As part of a Windows Vista rollout we were set the challenge of deploying to over 8000 diverse users. This presentation recommends using user profiling and directing the correct technologies to the right user groups.
Office Worker<br />These users are always connected to the corporate network and expect a rich client experience that can handle the broad range of tasks for which they are responsible. They use applications such as Microsoft Office and various line-of-business (LOB) applications that run on the local computer. <br />These users include analysts, architects, researchers, and doctors.<br />
Mobile Worker<br />These types of users are highly mobile due to travel requirements, and frequently work outside the corporate network. They use a variety of applications that usually run locally on their mobile computer and, therefore, require a rich computing experience. These users need to be able to access applications and data offline, but also carry a higher risk of loss of data if their computer is lost or stolen. <br />These users include sales people and account executives.<br />
Task Worker<br />These users perform a narrow set of tasks and use systems that are connected to the corporate network. Task workers usually do not have a dedicated desktop computer; instead, they leverage a pool of designated computers to access one or a few applications. <br />These users include call-center analysts, warehouse workers, and retail employees. <br />
Contract Worker<br />These users are vendor or contract staff, often software developers, who perform a broad set of activities that require significant access to the local operating system. They work on corporate-owned intellectual property, but might be physically outside the realm of IT control. They typically use applications such as software development suites, testing tools, and project management tools. <br />These users include software developers and contingent staff.<br />
Access from Home<br />This usage scenario is for non-mobile employees who are not able to get to the office and need access to their personalized computer work environment, including applications and data. The IT department needs to ensure that corporate data remains protected and that the computing environment remains well controlled.<br />