clients… LANDesk has a strong OEM partnerCDWp with VMware for its Thinapp product. LANDesk has tight integration with a fairly large number of customers using the application virtualization offering”
  • 294. Delivering Value Their Challenges?
  • 295. >LANDesk Management and Security Suite Systems Lifecycle Management Power & Infrastructure Management Endpoint Security & Compliance Management AutomationPlatform Asset Lifecycle Management Virtualization Management IT Service Management
  • 296. What is mobility? What’s driving the need to manage mobility? What are the three keys to managing the mobile enterprise How can I see mobile devices on my networkand who they belong to? How can I manage and secure the corporate data on these my user’s devices? What is LANDesk’s approach to mobility? How do we get started? 166 Agenda >We’ll Answer 7 Questions:
  • 297.
  • 298. By 2015, there will be nearly one mobile device for every person alive. Projections indicate there will be over 7.1 billion mobile-connected devices—approximately equal to the world’s population in 2015 (7.2 billion). 1
  • 299. By 2013, more than a third of the world’s workforce will consist of mobile workers, potentially 1.2 billion people. 2
  • 301. In the fourth quarter of 2010, 100 million smartphone units shipped compared to 92 million PC units. For the first time, smartphones outshippedPCs. 3
  • 302.
  • 303. Tablets market share will rise from 6% to 23% by 2015…
  • 304. 2010 and beyond – Tablets and smartphones will be substitutes for PCs
  • 305. …desktop shares will drop from 32% in 2010 to 18% by 2015
  • 306. …in the future, Users will opt for one PC and a mix of tablets and smartphones
  • 307. New OS’s will offer a different experience driven by applications to provide functionsSource: Forrester Research, The Wall Street Journal-6/9/10
  • 308. Multiple Tipping Points IT Consumerization (App-driven, consumer-owned, co-mingled data) Digital Native Lifestyle (Always connected, social and multi-tasking) User Is The New Endpoint (Tech savvy, platform-transparent, user vs. device management)
  • 309. Separation of Work and Personal 5-7 Years Ago Business Personal Corp. Servers Personal Storage Personal Time Work Time Work Desktop Personal Computer Personal Calendar Work Calendar Work Contacts Work Cell Phone Personal Cell Phone Personal Contacts IT Involvement IT Dilemma
  • 310. Digital Lifestyle Today Business Personal Mobile Apps Personal Storage Corp. Servers Smart Phone Calendar Laptop Social Network Contacts Time Cloud Storage & Apps IT Involvement IT Dilemma
  • 311. Why Should You Care? “By 2013, those corporate IT departments that have not enabled a diverse population of devicesandend-user choicesthrough emphasis on manageability, policy enforcement and security evaluations will become hopelessly outmoded and struggle to function. This will cause chaos and substantially raise the total cost of ownership of the organization. ” http://www.thestreet.com/story/10970787/2/15-tech-trends-to-emerge-by-2014.html
  • 312. See and know what you have Set and enforce effective IT policy Manage and secure anywhere, anytime Managing the Mobile Enterprise >What Are The 3 Keys To Succeed?
  • 313. Know What You Have – Greater Visibility >How Can I See Mobile Devices? Discovery and Inventory 20+ years of experience Know what you have and what’s connecting to your network Discover any device accessing yourcorporate data Company owned vs. Employee owned devices
  • 314. Security Stats – Where and How Security breach information is taken from datalossdb.com – an online database of reported worldwide security breaches
  • 315.
  • 321.
  • 323.
  • 326.
  • 329.
  • 332.
  • 334.
  • 338.
  • 339. Early Adopter w/ Multiple Devices
  • 340. Want access to be more productive
  • 342.
  • 343.
  • 345. Single “pane of glass” management help you consolidate technology
  • 348. 5 Powers – Protection, Patch, Policy, Proof and Process
  • 349.
  • 350.
  • 351. Agentless discovery and management for employee-owned devices
  • 352. Single Agent-based management to greater management and security features
  • 353.
  • 354. Discovery…How it works… Mike.temple@landesk.com landesk mtemple **************** My LANDesk e-mail Mobile devices appear in the console New device configures ActiveSync client Blackberry provisioned with BES Discovery runs…
  • 355. Where do we go from here?
  • 356. Single Agent – Managed Mobility Agent-based & Management Layer >Next Gen >OEM >Apple MDM SDK >Leverage management standards as they develop
  • 358.
  • 359.
  • 360. BlackBerry and Our Position in the Enterprise Market
  • 361.
  • 362. Smartphones are walking in the door with employees of all levels, creating new expectations and user requests
  • 363. Consumer innovations in mobile and web have raised the bar for enterprise user experience
  • 364. Marketing wants a strong mobile consumer presence
  • 365. All of my company’s applications must go mobile, but the presentation is different than desktop
  • 366. Enterprise imperatives (manageability, scalability, security) cannot be sacrificed purely for individual user experience.RIM Confidential | 190
  • 367. BlackBerry Remains the Enterprise Leader Enterprise Market Share - Shipments Source: ABI Research, Enterprise Smartphones – August 2010 RIM Confidential | 191
  • 368.
  • 370. 600+ carriers and distribution partners
  • 372. 250,000+ active BlackBerry Enterprise Servers
  • 373. 150,000,000+ devices sold to date 13,200,000+ devices shipped in Q1 GY12 alone
  • 374. 67,000,000+ subscribers today16% Year Over Year growth for Q112 1IDC Worldwide Mobile Phones Quarterly Tracker - Final data - Q4 2010 RIM Confidential | 192
  • 375. Innovating and Supporting the Personal Liable Trend in Enterprise
  • 376. Key Enterprise Shift There is a key shift in how devices are being deployed within the enterprise from corporate-liable device distribution to a consumer liable device distribution model. An opportunity exists to address this shift IDC expects worldwide shipments of consumer liable devices to grow by 17.9%to reach 56.7 million units representing 56% of business smartphone shipments by 2013. IDC Worldwide CMD forecast 2009-2013 RIM Confidential | 194
  • 377. New BlackBerry Smartphone Lineup Curve 9350/9360 (Curve) Torch 9810 Torch 9850/9860 (All Touch Torch) Bold 9900/9930 (Bold Touch) 11 mm thick 480 X 360, 246 DPI 800MHz Processor and GPU 512MB RAM + 512MB storage 5.0 MP Camera / VGA video NFC & Accelerometer 11.5mm thick 3.69” 800X480, 253 DPI Touchscreen 4GB storage 10.5 mm thick 640X480, 287 DPI Touchscreen NFC 8GB storage 15mm thick 640X480, 253 DPI Touchscreen 8GB storage Common Specifications (not including Curve):
  • 378.
  • 380. Docs to Go Premium
  • 385. Blazing fast Web Browser
  • 389.
  • 390.
  • 391. Access to business applications, synchronizing email, calendar, contacts, tasks, memos and more
  • 393. Maximize employee productivity through enterprise connectivity with personal BlackBerry handheldsRIM Confidential | 198
  • 394.
  • 395. Secure company data on devices that are not owned by the organization
  • 396. Manage IT policies that define a line between work and personal data
  • 397. Stay connected to work and life with the convenience of a single deviceRequires handheld software version 6.0 and BlackBerry Enterprise Server (or Express) 5.0.3 RIM Confidential | 199
  • 398.
  • 399. User and Group Management
  • 401. Settings and Policy Definition
  • 403. Device InventoryRIM Confidential | 200 *Will be available through a future software release at the end of 2011
  • 404. Business and Personal Productivity Driven by BlackBerry Business Software
  • 405.
  • 407. Automatic network handoff between Wi-Fi and wireless networks
  • 408. Move calls manually between desk & smartphone, Wi-Fi & mobile networks
  • 410. Add participants to conference callsBlackBerry® Mobile Voice System will unify desk phone features with BlackBerry® smartphones. MVS Teaser: http://us.blackberry.com/apps-software/business/blackberry_mvs/ RIM Confidential | 202
  • 411.
  • 412. Improve returns of the overall Instant Messaging implementation
  • 413. In some cases, improve productivity for free (Turn on BlackBerry Messenger, OCS)Access Microsoft SharePoint, Office Communication, Lotus Collaboration and more on BlackBerry BlackBerry SharePoint Demo: http://ca.blackberry.com/business/software/Sharepoint_BB_WMV2.swf RIM Confidential | 203
  • 414.
  • 415.
  • 416.
  • 417. Our focus on addressing the needs of the consumer in organizationsAddressing a Broader Audience RIM Confidential | 204
  • 419. Thank you For more information please contact: Chad Moore Channel Account Manager chamoore@rim.com
  • 420. Closing Address Josh Payne Senior Sales Lead Manitoba
  • 422. Questions Josh Payne Josh.Payne@acrodex.com

Editor's Notes

  1. Cloud is an approach and an architecture to how we do computingThe Hybrid Cloud is a blend of using compatible public and private clouds
  2. VMware delivers the industry leading cloud infrastructure solution for building trusted private, public, and hybrid clouds. Leveraging the proven vSphere 5.0 virtualization platform, VMware creates intelligent cloud infrastructure with built-in automation and resource elasticity to free IT from manual processes and enable it to meet business requirements on-demand.
  3. Going forward there are 4 major opportunities for VMware to further simplify the datacenter. Simplification means both better economics and better agility:Continue to simplify the hw landscape by migrating special purpose hw into virtual appliances. These appliances are provided by partners. VMW provides the common management framework. This is the virtual infrastructure of the future. Hybrid cloud infrastructure – a lot of complex problems to be solved to make multiple datacenters appear like a single unified resource; seamless mobility of applications across clouds. Make vSphere a “safe haven” for all types of applicationsTransform management as you know it. Cloud management is about 1) minimizing manual management through policy driven automation everywhere and 2) refocus management away from trying to keep track of every connection and dependency to analyzing data and eliciting patterns.
  4. Going forward there are 4 major opportunities for VMware to further simplify the datacenter. Simplification means both better economics and better agility:Continue to simplify the hw landscape by migrating special purpose hw into virtual appliances. These appliances are provided by partners. VMW provides the common management framework. This is the virtual infrastructure of the future. Hybrid cloud infrastructure – a lot of complex problems to be solved to make multiple datacenters appear like a single unified resource; seamless mobility of applications across clouds. Make vSphere a “safe haven” for all types of applicationsTransform management as you know it. Cloud management is about 1) minimizing manual management through policy driven automation everywhere and 2) refocus management away from trying to keep track of every connection and dependency to analyzing data and eliciting patterns.
  5. Going forward there are 4 major opportunities for VMware to further simplify the datacenter. Simplification means both better economics and better agility:Continue to simplify the hw landscape by migrating special purpose hw into virtual appliances. These appliances are provided by partners. VMW provides the common management framework. This is the virtual infrastructure of the future. Hybrid cloud infrastructure – a lot of complex problems to be solved to make multiple datacenters appear like a single unified resource; seamless mobility of applications across clouds. Make vSphere a “safe haven” for all types of applicationsTransform management as you know it. Cloud management is about 1) minimizing manual management through policy driven automation everywhere and 2) refocus management away from trying to keep track of every connection and dependency to analyzing data and eliciting patterns.
  6. Going forward there are 4 major opportunities for VMware to further simplify the datacenter. Simplification means both better economics and better agility:Continue to simplify the hw landscape by migrating special purpose hw into virtual appliances. These appliances are provided by partners. VMW provides the common management framework. This is the virtual infrastructure of the future. Hybrid cloud infrastructure – a lot of complex problems to be solved to make multiple datacenters appear like a single unified resource; seamless mobility of applications across clouds. Make vSphere a “safe haven” for all types of applicationsTransform management as you know it. Cloud management is about 1) minimizing manual management through policy driven automation everywhere and 2) refocus management away from trying to keep track of every connection and dependency to analyzing data and eliciting patterns.
  7. Goal of Slide: To introduce the concept of aligning the placement of data on media that matches its business value. – “storage tiering”Key Points: The objective is to match the business value and access demand of the data to the performance and cost of the storage. This means that hot data, which normally represents about 10% to 20% of the total data in a data set, has to be identified and promoted onto the highest performing media. Two key issues. Timeliness - hot data has to be promoted when it is still hot – so real responsiveness in important. Granularity – if the data chunks promoted are too large they will include cold data with the hot data, a very inefficient use of expensive media. When the promotion of hot data is done dynamically, application performance will improve dramatically and the economics of storing cold, inactive data will improve significantly.
  8. Goal of Slide: Explain NetApp’s criteria for effective tiering. Look to establish separation from other tiering options. Key Points:Real-time: “Serve data when it’s hot” – This means that hot data should be identified instantly and migrated to performance media in a timely manner before its activity level drops off. Delayed migration can reduce the value of storage tiering if the data is no longer in demand by the time it reaches the performance tier.Efficient: Being efficient means that the hot data is not promoted along with cold data. VST avoids this problem with a level of fine granularity that accurately isolates the hot data. This ensures that the most expensive media – FLASH is being used in the most efficient manner.Simplicity: With simple installation, an architecture that works out-of-the-box and a free utility that enables predictive sizing for specific workloads, simplicity has been architected into the NetApp solution.
  9. Goal of Slide: Introducing the Virtual Storage TierKey Points: With VST, NetApp has introduced a better approach – Intelligent Caching. This technology is optimized for FLASH and is not simply an adaptation of older generation disk tiering solutions.The NetApp Virtual Storage Tier promotes hot data to performance storage without moving the data. The Virtual Storage Tier is not data migration, the hot block remains on hard disk media when a copy of the data block is made to the Virtual Storage Tier. This approach to data promotion means that operational disk I/O operations, required in other approaches to simply move data between tiers, is not needed. When the activity of the hot data on FLASH trends down and the data blocks become cold these inactive data blocks are simply overwritten with new hot data blocks. Again no data movement. This non-data migration approach is highly efficient, not only does it eliminate wasteful operational I/O but it enables the application of advanced efficiency features such as data de-duplication and thin provisioning. Granularity is key to ensuring accuracy of data placement. VST uses a 4K block size; this fine granularity prevented cold data from being promoted along with hot data. Contrast this to other approaches where data chunks in MBs or even GB are used. As noted in the earlier slide VST is simple to install and works out of the box with its default settings. Worth noting that the flexibility of VST enables you to create different classes of service by enabling or disabling the placement of data into the Virtual Storage Tier on a volume by volume bases.
  10. Goal of Slide: Introduce the NetApp Virtual Storage TierKey Points: NetApp believes in a fundamentally different approach to automated storage tiering.Our approach is to create a Virtual Storage Tier and this approach consists of three key elements:Whenever possible, we start with the lowest cost storage and this is typically SATA disk storage.We virtualize all of the data to ensure maximum efficiency – this means that VST supports, data de-duplication and thin provisioning and space efficient clones. It does this while delivering the lowest cost of ownership.Performance is scalable and timely. It is delivered on an on-demand basis and in real-time. Data is not moved between tiers – data migration. This reduces the operational IO (overhead) other approaches need to move data. Out-of –box functionality simplifies implementation - you simply install Flash Cache.The “set-and-forget” approach of VST eliminates the management complexity normally associated with tiering solutions.
  11. Before Urban sprawl people lived closer to where they worked. Therefore the infrastructure to support their needs could be centralized. As population density rose and the automobile became more prevelant people had the ability to move farther away from their place of work. The issue then became the building of roads, grocery stores, gas stations, and a connectivity to that newly formed community while still be connected to the downtown core.In the last 15 years we have seen Infrastructure sprawl. The onset of high speed connectivity and advanced device technology has created a world of consumers, consuming information from anywhere and anytime.The point of me speaking here today is to point out some of the growing complexity and issues with not having a system to license those device technologies.
  12. Professional Services – Staff augmentationTraining Services – Train the trainer approach
  13. Information technology has brought huge gains in organizational productivity but it has also brought an overload of information. For years most organizations have had two separate but parallel investments in terms of communications: one around a voice network (telephone - fax - voicemail), and another around a data network (data - internet - e-mail). New communication methods like mobile telephony and video conferencing were added. But they have remained separate silos and therefore increased the complexity once again. So we end up withMultiple communication modalities,Different interfaces and technologies, andLack of effective integration.Examples:Wouldn’t it be great to answer an e-mail with a call without looking up the phone number?Wouldn’t it be great to know that my business partner is not in the office before I call him on his land line so I don’t have to call again on his mobile phone?
  14. Professional Services – Staff augmentationTraining Services – Train the trainer approach
  15. You may ask: What exactly is Unified Communications? The answer is – it depends on who you are asking. While we can’t always define it, we know it when we see/use/experience it.We also know that myths prevail around what UC, including it not being something that works well or is beneficial to SMBs. For a better understanding of what UC is, let’s look at Acrodex’s and the industry adopted definitions to start.
  16. The Acrodex approved definition is above but you can find many definitions for UC in many place.Wikipedia says:“UC potentially includes the integration of fixed and mobile voice, e-mail, instant messaging, desktop and advanced business applications, Internet Protocol (IP)-PBX, voice over IP (VoIP), presence, voice-mail, fax, audiovideo and web conferencing, unified messaging, unified voicemail, and whiteboarding into a single environment offering the user a more complete but simpler and more effective experience.”You’ll see later that the promise of Acrodex’s UC practise matches up closely with this definition.
  17. UC can be comprised of many components (here is where we notice the similarity to the Wikipedia definition of UC), but again, it’s about “unifying” or “integrating” your existing communications systems, tools and devices with the productivity applications you use every day to deliver a broad set of communications to any device, anywhere. As a result, each user can have the same basic experience, regardless of whether they are in a fixed location or mobile.
  18. Other studies have categorized Business Challenges and the way business decision makers describe them as shown here Later, you’ll see how actual customers addressed them using unified communications. ConnectivityInternalOfficesExternally: customers remote access suppliers: B-2-BSecurityDataApplicationsAccessVirusesAccessibilityWork from anywhereCustomer ServicePersonalizedAccessibleOrganizedDevice-independentProductivityBetter use of employee timeTools make it easier to workTransparency between systems, processes, functions
  19. Talking Points• ROI. Based on the interviews with 15 existing Microsoft unified communications customers, Forrester constructed a TEI framework for a composite organization and the associated ROI analysis illustrating the financial impact areas. Internal and external collaboration is of highest importance.• With a dearth of candidates with sufficient skills in digital marketing, hiring qualified staff is difficult. The firm must make the most of its existing talent and maximize retention.• High-value workers are separated from each other geographically; 80% of them do not work at the headquarters office.• Client relationships are long-standing, thus offering impetus for deeper communications across firewalls. Nevertheless, most clients maintain relationships with several digital marketing agencies; new initiatives and even extensions of existing projects are frequently put up for competitive bid.• The organization is forward-thinking and readily adopts new technologies when the products can be demonstrated to provide business value.Although not quantified for this case study, Forrester recommends that prospective unified communications implementers examine potential benefits in these categories as well.Details on Reduced TCOSavings through reductions in the numbers of :• Fax machines• Desktop telephone sets• PBX equipment• Unified Messaging systems• Antivirus, Antispam solutions Compliance solution• Tape back-ups
  20. Here are a few key points about LANDesk and our ability to deliver value to our customers. Talk to some the key points on the slide – especially the ones about the Magic Quadrants and ROI
  21. Here are a few of the thousands of companies and organizations that trust LANDesk to help them manage and secure their IT environments. And we’d love to see your logo up here someday.Our customer cut across many different vertical markets including finance, healthcare, local and national governments, manufacturing and retail to name a few.
  22. So why do they choose us? They have many challenges facing them for maintaining the healthy state of their user’s endpoint devices. These customers chose LANDesk because of the value and return on investment we provide to their IT organizations.
  23. At LANDesk, we have a great heritage of providing great management, security and service desk solutions. And because mobility is really about management and security, we believe we have a great product and strategy for helping you with your mobile workforce with the convergence of management and security.At the center of this integrated suite of IT management solutions we’ve built it around higher efficiencies by using a Management Automation Platform that helps you define, design, implement and execute cross platform IT automation initiatives and tasks.
  24. In this presentation, we’re going to answer the following questions? What is mobility and what’s driving the need to manage mobility. The devices didn’t just show up in your environment all of a sudden, but they are showing up more and more and this is a good time to get your arms around the issues. And these new mobile devices are introducing new challenges as they grow and evolve plus how many different operating systems you now have to manage.What are the three keys to managing the mobile enterprise? Including a very important one of how do I discover and inventory these devices if the corporation doesn’t own them?We’ll also talk about the importance of securing the corporate data on these devices.Finally, we’ll give you an idea of how LANDesk approaches mobility and what are our strategies for mking you envoronment more mobile friendly.
  25. The key to understand about mobility is that it isn’t just about the devices. It is really the user that is mobile and the devices are just along for the ride. So you need to consider who this mobile user is and their needs. We think of all these different devices as just other endpoints that make the user productive. The devices are going to change. And it’s based on the user’s need to be mobile that you have things like dual network access, whether through a cell connection or jumping over to a Wi-Fi network so they can always be connected.But there is one other thing that this new paradigm of user productivity brings and that is a trend toward employee-owned devices vs. corporate-owned devices.
  26. Just a few quick notes about the mobility trend here. Before we get going here, it’s good to point out that whether a particular device is on it’s way up or down, these are all simply endpoints to manage and secure for LANDesk.First – note that Microsoft represents 84% of the PC Operating system, but how many different OS’s will mobility introduce – especially with what they are calling Post-PC devices like tablets. Second – Speaking of tablets and smartphones, they are surpassing PCs and that has a lot to do with two trends – 1) people have multiple devices – 2) and people have a mix of corporate-owned and employee-owned devices Third – tablets will rise significantly - Tablets are expected rise from 6% to 23% of computing devices.Tablet WW forecast**2010 = 17 million 2011 = 44.6 million 2012 = 70.8 millionFourth – desktops will drop, but that simply a strong indicator about the mobility of people. Notice that all the mobile devices are either increasing or staying fairly level with only slight declines because of cannibalization from competing mobile devices such as Tablets taking some market share away from notebooks and laptops.
  27. Initial Build: There are certain trends and tipping points that are creating change for IT.Next Build: (Digital Native Lifestyle) The first is that more and more people in the workforce are gravitating to a digital lifestyle – much like the digital natives (people who grew up not knowing anything but highly communicative technology) who are moving into the workforce. These people are always connected, digitally social and can multi-task without thinking about it. Next Build: (IT Consumerization) This lifestyle shift introduces introduces more IT Consumerization or some might say, “The IT-ization of Consumer electronics”, where there are more low cost applications running on consumer-owned devices, which co-mingle the data from both the user’s business and personal lives.Next Build: (User Is The New Endpoint) This IT Consumerization leads to the need of seeing the user as the endpoint and not necessarily the devices. The needs of these users will continue to change because they are more tech savvy and they will carry many different devices with various platforms, increasing the need to be able to see and manage the user’s environment.Next Build: This process tends to repeat itself – the more digital we become the more need for IT manage and secure the data on the users devices and the greater need to view the user, not the device, as the endpoint.
  28. Here are a few key points about LANDesk and our ability to deliver value to our customers. Talk to some the key points on the slide – especially the ones about the Magic Quadrants and ROI
  29. Here are a few key points about LANDesk and our ability to deliver value to our customers. Talk to some of the key points on the slide – especially the ones about the Magic Quadrants and ROI
  30. Note to Presenter: Read the red and it will read as a complete sentence which captures all of the key points of the quote.One of the keys to the statement is that there is a diverse population of devices and that’s where the complexity comes in. If you don’t get your arms around this issue in the next couple of years, your operating costs are going to go up and your services levels are going to suffer.
  31. A key to IT management is seeing and knowing what devices are in your environment. But you need to take this a step further by knowing what data is being accessed because you’re IT and you have to protect that data, ho matter where it is. With the current state of Mobility, you may not even know how many devices you have, where they are, or what they’re accessing. You need to set and enforce effective IT policies. You simply have to have some kind of policy around these mobile devices. What kind of features are allowed and what isn’t, like personal hotspots. You also have to have a policy in place to initially protect the data on that device and a process in place to handle lost devices.You have to be able to manage and secure that digital native and be able to do it anywhere and anytime because of how mobile they are.
  32. The first thing to do in order to see what is on your network is to discover and inventory what is on your network. Find our what devices are out there and all the information about those devices. Well LANDesk has been doing this for more than 20 years, so there is nothing new there. In fact, we us real-time discovery technology that allows us to discover a device and then use that device to discover other devices when they come on the network and begin to broadcast to other devices. In this case of mobile devices, we want to know more about what data they are accessing than the fact that they’re on our network. This move to understanding what data people are using is also compounded by trying to know what devices are corporate-owned devices and which ones are employee-owned.
  33. The next thing we talked about is setting effective IT policies, especially when it comes to security issues that pose additional risk to your business.As we go through some of the security data that is available, we don’t want you to think that this is a scare tactic, just important information to help you learn about the need for a stronger, more systematic approach to security. If we dive into some of the security data out there such as this information from datalossdb.com, you will find plenty of information about each breach or loss of data and where that breach came from, whether it be a lost or stolen device, a virus, or an accidental exposure of information on the web.Let’s take a look at where most of these security breaches are occurring. The darker the color, the more breaches have occurred. The obvious hot spots are the United States and the United Kingdom, followed closely by Canada. When you look closer, Japan and Australia in a slightly lighter orange stand out. And finally, the majority of other developed countries such as Western Europe and some of South America have also experienced security breaches. One note to remember is that these are all based off of individual reporting of security breaches and may not reflect the entire picture because some areas may not have as open of a society for reporting such issues.&gt;&gt;Next, let’s take a look at the Incidents by Vector. This indicates by what means is security breached. Notice that 62% of the time it is from outside sources with 32% coming from inside sources. That means that more than half of the threats are coming from people who are trying to break into your systems and exploiting your data. Of that 32% of inside security incidents, only 8% were malicious. That means that the other 24% were mostly caused by faulty processes or lack of awareness about security among employees. &gt;&gt;Another interesting point to look at in the overall security mix is how are people losing the data. Notice that the number one area is stolen laptops with 20% - this is truly a target, but as these devices get more information on them and are smaller, they also pose a threat to your data. Not only that, but we discussed previously that more people are carrying more devices. It’s hard enough to keep track of one device while you’re on the move, but now you talk about having three or more devices. Those devices are going to get lost. This really points out the need for data encryption and protection on these mobile devices.
  34. Who are the tough users to figure out? Every organization has them. These people move around a lot. They have to have the latest gadgets. They adopt technology early and then bring it into your environment. This mobile person has more than a handful of devices including a smart phones, a tablet, and a laptop. He doesn’t stop to ask if it’s okay for him to connect to the enterprise network. He’s interested in being productive. The worst ones will even modify their technology or find away around policies. So with a few taps on a screen he’s accessing his corporate email and pulling data from the network. Oh that guy! – You know him, don’t you? In fact, if you are in IT, you are probably this guy. He’s productive, but you’re the one dealing with all the possible data leaks.
  35. Don’t just think about smartphones and these new tablets as the only mobile devices. Remember, it is the user that is mobile and those laptops are going to be around, so you need a solution that will help you manage and secure them as well as all those new devices. When we take a look across the competitive landscape, we are one of the very few that can help you see, manage and secure all the devices a user uses. Take for instant Apple, we can manage and secure that Macbook Pro as well as the iPad and the iPhone. That means making sure that data is encrypted and we have those policies set up and enforced based on the location of the user. Some of the things that help include HIPS, Device blocking, shadow copying and patching. Failure to update can create huge vulnerabilities that can cost millions. We deliver patches that are both timely and thoroughly tested. Maximum automation allows solutions to be proactive, repeatable and auditable. So how do we do it? We can use appliance devices in different locations in your distributed network to access, manage and secure anywhere – through the cloud. We will also include more and more services in the cloud
  36. Overall, the solution allows Zero-Touch Provisioning for anyone who owns a ThinkSlate…meaning the IT Administrator sets policy for an Active Directory container, and whomever is in that container gets the policy on their mobile devices.  All of them.  Without the IT Admin having to touch the device. The slide builds.  First screenshot shows how every AD container in the tree has “default” policy, which is blank.  Meaning nothing will change if the user tries to configure their Thinkslate.  The second screenshot shows a series of device configurations (the highlighted one is a device config, showing which device config settings can be reached from here…but we configure Certificates, Device Settings, Security Settings, Password settings, WIFI access points, VPN settings…  The third screen shows a new Device Policy and all it’s associated device configurations. The fourth shows it being applied to the ThinkSlate Users container in Active Directory Finally, you can see the container and policies applied in the Groups field.
  37. Through all of our interactions with customers, and specifically CIOs, they have been coming to some conclusion around mobility in recent times. Some of them are…
  38. Based on market research, BlackBerry is still the leader in enterprise smartphone usage and is projected to maintain this lead into at least 2015. NOTE: For the purposes of this report and the forecasts, we define an enterprise user as en employed person who uses their smartphone for business only or for business/personal reasons. We note that whether enterprise liable, or personal liable, as long as the device is used for business purposes ABI Research considers both an enterprise smartphone.
  39. This slide could be used in situations where customers may question the general health or performance of RIM. This doesn’t necessarily address where we will be 5 years from now, however it does show that we are still generating revenue and have a lot of momentum behind us that will enable us to invest in innovation and foster already strong partnerships worldwide.
  40. It may be already understood by many enterprise customers that employee/individual liable smartphones in the enterprise is becoming a significant trend. This data however does represent expectations that this trend will continue the proliferation of employee owned smartphones in the enterprise to the extent that it will overcome corporate liable deployments in terms of volume. The key message here is ‘a strategy needs to be in place to support this trend in the enterprise, and the appropriate software and products need to be carefully chosen to not only support this trend, but also allow it to drive productivity where possible.’
  41. The introduction of an exciting new line of BlackBerry smartphones should drive currently individual BlackBerry users to re-purchase, and new smartphone users to acquire BlackBerry for the first time. Drivers for these purchases come from a blend of appealing new physical designs, cutting-edge hardware, improved software and choice of input technologies and style. The combination of these elements leads to a compelling user experience. For businesses and IT, the promotion of BlackBerry as a personal device of preference would allow such devices to connect to the BlackBerry infrastructure that the business has already invested in, in order to maintain the level of security that is expected on devices that would contain business information without hampering the user experience.
  42. BlackBerry OS 7 is a key piece to refreshed and enhanced BlackBerry lineup that we are now offering. New software + cutting edge hardware enables users to enjoy BlackBerry for the reasons they had chosen it for all along, as well as new experiences that meet the expectations of new mobile power users.
  43. The BlackBerry PlayBook tablet is a ground breaking development on the tablet front, offering unique capabilities compared to other tablets on the market today. Tablets in general taking mobile computing to a new level with the balance of performance, portability and usability. With BlackBerry, you continue to benefit from the continued focus on the business audience and the deep integration opportunities offered by the BlackBerry platform. (Future PlayBook products such as tablet OS 2.0 and BMF will be inserted when final messaging is available)1) Uncompromised Web BrowsingWith Adobe® Flash® Player woven right into the fabric ofthe design, the BlackBerry® PlayBook™ tablet offers thefull experience of over 1.6 million web sites usingAdobe Flash.2) BlackBerry® Bridge™Wirelessly connect to your BlackBerry® smartphone1through BlackBerry Bridge for secure access to youremail, calendar, and address book, task list &amp; BBM™.3) Ultra PortableWeighing only 14 ounces, the BlackBerry Playbook iscompact and easy to carry, yet still packed with power.4) True MultitaskingWith an Operating System that is designed to takeadvantage of its dual-core CPU, the BlackBerryPlayBook enables you to jump between apps easilywhile they continue to run in the background.5) HDMI OutputOutput in 1080p to a large screen with BlackBerryPlayBook tablet’s built-in micro-HDMI port; no need topurchase an adapter.6) NotificationsNotifications are designed to allow users to access the source of notification quickly and easily without being intrusive, even while running an app.7) Full Touch Front DisplayThe BlackBerry PlayBook tablet uses the entire front ofthe screen to provide an intuitive way of swiping appsinto focus and away.8) High Resolution Dual CamerasBoth front and rear facing HD cameras come with1080p recording capability.9) Wireless Software UpdatesGet a notification of new features or functionality foryour BlackBerry PlayBook tablet and update fromwherever you are.10) Free Premium Documents to Go SuiteThe BlackBerry PlayBook tablet ships with a built in,Premium version of Documents to Go® which meansthe ability to open, edit and create Microsoft® Officedocuments comes at no extra charge.
  44. With the new developments on the BlackBerry smartphone and tablet front, we continue to provide businesses with hardware solutions that will address the varying need of audiences through the business. With the enhancements of BlackBerry smartphones and tablets, individuals will also be choosing BlackBerry for their personal devices of choice. This brings back the discussion of employee liable and the need for businesses to support this increasing trend.BESx is the first step to providing employee liable BlackBerry users free access to corporate email, PIM and other applications.
  45. While providing personal BlackBerry smartphones access to corporate email and applications the challenge arises with keeping the data that resides on such smartphones secure and protected, and also not affecting the personal user experience or personal data on that smartphone.BlackBerry Balance technology allows users to use their BlackBerry smartphone in the way they intended to when they bought it, including access to business email and applications. It also allows IT to keep business and personal data separate, along with the ability to wipe only business data if necessary without impacting personal data on the device.
  46. We appreciate that some individuals will bring in their own non-BlackBerry smartphones and desire to connect them to business resources. Although providing device flexibility for these users is valuable to the organization, the challenge of securing and managing these devices still remains. Through the recent acquisition of Ubitexx, BlackBerry will be introducing a new component to it’s enterprise management platform by delivering mobile device management capabilities for non-BlackBerry devices. This will allow business to standardize on a single software platform for enterprise mobile device management while still support device flexibility for it’s users.
  47. With separate desk phone and mobile phone numbers, sometimes reaching a business contact isn’t always the easiest. Missed calls can lead to longer sales cycles and dissatisfied customers. By integrating desk phone numbers and other capabilities, users of BlackBerry MVS can distribute a single phone number to colleagues and customers, provide greater reachability and improved productivity. With the recent introduction of Wi-Fi calling in BlackBerry MVS, users can use Wi-Fi campus or hotspot networks to make and receive voice calls, while reducing the reliance and therefore cost associated with carrier networks. This also extends the voice coverage for customers in areas where carrier networks are not as strong or do not exist.
  48. With instant messaging capabilities on BlackBerry, you can improve the investment of the overall instant messaging service by allowing your mobile employees to access company employees and resources more frequently. By extending the same capabilities on the desktop, and mimicking desktop presence users will be able enjoy a familiar experience on their BlackBerry smartphone.Specifically, BlackBerry has just recently made available SharePoint for BlackBerry client software that will allow users to tap into the power and capabilities of their organizations current SharePoint implementation and access this content on the go.
  49. Our laser focus has allowed us to innovate with the customer in mind, contributing to our huge success in this market. Regardless of the noise in the market, BlackBerry has a very unique position and strength in enterprise. BlackBerry has invented from the ground up many of the smartphone elements that are relied upon today, i.e. security, push, manageability, integration capabilities. Our roots are in business mobility and hence have allowed us to remain the clear leader in development of solutions that provide significant benefits to customers.As the needs of end users in enterprise organizations are being heard more loudly than ever, this is a very important segment that we cannot ignore. While maintain our focus on delivering value to businesses, our innovation in the area of consumer capabilities will allow BlackBerry to provide the right balance between work and personal use on a single smartphone.