Virtual Desktop Infrastructure (VDI). A presentation by Derrek Kim, Solution Architect-MS Virtualization of CDW, August 2011 to the JAX Chamber IT Council.
Updated lifecycle management, improved analytics and support, and the option of Kubernetes — VMware vSphere® 7 is the biggest re-platform of vSphere in years. Learn more about the most significant vSphere evolution in a decade.
Learn more: http://ms.spr.ly/6005TmX9B
Virtual Desktop Infrastructure (VDI) is still a relatively new technology. Most people are either unaware or have only a brief idea about this emerging technology. This Slide share will provide your 12 points which you must know before implementing VDI Technology in your business.
Updated lifecycle management, improved analytics and support, and the option of Kubernetes — VMware vSphere® 7 is the biggest re-platform of vSphere in years. Learn more about the most significant vSphere evolution in a decade.
Learn more: http://ms.spr.ly/6005TmX9B
Virtual Desktop Infrastructure (VDI) is still a relatively new technology. Most people are either unaware or have only a brief idea about this emerging technology. This Slide share will provide your 12 points which you must know before implementing VDI Technology in your business.
VDI or virtual desktop infrastructure technology came up as a solution for companies facing challenges like high cost, huge infra, and less security in operating physical office desktops.
VDI helped businesses enable virtual desktops for their employees with high security, reduced infra, and less cost.
VDI, which creates a virtual environment by segmenting servers into different virtual machines, can be built either on your office premise or from the cloud of a third-party provider.
Understand in this presentation all the past challenges and the advantages of implementing various VDI models in your business.
Did you know that 50 percent of desktop virtualization initiatives fail?
Most challenges are due to poor user satisfaction, poor performance and
escalating costs. With such an important initiative, you cannot afford to
take a 50/50 chance for success.
Join the webinar "VDI Best Practices - How to Ensure a Great
Customer Experience When Deploying Client Virtualization" to increase your odds of project success and
ensure user satisfaction from day one. You’ll learn from virtualization
expert Roy Francis of FusionStorm how to successfully deploy desktop
virtualization projects and overcome user problems.
Learn how to better prepare for your desktop virtualization initiative,
and then once deployed how to ensure a great user experience. We will
discuss:
• The pitfalls to avoid when implementing desktop virtualization
• Tips and tricks for overcoming user challenges
• Considerations for migrating to XenApp 6.5 and Windows 2008
• How to address performance and scalability concerns
** Edureka Certification Training: https://www.edureka.co **
This Edureka "VMware Tutorial for Beginners” video will give you a thorough and insightful overview of Virtualization and help you understand other related terms that revolve around VMware and Virtualization. Following are the offering of this video:
1. What is VMware?
2. What is Virtualization?
3. Types Of Virtualization
4. What Is Hypervisor?
5. Hypervisor Types
6. Demo- Creating a VM using VMware Workstation Player
Nutanix se despacha en días, y su despliegue se realiza en menos de un día (realmente!)
Permite no interrumpir las operaciones en curso (reducción del 99,7% en los tiempos de inactividad no planificados)
Escala fácilmente - Añada capacidad cuando la necesite- No más sobre aprovisionamiento (el tiempo de despliegue es 85% más rápido)
Reduce el costo y la complejidad de su sistema de computación y almacenamiento - hasta un 90% de ahorro de energía y espacio
Todos sus sistemas gestionados a través de una interfaz de panel único (71% menos tiempo de gestión de un entorno Nutanix)
Proporciona capacidades avanzadas de almacenamiento de clase empresarial (Deduplicación, Compresión, etc.)
Soporte de Clase Mundial – 88 Net Promotor Score (El siguiente proveedor de tecnología más alta de la lista fue Intel- en un 53!)
Windows Virtual Enterprise Centralized DesktopLouis Göhl
Virtualization brings about new use cases that did not previously exist in traditional desktop environments. These use cases include the ability to create multiple desktops dynamically, enable user access to multiple virtual machines (VMs) simultaneously, and move desktop VMs across multiple platforms, especially in load-balancing and disaster recovery situations. Microsoft designed Windows Virtual Enterprise Centralized Desktop (VECD) to enable organizations to license virtual copies of Windows client operating systems in virtual environments.
http://www.microsoft.com/windows/enterprise/solutions/virtualization/licensing.aspx
VDI or virtual desktop infrastructure technology came up as a solution for companies facing challenges like high cost, huge infra, and less security in operating physical office desktops.
VDI helped businesses enable virtual desktops for their employees with high security, reduced infra, and less cost.
VDI, which creates a virtual environment by segmenting servers into different virtual machines, can be built either on your office premise or from the cloud of a third-party provider.
Understand in this presentation all the past challenges and the advantages of implementing various VDI models in your business.
Did you know that 50 percent of desktop virtualization initiatives fail?
Most challenges are due to poor user satisfaction, poor performance and
escalating costs. With such an important initiative, you cannot afford to
take a 50/50 chance for success.
Join the webinar "VDI Best Practices - How to Ensure a Great
Customer Experience When Deploying Client Virtualization" to increase your odds of project success and
ensure user satisfaction from day one. You’ll learn from virtualization
expert Roy Francis of FusionStorm how to successfully deploy desktop
virtualization projects and overcome user problems.
Learn how to better prepare for your desktop virtualization initiative,
and then once deployed how to ensure a great user experience. We will
discuss:
• The pitfalls to avoid when implementing desktop virtualization
• Tips and tricks for overcoming user challenges
• Considerations for migrating to XenApp 6.5 and Windows 2008
• How to address performance and scalability concerns
** Edureka Certification Training: https://www.edureka.co **
This Edureka "VMware Tutorial for Beginners” video will give you a thorough and insightful overview of Virtualization and help you understand other related terms that revolve around VMware and Virtualization. Following are the offering of this video:
1. What is VMware?
2. What is Virtualization?
3. Types Of Virtualization
4. What Is Hypervisor?
5. Hypervisor Types
6. Demo- Creating a VM using VMware Workstation Player
Nutanix se despacha en días, y su despliegue se realiza en menos de un día (realmente!)
Permite no interrumpir las operaciones en curso (reducción del 99,7% en los tiempos de inactividad no planificados)
Escala fácilmente - Añada capacidad cuando la necesite- No más sobre aprovisionamiento (el tiempo de despliegue es 85% más rápido)
Reduce el costo y la complejidad de su sistema de computación y almacenamiento - hasta un 90% de ahorro de energía y espacio
Todos sus sistemas gestionados a través de una interfaz de panel único (71% menos tiempo de gestión de un entorno Nutanix)
Proporciona capacidades avanzadas de almacenamiento de clase empresarial (Deduplicación, Compresión, etc.)
Soporte de Clase Mundial – 88 Net Promotor Score (El siguiente proveedor de tecnología más alta de la lista fue Intel- en un 53!)
Windows Virtual Enterprise Centralized DesktopLouis Göhl
Virtualization brings about new use cases that did not previously exist in traditional desktop environments. These use cases include the ability to create multiple desktops dynamically, enable user access to multiple virtual machines (VMs) simultaneously, and move desktop VMs across multiple platforms, especially in load-balancing and disaster recovery situations. Microsoft designed Windows Virtual Enterprise Centralized Desktop (VECD) to enable organizations to license virtual copies of Windows client operating systems in virtual environments.
http://www.microsoft.com/windows/enterprise/solutions/virtualization/licensing.aspx
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPSvDesk.Works
The VDI computer design decouples desktop environments from hardware. It allows an application client on a secondary device to access thin-client software on a primary device. Virtual desktop solutions increase accessibility and security by removing the need for end-users to be tied to their devices and PCs. It is possible to plan and install virtual desktops successfully by starting with a few essential considerations, analyzing business needs, and contacting solution providers like vDesk.works and VMware for IT services.
- Lợi ích và ưu điểm của giải pháp VDI.
- So sánh chỉ số ROI giữa giải pháp VDI và PC qua 1 ví dụ thực tế.
Thông tin liên hệ tư vấn giải pháp VDI:
Công ty Cổ phần Tin học Lạc Việt
Hotline: (+84.8) 38.444.929
Email: info@lacviet.com.vn
Website: http://www.lacviet.vn/
RingCube vDesk is a high-performance enterprise desktop virtualization solution that simplifies the creation, access and management of Windows desktops through Workspace Virtualization.
Asigra enables enterprises to bridge the physical and virtual worlds, without having to
pick pointsolutions for each. As the virtual server market matures and becomes part
of the ‘new world order’ of cloud computing, companies that choose to select multiple
virtual server platforms inside their clouds can leverage Asigra to protect leading
virtualization platforms such as VMware, Citrix, Microsoft, Parallels, and Virtual Iron.
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Centerdavehill99
In his article Virtualization 2.0 Is Your On-Ramp to the Cloud published on SIliconANGLE, VMware Cloud Strategist David Hill, writes, “Many companies today are recognizing value in the cloud even though they have no plans to mothball their own data centers. To them, the cloud represents both an extension of their on-premises infrastructures and the latest chapter in the ongoing evolution of their IT practice.”
David goes on to describe this latest chapter as “Virtualization 2.0,” because just as virtualization untethered workloads from servers, this stage is about untethering those same workloads from the data center itself, enabling apps to freely move between clouds the way they can move between servers today.
Similar to VDI for Business - Beyond the Hype (20)
QA Should be led from top down and implemented from bottom up. A presentation by Moti Demri, QA consultant and manager, experienced in building QA teams from the ground up, establishing market level standards (ISO 9000, CMMI) , processes, and testing methodologies for both manual and automated testing. Presented November 2013 to the JAX Chamber IT Council.
The Importance of Cultural Alignment between the Operating Units and Information Technology. The Challenge of Maintaining Cultural Alignment through the Life-Cycle of Outsourcing.
A presentation by Carl Fox, SVP of Corporate Services, of Crowley Maritime Corporation, October 2013 to the JAX Chamber IT Council.
The Industry-University Interface:An Academic Administrator’s ViewJAX Chamber IT Council
Improving the Academic-Industry Interface. A presentation by Dean Mark A. Tumeo, PhD, JD, PE of UNF's College of Computing, Engineering and Construction, August 2013 to the JAX Chamber IT Council.
Staying ahead of a Constantly Changing Environment. A presentation by Tony DeLaGrange, Senior Security Consultant of Secure Ideas, May 2012 to the JAX Chamber IT Council.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
2. 22CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
How do I
manage costs?
How do I take
advantage
of virtualization?
Should we go with
Rich Clients or
Thin Clients?
How do I keep
my mobile
users productive?
Should I embrace
cloud services?
How do I keep my
data safe and
applications secure?
VIRTUAL DESKTOP INFRASTRUCTURE
3. 33CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
THE NEED FOR A DESKTOP STRATEGY
4. 44CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
APPLICATION CONSIDERATIONS
Provide access
from
anywhere
Know which
applications
you have
Manage
application
lifecycle
5. 55CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Challenges
OPERATING SYSTEM AND
BROWSER CONSIDERATIONS
Access
from
anywhere
Image
management
Operating
System
migration
6. 66CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
DATA & USER SETTINGS
CONSIDERATIONS
Data Protection
& Compliance
Anywhere
access
to data & user
settings
Ever-increasing volume of
data from multiple sources
7. 77CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Challenges
HARDWARE CONSIDERATIONS
Handling the
growing mobility
of end users
Addressing
consumerization
Managing the
Hardware Lifecycle
8. 88CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUAL DESKTOP INFRASTRUCTURE
• What is VDI
• Use cases
• Components
• Licensing considerations
• VDI Technology landscape
10. 1010CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
BASICS OF VDI
VDI defines a broad range of technologies which enable end
user desktop computing processes to be run on remote
computing resources or locally in a manner which provides
isolation from the primary end user OS.
11. 1111CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS FOR VDI
• Standardization , Stable
• External Users – Non-Corporate resource
• React to changes quickly
• Maintain Intellectual Property
• Data Protection – Proximity/Backup
• Comply with Global Export rules (Regulatory Compliance)
• D/R Pandemic – What if 40% of workforce force to work
from home
• Mandates for quick security patches
• Need for extremely Quick Application updates
• Support volatile Client device environment
12. 1212CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS FOR VDI
• Applications need client OS (specific environment)
• Users need a customizable environment
• Policy against a shared computing model
• BYOC
• Local/Off line usage
• Device independence
13. 1313CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS AGAINST VDI
• Cost
• Application Performance - Video
• Complexity
• Local device access
14. 1414CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• Open a branch office
• Start an offshore project
• On-board a new employee
• Move a dept from building
A to Z
• Add, delete & update apps
• Apply security patches
• Implement ‗BYOC‘
15. 1515CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUALIZATION REALITY
• VDI can be beneficial for EVERY organization
However…
• VDI is NOT for every application
17. 1717CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
HIGH IMPACT USER
Premium knowledge worker Sensitive / Secure Information
Examples: Healthcare, Military
18. 1818CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
HIGH VOLUME TASK WORKER
Task oriented Important / Secure Information
Examples: Tax prep, Call Center,
Remote/At-Home worker
• Limited access to local storage
• Standardized Desktop and Apps
• Non-company (personal) computer
19. 1919CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
NOT RECOMMENDED
Mobility/Flexibility/Performance
Anywhere access to Information
Examples: Knowledge worker,
Media Creation/Editing, Sales
20. 2020CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• What is VDI
• Where does it make sense to use it
CHECKPOINT
22. 2222CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
TECHNOLOGY IN USE
23. 2323CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization
Platform
• Microsoft Hyper-V
• VMware vSphere
• Citrix XenServer
TECHNOLOGY IN USE
24. 2424CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• MS Windows VDA Licensing
• MS Windows VL w/SA
Windows VDA is required for
ALL VDI implementations
that use a non-SA device to
access a Windows VDI
desktop, regardless of the
VDI infrastructure vendor
TECHNOLOGY IN USE
25. 2525CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• Template VMs/Thin Provisioning
• Microsoft App-V
• Citrix XenApp
• Microsoft RDS
• Profile Tools
• Other…
TECHNOLOGY IN USE
26. 2626CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI
Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• Citrix XenDesktop
• Citrix Provisioning Server
• Microsoft RD Broker
• Microsoft SCVMM
• VMware View
TECHNOLOGY IN USE
27. 2727CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
TYPES OF VDI
• One to one relationship
• Highest costStatic
• One to Many relationship
• Pools must be maintainedPooled
• One to Many
• Elasticity
• System Managed Pools
Dynamic
28. 2828CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
ESSENTIAL COMPONENTS
Factors that need to be accounted for when deploying a Virtualized
Desktop Infrastructure
• Folder Redirection
• Profiles Availability
• Application Installation
• App Virtualization
• Remote Application Access
• Image Management
• Image Deployment
• Session Management
• User Connectivity
Data &
User Settings
Applications
Operating
System
30. 3030CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 1:Standard Users
MICROSOFT VDI LICENSING
My company has 100 PCs and 100 users that access Windows® client Operating
System (OS) (―Windows Client OS‖ implies one of the following operating systems:
Windows XP, Windows Vista®, Windows 7) running on virtual machines (VMs) using
VDI. However, only 50 VMs are running at any one time.
License: If the PCs are covered under Software Assurance (SA),
then no additional licensing is required, as Software Assurance
contains rights to Windows VDI desktops.
31. 3131CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 2: Shift Workers
MICROSOFT VDI LICENSING
My company has 100 PCs with 300 workers accessing these PCs in shifts.
At any time, 150 Windows client OS VMs are being accessed using VDI.
License: If the PCs are covered under Software Assurance, then
no additional licensing is required, as Software Assurance contains
rights to Windows VDI desktops.
32. 3232CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 3: Mixed Desktop Hardware
MICROSOFT VDI LICENSING
My company has 100 PCs under SA and 100 thin clients (running a minimal OS such
as Windows FLP or Windows Embedded for purposes of accessing a VDI). We have 100
Windows client VMs.
License: For the 100 PCs covered under SA, no additional
licensing is required. Each of the 100 thin clients would need
a Windows Virtual Desktop Access (VDA) license, and hence
a total of 100 Windows VDA licenses are required.
33. 3333CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 4: Standard Users – Home Use
MICROSOFT VDI LICENSING
My company has 100 employees who are the primary users of 100 thin clients covered
under Windows VDA. These employees occasionally work from home and access the
corporate VMs via VDI.
License: Windows VDA licenses extend roaming rights for the
primary (―named‖) user of a company-owned device covered
under Windows VDA, and hence no additional licenses for home
PCs are required in this scenario.
34. 3434CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 5: 100% Home Users
MICROSOFT VDI LICENSING
My company has 100 workers who work from home and access Windows
client VMs via VDI from their home PCs.
License: The employee-owned PCs will have to be licensed
with Windows VDA, and hence 100 Windows VDA licenses are
required.
35. 3535CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 6: Roaming Users
MICROSOFT VDI LICENSING
I have 300 thin clients throughout my company and only 100 users who
roam from station to station.
License: Windows VDA is a device–based license so 300
thin clients must be licensed with Windows VDA. If the
devices are PCs covered with SA, then no additional
licensing is required.
36. 3636CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 7: Contractor-Owned PCs
MICROSOFT VDI LICENSING
My company has 100 contractors who are working for six months, and we
will engage 100 different contractors the other six months of the year.
License: Assuming each contractor accesses the environment
with one unique device, 100 Windows VDA licenses are required
for the contractors to access the VDI environment. You can
transfer the Windows VDA licenses to the second set of
contractors after a period of 90 days of first assignment.
37. 3737CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• Microsoft Windows Software Assurance provides the ability for
the covered device and its primary user to access the VDI
environment
• Without Software Assurance, a VDA license is necessary to
access the VDI environment
• Microsoft Windows VDI licensing is DEVICE based – it is not
based on concurrent usage
• Licensing can be transferred once every 90 days
• Roaming usage for the license ―Primary User‖ of the device is
permitted
LICENSING SUMMARY
39. 3939CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI PROVIDERS
Major Players Niche Players
40. 4040CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
• 59% reported that their client virtualization goals are equally
or more important than their server virtualization goals
• Respondents who have implemented client virtualization and
track ROI report that they are saving slightly more than 20%
of their total IT budget
• 91 percent of those considering or implementing client
virtualization (82% of all respondents) plan to implement
within the next 12-24 months
CDW surveyed 200 IT managers at medium and large businesses to understand
what is driving client virtualization, how it is being used in data centers, and to
identify the key roadblocks to success.
CDW STUDY JANUARY 2011
41. 4141CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATON
• 37% have completed an up-front inventory
analysis of client devices in preparation for
implementation and 44% plan to complete an
analysis in the near future
CDW STUDY JANUARY 2011
42. 4242CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
97% noted experiencing challenges with implementation
―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis,
education and testing to enable businesses to take full advantage of client virtualization”
CDW STUDY JANUARY 2011
43. 4343CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUALIZATION REALITY
• Virtualization is revolutionary
» An Important Paradigm shift
» Largest change to address IT industry since change from Main-
Frame to Distributed Computing (1990s)
• It is not a panacea
» Virtualization is not magic – but can solve complex problems
» Still requires effort, planning, and management
» Many false claims in the industry about virtualization benefits
• Planning & Management are Critical
» Virtualization needs careful planning and control to succeed
» Not everything can be virtualized
- Physical still needs to be managed
- Virtual also needs to be managed
- Management strategies have to account for hybrid environments
44. 4444CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
97% noted experiencing challenges with implementation
―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis,
education and testing to enable businesses to take full advantage of client virtualization”
Recommendations:
• Identify Goals
• Do Your Research
• Prep, Test & Prepare
• Measure the Savings
• Find Out More
Full report available at
http://newsroom.cdw.com/features/feature-01-04-11.html
CDW STUDY JANUARY 2011
45. 4545CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
ADDITIONAL RESOURCES
• For more information about Microsoft VDA, please visit:
http://www.microsoft.com/vdi
• For more information about Microsoft Virtualization, please
visit: http://www.microsoft.com/virtualization
• For more information about Microsoft System Center, please
visit: http://www.microsoft.com/systemcenter
• For more information about Windows Server 2008 R2,
please visit: http://www.microsoft.com/windowsserver2008
• For more information about Remote Desktop Services,
please visit: http://www.microsoft.com/rds
46. 4646CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
QUESTIONS
Derrek Kim
Solution Architect – MS Virtualization
derrek.kim@cdw.com
(616) 813-7137
(847) 371-2835