FULLY MANAGED DEVOPS FOR WINDOWS PCs, SERVERS, AND VDI. Yes, really.
Why do I need this?
It seems impossible to set up and maintain computers in an ideal state; secure and always in compliance with your standards.
It’s time for a new approach.
The days of imaging, task sequences, packaging, deployment targeting, and dependency logic are coming to an end. Imagine having all this work done for you, flawlessly, by-the-book, and without replacing your existing infrastructure.
How does it work?
aiden combines a massively scalable managed service for automating IT tasks, Desired State Configuration, Natural Language Processing, a proprietary AI for emulating IT decision making, and a universal integration mechanism for deployment tools.
For everyone else:
We are an extension of your IT team, providing automation experts who deliver solutions and their experience through an exceptionally smart utility, called aiden.
The aiden Patch | Update Implementation and Deployment Guide
This is a step-by-step guide for how to deploy patches and updates with our aiden service and utility.
Each step is executed by one of the following roles clarified below:
aiden Service – Our technical support team of engineers aiden.exe (aiden Utility) – Our intelligent DevOps for Windows software aiden Downloader – How we sync our environment with yours Customer IT Team – Your IT team Customer’s Deployment Tool – Your deployment tool
aiden Implementation and Deployment Diagram
aiden Service: Onboarding call
The first step of the aiden service is to understand and document your company standards, roles, software needs, configurations, etc. We standardize all of this into a plain-English format that is easy for everyone to understand. If needed, your team also can modify aiden’s configuration, but we usually do this for you.
Customer IT Team: Tell us what software and hardware is needed
List of hardware models to support
List of system configurations (departments) and desired software
List of language packs to install for each AD site and/or build option
Customer IT Team: Find or create a file server for aiden’s content (repository)
One or more physical or virtual servers inside your network for hosting all content from aiden, including application packages, similar to a distribution point. While running on an endpoint, aiden.exe finds the nearest available repository for downloading packages. We recommend using a Windows server for the built-in PXE boot service designed for Windows deployments.
aiden Service: Write corporate standards document
We write your hardware and software standards, and your department-specific configurations, in an easy-to-read document. This document is also aiden’s configuration file because we built Natural Language Processing (NLP) into aiden.
aiden Service: Build and test packages, Windows deployments
Your subscription includes a full application packaging service. We custom-build each package for your environment and thoroughly test it in our labs. Example packages:
Utility packages: Windows updates, Adobe updates, hardware vendor updates, and more
Firmware & BIOS updates
Language packs & Regional settings
Tasks: encrypting hard drive, start layout config., set app defaults, and more
aiden Downloader: Update customer repository with content
A private and secure continuous file synchronization tool maintains all content from aiden on as many repositories as you like in your network.
Customer IT Team: Load aiden.exe into deployment tool
aiden.exe is a package, and can be deployed silently through any deployment tool. This one package determines every other needed package for the endpoint, downloads them, and installs them in the correct order.
Customer IT Team: Schedule aiden.exe for target computers
Use your deployment tool’s scheduling functions to decide when and how often to run aiden.exe. Like any other package, aiden.exe can be scheduled for a phased deployment. e.g., pilot computers first, then production 1 week later.
Customer’s Deployment tool: Run aiden.exe on target computers
Depending on your schedule, the deployment tool runs aiden.exe on all targeted computers. aiden.exe returns status codes to your deployment tool like any other package would.
aiden.exe: Is device patched & compliant with your standards?
When aiden.exe runs, it scans your computers and compares it with your policy document.
The computer is already up to date, aiden.exe leaves the computer untouched and returns a success code to the deployment tool.
aiden.exe: Build a plan to bring computer into compliance
aiden.exe combines Desired State Configuration, Natural Language Processing, and a proprietary AI for emulating IT decision-making to compare each computer’s state with your corporate standards document. It uses this data to build a plan to bring the computer into compliance and then begins executing the plan, taking into account dependencies and order of installation.
aiden.exe: Download & run packages to perform all tasks.
aiden.exe is a very small, lightweight, and portable application designed to use minimal system resources. We take great care to avoid interrupting end-users, and aiden.exe informs deployment tools when any process is unsafe to perform, and should be retried later. It sequentially downloads and installs a package to perform each task, which may include installing, removing, patching, updating, reconfiguring…anything. Some examples include:
Application look and feel
User profile customization
Complex application swapping, removals, and cleanup
aiden.exe: Device in full compliance
Since aiden.exe is not an agent, it leaves the machine when it’s done.
aiden.exe: Silent mode?
It exists, returns a status code to deployment tool, and is deleted by deployment tool. The deployment tool will collect deployment metrics, receiving a status code to generate a compliance report.
aiden.exe displays a status report on screen in English.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.