SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
How to Self-Provision over WLAN with
Intel® vPro™ Technology
June 2013
Omer Livne, Intel IT
2
Legal Notices
Copyright © 2013 Intel Corporation. All rights reserved.
This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
* Other names and brands may be claimed as the property of others.
Copyright © 2013 Intel Corporation. All rights reserved.
3
Introduction
Intel IT supports a worldwide computing
environment that includes more than
100,000 PCs across 63 countries. More
than 80 percent of the devices are
mobile PCs that connect wirelessly to
our network.
Managing and securing these
environments is a key IT priority.
Intel IT has deployed Intel® vPro™
technology across our enterprise in
order to help maintain, manage, and
protect these PCs.
80% MOBILE DEVICES
CONNECTED WIRELESSLY TO OUR NETWORK
Intel IT supports
>100,000 PCs
Copyright © 2013 Intel Corporation. All rights reserved.
4
Background
To activate the Intel® Active Management Technology (Intel® AMT) feature of Intel®
vPro™ Technology, we provision the PCs using Intel® Setup and Configuration
Software (Intel® SCS).
Provisioning is required to be able to take advantage of the capabilities within Intel
AMT. When employees are issued a new or replacement PC, the PC is provisioned
by technicians in our IT service centers.
Employees that participate
in our Bring Your Own
(BYO) PC program might
also bring in a PC that is
un-provisioned.
Typically provisioning is
handled automatically in
the course of installing
and configuring the OS
build.
On occasion, a PC may
need to have the
provisioning reinstalled
after delivery to the
employee.
Copyright © 2013 Intel Corporation. All rights reserved.
Self-Provisioning
Challenge
5
The Challenge
We needed an easy way for technicians to
provision Ultrabooks™ devices that do not
have wired Ethernet ports.
We wanted to create a simple and efficient
way for employees to be able to self-
provision their PCs, without having to take
the PC to an IT Service Center.
Intel IT created a tool that allows our
technicians and employees to self-provision
systems over the WLAN.
Employees can now use this tool to self-
provision their PC, regardless of whether it’s a
corporate-issued PC or a Bring-Your-Own PC.
6 Copyright © 2013 Intel Corporation. All rights reserved.
Why This Is Important
Once the user’s PC is provisioned, our IT Service
Center staff can help manage and troubleshoot
issues on the PC.
This allows them to provide the same level of
service regardless of whether it is a WLAN-only
corporate-owned device or an employee’s Bring-
Your-Own (BYO) PC.
As employees bring in more WLAN-only BYO
devices, such as Ultrabook™ devices and
Windows*-based tablets with Intel® Architecture,
we expect to see more employees utilizing this
tool and subsequently requiring less support
from our IT Service Center.
7 Copyright © 2013 Intel Corporation. All rights reserved.
Host-Based
Configuration
on Demand
8
How It Works
Host-Based Configuration on Demand
(HBCoD) is a tool that utilizes the host-based
configuration ability in Intel® Setup and
Configuration Software, which is provided by
the Intel® Active Management Technology
Configuration Utility (ACU).
The tool is available through our intranet
software library and is available to all
employees.
When run, the tool copies the necessary files to
the employee’s PC and executes a batch file
that performs several functions before running
ACUConfig.exe to provision the client.
9 Copyright © 2013 Intel Corporation. All rights reserved.
10
The Technical Details
HBCoD self-provisioning process consists of
four major steps:
1. HBCoD copies the necessary files to
the local hard drive into c:temp
2. HBCoD launches a batch file with the
necessary instructions
3. The batch file sets the value for
variables used in the commands
4. The commands use the variables to
perform two configurations of the
system with logging and error checking
Copyright © 2013 Intel Corporation. All rights reserved.
11
Step 1:
Copy the necessary file to the local hard drive
In our case, we have chosen to copy the necessary files to c:temp, but any
location will work. The files that need to be copied are:
• ACU.dll
• ACUConfig.exe
• ConfigureNowHBC.bat
• Initial HBC.xml
This can be done using a batch file called HBCoD.BAT, which is written as such:
: HBCOD stands for Host-Based Configuration on Demand
: This batch file copies the SCS configurator files to the local machine into the
: C:tempACU_Configurator folder
: And triggers configuration by running ConfigureNow.bat that contains the configuration
commands
@echo off
xcopy %~dp0.. "c:tempACU_Configurator" /e /i /h /d /y
c:
cd tempACU_Configurator
Start ConfigureNowHBC.bat
Copyright © 2013 Intel Corporation. All rights reserved.
12
Step 2:
Launch a batch file with the necessary instructions
The last line of the HBCoD.BAT file
Start ConfigureNowHBC.bat
executes another batch file named
ConfigureNowHBC.BAT.
This batch file is used to perform steps 3 and 4.
Copyright © 2013 Intel Corporation. All rights reserved.
13
Steps 3 and 4:
Set Variable values and execute commands with
logging and error checking
At a high-level, this batch file performs the following functions:
1. Checks for and creates (if necessary) C:IntelAMTlogs directory
2. Sets the MyServer variable to the FQDN of the appropriate provisioning server
3. Sets the MyProfile variable to the Remote Configuration Service (RCS) profile to be used
by the provisioning server
4. Sets the MyConfigFile variable to the XML file that contains the provisioning profile,
Initial HBC.xml
5. Performs an initial configuration over the WLAN using a temporary profile to enable
wireless Intel® Active Management Technology using the ConfigAMT switch for
ACUConfig.exe
6. Performs a final RCS configuration that properly configures the client using the
ConfigViaRCSOnly switch for ACUConfig.exe
7. Performs error checking
Copyright © 2013 Intel Corporation. All rights reserved.
14
Steps 3 and 4:
Set Variable values and execute commands with
logging and error checking
The primary functions are 5 and 6.
5. Performs an initial configuration over the WLAN using a temporary profile to
enable wireless Intel® Active Management Technology using the ConfigAMT
switch for ACUConfig.exe
6. Performs a final RCS configuration that properly configures the client using the
ConfigViaRCSOnly switch for ACUConfig.exe
Note that in function 5, the client is provisioned with an initial configuration using a
digest password and another password used to encrypt the XML file, both of which
are in this case, P@ssw0rd.
Use the ACUWizard.exe to create the Initial HBC.XML file and refer to the Intel®
Setup and Configuration Software Deployment Guide for more information.
Copyright © 2013 Intel Corporation. All rights reserved.
15
HBC.XML Configuration
Below is an example of how the initial HBC.XML file is configured:
Copyright © 2013 Intel Corporation. All rights reserved.
16
Remote Configuration Service Server Configuration
In function 6 (below) the system is configured again from the RCS server during
which the digest password is either removed or replaced, depending on the
configuration of the provisioning profile “MyProfile” on the RCS provisioning server
“MyServer”.
6. Performs a final RCS configuration that properly configures the client using the
ConfigViaRCSOnly switch for ACUConfig.exe
If detailed logging and error checking are not required, the batch file can be
simplified considerably by editing the file to perform only functions 5 and 6
without the use of variables.
Copyright © 2013 Intel Corporation. All rights reserved.
17
Contents of ConfigureNowHBC.bat:
cd..
Color FC
echo ************************************************************
echo This action takes about 2-5 minutes.
echo It may take longer depending on bandwidth
echo and distance from the configuration server.
echo !!!Very important: You have to be connected via Wireless LAN!!!
echo If you haven't already done so,
echo DISCONNECT LAN and CONNECT to WLAN now
echo and wait until you get an IP address
echo ************************************************************
PAUSE
Color f
If exist %SystemDrive%IntelAMTlogs goto Cont
MD %SystemDrive %IntelAMTlogs
:Cont
SET APPNAME=AMTHBCOD
SET MyServer="[FQDN of your provisioning server]"
SET MyProfile="[name of desired RCS profile]"
SET MyConfigFile="Initial HBC.xml"
:DecryptionPassword in command below matches the password used in SCS to encrypt the XML file
Call ACUConfig.exe /verbose /output console /output file %SystemDrive %IntelAMTlogsHBOCLog.txt
ConfigAMT %MyConfigFile% /DecryptionPassword P@ssw0rd
IF NOT ERRORLEVEL 0 GOTO ERROR
Call ACUConfig.exe /verbose /output console /output file %SystemDrive %IntelAMTlogsRCSLog.txt
ConfigViaRCSOnly %MyServer% %MyProfile%
SET INSTALLATIONERRORLEVEL=%ERRORLEVEL%
ECHO %DATE%:%TIME% - %APPNAME% ConfigViaRCSOnly returned: [%INSTALLATIONERRORLEVEL%]
Copyright © 2013 Intel Corporation. All rights reserved.
The sample text for the
ConfigureNowHBC.bat file
is located here.
18
Contents of ConfigureNowHBC.bat:
:-----------------------------
IF "%ERRORLEVEL%" == "0" Goto ENDGood
IF "%ERRORLEVEL%" == "32" Goto ENDGood
IF "%ERRORLEVEL%" == "101" Goto ENDGood
IF "%ERRORLEVEL%" == "108" Goto ENDGood
:ERROR
Color FC
echo *************************************
echo Please check the error message above.
echo *************************************
GOTO EndErr
:EndErr
Color FC
SET INSTALLATIONERRORLEVEL=%ERRORLEVEL%
ECHO %DATE%:%TIME% - %APPNAME% installation returned: [%INSTALLATIONERRORLEVEL%]
echo This program will now exit
PAUSE
EXIT /b 1
:ENDGood
Color A
echo *************************************
echo Congrats! You are now AMT configured
echo *************************************
echo
echo *************************************
echo This program will now exit
echo *************************************
PAUSE
EXIT 0
Copyright © 2013 Intel Corporation. All rights reserved.
The sample text for the
ConfigureNowHBC.bat file
is located here.
19
Learn More
Intel® Setup and Configuration Software (Intel® SCS)
Intel® Setup and Configuration Software (Intel® SCS) allows you to discover, set up and configure, and
maintain a secure connection to every managed device on your network. Using Intel SCS is an easy
process for unlocking the features and the value of systems with Intel® processors with Intel® vPro™
technology. Download the free software or view the training wizard online.
Intel® vPro™ Technology: Proven Value in Four Use Cases
To increase our ability to maintain, manage, and protect PCs while decreasing management costs, in
2011 Intel IT completed deployment of Intel® vPro™ technology across the entire enterprise. We have
evaluated the business value of four use cases based on Intel vPro technology that have been
deployed at Intel.
• An enterprise-scale solution for remote management of self-encrypting drives
• Remote passphrase reset
• Keyboard-Video-Mouse (KVM) remote control
• ISO mounts
In each case, we found that Intel vPro technology reduces management costs and decreases
downtime, resulting in greater employee productivity.
Copyright © 2013 Intel Corporation. All rights reserved.
20
Learn More
Managing Intel® Solid-State Drives Using Intel® vPro™ Technology
Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE)
solution to replace our current software-based WDE solution on systems with self-encrypting drives.
Compared to software-based WDE, our new hardware-based WDE solution improves user experience,
increases encryption compliance, and reduces support issues. This new solution is based on two
Intel® technologies: self-encrypting Intel® Solid-State Drives and Intel® Active Management
Technology, part of Intel® vPro™ technology.
Configuration Tips for Managing Mobile PCs with Intel® vPro™ Technology
To improve our ability to use certain remote management features of Intel® Active Management
Technology (Intel® AMT) a component of Intel® vPro™ technology, Intel IT worked with Intel’s
software development team to develop ways to enhance Intel® Setup and Configuration Software
(Intel® SCS), a tool used with Intel AMT. By combining the updated version that resulted, Intel SCS 7,
with our existing client management console, we created a highly available, agile configuration and
maintenance environment for our mobile systems. This solution improves our ability to configure and
maintain mobile PCs on demand with Intel AMT and keep them configured throughout their on-the-
go life cycles for our customers.
Copyright © 2013 Intel Corporation. All rights reserved.
Discover Intel IT’s strategies and initiatives that are accelerating Intel’s growth
and delivering business value.
IT Annual Performance Report
2012 Initiatives and 2013 Priorities
www.intel.com/go/ITAnnualReport
Learn more about Intel IT’s initiatives at www.intel.com/IT
Sharing Intel IT Best
Practices with the World
Assessment Tools
CIO and IT PerspectiveIT Papers
IT-to-IT Community
Thank You
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology

Weitere ähnliche Inhalte

Was ist angesagt?

Easergy studio realeasenotesv8_0_0
Easergy studio realeasenotesv8_0_0Easergy studio realeasenotesv8_0_0
Easergy studio realeasenotesv8_0_0M_ORTIZ
 
IBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM India Smarter Computing
 
ESM High Availability Module User's Guide
ESM High Availability Module User's GuideESM High Availability Module User's Guide
ESM High Availability Module User's GuideProtect724gopi
 
Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Principled Technologies
 
T310 spec sheet
T310 spec sheetT310 spec sheet
T310 spec sheetagoesimam
 
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi Italia
 
Intel Knights Landing Slides
Intel Knights Landing SlidesIntel Knights Landing Slides
Intel Knights Landing SlidesRonen Mendezitsky
 
Ex 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenEx 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenĐô GiẢn
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemBetselove
 
Scale Up Performance with Intel® Development
Scale Up Performance with Intel® DevelopmentScale Up Performance with Intel® Development
Scale Up Performance with Intel® DevelopmentIntel IT Center
 
Chapter_2_CCNA2
Chapter_2_CCNA2Chapter_2_CCNA2
Chapter_2_CCNA2sunabozu
 

Was ist angesagt? (19)

Easergy studio realeasenotesv8_0_0
Easergy studio realeasenotesv8_0_0Easergy studio realeasenotesv8_0_0
Easergy studio realeasenotesv8_0_0
 
IBM Flex System x240 Compute Node (E5-2600 v2)
IBM Flex System x240 Compute Node (E5-2600 v2)IBM Flex System x240 Compute Node (E5-2600 v2)
IBM Flex System x240 Compute Node (E5-2600 v2)
 
IBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23EIBM Redbooks Product Guide: IBM BladeCenter HS23E
IBM Redbooks Product Guide: IBM BladeCenter HS23E
 
IBM Flex System x220 Compute Node
IBM Flex System x220 Compute NodeIBM Flex System x220 Compute Node
IBM Flex System x220 Compute Node
 
ESM High Availability Module User's Guide
ESM High Availability Module User's GuideESM High Availability Module User's Guide
ESM High Availability Module User's Guide
 
Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...Performance of three Intel-based SMB servers running Web, email, and database...
Performance of three Intel-based SMB servers running Web, email, and database...
 
Installing Aix
Installing AixInstalling Aix
Installing Aix
 
T310 spec sheet
T310 spec sheetT310 spec sheet
T310 spec sheet
 
Aix install
Aix installAix install
Aix install
 
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
Intel Knights Landing Slides
Intel Knights Landing SlidesIntel Knights Landing Slides
Intel Knights Landing Slides
 
Intel
IntelIntel
Intel
 
Ex 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenEx 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chen
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Clear Linux OS - Architecture Overview
Clear Linux OS - Architecture OverviewClear Linux OS - Architecture Overview
Clear Linux OS - Architecture Overview
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
 
Scale Up Performance with Intel® Development
Scale Up Performance with Intel® DevelopmentScale Up Performance with Intel® Development
Scale Up Performance with Intel® Development
 
Chapter_2_CCNA2
Chapter_2_CCNA2Chapter_2_CCNA2
Chapter_2_CCNA2
 

Ähnlich wie How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology

E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case Intel IT Center
 
Achieve Business-Class Performance With Intel vPro, an Intel Evo Design
Achieve Business-Class Performance With Intel vPro, an Intel Evo DesignAchieve Business-Class Performance With Intel vPro, an Intel Evo Design
Achieve Business-Class Performance With Intel vPro, an Intel Evo DesignAdele Noble
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Techtechnext1
 
Oracle forms and reports 11g installation on linux
Oracle forms and reports 11g installation on linuxOracle forms and reports 11g installation on linux
Oracle forms and reports 11g installation on linuxVenu Palakolanu
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureJim St. Leger
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Ceph Community
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetupHaidee McMahon
 
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...Kuralamudhan Ramakrishnan
 
Технологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхТехнологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхFujitsu Russia
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013IntelAPAC
 
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersITExamAnswers.net
 
NFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkNFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkMichelle Holley
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Michelle Holley
 
PowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUGPowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUGTaylor Riggan
 
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...Intel IT Center
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
Технологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиТехнологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиCisco Russia
 

Ähnlich wie How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology (20)

E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case
 
Achieve Business-Class Performance With Intel vPro, an Intel Evo Design
Achieve Business-Class Performance With Intel vPro, an Intel Evo DesignAchieve Business-Class Performance With Intel vPro, an Intel Evo Design
Achieve Business-Class Performance With Intel vPro, an Intel Evo Design
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Tech
 
Oracle forms and reports 11g installation on linux
Oracle forms and reports 11g installation on linuxOracle forms and reports 11g installation on linux
Oracle forms and reports 11g installation on linux
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetup
 
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
 
Технологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данныхТехнологии Intel в центрах обработки данных
Технологии Intel в центрах обработки данных
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013
 
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
 
NFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkNFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function Framework
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...
 
Howto Pxeboot
Howto PxebootHowto Pxeboot
Howto Pxeboot
 
PowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUGPowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUG
 
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
Intel® Xeon® Processor E5-2600 v3 Product Family Application Showcase - Core ...
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
SR-IOV Introduce
SR-IOV IntroduceSR-IOV Introduce
SR-IOV Introduce
 
Технологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиТехнологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связи
 

Mehr von Intel IT Center

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- SupercomputingIntel IT Center
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraIntel IT Center
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationIntel IT Center
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsIntel IT Center
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayIntel IT Center
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.Intel IT Center
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldIntel IT Center
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel IT Center
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...Intel IT Center
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital AgeIntel IT Center
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityIntel IT Center
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel IT Center
 

Mehr von Intel IT Center (20)

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- Supercomputing
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsara
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel Station
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology

  • 1. How to Self-Provision over WLAN with Intel® vPro™ Technology June 2013 Omer Livne, Intel IT
  • 2. 2 Legal Notices Copyright © 2013 Intel Corporation. All rights reserved. This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others. Copyright © 2013 Intel Corporation. All rights reserved.
  • 3. 3 Introduction Intel IT supports a worldwide computing environment that includes more than 100,000 PCs across 63 countries. More than 80 percent of the devices are mobile PCs that connect wirelessly to our network. Managing and securing these environments is a key IT priority. Intel IT has deployed Intel® vPro™ technology across our enterprise in order to help maintain, manage, and protect these PCs. 80% MOBILE DEVICES CONNECTED WIRELESSLY TO OUR NETWORK Intel IT supports >100,000 PCs Copyright © 2013 Intel Corporation. All rights reserved.
  • 4. 4 Background To activate the Intel® Active Management Technology (Intel® AMT) feature of Intel® vPro™ Technology, we provision the PCs using Intel® Setup and Configuration Software (Intel® SCS). Provisioning is required to be able to take advantage of the capabilities within Intel AMT. When employees are issued a new or replacement PC, the PC is provisioned by technicians in our IT service centers. Employees that participate in our Bring Your Own (BYO) PC program might also bring in a PC that is un-provisioned. Typically provisioning is handled automatically in the course of installing and configuring the OS build. On occasion, a PC may need to have the provisioning reinstalled after delivery to the employee. Copyright © 2013 Intel Corporation. All rights reserved.
  • 6. The Challenge We needed an easy way for technicians to provision Ultrabooks™ devices that do not have wired Ethernet ports. We wanted to create a simple and efficient way for employees to be able to self- provision their PCs, without having to take the PC to an IT Service Center. Intel IT created a tool that allows our technicians and employees to self-provision systems over the WLAN. Employees can now use this tool to self- provision their PC, regardless of whether it’s a corporate-issued PC or a Bring-Your-Own PC. 6 Copyright © 2013 Intel Corporation. All rights reserved.
  • 7. Why This Is Important Once the user’s PC is provisioned, our IT Service Center staff can help manage and troubleshoot issues on the PC. This allows them to provide the same level of service regardless of whether it is a WLAN-only corporate-owned device or an employee’s Bring- Your-Own (BYO) PC. As employees bring in more WLAN-only BYO devices, such as Ultrabook™ devices and Windows*-based tablets with Intel® Architecture, we expect to see more employees utilizing this tool and subsequently requiring less support from our IT Service Center. 7 Copyright © 2013 Intel Corporation. All rights reserved.
  • 9. How It Works Host-Based Configuration on Demand (HBCoD) is a tool that utilizes the host-based configuration ability in Intel® Setup and Configuration Software, which is provided by the Intel® Active Management Technology Configuration Utility (ACU). The tool is available through our intranet software library and is available to all employees. When run, the tool copies the necessary files to the employee’s PC and executes a batch file that performs several functions before running ACUConfig.exe to provision the client. 9 Copyright © 2013 Intel Corporation. All rights reserved.
  • 10. 10 The Technical Details HBCoD self-provisioning process consists of four major steps: 1. HBCoD copies the necessary files to the local hard drive into c:temp 2. HBCoD launches a batch file with the necessary instructions 3. The batch file sets the value for variables used in the commands 4. The commands use the variables to perform two configurations of the system with logging and error checking Copyright © 2013 Intel Corporation. All rights reserved.
  • 11. 11 Step 1: Copy the necessary file to the local hard drive In our case, we have chosen to copy the necessary files to c:temp, but any location will work. The files that need to be copied are: • ACU.dll • ACUConfig.exe • ConfigureNowHBC.bat • Initial HBC.xml This can be done using a batch file called HBCoD.BAT, which is written as such: : HBCOD stands for Host-Based Configuration on Demand : This batch file copies the SCS configurator files to the local machine into the : C:tempACU_Configurator folder : And triggers configuration by running ConfigureNow.bat that contains the configuration commands @echo off xcopy %~dp0.. "c:tempACU_Configurator" /e /i /h /d /y c: cd tempACU_Configurator Start ConfigureNowHBC.bat Copyright © 2013 Intel Corporation. All rights reserved.
  • 12. 12 Step 2: Launch a batch file with the necessary instructions The last line of the HBCoD.BAT file Start ConfigureNowHBC.bat executes another batch file named ConfigureNowHBC.BAT. This batch file is used to perform steps 3 and 4. Copyright © 2013 Intel Corporation. All rights reserved.
  • 13. 13 Steps 3 and 4: Set Variable values and execute commands with logging and error checking At a high-level, this batch file performs the following functions: 1. Checks for and creates (if necessary) C:IntelAMTlogs directory 2. Sets the MyServer variable to the FQDN of the appropriate provisioning server 3. Sets the MyProfile variable to the Remote Configuration Service (RCS) profile to be used by the provisioning server 4. Sets the MyConfigFile variable to the XML file that contains the provisioning profile, Initial HBC.xml 5. Performs an initial configuration over the WLAN using a temporary profile to enable wireless Intel® Active Management Technology using the ConfigAMT switch for ACUConfig.exe 6. Performs a final RCS configuration that properly configures the client using the ConfigViaRCSOnly switch for ACUConfig.exe 7. Performs error checking Copyright © 2013 Intel Corporation. All rights reserved.
  • 14. 14 Steps 3 and 4: Set Variable values and execute commands with logging and error checking The primary functions are 5 and 6. 5. Performs an initial configuration over the WLAN using a temporary profile to enable wireless Intel® Active Management Technology using the ConfigAMT switch for ACUConfig.exe 6. Performs a final RCS configuration that properly configures the client using the ConfigViaRCSOnly switch for ACUConfig.exe Note that in function 5, the client is provisioned with an initial configuration using a digest password and another password used to encrypt the XML file, both of which are in this case, P@ssw0rd. Use the ACUWizard.exe to create the Initial HBC.XML file and refer to the Intel® Setup and Configuration Software Deployment Guide for more information. Copyright © 2013 Intel Corporation. All rights reserved.
  • 15. 15 HBC.XML Configuration Below is an example of how the initial HBC.XML file is configured: Copyright © 2013 Intel Corporation. All rights reserved.
  • 16. 16 Remote Configuration Service Server Configuration In function 6 (below) the system is configured again from the RCS server during which the digest password is either removed or replaced, depending on the configuration of the provisioning profile “MyProfile” on the RCS provisioning server “MyServer”. 6. Performs a final RCS configuration that properly configures the client using the ConfigViaRCSOnly switch for ACUConfig.exe If detailed logging and error checking are not required, the batch file can be simplified considerably by editing the file to perform only functions 5 and 6 without the use of variables. Copyright © 2013 Intel Corporation. All rights reserved.
  • 17. 17 Contents of ConfigureNowHBC.bat: cd.. Color FC echo ************************************************************ echo This action takes about 2-5 minutes. echo It may take longer depending on bandwidth echo and distance from the configuration server. echo !!!Very important: You have to be connected via Wireless LAN!!! echo If you haven't already done so, echo DISCONNECT LAN and CONNECT to WLAN now echo and wait until you get an IP address echo ************************************************************ PAUSE Color f If exist %SystemDrive%IntelAMTlogs goto Cont MD %SystemDrive %IntelAMTlogs :Cont SET APPNAME=AMTHBCOD SET MyServer="[FQDN of your provisioning server]" SET MyProfile="[name of desired RCS profile]" SET MyConfigFile="Initial HBC.xml" :DecryptionPassword in command below matches the password used in SCS to encrypt the XML file Call ACUConfig.exe /verbose /output console /output file %SystemDrive %IntelAMTlogsHBOCLog.txt ConfigAMT %MyConfigFile% /DecryptionPassword P@ssw0rd IF NOT ERRORLEVEL 0 GOTO ERROR Call ACUConfig.exe /verbose /output console /output file %SystemDrive %IntelAMTlogsRCSLog.txt ConfigViaRCSOnly %MyServer% %MyProfile% SET INSTALLATIONERRORLEVEL=%ERRORLEVEL% ECHO %DATE%:%TIME% - %APPNAME% ConfigViaRCSOnly returned: [%INSTALLATIONERRORLEVEL%] Copyright © 2013 Intel Corporation. All rights reserved. The sample text for the ConfigureNowHBC.bat file is located here.
  • 18. 18 Contents of ConfigureNowHBC.bat: :----------------------------- IF "%ERRORLEVEL%" == "0" Goto ENDGood IF "%ERRORLEVEL%" == "32" Goto ENDGood IF "%ERRORLEVEL%" == "101" Goto ENDGood IF "%ERRORLEVEL%" == "108" Goto ENDGood :ERROR Color FC echo ************************************* echo Please check the error message above. echo ************************************* GOTO EndErr :EndErr Color FC SET INSTALLATIONERRORLEVEL=%ERRORLEVEL% ECHO %DATE%:%TIME% - %APPNAME% installation returned: [%INSTALLATIONERRORLEVEL%] echo This program will now exit PAUSE EXIT /b 1 :ENDGood Color A echo ************************************* echo Congrats! You are now AMT configured echo ************************************* echo echo ************************************* echo This program will now exit echo ************************************* PAUSE EXIT 0 Copyright © 2013 Intel Corporation. All rights reserved. The sample text for the ConfigureNowHBC.bat file is located here.
  • 19. 19 Learn More Intel® Setup and Configuration Software (Intel® SCS) Intel® Setup and Configuration Software (Intel® SCS) allows you to discover, set up and configure, and maintain a secure connection to every managed device on your network. Using Intel SCS is an easy process for unlocking the features and the value of systems with Intel® processors with Intel® vPro™ technology. Download the free software or view the training wizard online. Intel® vPro™ Technology: Proven Value in Four Use Cases To increase our ability to maintain, manage, and protect PCs while decreasing management costs, in 2011 Intel IT completed deployment of Intel® vPro™ technology across the entire enterprise. We have evaluated the business value of four use cases based on Intel vPro technology that have been deployed at Intel. • An enterprise-scale solution for remote management of self-encrypting drives • Remote passphrase reset • Keyboard-Video-Mouse (KVM) remote control • ISO mounts In each case, we found that Intel vPro technology reduces management costs and decreases downtime, resulting in greater employee productivity. Copyright © 2013 Intel Corporation. All rights reserved.
  • 20. 20 Learn More Managing Intel® Solid-State Drives Using Intel® vPro™ Technology Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution improves user experience, increases encryption compliance, and reduces support issues. This new solution is based on two Intel® technologies: self-encrypting Intel® Solid-State Drives and Intel® Active Management Technology, part of Intel® vPro™ technology. Configuration Tips for Managing Mobile PCs with Intel® vPro™ Technology To improve our ability to use certain remote management features of Intel® Active Management Technology (Intel® AMT) a component of Intel® vPro™ technology, Intel IT worked with Intel’s software development team to develop ways to enhance Intel® Setup and Configuration Software (Intel® SCS), a tool used with Intel AMT. By combining the updated version that resulted, Intel SCS 7, with our existing client management console, we created a highly available, agile configuration and maintenance environment for our mobile systems. This solution improves our ability to configure and maintain mobile PCs on demand with Intel AMT and keep them configured throughout their on-the- go life cycles for our customers. Copyright © 2013 Intel Corporation. All rights reserved.
  • 21. Discover Intel IT’s strategies and initiatives that are accelerating Intel’s growth and delivering business value. IT Annual Performance Report 2012 Initiatives and 2013 Priorities www.intel.com/go/ITAnnualReport
  • 22. Learn more about Intel IT’s initiatives at www.intel.com/IT Sharing Intel IT Best Practices with the World Assessment Tools CIO and IT PerspectiveIT Papers IT-to-IT Community