Sessions

BrainShare sessions vary from technical labs to big-picture discussions that will help you plan for the future. No matter what you need to learn, you’ll find plenty to fill your schedule at BrainShare 2014.


Novell Sessions

Novell ZENworks Patch Management Design, Deployment and Configuration Best Practices Patch Tuesday still giving you headaches? You can now use Novell ZENworks® Patch Management as a standalone product to help you patch your Windows or Linux systems up to 13 times faster than the industry average. This session gives you the tips, tricks and inside information to successfully deploy and troubleshoot ZENworks Patch Management and achieve its true potential.

Novell ZENworks Mobile Management Design, Deployment and Best Practices Using ZENworks Mobile Management to manage your Android and iOS devices? If so, this is the session for you. This session lets you check out what's new in ZENworks Mobile Management and discover the best practices for managing these devices.

Introduction to Novell ZENworks Application Virtualization ZENworks Application Virtualization 11 makes it easy to package most Windows applications in a virtual bubble that helps prevent conflicts, reduces testing and even allows multiple versions of the same application to run on the same machine. What’s more, with features like ZENworks Application Virtualization Server and desktop application containers, it is easier than ever to deploy and secure your applications. Come see what ZENworks Application Virtualization can do for you today and get a sneak peak of the next generation, featuring OS-X application virtualization.

Novell ZENworks Configuration Management Design, Deployment and Best Practices Boosting IT productivity by 45 percent might seem magical, but IDC found Novell ZENworks Configuration Management did just that for organizations. Have you deployed the automation and streamlining abilities of ZENworks Configuration Management in your environment? Are you thinking about it now? Come to this session to learn how to design and deploy ZENworks Configuration Management the right way, right away.

Advanced Application Management with ZENworks Configuration Management and Bundle Commander Novell ZENworks Configuration Management makes it easy to manage the setup, updating, healing and migration of desktops from a central location. Roel van Bueren will use real-life examples to demonstrate how to create and configure Windows bundles to deploy most common applications from vendors like Adobe, Apple, Autodesk, Google, Microsoft and Novell using Bundle Commander and Novell ZENworks Configuration Management.

Enforcing Complex Security Infrastructures using ZENworks Endpoint Security Management Policies Managing security for a large enterprise is a complex task. Even with the hierarchical object management in ZENworks Endpoint Security Management, there are many variables to take into account, as not all your users or devices should be treated equally. Exceptions will probably become your main headache. Learn how to work your way into a hierarchical security policy design that enables you to easily enforce these complex security environments.

Novell ZENworks—Present and Future Roadmap Come check out the future of the ZENworks product line. Learn how the next-generation ZENworks products will integrate mobile management capabilities and reinvigorate the ZENworks Asset Management product capabilities. Hear from the ZENworks Product Management team about what's coming and how you can make a difference.

Tips and Tricks from the Field – Success with Upgrading to GroupWise 2014 In this session, we will discuss what we have learned from the field in performing upgrades to Novell GroupWise® 2014. We will go over common problems and how to overcome problematic upgrades. We will also discuss how to use the command line utility GWADMINUTIL to perform troubleshooting.

Novell iPrint Architecture This session discusses the new architecture for Novell iPrint, with properties like highly-scalable, high-performance components that are fail-safe. The new architecture can also auto-discover and auto-configure. It uses the latest technologies available and provides a high–performance, slim appliance that you can deploy with ease. The entire architecture is service-based and is future-proof to include newer versions of services as technology improves.

Novell Filr Enterprise Deployment Guidelines This session covers the process used by Novell Consulting to deploy Filr in large customer environments. This includes planning and architecture and some of the pitfalls that may come with scaling Filr to large numbers of users.

NetIQ Sessions

Identity Manager Tips and Tricksannually one of the most popular sessions, updated with the latest releases

Customer case studieslessons learned from real-world deployments.

Successfully Deploy Salesforce for Users and ITAttachmate Group successfully deployed Salesforce using NetIQ Access Manager and CloudAccess to create a great user experience and simplify things for IT.

Attachmate Sessions

Automating Attachmate Terminal Emulation Client Updates with Novell ZENworks Windows-based desktop applications aren’t easy for large enterprises to centrally administer and update. Security policies require all applications that handle sensitive data be updateable in close to real-time, so there’s a real need to update these desktop applications. Attachmate and Novell are proud to announce integration between traditional Attachmate terminal emulation products and Novell ZENworks Patch Management. This session will show you how to use these enterprise technologies to keep Attachmate Extra!, Reflection and InfoConnect products healthy and secure.

Using a Modern Directory to Manage and Secure Legacy Host Access Most modern networks use LDAP groups to control access to enterprise applications, but legacy host “green screen” applications aren’t usually part of that network. This session shows you how to put a layer in front of the host so only authorized people can access the data in your legacy systems. Best of all, you don’t have to make changes to the host itself—rather, you use the existing enterprise directory to do what it’s already doing in the rest of your network.

Optimizing the User Experience when Accessing Legacy Host Applications from Any Mobile Device A number of technologies enable users to access legacy host applications from mobile devices, but the user experience is far from optimal. Entering data into host application fields is cumbersome, leading to input errors and frustrated users. This session will show you how to use Reflection 2014 TouchUx, which gives users a look and feel they’re comfortable with while they use legacy host applications. In addition, administrators can leverage Microsoft and Citrix central management features to manage Reflection from a single location.

Enabling Your Host Applications to Live in the Modern World of Security and Regulation Today’s computing environment is an alphabet soup of regulatory mandates, mostly related to security. Whether you’re talking about data at a lower layer in the stack or on a display in a host application, protecting that sensitive information from prying eyes has become a high priority. This session will cover the basics of leveraging the data protection capabilities in Reflection 2014 so you can ensure your enterprise’s mission-critical host data is not compromised.

Everything Old is New Again: X Windows and Modern Network Architectures The X Windows system may predate Free BSD and Microsoft Windows 1.0, but X Windows continues to thrive. The core X11 protocol is mature, but the methods for delivering, managing and securing X sessions have changed radically. This session explores the advantages of three-tier X Windows architectures, including collaboration and sharing of X sessions; persistence of X sessions so users can leave a running session and rejoin it from a different device; fault tolerance; high performance over high-latency networks; and centralized management and security.

Configuring and Using a Three-Tier X Windows Deployment Modern X Windows products enable administrators and users to enjoy the benefits of advanced three-tier architectures, including session persistence for disconnected users, collaboration and sharing, fault tolerance, high performance for remote users, and centralized management and security. This session will cover the basics of deploying, configuring and using a three-tier X Windows architecture. The session builds on the concepts introduced in the 100-level session, Everything Old is New Again: X Windows and Modern Network Architectures.

Pre-BrainShare Advanced Technical Training Sessions

Pre-Conference Hands-On Training

Creating a Customized USB Thumb Drive for ZCM Imaging Instructor: Rich Hanley
9:00 a.m. to 5:00 p.m. (Mountain Time)
$700.00

Course Description Learn the techniques required to create a customized version of the Novell ZENworks Configuration Management (ZCM) imaging distribution that can be booted from a USB thumb drive. You will learn how to modify the system resource files of the bootcd_tntfs.iso file to include a custom imaging menu that launches your custom bash imaging scripts. This customized ISO file can then be used by the ZENUsbcreator utility introduced in ZENworks Configuration Management 11 SP3, to create a bootable USB thumb drive that contains your modifications to the ZCM imaging distribution.

This session focuses on the procedure required to build a customized USB thumb drive for ZCM imaging. It is not intended to teach you how to develop your own bash imaging scripts. The scripts that you will be including on your thumb drive have been developed for you. (Note: Novell Training Services offers a three day on-line course entitled “Leveraging Scripted Imaging in ZENworks Configuration Management.” This course teaches the bash scripting language and how to use it for imaging purposes.)

Intended Audience This session is designed for those ZCM network administrators and engineers who are responsible for deploying images to users’ desktops and laptops. This session will be especially useful for those administrators:

• Who desire to use their standard corporate images for small remote or branch office locations that don’t have ZCM Imaging Satellite Servers

• Or, those administrators who simply want a highly portable imaging solution to carry around in their pocket

Prerequisites The student should have the following experience and skills prior to attending this session:

• Has supported Windows 7 workstations in a networked environment

• Has experience using the ZENworks Control Center

• Understands the basics of ZCM imaging. This includes understanding ZCM imaging related terminology such as: Preboot Bundles, Hardware Rules and ZMG files

• Understands the basic differences between imaging a PXE-enabled workstation and imaging a workstation using a bootable CD

NetIQ Identity Manager 4.02 Enhancement Pack Instructor: Mark Forsey
9:00 a.m. to 5:00 p.m. (Mountain Time)
$700.00

Course Description NetIQ Identity Manager 4.02 is a bundle of new enhancements including:

• Identity Manager Home; New UI for all permission requests and approvals

• Identity Manager Catalog Administrator; New management interface for resource and Roles

• Entitlement Permission Onboarding; Creates resources automatically in User Application. Resources can be assigned through the publisher channel

• Identity Manager Access Review; Perform a review on employee’s permissions and accounts

This one-day training session includes a lecture and a hands-on lab to prepare you for implementing these technologies in a production environment

Intended Audience This session is for customers and partners who currently have IDM 4.x implemented or are planning an implementation of IDM 4.02.

Those who have not seen these new enhancements will be particularly interested in the ease of implementation as well as the ease of creating and administering things like role-based entitlements.

Prerequisites The student should be knowledgeable about:

• Administration of an IDM 4.0 implementation

• The use of such tools like Designer, iManager and the User Application

• The basics of IDM and the concepts of entitlements and role-based provisioning

 

© 2014 Attachmate Group Inc.

Share: