SlideShare une entreprise Scribd logo
1  sur  16
 Infrastructure Optimization Model Presenter: Nguyen Trong Dat System Solutions Manager Email: datnt@hpt.vn 1
TechnologyChange RegulatoryCompliance Competition Security CostReduction Keep BusinessUp & Running End-User  Productivity Customer Connection Business Results& New Value More Pressure Than Ever on IT Budgets 20%New 80%Maintenance … with limited resources for advancing capability
3 Infrastructure Optimization Cost Center Efficient Cost Center Business Enabler Strategic Asset
Infrastructure Optimization 4 User Experience Application Platform Optimization Model Development STANDARDIZED BASIC ADVANCED DYNAMIC SOA and Business Process Data Management Business Intelligence Business Productivity Infrastructure Optimization Model Unified Communications Collaboration IT and Security Process EnterpriseContent Management STANDARDIZED BASIC RATIONALIZED DYNAMIC Enterprise Search Business Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt STANDARDIZED BASIC RATIONALIZED DYNAMIC Securityand Networking DataProtection and Recovery
Core Infrastructure Optimization Standardized Rationalized Dynamic Basic Uncoordinated, manual infrastructure  Managed IT  infrastructure  with limited automation Managed and  consolidated IT  infrastructure with maximum automation Fully automated  management,  dynamic resource  usage, business  linked SLA’s Identity and Access Management Desktop, Device, and Server Management Security and Networking Data Protection and Recovery IT & Security Processes Efficient Cost Center Business Enabler Strategic Asset Cost Center ,[object Object],[object Object],[object Object]
8 Infrastructure Optimization Assessment
9 Infrastructure Optimization Assessment
10 Infrastructure Optimization Assessment
11 Infrastructure Optimization Assessment
Microsoft Products with IO Model Core IO field Desktop, devices, and server management Identify and access manage  Securiy Data Protection and Recovery MS product ,[object Object]
 Windows Vista
 Windows Server 2003/2008 (including Active Directory).
 Microsoft Desktop optimization Pack.
 Microsoft System Center.
 Microsoft Forefront.
 Microsoft System Center : Data Protection Manager

Contenu connexe

Tendances

The Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre ConsolidationThe Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre ConsolidationDAYWATCHER.COM
 
09 mdm tool comaprison
09 mdm tool comaprison09 mdm tool comaprison
09 mdm tool comaprisonSneha Kulkarni
 
Master data management (mdm) & plm in context of enterprise product management
Master data management (mdm) & plm in context of enterprise product managementMaster data management (mdm) & plm in context of enterprise product management
Master data management (mdm) & plm in context of enterprise product managementTata Consultancy Services
 
Process intelligence leverages selective features of the bpms
Process intelligence leverages selective features of the bpmsProcess intelligence leverages selective features of the bpms
Process intelligence leverages selective features of the bpmsGartner
 
Chap05 Data Resource Management
Chap05 Data Resource ManagementChap05 Data Resource Management
Chap05 Data Resource ManagementAqib Syed
 
Chap01 edit
Chap01 editChap01 edit
Chap01 editrpvgb
 
ASUG 10_27_2016 Entegris PLM-MDM Business Process Optimization 3
ASUG 10_27_2016 Entegris PLM-MDM Business Process Optimization 3ASUG 10_27_2016 Entegris PLM-MDM Business Process Optimization 3
ASUG 10_27_2016 Entegris PLM-MDM Business Process Optimization 3keefe008
 
Get Mainframe Data to Snowflake’s Cloud Data Warehouse
Get Mainframe Data to Snowflake’s Cloud Data WarehouseGet Mainframe Data to Snowflake’s Cloud Data Warehouse
Get Mainframe Data to Snowflake’s Cloud Data WarehousePrecisely
 
White Paper Reduce Infrastructure Cost With Microsoft System Center
White Paper  Reduce Infrastructure Cost With Microsoft System CenterWhite Paper  Reduce Infrastructure Cost With Microsoft System Center
White Paper Reduce Infrastructure Cost With Microsoft System Centerrajeshchoudhary23281
 
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...DATAVERSITY
 
Albel pres mdm implementation
Albel pres   mdm implementationAlbel pres   mdm implementation
Albel pres mdm implementationAli BELCAID
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesEduardo Castro
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data ManagementMoniqueO Opris
 
What exactly is Business Intelligence?
What exactly is Business Intelligence?What exactly is Business Intelligence?
What exactly is Business Intelligence?James Serra
 
Credit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global ScaleCredit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global ScaleOrchestra Networks
 
Lean Master Data Management
Lean Master Data ManagementLean Master Data Management
Lean Master Data Managementnnorthrup
 
Sabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseSabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseOrchestra Networks
 

Tendances (20)

The Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre ConsolidationThe Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre Consolidation
 
09 mdm tool comaprison
09 mdm tool comaprison09 mdm tool comaprison
09 mdm tool comaprison
 
Master data management (mdm) & plm in context of enterprise product management
Master data management (mdm) & plm in context of enterprise product managementMaster data management (mdm) & plm in context of enterprise product management
Master data management (mdm) & plm in context of enterprise product management
 
The future of managed services
The future of managed servicesThe future of managed services
The future of managed services
 
Process intelligence leverages selective features of the bpms
Process intelligence leverages selective features of the bpmsProcess intelligence leverages selective features of the bpms
Process intelligence leverages selective features of the bpms
 
Chap05 Data Resource Management
Chap05 Data Resource ManagementChap05 Data Resource Management
Chap05 Data Resource Management
 
Mdm: why, when, how
Mdm: why, when, howMdm: why, when, how
Mdm: why, when, how
 
4C
4C4C
4C
 
Chap01 edit
Chap01 editChap01 edit
Chap01 edit
 
ASUG 10_27_2016 Entegris PLM-MDM Business Process Optimization 3
ASUG 10_27_2016 Entegris PLM-MDM Business Process Optimization 3ASUG 10_27_2016 Entegris PLM-MDM Business Process Optimization 3
ASUG 10_27_2016 Entegris PLM-MDM Business Process Optimization 3
 
Get Mainframe Data to Snowflake’s Cloud Data Warehouse
Get Mainframe Data to Snowflake’s Cloud Data WarehouseGet Mainframe Data to Snowflake’s Cloud Data Warehouse
Get Mainframe Data to Snowflake’s Cloud Data Warehouse
 
White Paper Reduce Infrastructure Cost With Microsoft System Center
White Paper  Reduce Infrastructure Cost With Microsoft System CenterWhite Paper  Reduce Infrastructure Cost With Microsoft System Center
White Paper Reduce Infrastructure Cost With Microsoft System Center
 
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
 
Albel pres mdm implementation
Albel pres   mdm implementationAlbel pres   mdm implementation
Albel pres mdm implementation
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data Services
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 
What exactly is Business Intelligence?
What exactly is Business Intelligence?What exactly is Business Intelligence?
What exactly is Business Intelligence?
 
Credit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global ScaleCredit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global Scale
 
Lean Master Data Management
Lean Master Data ManagementLean Master Data Management
Lean Master Data Management
 
Sabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseSabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large Enterprise
 

En vedette

IndustryConf 2014: You May Be Right
IndustryConf 2014: You May Be RightIndustryConf 2014: You May Be Right
IndustryConf 2014: You May Be RightTimoni West
 
Intro Multimedia
Intro MultimediaIntro Multimedia
Intro Multimediafiz ab
 
Ol Rail Safety Elementary Presentation
Ol Rail Safety Elementary PresentationOl Rail Safety Elementary Presentation
Ol Rail Safety Elementary Presentationaschram
 
Final spd asc 24 février 2014
Final spd asc 24 février 2014Final spd asc 24 février 2014
Final spd asc 24 février 2014ASC2014
 
Les jeunes y et c au travail copie
Les jeunes y et c au travail copieLes jeunes y et c au travail copie
Les jeunes y et c au travail copieClaude Munger
 
Austin Innovative Rail Safety Outreach
Austin Innovative Rail Safety OutreachAustin Innovative Rail Safety Outreach
Austin Innovative Rail Safety Outreachaschram
 
Austin Innovative Rail Safety Outreach
Austin Innovative Rail Safety OutreachAustin Innovative Rail Safety Outreach
Austin Innovative Rail Safety Outreachaschram
 
Analyse élastique linéaire avec redistribution selon eurocode 2
Analyse élastique linéaire avec redistribution selon eurocode 2Analyse élastique linéaire avec redistribution selon eurocode 2
Analyse élastique linéaire avec redistribution selon eurocode 2Quang Huy Nguyen
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring toolsOnline
 

En vedette (9)

IndustryConf 2014: You May Be Right
IndustryConf 2014: You May Be RightIndustryConf 2014: You May Be Right
IndustryConf 2014: You May Be Right
 
Intro Multimedia
Intro MultimediaIntro Multimedia
Intro Multimedia
 
Ol Rail Safety Elementary Presentation
Ol Rail Safety Elementary PresentationOl Rail Safety Elementary Presentation
Ol Rail Safety Elementary Presentation
 
Final spd asc 24 février 2014
Final spd asc 24 février 2014Final spd asc 24 février 2014
Final spd asc 24 février 2014
 
Les jeunes y et c au travail copie
Les jeunes y et c au travail copieLes jeunes y et c au travail copie
Les jeunes y et c au travail copie
 
Austin Innovative Rail Safety Outreach
Austin Innovative Rail Safety OutreachAustin Innovative Rail Safety Outreach
Austin Innovative Rail Safety Outreach
 
Austin Innovative Rail Safety Outreach
Austin Innovative Rail Safety OutreachAustin Innovative Rail Safety Outreach
Austin Innovative Rail Safety Outreach
 
Analyse élastique linéaire avec redistribution selon eurocode 2
Analyse élastique linéaire avec redistribution selon eurocode 2Analyse élastique linéaire avec redistribution selon eurocode 2
Analyse élastique linéaire avec redistribution selon eurocode 2
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
 

Similaire à HMSC_Core IO

IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Upbaselsss
 
Business enabling IT through FRW
Business enabling IT through FRWBusiness enabling IT through FRW
Business enabling IT through FRWJean-Pierre Beelen
 
Microsoft Online Services Partner Core Deck
Microsoft Online Services Partner Core DeckMicrosoft Online Services Partner Core Deck
Microsoft Online Services Partner Core Deckjessiethe3rd
 
Peopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsPeopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsJusto Hidalgo
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalHarvinder Atwal
 
Microsoft Core Infrastructure Overview
Microsoft Core Infrastructure OverviewMicrosoft Core Infrastructure Overview
Microsoft Core Infrastructure Overviewjessiethe3rd
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentationesbosman
 
Sage X3 Enterprise Management Data & Analytics (EMDA) Overview
Sage X3 Enterprise Management Data & Analytics (EMDA) OverviewSage X3 Enterprise Management Data & Analytics (EMDA) Overview
Sage X3 Enterprise Management Data & Analytics (EMDA) OverviewNet at Work
 
Bi presentation to bkk
Bi presentation to bkkBi presentation to bkk
Bi presentation to bkkguest4e975e2
 
Winning With Io Partner Module 3 Optimizing Your Customers Infrastructure
Winning With Io Partner   Module 3   Optimizing Your Customers InfrastructureWinning With Io Partner   Module 3   Optimizing Your Customers Infrastructure
Winning With Io Partner Module 3 Optimizing Your Customers InfrastructureNelson Biagio Junior
 
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...Louis Göhl
 
Ppt Template
Ppt TemplatePpt Template
Ppt Templatepapdev
 
Select Refresh For SAP PPT Show
Select Refresh  For SAP PPT ShowSelect Refresh  For SAP PPT Show
Select Refresh For SAP PPT Showcspencert
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesAmit Gatenyo
 
IBM Software Capabilities
IBM Software CapabilitiesIBM Software Capabilities
IBM Software CapabilitiesNone
 
Optim Insync10 Paul Griffin presentation
Optim Insync10 Paul Griffin presentationOptim Insync10 Paul Griffin presentation
Optim Insync10 Paul Griffin presentationInSync Conference
 
Big Data Analytics Webinar
Big Data Analytics WebinarBig Data Analytics Webinar
Big Data Analytics WebinarEckerson Group
 

Similaire à HMSC_Core IO (20)

IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Business enabling IT through FRW
Business enabling IT through FRWBusiness enabling IT through FRW
Business enabling IT through FRW
 
Microsoft Online Services Partner Core Deck
Microsoft Online Services Partner Core DeckMicrosoft Online Services Partner Core Deck
Microsoft Online Services Partner Core Deck
 
Peopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsPeopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashups
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
 
Microsoft Core Infrastructure Overview
Microsoft Core Infrastructure OverviewMicrosoft Core Infrastructure Overview
Microsoft Core Infrastructure Overview
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
Sage X3 Enterprise Management Data & Analytics (EMDA) Overview
Sage X3 Enterprise Management Data & Analytics (EMDA) OverviewSage X3 Enterprise Management Data & Analytics (EMDA) Overview
Sage X3 Enterprise Management Data & Analytics (EMDA) Overview
 
Bi presentation to bkk
Bi presentation to bkkBi presentation to bkk
Bi presentation to bkk
 
Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1
 
Winning With Io Partner Module 3 Optimizing Your Customers Infrastructure
Winning With Io Partner   Module 3   Optimizing Your Customers InfrastructureWinning With Io Partner   Module 3   Optimizing Your Customers Infrastructure
Winning With Io Partner Module 3 Optimizing Your Customers Infrastructure
 
Vs Profile
Vs ProfileVs Profile
Vs Profile
 
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
Select Refresh For SAP PPT Show
Select Refresh  For SAP PPT ShowSelect Refresh  For SAP PPT Show
Select Refresh For SAP PPT Show
 
Chrome Summary
Chrome SummaryChrome Summary
Chrome Summary
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft Technologies
 
IBM Software Capabilities
IBM Software CapabilitiesIBM Software Capabilities
IBM Software Capabilities
 
Optim Insync10 Paul Griffin presentation
Optim Insync10 Paul Griffin presentationOptim Insync10 Paul Griffin presentation
Optim Insync10 Paul Griffin presentation
 
Big Data Analytics Webinar
Big Data Analytics WebinarBig Data Analytics Webinar
Big Data Analytics Webinar
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

HMSC_Core IO

Notes de l'éditeur

  1. Key Message:Amidst all these trends, there’s more pressure than ever on IT. The bulk of IT budgets today is spent just “treading water” rather than adding new business value. Microsoft is focused on trying to help your IT department flip that equation.Talking Points: There are “good” and “bad” pressures on IT. The green arrows represent the good pressure: pressure to add new business value by increasing productivity, driving customer connections, etc. The red arrows represent the “bad” pressures: the necessary, day-to-day pressures that require lots of time, resources, and effort to address but that don’t necessarily push the business ahead. It’s these pressures that consume 80 percent of most IT budgets today, according to analysts; that’s a lot of investment spent on “standing still” when you’d rather be spending resources that add new business value and take the business further. As companies grow, their IT infrastructures grow along with them. But more often that not, the pace of that growth is uneven, driven as much by the conditions under which the infrastructures operate as by the models they aspire to. You add an application here. You add functionality there. You add people across the board. Yet the more variables you add to your infrastructure, the harder it can be to manage and, more importantly, to keep secure.   So even as the costs for hardware and software are going down, the costs of managing and supporting your infrastructure are increasing. $140B is spent on management and support—yet software is only 6 percent of it. Software is an enabler…
  2. Levels of MaturityInfrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of dynamic IT for that capability. The levels of maturity include basic, standardized, rationalized, and dynamic.BasicA basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:• IT governance is negligible, as policies for security and compliance are nonexistent or inconsistently enforced. • The overall health of applications and services is unknown due to a lack of tools and resources. • There is no vehicle for sharing accumulated knowledge across IT.• The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.• Software deployments, security updates, and services are provided in a high-touch and high-cost manner.StandardizedAt a standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:• A unified directory service is used to manage resources, security policies, and network access.• Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. • Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. • Inventories of hardware and software assets are maintained through a reasonable process and license use is managed to an extent. • Security is improved with a locked-down perimeter, though internal security may still require improvements.RationalizedAt a rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest and processes and policies have been optimized:• Security is proactive and response to threats is rapid and controlled.• The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. • The process for managing desktops is very low touch and the number of images is minimal. • There is an accurate inventory of hardware and software and companies only purchase those licenses and computers that they need. • Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.DynamicWhen an organization achieves a dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:• Costs are fully controlled; there is integration among users and information, desktops, and servers. • Mobile users have nearly on-site levels of service and capabilities. • Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. • Additional investments in technology yield specific, rapid, and measurable business benefits. • Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.The capabilities within the Core IO model are as follows.Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and servers, including planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch-office technologies to improve your IT infrastructure.Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to backup, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.IT and Security ProcessIT and Security Process provides guidance based on industry best practices on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organization’s demands for reliable, available, and highly secure IT services, technology alone is not sufficient; excellent processes and trained staff with clear roles and responsibilities are also required
  3. Levels of MaturityInfrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of dynamic IT for that capability. The levels of maturity include basic, standardized, rationalized, and dynamic.BasicA basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:• IT governance is negligible, as policies for security and compliance are nonexistent or inconsistently enforced. • The overall health of applications and services is unknown due to a lack of tools and resources. • There is no vehicle for sharing accumulated knowledge across IT.• The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.• Software deployments, security updates, and services are provided in a high-touch and high-cost manner.StandardizedAt a standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:• A unified directory service is used to manage resources, security policies, and network access.• Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. • Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. • Inventories of hardware and software assets are maintained through a reasonable process and license use is managed to an extent. • Security is improved with a locked-down perimeter, though internal security may still require improvements.RationalizedAt a rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest and processes and policies have been optimized:• Security is proactive and response to threats is rapid and controlled.• The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. • The process for managing desktops is very low touch and the number of images is minimal. • There is an accurate inventory of hardware and software and companies only purchase those licenses and computers that they need. • Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.DynamicWhen an organization achieves a dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:• Costs are fully controlled; there is integration among users and information, desktops, and servers. • Mobile users have nearly on-site levels of service and capabilities. • Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. • Additional investments in technology yield specific, rapid, and measurable business benefits. • Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.The capabilities within the Core IO model are as follows.Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and servers, including planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch-office technologies to improve your IT infrastructure.Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to backup, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.IT and Security ProcessIT and Security Process provides guidance based on industry best practices on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organization’s demands for reliable, available, and highly secure IT services, technology alone is not sufficient; excellent processes and trained staff with clear roles and responsibilities are also required
  4. Levels of MaturityInfrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of dynamic IT for that capability. The levels of maturity include basic, standardized, rationalized, and dynamic.BasicA basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:• IT governance is negligible, as policies for security and compliance are nonexistent or inconsistently enforced. • The overall health of applications and services is unknown due to a lack of tools and resources. • There is no vehicle for sharing accumulated knowledge across IT.• The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.• Software deployments, security updates, and services are provided in a high-touch and high-cost manner.StandardizedAt a standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:• A unified directory service is used to manage resources, security policies, and network access.• Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. • Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. • Inventories of hardware and software assets are maintained through a reasonable process and license use is managed to an extent. • Security is improved with a locked-down perimeter, though internal security may still require improvements.RationalizedAt a rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest and processes and policies have been optimized:• Security is proactive and response to threats is rapid and controlled.• The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. • The process for managing desktops is very low touch and the number of images is minimal. • There is an accurate inventory of hardware and software and companies only purchase those licenses and computers that they need. • Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.DynamicWhen an organization achieves a dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:• Costs are fully controlled; there is integration among users and information, desktops, and servers. • Mobile users have nearly on-site levels of service and capabilities. • Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. • Additional investments in technology yield specific, rapid, and measurable business benefits. • Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.The capabilities within the Core IO model are as follows.Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and servers, including planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch-office technologies to improve your IT infrastructure.Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to backup, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.IT and Security ProcessIT and Security Process provides guidance based on industry best practices on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organization’s demands for reliable, available, and highly secure IT services, technology alone is not sufficient; excellent processes and trained staff with clear roles and responsibilities are also required
  5. Levels of MaturityInfrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of dynamic IT for that capability. The levels of maturity include basic, standardized, rationalized, and dynamic.BasicA basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:• IT governance is negligible, as policies for security and compliance are nonexistent or inconsistently enforced. • The overall health of applications and services is unknown due to a lack of tools and resources. • There is no vehicle for sharing accumulated knowledge across IT.• The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.• Software deployments, security updates, and services are provided in a high-touch and high-cost manner.StandardizedAt a standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:• A unified directory service is used to manage resources, security policies, and network access.• Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. • Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. • Inventories of hardware and software assets are maintained through a reasonable process and license use is managed to an extent. • Security is improved with a locked-down perimeter, though internal security may still require improvements.RationalizedAt a rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest and processes and policies have been optimized:• Security is proactive and response to threats is rapid and controlled.• The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. • The process for managing desktops is very low touch and the number of images is minimal. • There is an accurate inventory of hardware and software and companies only purchase those licenses and computers that they need. • Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.DynamicWhen an organization achieves a dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:• Costs are fully controlled; there is integration among users and information, desktops, and servers. • Mobile users have nearly on-site levels of service and capabilities. • Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. • Additional investments in technology yield specific, rapid, and measurable business benefits. • Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.The capabilities within the Core IO model are as follows.Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and servers, including planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch-office technologies to improve your IT infrastructure.Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to backup, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.IT and Security ProcessIT and Security Process provides guidance based on industry best practices on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organization’s demands for reliable, available, and highly secure IT services, technology alone is not sufficient; excellent processes and trained staff with clear roles and responsibilities are also required
  6. Begin today to build your roadmap for using IT as an enabler of business growth--Analyze your infrastructure and platform with the Optimization Self-Assessment Tool. The assessment tool provides a personalized and private Optimization score, peer comparison, and value assessment for your organization. The tool generates a comprehensive report that can serve as an actionable roadmap and incentive for optimizing your IT infrastructure and platform. Get answers to questions like: Where does my organization rank on the Optimization model? How do we compare to the competition? What roadmap should we follow? What is the quantifiable value of improving?
  7. Infrastructure Optimization BenefitsCore IO from Microsoft is designed to help control IT costs, improve security and availability, and increase agility to enable customers like you to spend less time and money on maintenance and devote more time to creating and facilitating new capabilities and services to advance the business. Benefits of optimizing your core infrastructure include:Control Costs Higher levels of IT maturity can result in savings of up to 80 percent in IT labor costs. Improve Security and AvailabilityAn optimized core infrastructure can lead to greater business continuity, enhanced compliance, and better, more secure access to network resources. Increase AgilityOrganizations can achieve notable improvements in the ability to provide faster, more responsive IT service and increase agility. The Core Infrastructure Optimization (Core IO) methodology is a comprehensive, proven, and efficient methodology to reduce cost and risk while increasing the security, availability, and agility of the systems in your infrastructure. Core IO is supported with a model, enabling technologies, services, and tools and guidance:ModelThe Core IO model provides a way to think about the challenges that you face, prioritize the areas you want to focus on improving, and organize your activities to pursue those priorities. The model outlines a progression through four levels of optimization and illustrates the strategic value and business benefits of moving from a “basic” level of optimization, where the infrastructure is generally considered a “cost center,” toward a “dynamic” infrastructure, where the business value of the infrastructure is clearly understood and is viewed as a strategic asset.Enabling TechnologiesSupporting each of the Infrastructure Optimization Models are technologies that have been designed to facilitate your progression from a basic level of optimization through to a dynamic level.ServicesTogether, Microsoft Services and an extensive network of Microsoft technology partners provide industry-leading expertise to assist you with your optimization efforts. Microsoft Services has developed a number of Core IO service offerings based on industry best practices, plus Microsoft has established criteria and associated competencies in the Microsoft Partner Program to enable partners to certify that they have the required expertise in delivering advanced-infrastructure solutions.Tools and GuidanceMicrosoft has built an extensive set of resources that fit within the context of Core IO to help you deploy and manage solutions more effectively. These tools and solution guides are free and increase the likelihood of a successful implementation.