SlideShare a Scribd company logo
1 of 20
1
Business Client Refresh
By- Mohit patodiya
2
• Spend smart
• Do more
• Be more secure
• Manage PCs
more efficiently
Buy Now
to keep your TCO
at
a minimum
Buy Mobile
to be more
productive by
accessing data
on the go
Buy Intel®
vPro™
Technology
to keep your
business running
efficiently
and securely
3
Spend
smart
Do more
Be more
secure
Maintain PC refresh rates to avoid increased software/hardware support costs.
• Average support costs of older PCs can rise 59% in year 41
• Recoup your investment in an Intel vPro technology-based notebook or desktop in
as little as 10 months2
Intel vPro technology offers proactive security solutions
• On average, 4-year old PCs can experience a 53% increase in
yearly security incidents1
• Up to 94 percent faster time to patch saturation5
Increase employee productivity by deploying more notebooks
• 51 additional minutes more productive per day by going mobile3
• 82% of employees are increasingly required to access enterprise
applications while away from office3
Manage
PCs more
efficiently
Intel vPro technology supports remote management solutions
• Up to 91% reduction in software related desk-side visits4,5
• Up to 83% less unintended PC downtime due to software issues4,5
• Conduct hardware and software inventory up to 95% faster than manually per PC5
Refreshing PCs in 2009
4
Australian Business is changing
• We’re Online. In the past two years network
interactions have increased by 300%; emails
by 400% and online content has grown
exponentially.1
• We’re Mobile & Borderless. Australians are
embracing converged applications with voice,
video and data, and new working practices
that enable them to collaborate and connect
in more ways and from more places.
• We’re facing sustainability & IT reform.
Shareholders, customers and government are
requiring, if not, mandating sustainable IT.
• Security threats increasing and very
costly. One incident costs as much
as US$300k3
and are 53% more likely
on a 4-year-old PC.4
5
Security incidents per year Can be 53% less likely to experience a
security incident1
Maintenance cost per year Operational costs up to 50% lower1
Productivity
Time to zip a file while moving a file
from PowerPoint* to OneNote 2007
Desktop: 3min 1sec Desktop: 1min 8 sec – 2.6x faster2
Energy efficiency Desktop: 100.9 watts
Notebook: 33 watts
Desktop: 66 watts – 35% better
Notebook: 20.3 watts – 35% better3
Overall Sysmark* score Desktop: Score of 59 Desktop: Score of 178 – 3x faster4
Video encoding for web upload Desktop: 3 min 35 sec
Notebook: 2 min 8 sec
Desktop: 1min 20 sec – 2.6x faster
Notebook: 1min 39 sec – 1.3x faster5
E8500P4 630 P8600T2700
Today’s ModelsPrevious Generation
Can your PCs meet these challenges?
Older PCs can increase cost, security exposure and risk while lowering overall productivity
6
Refreshing 3-year-old PCs makes good business sense
Spend Smart
50%REDUCTION
OPERATIONAL COSTS
TO MAINTAIN PCS1
Do more
3xFASTER
MULTI-TASKING2
Be more
secure
Up to 53%avg
INCREASE IN YEARLY
SECURITY INCIDENCES
WITH A 4 YEAR OLD PC1
Manage PCs
more effectively
91%REDUCTION IN
SOFTWARE RELATED
DESKSIDE VISITS5
Fast ROI
Intel Core™ 2 Duo PCs
17 Month
Recoup Investment3
As
low as
Up to
Up to
Faster ROI
Intel vPro Technology PCs
10 Month
Recoup Investment4
As
low as
7
Spend smart
• Operational costs to maintain
4-year-old PCs are nearly
double that of a new PC1
• After 3 Years, it is less
expensive to buy new PCs
than maintain old ones1
• Newer PCs are far more
energy-efficient and can
provide substantial power
savings
• Energy costs can be reduced
up to 50% by powering down
IntelvPro technology enabled
PCs during off hours2
8
After 3 Years, it is less expensive to buy new PCs
than maintain old ones1
Mobile and Desktop PCs in
Year 4 cost 59% more to support
than in Year 1, due to:
• Software deployment failures
(security patches, applications,
operating systems) which are
the largest component of rising
PC support costs
• Hardware related help desk calls
(including diagnose and repair
and hard disk failures)
9
Estimated Annual Energy
Savings Per PC
Actual Customer Savings
Newer PCs are far more energy-efficient
and can provide substantial power savings
• A managed desktop with
an LCD consumes 80% less
energy than a 3-year-old
desktop with a CRT
• A managed notebook
consumes 96% less energy.
1. Unmanaged Intel Pentium® D processor 945 with CRT
2. Unmanaged Intel Pentium D processor 945 with LCD
3. Unmanaged Intel Core 2 Duo processor E7200 with LCD
4. Managed Intel Core 2 Duo processor E7200 with LCD
5. Managed Intel Core 2 Duo processor T9400 mobile platform
10
Do More
• New desktops are over 3.6x
faster at multitasking1
• New desktops can run a
spreadsheet and a virus scan at
the same time 6.7x faster1
• New notebooks can run a
spreadsheet and a virus scan at
the same time 1.3x faster1
• Mobile users are
51 additional minutes more
productive per day2
11
E8500
202
Over 3.6x faster!
P4 630
54.8
Multitasking with
office productivity
applications1
(higher is better)
Run complex
spreadsheets while
running a virus scan2
(lower is better)
55 seconds
6.7x faster!
6 min. 13 sec.
Encode 4
(<1 minute) HDV video
clips for YouTube*3
(lower is better)
1 min. 20 sec.
2.6x faster!
3 min. 35 sec.
Please Note: system configuration information found in the legal pages of this document
New desktops can help improve productivity,
saving time and money
12
New notebooks can help improve productivity,
saving you time and money
P8600
1 min. 45 sec.
1.2x faster!
T2700
2 min. 8 sec.
Run complex
spreadsheets while
running a virus scan1
(lower is better)
Encode 4 (<1 minute)
HDV video clips
for YouTube* 2
(lower is better)
1 min. 39 sec.
1.3x faster!
2 min. 8 sec.
Run Word* +
Powerpoint* and
virus scan3
(lower is better)
1 min. 50 sec.
1.3x faster!
2 min. 24 sec.
Please Note: system configuration information found in the legal pages of this document
13
Forrester Consulting found that
on average mobile users are
51 additional minutes more
productive each day.
They also found that companies
deploying notebooks achieved:
• better employee productivity
• faster response times
• more informed decisions
• a competitive advantage for customer facing employees
• a reduction in support costs for remote and home based workers
People are more productive with notebooks
14
Intel Platforms are ready for Windows* 7
Intel platforms deliver outstanding energy-efficient performance to run
the new Microsoft Windows 7 Operating System
Mobile Desktop Netbook
StarterEnterprise / Professional
Ultimate / Home Premium
Enterprise / Professional
Ultimate / Home Premium
=
15
Be More Secure
• 4-year old PC can experience
53% more annual security
incidents then it did in its first
year1
• Using Intel vPro technology you
can reduce security exposure
from days to hours7
Calgary Health
• Increase confidence in PC
inventories and audits with up to
99% accuracy8
Telkomsel
16
Source: Ponemon Institute/PGP Corporation – “2008 Annual Study: US Cost of Data Breach“
New PCs help combat the expense of security threats
• The cost of computer security incidents for Australian businesses
in 2007 was estimated at between $595 million and $649 million
• 30 percent of large businesses were affected by a computer
security breach.
• The average loss due to computer security incidents was $17,578
for large businesses.
• The most commonly reported type of computer security incident
involved viruses and malicious code attacks (64%). Of those
businesses affected, 40 percent reported corruption of hardware
or software.
Australian Institute of Criminology (AIC)
17
PCs in years 4, 5, and 6+ experience a 53%, 87%, and 120% increase
respectively in the number of security incidents per year compared to year 1.
0%
20%
40%
60%
80%
100%
120%
140%
Year 1 Year 2 Year 3 Year 4 Year 5 Year 6+
Security Incident Rate Increases
Faster Each Year of PC Life
% Increase in Security Incidents Compared to Year 1 Linear Increase
Older PCS are more prone to security attacks
• Older PCs have
less sophisticated
hardware and
software systems
to protect against
attacks.
• Newer anti-virus
software runs better
on the latest PCs.
18
Manage your PCs
more efficiently
• Intel vPro technology can
reduce the costs of managing
PC fleets with its remote
management capabilities.
• Up to 91% reduction in software
related desk-side visits4,5
• Up to 83% less unintended PC
downtime due to software
issues4,5
• Conduct hardware and software
inventory up to 95% faster than
manually per PC5
19
Savings per Intel vPro Technology
PC per Year1 Mobile PC Desktop PC
Application Deployment Cost Reduction 45 101
Patch Deployment Cost Reduction 71 94
Manual Hardware Malfunction Resolution Cost Reduction 20 8
Manual Software Malfunction Resolution Cost Reduction 34 101
Audit & Inventory Failure Resolution Cost Reduction 14 10
Security Failure Resolution Cost Reduction 3 3
TOTAL 187 317
Model company potential savings of >$5M1
$
$
$
$
$
$
$
$
$
$
$
$
$
$
20
Legal Disclaimer
• INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL®
PRODUCTS. NO LICENSE, EXPRESS OR
IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT.
EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY
WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL®
PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE,
MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL
PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS.
• Intel may make changes to specifications and product descriptions at any time, without notice.
• All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
• Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to
deviate from published specifications. Current characterized errata are available on request.
• Any code names featured are used internally within Intel to identify products that are in development and not yet publicly announced for
release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion or
marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user
• Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate
performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may
affect actual performance.
• Intel, Intel Inside, and the Intel logo are trademarks of Intel Corporation in the United States and other countries.
• *Other names and brands may be claimed as the property of others.
• Copyright © 2009 Intel Corporation.

More Related Content

What's hot

Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Business continuity management (case study)
Business continuity management (case study)Business continuity management (case study)
Business continuity management (case study)Wissam Abdel Baki
 
2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"Gene Kim
 
SWEATING THE ASSET HOW IMPROVING THE HEALTH AND PERFORMANCE OF YOUR PCS CAN E...
SWEATING THE ASSET HOW IMPROVING THE HEALTH AND PERFORMANCE OF YOUR PCS CAN E...SWEATING THE ASSET HOW IMPROVING THE HEALTH AND PERFORMANCE OF YOUR PCS CAN E...
SWEATING THE ASSET HOW IMPROVING THE HEALTH AND PERFORMANCE OF YOUR PCS CAN E...1E: Software Lifecycle Automation
 
Design a systematic monitoring, evaluating and updating
Design a systematic monitoring, evaluating and updatingDesign a systematic monitoring, evaluating and updating
Design a systematic monitoring, evaluating and updatingLeonel Rivas
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsThe TNS Group
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisationsmrmwood
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationAndrew Miller
 
Hostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiHostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiIRJET Journal
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation Adlan Hussain
 
6 computer systems
6 computer systems6 computer systems
6 computer systemshccit
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?NetMotion Wireless
 
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Internetwork Engineering (IE)
 

What's hot (20)

Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
ISM BCP Case study
ISM BCP Case studyISM BCP Case study
ISM BCP Case study
 
NiTO Ebook
NiTO EbookNiTO Ebook
NiTO Ebook
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Business continuity management (case study)
Business continuity management (case study)Business continuity management (case study)
Business continuity management (case study)
 
2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"
 
SWEATING THE ASSET HOW IMPROVING THE HEALTH AND PERFORMANCE OF YOUR PCS CAN E...
SWEATING THE ASSET HOW IMPROVING THE HEALTH AND PERFORMANCE OF YOUR PCS CAN E...SWEATING THE ASSET HOW IMPROVING THE HEALTH AND PERFORMANCE OF YOUR PCS CAN E...
SWEATING THE ASSET HOW IMPROVING THE HEALTH AND PERFORMANCE OF YOUR PCS CAN E...
 
Design a systematic monitoring, evaluating and updating
Design a systematic monitoring, evaluating and updatingDesign a systematic monitoring, evaluating and updating
Design a systematic monitoring, evaluating and updating
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPs
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Hostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiHostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using Wifi
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation
 
6 computer systems
6 computer systems6 computer systems
6 computer systems
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?
 
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
 

Viewers also liked

the computer generations
the computer generationsthe computer generations
the computer generationsMohit Patodia
 
Programa International Review of Bipolar Disorders Sevilla 2013
Programa International Review of Bipolar Disorders Sevilla 2013Programa International Review of Bipolar Disorders Sevilla 2013
Programa International Review of Bipolar Disorders Sevilla 2013infobipolar
 
Clasicos de bolsillo : Plutarco - Vidas paralelas 2
Clasicos de bolsillo : Plutarco - Vidas paralelas 2Clasicos de bolsillo : Plutarco - Vidas paralelas 2
Clasicos de bolsillo : Plutarco - Vidas paralelas 2Sito Yelas
 
Top 50 páginas paraenses
Top 50 páginas paraensesTop 50 páginas paraenses
Top 50 páginas paraensesYesbil
 
JOHN GREEN CV 3 (1)
JOHN GREEN CV 3 (1)JOHN GREEN CV 3 (1)
JOHN GREEN CV 3 (1)John Green
 
NextGen Portal for Your Organization
NextGen Portal for Your OrganizationNextGen Portal for Your Organization
NextGen Portal for Your OrganizationWaldek Mastykarz
 
Guía didactica del medio prezi final
Guía didactica del medio prezi finalGuía didactica del medio prezi final
Guía didactica del medio prezi finalsaramariajo
 
01 introduce to lego ev3 20140917
01 introduce to lego ev3 2014091701 introduce to lego ev3 20140917
01 introduce to lego ev3 20140917Jason Yang
 
Perfumes Mitológicos.
Perfumes Mitológicos.Perfumes Mitológicos.
Perfumes Mitológicos.Nausica
 

Viewers also liked (11)

the computer generations
the computer generationsthe computer generations
the computer generations
 
M1 07
M1 07M1 07
M1 07
 
Programa International Review of Bipolar Disorders Sevilla 2013
Programa International Review of Bipolar Disorders Sevilla 2013Programa International Review of Bipolar Disorders Sevilla 2013
Programa International Review of Bipolar Disorders Sevilla 2013
 
Clasicos de bolsillo : Plutarco - Vidas paralelas 2
Clasicos de bolsillo : Plutarco - Vidas paralelas 2Clasicos de bolsillo : Plutarco - Vidas paralelas 2
Clasicos de bolsillo : Plutarco - Vidas paralelas 2
 
Braves
BravesBraves
Braves
 
Top 50 páginas paraenses
Top 50 páginas paraensesTop 50 páginas paraenses
Top 50 páginas paraenses
 
JOHN GREEN CV 3 (1)
JOHN GREEN CV 3 (1)JOHN GREEN CV 3 (1)
JOHN GREEN CV 3 (1)
 
NextGen Portal for Your Organization
NextGen Portal for Your OrganizationNextGen Portal for Your Organization
NextGen Portal for Your Organization
 
Guía didactica del medio prezi final
Guía didactica del medio prezi finalGuía didactica del medio prezi final
Guía didactica del medio prezi final
 
01 introduce to lego ev3 20140917
01 introduce to lego ev3 2014091701 introduce to lego ev3 20140917
01 introduce to lego ev3 20140917
 
Perfumes Mitológicos.
Perfumes Mitológicos.Perfumes Mitológicos.
Perfumes Mitológicos.
 

Similar to intel ignite refresh_rmd

Decide what s_next_discussion_guide
Decide what s_next_discussion_guideDecide what s_next_discussion_guide
Decide what s_next_discussion_guideQRSintern
 
Decide what's next discussion guide
Decide what's next discussion guideDecide what's next discussion guide
Decide what's next discussion guideQRSintern
 
Kaseya Connect 2011 - Leveraging vPro (intel)
Kaseya Connect 2011 - Leveraging vPro (intel)Kaseya Connect 2011 - Leveraging vPro (intel)
Kaseya Connect 2011 - Leveraging vPro (intel)Kaseya
 
Sit future of_the_desktop
Sit future of_the_desktopSit future of_the_desktop
Sit future of_the_desktopSujit Ghosh
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideLaura Breese
 
TCO &amp; TVT
TCO &amp; TVTTCO &amp; TVT
TCO &amp; TVTLeoCurtis
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitNicole Waddell
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Techtechnext1
 
The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023Ben Mountain
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDNUG e.V.
 
Case study report (Memo)
Case study report (Memo)Case study report (Memo)
Case study report (Memo)Ali Shah
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationSylCotter
 
4.1-1 Plan conduct maintenance.pdf
4.1-1 Plan conduct maintenance.pdf4.1-1 Plan conduct maintenance.pdf
4.1-1 Plan conduct maintenance.pdfkingsleigh
 
Leveraging Mainframe Machine and Log Data in Splunk Analytics
Leveraging Mainframe Machine and Log Data in Splunk AnalyticsLeveraging Mainframe Machine and Log Data in Splunk Analytics
Leveraging Mainframe Machine and Log Data in Splunk AnalyticsPrecisely
 

Similar to intel ignite refresh_rmd (20)

Decide what s_next_discussion_guide
Decide what s_next_discussion_guideDecide what s_next_discussion_guide
Decide what s_next_discussion_guide
 
Decide what's next discussion guide
Decide what's next discussion guideDecide what's next discussion guide
Decide what's next discussion guide
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
Kaseya Connect 2011 - Leveraging vPro (intel)
Kaseya Connect 2011 - Leveraging vPro (intel)Kaseya Connect 2011 - Leveraging vPro (intel)
Kaseya Connect 2011 - Leveraging vPro (intel)
 
Sit future of_the_desktop
Sit future of_the_desktopSit future of_the_desktop
Sit future of_the_desktop
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
 
Simple Steps To Boost Sales
Simple Steps To Boost SalesSimple Steps To Boost Sales
Simple Steps To Boost Sales
 
TCO &amp; TVT
TCO &amp; TVTTCO &amp; TVT
TCO &amp; TVT
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Tech
 
The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023
 
BPOS sales deck
BPOS sales deckBPOS sales deck
BPOS sales deck
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Case study report (Memo)
Case study report (Memo)Case study report (Memo)
Case study report (Memo)
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
4.1-1 Plan conduct maintenance.pdf
4.1-1 Plan conduct maintenance.pdf4.1-1 Plan conduct maintenance.pdf
4.1-1 Plan conduct maintenance.pdf
 
Versiondog
VersiondogVersiondog
Versiondog
 
Leveraging Mainframe Machine and Log Data in Splunk Analytics
Leveraging Mainframe Machine and Log Data in Splunk AnalyticsLeveraging Mainframe Machine and Log Data in Splunk Analytics
Leveraging Mainframe Machine and Log Data in Splunk Analytics
 

More from Mohit Patodia

More from Mohit Patodia (12)

Services marketing mohit
Services marketing mohit Services marketing mohit
Services marketing mohit
 
C intro
C introC intro
C intro
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Android
AndroidAndroid
Android
 
Internet
InternetInternet
Internet
 
A quick introduction to c programming
A quick introduction to c programmingA quick introduction to c programming
A quick introduction to c programming
 
cloud computing
cloud computingcloud computing
cloud computing
 
first-applet
first-appletfirst-applet
first-applet
 
inheritance
inheritanceinheritance
inheritance
 
self motivate
self motivateself motivate
self motivate
 
role of it in supply chain mangment system
role of it in supply chain mangment systemrole of it in supply chain mangment system
role of it in supply chain mangment system
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

intel ignite refresh_rmd

  • 2. 2 • Spend smart • Do more • Be more secure • Manage PCs more efficiently Buy Now to keep your TCO at a minimum Buy Mobile to be more productive by accessing data on the go Buy Intel® vPro™ Technology to keep your business running efficiently and securely
  • 3. 3 Spend smart Do more Be more secure Maintain PC refresh rates to avoid increased software/hardware support costs. • Average support costs of older PCs can rise 59% in year 41 • Recoup your investment in an Intel vPro technology-based notebook or desktop in as little as 10 months2 Intel vPro technology offers proactive security solutions • On average, 4-year old PCs can experience a 53% increase in yearly security incidents1 • Up to 94 percent faster time to patch saturation5 Increase employee productivity by deploying more notebooks • 51 additional minutes more productive per day by going mobile3 • 82% of employees are increasingly required to access enterprise applications while away from office3 Manage PCs more efficiently Intel vPro technology supports remote management solutions • Up to 91% reduction in software related desk-side visits4,5 • Up to 83% less unintended PC downtime due to software issues4,5 • Conduct hardware and software inventory up to 95% faster than manually per PC5 Refreshing PCs in 2009
  • 4. 4 Australian Business is changing • We’re Online. In the past two years network interactions have increased by 300%; emails by 400% and online content has grown exponentially.1 • We’re Mobile & Borderless. Australians are embracing converged applications with voice, video and data, and new working practices that enable them to collaborate and connect in more ways and from more places. • We’re facing sustainability & IT reform. Shareholders, customers and government are requiring, if not, mandating sustainable IT. • Security threats increasing and very costly. One incident costs as much as US$300k3 and are 53% more likely on a 4-year-old PC.4
  • 5. 5 Security incidents per year Can be 53% less likely to experience a security incident1 Maintenance cost per year Operational costs up to 50% lower1 Productivity Time to zip a file while moving a file from PowerPoint* to OneNote 2007 Desktop: 3min 1sec Desktop: 1min 8 sec – 2.6x faster2 Energy efficiency Desktop: 100.9 watts Notebook: 33 watts Desktop: 66 watts – 35% better Notebook: 20.3 watts – 35% better3 Overall Sysmark* score Desktop: Score of 59 Desktop: Score of 178 – 3x faster4 Video encoding for web upload Desktop: 3 min 35 sec Notebook: 2 min 8 sec Desktop: 1min 20 sec – 2.6x faster Notebook: 1min 39 sec – 1.3x faster5 E8500P4 630 P8600T2700 Today’s ModelsPrevious Generation Can your PCs meet these challenges? Older PCs can increase cost, security exposure and risk while lowering overall productivity
  • 6. 6 Refreshing 3-year-old PCs makes good business sense Spend Smart 50%REDUCTION OPERATIONAL COSTS TO MAINTAIN PCS1 Do more 3xFASTER MULTI-TASKING2 Be more secure Up to 53%avg INCREASE IN YEARLY SECURITY INCIDENCES WITH A 4 YEAR OLD PC1 Manage PCs more effectively 91%REDUCTION IN SOFTWARE RELATED DESKSIDE VISITS5 Fast ROI Intel Core™ 2 Duo PCs 17 Month Recoup Investment3 As low as Up to Up to Faster ROI Intel vPro Technology PCs 10 Month Recoup Investment4 As low as
  • 7. 7 Spend smart • Operational costs to maintain 4-year-old PCs are nearly double that of a new PC1 • After 3 Years, it is less expensive to buy new PCs than maintain old ones1 • Newer PCs are far more energy-efficient and can provide substantial power savings • Energy costs can be reduced up to 50% by powering down IntelvPro technology enabled PCs during off hours2
  • 8. 8 After 3 Years, it is less expensive to buy new PCs than maintain old ones1 Mobile and Desktop PCs in Year 4 cost 59% more to support than in Year 1, due to: • Software deployment failures (security patches, applications, operating systems) which are the largest component of rising PC support costs • Hardware related help desk calls (including diagnose and repair and hard disk failures)
  • 9. 9 Estimated Annual Energy Savings Per PC Actual Customer Savings Newer PCs are far more energy-efficient and can provide substantial power savings • A managed desktop with an LCD consumes 80% less energy than a 3-year-old desktop with a CRT • A managed notebook consumes 96% less energy. 1. Unmanaged Intel Pentium® D processor 945 with CRT 2. Unmanaged Intel Pentium D processor 945 with LCD 3. Unmanaged Intel Core 2 Duo processor E7200 with LCD 4. Managed Intel Core 2 Duo processor E7200 with LCD 5. Managed Intel Core 2 Duo processor T9400 mobile platform
  • 10. 10 Do More • New desktops are over 3.6x faster at multitasking1 • New desktops can run a spreadsheet and a virus scan at the same time 6.7x faster1 • New notebooks can run a spreadsheet and a virus scan at the same time 1.3x faster1 • Mobile users are 51 additional minutes more productive per day2
  • 11. 11 E8500 202 Over 3.6x faster! P4 630 54.8 Multitasking with office productivity applications1 (higher is better) Run complex spreadsheets while running a virus scan2 (lower is better) 55 seconds 6.7x faster! 6 min. 13 sec. Encode 4 (<1 minute) HDV video clips for YouTube*3 (lower is better) 1 min. 20 sec. 2.6x faster! 3 min. 35 sec. Please Note: system configuration information found in the legal pages of this document New desktops can help improve productivity, saving time and money
  • 12. 12 New notebooks can help improve productivity, saving you time and money P8600 1 min. 45 sec. 1.2x faster! T2700 2 min. 8 sec. Run complex spreadsheets while running a virus scan1 (lower is better) Encode 4 (<1 minute) HDV video clips for YouTube* 2 (lower is better) 1 min. 39 sec. 1.3x faster! 2 min. 8 sec. Run Word* + Powerpoint* and virus scan3 (lower is better) 1 min. 50 sec. 1.3x faster! 2 min. 24 sec. Please Note: system configuration information found in the legal pages of this document
  • 13. 13 Forrester Consulting found that on average mobile users are 51 additional minutes more productive each day. They also found that companies deploying notebooks achieved: • better employee productivity • faster response times • more informed decisions • a competitive advantage for customer facing employees • a reduction in support costs for remote and home based workers People are more productive with notebooks
  • 14. 14 Intel Platforms are ready for Windows* 7 Intel platforms deliver outstanding energy-efficient performance to run the new Microsoft Windows 7 Operating System Mobile Desktop Netbook StarterEnterprise / Professional Ultimate / Home Premium Enterprise / Professional Ultimate / Home Premium =
  • 15. 15 Be More Secure • 4-year old PC can experience 53% more annual security incidents then it did in its first year1 • Using Intel vPro technology you can reduce security exposure from days to hours7 Calgary Health • Increase confidence in PC inventories and audits with up to 99% accuracy8 Telkomsel
  • 16. 16 Source: Ponemon Institute/PGP Corporation – “2008 Annual Study: US Cost of Data Breach“ New PCs help combat the expense of security threats • The cost of computer security incidents for Australian businesses in 2007 was estimated at between $595 million and $649 million • 30 percent of large businesses were affected by a computer security breach. • The average loss due to computer security incidents was $17,578 for large businesses. • The most commonly reported type of computer security incident involved viruses and malicious code attacks (64%). Of those businesses affected, 40 percent reported corruption of hardware or software. Australian Institute of Criminology (AIC)
  • 17. 17 PCs in years 4, 5, and 6+ experience a 53%, 87%, and 120% increase respectively in the number of security incidents per year compared to year 1. 0% 20% 40% 60% 80% 100% 120% 140% Year 1 Year 2 Year 3 Year 4 Year 5 Year 6+ Security Incident Rate Increases Faster Each Year of PC Life % Increase in Security Incidents Compared to Year 1 Linear Increase Older PCS are more prone to security attacks • Older PCs have less sophisticated hardware and software systems to protect against attacks. • Newer anti-virus software runs better on the latest PCs.
  • 18. 18 Manage your PCs more efficiently • Intel vPro technology can reduce the costs of managing PC fleets with its remote management capabilities. • Up to 91% reduction in software related desk-side visits4,5 • Up to 83% less unintended PC downtime due to software issues4,5 • Conduct hardware and software inventory up to 95% faster than manually per PC5
  • 19. 19 Savings per Intel vPro Technology PC per Year1 Mobile PC Desktop PC Application Deployment Cost Reduction 45 101 Patch Deployment Cost Reduction 71 94 Manual Hardware Malfunction Resolution Cost Reduction 20 8 Manual Software Malfunction Resolution Cost Reduction 34 101 Audit & Inventory Failure Resolution Cost Reduction 14 10 Security Failure Resolution Cost Reduction 3 3 TOTAL 187 317 Model company potential savings of >$5M1 $ $ $ $ $ $ $ $ $ $ $ $ $ $
  • 20. 20 Legal Disclaimer • INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS. • Intel may make changes to specifications and product descriptions at any time, without notice. • All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. • Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. • Any code names featured are used internally within Intel to identify products that are in development and not yet publicly announced for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion or marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user • Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. • Intel, Intel Inside, and the Intel logo are trademarks of Intel Corporation in the United States and other countries. • *Other names and brands may be claimed as the property of others. • Copyright © 2009 Intel Corporation.

Editor's Notes

  1. 1- Wipro Technologies, March 2009 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” http://communities.intel.com/docs/DOC-3053 2- Based on a Model Company developed by Wipro Technologies in a March 2009 study titled “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” (insert URL here). Actual results may vary based on the number of use cases implemented and may not be representative of the results that individual businesses may realize. For additional implementation examples refer to Intel Case Studies available at http://communities.intel.com/openport/docs/DOC-1494 3- “Increase Productivity by Providing Notebooks Beyond Road Warriors” Forrester Consulting, Oct. 2008 4 Intel vPro technology includes powerful Intel Active Management Technology (Intel AMT). Intel AMT requires the computer system to have an Intel® AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the management console or further integration into existing security frameworks to enable certain functionality. It may also require modifications of implementation of new business processes. With regard to notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see http://www.intel.com/technology/platform-technology/intel-amt/index.htm 5 Results shown are from the 2007 EDS Case Studies with Intel vPro processor technology, by LeGrand and Salamasick, 3rd party audit commissioned by Intel, of various enterprise IT environments. The studies compare test environments of Intel vPro processor technology equipped PCs vs non-Intel vPro processor technology environments. Tested PCs were in multiple OS and power states to mirror a typical working environment. Actual results may vary. The study is available at www.intel.com/vpro and www.eds.com.
  2. Key Points: Tremendous growth in internet uses worldwide has helped accelerate the build out of a connected world Business are taking advantage of this B2B is seeing high growth as business look to get more efficient, reduce cost and reach new customers Communicating both internally (sales, marketing training etc) and externally (customers) through video is now mainstream Businesses increasingly recognize the advantages of staying connected and productive through mobile computing 1. Telstra statistics, August 2008. 2 - http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiii_04-2008.en-us.pdf. (see page 46) 3 – CSI Computer Crime and Security Survey, 2008 http://www.gocsi.com/forms/csi_survey.jhtml 4 - Intel Corporation
  3. Wipro Technologies, March 2009 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” http://communities.intel.com/docs/DOC-3053 Multi-Tasking Productivity Multitasking workload zipping a file while moving another file from Powerpoint to OneNote. WinZip workload creates a zip file of approximately 110 MB in size. PowerPoint 2007 workload is a training manual with JPG images and consists of 24 slides and 3.9 MB in size. These slides are printed to OneNote 2007 using “Send To OneNote2007” virtual printer. Once it is imported to OneNote2007 it is very convenient for annotation purposes, the user can add notes and also search for text within images. Desktop P630 Configuration: Intel Pentium® 4 processor (2MB L2, 3.00GHz, 800MHz FSB), (P4P 630) HT-ON on D945GCL Dual channel DS Micron 1GB (2x512MB) DDR2-667 5-5-5-15 with Integrated 945G + Seagate 320GB NCQ SATA2 (BIOS:0034, INF: 8.4.0.1016, Graphics: 15.6.1.1437). Desktop E8500 Configuration: Intel Core™ 2 Duo E8500 (6MB L2, 3.16GHz, 1333MHz FSB), Intel Desktop DQ45CB Q45 Dual channel DS Micron 2GB (2x1GB) DDR2-800 5-5-5-18 with Integrated Intel X4500 graphics + Seagate 320GB NCQ SATA2 (BIOS:0059, INF: 9.0.0.1007, Graphics: 15.9.9.1527) Windows* Vista* Ultimate 32bit. Energy Cost EEP - EEP 2.0 methodology is built on six SYSmark* 2007 Preview runs per day. Standard benchmarking practice runs each benchmark three times and uses the median of the three runs. For illustrative purposes, however, we will use a single run. The key metrics for EEP 2.0 are performance, as represented by the SYSmark* 2007 score, and the average power draw. For more information on EEP, go to: http://www.intelcapabilitiesforum.net/EEP-page_all/. Sysmark SYSmark* 2007 preview is BAPCo&amp;apos;s latest version of the mainstream office productivity and Internet content creation benchmark tool used to characterize the performance of the business client. SYSmark 2007 preview features user-driven workloads and usage models developed by application experts. Desktop P630 Configuration: Intel Pentium 4 processor (2MB L2, 3.00GHz, 800MHz FSB), (P4P 630) HT-ON on D945GCL Dual channel DS Micron 1GB (2x512MB) DDR2-667 5-5-5-15 with Integrated 945G + Seagate 320GB NCQ SATA2 (BIOS:0034, INF: 8.4.0.1016, Graphics: 15.6.1.1437). Desktop E8500 Configuration: Intel Core 2 Duo E8500 (6MB L2, 3.16GHz, 1333MHz FSB), Intel Desktop DQ45CB Q45 Dual channel DS Micron 2GB (2x1GB) DDR2-800 5-5-5-18 with Integrated Intel X4500 graphics + Seagate 320GB NCQ SATA2 (BIOS:0059, INF: 9.0.0.1007, Graphics: 15.9.9.1527) Windows* Vista* Ultimate 32bit. 5. Video Encoding Time to encode 4 HDV clips into a video clip format for YouTube* using Windows Vista* Movie Maker. Windows Vista* MovieMaker to create a video and prepare it to share with others on YouTube. YouTube recommends uploading 320x240 resolution, 30fps, mpeg-4 format videos. The input files are four HDV video clips in dvr-ms format captured from an HD camcorder using MovieMaker*. The four clips in length are 57sec, 28sec, 24sec, and 30sec and their respective sizes are 181316KB, 87941KB, 77765KB and 95493KB. Including transitions, title page and credits, the output video is 2min 21sec and 62335KB in compressed 320x240, 30fps wmv (mpeg-4) format. Desktop Configuration: Same as multi-tasking. Notebook Configurations: Intel Core 2 Duo processor P8600 (2.4GHz, 3MB L2, 1066MHz FSB), Model: Lenovo T400 Type=2768-CTO, ID=6475W9D, Memory: Micron Technology 8JSF12864HY-1G1D1, 6-6-6-15, DDR3-1066, 2GB (2x1GB), HDD: Hitachi HTS723232L9A360 200GB, 7200RPM, Graphics: GM45, Mobile Intel 4 Series Express Chipset Family Graphic Ver.7.15.10.1502, Other: 14” LCD, Intel WiFi Link 5300, wireless, Battery – Sanyo 42T5262, 56WH, Windows Vista* Ultimate 32bit, Intel Core Duo processor T2700 (2.33GHz, 2M L2, 667MHz FSB), Model: IBM T60 (Lenovo 1951V4F), Memory: Micron Technology PC2-5300, 5-5-5-12-20, 2GB (2x1GB), HDD: Hitachi HTS721010G9S9SA00 100GB, 7200RPM, Graphics: Integrated Graphics (ver. 7.14.0010.1329) , Mobile Intel 945 Express Chipset Family (ver 8.1.1.1010), Other: 13.75” LCD, Intel PRO/Wireless 3945AB, Battery – Panasonic 92P1139, 56.16WH, Windows Vista* Ultimate 32bit
  4. 1- Wipro Technologies, March 2009 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” http://communities.intel.com/docs/DOC-3053 The new PC year 1 costs represent support costs associated with the PC.  The year 4 costs include both support costs as well as out of warranty repair costs.  The values for both support and out of warranty repair costs were calculated by Wipro as an average of the costs reported by the 106 companies interviewed for the Wipro Technologies paper.  Notebook year 1 (new PC) support costs = $716 Desktop year 1 (new PC) support costs = $433 Notebook year 4 support + out of warranty repair costs = $1136 + $348 = $1484 which is $768 higher than new PC ($768 = $1484-$716) Desktop year 4 support + out of warranty repair costs = $688 + $120 = $808 which is $375 higher than new PC ($375 = $808-$433) 2 - Multi-Tasking Productivity Multitasking workload zipping a file while moving another file from Powerpoint to OneNote. WinZip workload creates a zip file of approximately 110 MB in size. Powerpoint 2007 workload is a training manual with JPG images and consists of 24 slides and 3.9 MB in size. These slides are printed to OneNote 2007 using “Send To OneNote2007” virtual printer. Once it is imported to OneNote2007 it is very convenient for annotation purposes, the user can add notes and also search for text within images. Desktop P630 Configuration: Intel Pentium 4 processor (2MB L2, 3.00GHz, 800MHz FSB), (P4P 630) HT-ON on D945GCL Dual channel DS Micron 1GB (2x512MB) DDR2-667 5-5-5-15 with Integrated 945G + Seagate 320GB NCQ SATA2 (BIOS:0034, INF: 8.4.0.1016, Graphics: 15.6.1.1437). Desktop E8500 Configuration: Intel Core 2 Duo E8500 (6MB L2, 3.00GHz, 1066MHz FSB), Intel Desktop DQ45CB Q45 Dual channel DS Micron 2GB (2x1GB) DDR2-800 5-5-5-18 with Integrated Intel X4500 graphics + Seagate 320GB NCQ SATA2 (BIOS:0059, INF: 9.0.0.1007, Graphics: 15.9.9.1527) Windows* Vista* Ultimate 32bit. 3- Based on a Model Company developed by Wipro Technologies in a March 2009 study titled “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” (insert URL here). Actual results may vary and may not be representative of the results that individual businesses may realize. 4- Based on a Model Company developed by Wipro Technologies in a March 2009 study titled “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” (insert URL here). Actual results may vary based on the number of use cases implemented and may not be representative of the results that individual businesses may realize. For additional implementation examples refer to Intel Case Studies available at http://communities.intel.com/openport/docs/DOC-1494. 5 Intel vPro technology includes powerful Intel Active Management Technology (Intel AMT). Intel AMT requires the computer system to have an Intel AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the management console or further integration into existing security frameworks to enable certain functionality. It may also require modifications of implementation of new business processes. With regard to notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see http://www.intel.com/technology/platform-technology/intel-amt/index.htm 5 Results shown are from the 2007 EDS Case Studies with Intel vPro processor technology, by LeGrand and Salamasick, 3rd party audit commissioned by Intel, of various enterprise IT environments. The studies compare test environments of Intel vPro processor technology equipped PCs vs non-Intel vPro processor technology environments. Tested PCs were in multiple OS and power states to mirror a typical working environment. Actual results may vary. The study is available at www.intel.com/vpro and www.eds.com.
  5. 1- Wipro Technologies, March 2009 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” http://communities.intel.com/docs/DOC-3053 2 - University of Plymouth ROI case study http://communities.intel.com/openport/docs/DOC-1494
  6. Mobile acquisition cost modeled at non-vPro PC = $1100. Desktop acquisition cost modeled at non-vPro PC = $600 1- Wipro Technologies, March 2009 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” http://communities.intel.com/docs/DOC-3053
  7. The box on the left shows compares energy used by managed verses unmanaged PCs. The first 3 columns, labeled “Unmanaged PC Power Consumption,” represent energy used by a PC left running. The two columns on the right labeled “managed PC power consumption,” represent how much less power is consumed when PC power management is in use and the PC is powered off at night / weekends or put in a sleep state after periods of inactivity. Power management is one of the easiest vPro applications to deploy. It involves no changes at the helpdesk level and offers customer a payback from day one. Chart- System Configurations: Intel Pentium D Processor 945 (3.4GHz, 800MHz FSB, 2x2MB L2 Cache), with Intel 945G Chipset on Intel D945GPM board, Intel Chipset Software Installation File 8.1.1.1010, Dual Channel Micron* PC2-5300U 2x1GB of DDR2 667 5-5-5-15, Seagate* Barracuda* 320GB  NCQ SATA2 7200RPM, Windows* Vista* Ultimate RTM Build 6000 NTFS. Intel Core 2 Duo processor E7200 (2.33GHz, 1333MHz FSB, 4MB L2 Cache), Intel DQ45CB motherboard with Intel Q45 Express chipset; 1333MHz FSB, Intel integrated graphics, 2x1GB Micron* DDR2-667 5-5-5-15, Seagate* 320GB/16MB cache/7200rpm, Windows* XP* Professional with SP3. Intel Core 2 Duo processor T9400 (2.40GHz/4MB) with 2GB (1x1GB) Dual Channel DS Hynix* DDR2 667 5-5-5-15 memory on Lenovo* ThinkPad* T400, Intel GM45 Chipset (Intel Chipset 8.7.0); BIOS Default Setup, Intel Graphics Media Accelerator X4300 (Intel Integrated driver 14.37.0.5009) Resolution 1440x900x32-bit color, Hitachi* Travelstar HTS722020K9SA00 200GB 5400RPM SATA, AD v. 6250, Windows* XP Professional with SP3 build 6000, System Power Management Policy: AC/High, LCD Size:15.5” widescreen; Battery Capacity rated at 56 Watt-Hours Desktop display power draw values gathered from spec sheets of 10 models of each type of display (CRT and LCD). Assumed values are: CRT (95W active, 5W asleep), LCD (55W active, 5W asleep) Energy Cost: 8.65 cents/KWh, which is the U.S. average for industrial and commercial customers as of December, 2008. Source: U.S. Department of Energy, http://www.eia.doe.gov/cneaf/electricity/epm/table5_6_a.html Intel EEP methodology is described here: http://www.intelcapabilitiesforum.net/EEP/ Performance tests/ratings are provided assuming specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. This data may vary from other material generated for specific marketing requests. CO2 reduction amount calculation: assume 1.54 lbs. of CO2 per KWh (source: US Department of Energy, http://www.eia.doe.gov/cneaf/electricity/page/co2_report/co2report.html) Performance tests/ratings are provided assuming specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. This data may vary from other material generated for specific marketing requests.
  8. Windows* 7 is coming out and a higher end PC will offer the best user experience, will be the easiest to upgrade, and will provide the hardware capabilities to take full advantage of Windows 7 features New compute models such as Dynamic Virtual Client take advantage of hardware capabilities built only into higher end and Intel vPro technology PCs, so if these models are being considered, be sure that the PC that’s purchased can meet the needs Performance is needed more than ever Rich media content becoming more important in business environment High-def monitors require faster processors to display content Multitasking continues to be important 1. SYSmark* 2007 2-“Increase Productivity by Providing Notebooks Beyond Road Warriors” Forrester Consulting, Oct. 2008
  9. Data Sources: 1 - E8500 Configuration: Intel Core 2 Duo E8500 (6MB L2, 3.16GHz, 1066MHz FSB), Intel Desktop DQ45CB Q45 Dual channel DS Micron 2GB (2x1GB) DDR2-800 5-5-5-18 with Integrated Intel X4500 graphics + Seagate 320GB NCQ SATA2 (BIOS:0059, INF: 9.0.0.1007, Graphics: 15.9.9.1527) Windows* Vista* Ultimate 32bit. P4 630 Configuration: Intel Pentium 4 processor (2MB L2, 3.00GHz, 800MHz FSB), (P4P 630) HT-ON on D945GCL Dual channel DS Micron 1GB (2x512MB) DDR2-667 5-5-5-15 with Integrated 945G + Seagate 320GB NCQ SATA2 (BIOS:0034, INF: 8.4.0.1016, Graphics: 15.6.1.1437). Workload/Test: SYSmark*2007 overall combined score. E-Learning The user views a presentation directing the production of a web based interactive training tool. The user edits a variety of images, in bitmap and vector graphics formats, making visual quality changes, resizing and saving to new formats for use in the training material. The user creates a PDF file of a group of images, and an image is converted from bitmap to vector graphics format. The user completes the training tool by importing the edited images, as well as previously created audio and video clips. The user publishes the resulting tool in a web compatible format. Video Creation A user processes a variety of content to create a video. The user edits a group of images, making visual quality changes, resizing and saving them to new formats. The user encodes multiple videos for use in creating a final composite video. All of the separate pieces are assembled, creating a final uncompressed video. From this uncompressed video, two versions with different amounts of compression are created. One, targeted for downloading, with less compression, the other targeted for streaming, with more compression. Productivity The user opens a file and searches, the document for a keyword. The user continues the search in an e-mail application. The user archives the entire inbox, before sending a new e-mail. The user opens spreadsheets to perform iterative data analysis. While performing this analysis, documents and email data are compressed into a single file. Opening a presentation, the user imports slides from another presentation along with a spreadsheet. Returning to the spreadsheet, the user organizes the data and formats the data for readability. The user opens a project management tool, performing data management tasks before creating a web format based copy of the schedule. 3D Modeling The user opens a 3D model, rendering it out to a high-resolution image. The user opens an architectural scene, exporting the scene to a different 3D modeling format. The user then renders an animated flyby of the scene. 2 - Configurations: Same as footnote 1. Workload: Excel – Number Crunch. The workload is execution of approximately 28,000 sets of calculations using the most commonly used calculations and functions in Microsoft* Excel*. These include common arithmetic operations like addition, subtraction, division, rounding and square root. It also includes common statistical analysis functions such as Max, Min, Median and Average. The input file is a 6.2 MB spreadsheet. 3 - Configurations: Same as footnote 1. Workload: Time to encode 4 HDV clips into a video clip format for YouTube* using Windows Vista* Movie Maker. Windows Vista* MovieMaker to create a video and prepare it to share with others on YouTube. YouTube recommends uploading 320x240 resolution, 30fps, mpeg-4 format videos. The input files are four HDV video clips in dvr-ms format captured from an HD camcorder using MovieMaker*. The four clips in length are 57sec, 28sec, 24sec, and 30sec and their respective sizes are 181316KB, 87941KB, 77765KB and 95493KB. Including transitions, title page and credits, the output video is 2min 21sec and 62335KB in compressed 320x240, 30fps wmv (mpeg-4) format. 4 - Energy Efficient Performance - EEP 2.0 methodology is built on six SYSmark* 2007 Preview runs per day. Standard benchmarking practice runs each benchmark three times and uses the median of the three runs. For illustrative purposes, however, we will use a single run. The key metrics for EEP 2.0 are performance, as represented by the SYSmark* 2007 score, and the average power draw. For more information on EEP, go to: http://www.intelcapabilitiesforum.net/EEP-page_all/.
  10. 1 - P8600 Configuration: Intel Core 2 Duo processor P8600 (2.4GHz, 3MB L2, 1066MHz FSB), Model: Lenovo T400 Type=2768-CTO, ID=6475W9D, Memory: Micron Technology 8JSF12864HY-1G1D1, 6-6-6-15, DDR3-1066, 2GB (2x1GB), HDD: Hitachi HTS723232L9A360 200GB, 7200RPM, Graphics: GM45, Mobile Intel 4 Series Express Chipset Family Graphic Ver.7.15.10.1502, Other: 14” LCD, Intel WiFi Link 5300, wireless, Battery – Sanyo 42T5262, 56WH, Windows Vista* Ultimate 32bit. T2700 Configuration: Intel Core Duo processor T2700 (2.33GHz, 2M L2, 667MHz FSB), Model: IBM T60 (Lenovo 1951V4F), Memory: Micron Technology PC2-5300, 5-5-5-12-20, 2GB (2x1GB), HDD: Hitachi HTS721010G9S9SA00 100GB, 7200RPM, Graphics: Integrated Graphics (ver. 7.14.0010.1329) , Mobile Intel 945 Express Chipset Family (ver 8.1.1.1010), Other: 13.75” LCD, Intel PRO/Wireless 3945AB, Battery – Panasonic 92P1139, 56.16WH, Windows Vista* Ultimate 32bit. Workload: The workload is execution of approximately 28,000 sets of calculations using the most commonly used calculations and functions in Microsoft* Excel*. These include common arithmetic operations like addition, subtraction, division, rounding and square root. It also includes common statistical analysis functions such as Max, Min, Median and Average. The input file is a 6.2 MB spreadsheet 2 - Configurations: Same as footnote 1. Workload: Time to encode 4 HDV clips into a video clip format for YouTube* using Windows Vista* Movie Maker. Windows Vista* MovieMaker to create a video and prepare it to share with others on YouTube. YouTube recommends uploading 320x240 resolution, 30fps, mpeg-4 format videos. The input files are four HDV video clips in dvr-ms format captured from an HD camcorder using MovieMaker*. The four clips in length are 57sec, 28sec, 24sec, and 30sec and their respective sizes are 181316KB, 87941KB, 77765KB and 95493KB. Including transitions, title page and credits, the output video is 2min 21sec and 62335KB in compressed 320x240, 30fps wmv (mpeg-4) format. 3 - Configurations: Same as footnote 1. Workload: go to http://www.intel.com/performance 4 - Energy Efficient Performance - EEP 2.0 methodology is built on six SYSmark* 2007 Preview runs per day. Standard benchmarking practice runs each benchmark three times and uses the median of the three runs. For illustrative purposes, however, we will use a single run. The key metrics for EEP 2.0 are performance, as represented by the SYSmark* 2007 score, and the average power draw. For more information on EEP, go to: http://www.intelcapabilitiesforum.net/EEP-page_all/.
  11. A recent Forrester study found: 82% agreed or strongly agreed that they are increasingly requiring the use of access to enterprise applications while away from their desks 81% of companies found that the benefits of improving employee mobility have equaled or exceeded the investment their company has made to date 71% agreed or strongly agreed that employees are working in increasing distributed groups 65% agreed or strongly agreed that the number of mobile employees is increasing faster than the number of non-mobile employees 1- Forrester Consulting: Increased Productivity By Providing Notebooks Beyond The Road Warriors http://governmentsecurity.bitpipe.com/detail/RES/1239220213_575.html
  12. 1 – Based on a Model Company developed by Wipro Technologies in a March 2009 study titled “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” http://communities.intel.com/docs/DOC-3053 Actual results may vary based on the number of use cases implemented and may not be representative of the results that individual businesses may realize. For additional implementation examples refer to Intel Case Studies available at http://communities.intel.com/openport/docs/DOC-1494. 7 – Calgary Health Region ROI case study http://communities.intel.com/openport/docs/DOC-1494 8 – Telkomsel ROI case study http://communities.intel.com/openport/docs/DOC-1494
  13. Media Release09 June 2009 Computer security breaches affected 14 percent of Australian businesses in 2007 at a cost of more than $600 million, according to the latest report from the Australian Institute of Criminology (AIC). The Australian Business Assessment of Computer User Security (ABACUS) report was released today to coincide with the Australian Federal Police&amp;apos;s High Tech Crime Conference in Sydney.AIC Principal Criminologist Dr Russell Smith said the report was based on a national survey of 4,000 small, medium and large businesses conducted by the Institute to determine their experience of computer security incidents.&amp;quot;The cost of computer security incidents for Australian businesses in 2007 was estimated at between $595 million and $649 million, while businesses spent as much as $1.95 billion on computer security measures,&amp;quot; Dr Smith said.Eight-five percent of businesses reported using one or more computer security tools, usually a type of anti-virus software.The survey showed 13 percent of small businesses, 20 percent of medium businesses and 30 percent of large businesses were affected by a computer security breach.The average loss due to computer security incidents during 2006-07 was $360 for small businesses, $2,757 for medium businesses and $17,578 for large businesses.The most commonly reported type of computer security incident involved viruses and malicious code attacks (64%). Of those businesses affected, 40 percent reported corruption of hardware or software. The majority of businesses dealt with these incidents internally, with only eight percent reporting them to police.Businesses reported that their computer security breaches were generally opportunistic rather than targeted. The report also highlighted the need to minimise the incidence of personal data being stolen for use in other offence
  14. Older PCs are more prone to security attacks due to less sophisticated hardware and software. Techaisle research shows that PCs older than 3 years are more likely to have email virus attacks, web-based virus attacks, have adware and spyware, are more susceptible to network intrusions, and are more apt to have DoS or Phishing attacks. Newer PCs on average experienced considerably fewer security related incidences. In addition, refreshing with Intel vPro technology PCs can provide additional layers of security such as the ability to assist with virus and worm scanning with the ability to isolate a PC from the network if such an attack is detected. Intel vPro technology PCs have the ability to check that critical agents (such as virus software, firewall software, etc.) are operational. And finally, Intel vPro technology PCs can also be patched much quicker since they can be accessed overnight and do not rely on the PC being turned and cannot be deferred by the user. It just takes ONE PC out of compliance to create a security incident costing ~$300K/year. Keeping your PCs more secure, can save your business money Wipro Technologies, March 2009 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” 1. http://communities.intel.com/docs/DOC-3053 PCs older than 3 years show a marked increase in the number of security incidents. In year 4, PCs experience a 53% increase in the number of security incidents compared to PCs in year 1. In year 5 they experience an 87% increase, while those that are 6 years and older experience a 120% increase in the number of security incidents.
  15. 4 Intel vPro technology includes powerful Intel Active Management Technology (Intel AMT). Intel AMT requires the computer system to have an Intel AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the management console or further integration into existing security frameworks to enable certain functionality. It may also require modifications of implementation of new business processes. With regard to notebooks, Intel® AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see http://www.intel.com/technology/platform-technology/intel-amt/index.htm 5 Results shown are from the 2007 EDS Case Studies with Intel vPro processor technology, by LeGrand and Salamasick, 3rd party audit commissioned by Intel, of various enterprise IT environments. The studies compare test environments of Intel vPro processor technology equipped PCs vs non-Intel vPro processor technology environments. Tested PCs were in multiple OS and power states to mirror a typical working environment. Actual results may vary. The study is available at www.intel.com/vpro and www.eds.com.
  16. Intel vPro technology deployment: Model Company with 11,500 Mobile PCs and 19,300 Desktop PCs 85% Mobile PC and 75% Desktop PC Intel vPro technology Enabled Model company savings possible = 11,500*85%*$188 + 19,300*75%*$228 = 1,837,700 + 3,300,300 = $5,138,000 1 – Wipro Technologies, March 2009 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles” http://communities.intel.com/docs/DOC-3053