SlideShare a Scribd company logo
1 of 44
Develop a Desktop Virtualization Strategy  Transform IT from Asset Management to Service Management
Introduction 3 Traditional challenges – mobility, user experience, and to a lesser extent, licensing – have been tackled by virtualization vendors over the past 12-18 months, leading many organizations closer to deployment. At the same time, increased implementation has exposed numerous technology limitations to user experience that vendors are scrambling to address. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Q4, 2010 29% Q1, 2009 15% 21% 17% 40% Evaluated, Decided No No Plans Planning Piloting Implementing or Deployed 74% 100% 100% A maturing technology has resulted in broader use cases and cost effective solutions, driving more IT shops to consider desktop virtualization as a viable option. Info-Tech Research Group This solution set will help you:
Executive Summary Info-Tech Research Group The bottom line: While interest in desktop virtualization has increased significantly in the past year, the lack of a compelling ROI makes it increasingly important to carefully consider appropriate use cases, TCO and infrastructure requirements for deployment. Understand Desktop Virtualization ,[object Object],[object Object],Assess Appropriateness ,[object Object],[object Object],Strategize ,[object Object],[object Object],Implement ,[object Object],[object Object],Manage the Environment ,[object Object],[object Object],[object Object]
1 3 Understand  Desktop Virtualization ,[object Object],[object Object],[object Object],[object Object],Next Section in Brief Strategize & Implement 2 Manage the Environment Info-Tech Research Group
Desktop virtualization (DV) simplifies software management, bolsters data security & increases user flexibility Shift IT’s focus from desktop asset management and support  to delivering the desktop as a service to end users ,[object Object],[object Object],[object Object],[object Object],Desktop virtualization enables IT to: The Age Old IT Problem The Solution Info-Tech Research Group Distributed PCs impose asset maintenance & support costs. Deployment & configuration of hardware, management of application & OS configurations, as well as troubleshooting, typically happen at the desk side. Traditional Desktop Model With DV, a new desktop – and new or upgraded application stacks – can be delivered to groups of end users by updating a central desktop image. This eliminates the need to individually deploy or configure new desktop hardware at the desk side. Virtual Desktop Model
Don’t rule out specialized use cases just yet:  User experience & mobility have greatly improved 2009 2010 1990s ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Desktop Virtualization Appropriateness Task/Shift Worker Mobility & high latency/low bandwidth situations were seen as problematic in the past,  but advances in this technology have expanded use cases to include more types of users Knowledge Worker Mobile Worker High Performance Worker Info-Tech Research Group
Desktop virtualization shifts desktop processing  & storage off of the physical desktop For the end user, the experience should be the same as using a local PC.  They may not even realize that apps are not executing natively on a local CPU and OS instance. Access Device Orchestration Software Info-Tech Research Group
Consider every virtual desktop delivery method to provide  appropriate functionality with minimal infrastructure upgrades Info-Tech Research Group Session Virtualization Virtual Desktop Infrastructure Application Virtualization
Use session virtualization to make most efficient use of server side resources, but be sure to understand ideal user cases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key Characteristics OS App 1 : many
Leverage streamed applications to reduce configuration &  deployment headaches through virtual isolation ,[object Object],[object Object],[object Object],[object Object],[object Object],Key Characteristics 1 : many OS App OS App OS App App
Don’t believe the hype! Virtual Desktop infrastructure is the DV darling, but don’t assume you should deploy to every user type ,[object Object],[object Object],[object Object],VM OS App Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],Key Characteristics Task workers often do not require full VDI. Deploy a mix  of Session Virtualization and VDI to avoid the considerable bump in infrastructure requirements that go along with full VDI while still serving all types of users. But… VM VM VM 1 : 1
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Leverage the  Appropriateness Assessment Tool  to evaluate the current user & infrastructure environment fit with DV Making the decision to deploy DV requires consideration of numerous variables.  Ensure every relevant factor is taken into consideration. Info-Tech Research Group ,[object Object],Make sure this doesn’t happen to you
Go go go! Pending PC refresh & centralized management Info-Tech Research Group Organization’s whose PCs are about 4, maybe 5 years old will inevitably need to be replaced as they begin to fall short in delivering applications whose memory and processing requirements increase over time. Pending PC Refresh For the 14% of organizations implementing to avoid a PC refresh, v irtualizing the desktop prolongs the life of existing desktop hardware. T his is a great way to offset some of the capital expenses that often prevent organizations from getting into desktop virtualization.  Go Carefully consider the current state of your infrastructure. DV has significantly greater storage and bandwidth requirements than desktop PCs. The savings realized by extending the PC lifecycle can quickly be eaten up by required upgrades to the infrastructure. Caveats In recent years, many organizations have deployed PCs on an as-needed basis, resulting in a complex and distributed PC environment. This  can be difficult to support given varied hardware and app configurations.  Performance also tends to degrade, as junk is added to the system. Decentralized Desktop Mgmt Access device hardware configuration is moot with DV because the OS & apps run natively on the server. Implementing virtualized desktops on those devices allows for deployment and management of software on a central desktop image. In addition, DV provides a new desktop image on every startup. Go DV is an expensive solution to this problem, so consider deploying with end-of-life PCs or in concert with a major software upgrade to maximize ROI. Caveats
Tread carefully: small deployments & mixed environments Info-Tech Research Group Given the cost savings and increasing accessibility of server virtualization, many SMBs and SMEs are looking to begin piloting desktop virtualization initiatives.  Less than 1000 Seats Given the significant capital expenses for licensing increases and infrastructure upgrades associated with implementing DV, the benefits only really elicit practical and cost savings after about 1000 seats. Maybe Some organizations, however, may already have some pieces of the infrastructure in place as part of upgrades for other initiatives, making the TCO relative to a traditional PC environment more amenable to a small deployment. Caveats Organizations that are primarily composed of a single type of user, especially task/shift or knowledge workers, are an obvious fit for DV. However, for organizations that have a mix of different job types, the applicability of desktop virtualization may not be obvious. Many Different Job Types Given that the primary benefit of DV is improved app & OS management, implementing virtual desktops to a highly distributed environment may be counterproductive. Maybe DV saves time by enabling the simultaneous management of sets of desktops with the same app requirements. More desktops means more savings. While desktop virtualization can support multiple desktop templates for different sets of users, going too far can eliminate the savings.  Caveats
Go, no go: Compliance & cost savings Info-Tech Research Group Industries such as healthcare and education, where compliance is a considerable factor, often consider desktop virtualization as a potential way to limit loss of personal information through lost or stolen laptops or other endpoint devices. Stringent Compliance Requirements With Desktop Virtualization, all data is stored on databases of the host organization. Sensitive information is not maintained on the access device. Thus, in the event of lost or stolen hardware, there is no danger of the data falling into the wrong hands. Without access to the host servers, the access device becomes a dud. Go Virtualized desktops are just a tool, and will not fix every security hole. If users are copying all their work email over to, for example Gmail, then the virtual desktops aren’t solving any problems. This represents a bigger issue. Caveats Many organizations have realized significant cost savings and infrastructure consolidation through virtualization of servers. Given IT’s significant investment in training and management in this environment, desktop virtualization is perceived to be the next logical step. Building on Server Virtualization Investment in server virtualization is not sufficient to warrant a move to desktop virtualization, though 20% of organizations are implementing for this very reason. Desktop virtualization is much more complex and does not elicit the same significant cost savings. No Go All that said, the experience procured from a server virtualization initiative will be valuable to a desktop virtualization deployment. In addition, while virtualized servers are not necessary for DV, they  are  deployed in most DV scenarios. Caveats
Desktop virtualization is not a silver bullet for all scenarios; carefully assess appropriate use cases to maintain end user satisfaction Changes to Tech Support Processes Offline Access to virtual desktop Increased latency to users Support for desktop peripherals Potential for outages to users 2009 2010 Info-Tech Research Group Increased latency to users Potential for outages to users Offline Access to virtual desktop Support for desktop peripherals Changes to Tech Support Processes As DV is deployed by more IT groups, the process and infrastructure requirements for a successful implementation have become better understood, pushing the pressure back on the technology. ,[object Object],[object Object],[object Object],Increased latency and potential outages to users are now the biggest impediments to success
Carefully consider TCO & stakeholder communications, & assess user population fit as these factors have impeded others 3   Infrastructure will not  support virtualized desktops 43% CAPEX does not fit  current budget 43% Lack of in-house experience 48% Inappropriate User Population 65% Difficulty Communicating Benefits to Stakeholders 70% Unattractive TCO 86% Over 80% of organizations cited total costs as a major reason they decided NOT to deploy Source: Info-Tech;  N = 23 I don't think the desktop virtualization market needs to change,  just the way upper management thinks about it.   -IT Manager, Manufacturing We need to see improvements in speed and reductions in the effort required to simulate the desktop environment to which users have become accustomed.   -CEO, Management Consulting Services We need a more compelling financial case for adoption.    -IT Manager, Government The huge number of remote users at our organization make desktop virtualization inappropriate.   -IT Pro, Utility & Communications Organization The issue is the cost model, especially around BCP, storage costs and licensing compared to a traditional desktop deployment.  Instead of desktop virtualization we will be looking at application virtualization.      -IT Manager, Financial Services “ “ Why aren’t your peers deploying DV?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Show the CFO that DV won’t break the bank, but don’t expect decreases to TCO Desktop virtualization, and especially VDI, is not deployed solely for cost savings. ,[object Object],Info-Tech Insight:
1 3 Understand  Desktop Virtualization ,[object Object],[object Object],[object Object],[object Object],Next Section in Brief Strategize & Implement 2 Manage the Environment Info-Tech Research Group
Avoid overspending by leveraging a hybrid virtualization model mixing VDI & session virtualization to keep costs down Info-Tech Research Group Task/Shift Worker Knowledge Worker Mobile Worker VDI Session  Virtualization It’s not all or nothing.  Don’t deploy VDI  to all your users just because some of them happen to be knowledge workers. The infrastructure requirements that go along with VDI can be prohibitive relative to session virtualization. Deploy to the ideal scenario, when possible.  The question isn’t “Should I deploy these task workers on VDI too?”, it’s “Should I deploy them with Session Virtualization, or leave them on their desktop PCs?” Select a flexible vendor.  The best desktop virtualization vendors out there can deploy both VDI and Session Virtualization in the same environment to maintain flexibility and minimize cost.  Mixed Users = Mixed Solutions
Build back-to-front to ensure you have met heightened  storage, network and processing  requirements that go  along with DV Criticality of capacity planning, monitoring, and infrastructure support  are magnified with desktop virtualization relative to traditional desktop PC setups Establish the following Infrastructure Enablers to minimize implementation pain  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Understand requirements around storage input/output operation speed, the most significant performance bottleneck While capacity is front of mind for most IT pros when they think of storage,  speed is of utmost importance to the success of the desktop virtualization project. Info-Tech Research Group
Determine single-disk IOPS capabilities to  establish maximum total IOPS for your storage arrays Info-Tech Research Group = 1 ( AVG Latency [seconds] + AVG Seek Time [seconds] ) = + ( IOPS/Disk  *  #ofDisks  *  %Write ) ( RAID Write Penalty ) ( IOPS/Disk  *  #ofDisks  *  %Read ) IOPS per Disk 1 2 RAID Level Write Penalty RAID 0 1 RAID 1/10 2 RAID 5 4 RAID 6 6
Calculate input/output operation speed requirements to  quantify your current situation & identify required upgrades Min Workload Boot up (~25-30 IOPS) Login (~14 IOPS) Heavy Work (~12-20 IOPS) Light Work (~4-8 IOPS) Normal Work (~8-12 IOPS) Work Mode Idle (~4 IOPS) Storage Requirements of a Single Desktop Max # of Supportable  Desktops per Array IOPS per Array Max Avg Desktop Workload = Info-Tech Research Group
Looks to solid state drives & boot storm mitigation strategies to overcome limited IOPS in your storage arrays Info-Tech Research Group
Establish processing & memory requirements for hosting servers to ensure that users are happy but resources are not wasted Info-Tech Research Group
Assess bandwidth needs for specific usage scenarios to determine network requirements & identify necessary upgrades Info-Tech Research Group Desktop Activity Bandwidth Requirement Web Browsing 80-100 kbps Office Applications  (Outlook, Word, Excel, PowerPoint) 40-50 kbps Printing 500-600 kbps Video  (NON HD; flash/WMV) 150-200 kbps/450-500 kbps Build in redundancy to keep desktops connected.  The network is a single point of failure for virtual desktops.  It’s absolutely critical to build in multiple routes – through switching and routing infrastructure – and utilize multiple ISPs, to maintain constant interactivity between servers and access devices. Calculate workload breakdowns to estimate bandwidth requirements.  Calculate the percentage of a user’s typical workday that is composed of each activity above, to establish average bandwidth consumption per user. Because most tasks are performed randomly throughout the day (except, perhaps, video consumption at lunch hour), most organizations should not use requirements for video or printing as a benchmark. This would result in an exorbitant overspend on network resources. VDI Requires “Always On” Mentality  Start with 200-250 kbps per average user for office workers without video requirements (1 mbps with 480p video requirements). Info-Tech recommends…
Understand the benefits of various access devices to deploy the most appropriate option; Thin Clients come with serious benefits ,[object Object],[object Object],[object Object],[object Object],Bring Your Own Laptop Users’ Off-site Home Device ,[object Object],[object Object],End-of-Life PCs Thin Clients Why Thin Clients? Thin clients lack hard disks and cooling fans, reducing their power requirements relative to a desktop. No moving parts means less maintenance and desk side support. Less wear and tear means lifecycles can be extended further than PCs. Thin clients provide 5-10% overall cost reduction per desktop when a hardware refresh becomes necessary. If the user is accessing a virtual desktop from legacy hardware, thin client hardware with better media handling will improve the end user experience.
Build success into the pilot by planning stakeholder support, training, third party help, ROI analysis and testing up front Info-Tech Research Group
Provide remote users access to virtual desktops from their own access devices at home instead of deploying laptops. Laptops are often used to provide work-at-home users with access to a secure desktop providing a DR option. Implementers have saved by providing remote access to secured virtual desktops instead without sacrificing user experience.  Secure Home Access Why it works… Focus the pilot on delivering quick wins & short-term savings; consider the following scenarios of “low-hanging fruit” Pilot with users ready for a new PC to secure participation and user buy-in. Users will be more willing participants given degraded performance on their old PC, and often see a performance boost on the virtual desktop.  It may also be possible to provide them with a performance and software upgrade without upgrading their hardware. New PC Candidates Why it works… Create a test lab of server hosted virtual PCs to test a new application or OS upgrade. This will eliminate the need to  build out separate hardware for a pilot group to try out a new OS and software (e.g. Windows 7) because they can access upgraded hosted VMs from current hardware. The virtual test lab is cheaper and less disruptive for testers.  Virtual Test Lab Why it works… Info-Tech Research Group
1 3 Understand  Desktop Virtualization ,[object Object],[object Object],[object Object],[object Object],Next Section in Brief Strategize & Implement 2 Manage the Environment Info-Tech Research Group
Desktop virtualization transitions from  IT as asset management to IT as a service  In traditional distributed processing, service is intimately connected to what IT can deploy & maintain on the desktop. With DV, service depends on what can be delivered to the end user from the data center, server room, or broom closet. This shift results in a variety of challenges that must be addressed. Info-Tech Research Group IT Focus Service End User Traditional Distributed Computing Virtualized Desktops The focus is on acquisition, configuration, and deployment of distributed hardware assets. Ongoing support involves configuration and deployment of applications, and OSs across distributed assets. Desktop PC is the focal point between user needs and IT’s ability to deliver service. PC support is critical to service levels. The focus is on delivery of a centrally hosted desktop computing experience to end users. Quality of service is dependent on hosting servers, network, connection brokering, and endpoint access devices. The desktop access device is no longer the focal point. Drive endpoint maintenance and support toward zero while maintaining or improving
Understand end user expectations  to manage & optimize the environment appropriately Success in desktop virtualization is determined by whether the user notices degradation in performance of the desktop relative to their old environment.
Culture, resistance, compatibility, and service are all challenges when moving from servicing assets to servicing people Info-Tech Research Group We have had many starts and stops which is why we are doing it in pilot mode to ensure all of the bugs are fixed prior to rolling out to the organization. -IT Manager, Manufacturing It took an unusually long time for my staff to get trained... bring up is a long process.   -IT Director, Business Services User acceptance is slow because they don't always like thin client concept.   -IT Consultant, Manufacturing Storage needs [for DV] are extremely high.   -CTO, Financial Services We experienced a surprising amount of pushback from within our IT department. -VP of IT, Hosting Services “ “ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
With many chefs in the kitchen, make sure you only hand out  one  spoon; dedicated DV specialists yield greatest success 5 We convened a special task force to drive Desktop Virtualization.  Our Windows Server Management,  Network Engineering, Enterprise Storage, Asset Management, and Desktop Engineering teams all had representation.  It was driven jointly by the server and desktop teams, as they had the greatest understanding of the technologies and also the vision to build a strong offering.  I sponsored the project from a desktop perspective. We considered it an important step in controlling operating expenditures. -  Technology Manager, Financial Services Info-Tech Research Group Specialized  Team/Individual 17% Centralized App  Mgmt Staff Desktop Support Staff 24% Server  Admins 52% Centralized  App Mgmt Staff Desktop Support Staff Server Administrators Specialized  Team/Individual While most organizations hand decision rights to server administrators, organizations with the most success formulate a specialized team or appoint an individual Source: Info-Tech;  N = 27 Source: Info-Tech;  N = 30 “ “ Desktop Virtualization   Project Success
Don’t accept defaults;  configure the desktop image for optimal performance Info-Tech Research Group Tailor settings to your infrastructure and user needs to get the most out of your investment.
In the end, user satisfaction is priority number one;  ensure user experience is at least on par with users’ old desktop PC Info-Tech Research Group Keep the user happy.  While disabling video and games can optimize use of bandwidth and processing, it can also negatively affect user satisfaction. Balance these factors carefully by ensuring users are satisfied as you pare back features as user satisfaction ultimately determines the success of the project. Configure key display settings: Frame rate/Image Quality.  Set to the minimal detectible frame rate and image quality possible to avoid  delivering exceptional desktop image quality to users with minimal requirements. Min Bandwidth.  Ensures that each virtual desktop is allocated a baseline amount of bandwidth to ensure that, once logged in, performance doesn’t degrade. Max Bandwidth.  Prevents a single user from utilizing prohibitive  bandwidth and degrading performance or preventing login for others. Other potential desktop features to disable include: Games   Themes Media  (video, music, etc.)   Mouse Shadows Screen Savers  (or limit to blank screens) Themes Mouse Shadows Pare back un-needed functions and features to increase performance and minimize costs,  but stop short of limiting user experience and satisfaction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group
Survey Demographics Industry
Full-Time Employees
IT Employees
Revenue
Job Title
Country

More Related Content

Viewers also liked

BURGLAR ALARM BASICS and insurance
BURGLAR ALARM BASICS and insuranceBURGLAR ALARM BASICS and insurance
BURGLAR ALARM BASICS and insuranceDuncan Waugh
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionhearme limited company
 
Avaya Aura 6.x suite licensing
Avaya Aura 6.x suite licensingAvaya Aura 6.x suite licensing
Avaya Aura 6.x suite licensingMotty Ben Atia
 
Box Security Whitepaper
Box Security WhitepaperBox Security Whitepaper
Box Security WhitepaperBoxHQ
 
Capacity Planning with Free Tools
Capacity Planning with Free ToolsCapacity Planning with Free Tools
Capacity Planning with Free ToolsAdrian Cockcroft
 
Automated Visual Testing That Does Not Suck
Automated Visual Testing That Does Not SuckAutomated Visual Testing That Does Not Suck
Automated Visual Testing That Does Not Suckadamcarmi
 
10 Rules for Killer Business Cards 2010 Edition
10 Rules for Killer Business Cards 2010 Edition10 Rules for Killer Business Cards 2010 Edition
10 Rules for Killer Business Cards 2010 EditionSteven Fisher
 

Viewers also liked (8)

BURGLAR ALARM BASICS and insurance
BURGLAR ALARM BASICS and insuranceBURGLAR ALARM BASICS and insurance
BURGLAR ALARM BASICS and insurance
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solution
 
Avaya Aura 6.x suite licensing
Avaya Aura 6.x suite licensingAvaya Aura 6.x suite licensing
Avaya Aura 6.x suite licensing
 
Box Security Whitepaper
Box Security WhitepaperBox Security Whitepaper
Box Security Whitepaper
 
Capacity Planning with Free Tools
Capacity Planning with Free ToolsCapacity Planning with Free Tools
Capacity Planning with Free Tools
 
Automated Visual Testing That Does Not Suck
Automated Visual Testing That Does Not SuckAutomated Visual Testing That Does Not Suck
Automated Visual Testing That Does Not Suck
 
Intelligent sensor
Intelligent sensorIntelligent sensor
Intelligent sensor
 
10 Rules for Killer Business Cards 2010 Edition
10 Rules for Killer Business Cards 2010 Edition10 Rules for Killer Business Cards 2010 Edition
10 Rules for Killer Business Cards 2010 Edition
 

More from Info-Tech Research Group

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleInfo-Tech Research Group
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapInfo-Tech Research Group
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramInfo-Tech Research Group
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationInfo-Tech Research Group
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureInfo-Tech Research Group
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsInfo-Tech Research Group
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyInfo-Tech Research Group
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revisedInfo-Tech Research Group
 

More from Info-Tech Research Group (20)

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Create a Winning BPI Playbook
Create a Winning BPI PlaybookCreate a Winning BPI Playbook
Create a Winning BPI Playbook
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sample
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
Standardize the Service Desk
Standardize the Service DeskStandardize the Service Desk
Standardize the Service Desk
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and Prioritization
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration Infrastructure
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
Info-Tech Membership Overview
Info-Tech Membership OverviewInfo-Tech Membership Overview
Info-Tech Membership Overview
 
Define an EA Operating Model
Define an EA Operating ModelDefine an EA Operating Model
Define an EA Operating Model
 
Become a Transformational CIO
Become a Transformational CIOBecome a Transformational CIO
Become a Transformational CIO
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Build an Application Integration Strategy
Build an Application Integration StrategyBuild an Application Integration Strategy
Build an Application Integration Strategy
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management Strategy
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revised
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
 
Assess and Optimize EA Capability
Assess and Optimize EA CapabilityAssess and Optimize EA Capability
Assess and Optimize EA Capability
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Develop a desktop virtualization strategy

  • 1. Develop a Desktop Virtualization Strategy Transform IT from Asset Management to Service Management
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Desktop virtualization shifts desktop processing & storage off of the physical desktop For the end user, the experience should be the same as using a local PC. They may not even realize that apps are not executing natively on a local CPU and OS instance. Access Device Orchestration Software Info-Tech Research Group
  • 8. Consider every virtual desktop delivery method to provide appropriate functionality with minimal infrastructure upgrades Info-Tech Research Group Session Virtualization Virtual Desktop Infrastructure Application Virtualization
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Go go go! Pending PC refresh & centralized management Info-Tech Research Group Organization’s whose PCs are about 4, maybe 5 years old will inevitably need to be replaced as they begin to fall short in delivering applications whose memory and processing requirements increase over time. Pending PC Refresh For the 14% of organizations implementing to avoid a PC refresh, v irtualizing the desktop prolongs the life of existing desktop hardware. T his is a great way to offset some of the capital expenses that often prevent organizations from getting into desktop virtualization. Go Carefully consider the current state of your infrastructure. DV has significantly greater storage and bandwidth requirements than desktop PCs. The savings realized by extending the PC lifecycle can quickly be eaten up by required upgrades to the infrastructure. Caveats In recent years, many organizations have deployed PCs on an as-needed basis, resulting in a complex and distributed PC environment. This can be difficult to support given varied hardware and app configurations. Performance also tends to degrade, as junk is added to the system. Decentralized Desktop Mgmt Access device hardware configuration is moot with DV because the OS & apps run natively on the server. Implementing virtualized desktops on those devices allows for deployment and management of software on a central desktop image. In addition, DV provides a new desktop image on every startup. Go DV is an expensive solution to this problem, so consider deploying with end-of-life PCs or in concert with a major software upgrade to maximize ROI. Caveats
  • 14. Tread carefully: small deployments & mixed environments Info-Tech Research Group Given the cost savings and increasing accessibility of server virtualization, many SMBs and SMEs are looking to begin piloting desktop virtualization initiatives. Less than 1000 Seats Given the significant capital expenses for licensing increases and infrastructure upgrades associated with implementing DV, the benefits only really elicit practical and cost savings after about 1000 seats. Maybe Some organizations, however, may already have some pieces of the infrastructure in place as part of upgrades for other initiatives, making the TCO relative to a traditional PC environment more amenable to a small deployment. Caveats Organizations that are primarily composed of a single type of user, especially task/shift or knowledge workers, are an obvious fit for DV. However, for organizations that have a mix of different job types, the applicability of desktop virtualization may not be obvious. Many Different Job Types Given that the primary benefit of DV is improved app & OS management, implementing virtual desktops to a highly distributed environment may be counterproductive. Maybe DV saves time by enabling the simultaneous management of sets of desktops with the same app requirements. More desktops means more savings. While desktop virtualization can support multiple desktop templates for different sets of users, going too far can eliminate the savings. Caveats
  • 15. Go, no go: Compliance & cost savings Info-Tech Research Group Industries such as healthcare and education, where compliance is a considerable factor, often consider desktop virtualization as a potential way to limit loss of personal information through lost or stolen laptops or other endpoint devices. Stringent Compliance Requirements With Desktop Virtualization, all data is stored on databases of the host organization. Sensitive information is not maintained on the access device. Thus, in the event of lost or stolen hardware, there is no danger of the data falling into the wrong hands. Without access to the host servers, the access device becomes a dud. Go Virtualized desktops are just a tool, and will not fix every security hole. If users are copying all their work email over to, for example Gmail, then the virtual desktops aren’t solving any problems. This represents a bigger issue. Caveats Many organizations have realized significant cost savings and infrastructure consolidation through virtualization of servers. Given IT’s significant investment in training and management in this environment, desktop virtualization is perceived to be the next logical step. Building on Server Virtualization Investment in server virtualization is not sufficient to warrant a move to desktop virtualization, though 20% of organizations are implementing for this very reason. Desktop virtualization is much more complex and does not elicit the same significant cost savings. No Go All that said, the experience procured from a server virtualization initiative will be valuable to a desktop virtualization deployment. In addition, while virtualized servers are not necessary for DV, they are deployed in most DV scenarios. Caveats
  • 16.
  • 17. Carefully consider TCO & stakeholder communications, & assess user population fit as these factors have impeded others 3   Infrastructure will not support virtualized desktops 43% CAPEX does not fit current budget 43% Lack of in-house experience 48% Inappropriate User Population 65% Difficulty Communicating Benefits to Stakeholders 70% Unattractive TCO 86% Over 80% of organizations cited total costs as a major reason they decided NOT to deploy Source: Info-Tech; N = 23 I don't think the desktop virtualization market needs to change, just the way upper management thinks about it. -IT Manager, Manufacturing We need to see improvements in speed and reductions in the effort required to simulate the desktop environment to which users have become accustomed. -CEO, Management Consulting Services We need a more compelling financial case for adoption. -IT Manager, Government The huge number of remote users at our organization make desktop virtualization inappropriate. -IT Pro, Utility & Communications Organization The issue is the cost model, especially around BCP, storage costs and licensing compared to a traditional desktop deployment. Instead of desktop virtualization we will be looking at application virtualization. -IT Manager, Financial Services “ “ Why aren’t your peers deploying DV?
  • 18.
  • 19.
  • 20. Avoid overspending by leveraging a hybrid virtualization model mixing VDI & session virtualization to keep costs down Info-Tech Research Group Task/Shift Worker Knowledge Worker Mobile Worker VDI Session Virtualization It’s not all or nothing. Don’t deploy VDI to all your users just because some of them happen to be knowledge workers. The infrastructure requirements that go along with VDI can be prohibitive relative to session virtualization. Deploy to the ideal scenario, when possible. The question isn’t “Should I deploy these task workers on VDI too?”, it’s “Should I deploy them with Session Virtualization, or leave them on their desktop PCs?” Select a flexible vendor. The best desktop virtualization vendors out there can deploy both VDI and Session Virtualization in the same environment to maintain flexibility and minimize cost. Mixed Users = Mixed Solutions
  • 21.
  • 22. Understand requirements around storage input/output operation speed, the most significant performance bottleneck While capacity is front of mind for most IT pros when they think of storage, speed is of utmost importance to the success of the desktop virtualization project. Info-Tech Research Group
  • 23. Determine single-disk IOPS capabilities to establish maximum total IOPS for your storage arrays Info-Tech Research Group = 1 ( AVG Latency [seconds] + AVG Seek Time [seconds] ) = + ( IOPS/Disk * #ofDisks * %Write ) ( RAID Write Penalty ) ( IOPS/Disk * #ofDisks * %Read ) IOPS per Disk 1 2 RAID Level Write Penalty RAID 0 1 RAID 1/10 2 RAID 5 4 RAID 6 6
  • 24. Calculate input/output operation speed requirements to quantify your current situation & identify required upgrades Min Workload Boot up (~25-30 IOPS) Login (~14 IOPS) Heavy Work (~12-20 IOPS) Light Work (~4-8 IOPS) Normal Work (~8-12 IOPS) Work Mode Idle (~4 IOPS) Storage Requirements of a Single Desktop Max # of Supportable Desktops per Array IOPS per Array Max Avg Desktop Workload = Info-Tech Research Group
  • 25. Looks to solid state drives & boot storm mitigation strategies to overcome limited IOPS in your storage arrays Info-Tech Research Group
  • 26. Establish processing & memory requirements for hosting servers to ensure that users are happy but resources are not wasted Info-Tech Research Group
  • 27. Assess bandwidth needs for specific usage scenarios to determine network requirements & identify necessary upgrades Info-Tech Research Group Desktop Activity Bandwidth Requirement Web Browsing 80-100 kbps Office Applications (Outlook, Word, Excel, PowerPoint) 40-50 kbps Printing 500-600 kbps Video (NON HD; flash/WMV) 150-200 kbps/450-500 kbps Build in redundancy to keep desktops connected. The network is a single point of failure for virtual desktops. It’s absolutely critical to build in multiple routes – through switching and routing infrastructure – and utilize multiple ISPs, to maintain constant interactivity between servers and access devices. Calculate workload breakdowns to estimate bandwidth requirements. Calculate the percentage of a user’s typical workday that is composed of each activity above, to establish average bandwidth consumption per user. Because most tasks are performed randomly throughout the day (except, perhaps, video consumption at lunch hour), most organizations should not use requirements for video or printing as a benchmark. This would result in an exorbitant overspend on network resources. VDI Requires “Always On” Mentality Start with 200-250 kbps per average user for office workers without video requirements (1 mbps with 480p video requirements). Info-Tech recommends…
  • 28.
  • 29. Build success into the pilot by planning stakeholder support, training, third party help, ROI analysis and testing up front Info-Tech Research Group
  • 30. Provide remote users access to virtual desktops from their own access devices at home instead of deploying laptops. Laptops are often used to provide work-at-home users with access to a secure desktop providing a DR option. Implementers have saved by providing remote access to secured virtual desktops instead without sacrificing user experience. Secure Home Access Why it works… Focus the pilot on delivering quick wins & short-term savings; consider the following scenarios of “low-hanging fruit” Pilot with users ready for a new PC to secure participation and user buy-in. Users will be more willing participants given degraded performance on their old PC, and often see a performance boost on the virtual desktop. It may also be possible to provide them with a performance and software upgrade without upgrading their hardware. New PC Candidates Why it works… Create a test lab of server hosted virtual PCs to test a new application or OS upgrade. This will eliminate the need to build out separate hardware for a pilot group to try out a new OS and software (e.g. Windows 7) because they can access upgraded hosted VMs from current hardware. The virtual test lab is cheaper and less disruptive for testers. Virtual Test Lab Why it works… Info-Tech Research Group
  • 31.
  • 32. Desktop virtualization transitions from IT as asset management to IT as a service In traditional distributed processing, service is intimately connected to what IT can deploy & maintain on the desktop. With DV, service depends on what can be delivered to the end user from the data center, server room, or broom closet. This shift results in a variety of challenges that must be addressed. Info-Tech Research Group IT Focus Service End User Traditional Distributed Computing Virtualized Desktops The focus is on acquisition, configuration, and deployment of distributed hardware assets. Ongoing support involves configuration and deployment of applications, and OSs across distributed assets. Desktop PC is the focal point between user needs and IT’s ability to deliver service. PC support is critical to service levels. The focus is on delivery of a centrally hosted desktop computing experience to end users. Quality of service is dependent on hosting servers, network, connection brokering, and endpoint access devices. The desktop access device is no longer the focal point. Drive endpoint maintenance and support toward zero while maintaining or improving
  • 33. Understand end user expectations to manage & optimize the environment appropriately Success in desktop virtualization is determined by whether the user notices degradation in performance of the desktop relative to their old environment.
  • 34.
  • 35. With many chefs in the kitchen, make sure you only hand out one spoon; dedicated DV specialists yield greatest success 5 We convened a special task force to drive Desktop Virtualization. Our Windows Server Management, Network Engineering, Enterprise Storage, Asset Management, and Desktop Engineering teams all had representation. It was driven jointly by the server and desktop teams, as they had the greatest understanding of the technologies and also the vision to build a strong offering. I sponsored the project from a desktop perspective. We considered it an important step in controlling operating expenditures. - Technology Manager, Financial Services Info-Tech Research Group Specialized Team/Individual 17% Centralized App Mgmt Staff Desktop Support Staff 24% Server Admins 52% Centralized App Mgmt Staff Desktop Support Staff Server Administrators Specialized Team/Individual While most organizations hand decision rights to server administrators, organizations with the most success formulate a specialized team or appoint an individual Source: Info-Tech; N = 27 Source: Info-Tech; N = 30 “ “ Desktop Virtualization Project Success
  • 36. Don’t accept defaults; configure the desktop image for optimal performance Info-Tech Research Group Tailor settings to your infrastructure and user needs to get the most out of your investment.
  • 37.
  • 38.