There are no upcoming webinars.
In this webinar, 1E Product Managers Troy Martin and Paul Thomsen provided an overview of some key considerations, processes, and best practices when upgrading 1E Nomad. In addition, the webinar also covered the steps to upgrade 1E Nomad and migrate to the ConfigMgr 2012 client, simultaneously.
During this session you will find answers to the following questions:
- Are Nomad upgrades easy?
- Understanding expected migration results
- Impacts of hashing during the migration
- What order to migrate in
- Distribution Points
- OSD components
- Agents (by subnet, site/location)
- Implementing ActiveEfficiency and 1E WakeUp
- Single Site Download
- Nomad WakeUp integration
Thursday, October 16, 2014
A new report from Forrester Consulting, exposes the benefits and challenges for organizations looking to adopt Bring Your Own.
In this webinar, Forrester Analyst David Johnson, an expert in client virtualization technologies, will be sharing the findings from the Forrester Technology Adoption Profile: Desktop Virtualization Demand Continues To Grow in Harmony With BYO; a commissioned study conducted by Forrester Consulting on behalf of 1E.
During this session you will learn how:
- Employee centricity and flexibility are key to competitive advantage
- BYOPC will drive IT to adopt newer and better security approaches
- Locally deployed virtual desktops can accelerate BYOPC
Exclusive: During the webinar, 1E will also share its latest ground-breaking technology in the field of desktop virtualization and BYOPC.
Software license audits are inevitable but paying for unused software isn't. The startling fact is that in most organizations over 30% of the software purchased and deployed is rarely or never used.
Please watch the recording and learn how to:
- Analyzing your existing SCCM database to determine software usage/waste
- Establishing entitlement, unit cost, and maintenance for each of the identified titles
- Determining license and maintenance savings and cost avoidance
With 1E's Software Reclaim as a Service, in less than 30 days we can show you not only where and on how many PCs software is deployed, but also how to manage your software proactively to sucker-punch your auditors with real data. As part of this service, 1E will assist you in re-claiming one software title from a vendor of your choice.
Stop paying for software you don't need; Stop entering Software Audits blindfolded; Stop Truing Up… Start Truing Down.
Learn and understand how to best meet your business requirements and make efficient use of your network infrastructure for your System Center 2012 Configuration Manager deployment.
In System Center 2012 Configuration Manager, a boundary is a network location on the intranet that can contain one or more devices that you want to manage. Boundaries can be an IP subnet, Active Directory site name, IPv6 Prefix, or an IP address range, and the hierarchy can include any combination of these boundary types.
Learn to design your Configuration Manager 2012 migration by diving deep into understanding boundaries:
- What are Boundaries and Boundary Groups
- Configuring Boundaries and Boundary Groups
- Considerations for CM Performance
- How Nomad simplifies CM Boundary management
Why do business as usual, when with Microsoft ConfigMgr 2012 you can have a simpler, scalable and more capable IT environment? But migrating a whole IT infrastructure can be time consuming and a proverbial minefield of pitfalls. Learn more about the best practices for ConfigMgr 2012 Migration in the three part Webinar series.
In the first part, 1E’s experts passed on their knowledge of the discovery process ahead of your ConfigMgr 2012 migration.
In the Design phase, 1E experts discussed how to build a successful ConfigMgr 2012 design by taking into account the needs discussed in the Discovery phase as well as the new features/options available in the latest version of ConfigMgr.
In the third part The POC & Pilot, 1E experts looked at how to test the design and deploy it into production.
According to the recent GAO Report, the federal government plans to spend at least $82 billion on IT products and services, such as software licenses, in fiscal year 2014.
Federal agencies engage in thousands of licensing agreements annually and effectively managing those licenses is critical to prevent over and under licensing, which if left unchecked can have huge financial implications.
So the real question is...
Is your agency able to identify and remove software that is no longer being used?
Imagine a world where you can obtain full visibility into your software estate, proactively reducing licensing costs while saving money. 1E can help make this world your reality.
Please watch the recording and learn how to:
- Proactively identify unused software
- Provide an automated, policy driven agentless reclamation utility
- Optimize IT configuration for compliance and cost reduction/savings
Traditional approaches to software and patch deployment using SCCM are costly, complex and manual.
The good news is we can help!
With 1E you can deliver the software that your users want at the point of need, at any time, while achieving huge savings across your SCCM infrastructure and actively improving your network performance.
Distribute the largest software packages, even full OS images, during the working day, without affecting your business's use of the network.
Get software to the point of need reliably and in the fastest way possible, even to locations with poor connectivity and bandwidth limitations.
Easily extend your SCCM infrastructure to support remote locations, without the need for any distribution point or site servers.
- Design your ConfigMgr 2012 hierarchy with the absolute bare minimum DPs and Secondary sites
- Reduce the deployment timelines by 2/3rd of the traditional methods
- Improve your patching and software distribution success
- Operating System Deployment Process design
- WIM Creation
- Task Sequence design
- Operating System Deployment
- Deploy the right applications to end-users as part of the migration
- Eliminate unused software by replacing it with applications that will improve productivity
- Upgrade end-users machines with minimal disruption and at their convenience
- Rationalize your applications before remediating them
- Maximize and design your migration processes to deliver zero-touch integration
- Identify and fix infrastructure and client health issues
- Empower end-users to customize and deploy a new OS
- There will be minimal security updates for a limited time
- Any new vulnerabilities in Windows will leave you exposed
- Continued use of XP by businesses will attract the attention of hackers