SlideShare a Scribd company logo
Lenovo Strategic Overview Leo Curtis Executive Senior Consultant TCO & TVT Beijing, China ThinkVantage
[object Object],[object Object],[object Object],[object Object],[object Object],Remember our R&D Focus?
Total Cost of Ownership Gartner research shows that the annualized cost of a PC represents  less than 20%  of the annual Total Cost of Ownership Estimated at  $9,000 a  year
Lenovo offers hardware and software-based tools called  ThinkVantage Technologies  that can help customers reduce the total cost of ownership of their PCs throughout the entire PC lifecycle ownership experience.  TVT – PC Lifecycle ownership experience ThinkVantage ® Deploy Connect Support Protect Dispose
Garner’s Chart of Accounts Total Cost of Ownership Hard / Budgeted Costs Soft / Non-Budgeted Costs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Enabled Highly Productive IT Controlled Highly Restrictive $50 $400 PC Lifecycle Cost (per client) Approach to lower PC Lifecycle Cost Fully “end-user enabled” & protected w/ TVT’s Automated update (TVT, MS, Norton, etc.) Authentication thru SSL Configuration Management Unmanaged Client Locked Down Full Best Practices & Thin Client TVT Added Value Increased IT Control Increased User Enablement Inventory Control Inventory Control Distribute SW Updates Distribute SW Updates Patch  Management Rescue and Recovery Pure “Vanilla” User Enabled vs. IT Controlled Environments Client Management –  Different Approaches
1. Manageability  + Image Ultra Builder System Migration Assistant Lifecycle : Deployment ,[object Object],[object Object],[object Object],[object Object],Simplify the Imaging & Migration work within 30 minutes Deploy
ThinkVantage ®  ImageUltra™ Builder Lifecycle : Deployment Imaging technology designed to simplify the creation and distribution of corporate images and reduce image technology maintenance to virtually zero. Productivity, Reliability, Efficiency Potential Savings: $100 / pc
ThinkVantage ®  System Migration Assistant™ Lifecycle : Deployment System Migration Assistant helps get your end-users up and running by quickly and accurately migrating their individual data and settings to their new Lenovo systems Potential Savings: $70 / pc
[object Object],[object Object],[object Object],[object Object],Connect Lifecycle : Connect
ThinkVantage ®  Access Connections™ Lifecycle: Connect Seamlessly switch between wired and wireless environments, managing security settings,  printers,  home pages, and other location-specific settings automatically.  Potential Savings: $50 /  ThinkPad
[object Object],[object Object],[object Object],[object Object],[object Object],Lifecycle : Protect Protect
ThinkVantage ®  Client Security Solution Lifecycle : Protect CSS helps protect your company information, including passwords, encryption keys and electronic credentials, while guarding against unauthorized access. Potential Savings: $150 / pc
ThinkVantage ®  Active Protection System™ Lifecycle: Protect Active Protection System detects sudden changes in motion and temporarily stops the hard drive to help protect your data from everyday notebook accidents.  Potential Savings: $180 / pc
[object Object],[object Object],[object Object],[object Object],[object Object],Page   of 12 Support Lifecycle : Support
ThinkVantage ®  Productivity Center Lifecycle : Support Productivity Center guides you to a host of information and tools to help you set up, understand, maintain, and enhance your ThinkPad® notebook or ThinkCentre® desktop.
ThinkVantage ®  System Update™ Lifecycle : Support System Update downloads updates for software, drivers and BIOS from a Lenovo server directly over the Internet without requiring specific user knowledge.
ThinkVantage ®  Rescue and Recovery™ Lifecycle : Support Finally, a tool that thoroughly eliminates system corruptions in as little time as possible, sometimes in as little as 2-3 minutes!  Potential Savings: $180 / pc
LANDesk ®  for ThinkVantage™ Technologies Lifecycle: Support A comprehensive, integrated console optimized for client management, and integrates with TVT’s to provide best-in-class PC lifecycle management capabilities.  ‘ Mission Control’ for client management and ThinkVantage Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Dispose Lifecycle : Dispose
ThinkVantage ®  Secure Data Disposal Lifecycle  Dispose Secure Data Disposal makes removing confidential information on a disk drive fast and simple and the data irretrievable.  Potential Savings: $45 / pc
ThinkVantage™ Technologies Roadmap What’s coming…
TVT in Future ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Power Manager Secure Managed Client
TVT in Future
Which customers use TVT?
Back up
THINKVANTAGE TECHNOLOGIES: THE TALKING POINTS. ThinkVantage ®  Technology What is it? Customer Benefits Rescue and Recovery™ (included on select ThinkPad®notebooks & ThinkCentre® desktops) Provides simple-to-use, effective backup and recovery for end users; includes a pre-OS environment for recovering when the primary OS will not boot ,[object Object],[object Object],Access Connections™ (included on select ThinkPad notebooks & ThinkCentre desktops) Manages wired, wireless LAN and wireless WAN location profiles and switches between saved profiles automatically ,[object Object],[object Object],Client Security Solution (included on select ThinkPad notebooks & ThinkCentre desktops) Helps protect a notebook or desktop PC by securely storing passwords (Password Manager) also provides a secure password recovery tool ,[object Object],Active Protection System™ (included on select ThinkPad notebooks) Detects sudden motion with an integrated motion sensor and temporarily stops the hard drive to help protect valuable data from crashes that occur due to everyday notebook accidents ,[object Object],[object Object],System Migration Assistant™ (included on select ThinkPad notebooks & ThinkCentre desktops) Helps quickly migrate user data and settings like application and desktop preferences, bookmarks and favorites, and printer and network settings ,[object Object],Productivity Center (included on select ThinkPad notebooks & ThinkCentre desktops) Provides quick access to key ThinkVantage Technologies as well as support resources required for virus scans, system backups and other maintenance functions through ‘whisper mode’ ,[object Object],[object Object],System Update (included on select ThinkPad notebooks & ThinkCenter desktops Downloads and automatically installs updates for Lenovo software, drivers and BIOS from a Lenovo or company server without requiring specific user knowledge ,[object Object]
Deploy Connect Support Protect Dispose
ThinkVantage ®  ThinkPlus On-site Service  Lifecycle 1: Deployment Secure Data Disposal makes removing confidential information on a disk drive fast and simple and the data irretrievable.
Deploy, Connect, Protect, Support, & Dispose ImageUltra™ Builder System Migration Assistant Access Connections Client Security Solution Active Protection System Fingerprint Reader Client Security Private Disk Client Security Password Manager Rescue and Recovery ™ Message Centre Productivity Center Live Update Learn About Secure Data Disposal Ultra-Small Form Factor Technologies Design Dual Antenna Frame Design Steel Hinges The Blue Button Tool-less Desktop Spill Resistant Keyboard Increased Battery life ThinkLight ™ UltraNav® /  TrackPoint ® ThinkVantage  – Technologies & Design Deploy Connect Protect Support Dispose
 
Colleagues,  Yesterday, we received word from our legal team that we have won the legal challenge from Dell for the title of "world's most secure PC." In plain terms, this means we can make this claim for our Think PCs and Dell cannot. Although this ruling was in the US legal system, it has world-wide implications since Dell is unlikely to challenge our claim after being soundly defeated. The "most secure" claim is based on our TVT technologies, our integrated partner solutions that work better on Think PC's than other brands, and our BIOS security features.  If you add this to our earlier TVT-based legal victory over Dell for the claim of "most manageable PC," we have a strong story that should be passed along to our sales and support teams.  Please pass the word along.  All the best,  Clain Anderson Director, ThinkVantage & Innovation Lenovo Software & Peripherals Business Unit 05/28/2008 10:06 PM

More Related Content

What's hot

The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop Revolution
Yankee Group
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
Intel® V Pro™ Technology
Intel® V Pro™ TechnologyIntel® V Pro™ Technology
Intel® V Pro™ Technology
SHC
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedSHC
 
The Multiple Use Cases for Persystent Suite
The Multiple Use Cases for Persystent SuiteThe Multiple Use Cases for Persystent Suite
The Multiple Use Cases for Persystent Suite
Utopic Software
 
Thin Clients webex
Thin Clients webexThin Clients webex
Thin Clients webex
Wonderware United Kingdom
 
Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy Launch
Symantec
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDI
Shivani Sehta
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureGokulan Subramani
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
IT Masterclasses
 
Novell Virtual Desktop Infrastructure
Novell Virtual Desktop InfrastructureNovell Virtual Desktop Infrastructure
Novell Virtual Desktop Infrastructure
Novell
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
koesteruk22
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environment
ajitambekar
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
Md Yousup Faruqu
 

What's hot (19)

The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop Revolution
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
Intel® V Pro™ Technology
Intel® V Pro™ TechnologyIntel® V Pro™ Technology
Intel® V Pro™ Technology
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
 
Managed services
Managed servicesManaged services
Managed services
 
The Multiple Use Cases for Persystent Suite
The Multiple Use Cases for Persystent SuiteThe Multiple Use Cases for Persystent Suite
The Multiple Use Cases for Persystent Suite
 
Thin Clients webex
Thin Clients webexThin Clients webex
Thin Clients webex
 
Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy Launch
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDI
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
Novell Virtual Desktop Infrastructure
Novell Virtual Desktop InfrastructureNovell Virtual Desktop Infrastructure
Novell Virtual Desktop Infrastructure
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environment
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Pano Logic Quick Start 100709
Pano Logic Quick Start 100709Pano Logic Quick Start 100709
Pano Logic Quick Start 100709
 

Similar to TCO & TVT

Boomerang Offsite
Boomerang OffsiteBoomerang Offsite
Boomerang Offsite
bdoyle05
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
Stephen Rose
 
IT Managed Services
IT Managed ServicesIT Managed Services
IT Managed Services
Om Kumar
 
Projects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesProjects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesSaud Nazeer
 
Thin client mechanism
Thin client mechanismThin client mechanism
Thin client mechanism
Gourab Barenya Sahoo
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
IBM - virtual infrastructure Access
IBM - virtual infrastructure AccessIBM - virtual infrastructure Access
IBM - virtual infrastructure Access
Bhanu Prathap
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Jeff Stokes
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
Quest
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Steve Crawford
 
Windows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons BulgariaWindows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons Bulgaria
New Horizons Bulgaria
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Kenneth Regalado
 
Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoservePixel
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7
Louis Göhl
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
Ghassan Chahine
 
The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023
Ben Mountain
 

Similar to TCO & TVT (20)

Wizard intro
Wizard introWizard intro
Wizard intro
 
Boomerang Offsite
Boomerang OffsiteBoomerang Offsite
Boomerang Offsite
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
IT Managed Services
IT Managed ServicesIT Managed Services
IT Managed Services
 
Projects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesProjects, Roles & Responsibilities
Projects, Roles & Responsibilities
 
Windows 7
Windows 7Windows 7
Windows 7
 
blue dog net
blue dog netblue dog net
blue dog net
 
Thin client mechanism
Thin client mechanismThin client mechanism
Thin client mechanism
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
IBM - virtual infrastructure Access
IBM - virtual infrastructure AccessIBM - virtual infrastructure Access
IBM - virtual infrastructure Access
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
 
Windows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons BulgariaWindows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons Bulgaria
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!
 
Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoserve
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

TCO & TVT

  • 1. Lenovo Strategic Overview Leo Curtis Executive Senior Consultant TCO & TVT Beijing, China ThinkVantage
  • 2.
  • 3. Total Cost of Ownership Gartner research shows that the annualized cost of a PC represents less than 20% of the annual Total Cost of Ownership Estimated at $9,000 a year
  • 4. Lenovo offers hardware and software-based tools called ThinkVantage Technologies that can help customers reduce the total cost of ownership of their PCs throughout the entire PC lifecycle ownership experience. TVT – PC Lifecycle ownership experience ThinkVantage ® Deploy Connect Support Protect Dispose
  • 5.
  • 6. User Enabled Highly Productive IT Controlled Highly Restrictive $50 $400 PC Lifecycle Cost (per client) Approach to lower PC Lifecycle Cost Fully “end-user enabled” & protected w/ TVT’s Automated update (TVT, MS, Norton, etc.) Authentication thru SSL Configuration Management Unmanaged Client Locked Down Full Best Practices & Thin Client TVT Added Value Increased IT Control Increased User Enablement Inventory Control Inventory Control Distribute SW Updates Distribute SW Updates Patch Management Rescue and Recovery Pure “Vanilla” User Enabled vs. IT Controlled Environments Client Management – Different Approaches
  • 7.
  • 8. ThinkVantage ® ImageUltra™ Builder Lifecycle : Deployment Imaging technology designed to simplify the creation and distribution of corporate images and reduce image technology maintenance to virtually zero. Productivity, Reliability, Efficiency Potential Savings: $100 / pc
  • 9. ThinkVantage ® System Migration Assistant™ Lifecycle : Deployment System Migration Assistant helps get your end-users up and running by quickly and accurately migrating their individual data and settings to their new Lenovo systems Potential Savings: $70 / pc
  • 10.
  • 11. ThinkVantage ® Access Connections™ Lifecycle: Connect Seamlessly switch between wired and wireless environments, managing security settings, printers, home pages, and other location-specific settings automatically. Potential Savings: $50 / ThinkPad
  • 12.
  • 13. ThinkVantage ® Client Security Solution Lifecycle : Protect CSS helps protect your company information, including passwords, encryption keys and electronic credentials, while guarding against unauthorized access. Potential Savings: $150 / pc
  • 14. ThinkVantage ® Active Protection System™ Lifecycle: Protect Active Protection System detects sudden changes in motion and temporarily stops the hard drive to help protect your data from everyday notebook accidents. Potential Savings: $180 / pc
  • 15.
  • 16. ThinkVantage ® Productivity Center Lifecycle : Support Productivity Center guides you to a host of information and tools to help you set up, understand, maintain, and enhance your ThinkPad® notebook or ThinkCentre® desktop.
  • 17. ThinkVantage ® System Update™ Lifecycle : Support System Update downloads updates for software, drivers and BIOS from a Lenovo server directly over the Internet without requiring specific user knowledge.
  • 18. ThinkVantage ® Rescue and Recovery™ Lifecycle : Support Finally, a tool that thoroughly eliminates system corruptions in as little time as possible, sometimes in as little as 2-3 minutes! Potential Savings: $180 / pc
  • 19.
  • 20.
  • 21. ThinkVantage ® Secure Data Disposal Lifecycle Dispose Secure Data Disposal makes removing confidential information on a disk drive fast and simple and the data irretrievable. Potential Savings: $45 / pc
  • 23.
  • 24. Power Manager Secure Managed Client
  • 28.
  • 29. Deploy Connect Support Protect Dispose
  • 30. ThinkVantage ® ThinkPlus On-site Service Lifecycle 1: Deployment Secure Data Disposal makes removing confidential information on a disk drive fast and simple and the data irretrievable.
  • 31. Deploy, Connect, Protect, Support, & Dispose ImageUltra™ Builder System Migration Assistant Access Connections Client Security Solution Active Protection System Fingerprint Reader Client Security Private Disk Client Security Password Manager Rescue and Recovery ™ Message Centre Productivity Center Live Update Learn About Secure Data Disposal Ultra-Small Form Factor Technologies Design Dual Antenna Frame Design Steel Hinges The Blue Button Tool-less Desktop Spill Resistant Keyboard Increased Battery life ThinkLight ™ UltraNav® / TrackPoint ® ThinkVantage – Technologies & Design Deploy Connect Protect Support Dispose
  • 32.  
  • 33. Colleagues, Yesterday, we received word from our legal team that we have won the legal challenge from Dell for the title of "world's most secure PC." In plain terms, this means we can make this claim for our Think PCs and Dell cannot. Although this ruling was in the US legal system, it has world-wide implications since Dell is unlikely to challenge our claim after being soundly defeated. The "most secure" claim is based on our TVT technologies, our integrated partner solutions that work better on Think PC's than other brands, and our BIOS security features. If you add this to our earlier TVT-based legal victory over Dell for the claim of "most manageable PC," we have a strong story that should be passed along to our sales and support teams. Please pass the word along. All the best, Clain Anderson Director, ThinkVantage & Innovation Lenovo Software & Peripherals Business Unit 05/28/2008 10:06 PM

Editor's Notes

  1. Welcome and Thank you: Good morning and welcome to Lenovo and the Executive Briefing Center. Objective: As I understand it the main objectives of <company name> for today are: <Objective 1> <Objective 2> <Objective 3> Please let me know if there is anything else you would like to add at this time and I will do my best to incorporate it into discussion at some point today. (board any responses or additions) Situation: We understand that <company name> is making an important technology decision for the <identify situation>. Complication: ex. Decisions are made every 3 years and budgets are always tight. / Dell and HP / Refresh VPro etc. Implication: Therefore, it is critical that you make the best possible decision. Position: Thank you for investing your time today with us. We’ve designed an interactive, in-depth overview to insure that you leave with the information you need. Action: I invite you to ask questions at any time throughout the day. Benefit: We believe that we’ll demonstrate Lenovo’s leadership in Innovation, Quality, and Service and the value of <company name> partnering together with us will be clear by the end of today’s session. Establish Roles: Once again, my name is Leo Curtis and I’ve been working with <Sales Representative> to prepare for your visit with us today. I’ll be facilitating the briefing along with <SR> . It’s my job to keep us on track and on time, (note action items and your feedback). If anything comes up throughout he day please let me know how I can help. Record Expectations: I am hoping we can start with you today, by briefly introducing yourself to me so I understand your role, and what might be of importance to you specifically in today's discussion. (If other participants or speakers are in the room, introduce them here as well.) Review Agenda and Link to Objective: I’d like to review the agenda with you. (Review each item, note connection to their expectations/objectives. Tell them when lunch and breaks are scheduled.) Explain Logistics: Much of the information from today will be under non-disclosure. You’ve signed these forms prior to our meeting. In front of you is a portfolio and pen - you’re welcome to use these throughout the day and they are yours to take with you. Additionally, there is an evaluation sheet - please use it throughout the day to note your feedback on the briefing itself, and Lenovo strategy, products and solutions that you’ll hear about. I’ll collect it at the end of the day and provide the information to our executives so we take your input into account. Ask for Questions: Are there any questions before we get started? <Segway to Next Slide> Transition to First Speaker: Thank you for investing your time with Lenovo. We are going to start our day by discussing your key objective: to hear about (First Topic). Please welcome our <position> , <name> . <Next Slide> --------------------------------------------------- INSIDE: "Potential Savings" and similar figures represent the savings customers may achieve by using manageability tools and by following Lenovo recommendations for TCO best practices. Some figures represent costs customers may redirect from labor-intensive areas to other areas of their business. Other figures are based on cost avoidance of competitive solutions purchased separately. Actual savings are not guaranteed and will vary by customer. --------------------------------------------------- Thank you Happy to be in San Francisco to: Meet with customers Celebrate the Torch relay which is especially important to Lenovo