SlideShare a Scribd company logo
© 2010, Propalms Network Pvt. Ltd. All Rights Reserved.
VIRTUALIZATION FOR USERS
END-to-END APPLICATION DELIVERY MODEL
Vijender Yadav
CTO, Propalms Network Pvt Ltd.
Application Publishing – Traditional
Way
Full
capacity
PCs for
each user
Full
capacity
PCs for
each user
Full OS with
valid license
for each user
Full OS with
valid license
for each user
Install
applications
for each user
on each PC
with valid
licenses
Install
applications
for each user
on each PC
with valid
licensesSoftware
patches/up
dates
configured
on each PC
Software
patches/up
dates
configured
on each PC
Maintenance
for each
hardware
component
and software
to be
purchased
Maintenance
for each
hardware
component
and software
to be
purchased
IP on user
machine
IP on user
machine
ComplianceCompliance
Traditional Way: Pain Areas
o High Hardware Cost and Upgrade cost
o Power, cooling and space Requirements
o Per PC maintenance
o Per PC software maintenance
o Low utilization of resources
• Not all PCs are always in use
• Not 100% hardware resources are
consumed on each PC
o User/PC provisioning is time consuming
o Data residing on end user machine is prone to
leakage
o No or limited control over data leakage by user
What do we want?
o Easy application provisioning to users
o Zero application upgrade cost
o Zero end user management
o Better utilization of hardware and
software resources
o Centralized monitoring and management
o Less power consumption less carbon
generation
o Control over data leakage
Solution: Virtualization
o Separates applications/profile/Workspace from user’s OS
o Application Virtualization, “the hosting of individual
applications on alien hardware/software”…wikipedia.org
Application Virtualization
o Application Virtualization via Terminal Services a.k.a.
Presentation Virtualization (SERVER BASED COMPUTING)
• Application runs on Windows terminal servers. Users
connects to the server via remote desktop protocols
to interact with application GUI.
o Desktop Virtualization
• User’s physical machine is decoupled from the
desktop and software he or she users to work.
Desktop is delivered from a central data center.
o Application Streaming
• Application is not installed anywhere but is
packaged to run under a specialized virtual
environment when the package is executed by the
user.
Method 1: Presentation Virtualization
PC, Laptop,
Thin Client,
Mobile devices
Hosted Applications
on Terminal Server
KEYBOARD MOUSE
GRAPHICS
Presentation Virtualization: Access Scenario
LAN, WAN,
Internet
LAN, WAN,
Internet Application ServersApplication Servers
Apps running from
terminal server
Apps running from
terminal server
Applications Run
Here
Applications Run
Here
Presentation Virtualization: Benefits
Replace
PCs with
Thin
Clients
Replace
PCs with
Thin
Clients
Go for ZERO
maintenance
OS (Linux)
Go for ZERO
maintenance
OS (Linux)
Application
needs to be
installed
once
Application
needs to be
installed
once
Easy rollout
of new users
and
applications
Easy rollout
of new users
and
applications
Smart License
Management
Smart License
Management
IP in
datacenter,
Complete,
Information
Security
IP in
datacenter,
Complete,
Information
Security
Compliance
, access
control,
monitoring
Compliance
, access
control,
monitoring
Fast, Secure
remote
access over
slow networks
Fast, Secure
remote
access over
slow networks
Presentation Virtualization: Limitations
o Shared System
• Single point of failure
• Performance
o No per user/application resource
hardware control
o Some applications are not terminal server
friendly
o Display Performance: Multimedia
applications
Method 3: DESKTOP VIRTUALIZATION
o Virtual desktops : Centralized Software based PCs
o Deliver desktops to users rather than provisioning
hardware to each user
o Run hundreds and thousands of desktop OS
instances on centralized server running virtualization
platform, like VMWare, XenServer, Parallels, VirtualBox
Windows XP 1 Windows XP 2 Windows XP 3
Standard Host OS
Hardware
OS Virtualization Layer, VMWare /Parallels /XenServer
OS Virtualization
Desktop Virtualization: Access Scenario
Remote login
into hosted
desktops
Remote login
into hosted
desktops
1 Virtual
machine per
user
1 Virtual
machine per
user
Application ServersApplication Servers
Applications Run HereApplications Run Here
Desktop Virtualization: Benefits
o Highly Agile Desktops
o Automated per PC maintenance
o Better hardware resource utilization
• Per user/application hardware resource
control
o Better Data security
o Dynamic and automated application
provisioning
o Reduced cost: hardware, power
Thank You!
Vijender Yadav
Vijender.yadav@propalmsnetwork.com
Contact us for your Application and Desktop Virtualization needs!
www.propalmsnetwork.com
info@propalmsnetwork.com
Copyright © 2010, Propalms Network Private Limited

More Related Content

What's hot

Strand IP Video
Strand  IP VideoStrand  IP Video
Strand IP Video
rmansiter
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017
Keith Harris
 
RHUB Web Conferencing
RHUB Web ConferencingRHUB Web Conferencing
RHUB Web Conferencing
RHUB
 
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga
 
Mobile Medical Devices: A Trip to the Trenches of Design and Test
Mobile Medical Devices: A Trip to the Trenches of Design and TestMobile Medical Devices: A Trip to the Trenches of Design and Test
Mobile Medical Devices: A Trip to the Trenches of Design and Test
Sterling Medical Devices
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
Qualcomm Developer Network
 
Monitis Internal Monitoring
Monitis Internal MonitoringMonitis Internal Monitoring
Monitis Internal Monitoring
DM - Digital Marketing Consulting
 
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManagerGulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
ManageEngine, Zoho Corporation
 
VMware monitoring must haves
VMware monitoring must havesVMware monitoring must haves
VMware monitoring must haves
ManageEngine
 
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_enVector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Red Bend Software
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
rkoscak
 
OpManager 7
OpManager 7OpManager 7
OpManager 7
guestae333d
 
Shahzaib
ShahzaibShahzaib
Casino Entertainment Company from USA manages 3000 devices using OpManager
Casino Entertainment Company from USA manages 3000 devices using OpManagerCasino Entertainment Company from USA manages 3000 devices using OpManager
Casino Entertainment Company from USA manages 3000 devices using OpManager
ManageEngine, Zoho Corporation
 
Remote Workplace Best Practices
Remote Workplace Best PracticesRemote Workplace Best Practices
Remote Workplace Best Practices
South Lake Chamber of Commerce
 
The Remote Worker: Tools for Remote Monitoring
The Remote Worker: Tools for  Remote MonitoringThe Remote Worker: Tools for  Remote Monitoring
The Remote Worker: Tools for Remote Monitoring
Avtex
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
ManageEngine, Zoho Corporation
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
ManageEngine, Zoho Corporation
 
1.0 2.0 IP CCTV system
1.0 2.0 IP CCTV system 1.0 2.0 IP CCTV system
1.0 2.0 IP CCTV system
Nader Elmansi
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
Sierraware
 

What's hot (20)

Strand IP Video
Strand  IP VideoStrand  IP Video
Strand IP Video
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017
 
RHUB Web Conferencing
RHUB Web ConferencingRHUB Web Conferencing
RHUB Web Conferencing
 
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
 
Mobile Medical Devices: A Trip to the Trenches of Design and Test
Mobile Medical Devices: A Trip to the Trenches of Design and TestMobile Medical Devices: A Trip to the Trenches of Design and Test
Mobile Medical Devices: A Trip to the Trenches of Design and Test
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Monitis Internal Monitoring
Monitis Internal MonitoringMonitis Internal Monitoring
Monitis Internal Monitoring
 
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManagerGulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
 
VMware monitoring must haves
VMware monitoring must havesVMware monitoring must haves
VMware monitoring must haves
 
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_enVector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
OpManager 7
OpManager 7OpManager 7
OpManager 7
 
Shahzaib
ShahzaibShahzaib
Shahzaib
 
Casino Entertainment Company from USA manages 3000 devices using OpManager
Casino Entertainment Company from USA manages 3000 devices using OpManagerCasino Entertainment Company from USA manages 3000 devices using OpManager
Casino Entertainment Company from USA manages 3000 devices using OpManager
 
Remote Workplace Best Practices
Remote Workplace Best PracticesRemote Workplace Best Practices
Remote Workplace Best Practices
 
The Remote Worker: Tools for Remote Monitoring
The Remote Worker: Tools for  Remote MonitoringThe Remote Worker: Tools for  Remote Monitoring
The Remote Worker: Tools for Remote Monitoring
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
 
1.0 2.0 IP CCTV system
1.0 2.0 IP CCTV system 1.0 2.0 IP CCTV system
1.0 2.0 IP CCTV system
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 

Similar to Virtualization for users

How do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scaleHow do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scale
Duncan Purves
 
Android system security
Android system securityAndroid system security
Android system security
Chong-Kuan Chen
 
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous IntegrationExperitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of play
Chris Simmonds
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
Trihedral
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
solarisyougood
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
V mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugV mware+thin app+-+gcvmug
V mware+thin app+-+gcvmug
Alan Maloney
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Carsten Rhod Gregersen
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
Satya Harish
 
How to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at ScaleHow to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at Scale
DevOps.com
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
solarisyourep
 
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM France Lab
 
Beyond Traditional Mobile Testing
Beyond Traditional Mobile TestingBeyond Traditional Mobile Testing
Beyond Traditional Mobile Testing
ColomboCampsCommunity
 
What's New in Wonderware InTouch Access Anywhere v.122015
What's New in Wonderware InTouch Access Anywhere v.122015What's New in Wonderware InTouch Access Anywhere v.122015
What's New in Wonderware InTouch Access Anywhere v.122015
Katie Schauer
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
 
The Path to a Pain-Free Control System Upgrade
The Path to a Pain-Free Control System UpgradeThe Path to a Pain-Free Control System Upgrade
The Path to a Pain-Free Control System Upgrade
Inductive Automation
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
solarisyourep
 
Remote Management of Embedded Android Devices
Remote Management of Embedded Android DevicesRemote Management of Embedded Android Devices
Remote Management of Embedded Android Devices
VIA Embedded
 

Similar to Virtualization for users (20)

How do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scaleHow do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scale
 
Android system security
Android system securityAndroid system security
Android system security
 
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous IntegrationExperitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of play
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
V mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugV mware+thin app+-+gcvmug
V mware+thin app+-+gcvmug
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
 
How to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at ScaleHow to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at Scale
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
 
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
 
Beyond Traditional Mobile Testing
Beyond Traditional Mobile TestingBeyond Traditional Mobile Testing
Beyond Traditional Mobile Testing
 
What's New in Wonderware InTouch Access Anywhere v.122015
What's New in Wonderware InTouch Access Anywhere v.122015What's New in Wonderware InTouch Access Anywhere v.122015
What's New in Wonderware InTouch Access Anywhere v.122015
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
The Path to a Pain-Free Control System Upgrade
The Path to a Pain-Free Control System UpgradeThe Path to a Pain-Free Control System Upgrade
The Path to a Pain-Free Control System Upgrade
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Remote Management of Embedded Android Devices
Remote Management of Embedded Android DevicesRemote Management of Embedded Android Devices
Remote Management of Embedded Android Devices
 

Recently uploaded

“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Virtualization for users

  • 1. © 2010, Propalms Network Pvt. Ltd. All Rights Reserved. VIRTUALIZATION FOR USERS END-to-END APPLICATION DELIVERY MODEL Vijender Yadav CTO, Propalms Network Pvt Ltd.
  • 2. Application Publishing – Traditional Way Full capacity PCs for each user Full capacity PCs for each user Full OS with valid license for each user Full OS with valid license for each user Install applications for each user on each PC with valid licenses Install applications for each user on each PC with valid licensesSoftware patches/up dates configured on each PC Software patches/up dates configured on each PC Maintenance for each hardware component and software to be purchased Maintenance for each hardware component and software to be purchased IP on user machine IP on user machine ComplianceCompliance
  • 3. Traditional Way: Pain Areas o High Hardware Cost and Upgrade cost o Power, cooling and space Requirements o Per PC maintenance o Per PC software maintenance o Low utilization of resources • Not all PCs are always in use • Not 100% hardware resources are consumed on each PC o User/PC provisioning is time consuming o Data residing on end user machine is prone to leakage o No or limited control over data leakage by user
  • 4. What do we want? o Easy application provisioning to users o Zero application upgrade cost o Zero end user management o Better utilization of hardware and software resources o Centralized monitoring and management o Less power consumption less carbon generation o Control over data leakage
  • 5. Solution: Virtualization o Separates applications/profile/Workspace from user’s OS o Application Virtualization, “the hosting of individual applications on alien hardware/software”…wikipedia.org
  • 6. Application Virtualization o Application Virtualization via Terminal Services a.k.a. Presentation Virtualization (SERVER BASED COMPUTING) • Application runs on Windows terminal servers. Users connects to the server via remote desktop protocols to interact with application GUI. o Desktop Virtualization • User’s physical machine is decoupled from the desktop and software he or she users to work. Desktop is delivered from a central data center. o Application Streaming • Application is not installed anywhere but is packaged to run under a specialized virtual environment when the package is executed by the user.
  • 7. Method 1: Presentation Virtualization PC, Laptop, Thin Client, Mobile devices Hosted Applications on Terminal Server KEYBOARD MOUSE GRAPHICS
  • 8. Presentation Virtualization: Access Scenario LAN, WAN, Internet LAN, WAN, Internet Application ServersApplication Servers Apps running from terminal server Apps running from terminal server Applications Run Here Applications Run Here
  • 9. Presentation Virtualization: Benefits Replace PCs with Thin Clients Replace PCs with Thin Clients Go for ZERO maintenance OS (Linux) Go for ZERO maintenance OS (Linux) Application needs to be installed once Application needs to be installed once Easy rollout of new users and applications Easy rollout of new users and applications Smart License Management Smart License Management IP in datacenter, Complete, Information Security IP in datacenter, Complete, Information Security Compliance , access control, monitoring Compliance , access control, monitoring Fast, Secure remote access over slow networks Fast, Secure remote access over slow networks
  • 10. Presentation Virtualization: Limitations o Shared System • Single point of failure • Performance o No per user/application resource hardware control o Some applications are not terminal server friendly o Display Performance: Multimedia applications
  • 11. Method 3: DESKTOP VIRTUALIZATION o Virtual desktops : Centralized Software based PCs o Deliver desktops to users rather than provisioning hardware to each user o Run hundreds and thousands of desktop OS instances on centralized server running virtualization platform, like VMWare, XenServer, Parallels, VirtualBox Windows XP 1 Windows XP 2 Windows XP 3 Standard Host OS Hardware OS Virtualization Layer, VMWare /Parallels /XenServer OS Virtualization
  • 12. Desktop Virtualization: Access Scenario Remote login into hosted desktops Remote login into hosted desktops 1 Virtual machine per user 1 Virtual machine per user Application ServersApplication Servers Applications Run HereApplications Run Here
  • 13. Desktop Virtualization: Benefits o Highly Agile Desktops o Automated per PC maintenance o Better hardware resource utilization • Per user/application hardware resource control o Better Data security o Dynamic and automated application provisioning o Reduced cost: hardware, power
  • 14. Thank You! Vijender Yadav Vijender.yadav@propalmsnetwork.com Contact us for your Application and Desktop Virtualization needs! www.propalmsnetwork.com info@propalmsnetwork.com Copyright © 2010, Propalms Network Private Limited