SlideShare a Scribd company logo
1 of 8
Download to read offline
WHITEPAPER
Meet the BYOD, ‘Computing Anywhere’
Challenge—Planning and License
Management for Desktop Virtualization
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization
2
Meet the BYOD, ‘Computing Anywhere’ Challenge—
Planning and License Management for Desktop Virtualization
The adoption of new technologies such as desktop
virtualization (e.g. Citrix®
XenDesktop®
, VMware®
Horizon View™) has radically changed the desktop
landscape making software license compliance and license
optimization even more difficult. The challenge of tracking
application installation and usage in this environment
combined with ever changing, complex or undocumented
product use rights puts organizations at risk of being non-
compliant. The difficulty of getting inventory data will be
examined below. Virtual desktop licensing rules— mainly for
Microsoft, will also be described in this paper.
Virtualization Adoption
For many years, desktop virtualization (aka Virtual Desktop
Infrastructure (VDI)) has been positioned as a technology
that will revolutionize the desktop market; many analysts
predicted it would soon take over a significant share of
the market. A significant percentage (see chart below) of
medium to large organizations is currently in the process
or has implemented virtual desktops but its use is restricted
to a few case scenarios due to the heavy upfront investment
required and the lack of significant return on investment.
Figure 1: The Importance of People to Software License Optimization Success
Virtualization Adoption
Storage
Virtualization
In production more than
24 months
Source: FOCUS Interop Survey Sept 2011 (Companies with >100 employees)
© 2013 FOCUS - www.focusonsystems.com
0% 80%70%60%50%40%30%20%10% 90% 100%
In production 12- 24
months
In production 6-12
months
In production 6 months or
less
Planning to implement in
less than 6 months
Planning to implement in
6-12 months
Planning to implement
later than 12 months
No plans
Application
Virtualization
Desktop
Virtualization
Server
Virtualization
In Production
In Production
In Production
In Production
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization
3
As of today, desktop virtualization represents only a few
percent of all desktops. However, it is still seen as one of
the leading technologies that should take a more significant
portion of the market in the coming years. One of the
drivers fueling these forecasts is the rapid adoption of
mobile devices and Bring Your Own Device (BYOD) policies
by organizations. For these devices, the virtual desktop
offers end users the flexibility to access their business
environment from anywhere, at any time, from almost any
device, running any operating system.
The drivers for desktop virtualization, as shown in Figure
2, also include providing the ability for IT to centralize and
simplify desktop management and accelerate provisioning
of new desktops. In addition, this technology meets
most organizations’ security, compliance and regulatory
requirements as data and applications are kept securely in
the datacenter.
Figure 2: Drivers for Desktop Virtualization [Source: TechWeb]
Drivers for Desktop Virtualization
(Organizations rating benefits of desktop virtualization “quite or very important”)
Percentages based on a 4 or 5 rating on a scale of 1 to 5, where 5 is “very important.”
Base: 300 respondents who have implemented, are piloting or planning to roll out desktop virtualization in the next year.
Data: TechWeb survey of 490 IT decision makers.
To centralize and simplify
desktop management
74.8%
74.2%
73.0%
67.5%
65.7%
62.7%
To improve security by maintaining
and backing up data centrally
To simplify and accelerate
provisioning new desktops
To lower infrastructure costs in power
usage and/or hardware acquisition
To provide end users with a convenient way to
access their desktop environments remotely
To extend refresh cycles
for desktop PCs
To reduce downtime caused by
server/client hardware failure
86.2%
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization
4
Types of Virtual Desktops
Virtual desktops come in two flavors: persistent and session
based (or non-persistent). A persistent virtual machine is
a virtual machine that is kept on a disk in the datacenter.
Each time the user logs in, the previous session on that
virtual machine is resumed. A user can create shortcuts,
customize or install additional applications on his or her
virtual desktop and all of these changes will be available
in future sessions. Persistent virtual machines are usually
only assigned to power users or administrators as they
consume a large amount of resources—such as storage, in
the datacenter.
The most common virtual desktops are session based. A
session based virtual machine is assigned from a pool
of virtual machines to the end user at log in time and
wiped out each time the user logs out. Some vendors offer
technical solutions to keep user changes across sessions and
can even add applications to the virtual desktop template
based on the user profile. In these instances, when the user
logs in, the user personalization is added to the virtual
desktop template.
Collecting Virtual Desktop Inventory
In the traditional desktop world, inventory is performed by
an agent running within the operating system. Inventory
consists of capturing software package data, for instance
in Windows environments—from Programs and Features,
file data, including contents of specific files, Windows
registry or ISO 19770-2 tags. From there, data scrubbing
and analysis is performed by an application recognition
tool to generate the list of commercial products requiring
a license. Additionally, a review of the login history on
the device provides clues about its primary user. Typical
inventory tools run on a schedule or are executed at log on
time. Scheduling is the most commonly used strategy as it
is less intrusive: it does not slow down the execution of the
operating system when the end user requests access to it.
It takes a few minutes for an inventory tool to capture
data, the most resource intensive task being to perform
a disk scan for executables, dlls, ISO 19770-2 tags or
specific files.
For persistent virtual desktops, inventory tools are able to
capture inventory and usage data the same way as for
traditional desktops. On the other hand, session based
virtual desktops are challenging for many reasons: there is
no practical way to run the inventory on a schedule as the
machine is wiped out every time the user logs out and this
may happen multiple times a day. The lifespan of a virtual
desktop can be extremely short, not leaving enough time
for a scheduled or session triggered inventory to complete
successfully. Inventory tools identify operating system
instances by using various techniques: from analyzing key
hardware or software properties (serial number, MAC
address, IP address…) or by assigning a unique identifier
to each one. A session based virtual desktop gets reused
across multiple users or is re-imaged after use. So, it’s
difficult to get a unique inventory for each session. This can
result in an ever growing, large number of devices that will
need to be reconciled. An alternative approach is to set-up
a mechanism to group sessions together on a per user basis.
In the virtual desktop environment, templates of virtual
machines are created and assigned to users. When a
user accesses a session based virtual desktop, a new
Figure 3: Desktop Virtualization Architecture [Source: FOCUS LLC www.focusonsystems.com ]
VirtualDesktops(VMs)
Server Hosted
Virtual Desktop Infrastructure
User Access Devices
PC
Laptop
Thin Client
Server
Tablet/phone
Hypervisor
Guest OS
APP 1 APP 2 •••
Guest OS
APP 1 APP 2 •••
Guest OS
APP 1 APP 2 •••
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization
5
virtual machine is created from the template assigned to
the user and the user roaming profile is attached to that
virtual machine to establish his personalized settings from
information in the Documents or My Documents folders.
This includes his desktop background, shortcuts, favorite
links, etc. The relationship between templates and end
users is based on access rights granted to end users for
specific templates.
Another difficulty is identifying additional applications that
have been added to the templates based on user profiles.
These applications are usually deployed using application
virtualization technologies (e.g. Citrix XenApp or Microsoft
App-V). For these, a quick scan at the beginning of the
session can be performed or alternatively this information
can be extracted from the application virtualization
tools themselves.
There are very few discovery and inventory tools that can
be used to inventory session based virtual desktops. One
approach is to inventory the templates that are used to
clone session based virtual desktops. FlexNet Manager
Platform, foundation of the FlexNet Manager Suite, can do
both a quick scan at the beginning of the session and/or
utilize the relationship between users and virtual desktop
templates to get an inventory of the session based virtual
desktop for a particular user.
One of the biggest challenges in session based virtual
desktop environments is measuring application usage.
There are only a few specialized tools on the market
able to perform this task. If these tools are not available,
usage data may be limited to information provided by
the application virtualization technologies. For instance,
Citrix EdgeSight will measure usage for XenApp virtualized
applications. FlexNet Manager Platform can collect usage
data from EdgeSight.
A big license management challenge in virtual desktop
environments is related to the use of device based licenses
(more on this below). The device considered for licensing
in this model is not the virtual desktop itself running in the
datacenter, but the physical endpoint devices used to access
it. For instance, if an end user uses both a laptop PC and an
iPad to access a virtual desktop environment, two licenses
may be needed depending on the product use rights
associated with the software product running in the virtual
desktop. To maintain license compliance, it is mandatory to
capture some key inventory data for these endpoint devices
during each virtual desktop session. Only a few inventory
tools available today are able to capture this data.
As can be seen, inventorying virtual desktops is not
easy. Traditional inventory tools often fall short in this
environment. Different strategies and tools are needed to
capture the inventory and usage data required to accurately
calculate a license position. The license management
tool must be able to collect, process and aggregate data
from different data sources. FlexNet Manager Platform
captures user access rights and usage data for both virtual
desktops and virtualized applications to enable an accurate
determination of the license position for applications
running in these environments.
Persistent virtual machines
Non-persistent pool /
session based
Persistent model: each user has a dedicated virtual machine
Session based model: Virtual machines are dynamically allocated
to end users from the pool
Figure 4: Persistent and Session Based Virtual Desktops
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization
6
Licensing in Virtual Desktop Environments
In the desktop world, there are three main types of licenses:
concurrent, user and device based. Concurrent is the
easiest to handle from a license compliance perspective,
as compliance is usually self-managed by the license
model and license server—only a certain number of people
can check out a license at any one time. Organizations
are usually compliant with this license metric, although
there can still be issues, particularly when using licenses
across different geographical regions, for example. The
complications around concurrent licensing come about when
trying to determine the optimal number of licenses required
to keep denials of service in check, without over spending
on software licenses—a topic for another white paper.
In the user license model, a user will usually consume
a single license regardless of how the application was
accessed: from a local installation, using an application
virtualization or virtual desktop technology or any
combination of the above. This license model requires the
ability to accurately capture usage data and user access
rights to software products in these environments (as
described above) to accurately calculate a license position.
Capturing this data also enables license optimization by
removing access to inactive users, for instance.
Device based licenses are the most challenging for two
reasons: first, as mentioned above, the device license
applies to the device from which the application is
accessed, not to the device where the application is
running. In a remote desktop virtualization scenario, these
are two distinct physical devices: the physical server in the
datacenter where the virtual desktop is hosted and running
and the devices used to access the virtual desktop. The
devices in this last category are the ones counted toward
licensing and could be anything from the user’s company
owned or personal computer, laptop, iPad, and intelligent
mobile device, to an internet café computer. The second
reason why device based licenses are challenging for
license management is the existence of product use
rights that must be applied to these desktop virtual
environment configurations.
Among all the software vendors, Microsoft has taken the
lead in publishing product use rights for each of its products
when used in a virtual desktop environment. On the surface
of it, all devices using virtual desktop technology to access
a Microsoft software product that is licensed per device
must be licensed for this product. However, there are a few
exceptions tied to the virtual desktop access and roaming
use rights provided by Software Assurance (SA), Virtual
Desktop Access (VDA) or Companion Subscription License
(CSL) licenses.
Software Assurance is a maintenance program providing
many benefits including access to the latest releases. It
provides both virtual desktop access and external roaming
rights. A Virtual Desktop Access license is a subscription
based license intended to cover devices that cannot
be covered by Software Assurance such as thin-clients,
contractor owned PCs, etc. It only provides virtual desktop
access rights for the Microsoft Windows Operating System.
A Companion Subscription License can be purchased on
top of Software Assurance or a VDA license to cover the
Windows OS on Bring Your Own Device (BYOD) devices
when people use them within the company premises to
access virtual desktops. A single Companion Subscription
License covers up to 4 devices.
Microsoft Windows Licensing
When using virtual desktop technologies, the first step is to
license Microsoft Windows itself for virtual desktops running
this operating system. The scenarios are as follows:
• If the user is the primary user of a company owned
computer covered by Software Assurance then no
additional license is required when this user accesses
a virtual desktop from (1) this same computer, (2) a
company owned Windows RT device from anywhere or
(3) a personal device outside of the office premises.
• If the user is the primary user of a computer covered
by a Virtual Desktop Access license then no additional
license is required when this user accesses a virtual
desktop from this same computer, or a personal device
outside of the office premises.
•	For any company owned device, not assigned to a
primary user, such as thin clients, a VDA license is
required except for Windows RT devices in the case
scenario mentioned above.
•	For any Bring You Own Device (BYOD) devices (used
at the office), a Virtual Desktop Access or Companion
Subscription License is needed. If a user already has
a device covered by Software Assurance or a VDA
license, a Companion Subscription License is more
economical than an additional VDA license.
•	Without Software Assurance or a Virtual Desktop
Access license, a user cannot access any virtual desktop
instances. In this scenario the most economical solution
is to subscribe the end user to a VDA license for his/her
company owned and/or personally owned devices and
additionally use a CSL license for any BYOD device
that will be used at the office.
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization
7
Microsoft Application Licensing
Microsoft Office, Project and Visio products are licensed per
device. A licensed device can access a local installation or
virtual desktop instance of these products. If the license is
covered by Software Assurance, then the primary user of
the company owned device can access these products in
a Virtual Desktop environment from non-corporate devices
outside of the office. All other devices accessing these
products through virtual desktops in any other scenarios
must be licensed. Any device accessing any other Microsoft
products licensed per device such as AutoRoute, Lync,
MapPoint, InfoPath, etc. must be licensed individually.
Some Microsoft server products such as Microsoft Exchange,
SQL Server, SharePoint, etc., require a Client Access License
(CAL) for each user or device accessing the software
product. If a User CAL is used, it will cover any use of the
product through a virtual desktop. If a Device CAL is used,
each end point device must be licensed. Developer tools
from Microsoft such as Visual Studio, SQL Server developer
or MSDN operating system are licensed per user. Licensed
users can access these software products through virtual
desktop technology.
Very few other software vendors have documented the
licensing impact of virtual desktop technologies. The current
product use rights in the EULA associated with each product
must be carefully analyzed in that context.
Conclusion
Organizations should take extra care to manage licensing
when deploying a virtual desktop solution. Most of the time,
additional licenses or subscriptions must be purchased that
add to the cost of the virtual desktop solution itself. Once
the virtual desktop solution is deployed, the organization
must manage and monitor users, end point devices and
deployed software products to maintain license compliance.
This is not an easy task and there are still some grey areas
such as controlling access from BYOD devices either on
company premises or outside of the company. Flexera
Software has taken the lead in managing and optimizing
licenses in virtual desktop environments with its FlexNet
Manager Suite for Enterprises products.
Corporate
Computer
covered by SA
Non Windows RT
Corporate Device
Windows RT
Corporate Device
Personal devices
outside the office
BYOD Device
Windows
Virtual
Desktop
No license required
VDA license required
No license required
No license required
CSL license required
Figure 5: Licensing Windows OS for devices used to access virtual desktops (“No license required” means No additional license)
Flexera Software LLC
1000 East Woodfield Road,
Suite 400
Schaumburg, IL 60173 USA
Schaumburg
(Global Headquarters):
+1 800-809-5659
United Kingdom (Europe,
Middle East Headquarters):
+44 870-871-1111
+44 870-873-6300
Australia (Asia,
Pacific Headquarters):
+61 3-9895-2000
For more office locations visit:
www.flexerasoftware.com
Copyright © 2013 Flexera Software LLC. All other brand and product names mentioned herein may be the trademarks and registered trademarks of their respective owners.
							 FNM_WP_BYOD_May13

More Related Content

What's hot

Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
Citrix command lines
Citrix command linesCitrix command lines
Citrix command linesprincesly
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructuregaurav jain
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneUnidesk Corporation
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld
 
Vdi how-it-works618
Vdi how-it-works618Vdi how-it-works618
Vdi how-it-works618shiva2shetty
 
VDI Performance Assessment
VDI Performance AssessmentVDI Performance Assessment
VDI Performance AssessmenteG Innovations
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Md Yousup Faruqu
 
New Horizons for End-User Computing Event - VMware
New Horizons for End-User Computing Event - VMwareNew Horizons for End-User Computing Event - VMware
New Horizons for End-User Computing Event - VMwareArrow ECS UK
 
Virtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVirtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVishal Deshpande
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3Jennifer Phillips
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk Corporation
 
View 5 competitive sales presentation
View 5 competitive sales presentationView 5 competitive sales presentation
View 5 competitive sales presentationsolarisyourep
 
View 4 Customer Presentation
View 4 Customer PresentationView 4 Customer Presentation
View 4 Customer Presentationepenedos
 
VDI Comparison: Five Reasons XenDesktop beats Horizon View
VDI Comparison: Five Reasons XenDesktop beats Horizon ViewVDI Comparison: Five Reasons XenDesktop beats Horizon View
VDI Comparison: Five Reasons XenDesktop beats Horizon ViewCitrix
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparisonlneut03
 

What's hot (20)

Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
Citrix command lines
Citrix command linesCitrix command lines
Citrix command lines
 
IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud Era
 
Vdi how-it-works618
Vdi how-it-works618Vdi how-it-works618
Vdi how-it-works618
 
VDI Performance Assessment
VDI Performance AssessmentVDI Performance Assessment
VDI Performance Assessment
 
Virtual Desktop Infrastructure
Virtual Desktop InfrastructureVirtual Desktop Infrastructure
Virtual Desktop Infrastructure
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
New Horizons for End-User Computing Event - VMware
New Horizons for End-User Computing Event - VMwareNew Horizons for End-User Computing Event - VMware
New Horizons for End-User Computing Event - VMware
 
Virtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVirtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmp
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
 
View 5 competitive sales presentation
View 5 competitive sales presentationView 5 competitive sales presentation
View 5 competitive sales presentation
 
View 4 Customer Presentation
View 4 Customer PresentationView 4 Customer Presentation
View 4 Customer Presentation
 
VDI Comparison: Five Reasons XenDesktop beats Horizon View
VDI Comparison: Five Reasons XenDesktop beats Horizon ViewVDI Comparison: Five Reasons XenDesktop beats Horizon View
VDI Comparison: Five Reasons XenDesktop beats Horizon View
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
 

Viewers also liked

Communications
CommunicationsCommunications
CommunicationsJACKYXTREM
 
Green Building and Multifamily
Green Building and MultifamilyGreen Building and Multifamily
Green Building and MultifamilyAndy Carswell
 
Time Management By Unni
Time Management By UnniTime Management By Unni
Time Management By Unniukrishnan3hr
 
Personal Branding for Massage Therapists
Personal Branding for Massage TherapistsPersonal Branding for Massage Therapists
Personal Branding for Massage TherapistsLouisa Chan 陈毅信
 
InstallAnywhere 2014
InstallAnywhere 2014InstallAnywhere 2014
InstallAnywhere 2014Flexera
 
2017ryan Cheale
2017ryan Cheale2017ryan Cheale
2017ryan Chealeryanch
 
UX Axioms (SummitUp 2013)
UX Axioms (SummitUp 2013)UX Axioms (SummitUp 2013)
UX Axioms (SummitUp 2013)Erik Dahl
 
富莱睿(Flexera)软件公司 AdminStudio Virtual Desktop Assessment Datasheet
富莱睿(Flexera)软件公司 AdminStudio Virtual Desktop Assessment Datasheet富莱睿(Flexera)软件公司 AdminStudio Virtual Desktop Assessment Datasheet
富莱睿(Flexera)软件公司 AdminStudio Virtual Desktop Assessment DatasheetFlexera
 
Virtual Desktops for the Enterprise
Virtual Desktops for the EnterpriseVirtual Desktops for the Enterprise
Virtual Desktops for the EnterpriseFlexera
 

Viewers also liked (20)

Communications
CommunicationsCommunications
Communications
 
Final report
Final reportFinal report
Final report
 
Podcast
PodcastPodcast
Podcast
 
Terrorism
TerrorismTerrorism
Terrorism
 
Green Building and Multifamily
Green Building and MultifamilyGreen Building and Multifamily
Green Building and Multifamily
 
Time Management By Unni
Time Management By UnniTime Management By Unni
Time Management By Unni
 
SSSSS
SSSSSSSSSS
SSSSS
 
Les bv1
Les bv1Les bv1
Les bv1
 
TIENDA VIRTUAL
TIENDA VIRTUALTIENDA VIRTUAL
TIENDA VIRTUAL
 
Personal Branding for Massage Therapists
Personal Branding for Massage TherapistsPersonal Branding for Massage Therapists
Personal Branding for Massage Therapists
 
3.unitatelaburpena
3.unitatelaburpena3.unitatelaburpena
3.unitatelaburpena
 
InstallAnywhere 2014
InstallAnywhere 2014InstallAnywhere 2014
InstallAnywhere 2014
 
Wintereinbruch
WintereinbruchWintereinbruch
Wintereinbruch
 
2017ryan Cheale
2017ryan Cheale2017ryan Cheale
2017ryan Cheale
 
UX Axioms (SummitUp 2013)
UX Axioms (SummitUp 2013)UX Axioms (SummitUp 2013)
UX Axioms (SummitUp 2013)
 
Maths Project
Maths ProjectMaths Project
Maths Project
 
Htgyk bemutato
Htgyk bemutatoHtgyk bemutato
Htgyk bemutato
 
Story Pp
Story PpStory Pp
Story Pp
 
富莱睿(Flexera)软件公司 AdminStudio Virtual Desktop Assessment Datasheet
富莱睿(Flexera)软件公司 AdminStudio Virtual Desktop Assessment Datasheet富莱睿(Flexera)软件公司 AdminStudio Virtual Desktop Assessment Datasheet
富莱睿(Flexera)软件公司 AdminStudio Virtual Desktop Assessment Datasheet
 
Virtual Desktops for the Enterprise
Virtual Desktops for the EnterpriseVirtual Desktops for the Enterprise
Virtual Desktops for the Enterprise
 

Similar to Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization

The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationHTS Hosting
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookNuno Alves
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software TestingColloquium
 
AdminStudio Virtual Desktop Assessment Datasheet
AdminStudio Virtual Desktop Assessment DatasheetAdminStudio Virtual Desktop Assessment Datasheet
AdminStudio Virtual Desktop Assessment DatasheetFlexera
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop RevolutionYankee Group
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Complemenatry & Alternative Solution to VDI
Complemenatry & Alternative Solution to VDIComplemenatry & Alternative Solution to VDI
Complemenatry & Alternative Solution to VDIDeskStream, Inc
 
Enterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsEnterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsMolten Technologies
 
Idc quantifying-business-value-v mware-view-wp
Idc quantifying-business-value-v mware-view-wpIdc quantifying-business-value-v mware-view-wp
Idc quantifying-business-value-v mware-view-wpkimsach
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewDavid Barry
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisationAlessandro Guli
 
4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdfHost It Smart
 
Virtualization 2011 v1
Virtualization 2011 v1Virtualization 2011 v1
Virtualization 2011 v1Pini Cohen
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 

Similar to Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization (20)

The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop Virtualization
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop Handbook
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
AdminStudio Virtual Desktop Assessment Datasheet
AdminStudio Virtual Desktop Assessment DatasheetAdminStudio Virtual Desktop Assessment Datasheet
AdminStudio Virtual Desktop Assessment Datasheet
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop Revolution
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Complemenatry & Alternative Solution to VDI
Complemenatry & Alternative Solution to VDIComplemenatry & Alternative Solution to VDI
Complemenatry & Alternative Solution to VDI
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Enterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsEnterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktops
 
VDI Cost benefit analysis
VDI Cost benefit analysisVDI Cost benefit analysis
VDI Cost benefit analysis
 
Idc quantifying-business-value-v mware-view-wp
Idc quantifying-business-value-v mware-view-wpIdc quantifying-business-value-v mware-view-wp
Idc quantifying-business-value-v mware-view-wp
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of View
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
 
4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf
 
Virtualization 2011 v1
Virtualization 2011 v1Virtualization 2011 v1
Virtualization 2011 v1
 
Introduction to vDesk
Introduction to vDeskIntroduction to vDesk
Introduction to vDesk
 
vDesk: Introduction to Desktop Virtualization
vDesk: Introduction to Desktop VirtualizationvDesk: Introduction to Desktop Virtualization
vDesk: Introduction to Desktop Virtualization
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Introduction to Virtual Desktop Architectures
Introduction to Virtual Desktop ArchitecturesIntroduction to Virtual Desktop Architectures
Introduction to Virtual Desktop Architectures
 

More from Flexera

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Flexera
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyFlexera
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT EnvironmentFlexera
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceFlexera
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementFlexera
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First StrategyFlexera
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareFlexera
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewFlexera
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Flexera
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityFlexera
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Flexera
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Flexera
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Flexera
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2Flexera
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins FlexeraFlexera
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Flexera
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsFlexera
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseFlexera
 

More from Flexera (20)

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins Flexera
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization

  • 1. WHITEPAPER Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization
  • 2. Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization 2 Meet the BYOD, ‘Computing Anywhere’ Challenge— Planning and License Management for Desktop Virtualization The adoption of new technologies such as desktop virtualization (e.g. Citrix® XenDesktop® , VMware® Horizon View™) has radically changed the desktop landscape making software license compliance and license optimization even more difficult. The challenge of tracking application installation and usage in this environment combined with ever changing, complex or undocumented product use rights puts organizations at risk of being non- compliant. The difficulty of getting inventory data will be examined below. Virtual desktop licensing rules— mainly for Microsoft, will also be described in this paper. Virtualization Adoption For many years, desktop virtualization (aka Virtual Desktop Infrastructure (VDI)) has been positioned as a technology that will revolutionize the desktop market; many analysts predicted it would soon take over a significant share of the market. A significant percentage (see chart below) of medium to large organizations is currently in the process or has implemented virtual desktops but its use is restricted to a few case scenarios due to the heavy upfront investment required and the lack of significant return on investment. Figure 1: The Importance of People to Software License Optimization Success Virtualization Adoption Storage Virtualization In production more than 24 months Source: FOCUS Interop Survey Sept 2011 (Companies with >100 employees) © 2013 FOCUS - www.focusonsystems.com 0% 80%70%60%50%40%30%20%10% 90% 100% In production 12- 24 months In production 6-12 months In production 6 months or less Planning to implement in less than 6 months Planning to implement in 6-12 months Planning to implement later than 12 months No plans Application Virtualization Desktop Virtualization Server Virtualization In Production In Production In Production In Production
  • 3. Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization 3 As of today, desktop virtualization represents only a few percent of all desktops. However, it is still seen as one of the leading technologies that should take a more significant portion of the market in the coming years. One of the drivers fueling these forecasts is the rapid adoption of mobile devices and Bring Your Own Device (BYOD) policies by organizations. For these devices, the virtual desktop offers end users the flexibility to access their business environment from anywhere, at any time, from almost any device, running any operating system. The drivers for desktop virtualization, as shown in Figure 2, also include providing the ability for IT to centralize and simplify desktop management and accelerate provisioning of new desktops. In addition, this technology meets most organizations’ security, compliance and regulatory requirements as data and applications are kept securely in the datacenter. Figure 2: Drivers for Desktop Virtualization [Source: TechWeb] Drivers for Desktop Virtualization (Organizations rating benefits of desktop virtualization “quite or very important”) Percentages based on a 4 or 5 rating on a scale of 1 to 5, where 5 is “very important.” Base: 300 respondents who have implemented, are piloting or planning to roll out desktop virtualization in the next year. Data: TechWeb survey of 490 IT decision makers. To centralize and simplify desktop management 74.8% 74.2% 73.0% 67.5% 65.7% 62.7% To improve security by maintaining and backing up data centrally To simplify and accelerate provisioning new desktops To lower infrastructure costs in power usage and/or hardware acquisition To provide end users with a convenient way to access their desktop environments remotely To extend refresh cycles for desktop PCs To reduce downtime caused by server/client hardware failure 86.2%
  • 4. Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization 4 Types of Virtual Desktops Virtual desktops come in two flavors: persistent and session based (or non-persistent). A persistent virtual machine is a virtual machine that is kept on a disk in the datacenter. Each time the user logs in, the previous session on that virtual machine is resumed. A user can create shortcuts, customize or install additional applications on his or her virtual desktop and all of these changes will be available in future sessions. Persistent virtual machines are usually only assigned to power users or administrators as they consume a large amount of resources—such as storage, in the datacenter. The most common virtual desktops are session based. A session based virtual machine is assigned from a pool of virtual machines to the end user at log in time and wiped out each time the user logs out. Some vendors offer technical solutions to keep user changes across sessions and can even add applications to the virtual desktop template based on the user profile. In these instances, when the user logs in, the user personalization is added to the virtual desktop template. Collecting Virtual Desktop Inventory In the traditional desktop world, inventory is performed by an agent running within the operating system. Inventory consists of capturing software package data, for instance in Windows environments—from Programs and Features, file data, including contents of specific files, Windows registry or ISO 19770-2 tags. From there, data scrubbing and analysis is performed by an application recognition tool to generate the list of commercial products requiring a license. Additionally, a review of the login history on the device provides clues about its primary user. Typical inventory tools run on a schedule or are executed at log on time. Scheduling is the most commonly used strategy as it is less intrusive: it does not slow down the execution of the operating system when the end user requests access to it. It takes a few minutes for an inventory tool to capture data, the most resource intensive task being to perform a disk scan for executables, dlls, ISO 19770-2 tags or specific files. For persistent virtual desktops, inventory tools are able to capture inventory and usage data the same way as for traditional desktops. On the other hand, session based virtual desktops are challenging for many reasons: there is no practical way to run the inventory on a schedule as the machine is wiped out every time the user logs out and this may happen multiple times a day. The lifespan of a virtual desktop can be extremely short, not leaving enough time for a scheduled or session triggered inventory to complete successfully. Inventory tools identify operating system instances by using various techniques: from analyzing key hardware or software properties (serial number, MAC address, IP address…) or by assigning a unique identifier to each one. A session based virtual desktop gets reused across multiple users or is re-imaged after use. So, it’s difficult to get a unique inventory for each session. This can result in an ever growing, large number of devices that will need to be reconciled. An alternative approach is to set-up a mechanism to group sessions together on a per user basis. In the virtual desktop environment, templates of virtual machines are created and assigned to users. When a user accesses a session based virtual desktop, a new Figure 3: Desktop Virtualization Architecture [Source: FOCUS LLC www.focusonsystems.com ] VirtualDesktops(VMs) Server Hosted Virtual Desktop Infrastructure User Access Devices PC Laptop Thin Client Server Tablet/phone Hypervisor Guest OS APP 1 APP 2 ••• Guest OS APP 1 APP 2 ••• Guest OS APP 1 APP 2 •••
  • 5. Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization 5 virtual machine is created from the template assigned to the user and the user roaming profile is attached to that virtual machine to establish his personalized settings from information in the Documents or My Documents folders. This includes his desktop background, shortcuts, favorite links, etc. The relationship between templates and end users is based on access rights granted to end users for specific templates. Another difficulty is identifying additional applications that have been added to the templates based on user profiles. These applications are usually deployed using application virtualization technologies (e.g. Citrix XenApp or Microsoft App-V). For these, a quick scan at the beginning of the session can be performed or alternatively this information can be extracted from the application virtualization tools themselves. There are very few discovery and inventory tools that can be used to inventory session based virtual desktops. One approach is to inventory the templates that are used to clone session based virtual desktops. FlexNet Manager Platform, foundation of the FlexNet Manager Suite, can do both a quick scan at the beginning of the session and/or utilize the relationship between users and virtual desktop templates to get an inventory of the session based virtual desktop for a particular user. One of the biggest challenges in session based virtual desktop environments is measuring application usage. There are only a few specialized tools on the market able to perform this task. If these tools are not available, usage data may be limited to information provided by the application virtualization technologies. For instance, Citrix EdgeSight will measure usage for XenApp virtualized applications. FlexNet Manager Platform can collect usage data from EdgeSight. A big license management challenge in virtual desktop environments is related to the use of device based licenses (more on this below). The device considered for licensing in this model is not the virtual desktop itself running in the datacenter, but the physical endpoint devices used to access it. For instance, if an end user uses both a laptop PC and an iPad to access a virtual desktop environment, two licenses may be needed depending on the product use rights associated with the software product running in the virtual desktop. To maintain license compliance, it is mandatory to capture some key inventory data for these endpoint devices during each virtual desktop session. Only a few inventory tools available today are able to capture this data. As can be seen, inventorying virtual desktops is not easy. Traditional inventory tools often fall short in this environment. Different strategies and tools are needed to capture the inventory and usage data required to accurately calculate a license position. The license management tool must be able to collect, process and aggregate data from different data sources. FlexNet Manager Platform captures user access rights and usage data for both virtual desktops and virtualized applications to enable an accurate determination of the license position for applications running in these environments. Persistent virtual machines Non-persistent pool / session based Persistent model: each user has a dedicated virtual machine Session based model: Virtual machines are dynamically allocated to end users from the pool Figure 4: Persistent and Session Based Virtual Desktops
  • 6. Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization 6 Licensing in Virtual Desktop Environments In the desktop world, there are three main types of licenses: concurrent, user and device based. Concurrent is the easiest to handle from a license compliance perspective, as compliance is usually self-managed by the license model and license server—only a certain number of people can check out a license at any one time. Organizations are usually compliant with this license metric, although there can still be issues, particularly when using licenses across different geographical regions, for example. The complications around concurrent licensing come about when trying to determine the optimal number of licenses required to keep denials of service in check, without over spending on software licenses—a topic for another white paper. In the user license model, a user will usually consume a single license regardless of how the application was accessed: from a local installation, using an application virtualization or virtual desktop technology or any combination of the above. This license model requires the ability to accurately capture usage data and user access rights to software products in these environments (as described above) to accurately calculate a license position. Capturing this data also enables license optimization by removing access to inactive users, for instance. Device based licenses are the most challenging for two reasons: first, as mentioned above, the device license applies to the device from which the application is accessed, not to the device where the application is running. In a remote desktop virtualization scenario, these are two distinct physical devices: the physical server in the datacenter where the virtual desktop is hosted and running and the devices used to access the virtual desktop. The devices in this last category are the ones counted toward licensing and could be anything from the user’s company owned or personal computer, laptop, iPad, and intelligent mobile device, to an internet café computer. The second reason why device based licenses are challenging for license management is the existence of product use rights that must be applied to these desktop virtual environment configurations. Among all the software vendors, Microsoft has taken the lead in publishing product use rights for each of its products when used in a virtual desktop environment. On the surface of it, all devices using virtual desktop technology to access a Microsoft software product that is licensed per device must be licensed for this product. However, there are a few exceptions tied to the virtual desktop access and roaming use rights provided by Software Assurance (SA), Virtual Desktop Access (VDA) or Companion Subscription License (CSL) licenses. Software Assurance is a maintenance program providing many benefits including access to the latest releases. It provides both virtual desktop access and external roaming rights. A Virtual Desktop Access license is a subscription based license intended to cover devices that cannot be covered by Software Assurance such as thin-clients, contractor owned PCs, etc. It only provides virtual desktop access rights for the Microsoft Windows Operating System. A Companion Subscription License can be purchased on top of Software Assurance or a VDA license to cover the Windows OS on Bring Your Own Device (BYOD) devices when people use them within the company premises to access virtual desktops. A single Companion Subscription License covers up to 4 devices. Microsoft Windows Licensing When using virtual desktop technologies, the first step is to license Microsoft Windows itself for virtual desktops running this operating system. The scenarios are as follows: • If the user is the primary user of a company owned computer covered by Software Assurance then no additional license is required when this user accesses a virtual desktop from (1) this same computer, (2) a company owned Windows RT device from anywhere or (3) a personal device outside of the office premises. • If the user is the primary user of a computer covered by a Virtual Desktop Access license then no additional license is required when this user accesses a virtual desktop from this same computer, or a personal device outside of the office premises. • For any company owned device, not assigned to a primary user, such as thin clients, a VDA license is required except for Windows RT devices in the case scenario mentioned above. • For any Bring You Own Device (BYOD) devices (used at the office), a Virtual Desktop Access or Companion Subscription License is needed. If a user already has a device covered by Software Assurance or a VDA license, a Companion Subscription License is more economical than an additional VDA license. • Without Software Assurance or a Virtual Desktop Access license, a user cannot access any virtual desktop instances. In this scenario the most economical solution is to subscribe the end user to a VDA license for his/her company owned and/or personally owned devices and additionally use a CSL license for any BYOD device that will be used at the office.
  • 7. Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management for Desktop Virtualization 7 Microsoft Application Licensing Microsoft Office, Project and Visio products are licensed per device. A licensed device can access a local installation or virtual desktop instance of these products. If the license is covered by Software Assurance, then the primary user of the company owned device can access these products in a Virtual Desktop environment from non-corporate devices outside of the office. All other devices accessing these products through virtual desktops in any other scenarios must be licensed. Any device accessing any other Microsoft products licensed per device such as AutoRoute, Lync, MapPoint, InfoPath, etc. must be licensed individually. Some Microsoft server products such as Microsoft Exchange, SQL Server, SharePoint, etc., require a Client Access License (CAL) for each user or device accessing the software product. If a User CAL is used, it will cover any use of the product through a virtual desktop. If a Device CAL is used, each end point device must be licensed. Developer tools from Microsoft such as Visual Studio, SQL Server developer or MSDN operating system are licensed per user. Licensed users can access these software products through virtual desktop technology. Very few other software vendors have documented the licensing impact of virtual desktop technologies. The current product use rights in the EULA associated with each product must be carefully analyzed in that context. Conclusion Organizations should take extra care to manage licensing when deploying a virtual desktop solution. Most of the time, additional licenses or subscriptions must be purchased that add to the cost of the virtual desktop solution itself. Once the virtual desktop solution is deployed, the organization must manage and monitor users, end point devices and deployed software products to maintain license compliance. This is not an easy task and there are still some grey areas such as controlling access from BYOD devices either on company premises or outside of the company. Flexera Software has taken the lead in managing and optimizing licenses in virtual desktop environments with its FlexNet Manager Suite for Enterprises products. Corporate Computer covered by SA Non Windows RT Corporate Device Windows RT Corporate Device Personal devices outside the office BYOD Device Windows Virtual Desktop No license required VDA license required No license required No license required CSL license required Figure 5: Licensing Windows OS for devices used to access virtual desktops (“No license required” means No additional license)
  • 8. Flexera Software LLC 1000 East Woodfield Road, Suite 400 Schaumburg, IL 60173 USA Schaumburg (Global Headquarters): +1 800-809-5659 United Kingdom (Europe, Middle East Headquarters): +44 870-871-1111 +44 870-873-6300 Australia (Asia, Pacific Headquarters): +61 3-9895-2000 For more office locations visit: www.flexerasoftware.com Copyright © 2013 Flexera Software LLC. All other brand and product names mentioned herein may be the trademarks and registered trademarks of their respective owners. FNM_WP_BYOD_May13