SlideShare a Scribd company logo
What’s New in vSphere 5
               09-23-2011
Agenda

  Journey To The Cloud
  Why are you considering DV?
  The Post PC Era
  The different Types of DV




www.sigmasolinc.com
Journey To The Cloud…
                                                                                  2014+
                                                               Virtualization 3.0 (Cloud
                                                               Computing)
                                                               The fully virtualized datacenter spans
                                                               internal and external cloud adaptive,
                                                               intelligent infrastructure service
                                                               oriented (IT as a service)
                                   Virtualization 2.0           Integrated cloud management
           2010                  Utility billing/chargeback    Holistic monitoring/diagnosis

                                 Automation and Orchestration  Cross-hypervisor management
                                 Self-service portals          External cloud federation

                                 Storage virtualization        Platform as a Service
          Virtualization 1.0     Client hypervisors            Virtualization-aware
         Tier-1 Applications                                    applications
         Unplanned downtime     Mobility
         VDI                    Consumerization of IT
         Resource               Converged Infrastructures
          optimization
                                                                     …Operational Savings
                                 Policy-based management
         Business continuity
                                 Network/IO virtualization
                                 Application Virtualization


www.sigmasolinc.com
Communications Evolution


                                     Enterprise Data




         1950         1970   1970             1970

     Telephone        Fax    Email           Social




www.sigmasolinc.com
Market Dynamics
People Are Working Differently
Post PC Era Has Begun
It’s All About Policy
Market Dynamics
               Quantifiable                               Qualifiable
PC Replacement Savings                     Improved Data and Endpoint Security
IT support cost savings from fewer         Improved User Experience
problems and faster resolution
Improved worker productivity due to        Better Business Continuity and
reduced PC downtime and greater            Disaster Recovery
desktop mobility
Electricity savings from Thin Client and   Enhanced Business Agility, e.g. more
Zero Client                                efficient outsourcing projects
Greater IT staff efficiency due to         Ability to spend more time on
streamlined desktop management             strategic projects
Why are you considering DV?

  • Windows 7 Migration
  • Cost savings and green IT
  • Helpdesk efficiency / desktop management
   PC lifecycle Management

     User Experience
     Cloud integration
     BC/DR
     BYOD


www.sigmasolinc.com
Why Put The Desktop in the Datacenter

  •   Management
  •   Access
  •   Performance
  •   Security

  • Single Instance Block Level




www.sigmasolinc.com
Desktop Virtualization Types
User Profiling



        Mobile Users                     Types Of Users            Task Users


                  Client                                          Terminal
                Hypervisor   Streaming                    VDI   Server / Blade
                Type 1 & 2                                      Workstations




                                  Application Virtualization




www.sigmasolinc.com
Server & Desktop Virtualization: “not a
  mini me…”
  • Server Virtualization is about
    Consolidation, Containment
    & Availability
  • Desktop Virtualization is
    about Standardization &
    Customization
  • Desktops will always have
    exceptions
  • Not much CapEx savings,
    but Significant OpEx savings

www.sigmasolinc.com
BYOD

  • Bring, Your Own Device
  • Save on costs
  • Maximize user experience
  • Supportability
  • Access to corporate network
  • Private and corporate data mix
  • Hardware ownership
  • Encryption
  • Data ownership
www.sigmasolinc.com
VDI: Server-Hosted Virtual Desktops

  • VMs reside on servers in the data
    center
  • Server-based computing model
  • Centralized management, access,
    performance, and security
  • VDI “secret sauce”:
       – Storage
       – Management
       – User Personalization


www.sigmasolinc.com
VDI: Server-Hosted Virtual Desktops

  • Ease of management
  • Power savings
  • Replace broken hardware with Thin
    Clients
  • Support savings
  • Use of existing hardware
  • Business continuity
  • Backups
  • Device independence
  • Sensitive applications
www.sigmasolinc.com
Client Hypervisors – Type 1

  •   Standardized HAL
  •   Reduce initial investment
  •   Single Windows image
  •   Multiple VMs
  •   Enable BYOC
  •   Swap user machine
  •   Easier management and update




www.sigmasolinc.com
Client Hypervisors – Type 2

  • Reliance on general-purpose OS
  • Double, triple, or quadruple number
    of managed VMs
  • Patching
  • Upgrading
  • Antivirus




www.sigmasolinc.com
Application Virtualization

  • Legacy Application Support
  • Reduced Storage Requirements
  • Reduce/Eliminate Application
    Conflicts
  • Centralized Management
  • Centralized Distribution
  • Not all apps can be virtualized




www.sigmasolinc.com
Twitter:
               @ekhnaser


            Elias Khnaser:
EKhnaser@sigmasolinc.com

More Related Content

What's hot

NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
ncceconnect
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
Tommy Tracx Xaypanya
 
Virtualization
VirtualizationVirtualization
Virtualization
Yansi Keim
 
Types of Virtualization Solutions
Types of Virtualization SolutionsTypes of Virtualization Solutions
Types of Virtualization Solutions
Array Networks
 
CS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling TechnologiesCS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling Technologies
karthikajegadeesan
 
Virtualization
VirtualizationVirtualization
Virtualization
Kumar Harsha
 
Virtualization
VirtualizationVirtualization
Virtualization
Utkarsh Soni
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
ofsorganizer
 
Virtualization
VirtualizationVirtualization
Virtualization
Kamal Chauhan
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
Sarbjeet Singh
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
Alessandro Guli
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
Radhika Kalavadiya
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
EMC
 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshare
Yogesh Kumar
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
Virtualization
VirtualizationVirtualization
Virtualization
Ajay Chawda
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
Ahmad Hafeezi
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
Mohammad Ilyas Malik
 

What's hot (20)

NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Types of Virtualization Solutions
Types of Virtualization SolutionsTypes of Virtualization Solutions
Types of Virtualization Solutions
 
CS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling TechnologiesCS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling Technologies
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshare
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 

Similar to Desktop Virtualization and the Consumerization of IT

Citrix Vision And Strategy Oct 2009
Citrix Vision And Strategy Oct 2009Citrix Vision And Strategy Oct 2009
Citrix Vision And Strategy Oct 2009
dataplex systems limited
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
IBM Danmark
 
Support you Microsoft cloud with Microsoft services By Anis Chebbi)
Support you Microsoft cloud with Microsoft services By Anis Chebbi)Support you Microsoft cloud with Microsoft services By Anis Chebbi)
Support you Microsoft cloud with Microsoft services By Anis Chebbi)TechdaysTunisia
 
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UYData Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UYLogicalis Latam
 
Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011
Louis Göhl
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft Singapore
 
Private Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarPrivate Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarExponential_e
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
CA API Management
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDenis Gundarev
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft Private Cloud
 
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiThe Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiHitendra Molleti
 
Keeping IT Real Webinar
Keeping IT Real WebinarKeeping IT Real Webinar
Keeping IT Real Webinar
johnworthington
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
 
Cloud platform technical sales presentation
Cloud platform technical sales presentationCloud platform technical sales presentation
Cloud platform technical sales presentation
Nuno Alves
 
VDI Monitoring
VDI MonitoringVDI Monitoring
VDI Monitoringkrajav
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
Chris Pepin
 
V mware view
V mware viewV mware view
V mware view
Sistemi Qualità
 
Trend and Future of Cloud Computing
Trend and Future of Cloud ComputingTrend and Future of Cloud Computing
Trend and Future of Cloud Computing
hybrid cloud
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
Enabling Innovation & Integration to the Cloud
Enabling Innovation & Integration to the CloudEnabling Innovation & Integration to the Cloud
Enabling Innovation & Integration to the Cloud
InnoTech
 

Similar to Desktop Virtualization and the Consumerization of IT (20)

Citrix Vision And Strategy Oct 2009
Citrix Vision And Strategy Oct 2009Citrix Vision And Strategy Oct 2009
Citrix Vision And Strategy Oct 2009
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
 
Support you Microsoft cloud with Microsoft services By Anis Chebbi)
Support you Microsoft cloud with Microsoft services By Anis Chebbi)Support you Microsoft cloud with Microsoft services By Anis Chebbi)
Support you Microsoft cloud with Microsoft services By Anis Chebbi)
 
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UYData Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
 
Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
 
Private Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarPrivate Clouds - Business Agility Seminar
Private Clouds - Business Agility Seminar
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
 
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiThe Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra Molleti
 
Keeping IT Real Webinar
Keeping IT Real WebinarKeeping IT Real Webinar
Keeping IT Real Webinar
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Cloud platform technical sales presentation
Cloud platform technical sales presentationCloud platform technical sales presentation
Cloud platform technical sales presentation
 
VDI Monitoring
VDI MonitoringVDI Monitoring
VDI Monitoring
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
V mware view
V mware viewV mware view
V mware view
 
Trend and Future of Cloud Computing
Trend and Future of Cloud ComputingTrend and Future of Cloud Computing
Trend and Future of Cloud Computing
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
Enabling Innovation & Integration to the Cloud
Enabling Innovation & Integration to the CloudEnabling Innovation & Integration to the Cloud
Enabling Innovation & Integration to the Cloud
 

More from InnoTech

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
InnoTech
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
InnoTech
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
InnoTech
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
InnoTech
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
InnoTech
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
InnoTech
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
InnoTech
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
InnoTech
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
InnoTech
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
InnoTech
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
InnoTech
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
InnoTech
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
InnoTech
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
InnoTech
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
InnoTech
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
InnoTech
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
InnoTech
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
InnoTech
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
InnoTech
 

More from InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Desktop Virtualization and the Consumerization of IT

  • 1. What’s New in vSphere 5 09-23-2011
  • 2. Agenda Journey To The Cloud Why are you considering DV? The Post PC Era The different Types of DV www.sigmasolinc.com
  • 3. Journey To The Cloud… 2014+ Virtualization 3.0 (Cloud Computing) The fully virtualized datacenter spans internal and external cloud adaptive, intelligent infrastructure service oriented (IT as a service) Virtualization 2.0  Integrated cloud management 2010  Utility billing/chargeback  Holistic monitoring/diagnosis  Automation and Orchestration  Cross-hypervisor management  Self-service portals  External cloud federation  Storage virtualization  Platform as a Service Virtualization 1.0  Client hypervisors  Virtualization-aware  Tier-1 Applications applications  Unplanned downtime  Mobility  VDI  Consumerization of IT  Resource  Converged Infrastructures optimization …Operational Savings  Policy-based management  Business continuity  Network/IO virtualization  Application Virtualization www.sigmasolinc.com
  • 4. Communications Evolution Enterprise Data 1950 1970 1970 1970 Telephone Fax Email Social www.sigmasolinc.com
  • 5.
  • 7. People Are Working Differently
  • 8. Post PC Era Has Begun
  • 10. Market Dynamics Quantifiable Qualifiable PC Replacement Savings Improved Data and Endpoint Security IT support cost savings from fewer Improved User Experience problems and faster resolution Improved worker productivity due to Better Business Continuity and reduced PC downtime and greater Disaster Recovery desktop mobility Electricity savings from Thin Client and Enhanced Business Agility, e.g. more Zero Client efficient outsourcing projects Greater IT staff efficiency due to Ability to spend more time on streamlined desktop management strategic projects
  • 11. Why are you considering DV? • Windows 7 Migration • Cost savings and green IT • Helpdesk efficiency / desktop management  PC lifecycle Management  User Experience  Cloud integration  BC/DR  BYOD www.sigmasolinc.com
  • 12. Why Put The Desktop in the Datacenter • Management • Access • Performance • Security • Single Instance Block Level www.sigmasolinc.com
  • 14. User Profiling Mobile Users Types Of Users Task Users Client Terminal Hypervisor Streaming VDI Server / Blade Type 1 & 2 Workstations Application Virtualization www.sigmasolinc.com
  • 15. Server & Desktop Virtualization: “not a mini me…” • Server Virtualization is about Consolidation, Containment & Availability • Desktop Virtualization is about Standardization & Customization • Desktops will always have exceptions • Not much CapEx savings, but Significant OpEx savings www.sigmasolinc.com
  • 16. BYOD • Bring, Your Own Device • Save on costs • Maximize user experience • Supportability • Access to corporate network • Private and corporate data mix • Hardware ownership • Encryption • Data ownership www.sigmasolinc.com
  • 17. VDI: Server-Hosted Virtual Desktops • VMs reside on servers in the data center • Server-based computing model • Centralized management, access, performance, and security • VDI “secret sauce”: – Storage – Management – User Personalization www.sigmasolinc.com
  • 18. VDI: Server-Hosted Virtual Desktops • Ease of management • Power savings • Replace broken hardware with Thin Clients • Support savings • Use of existing hardware • Business continuity • Backups • Device independence • Sensitive applications www.sigmasolinc.com
  • 19. Client Hypervisors – Type 1 • Standardized HAL • Reduce initial investment • Single Windows image • Multiple VMs • Enable BYOC • Swap user machine • Easier management and update www.sigmasolinc.com
  • 20. Client Hypervisors – Type 2 • Reliance on general-purpose OS • Double, triple, or quadruple number of managed VMs • Patching • Upgrading • Antivirus www.sigmasolinc.com
  • 21. Application Virtualization • Legacy Application Support • Reduced Storage Requirements • Reduce/Eliminate Application Conflicts • Centralized Management • Centralized Distribution • Not all apps can be virtualized www.sigmasolinc.com
  • 22. Twitter: @ekhnaser Elias Khnaser: EKhnaser@sigmasolinc.com