This document discusses implementing a Bring Your Own Device (BYOD) program at a company. It provides an overview of BYOD and common device types. It outlines the key components of a BYOD implementation plan including defining policies, supported devices, security controls, and technical solutions. It recommends a phased approach starting with a proof of concept using Citrix and VMware virtualization technologies. Costs for hardware, software, services and a phase 1 budget of $164,000 are also presented.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
Management Information System - MIS - ApplicationFaHaD .H. NooR
Management information system (MIS) refers to the processing of information through computers to manage and support managerial decisions within an organization. The concept may include systems termed transaction processing system, decision support system, expert system, or executive information system. The term is often used in the academic study of businesses and has connections with other areas, such as information systems, information technology, informatics, e-commerce and computer science; as a result, the term is used interchangeably with some of these areas.
Management information systems (plural) as an academic discipline studies people, technology, organizations, and the relationships among them.This definition relates specifically to "MIS" as a course of study in business schools. Many business schools (or colleges of business administration within universities) have an MIS department, alongside departments of accounting, finance, management, marketing, and may award degrees (at the undergraduate, master, and doctoral levels) in Management Information Systems.
MIS professionals help organizations to maximize the benefit from investments in personnel, equipment, and business processes.There are different areas of concentration with different duties and responsibilities in information system managers starting from the Chief information officer (CIOs), Chief technology officer (CTOs), IT directors and IT security managers. Chief information officers (CIOs) are responsible for the overall technology strategy of their organizations. Basically, they are more of the decision makers and action takers when it comes down to determining the technology or information goals of an organization and making sure the necessary planning to implement those goals is being met.
Chief technology officers (CTOs) are responsible for evaluating how new technology can help their organization. They usually recommend technological solutions to support the policies issued by the CIO.[2]
IT directors including MIS directors are in charge of both their organization's Information technology departments and the supervision of thereof. They are also in charge of implementing the policies chosen by the other top branches (CIOs, CTOs). It is their role to ensure the availability of data and network services by coordinating IT activities.
IT Security Managers oversee the network and security data as the title implies. They develop programs to offer information and awareness to their employees about security threats. This team is very important because they must keep up-to-date on IT security measures in order to be successful within their organization. Any security violations need to be investigated and supervised by this specific team.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
Management Information System - MIS - ApplicationFaHaD .H. NooR
Management information system (MIS) refers to the processing of information through computers to manage and support managerial decisions within an organization. The concept may include systems termed transaction processing system, decision support system, expert system, or executive information system. The term is often used in the academic study of businesses and has connections with other areas, such as information systems, information technology, informatics, e-commerce and computer science; as a result, the term is used interchangeably with some of these areas.
Management information systems (plural) as an academic discipline studies people, technology, organizations, and the relationships among them.This definition relates specifically to "MIS" as a course of study in business schools. Many business schools (or colleges of business administration within universities) have an MIS department, alongside departments of accounting, finance, management, marketing, and may award degrees (at the undergraduate, master, and doctoral levels) in Management Information Systems.
MIS professionals help organizations to maximize the benefit from investments in personnel, equipment, and business processes.There are different areas of concentration with different duties and responsibilities in information system managers starting from the Chief information officer (CIOs), Chief technology officer (CTOs), IT directors and IT security managers. Chief information officers (CIOs) are responsible for the overall technology strategy of their organizations. Basically, they are more of the decision makers and action takers when it comes down to determining the technology or information goals of an organization and making sure the necessary planning to implement those goals is being met.
Chief technology officers (CTOs) are responsible for evaluating how new technology can help their organization. They usually recommend technological solutions to support the policies issued by the CIO.[2]
IT directors including MIS directors are in charge of both their organization's Information technology departments and the supervision of thereof. They are also in charge of implementing the policies chosen by the other top branches (CIOs, CTOs). It is their role to ensure the availability of data and network services by coordinating IT activities.
IT Security Managers oversee the network and security data as the title implies. They develop programs to offer information and awareness to their employees about security threats. This team is very important because they must keep up-to-date on IT security measures in order to be successful within their organization. Any security violations need to be investigated and supervised by this specific team.
Decision Making and Information SystemsAriful Saimon
Premier University
[B.B.A]
Submitted To : Lecturer MS. Samima Parvez
Subject : Decision Making and Information
Semester: 5th Section: “A” Batch :22nd
Group Name: D’5
E-mail : Saimonchy20@gmail.com
components of I T infrastructure, major computer hardware, data storage, input, and output technologies used in business and the major hardware trends, major types of computer software used in business and the major software trends, principal issues in managing hardware and software technology.Business Capabilities
IT Inftractructures - Evolution of IT InftractructureMahmoud Al ahmad
Today we going to talk about IT Infrastructure, We will talk about the Evolution of IT Infrastructure from the beginning to the present, so it will be around 60 years journey so please sit tight to your chairs this going to be a very long session :)
I’m just kidding of course, Actually as this is a very informative topic has a lot of information's so I took the liberty to split it to 4 sessions as the following every session will take around 15-20 Minutes:
Evolution of IT Infrastructure
Architectures of IT Infrastructure (Traditional, Reference, Converged, Hyper Converged)
Virtualization and Cloud Computing (Private cloud, Hyped Cloud, Public Cloud)
LIFI vs WIFI
Types, Importance, impact of Information systems
Data
Data vs Information
MIS
Importance of MIS
Impact of MIS
Need of MIS
Outputs of MIS
Business objectives of Information systems
Contains everything a student needs to know about fundamentals of Management Information System. It is not an original work rather a useful presentation created by combining few other presentations.
IT Infrastructure Management Powerpoint Presentation SlidesSlideTeam
Enhance your audiences knowledge with this well researched complete deck. Showcase all the important features of the deck with perfect visuals. This deck comprises of total of seventy slides with each slide explained in detail. Each template comprises of professional diagrams and layouts. Our professional PowerPoint experts have also included icons, graphs and charts for your convenience. All you have to do is DOWNLOAD the deck. Make changes as per the requirement. Yes, these PPT slides are completely customizable. Edit the colour, text and font size. Add or delete the content from the slide. And leave your audience awestruck with the professionally designed IT Infrastructure Management Powerpoint Presentation Slides complete deck. https://bit.ly/3sGXmkZ
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
Decision Making and Information SystemsAriful Saimon
Premier University
[B.B.A]
Submitted To : Lecturer MS. Samima Parvez
Subject : Decision Making and Information
Semester: 5th Section: “A” Batch :22nd
Group Name: D’5
E-mail : Saimonchy20@gmail.com
components of I T infrastructure, major computer hardware, data storage, input, and output technologies used in business and the major hardware trends, major types of computer software used in business and the major software trends, principal issues in managing hardware and software technology.Business Capabilities
IT Inftractructures - Evolution of IT InftractructureMahmoud Al ahmad
Today we going to talk about IT Infrastructure, We will talk about the Evolution of IT Infrastructure from the beginning to the present, so it will be around 60 years journey so please sit tight to your chairs this going to be a very long session :)
I’m just kidding of course, Actually as this is a very informative topic has a lot of information's so I took the liberty to split it to 4 sessions as the following every session will take around 15-20 Minutes:
Evolution of IT Infrastructure
Architectures of IT Infrastructure (Traditional, Reference, Converged, Hyper Converged)
Virtualization and Cloud Computing (Private cloud, Hyped Cloud, Public Cloud)
LIFI vs WIFI
Types, Importance, impact of Information systems
Data
Data vs Information
MIS
Importance of MIS
Impact of MIS
Need of MIS
Outputs of MIS
Business objectives of Information systems
Contains everything a student needs to know about fundamentals of Management Information System. It is not an original work rather a useful presentation created by combining few other presentations.
IT Infrastructure Management Powerpoint Presentation SlidesSlideTeam
Enhance your audiences knowledge with this well researched complete deck. Showcase all the important features of the deck with perfect visuals. This deck comprises of total of seventy slides with each slide explained in detail. Each template comprises of professional diagrams and layouts. Our professional PowerPoint experts have also included icons, graphs and charts for your convenience. All you have to do is DOWNLOAD the deck. Make changes as per the requirement. Yes, these PPT slides are completely customizable. Edit the colour, text and font size. Add or delete the content from the slide. And leave your audience awestruck with the professionally designed IT Infrastructure Management Powerpoint Presentation Slides complete deck. https://bit.ly/3sGXmkZ
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
In this presentation by InTechnology’s Mobile specialist, Richard Allgate, looks at the growing trend of Bring Your Own Device (BYOD). It covers the drivers behind the growing trend, how to implement a successful BYOD policy and the common pitfalls and business considerations.
An Insight to the World of Wearable ComputingFAIZAL T H
This paper gives idea on the concept of wearable computing and its evolution over the years and the emerging trends in the field of wearable technology, their advantages and disadvantages and so on..
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementYole Developpement
In a global biometric hardware market worth over $4B, traditional fingerprint/palm sensors still monopolize 95% of the market, but face and iris sensors lie in wait.
Fingerprint technology impressively dominates the market - but changes are expected
Due to historical reasons, like the criminal fingerprint database established by the FBI with ink-based techniques, fingerprint sensing is the most common biometric technology currently used, by far. We estimate that the annual revenues generated by fingerprint-based solutions are currently $4.25B, representing 95% of the hardware market. Fingerprint sensing dominates technologies like iris, face, palm or voice recognition, because it meets almost all the requirements of a “perfect” biometric recognition technology. It is robust, stable and repeatable, time-invariant, difficult to spoof, has a distinctive meaning, is "unique" amongst a population, accessible, easy to use and acceptably non-intrusive. All other biometric technologies do not yet fulfill those requirements as specifically as fingerprint technology. Hardware revenues generated by the other biometric technologies are relatively low, estimated at $250M, mostly from iris and face recognition. This report identifies the players in the biometric hardware market, and provides technology, market and trend evolution insights. The fingerprint market has experienced an incredible volume increase in the consumer market with the adoption of the active capacitance detection on an increasing number of smartphones to answer the demand of online identification, mobile payment and unlocking applications. Diverse technologies, such as optical, thermal, and Piezoelectric Micromachined Ultrasonic Transducers (PMUT), are also trying to penetrate the consumer market, but are still very limited. The industrial and homeland/security markets are still widely using optical technology. Other biometric solutions like iris, face or voice recognition have been introduced but with a limited impact. Their performance hasn’t yet reached the requirements with regards to cost, reliability, false rejection rate and false acceptance rate to significantly penetrate either the consumer, industrial or homeland/security markets....
More information on that report: http://www.i-micronews.com/report/product/sensors-for-biometry-and-recognition.html
Well this is a presentation different from the common issues like internet or mobile or you take nuclear testing.
This is HUMAN CLONING,a beginning to a new era of Science and technology.
Come and enjoy the world within!!!!!!!!!!!!!!!!!!!!!!!!!!!
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Yole Developpement
Yole;report;market;technology;application;research;trend;player;analysis;free;data
MEMS, Compound Semiconductors, LED, Image Sensors, Optoelectronics, Microfluidics & Medical, Photovoltaics, Advanced Packaging, Power Electronics
More information on that report at http://www.i-micronews.com/reports.html
A Biosensor is a device for the detection of an analyte that combines a biological component with a physio-chemical detector component.
Download: https://www.topicsforseminar.com/2014/10/biosensors-ppt.html
Imaging Technologies for Automotive 2016 Report by Yole Developpement Yole Developpement
Imaging technology, which is currently mainly cameras, is exploding into the automotive space, and is set to grow at 20% CAGR to reach $7.3B in 2021
INFOTAINMENT AND ADVANCED DRIVER ASSISTANCE SYSTEMS (ADAS) PROPEL AUTOMOTIVE IMAGING
Since 2008, when a recession acted as a wakeup call to the whole industry, the automotive market has undergone obvious structural change. Capitalizing on technologies initially developed for smartphones, electronics have invaded, and imaging technology is now taking center stage. From less than one camera per car on average in 2015, there will be more than three cameras per car by 2021, which means 371 million automotive imaging devices.
Cameras were initially mounted for ADAS purposes on high-end vehicles, with deep learning image analysis techniques promoting early adoption. The Israeli company Mobileye has been instrumental in bringing this technology to market, along with On Semiconductor, which provided the CMOS image sensor. Copycat competition will probably pick up as the market now justifies initial investment in design and technology. It is now a well-established fact that vision-based autonomous emergency braking (AEB) is possible and saves life. Adoption of forward ADAS cameras will therefore accelerate.
Growth of imaging for automotive is also being fueled by the park assist application, and 360° surround view camera volume is skyrocketing. While it’s becoming mandatory in the US to have a rearview camera, that uptake is dwarfed by 360° surround view cameras, which enable a “bird’s eye view” perspective. This trend is most beneficial to companies like Omnivision at sensor level and Panasonic and Valeo, which have become the main manufacturers of automotive cameras.
Mirror replacement cameras are currently the big unknown and take-off will primarily depend on its appeal and car design regulation. Europe and Japan are at the forefront of this trend, which should become slightly significant by 2021.
Solid state lidar is well talked about and will start to be found in high end cars by 2021. Cost reduction will be a key driver as the push for semi-autonomous driving will be felt more strongly by car manufacturers. The report will analyse the impact of lidar for automotive vision in detail.
Night vision cameras using Long Wave Infrared (LWIR) technology were initially perceived as a status symbol. However, they’re increasingly appreciated for their ability to automatically detect pedestrians and wildlife. LWIR will therefore become integrated into ADAS systems in future.
3D cameras will be limited to in-cabin infotainment and driver monitoring. This technology will be key for luxury cars and therefore is of limited use today.
If any significant semi-autonomous trend picks up, the technology will probably become mandatory, due to safety issues.
More information on that report at http://www.i-micronews.com/reports.html
Overview: Woolpack private cloud services
Enables Virtual Data Centers (VDCs)
User friendly Web based Graphical user interface for management
Robust functionality and High level of security
Simulation of various hardware configurations
Provision for huge number of Linux/Windows M/c
Management of multiple storage backend
Best in class integrated solution because of strategic Partnerships
Utilization of existing investments virtualization solutions
Low CAPEX, Low OPEX and Very High ROI
Charges only for the service and not the software
Net Motion Mobility Overview - Field Serviceksholes
NetMotion Wireless is a software company that enables organizations to maximize the productivity of their mobile workforces.
The company’s flagship solution, Mobility XE, allows mobile workers to maintain and optimize mobile data connections as they
move in and out of wireless coverage areas and roam between networks. Mobility XE mobile VPN software resolves today’s
key mobile deployment challenges including coverage gaps and interruptions; inter-network roaming; performance issues
and network security.
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
Webinar slides for the End User Computing Webinar on the 19th June. View these slides for an introduction to Microsoft, Citrix and VMware Technologies and how your organisation can start its transition to the Virtualised Modern Desktop.
For more details or to book a Strategy Assessment, please call OCSL on 0845 605 2100 or email marketing@ocsl.co.uk
Ten questions to ask before choosing SCADA softwareTrihedral
http://www.trihedral.com - When creating SCADA specifications, engineering firms must focus on meeting the immediate start-up and operational requirements of the SCADA system. This often means specifying products with which they are familiar. The engineer wants to ensure that the new system meets all start-up requirements at a reasonable price. It is often difficult to look past the immediate project and consider long range plans, cost of system maintenance, and keeping your SCADA application current with evolving technology. The following questions may help you ensure that these decisions will optimize your long-term SCADA strategy.
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld
VMworld 2013
Ben Chong, VMware
Kristina De Nike, VMware
Xiaomin Shen, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Business Case Of Bring Your Own Device[ BYOD]
1. Bring Your Own Device[ BYOD]
Implementation
Md Yousup Faruqu
IT
2. AGENDA
Background & Bring Your Own Device (BYOD) Overview
Implementation Roadmap And Approach
Costing And Budget
Analysis And Key Findings
Objectives Of BYOD
Recommendation
3. BYOD describes an end user computing strategy
supported by a set of policies and controls,
which in conjunction with a technical solution
provide a managed and secure
framework for employees to access corporate
data from their personal device whilst
providing the enterprise with a level of control
over both the device and the data it
can access.
5. What devices will be subject to BYOD
What over arching method of resource access will
be used for:
Hand held devices
Laptops
How will the solution and end users be supported
How will business units be charged for the service
Strategy
The business reasons for
adopting BYOD, for a
successful BYOD
implementation
Policy
Policy right protects the
business from the risks
associated with BYOD
What devices makes and models will be allowed
How will Antivirus be handled
What actions does the company reserve the right
to carry out on an employees personal device
(e.g. remote wipe on loss)
How will leavers be handled
What access controls will be used (Certificate
based authentication, Pin Number lengths)
6. Empower users to choose their own devices to
improve productivity, collaboration and mobility
Protect sensitive information from loss and theft to
meet privacy, compliance and risk management
standards
Reduce costs and simplify management through
self-service provisioning and automated management
and monitoring
Simplify IT by deploying apps once for use on any
device
6
7. On-demand delivery of data, apps and desktops to any device
– personal or business
Transform corporate application as well as desktops into an
on-demand service available on device.
A self-service app store providing unified access and single
sign-on to Windows, web and SaaS apps on any device, over
any network
Secure file sync and sharing for any device
Collaborative work platform with coworkers and clients
A secure-by-design architecture including SSL VPN and
granular policy-based user authentication with tracking and
monitoring to support compliance and privacy.
8. Increased user mobility
Increased user satisfaction
Increase productivity*
Help retain top performers
Reduce capital costs
Helps to attract younger talent*
9. Conduct baseline PoC to identify precise solutions to implement BYOD.
Citrix and VMware has been identified as a best solutions for ABC Inc
infrastructure.
All tests done in PoC with CITRIX and VMware were successful.
Use Citrix and VMware BYOD environment to publish or deliver Windows
XP, 7 virtual desktop and application to the selected end users devices:
iOS device – iPhone, iPad
Android device – Samsung Phone, Tablet
Windows Phone – Nokia Lumia
9
11. Site Preparation, Product Delivery And Installation
Equipment delivery
Power preparation
Network preparation
H/W installation
OS installation and configuration
Host Integration (SAN integration)
Install and configure hypervisor VMware ESX and Virtual Center
Install and configure VMWare software and high availability
Install and configure BYOD solution
Provision virtual desktop and/or applications to the designated users
11
12. Hardware Configuration (Total cost: $32k)
2 physical server with 4X10-core (40) CPU and 196GB RAM
each, used for the host machines
Software Configuration - Hypervisor (Total cost: $30k)
VMware vSphere 5.o (8 CPU licenses. Each License covers 1
physical CPU) with 1 years warranty and support
BYOD solution –Software, Licenses and support ($66k)
BYOD solution software and licenses
Storage (Total cost: $36k)
3TB usable FC storage
13. 13
Identical physical servers are running at 20-35% utilization.
With 30 servers consolidated on 3 ESX Server hosts, all the servers
will be operate at 60-80% utilization, resulting in a huge
improvement in server utilization as measured by average CPU and
memory usage.
Uniform high availability across the entire virtualized IT
environment without the cost and complexity of failover solutions
tied to either operating systems or specific applications.
The time is reduced for provisioning new servers to minutes. Before
virtualization, it took us 20-30 hours if we needed to prepare a new
system.
Downtime and IT service disruptions will be minimize.
14. E-mail
HR Application
ERP Systems
File Servers [H & Z drive]
Intranet Applications
15. Log On
Time
Last State
Change
Endpoint Name
Endpoint
Address
Endpoint
Hardware Id
Client
Version
Horizontal
Resolution
Vertical
Resolutio
n
9/9/12
11:48 AM
11/5/12
10:03 AM
WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768
11/5/12
7:42 AM
11/5/12
7:44 AM
xt45 172.71.237.15 421C1E03 320 480
11/6/12
8:50 AM
11/6/12
8:50 AM
WI_mitjsZpPOTw8J
oSBS
172.71.229.56 CE49DF52 768 1024
11/6/12
8:52 AM
11/6/12
8:53 AM
WI_m4ubYcezolIW
kWImB
172.71.103.49 363D7406 13.0.0.6685 1366 768
11/6/12
8:59 AM
11/6/12
9:00 AM
WI_tk6oktkdeMd19
jJeO
172.71.103.46 3FB64541 12.1.44.1 1280 800
User access report
16. Budget Head
Cost ($k)
Phase 1
Hardware
Server 32
Storage 36
Software
VMware ESX license 30
BYOD solutions and license 56
Professional Services
Implémentation service 10
Total 164
Costing & Budget
17. 17
Most of the tests performed with CITRIX VDI in POC,
were successful.
We recommend deploy the solution in phased approach
and build the infrastructure gradually
The phase 1 implementation is planned to be done in
2013.
Meanwhile, we understood that there are many vendor
products available in the market, so we would be doing
the POC on VMware technology this year to determine
if there have been any development that more capable
in terms of reliability, and user experience compare to
CITRIX