Your SlideShare is downloading. ×
Thin Client Computing In The Steady State
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Thin Client Computing In The Steady State

967
views

Published on

HDI Motown January 2010 Meeting

HDI Motown January 2010 Meeting

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
967
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Alliance Technology Solutions Thin Client Computing In The Steady State February 12, 2010
  • 2. Today’s Speakers
    • Ellen Bourke – Senior Account Manager
    • 20 Years as Value Added Reseller providing Strategic Solutions for Automotive, Enterprise, and Commercial Accounts. Focused on Servers, Storage, Backup, DR, BC, and Virtualization (Storage and Servers).
    • 10 Years prior as System Engineer
    • Joe Dylewski – Professional Services
    • Spent last 8 years managing a professional services organization which provided infrastructure support and managed, professional services
    • Served as IT Director – implemented a 55 site Citrix deployment – 800 users
    • Implemented Citrix across 5 sites in Europe
    • Led migration from Novell/Windows Environment to Thin Client/Citrix nFuse Environment
  • 3. Moving from where they were “ complex legacy” to where they need to be “ virtual & simple” infrastructure Not Done Yet
  • 4. Other Considerations
    • Backup
    • Disaster Recovery
    • Business Continuance
    • Security
    • Software Distribution
    • Desktop Refresh
    • Server Life Cycle Planning
    • Software License Auditing
    • Requirements Gathering Phase
    • Laptop Lockdown
    • Archival
    • Compliance
    • Power Consumption Reductions
  • 5. Backup Strategies
    • Central Data Store
    • Image Management
      • Client Images
      • Server Images
    • Strategy for disjoint data
    • Cloud Computing
    • Data “Deduplication”
  • 6. Disaster Recovery/Business Continuity
    • Update Disaster Recovery Plan
      • Redefine “Disaster”
      • Image Management
      • Test DR Plan
    • Business Continuity
      • Virtualization provides for more flexible BC execution
  • 7. Security
    • Physical
      • Data may be kept completely non-portable
      • Develop Policies
    • Process
      • New User Additions/Changes/Removal
      • Archival of complete environment
    • User
      • Policy control allows for as much or as little user flexibility as desired
        • Remember what causes the majority of desktop issues
  • 8. Software Distribution
    • Central Installation
    • License Audit and Control
      • Understand license restrictions of each software
    • Creation of Application Profiles
    • Each application has a data storage strategy
    • Local vs. Central
    • Always remember the O/S
  • 9. Hardware Life Cycle Planning
    • Focus on Server Refreshes
      • New Technology creates opportuities for performance improvement
    • Low Cost Client Refresh
      • Less Frequent
      • Low Cost
    • Continued evolution to Cloud Computing
      • Data Consolidation and Efficiency Diligence
  • 10. Application Development Life Cycle
    • Design
      • Consider virtual desktop in Requirements Phase
    • Build and/or Configure
      • Code and database interfaces must be developed with Thin Client computing environment in mind
    • Quality Assurance
      • Performance testing
      • Application Verification and Validation
    • Production
      • Constant Performance Monitoring
  • 11. Laptop Lockdown
    • Local Installations
    • Complete Virtualization
    • Hybrid
      • Dual profiles
        • Local Profile
        • Central Profile
  • 12. Archival
    • Information is universally recognized as the key business asset, essential to a business’ success
    • Centralization of data allows a company to apply corporate policies
      • Consistently across a wide range of content types
      • Establish information retention policies
    • Implementation of life-cycle management
    • Allows reduction of amount of data backed-up daily
  • 13. Compliance
    • eDiscovery
    • Prudent Readiness
    • Move from reactive to proactive mode
    • Identify
    • Collect
    • Preserve
    • Analyze
    • Classify
    • Review
    • Produce Information when Requested
  • 14. Power Consumption Reductions
    • Reduction from the journey to thin client terminals
    • Software Controlling remaining Laptops and PCs
    • SAN power options
    • Power Management within VMware vSphere 4
  • 15. In Conclusion
    • Develop Complete Long Term Strategic Plan
    • Calculate ROI on all Aspects of all Projects
    • Prioritize Projects
    • Create Roadmap
    • Execute