SlideShare a Scribd company logo
The Road to The Cloud
                                   Drivers
                                   - Long PC Replacement Cycles                   The Cloud
                                   - Upfront stipend
                                   Hurdles
                 BYOPC             - Over 70% Show no ROI
                                       (Opex & Capex higher)
                                   - Complex to support
                                   - Users really want
                                       “consumerization”
                                   - Average user will have 3
                                       devices
                                                                  Drivers
                                                                  - Users comfortable & productive
                                                                      with smart devices
                 Drivers
                                                       BYOD &     - Purpose optimized devices
                 - Success with
                                                                      (Tablet, Phones) work
Virtualization       server consolidation             Consumer-   - Employee satisfaction
                 - Benefits and TCO of
                                                        ization   - Consumer devices evolving quickly
                     server based computing
                                                                  Hurdles
                 Hurdles
                                                                  - Security - users leaving w/
                 - Difficulty scaling
                                                                      corporate data
                 - Higher CAPEX
                                                                  - Application Licensing
                 - Upfront investment
                                                                  - Support
                 - TCO dissolution
                 - User dissatisfaction

2013 LENOVO
The Traditional View of The Cloud - DataCenter Services


                                                                                             …provided as a service


                                                                                       Underlying technologies and operations
                                                                                        abstracted from user
                                                              …resources…              Users typically billed or charged back on
                                                                                        simple pay-per-use basis


                                                 Three “as-a-service” models
                                                  Iaas (infrastructure)
                                                  Paas (platform)
                                                  Saas (software)
                                                 Public (off-premise) or private
   Leverages distributed computing              (on-premise or dedicated hosted)
    technologies pioneered by consumer Web
    firms and delivered by virtualized servers




     2013 LENOVO
Lenovo’s View of The Cloud — It’s More Than Just Content Services
Content Services




                                            Private
                                            Cloud                                             The Cloud itself.
                                 Public               Hybrid Cloud                   Deliver “content” as a Service
                                 Cloud                                        Both public, private and hybrid cloud solutions
Cloud Enablement Layers




                                                                     The DataCenter, Servers, storage, etc… between the middleware
                                        Infrastructure                                   and content services


                                                                      Secure access to private, public and hybrid clouds, as well as
                                        The Middleware                            monitoring the cloud performance

                                                                       Cloud access devices, both normal PCs and network centric
                                   The Access Device                         devices, that display and connect to the Cloud




                          2013 LENOVO
At The Client, Today’s Approach To Cloud Is Unbalanced




                               Cloud
                              Content
                              Services




               An Unbalanced Approach assumes a ―dumb-downed‖ client
                      Cloud Capabilities are delivered by the Data Center
                         to the “least common denominator” of Device



 2013 LENOVO
A Better Approach Moving Forward - Balanced


               webNetwork
                                                                                    Cloud Ready Client

 The Cloud via a Browser Based                      Cloud                      Using Clients that are aware of
 Desktop                                           Content
                                                                               Cloud
                                                   Services
  Web based application delivery                                               A client whose attributes are discoverable &
  Delivers multiple application types and other                                 consumable by the Cloud
   datacenter resources                                                          − Graphics processing
   − Web applications                                                            − Local Processor power
   − Publish applications                                                        − Multi-factor authentication
     (RDS, Citrix, etc.)
                                                                                 − Memory usage
   − Virtualized applications
                                                                                 − Network bandwidth
   − Local application




                                A balanced approach requires both the Client & the Cloud to be
                                                   “aware” of each other



 2013 LENOVO
The Face of the Cloud – Lenovo’s Internal Beta




2013 LENOVO
The Face of the Cloud – Lenovo’s CDW Portal




2013 LENOVO
Similarities & Differences In A Cloud World



                                                                                                                Authentication
                                       Authentication
       Traditional Environment



                                                                                                               User Interface




                                                                 Cloud Environment
                                       User Interface




                                 App      App       App    App
                                           Local Storage
                                                                                                             Access and Encryption

                                          Windows




                                                                                                                                                          FileShare
                                                                                               App     App      App       App    App       App    App




                                                                                                                                                           Internal
                                                                                                                                                                      Storage
                                                                                     Storage




                                                                                                                                                                      Cloud
                                                                                      Local
                                                                                               Local       Published         Published       Web Server
                                                                                                OS      Terminal Server    Citrix/VMWare




2013 LENOVO
High-level Architecture & Unified Cloud




                                          Use Cases
                                          • Secure student & parent access
                                            from home
                                          • BYOD
                                          • Distance Teaching
                                          • Activity portals & simplified access



2013 LENOVO
LanSchool Corporate Overview
     LanSchool was founded in 1986
     27th anniversary year
     LanSchool was the first network-based classroom management
      solution
     Acquired by Lenovo in 2012




2013 LENOVO
Early Adopters On The Road To the Cloud
     K12 WebNetwork Customers                  K12 LanSchool Customers
     • Baker County Public Schools             • Brevard County Public Schools
     • Bradford County Public Schools          • Broward County Public Schools
     • Clay County Public Schools              • Clay County Public Schools
     • Columbia County Public Schools          • Charlotte County Public Schools
     • DeSoto County Public Schools            • Columbia County Public Schools
     • Dixie County Public Schools             • DeSoto County Public Schools
     • Flagler County Public Schools           • Escambia County Public Schools
     • Florida Department of Education         • Lake County Public Schools
     • Florida School for the Deaf and Blind   • Lee County Public Schools
     • Gilchrist County Public Schools         • Leon County Public Schools
     • Hamilton County Public Schools          • Miami Dade County Public Schools
     • Hernando County Public Schools          • Monroe County Public Schools
     • Lafayette County Public Schools         • Orange County Public Schools
     • Lake County Public Schools              • Sarasota County Public Schools
     • Marion County Public Schools            • St. Johns County Public Schools
     • Monroe County Public Schools
     • NEFEC
     • Okeechobee County Public Schools
     • Putnam County Public Schools
     • Seminole County Public Schools
     • Union County Public Schools
     • Volusia County Public Schools
 2013 LENOVO
Austin ISD
•     Austin Independent School District
            Located in Austin, TX
            5th largest school district in Texas
            86,000 students
            124 schools
            Active Directory
     MyAustin Cloud
            Users
                     Teachers
                     Student
                     Staff
                     Parents
            No VPNs, web-based remote access
            Deliver over 200 apps
            Single sign-on
            25 GB Skydrive, 20 GB Google, 4 GB SAN
            Lowered helpdesk costs (fewer password calls)
            Decided not to implement VDI
    2013 LENOVO
Distance Teaching Architecture – webNetwork & LanSchool

•    Show teacher
•    Show student to other students
•    Monitor thumbnails
•    Testing
•    Polling
•    Group chat
•    Send message
•    Limit web
•    Limit applications
•    Blank screens
•    Virtual class rooms


 2013 LENOVO
Lenovo: The Cloud Over BYOD

More Related Content

What's hot

The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012Lew Tucker
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
José Ferreiro
 
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderWhat an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud Provider
Novell
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
CloudOps Summit
 
Smart Analytics Cloud med Cognos (IBM Information Management)
Smart Analytics Cloud med Cognos (IBM Information Management)Smart Analytics Cloud med Cognos (IBM Information Management)
Smart Analytics Cloud med Cognos (IBM Information Management)
IBM Danmark
 
Cloud Computing at UTM Shillong
Cloud Computing at UTM ShillongCloud Computing at UTM Shillong
Cloud Computing at UTM Shillong
Capgemini
 
Lockheed Martin Deployment Cloud Design Patterns
Lockheed Martin Deployment Cloud Design PatternsLockheed Martin Deployment Cloud Design Patterns
Lockheed Martin Deployment Cloud Design Patterns
GovCloud Network
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
 
Novell Success Stories: Collaboration in Government
Novell Success Stories: Collaboration in GovernmentNovell Success Stories: Collaboration in Government
Novell Success Stories: Collaboration in Government
Novell
 
Cloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryCloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryStudying
 
Effective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingEffective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputing
IBM India Smarter Computing
 
As oportunidades para a Indústria Geradas pela Computação em Nuvem
As oportunidades para a Indústria Geradas pela Computação em NuvemAs oportunidades para a Indústria Geradas pela Computação em Nuvem
As oportunidades para a Indústria Geradas pela Computação em Nuvem
Soluções NEI
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private CloudVertical Solutions
 
20090921 Risacher To Ncoic Cloud Storefront
20090921 Risacher To Ncoic Cloud Storefront20090921 Risacher To Ncoic Cloud Storefront
20090921 Risacher To Ncoic Cloud StorefrontGovCloud Network
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuum
Tom Crombez
 

What's hot (17)

The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderWhat an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud Provider
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
 
Smart Analytics Cloud med Cognos (IBM Information Management)
Smart Analytics Cloud med Cognos (IBM Information Management)Smart Analytics Cloud med Cognos (IBM Information Management)
Smart Analytics Cloud med Cognos (IBM Information Management)
 
Cloud Computing at UTM Shillong
Cloud Computing at UTM ShillongCloud Computing at UTM Shillong
Cloud Computing at UTM Shillong
 
Lockheed Martin Deployment Cloud Design Patterns
Lockheed Martin Deployment Cloud Design PatternsLockheed Martin Deployment Cloud Design Patterns
Lockheed Martin Deployment Cloud Design Patterns
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Novell Success Stories: Collaboration in Government
Novell Success Stories: Collaboration in GovernmentNovell Success Stories: Collaboration in Government
Novell Success Stories: Collaboration in Government
 
Cloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryCloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industry
 
Effective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingEffective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputing
 
As oportunidades para a Indústria Geradas pela Computação em Nuvem
As oportunidades para a Indústria Geradas pela Computação em NuvemAs oportunidades para a Indústria Geradas pela Computação em Nuvem
As oportunidades para a Indústria Geradas pela Computação em Nuvem
 
Cloud computing ppt_0
Cloud computing ppt_0Cloud computing ppt_0
Cloud computing ppt_0
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
 
20090921 Risacher To Ncoic Cloud Storefront
20090921 Risacher To Ncoic Cloud Storefront20090921 Risacher To Ncoic Cloud Storefront
20090921 Risacher To Ncoic Cloud Storefront
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuum
 

Similar to Lenovo: The Cloud Over BYOD

Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
ACMBangalore
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategyLilian Schaffer
 
An enterprise journey in the Cloud
An enterprise journey in the CloudAn enterprise journey in the Cloud
An enterprise journey in the Cloud
Raghuraman Balachandran
 
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
Peter de Haas
 
Enterprise Private Cloud Computing
Enterprise Private Cloud ComputingEnterprise Private Cloud Computing
Enterprise Private Cloud Computing
Cisco Canada
 
Cloud computing
Cloud computingCloud computing
Cloud computingsaralaanuj
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Nazish Mohammed
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloud
Joseph Remesar
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud ComputingQuaid Sodawala
 
Simplifying Cloud Implementation
Simplifying Cloud ImplementationSimplifying Cloud Implementation
Simplifying Cloud ImplementationMorphlabs
 
Lovett introducing cloud computing nov 2009
Lovett introducing cloud computing nov 2009Lovett introducing cloud computing nov 2009
Lovett introducing cloud computing nov 2009Hilde Lovett
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
John Rhoton
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Software Guru
 
AbiCloud Webinar 1.0
AbiCloud Webinar 1.0AbiCloud Webinar 1.0
AbiCloud Webinar 1.0
Abiquo, Inc.
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing WebinarSaif Ahmad
 
Utility metered cloud slideshare
Utility metered cloud   slideshareUtility metered cloud   slideshare
Utility metered cloud slideshareValencell, Inc.
 
Dell and OpenStack
Dell and OpenStackDell and OpenStack
Dell and OpenStackeNovance
 

Similar to Lenovo: The Cloud Over BYOD (20)

Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategy
 
An enterprise journey in the Cloud
An enterprise journey in the CloudAn enterprise journey in the Cloud
An enterprise journey in the Cloud
 
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
 
484 488
484 488484 488
484 488
 
Enterprise Private Cloud Computing
Enterprise Private Cloud ComputingEnterprise Private Cloud Computing
Enterprise Private Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloud
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud Computing
 
Simplifying Cloud Implementation
Simplifying Cloud ImplementationSimplifying Cloud Implementation
Simplifying Cloud Implementation
 
Lovett introducing cloud computing nov 2009
Lovett introducing cloud computing nov 2009Lovett introducing cloud computing nov 2009
Lovett introducing cloud computing nov 2009
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
 
119 125
119 125119 125
119 125
 
119 125
119 125119 125
119 125
 
AbiCloud Webinar 1.0
AbiCloud Webinar 1.0AbiCloud Webinar 1.0
AbiCloud Webinar 1.0
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
Utility metered cloud slideshare
Utility metered cloud   slideshareUtility metered cloud   slideshare
Utility metered cloud slideshare
 
Dell and OpenStack
Dell and OpenStackDell and OpenStack
Dell and OpenStack
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Lenovo: The Cloud Over BYOD

  • 1.
  • 2. The Road to The Cloud Drivers - Long PC Replacement Cycles The Cloud - Upfront stipend Hurdles BYOPC - Over 70% Show no ROI (Opex & Capex higher) - Complex to support - Users really want “consumerization” - Average user will have 3 devices Drivers - Users comfortable & productive with smart devices Drivers BYOD & - Purpose optimized devices - Success with (Tablet, Phones) work Virtualization server consolidation Consumer- - Employee satisfaction - Benefits and TCO of ization - Consumer devices evolving quickly server based computing Hurdles Hurdles - Security - users leaving w/ - Difficulty scaling corporate data - Higher CAPEX - Application Licensing - Upfront investment - Support - TCO dissolution - User dissatisfaction 2013 LENOVO
  • 3. The Traditional View of The Cloud - DataCenter Services …provided as a service  Underlying technologies and operations abstracted from user …resources…  Users typically billed or charged back on simple pay-per-use basis Three “as-a-service” models  Iaas (infrastructure)  Paas (platform)  Saas (software) Public (off-premise) or private  Leverages distributed computing (on-premise or dedicated hosted) technologies pioneered by consumer Web firms and delivered by virtualized servers 2013 LENOVO
  • 4. Lenovo’s View of The Cloud — It’s More Than Just Content Services Content Services Private Cloud The Cloud itself. Public Hybrid Cloud Deliver “content” as a Service Cloud Both public, private and hybrid cloud solutions Cloud Enablement Layers The DataCenter, Servers, storage, etc… between the middleware Infrastructure and content services Secure access to private, public and hybrid clouds, as well as The Middleware monitoring the cloud performance Cloud access devices, both normal PCs and network centric The Access Device devices, that display and connect to the Cloud 2013 LENOVO
  • 5. At The Client, Today’s Approach To Cloud Is Unbalanced Cloud Content Services An Unbalanced Approach assumes a ―dumb-downed‖ client Cloud Capabilities are delivered by the Data Center to the “least common denominator” of Device 2013 LENOVO
  • 6. A Better Approach Moving Forward - Balanced webNetwork Cloud Ready Client The Cloud via a Browser Based Cloud Using Clients that are aware of Desktop Content Cloud Services  Web based application delivery  A client whose attributes are discoverable &  Delivers multiple application types and other consumable by the Cloud datacenter resources − Graphics processing − Web applications − Local Processor power − Publish applications − Multi-factor authentication (RDS, Citrix, etc.) − Memory usage − Virtualized applications − Network bandwidth − Local application A balanced approach requires both the Client & the Cloud to be “aware” of each other 2013 LENOVO
  • 7. The Face of the Cloud – Lenovo’s Internal Beta 2013 LENOVO
  • 8. The Face of the Cloud – Lenovo’s CDW Portal 2013 LENOVO
  • 9. Similarities & Differences In A Cloud World Authentication Authentication Traditional Environment User Interface Cloud Environment User Interface App App App App Local Storage Access and Encryption Windows FileShare App App App App App App App Internal Storage Storage Cloud Local Local Published Published Web Server OS Terminal Server Citrix/VMWare 2013 LENOVO
  • 10. High-level Architecture & Unified Cloud Use Cases • Secure student & parent access from home • BYOD • Distance Teaching • Activity portals & simplified access 2013 LENOVO
  • 11. LanSchool Corporate Overview  LanSchool was founded in 1986  27th anniversary year  LanSchool was the first network-based classroom management solution  Acquired by Lenovo in 2012 2013 LENOVO
  • 12. Early Adopters On The Road To the Cloud K12 WebNetwork Customers K12 LanSchool Customers • Baker County Public Schools • Brevard County Public Schools • Bradford County Public Schools • Broward County Public Schools • Clay County Public Schools • Clay County Public Schools • Columbia County Public Schools • Charlotte County Public Schools • DeSoto County Public Schools • Columbia County Public Schools • Dixie County Public Schools • DeSoto County Public Schools • Flagler County Public Schools • Escambia County Public Schools • Florida Department of Education • Lake County Public Schools • Florida School for the Deaf and Blind • Lee County Public Schools • Gilchrist County Public Schools • Leon County Public Schools • Hamilton County Public Schools • Miami Dade County Public Schools • Hernando County Public Schools • Monroe County Public Schools • Lafayette County Public Schools • Orange County Public Schools • Lake County Public Schools • Sarasota County Public Schools • Marion County Public Schools • St. Johns County Public Schools • Monroe County Public Schools • NEFEC • Okeechobee County Public Schools • Putnam County Public Schools • Seminole County Public Schools • Union County Public Schools • Volusia County Public Schools 2013 LENOVO
  • 13. Austin ISD • Austin Independent School District  Located in Austin, TX  5th largest school district in Texas  86,000 students  124 schools  Active Directory  MyAustin Cloud  Users  Teachers  Student  Staff  Parents  No VPNs, web-based remote access  Deliver over 200 apps  Single sign-on  25 GB Skydrive, 20 GB Google, 4 GB SAN  Lowered helpdesk costs (fewer password calls)  Decided not to implement VDI 2013 LENOVO
  • 14. Distance Teaching Architecture – webNetwork & LanSchool • Show teacher • Show student to other students • Monitor thumbnails • Testing • Polling • Group chat • Send message • Limit web • Limit applications • Blank screens • Virtual class rooms 2013 LENOVO