Voor moderne digitale devices, communicatie en data hebben bedrijven een platform nodig dat de basis levert voor een hoogwaardige digitale werkomgeving. Het juiste platform voor de digitale werkomgeving verhoogt de flexibiliteit en snelheid van IT, maakt het mogelijk om flexibel op veranderingen in het bedrijf te reageren, verhoogt uptime en verlaagt kosten. Lees meer op http://avana.de/1lnttCy
5 things needed to know migrating Windows Server 2003Kim Jensen
The document provides five key considerations for organizations migrating from Windows Server 2003:
1. The migration is an opportunity to align IT with business goals and modernize processes, not just a routine system update.
2. Conducting a thorough assessment of all hardware, software, and workflows is necessary to develop an accurate timeline and avoid missed dependencies.
3. Not all existing servers and applications need to be migrated - some may be decommissioned through consolidation or replacement with newer options.
4. Updating hardware in addition to software is important to take advantage of new capabilities and ensure performance supports business needs.
5. Most organizations will benefit from partnering with an outside expert to help plan and execute the migration effectively
Citrix's GoToMeeting and WebEx WebOffice were among the finalists for a prestigious award that recognizes excellence in collaboration tools, along with Microsoft products like Office, Office SharePoint Server, and Exchange Server. The annual Great Indian Developer Awards honors software across categories based on factors like productivity, innovation, usefulness, and real-world feedback. Voting was open online to determine the winner in the Collaboration Tools category.
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
The document discusses how Citrix XenApp allows organizations to deliver Windows applications to Chromebook devices running Chrome OS. XenApp virtualizes Windows apps and delivers them through the Chrome browser, providing users with seamless access on Chromebooks without sacrificing simplicity. This lets organizations support Chromebooks while still providing access to important Windows apps. Citrix and Google have worked together to integrate XenApp with Chrome OS. XenApp delivers apps in Chrome tabs and optimizes the experience for Chromebooks. Case studies show how Randstad and Shelton Public Schools benefited from using Chromebooks with XenApp to deliver Windows apps, improving productivity, mobility, and lowering costs.
The document provides an overview of new capabilities enabled by Azure Active Directory (Azure AD) and Windows 10 for both corporate-owned and personal devices. For corporate devices, Azure AD and Windows 10 allow joining devices directly to an Azure AD tenant without an on-premises Active Directory, enabling single sign-on. For personal devices, users can add their work or school account in Azure AD to access resources on personal computers and devices. The document outlines building a test environment in Azure and testing the new capabilities.
The consumerization of IT is under way. Workers want tablet access to business applications, often from personal devices. Learn why VPNs are not ideal for mobile connectivity and why remote desktop is a more secure, less expensive approach to tablet access that is easier to deploy, manage and use.
Voor moderne digitale devices, communicatie en data hebben bedrijven een platform nodig dat de basis levert voor een hoogwaardige digitale werkomgeving. Het juiste platform voor de digitale werkomgeving verhoogt de flexibiliteit en snelheid van IT, maakt het mogelijk om flexibel op veranderingen in het bedrijf te reageren, verhoogt uptime en verlaagt kosten. Lees meer op http://avana.de/1lnttCy
5 things needed to know migrating Windows Server 2003Kim Jensen
The document provides five key considerations for organizations migrating from Windows Server 2003:
1. The migration is an opportunity to align IT with business goals and modernize processes, not just a routine system update.
2. Conducting a thorough assessment of all hardware, software, and workflows is necessary to develop an accurate timeline and avoid missed dependencies.
3. Not all existing servers and applications need to be migrated - some may be decommissioned through consolidation or replacement with newer options.
4. Updating hardware in addition to software is important to take advantage of new capabilities and ensure performance supports business needs.
5. Most organizations will benefit from partnering with an outside expert to help plan and execute the migration effectively
Citrix's GoToMeeting and WebEx WebOffice were among the finalists for a prestigious award that recognizes excellence in collaboration tools, along with Microsoft products like Office, Office SharePoint Server, and Exchange Server. The annual Great Indian Developer Awards honors software across categories based on factors like productivity, innovation, usefulness, and real-world feedback. Voting was open online to determine the winner in the Collaboration Tools category.
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
The document discusses how Citrix XenApp allows organizations to deliver Windows applications to Chromebook devices running Chrome OS. XenApp virtualizes Windows apps and delivers them through the Chrome browser, providing users with seamless access on Chromebooks without sacrificing simplicity. This lets organizations support Chromebooks while still providing access to important Windows apps. Citrix and Google have worked together to integrate XenApp with Chrome OS. XenApp delivers apps in Chrome tabs and optimizes the experience for Chromebooks. Case studies show how Randstad and Shelton Public Schools benefited from using Chromebooks with XenApp to deliver Windows apps, improving productivity, mobility, and lowering costs.
The document provides an overview of new capabilities enabled by Azure Active Directory (Azure AD) and Windows 10 for both corporate-owned and personal devices. For corporate devices, Azure AD and Windows 10 allow joining devices directly to an Azure AD tenant without an on-premises Active Directory, enabling single sign-on. For personal devices, users can add their work or school account in Azure AD to access resources on personal computers and devices. The document outlines building a test environment in Azure and testing the new capabilities.
The consumerization of IT is under way. Workers want tablet access to business applications, often from personal devices. Learn why VPNs are not ideal for mobile connectivity and why remote desktop is a more secure, less expensive approach to tablet access that is easier to deploy, manage and use.
Viability of bring your-own-computer BYOC programsMasaf Dawood
The confluence of powerful hand held devices, and a broadband network at home has created the desire for employees to expect the same level of connectedness in the enterprise space/workplace. Businesses are feeling the pressure to develop a hybrid support approach that also includes Gen Y and Gen Z workers, who are technology savvy and would like to use these devices in the workplace. What is un-clear is how some of the programs aimed at integrating users own devices will work with the existing IT/framework and this paper attempts to provide a balanced approach to analyze the problem and propose a solution.
By: Masaf Dawood
As Windows XP comes to the end of its natural life on 8 April 2014, thousands of applications that run under the old operating system will need to be upgraded for a move to Windows 7 or 8.
The majority of commercial applications are available in newer versions of the Windows operating system, and users simply need to stay current. However, some businesses may find that they are unable to do so for various reasons, perhaps because they have been developed in-house, or are one of the few commercial applications that don’t have an upgrade path to Windows 7 or 8.
In these instances, what are the options when it comes to applications that can’t be upgraded? How can businesses overcome issues associated with legacy apps when upgrading the rest of their applications to Windows 8?
With the increased usage of smartphones and tables in business, mobility has become an enterprise requirement. More and more business applications are now getting extended to smartphones and tablets for increasing the responsiveness and productivity of employees. ECM vendors have also realized the benefit of giving secure access of corporate content to knowledge workers right from their smartphones and tablets. This space is evolving as customers have started using mobile applications and many ECM vendors have already launched their native mobile ECM applications over iOS, Android, BlackBerry and other mobile operating systems.
This document provides an overview of Android for Work and discusses its key features. It describes how Android for Work allows a single device to be used for both personal and work contexts through separation of data and applications. The document outlines the history and evolution of Android, discusses concepts like BYOD and MDM that motivated Android for Work, and examines some early enterprise mobility solutions like Samsung Knox. It then provides details on Android for Work features like the work profile, Play for Work app store, and separation of work and personal data on a device.
The document discusses several major technology product failures from the last 20 years, including Google Wave, Nokia N-Gage, Windows Vista, Microsoft Kin, Google Glass, and Google Buzz. For each failure, it provides 1-2 sentences summarizing the key reasons for why the product failed to gain widespread adoption in the market. Specifically, it notes issues like limited functionality, unintuitive interfaces, slow performance, lack of apps/games, and the products being overshadowed by stronger competitors. The document aims to analyze the root causes of failure for each product.
How to Build a Consumerization of IT StrategyMicrosoft
As technology becomes more central in people’s personal lives, consumer technologies have been steadily entering into the workplace and increasingly blurring the lines between home and work. This trend, known as the consumerization of IT, has the potential to play a significant role in improving business productivity and agility for enterprises.
The consumerization of IT helps organizations realize increased productivity and enhance workforce capabilities, while maximizing IT investments.
This white paper presents: • An introduction to the consumerization of IT. This description discusses general industry drivers and the Microsoft perspective about mobile workforces and the consumerization of IT.
• The value proposition of adopting a consumerization of IT strategy. Benefits include increased employee productivity and satisfaction.
• Enterprise device options. This section highlights the trade-offs between agility and control (business-centric versus IT-focused decisions).
This white paper is one part of the “Microsoft Recommendations for a Consumerization of IT Strategy” series. This series introduces the phenomenon known as the consumerization of IT, including strategies for supporting the proliferation of devices in the workplace and supporting work tasks on personal devices at diverse locations.
This document discusses trends in data growth and mobile device usage, as well as Windows device management policies. It also includes questions asked of Satya Nadella at a conference about building apps for Windows platforms and Microsoft's vision going forward. Nadella responds that Microsoft will take an innovative approach to building experiences across devices and ensure apps can easily port to other platforms. He outlines Microsoft's vision of ubiquitous computing and ambient intelligence everywhere, with the goal of building platforms and experiences for this mobile-first, cloud-first world.
Microsoft is a large software company that develops operating systems, productivity software, servers, and various online services. Their main products include Windows, Office, Xbox, Skype and Bing. They face competition from companies producing alternative operating systems, productivity suites, mobile platforms and internet services. To strengthen their position, Microsoft needs to focus on innovation in mobile devices, tablets, security and new markets, potentially through divesting their Windows business unit to reduce antitrust issues. They also need to ensure their platforms are competitive in the growing mobile and tablet sectors.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Mobile Computing: Microsoft Mobile Solutions for Online LearningTmobile Girl
The purpose of this presentation is to empower people through intelligent mobile (#TMobilePhones or any smart phone) communication devices and software solutions.
Design and implementation of remotely managed embedded digital signage systemIJCSEA Journal
This paper is about a remotely managed digital signage system design considering embedded system design
rules and characteristics. Digital signage system design is based on various methods of using computer and
television screens as well as other kinds of display devices in ways that are as efficient as possible to
provide advertising and information to people in public areas. In modern digital signage systems, the
screens are divided into regions and layers, and the content on the screens is made up of several files. The
goals of this study are broadcasting information, advertisements at display contents in public areas such
as; subways, buses, malls, city squares and control these digital signs remotely.
Design and Implementation of Remotely Managed Embedded Digital Signage SystemIJCSEA Journal
This paper is about a remotely managed digital signage system design considering embedded system design rules and characteristics. Digital signage system design is based on various methods of using computer and television screens as well as other kinds of display devices in ways that are as efficient as possible to provide advertising and information to people in public areas. In modern digital signage systems, the screens are divided into regions and layers, and the content on the screens is made up of several files. The goals of this study are broadcasting information, advertisements at display contents in public areas such as; subways, buses, malls, city squares and control these digital signs remotely.
Information technology has evolved over the years and this has made it an important tool in the current business environment. Embracing technology has generated profits and major benefits for enterprises
Time for a New Mobile-Cloud Desktop ArchitectureITOutcomes
The document discusses the need for a new mobile-cloud desktop architecture. It notes that users now expect to access their applications, data and files from any device. However, traditional desktop environments remain tied to specific devices and locations. The document recommends moving to a mobile-cloud model where applications and data are stored and managed centrally in the cloud but delivered locally to any user device. This provides benefits like a consistent experience across devices and easier management for IT.
The document describes a new unified communication platform called CHiWAO that supports Enterprise Mobility Management functions. It allows employees to use their personal devices for work through features like secure file sharing, video conferencing, and mobile device management. The platform aims to improve productivity and collaboration through a unified messaging and file storage system across all devices.
Learn how the introduction of z/VM 6.2 provides the opportunity for IBM to make good on its promised support for continuing improvements in an already superior system – Linux on z/VM on System z. For more information on System z, visit http://ibm.co/PNo9Cb.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Forrester interviewed a Citrix customer currently using Citrix XenApp to determine the cost savings and business benefits of XenApp. In the process, they discovered that the company reduced desktop support costs by $1.7 million, by delivering key business applications via XenApp. Read this white paper to examine the use cases and the cost savings and benefits achieved.
Mitel is a leader in virtualized unified communications. They have partnered with VMware to overcome challenges of virtualizing voice applications and infrastructure. This allows organizations to integrate virtualized data and voice on a single infrastructure. Mitel has also virtualized voice on desktops through their work with VMware. Their licensing and Freedom Architecture enable flexible adoption of virtualized unified communications. A Gartner survey found midsize organizations are aggressively adopting server and desktop virtualization, with over 50% virtualizing most servers and 30% piloting desktop virtualization.
Html5 and mLearning: The rapid interactivity approachRicha Bakshi
HTML5 and mobile learning are coming of age rapidly. This white paper describes how rapid interactivity approach pioneered by Raptivity applies to HTML5 technology and m-Learning.
Jose Carlos Norte discusses the limitations of traditional VDI approaches that involve virtualizing entire desktop environments. He proposes a more efficient "hybrid virtualization" approach using eyeOS's cloud desktop solution, which provides a centralized web-based desktop environment under a company's control. This allows applications to be selectively virtualized using Citrix XenApp when needed, while other applications can run locally or as web apps, optimizing software licensing and server resource usage compared to traditional VDI.
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...Citrix
Windows 10 is poised to become the most rapid OS migration in history. Learn how you can streamline OS migrations now and in the future with your existing Citrix infrastructure.
BBA 3551, Information Systems Management Course Learn.docxtarifarmarie
BBA 3551, Information Systems Management
Course Learning Outcomes for Unit III
Upon completion of this unit, students should be able to:
8. Evaluate major types of hardware and software used by organizations.
8.1 Describe the features of a chosen NoSQL database.
8.2 Discuss how the use of a NoSQL database will affect competitive strategies in this era of IoT
(Internet of Things).
Course/Unit
Learning Outcomes
Learning Activity
8.1
Unit Lesson
Chapter 5
Unit III PowerPoint Presentation
8.2
Unit Lesson
Chapter 4
Chapter 5
Unit III PowerPoint Presentation
Reading Assignment
Chapter 4: Hardware, Software, and Mobile Systems, Q4-1 – Q4-7
Chapter 5: Database Processing, Q5-1 – Q5-7
Unit Lesson
In Unit II, we investigated ways that information systems (IS) can support collaboration, and we reviewed
Porter’s five forces model. In this unit, we will discuss the basic concepts of hardware and software. We will
also discuss open source software development and database management systems and compare the
differences between native and thin-client applications. Lastly, we will explore mobile systems and the
characteristics of quality mobile user experiences.
It is important that business professionals understand hardware components, types of hardware, and
computer data. We will start with bits and bytes. Computers use bits to represent basic units of data such as
ones and zeros. You should know the difference between bits, bytes, kilobytes, megabytes, gigabytes,
terabytes, petabytes, and exabytes (see Figure 1).
Term Definition Abbreviation
Byte A group of binary bits
Kilobyte 1,024 bytes K
Megabyte 1,024 K or 1, 048, 576 bytes MB
Gigabyte 1,024 MB or 1,073,741,824 bytes GB
Terabyte 1,024 GB or 1,099,511,627,776 bytes TB
Petabyte 1024 TB or 1, 125,899,906,842,624 bytes PB
Exabyte 1,024 PB or 1,152,921,504,606,846,976 bytes EB
Figure 1: Storage capacity terminology
(Kroenke & Boyle, 2017)
UNIT III STUDY GUIDE
Hardware, Software, and Mobile
Systems and Database Processing
BBA 3551, Information Systems Management 2
UNIT x STUDY GUIDE
Title
A byte generally contains eight bits. A switch can be open or closed. An open switch represents 0 or off, and
a closed switch represents 1 or on. Bits are basic units of data, such as ones and zeros, while data can be
represented by variables such as numbers, images, graphics, and characters to name a few (Kroenke &
Boyle, 2017).
The categories of computer software are clients and servers. Personal computers (PCs) use non-mobile
operating systems (OSs) such as Microsoft (MS) Windows and Apple Macintosh (Mac) OS X. Remember that
OSs are developed for specific hardware and are often referred to as native applications. In other words, MS
Windows was created specifically for hardware-based PC systems, so you cannot install MS Windows on an
Apple Mac as a base OS, nor can you install the Apple OS on a PC-based.
Viability of bring your-own-computer BYOC programsMasaf Dawood
The confluence of powerful hand held devices, and a broadband network at home has created the desire for employees to expect the same level of connectedness in the enterprise space/workplace. Businesses are feeling the pressure to develop a hybrid support approach that also includes Gen Y and Gen Z workers, who are technology savvy and would like to use these devices in the workplace. What is un-clear is how some of the programs aimed at integrating users own devices will work with the existing IT/framework and this paper attempts to provide a balanced approach to analyze the problem and propose a solution.
By: Masaf Dawood
As Windows XP comes to the end of its natural life on 8 April 2014, thousands of applications that run under the old operating system will need to be upgraded for a move to Windows 7 or 8.
The majority of commercial applications are available in newer versions of the Windows operating system, and users simply need to stay current. However, some businesses may find that they are unable to do so for various reasons, perhaps because they have been developed in-house, or are one of the few commercial applications that don’t have an upgrade path to Windows 7 or 8.
In these instances, what are the options when it comes to applications that can’t be upgraded? How can businesses overcome issues associated with legacy apps when upgrading the rest of their applications to Windows 8?
With the increased usage of smartphones and tables in business, mobility has become an enterprise requirement. More and more business applications are now getting extended to smartphones and tablets for increasing the responsiveness and productivity of employees. ECM vendors have also realized the benefit of giving secure access of corporate content to knowledge workers right from their smartphones and tablets. This space is evolving as customers have started using mobile applications and many ECM vendors have already launched their native mobile ECM applications over iOS, Android, BlackBerry and other mobile operating systems.
This document provides an overview of Android for Work and discusses its key features. It describes how Android for Work allows a single device to be used for both personal and work contexts through separation of data and applications. The document outlines the history and evolution of Android, discusses concepts like BYOD and MDM that motivated Android for Work, and examines some early enterprise mobility solutions like Samsung Knox. It then provides details on Android for Work features like the work profile, Play for Work app store, and separation of work and personal data on a device.
The document discusses several major technology product failures from the last 20 years, including Google Wave, Nokia N-Gage, Windows Vista, Microsoft Kin, Google Glass, and Google Buzz. For each failure, it provides 1-2 sentences summarizing the key reasons for why the product failed to gain widespread adoption in the market. Specifically, it notes issues like limited functionality, unintuitive interfaces, slow performance, lack of apps/games, and the products being overshadowed by stronger competitors. The document aims to analyze the root causes of failure for each product.
How to Build a Consumerization of IT StrategyMicrosoft
As technology becomes more central in people’s personal lives, consumer technologies have been steadily entering into the workplace and increasingly blurring the lines between home and work. This trend, known as the consumerization of IT, has the potential to play a significant role in improving business productivity and agility for enterprises.
The consumerization of IT helps organizations realize increased productivity and enhance workforce capabilities, while maximizing IT investments.
This white paper presents: • An introduction to the consumerization of IT. This description discusses general industry drivers and the Microsoft perspective about mobile workforces and the consumerization of IT.
• The value proposition of adopting a consumerization of IT strategy. Benefits include increased employee productivity and satisfaction.
• Enterprise device options. This section highlights the trade-offs between agility and control (business-centric versus IT-focused decisions).
This white paper is one part of the “Microsoft Recommendations for a Consumerization of IT Strategy” series. This series introduces the phenomenon known as the consumerization of IT, including strategies for supporting the proliferation of devices in the workplace and supporting work tasks on personal devices at diverse locations.
This document discusses trends in data growth and mobile device usage, as well as Windows device management policies. It also includes questions asked of Satya Nadella at a conference about building apps for Windows platforms and Microsoft's vision going forward. Nadella responds that Microsoft will take an innovative approach to building experiences across devices and ensure apps can easily port to other platforms. He outlines Microsoft's vision of ubiquitous computing and ambient intelligence everywhere, with the goal of building platforms and experiences for this mobile-first, cloud-first world.
Microsoft is a large software company that develops operating systems, productivity software, servers, and various online services. Their main products include Windows, Office, Xbox, Skype and Bing. They face competition from companies producing alternative operating systems, productivity suites, mobile platforms and internet services. To strengthen their position, Microsoft needs to focus on innovation in mobile devices, tablets, security and new markets, potentially through divesting their Windows business unit to reduce antitrust issues. They also need to ensure their platforms are competitive in the growing mobile and tablet sectors.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Mobile Computing: Microsoft Mobile Solutions for Online LearningTmobile Girl
The purpose of this presentation is to empower people through intelligent mobile (#TMobilePhones or any smart phone) communication devices and software solutions.
Design and implementation of remotely managed embedded digital signage systemIJCSEA Journal
This paper is about a remotely managed digital signage system design considering embedded system design
rules and characteristics. Digital signage system design is based on various methods of using computer and
television screens as well as other kinds of display devices in ways that are as efficient as possible to
provide advertising and information to people in public areas. In modern digital signage systems, the
screens are divided into regions and layers, and the content on the screens is made up of several files. The
goals of this study are broadcasting information, advertisements at display contents in public areas such
as; subways, buses, malls, city squares and control these digital signs remotely.
Design and Implementation of Remotely Managed Embedded Digital Signage SystemIJCSEA Journal
This paper is about a remotely managed digital signage system design considering embedded system design rules and characteristics. Digital signage system design is based on various methods of using computer and television screens as well as other kinds of display devices in ways that are as efficient as possible to provide advertising and information to people in public areas. In modern digital signage systems, the screens are divided into regions and layers, and the content on the screens is made up of several files. The goals of this study are broadcasting information, advertisements at display contents in public areas such as; subways, buses, malls, city squares and control these digital signs remotely.
Information technology has evolved over the years and this has made it an important tool in the current business environment. Embracing technology has generated profits and major benefits for enterprises
Time for a New Mobile-Cloud Desktop ArchitectureITOutcomes
The document discusses the need for a new mobile-cloud desktop architecture. It notes that users now expect to access their applications, data and files from any device. However, traditional desktop environments remain tied to specific devices and locations. The document recommends moving to a mobile-cloud model where applications and data are stored and managed centrally in the cloud but delivered locally to any user device. This provides benefits like a consistent experience across devices and easier management for IT.
The document describes a new unified communication platform called CHiWAO that supports Enterprise Mobility Management functions. It allows employees to use their personal devices for work through features like secure file sharing, video conferencing, and mobile device management. The platform aims to improve productivity and collaboration through a unified messaging and file storage system across all devices.
Learn how the introduction of z/VM 6.2 provides the opportunity for IBM to make good on its promised support for continuing improvements in an already superior system – Linux on z/VM on System z. For more information on System z, visit http://ibm.co/PNo9Cb.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Forrester interviewed a Citrix customer currently using Citrix XenApp to determine the cost savings and business benefits of XenApp. In the process, they discovered that the company reduced desktop support costs by $1.7 million, by delivering key business applications via XenApp. Read this white paper to examine the use cases and the cost savings and benefits achieved.
Mitel is a leader in virtualized unified communications. They have partnered with VMware to overcome challenges of virtualizing voice applications and infrastructure. This allows organizations to integrate virtualized data and voice on a single infrastructure. Mitel has also virtualized voice on desktops through their work with VMware. Their licensing and Freedom Architecture enable flexible adoption of virtualized unified communications. A Gartner survey found midsize organizations are aggressively adopting server and desktop virtualization, with over 50% virtualizing most servers and 30% piloting desktop virtualization.
Html5 and mLearning: The rapid interactivity approachRicha Bakshi
HTML5 and mobile learning are coming of age rapidly. This white paper describes how rapid interactivity approach pioneered by Raptivity applies to HTML5 technology and m-Learning.
Jose Carlos Norte discusses the limitations of traditional VDI approaches that involve virtualizing entire desktop environments. He proposes a more efficient "hybrid virtualization" approach using eyeOS's cloud desktop solution, which provides a centralized web-based desktop environment under a company's control. This allows applications to be selectively virtualized using Citrix XenApp when needed, while other applications can run locally or as web apps, optimizing software licensing and server resource usage compared to traditional VDI.
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...Citrix
Windows 10 is poised to become the most rapid OS migration in history. Learn how you can streamline OS migrations now and in the future with your existing Citrix infrastructure.
BBA 3551, Information Systems Management Course Learn.docxtarifarmarie
BBA 3551, Information Systems Management
Course Learning Outcomes for Unit III
Upon completion of this unit, students should be able to:
8. Evaluate major types of hardware and software used by organizations.
8.1 Describe the features of a chosen NoSQL database.
8.2 Discuss how the use of a NoSQL database will affect competitive strategies in this era of IoT
(Internet of Things).
Course/Unit
Learning Outcomes
Learning Activity
8.1
Unit Lesson
Chapter 5
Unit III PowerPoint Presentation
8.2
Unit Lesson
Chapter 4
Chapter 5
Unit III PowerPoint Presentation
Reading Assignment
Chapter 4: Hardware, Software, and Mobile Systems, Q4-1 – Q4-7
Chapter 5: Database Processing, Q5-1 – Q5-7
Unit Lesson
In Unit II, we investigated ways that information systems (IS) can support collaboration, and we reviewed
Porter’s five forces model. In this unit, we will discuss the basic concepts of hardware and software. We will
also discuss open source software development and database management systems and compare the
differences between native and thin-client applications. Lastly, we will explore mobile systems and the
characteristics of quality mobile user experiences.
It is important that business professionals understand hardware components, types of hardware, and
computer data. We will start with bits and bytes. Computers use bits to represent basic units of data such as
ones and zeros. You should know the difference between bits, bytes, kilobytes, megabytes, gigabytes,
terabytes, petabytes, and exabytes (see Figure 1).
Term Definition Abbreviation
Byte A group of binary bits
Kilobyte 1,024 bytes K
Megabyte 1,024 K or 1, 048, 576 bytes MB
Gigabyte 1,024 MB or 1,073,741,824 bytes GB
Terabyte 1,024 GB or 1,099,511,627,776 bytes TB
Petabyte 1024 TB or 1, 125,899,906,842,624 bytes PB
Exabyte 1,024 PB or 1,152,921,504,606,846,976 bytes EB
Figure 1: Storage capacity terminology
(Kroenke & Boyle, 2017)
UNIT III STUDY GUIDE
Hardware, Software, and Mobile
Systems and Database Processing
BBA 3551, Information Systems Management 2
UNIT x STUDY GUIDE
Title
A byte generally contains eight bits. A switch can be open or closed. An open switch represents 0 or off, and
a closed switch represents 1 or on. Bits are basic units of data, such as ones and zeros, while data can be
represented by variables such as numbers, images, graphics, and characters to name a few (Kroenke &
Boyle, 2017).
The categories of computer software are clients and servers. Personal computers (PCs) use non-mobile
operating systems (OSs) such as Microsoft (MS) Windows and Apple Macintosh (Mac) OS X. Remember that
OSs are developed for specific hardware and are often referred to as native applications. In other words, MS
Windows was created specifically for hardware-based PC systems, so you cannot install MS Windows on an
Apple Mac as a base OS, nor can you install the Apple OS on a PC-based.
This document discusses GSS Infotech's automated approach to migrating organizations from older versions of Windows to Windows 7. It begins by outlining the challenges of large-scale Windows migrations. The approach involves 4 steps: 1) Analysis and planning to understand user environments and applications, 2) Engineering including automated compatibility testing to determine if applications will work, 3) Deployment using imaging and automation to minimize downtime, 4) Ensuring steady state like training and support after migration. Automation is key to efficiently handling large migrations with minimal human intervention.
- Awingu is a company founded in 2011 that provides a software solution to aggregate applications and files into a secure online workspace.
- The solution allows users to access all their applications and files from any device through a single login. It integrates with existing IT infrastructure like Active Directory, file servers, and applications.
- Awingu has raised €14M in funding and has strategic partnerships and customers across industries and business sizes. The management team has senior experience from companies like Proximus, Toshiba, Microsoft, and Boston Consulting Group.
Windows 7 is the best OS for enterprise use from Microsoft and improves on 3 major pain points. Info-Tech recommends organizations running Windows XP as the primary desktop OS migrate to Windows 7 by end-of-year 2012. This storyboard addresses the following migration success factors:
•Preparation and planning are key to a successful deployment – focus on application, driver, and peripheral compatibility.
•Version selection is important to ensure that necessary features and functionality are deployed.
•Selecting the most appropriate deployment methodology will maximize resource allocation and minimize time and cost.
Take advantage of Microsoft’s free resources to help simplify and ensure the success of your Windows 7 deployment.
This document provides a summary of key features and capabilities of Windows 8 for business users. It discusses how Windows 8 supports changing work environments and mobile productivity with features like the new user interface, touch and gesture support, and enhanced security. It also covers manageability and virtualization improvements, opportunities for developing and deploying line-of-business apps, and connectivity options like DirectAccess, mobile broadband, and BranchCache that enable productivity for remote workers. The document concludes with a discussion of cloud-connected features in Windows 8.
VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...vmblog
Want to better understand what the world of desktop virtualization will look like throughout 2018? Read #predictions from 11 of the industry's leading experts to learn more about #VDI, #DaaS, #ThinClients and more! View this Slideshare to hear from industry thought leaders from companies like Cortado, dinCloud, eG Innovations, IGEL Technologies, Liquidware, NVIDIA, Uila and more. Make sure to also read the more than 280+ other expert predictions from technologies across #virtualization, #cloudcomputing, #hyperconverged, #IoT, #security, etc. here: http://bit.ly/2DQi2OT at VMblog.com.
Why Dot Net is the Most Demanded Framework in 2024GetAProgrammer
If you are a business owner thinking about stepping into software development, chances are you have heard about the Dot net framework. It is a major player in the industry, but what exactly does it do, and why are more and more businesses turning to Dot net development? In this blog, you will get to know the basics of Dot net, discuss its pros and cons, and explore why it might be the perfect fit for your company.
Dot Net stands out as one of the most favored frameworks for creating web and mobile applications, propelling businesses towards success effortlessly. The demand for Dot Net development companies is continuously surging, with every industrial sector leveraging its benefits. Developed by Microsoft, the Dot net Framework serves as an ideal platform for technology companies of all sizes. Dot Net development facilitates the implementation of MVC structure and web APIs, streamlining application development processes.
Moreover, Dot Net development contributes to the transformation of overall business setups and facilitates the creation of APIs for application development. The proliferation of Dot Net development companies aligns with market demands, fueled by their continuous advancements and popularity.
Its popularity among leading industries can be attributed to its open-source nature and strong community support. While numerous similar frameworks exist in the market, what sets Dot Net apart? Explore the detailed explanation below to understand why opting for the Dot Net framework is advantageous and how it distinguishes itself from others.
The document provides details about the Mobile to Desktop Controller (M2DC) software project. M2DC allows users to control their desktop computer from their mobile phone by sending text messages. It works by sending messages from the mobile to a proxy server, which then sends the messages to the desktop. This allows users to perform tasks like turning off their PC, searching for files, or playing media remotely. The document discusses the technologies used like VB.NET, PHP, and Windows Mobile 5. It also explains the objectives, scope, requirements and advantages of the M2DC software.
1. What is IT infrastructure and what are its components2.What ar.pdfexpressionnoveltiesk
1. What is IT infrastructure and what are its components?
2.What are the stages and technology drivers of IT infrastructure evolution?
3. What are the current trends in computer hardware platforms? Describe the evolving mobile
platform, grid computing, and cloud computing
4. What are the current trends in software platforms? Define and describe open source software
and Linux and explain their business benefits.
5.What are the challenges of managing IT infrastructure and management solutions? Name and
describe the management challenges posed by IT infrastructure
Solution
1.IT infrastructure is defined as a shared technology resources which is sum of all free and
licensed system software,third party services,owned or leased equipment that provide the
platform for the firm’s specific information system applications. IT infrastructure includes
hardware, software, and services that are shared across the entire firm.
2.The stages of IT infrastructure evolutions is began on the year 1930 and still it is continuing.
Electronic Accounting Machine-(1930-1950)->This era is began to replace Human effort from
accounting work.Machine started doing accounting and finance work effectivly and much more
errorfree than Human.
General-Purpose mainframe and minicomputer Era(1959-continuing)->This era has been started
by IBM, And it still persist in the position of supplying mainframe computer.Mainframe
computers are centralized computing with networks of terminal concentrated in the computing
department.In the mean while early models contained proprietary software and data.Mainframe
comuters able to process a wide variety of software and data ,It could able to process huge
amounts of data and transmission.
Personal Computer Era(1980 to Present)->Personal computers make a boom in both Home and
corporate sector .Personal computer makers like Microsoft and Apple take forward the evolution
by providing Desktops and Laptops which doubles the User effort.
Client/Server Era(1983 to Present)->as the desktop and laptop personal computers became more
powerful and cheaper, businesses began using them to replace mini-computers and some
mainframe computers by networking them together. Think of an octopus, with the body
representing the server and the tentacles representing the clients. At the heart of every network is
a server. It can be a mainframe, midrange, minicomputer, workstation, or a souped-up personal
computer.The client computer is the node on the network that users need to access and process
transactions and data through the network. Rather than one server trying to do it all, each server
is assigned a specific task on an application server.
Enterprise Internet computing Era(1992 to Present)->Perhaps no other era has seen the explosive
growth in functionality and popularity as this era. The problems created by proprietary, closed
systems are being solved by the standards and open-source software created in this era. The
promise of truly integrated hardware, softwar.
This document provides a summary of current technology trends presented by James Sturgess of Sturgclan Consulting. It covers changing internet usage and expectations, the importance of an online presence, advances in hardware and software, comparisons of PC and Mac as well as Android and iOS platforms, and updates on browser security. Key topics discussed include the growth of cloud computing and virtualization, the dominance of HTML5 and Windows 7, and the need for effective security on all devices regardless of platform.
Dan Israel of Google led a 1-hour live chat discussing Google Apps for Government, a new edition of Google Apps designed specifically for US federal, state, and local governments
Windows7 and office 2010 how to get the most out of itKees de Vos
Presentation outlining the Windows 7 and Office 2010 functionality ecosystem, the migration challenges facing organizations and the focus areas in migration project management.
The document discusses software and its importance in computers. It defines software as computer programs, data structures, and documentation. Software is engineered rather than manufactured and does not wear out over time. The document also discusses operating systems, customized software, software quality factors like functionality and usability, and examples of word processing features.
This document summarizes a presentation about developing a complete desktop strategy. It discusses challenges like managing costs during a Windows 7 migration and ensuring applications and data are securely accessible from anywhere. It promotes using the Microsoft Desktop Optimization Pack and cloud services to provide end-to-end PC management, security, mobility and optimization of existing investments. Virtualization techniques like application virtualization and virtual desktop infrastructure are presented as key tactics to maximize flexibility. The presentation encourages evaluating these Microsoft solutions in a proof of concept to modernize the desktop strategy.
This document discusses various cloud vendors, applications, and storage services. It describes Intacct as a cloud accounting system for small and mid-sized businesses. It also discusses the applications Fruux for managing contacts and calendars, GDocsDrive for accessing Google Docs files, and GetApp.com for sharing large files. The document also mentions the cloud storage services Media Cloud for tracking online media and Memonic for saving research notes and clippings.
The document discusses the emergence and growth of web-based operating systems (web OS). A web OS functions like a traditional desktop OS but runs within a web browser and stores data/applications on remote servers rather than locally. Several companies now offer commercial and open source web OS options. While the technology faces limitations, proponents believe web OSs could become more popular as users grow more comfortable with cloud-based computing and web applications.
Telecommunications Working from home Security and remote working caalehosickg3
Telecommunications Working from home Security and remote working can be a headache for digital nomads, and their clients or employers. If you’re a remote worker and have multiple clients, sometimes in different locations around the world, you may need to use different security applications for each of them. You will probably have to comply with multiple policies and regulations and may feel anxious about accessing and inadvertently compromising a client’s network. And, on the other hand, it is understandable if you are wary of giving up some of your own privacy to your employer (wang, qiao & lima, 2018) . It’s not just remote workers themselves who are at risk. Permanent employees who occasionally do work at home can face (and cause) security issues when remotely interfacing with an organization’s network. Let’s say we have a situation where our organization has 20 sales representatives working outside organization remotely. Case: Letter to CEO If we like to have remote team in our organization first we need to convince every one because there are several risks involved first we need to point the risk then has to come up with possible solutions Here in the letter we start with identification of risk. Here are some of the risks faced by the organization. Connection quality. If the user has a poor internet connection or a weak Wi-Fi signal, both of which are common at hotels or public hotspots for example, then the remote desktop connection will also be slow. Accessing applications or files becomes cumbersome. VPNs. VPNs, or virtual private networks, are very sensitive. Many public internet connections will not allow users to work at all, making remote connection almost impossible. Performance. There are many low-cost methods available, such as LogMeIn and GoToMyPC that simply do not have the speed necessary for accomplishing hours of work. The delays inherent in these solutions mean they are only viable options for quick tasks or small amounts of work. In addition, they may not allow for local file and printer access(Diekmann & Naab, 2019). Security. Public hotspots are common at coffee shops, airports, hotels, and even public parks. While they are convenient, they are also highly susceptible to hackers who would be able to access any of the data you’re working on while using the shared Wi-Fi. Application availability. Systems like Citrix and Terminal Server only allow access to certain programs that have been configured by the IT administrator. Often times, users need access to applications they installed themselves, special plugins, configurations, or files from their desktop, or other resources that are not on the remote access server. What’s more, these systems often work differently than the desktops. This change in habitual processes is inconvenient and sure to slow any user down. Open applications. If a user left files or applications open on their business desktop, they are locked there. It is impossible to log in to them a ...
Brain storming development in the post pc worldGalit Fein
The document discusses development methods and platforms for mobile applications. It notes that Android and iOS together account for the majority of mobile device sales. Native apps are preferred for usability but web apps allow for easier cross-platform development. Hybrid apps combine web content with native wrappers. Going forward, there is interest in HTML5 for simple cross-platform apps and in development platforms that integrate apps across devices and operating systems from a single codebase.
How is GovLoop Transforming Learning for Government?GovLoop
This document summarizes GovLoop projects in 2015 that transformed learning for government. It describes projects with the Federal Highway Administration, Small Business Administration, Federal Executive Institute, Young Government Leaders, Natural Resources Canada, National League of Cities, and Federal Retirement Thrift Investment Board. The projects implemented flipped classrooms, online training portals, virtual conferences, and mentoring programs to reduce costs and expand access to training across dispersed government workforces.
This document discusses the differences between teaching-focused design and learning-centered design. Teaching-focused design prioritizes the instructor passing knowledge to passive students, focusing on single topics and assessing student learning through tests. Learning-centered design emphasizes active student involvement, interdisciplinary topics, students evaluating their own learning through real-world application and viewing errors as opportunities to improve. While not always black and white, the document encourages shifting perspective to focus more on learner needs, skills and connecting new information to existing knowledge to support a continuous, interactive learning cycle.
Next Gen: Critical Conversations Slide DeckGovLoop
This document provides information about an online training session on critical conversations held on May 13, 2015. It lists the speakers, provides housekeeping details such as how to ask questions and get CPE credit. It outlines cooperation zones and strategies for having difficult conversations. These include identifying valued criteria, asking open-ended questions, thinking from the other perspective, being candid yet clear, networking for support, and documenting interactions. The document advertises upcoming leadership trainings from GovLoop and provides thanks and resources.
Internet of Things: Lightning Round, SargentGovLoop
This document discusses considerations for Internet of Things (IoT) solution design. It outlines key factors such as objectives, operational environment, technology environment, data consumers, analytics strategy, and data framework. It provides an example of how Intel's edge analytics platform can reduce data transfers by analyzing data at the edge. The document also describes Intel cloud services, edge and cloud analytics, and an end-to-end HVAC monitoring system using Intel hardware and software.
Internet of Things: Lightning Round, RonzioGovLoop
The document discusses the Veterans Health Administration (VHA) and opportunities for using sensors and remote monitoring. The VHA operates 151 hospitals, 300 vet centers, and other facilities that provided healthcare to over 6.4 million veterans in 2013. The document suggests sensors could help reduce hospital equipment and costs, improve patient mobility and data recording, and enable remote monitoring and diagnosis for medical issues like heart attacks, seizures, and elderly care. It was presented by Dr. Joseph Ronzio, Special Assistant to the Chief Health Technology Officer for the VHA.
Rodney Hite is a product manager for Big Data solutions at ViON. The document discusses the history and evolution of big data, from the earliest disk formats in the 1970s-80s that held kilobytes of data, to the present day where a variety of data sources generate huge volumes, velocities, and varieties of data. It outlines analytical techniques like semantic extraction, sentiment analysis, and predictive pattern analysis that can gain valuable insights from big data across domains like sports, security, fraud detection, and social media. The key to success is having an iterative strategy that focuses on desired results, future-proof technologies, integration, and using data scientists and engineers efficiently.
Internet of Things: Lightning Round, FritzingerGovLoop
Steve Fritzinger gave a presentation on virtualization and the Internet of Things. He discussed how inexpensive sensors can collect data with near zero installation and low power usage through mesh networks that are self-configuring and self-repairing. This data is analyzed using intelligent "fog" systems and new analysis tools, which can integrate with social networks and the sharing economy.
Internet of Things: Lightning Round, McKinneyGovLoop
Richard McKinney, the Chief Information Officer of the Department of Transportation, gave a presentation titled "The Data Tsunami: Making Transportation Safer & Smarter" where he discussed how collecting and analyzing data from vehicles, cameras, sensors and other Internet-connected devices could improve transportation safety and operations. He explained how connected vehicle technologies could help with intersection safety, commercial vehicle safety, and disseminating real-time road weather information. He also discussed potential applications in aviation like improved air traffic control and predictive maintenance, as well as uses in transportation planning such as travel demand modeling and smart parking.
Internet of Things: Government Keynote, Randy GarrettGovLoop
Randy Garrett gave a presentation on cyber security analytics and the Internet of Things for DARPA. Some key points:
- DARPA has a history of developing new technologies to provide strategic advantage for national defense.
- The interconnectivity enabled by modern technology has democratized access to sophisticated tools and information.
- Physical systems like vehicles are increasingly vulnerable to cyber attacks as they become more connected to networks.
- DARPA is pursuing research in areas like intuitive cyber situational awareness tools, encrypted computing, automated software analysis, and developing high-assurance cyber systems through formal methods.
Leap Not Creep Participant Guide Pre-Course Through Week 3 - 20140722GovLoop
Here are the key definitions of innovation discussed:
- A new method, idea, or product: This is a common definition but it's broad and doesn't capture the essence of innovation - that it creates value.
- A change that creates a new definition of performance: This definition gets closer to capturing that innovation is about creating value. It's not just coming up with something new, but improving performance in a meaningful way.
The second definition - a change that creates a new definition of performance - is likely the most accurate one for understanding innovation in the context of this course. The goal is to implement innovations that make meaningful improvements, not just introduce changes for the sake of being different.
The document discusses identifying the target audience for an innovation. It defines target audience as the specific group an innovation is meant to reach. The key steps are:
1. Define the target audience by considering factors like demographics, needs, pain points.
2. Conduct market research on the target audience to understand their wants and how they might respond to the innovation.
3. Create a description of the target audience to guide development and marketing of the innovation.
This document provides guidance on describing an innovation and setting goals for its implementation. It advises creating a mission statement and goals for the innovation that align with the agency's strategic goals and are written accessibly and measurably. The document also stresses writing an innovation description that clearly states the benefits for the target audience and is accessible to all. Setting goals is important so the innovation's purpose is clear and its implementation is worth the effort required.
Building Powerful Outreach - Executive Research BriefGovLoop
You’ve done the research. You’ve gotten leadership buy-in. Your government program is set to start helping people. But if nobody knows about it, your program will never make a difference. It’s like if a public health department had prepared thousands of flu shots, but no patients showed up to get them. In this brief, we will tell you how to empower your outreach.
The document discusses how big data technologies can help organizations make better decisions by analyzing large, diverse datasets in real-time. It provides examples of use cases like fraud detection, predictive maintenance, and demand forecasting that have been revolutionized by big data solutions. The document also explains how big data has evolved from traditional data warehousing and how organizations can build on existing technology investments to implement big data strategies. Real-time analytics is said to get the right data in front of decision makers faster by consuming, analyzing, and visualizing historical and live data sources.
NoSQL is not only SQL, so it’s structured and unstructured data AND much of it is very important data, data that requires enterprise-grade features. I’m referring to all the features of Relational databases that large enterprises expect
In today's fast paced and digital world, many in government are looking to the cloud as a means to transform their agency. The cloud allows us to easily collaborate, share resources, receive on demand computing power, and change the way we deliver services to citizens. With the cloud, this all can be done faster and more efficiently than ever before.
Build Better Virtual Events & Training for your AgencyGovLoop
Build Better Virtual Events and Training for Your Agency
Meet In-Person to Learn How to Thrive Online
Conferences are being canceled, and training budgets have been trimmed, but government personnel still need to learn the latest developments in their areas of expertise. That's the crux of the problem facing agency leaders and human resources professionals that want to sustain a top-notch government workforce. Moving in-person events and training to an online forum is one solution, but it's not always easy to do it well.
A successful virtual training program has 3 key ingredients:
An interactive technology platform
Just-in-time, relevant content
Active facilitation by a skilled moderator
Social Media Presentation for The Center for Organizational EffectivenessGovLoop
Here are some examples of specific, measurable outcomes with clear definitions of achievement:
- Drive 100 people to register for our emergency preparedness workshop by promoting it on social media. Achieved when 100 unique visitors click through from our Facebook page to the registration form.
- Generate 50 volunteer signups to help with our annual park cleanup event. Achieved when 50 people complete the online volunteer form and select the park cleanup from the options.
- Receive feedback from 200 residents on our draft budget through an online survey promoted on Twitter. Achieved when 200 surveys are submitted with at least one question answered.
Does this help explain what outcomes should look like in a plan? Let me know if you need any clarification or have additional
Guide to Managing the Presidential Management Fellows (PMF) Application Proce...GovLoop
If you plan to apply for the Presidential Management Fellows (PMF) Program to make the Class of 2014, this guide is your core resource. We interviewed dozens of current and former PMFs, career advisors and agency PMF coordinators to provide both information and insight to help you navigate the process.
Guide to Managing the Presidential Management Fellows (PMF) Application Proce...
Windows To Go: Microsoft Report
1.
2. D e veloping
N ew and
Aff or d abl e
Oppor tuniti es
for the Mobile
Workforce in a
Secure
Environment
3. Windows
Go to 2
or IT profession- chitecture to the user interface reviewing Windows To Go, NSA
als, there is an has been transformed. This re- states:
opportunity for port highlights one of the latest
government IT to features of Windows 8, Windows “Microsoft’s recommended us-
be instrumental in To Go. Windows To Go allows age of Windows To Go focuses
creating a modern, agile, and ef- the Windows 8 environment to on providing a managed Win-
ficient government agency. How- be carried on an encrypted USB dows environment while allow-
ever, IT professionals have great key, which can be plugged into ing users to roam to different
responsibility to support agency- any PC to access information on machines either in the workplace
wide success and meet federally their PC desktop. or at home. This includes scenar-
mandated initiatives. With the ios such as managed free seating,
launch of Windows 8, govern- This report highlights how temporary or contracted work-
ment agencies are even better Windows To Go helps facilitate force, and working from home.
positioned to be more agile, mo- agency continuity of operations A preconfigured and managed
bile and secure, with a platform initiatives, opens new opportuni- Windows To Go device with a
reimagined for today’s govern- ties for government agencies and Virtual Private Network (VPN)
ment needs. retains security in a mobile en- solution, such as DirectAccess,
vironment to accommodate an can provide a trusted environ-
Advancements in technology increasingly mobile workforce. ment for remote access into an
provide opportunities for gov- enterprise network.
ernment agencies to modernize, With this feature available, em-
become more agile and efficient. ployees can easily access and Travel amongst sites often re-
These elements are essential to share information on the go, and quires a user to travel with a lap-
meet organizational demand, es- not be confined to a single desk top or mobile device. Windows
pecially as agencies operate with or location to access their desk- To Go could be used as a solu-
leaner budgets. top, and without compromising tion allowing employees to travel
security. There are many practi- lighter while still having access to
In the latest version of Windows cal implications of Windows To their desktop and managed net-
everything from the system ar- Go. In a recent report from NSA work environment.”
4. Facilitati n g Co n ti n u it y of O p e r at ion s
With the explosion of technological capabilities in partnership with BYOD initiatives and telework
and broader consumer adoption, there is an in- programs.
3 creasing reliance on technology to deliver core
services to citizens by government. Therefore, Considering that many government computers
continuity of operations (COOP) has become in- have different versions of Windows, hardware
creasingly important for the federal government. specifications and software, it is remarkable that
The Federal Continuity Directive 1 (FCD 1) pro- Windows To Go can run in a variety of different
vides direction to the federal executive branch on computing environments. Microsoft continues to
how to best create and develop a continuity plan explain what kinds of devices can deploy Windows
and program. A continuity plan is critical, as it al- To Go, stating, “Enterprise customers utilizing Vol-
lows government to continue to operate during ume Activation Windows licensing will be able to
emergencies that may disrupt normal work activi- deploy USB drives provisioned with Windows To
ties. Windows To Go is one piece of technology Go workspace.” Microsoft states that a host com-
that can help transform how governments operate puter for the Windows To Go environment does
during a crisis. not require specific software. Microsoft continues
to acknowledge that PCs certified for Windows 7
COOP initiatives have become increasingly impor- or Windows 8 can host Windows To Go. Microsoft
tant for government agencies. In todays world, hav- provides some further details on what conditions
ing the ability for employees to access their desk- a host computer must meet to use Windows To
tops on any PC is essential. For many government Go:
agencies, it is now imperative that employees find a
way to securely access information and resources Computer is USB boot capable
during a crisis. Windows To Go can help facilitate Computer is USB boot enabled in the firm-
an effective COOP program. ware
Meet Windows 8 minimum system require-
Microsoft provides a great overview of Windows ments
To Go, and the relationship to assisting in devel- Have compatible processor architectures (for
oping COOP programs is clear. Microsoft states, example, x86 or AMD64) as the image used
“Windows To Go is an enterprise feature of Win- to create the Windows To Go workspace.
dows 8 that enables users to boot Windows from ARM is not a supported processor for Win-
a USB-connected external drive. Windows To Go dows To Go.
drives can use the same image that enterprises use Have firmware architecture that is compatible
for their desktops and laptops, and can be man- with the architecture of the image used for
aged the same way. Offering a new mobility op- the Windows To Go workspace.
tion, a Windows To Go workspace is not intended
to replace desktops or laptops, or supplant other There are many scenarios in which Windows To
mobility offerings.” The end goal of Windows To Go can be used; Microsoft provides an overview
Go is that it will allow government agencies anoth- of some of these scenarios.The first way is through
er option for growing mobility trends, and work COOP. Microsoft states:
5. In this scenario, selected employees receive a USB drive with a Windows
To Go workspace, which includes all of the applications that the employees
use at work. The employees can keep the device at home, in a briefcase, or
wherever they want to store it until needed.When the users boot their home
computer from the USB drive, it will create a corporate desktop experience 4
so that they can quickly start working. On the very first boot, the employee
sees that Windows is installing devices; after that one time, the Windows To
Go drive boots like a normal computer. If they have enterprise network ac-
cess, employees can use a virtual private network (VPN) connection or Di-
rectAccess to access corporate resources. If the enterprise network is avail-
able, the Windows To Go workspace will automatically be updated using your
standard client management processes.
Microsoft continues to provide other examples as to how Windows To
Go can open up new opportunities for agencies. Microsoft states that
Windows To Go can also assist with contractors and temporary workers
accessing information. Microsoft states, “In this situation, an enterprise
IT pro or manager would distribute the Windows To Go drive directly
to the worker where they can be assisted with any necessary additional
user education needs or address any possible compatibility issues.” This
would certainly be extremely helpful for workers and contractors who are highly mobile, and often on
the move. Microsoft continues, “While the worker is on assignment, they can boot their computer ex-
clusively from the Windows To Go drive and run all applications in that environment until the end of the
assignment when the device is returned. No installation of software is required on the worker’s personal
computer.”
Opening N ew Oppor t u nit ie s
Increasingly, government employees desire flex- tal Government Strategy released by the White
ible work styles and access to information to House, agencies are now tasked to move citizen-
work on the device and place of their choosing. facing services to a mobile environment. Susie Ad-
The Windows 8 environment goes well beyond ams, Chief Technology Officer at Microsoft, recent-
COOP initiatives and aligns with many elements ly spoke with Chris Dorobek of GovLoop, Susie
of the Digital Government Strategy. With the Digi- comments that Windows 8 can help agencies fully
6. align with the Digital Government Strategy. Susie on employee need. With Windows To Go, agencies
states, “The Digital Government Strategy pushes will already have a built in technology infrastruc-
for agencies to look at bring your own device and ture that provides remote work in a secure en-
mobility. The directive calls for federal employees vironment, and will not have to worry about the
to have access to the data they need anywhere, associated costs of wireless and data. Likewise, to
anytime on any device.” support mobile work initiatives, like BYOD, agen-
5 cies must provide security and IT support for a
Additionally, Windows To Go may be an afford- variety of devices and operating systems. With
able solution for many agencies to consider while Windows To Go, an employee can seamlessly con-
adopting a mobile strategy, especially as opposed nect to their desktop from a variety of different
to ongoing BYOD efforts. Although BYOD cer- work scenarios, all on the same operating system
tainly can provide improved productivity to allow and accessed securely. Windows To Go sticks can
employees to work on the device of their choice, be purchased at a low rate, and avoid some of the
BYOD does have hidden costs. challenges and hidden costs we have seen with
BYOD.
One of the hidden costs relates to the pricing
structure of wireless plans. To avoid shifting data Another instance that Microsoft identifies is tele-
and wireless plans to employees, agencies are be- work, stating, “The Windows To Go drive can be
ginning to offer reimbursements for data and wire- provisioned for employees using various methods
less. For agencies, this reimbursement rate can po- including System Center Configuration Manager
tentially be higher than if the agency were to buy or other deployment tools and then distributed
devices in bulk and optimize service plans based to employees. The employee is instructed to boot
“Windows To Go could be used as
a solution allowing employees
to travel lighter while still hav-
ing access to their desktop and
managed network environment.”
National Security Agency
“The Digital Government Strategy pushes for agen- “In this situation, you have employees who are
cies to look at bring your own device and mobility. moving from site to site, but who always have ac-
The directive calls for federal employees to have cess to a compatible host computer on site. Using
access to the data they need anywhere, anytime Windows To Go workspaces allows them to travel
on any device.” without the need to pack their PC.”
Susie Adams Microsoft
Chief Technology Officer, Microsoft
7. the Windows To Go drive initially at work, which
caches the employee’s credentials on the Win- A final example is that with Windows To Go, gov-
dows To Go workspace and allows the initial data ernment employees can travel lightly. Microsoft
synchronization between the enterprise network states, “In this situation you have employees who
and the Windows To Go workspace. The user can are moving from site to site, but who always have
then bring the Windows To Go drive home where
it can be used with their home computer, with or
access to a compatible host computer on site. Us-
ing Windows To Go workspaces allows them to 6
without enterprise network connectivity.” travel without the need to pack their PC.”
I mp ro ve d S ecu ri ty F e at u r e s
Yet, with all these great innovations from Win- BitLocker with your Windows To Go drives to
dows To Go, the core concern for any government protect the drive from being compromised if the
agency is security. Retaining security in a mobile drive is lost or stolen. When BitLocker is enabled,
environment is a necessity to meeting organiza- the user must provide a password to unlock the
tional demands. With increased collaboration and drive and boot the Windows To Go workspace,
providing mobile and multiple channels to access this helps prevent unauthorized users from boot-
information, agencies are faced with increased ing the drive and using it to gain access to your
risks of government data being compromised. network resources and confidential data.”
Microsoft has made significant security updates Microsoft continues, “You can enable BitLocker
to protect information, and ensure that security while using the Windows To Go creator wizard as
is number one for government employees. This is part of the drive provisioning process before first
especially true with Windows To Go, Susie Adams use; or it can be enabled afterward by the user
of Microsoft states; “Windows To Go is protected from within the Windows To Go workspace.”
and encrypted with BitLocker, so you can plug into
any device that could run Windows 7, and then Another key feature about Windows To Go is that
your Windows 8 desktop is there for you to ac- no information can be transferred between com-
cess.” puters. Susie states, “Windows To Go runs in your
own sandbox, and no information can move be-
Microsoft continues to provide insights to im- tween devices, so when you shutdown and unplug,
proved security features throughthe use of Bit- you have your desktop in your pocket.”
Locker, stating, “We recommend that you use
8. The Way F o rw a rd
Across all areas of government, services rely on technology, such as Windows To Go, there is much
dependable and efficient technology. In todays digi- reason for optimism that technology can enable
7 tal world, it is essential for government to have agencies to tackle their most complex challenges.
reliable systems for improved governance. At the In many ways, government technology is at the core
speed at which technology moves and with height- of enabling agencies to meet their agency wide
ened citizen expectations of government, agencies objectives. As technology like Windows 8 contin-
need to be become more flexible and agile in tech- ues to evolve, it is critical that agencies adopt and
nology adoption. modernize technology to meet the growing needs
of the agency.
There is no doubt that the current government
landscape is complex, and contains significant chal-
lenges for improved services, cost reductions and
modernized infrastructure. Yet, with emerging
Fo r m o re i n fo rma ti on on M i c r os of t W in d ows
8 , p le ase see the f ol low in g r e s ou r c e s :
1. Overview: Windows To Go
2. Windows To Go: Frequently Asked Questions
3. Windows To Go: Prepare Your Organization
4. Windows To Go: Deployment Considerations
5. Windows To Go: Security and Data Protection Considerations
6. Windows To Go: Best Practice Recommendations
7. Configuring Windows To Go as a Mobile Desktop Solution Windows To Go Step by Step
8. How to Create a Windows To Go USB Drive
9. Ask the Performance Team Blog. Windows 8 / Windows Server 2012: Windows To Go
10. Security and Data Protection Considerations for Windows To Go
11. How to Securely Configure Microsoft Windows Vista BitLocker
GovLoop Resources
1. Microsoft Productivity for Government
2. Windows 8 Apps
3. Most Anticipated Features of Windows 8
9. About Microsoft
Every day at Microsoft we are motivated and inspired by how our customers use our software to find
creative solutions to business problems, develop breakthrough ideas, and stay connected to what’s most
important to them. Check out the Microsoft Productivity for Government group on GovLoop as well as 8
the Technology Sub-Community of which we are a council member.
About GovLoop
GovLoop’s mission is to “connect government to improve government.” We aim to inspire public sector
professionals by serving as the knowledge network for government. GovLoop connects more than 60,000
members, fostering cross-government collaboration, solving common problems and advancing government
careers. GovLoop is headquartered in Washington D.C with a team of dedicated professionals who share a
commitment to connect and improve government.
For more information about report, please reach out to Pat Fiorenza, GovLoop Research Analyst, at pat@
govloop.com.
GovLoop
734 15th St NW, Suite 500
Washington, DC 20005
Phone: (202) 407-7421
Fax: (202) 407-7501