Virtual Desktop Success in Healthcare
Upcoming SlideShare
Loading in...5
×
 

Virtual Desktop Success in Healthcare

on

  • 483 views

Achieving Virtual Desktop Success in Healthcare: Experts in healthcare IT discuss the ways you can accelerate virtualized desktop adoption, speed clinician access to Electronic Health Records (EHR), ...

Achieving Virtual Desktop Success in Healthcare: Experts in healthcare IT discuss the ways you can accelerate virtualized desktop adoption, speed clinician access to Electronic Health Records (EHR), and enhance desktop performance and user experience. Delivering compliant and high performing clinician workspaces depends on creating a consistent desktop experience and remediating bottlenecks that impact performance and user productivity.

This webinar will show you how to deliver "lean" clinician workspaces and assure high levels of user satisfaction:
. Best practices to leverage and pitfalls to avoid when deploying VDI in a hospital
. Architect a virtual workspace that meets your organization's requirements
. Gain total performance visibility of all IT domains to improve user experience
. Preemptively detect and resolve issues before users are effected
. Optimize current infrastructure usage

Statistics

Views

Total Views
483
Views on SlideShare
483
Embed Views
0

Actions

Likes
0
Downloads
36
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • The RES Software mission statement is how we keep all parts of our nationally diverse employee base aligned with both our history as a company and our future direction.
  • What’s going on today in the world of IT? We see three macro trends that are re-shaping IT as we know it.Consumerization of IT. Technology users are accustomed to having IT within easy reach. Smart phones and tablets being used for personal use, are now being used more and more in our professional lives. People appreciate the experience they have with consumer technologies, and they want to see this same level of satisfaction with their enterprise technologies (for example, email, Dropbox, intranet, etc.).Cloud based technologies. IT departments are no longer delivering all IT services themselves. The movement towards the cloud is real and sustained into our future. But the cloud raises other concerns, not the least of which are security and compliance. Tackling the cloud demands another way of thinking for IT. Where we used to deliver IT purely from a technical perspective, we now see that we must have better ways of delivering IT in the future. We need to shift our frame of reference from providing technology, to providing IT in a service-oriented way.Hybrid End User Computing. The two before-mentioned trends are driving an additional trend. Hybrid IT is a fact. Not too many years ago, the pundits were predicting a full-scale transition from traditional rich client infrastructures to virtual desktops. The reality is different. Virtual desktops are growing, but they’re only a part of the picture – and still a relatively small one. The reality is, desktop infrastructures aren’t transitioning from one model to another – they’re hybrid. This isn’t happening because it’s easier for IT to maintain: quite the opposite. But it’s an outcome of what IT users are demanding. Our users want to work everywhere, from multiple devices, and they want the ability to be online 24/7.These trends have a powerful impact on daily IT operations.While it keeps our users satisfied, Hybrid IT adds complexity. We need to maintain these complex infrastructures – but it’s costing us more maintenance hours, which forces more IT resources into daily operations and away from other, more strategic projects. This makes us less flexible and less responsive to IT users. As a result, they’re looking to “shadow IT” or “user IT” solutions like Dropbox and Gmail. Shadow IT solutions are cloud-based consumer solutions used for professional work – but outside of IT’s control, and often at risk of security and compliance.We see the costs of IT going up. We’ve never had to be more cost aware than today, so this is a struggle for almost every IT manager or CIO. Each year, IT is asked to do more with less – when technologies are becoming more complex, and IT’s ability to control the consumption of technology is being reduced.The 24/7 access from any device in combination with shadow IT solutions gives us big headaches when it comes to compliance and security of our enterprise data environment. And compliance and data security are not optional; they’re “do or die” for IT.At some level, it’s an exciting time to be in IT because so much is changing, including very fundamental changes. But these same changes are making our jobs riskier, more difficult, and much more demanding.That’s why RES Software is here to help.Footnotes with sources for the above information:1 "In 2008, there were 4bn mobile subscriptions," said Ericsson's chief executive, Hans Vestberg. "By 2017 there will be close to 9bn subscriptions. With this kind of mobility and connectivity everywhere, there will be no differentiation between a business user and a private user.” (http://www.guardian.co.uk/business/2012/jun/06/more-mobile-devices-people-five-years)1 From Forrester Research (http://blogs.forrester.com/simon_yates/12-10-03-the_anytime_anywhere_iworker?cm_mmc=RSS-_-IT-_-71-_-blog_397&utm_content=Forrester+Blogs&utm_source=twitterfeed&utm_medium=linkedin)2From Citrix, as reported in “Silicon Republic” (http://www.siliconrepublic.com/cloud/item/29390-cloud-working-in-2020-five)3 From Gartner, Inc.’s “Desktop Total Cost of Ownership: 2011 Update” study, 16 November 2010.4 From The Ponemon Institute’s 6th annual U.S. Cost of a Data Breach study of U.S. based companies (2010); sponsored by Symantec Corporation. “Employee negligence” and “lost or stolen devices” caused 41% and 35% of breaches respectively. (http://www.symantec.com/about/news/release/article.jsp?prid=20110308_01&om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2011Mar_worldwide_costofdatabreach)
  • The way people work today has been transformed.We moved away from uniform PC usage (which was the de facto standard just 10 years ago) to a complex mix of different application delivery technologies. Today we want access to enterprise IT services 24/7 from any location, and a traditional PC simply does not support this. To achieve this highly flexible way of working, IT must use the hybrid application delivery models discussed earlier. The result is, without dismissing legacy application delivery methods, we must introduce many new and more flexible technologies to deliver IT services in many situations; and this has led to much more complex environments for IT to manage.In short, our customers tell us (and we’ve seen with our own eyes) that new technologies often don’t replace other technologies. Instead, as new devices are rolled out, each one brings along its own management tools, one more layer of complexity to the infrastructure. And IT is forced to come up with solutions for managing this increasingly complex environment.
  • Managing these environments has become not just complex, but costly as well. The traditional device-centric way of managing IT doesn’t work anymore. IT has grown too complex and costly to be managed in a traditional way. This statement is backed up by analyst reports from, among others, Forrester.
  • Throughout her day Ann uses over 6 different computing devices. Som are fixed in her nursing station or office. But some are mobile including the iPad she brought from home.Ann starts her shift by sitting in her nurses station in the ER. She accesses her e-mail through the outlook client. Types up a report using word and accesses Cerner to look at a patient’s medical records. Uh – Oh. The boys from Emergency 51 just brought in a critical case to Rampart. Ann signs out of her desktop and rushes into the ER. In the ER Ann taps into the shared COW with her SSO badge. She launches cerner app as a hosted session through XenApp and starts working on the medical records. She is immediately productive because her state has been preserved with RES WSM. The critical case is over. The patient is moved to recovery and the foreign object placed into OFR box.Ann leaves the ER and goes to the recovery ward. In the patients room she taps in and is restored to her session. She decides to print the medical record and is redirected to the correct printer for her real time location even though her hosted session is in the data center.Ann then wips out her iPad and access her hosted cerner through citrix receiver. But wait, Ann is getting hungry. So she starts to head down to the café. As Ann travels the corriders her WiFi access point changes and RES detects she is traveling towards the café. In real time her access to sensitive apps and data is throttled back. But alternately her access to Facebook and twitter are allowed in her hosted session.Reverse at the end of her break.
  • So what is Context awareness?RES Workspace Manager allows us to provide the User with access to the right services based upon four main elements:IdentityLocationDeviceand TimeCLICK FOR SERVICESWorkspace Manager is a Desktop Management tool that provides the User with access to the approriate services for them to be able to do their job.The Services are their applications, access to data, the correct printer and finally the user settings.User settings are the bits that make my desktop my own – access to MY mailbox, not someone else’s, customized shortcuts, colour schemes and all the others tweaks that I make that allows me to be at my most productive!CLICK FOR CONTEXTThe Unique thing about RES Workspace Manager is the way in which we can provide access to the right services based upon the Context of the UserBy Context, I mean Who am I, Where am I, What am I and When am ICLICK FOR SECURITYAnd finally, in a world where Compliance, Auditability and Governance are of paramount importance, it is essential that we put a security wrapper around everything.My users are empowered to work within the confines imposed by the business and are unable to stray beyond them.CLICK FOR WORKSPACEIf we can achieve this, then we can transform a Static Desktop into a fully managed Workspace!
  • Defining Context Rules ensures that Users have access to the right applications, data, printers and settings based upon their identity, location, device type and time of dayNetwork LocationOS TypeApplication VersionUSB StorageHardware Specification
  • From a single, intuitive management console, IT Professionals can provide a User access to the correct applications, data, and other services they need to do their job
  • Add pain callout
  • Add benefit callout
  • Need to update bullets and image?

Virtual Desktop Success in Healthcare Virtual Desktop Success in Healthcare Presentation Transcript

  • PresentersBrian Diamond (LANStatus)Sean Donahue (RES Software)Krish Chandra (eG Innovations)Virtual DesktopSuccess in Hospitals:Achieve HighPerforming, Consistent andCompliant Clinician Desktops
  • Virtual Desktops Considerations ForHospitalsBrian DiamondCEOLANSTATUS, LLCBrian.Diamond@Lanstatus.com
  • LANStatus Overview• Founding member of Trusted Healthcare InformationSolutions Alliance (THISA, recently renamed AvitasPartners• Citrix Managed Gold Partner, VMWare EnterprisePartner, Microsoft NSI Virtualization and SystemsManagement partner• Virtual Bench for Citrix Consulting Services• Client Engagements in Healthcare, FinancialServices, Insurance, Manufacturing, Media, Legal, Government and Education
  • Healthcare Experience• Hospitals and Healthcare as an industry is unique• HIPAA Compliance and meaningful use• Bring your own devices (BYOD) impact onenvironment• Improving the quality of patient care
  • Vendor Overview• RES Software will show the day in the life of the enduser and how their software is an enabler that allowsclinicians to either see more patients, or spend moretime with existing patients by simplifying theirworking experience• eG Innovations will show how proactivemanagement assists systems administrators inachieving a highly available, highly scalableinfrastructure
  • Improving the Quality of Patient Care• Eliminate downtime• Reduce performance slow downs• Provide Location based printing• Create an easier user experience• Faster delivery of applications and desktopsIn the end, it is about the patient, not the computinginfrastructure.
  • How To Achieve ConsistentClinician DesktopsSean DonahueSenior Director, Alliance MarketingRES SoftwareS.Donahue@ressoftware.com
  • 8The RES Software MissionTo make IT organizations 10X more productive atdelivering IT services and managing user workspaces.We do this by developing technology that:• Creates value and makes a difference forIT organizations• Unlocks the full potential of IT people• Drives superior IT operational efficiency
  • 9Ever Feel You Need to be Cloned?• Healthcare: 6.4• Finance: 4.3• Insurance: 3.4• Technology:3.2About How Many Devices Do You Use a Day?
  • IT Trends & ChallengesCloud-basedTechnologiesHybrid End-UserComputingConsumerizationof ITMacro TrendsWorkstylesDevicesApp DeliveryWorkers will average5 network-connected devicesper day by 2020(2) Citrix, Reported in Silicon Republic35% of applications arebrowser-based, and eitherthin or hosted(3) Gartner, Inc.12M people use at least 3connected devices and 7applications, from 3locations each month(1) Source: Forrester ResearchIT Impact TrendsProductivity LossesCompliance BreachesRising IT Labor Costs$7.2 millionaverage cost per data breach(4) Ponemon Institute$1,586 to $3,757lost productivity per year percorporate desktop(3) Gartner, Inc.$686 to $872annual cost of managingcorporate desktop(3) Gartner, Inc.IT Challenges
  • The Growing Impact on ITIs managingIT gettingtoo complexand costly?Traditional Apps &PC LifecycleManagement SystemsTask Workers& Desktop PCsVirtualized &Streamed AppsKnowledge Workers& LaptopsVirtual &Remote DesktopsMobile Workers& Tablet PCsCloud-Based Apps &Mobile DeviceManagementRemote/Home OfficeWorkers & smart phonesApp Delivery &ManagementUser Workstyles &Devices
  • “Client virtualizationdoes not replacephysical PCs, butinstead adds significantinfrastructure andcosts, creating a hybridenvironment of bothphysical virtualdesktops… traditionaldatacenter or PC-centric approachesbreak down.”- David KJohnson, ForresterResearch, Inc. 2012The Growing Impact on ITApp Delivery &ManagementUser Workstyles &DevicesTraditional Apps &PC LifecycleManagement SystemsTask Workers& Desktop PCsVirtualized &Streamed AppsKnowledge Workers& LaptopsVirtual &Remote DesktopsMobile Workers& Tablet PCsCloud-Based Apps &Mobile DeviceManagementRemote/Home OfficeWorkers & smart phones
  • Corporate IT Meets Consumer IT
  • But Wait! There’s More• It’s not just about the data• How are your users going to work on thatdata?• 20% of my time is spent on “My Apps”• 80% of my time is spent on Corporate Apps(We hope.)
  • CernerMy Productivity AppsMy Mobile AppsMDM MAM MIM EMM MOMMY!!Angry Birds is NOT a Productivity App
  • Let’s Look at a Day in the Life of Ann…Data CenterCernerThis is Ann, our life-savingregistered nurse
  • 08:00 – 09:00Ann starts hermorning routine atthe nurses’ station.
  • 09:00 – 11:00• Ann dashes to the ER and accesses her Workstation-on-Wheels• She’s able to login fast. Very fast.• She’s immediately productive with a consistent user experience• She launches a virtual desktop containing the EHR application• She enjoys Dynamic Print and Device RedirectionSuddenly,Roy and Johnnyburst intoRampart with acriticalER patient!
  • And by 9:04 Ann is Ready to Save a Life
  • 11:00 – 12:15The critical emergency is now happily resolved…• Ann follows her patient to the recovery ward• Ann uses her tablet to launch a VDI session• Consistency and control are her keys tohappiness• Along with Roy & Johnny, who are now backat Station 51
  • 12:15 – 13:00• But wait! Ann gets hungry. She decides tochange out of her scrubs and grab a snack.As she leaves the patient ward, herworkspace dynamically adjusts to herlocation.• When she changes Wi-Fi accessspots, the EHR app is dynamicallyrestricted• Access to sensitive patient data is nowsecurely revoked• But her Facebook account is nowallowedThanks IT!
  • How Do You Solve this Epidemic?• Healthcare: 6.4• Finance: 4.3• Insurance: 3.4• Technology:3.2
  • Context Awareness
  • Location and Device AwarenessExamples:• Network location• OS type• Access Type• Application version• USB storage• Hardware spec• Wi-Fi hot spot
  • Enterprise Class Management• Singlemanagementconsole• Lightweightarchitecture• Just a fewclicks away
  • What Do We Conclude?Combine a solid EMMplan with WorkspaceVirtualization and giveyour users the blingwithout the sting.
  • How To Achieve HighPerforming, Clinician DesktopsKrish ChandraDirector, Solution EngineeringeG Innovationskrishk@eginnovations.com
  • About eG Innovations eG Innovations dramatically simplifies and acceleratesperformance management across mission-critical virtual, cloudand physical IT environments Only eG Innovations award-winning root-cause diagnosistechnology can automatically pinpoint performance issues byauto-correlating the user’s service experience with theunderlying infrastructure and application components Deliver exceptional performance, user productivity, and ROIWorldwideLocationsNew York, New Jersey, Boston, Chicago, Los Angeles, Dallas, Austin,Singapore, London, The Hague, ChennaiCustomers Over 1,000 customers worldwideAwards& Recognition
  • VDI Performance AssuranceVirtualizationDesktopBrokersandSupportSystemsPerformancemanagement for VDI isextremely unique as youneed a solution thatcombines multipledifferent performancemanagementmethodologiesVDI
  • MonitorVDIService, notSilosDeepVisibilityintoSessionsVDI Performance AssuranceRight-Sizefor GreatROIMonitorUsers,Not JustVMsPreemptiveDetection& Alerting
  • MonitorVDIService, notSilosDeepVisibilityintoSessionsRight-Sizefor GreatROIMonitorUsers,Not JustVMsPreemptiveDetection& AlertingVDI Performance Assurance
  • VDI is slowVDI is notworkingVDI freezesoftenUsers care about the “service”The CPU usage ofthe VMware serversis ok.The DNS servers areresponding well toqueries.IT operations teams focuson infrastructure silosThis disconnect is a threat to the success of transformational ITinitiatives & the promise of agility, scalability, and cost savings!The User / IT ManagementDisconnectMonitorVDIService, notSilosMonitor the VDI Service, Not Silos
  • Know whenuser access isslowingMonitorVDIService, notSilosMonitor the VDI Service, Not Silos
  • Get 360o VisibilityKnow which tiersare working andwhich are not.MonitorVDI Service,not SilosVirtual Server Monitoring Solutions cannot give you 360o visibility.They focus on the virtualization platform only.
  • Monitor Every Layer, Every TierThe VMs looks fine. vCenterdoes not show any alert.There is an alert indicatingan issue within the virtualdesktop.The hypervisor looks fine.MonitorVDIService, notSilos
  • Monitor Every Layer, Every TierOops – there is 26%retransmission fromthe virtual desktopMonitorVDIService, notSilos
  • Automatic Root-Cause DiagnosisRoot-causeThe effect of the problemDeep visibility into every layer, every tier, & service-basedcorrelation enable rapid/accurate diagnosis of performance issues.MonitorVDIService, notSilos
  • MonitorVDIService, notSilosDeepVisibilityintoSessionsVDI Performance AssuranceRight-Sizefor GreatROIMonitorUsers,Not JustVMsPreemptiveDetection& Alerting
  • Know usage patterns and trends for effective capacity planningand load distribution.Plan Based on Usage ReportTop users, Top applicationsRight-Sizefor GreatROI
  • Get More Out of Your InvestmentTrack user sessions on each serverRight-Sizefor GreatROIA few of the serversare handling most ofthe sessions
  • Right-Sizefor GreatROIKnow How to Invest WidelyFind your VDI bottlenecks
  • MonitorVDIService, notSilosDeepVisibilityintoSessionsVDI Performance AssuranceRight-Sizefor GreatROIMonitorUsers,Not JustVMsPreemptiveDetection& Alerting
  • Preemptive Detection & AlertingBroad Coverage Deep Insights- LUN queue length- VM CPU Ready- TCP Retransmissions- Memory leaks- Profile sizesVirtualPhysicalCloudStorage ApplicationNetworkDatabaseVirtualizationIt is important to have the right metricsLook for domain expertise in VDI, collect the right metrics.Otherwise, it will be a case of “Garbage in, Garbage out”!PreemptiveDetection& Alerting
  • Preemptive detection & alerting lets administratorssee and fix problems before users noticeAuto-Baseline Key Metrics• Auto-compute time-of-day baselines• Alert administrators when metrics violate baselinesPreemptiveDetection& Alerting
  • PreemptiveDetection& AlertingThe domain server goes down, pulling down the VDI service. Why?Event history provides a clue …A Preemptive Alerting ExampleReal-World ScenarioThe domainserver has failedand rebooted.5 hours earlier, a pro-active alert aboutmemory leak!
  • MonitorVDI Service,not SilosDeepVisibilityintoSessionsVDI Performance AssuranceRight-Sizefor GreatROIMonitorUsers,Not JustVMsPreemptiveDetection& Alerting
  • Monitor Users, Not Just VMs• Workload of the VM is user-dependent• When a user complains, need to know whichphysical server and VM they are on• Need to know who the top users are forcapacity planning• User information required for billing, capacityplanningPoor user experience impacts VDI success.So focus on monitoring users, not just VMs!MonitorUsers, notjust VMs
  • Monitor Users, Not Just VMsKnow which ESX/Xen serverhe/she is logged on toMonitorUsers, notjust VMsWhen a usercalls, search for theuser
  • Monitor Users, Not Just VMsSee all the other userslogged on to the sameESX/Xen host.See performance issues at the user level so you can fixand right-size your VDI environment for user satisfaction.MonitorUsers, notjust VMs
  • MonitorVDIService, notSilosDeepVisibilityintoSessionsVDI Performance AssuranceRight-Sizefor GreatROIMonitorUsers,Not JustVMsPreemptiveDetection& Alerting
  • Deep Visibility Into SessionsCPU usage inside avirtual desktop is highDeepVisibilityintoSessions
  • Deep Visibility Into SessionsThe top CPU process isWindows Media Player.The user is watching amovie DeepVisibilityintoSessionsAccelerate problem resolutionby understanding why a VM is consuming resources.
  • MonitorVDIService, notSilosDeepVisibilityintoSessionsVDI Performance AssuranceRight-Sizefor GreatROIMonitorUsers,Not JustVMsPreemptiveDetection& Alerting
  • “Dramatically simplify andaccelerate VDI performancemanagement.Deliver peakperformance, usersatisfaction and ROI.”VDI Performance Assurance BenefitsVDIPerformanceAssuranceIT ProductivityHigherserviceuptimeSimplicityUser SatisfactionCost control & ROI
  • &
  • Next StepsMore Detailswww.lanstatus.com | www.ressoftware.com | www.eginnovations.comContact Us+1.203.459.0488Brian.Diamond@lanstatus.comRES Software+1.781.626.0582S.Donahue@ressoftware.comTwitter:@Seando40eG Innovations (US)+1.732.794.1259webinar@eginnovations.com