Book Image

Intelligent Automation with VMware

By : Ajit Pratap Kundan
Book Image

Intelligent Automation with VMware

By: Ajit Pratap Kundan

Overview of this book

This book presents an introductory perspective on how machine learning plays an important role in a VMware environment. It offers a basic understanding of how to leverage machine learning primitives, along with a deeper look into integration with the VMware tools used for automation today. This book begins by highlighting how VMware addresses business issues related to its workforce, customers, and partners with emerging technologies such as machine learning to create new, intelligence-driven, end user experiences. You will learn how to apply machine learning techniques incorporated in VMware solutions for data center operations. You will go through management toolsets with a focus on machine learning techniques. At the end of the book, you will learn how the new vSphere Scale-Out edition can be used to ensure that HPC, big data performance, and other requirements can be met (either through development or by fine-tuning guidelines) with mainstream products.
Table of Contents (20 chapters)
Title Page
About Packt
Contributors
Preface
Index

Workspace ONE Intelligence


Workspace ONE Intelligence has capabilities to better leverage the Workspace ONE platform with data-based actions and resolution from a single repository. Users want to access their corporate data and applications from anywhere on any device. Security tools are not able to take care of end user requirements and security risks in a proactive way in the current environment. Customers can't get complete insight into device, application, and user data due to the always-changing perimeter ( Location of End User's Device ) which creates big cybersecurity threats and complicates the management task.

Every organization has to take care of their employees as well as not compromise security. Employee productivity is affected by application execution issues and irregular services. It will be affected by frequent changes in application access by reducing privileges. We have to find a way around security and user's productivity and avoid a complicated management process by using...