SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
Cisco Desktop Virtualization
Solution

 Robert Feng
TSA
robfeng@cisco.com

  Sept, 2012


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
•Desktop Virtualization Market Trend and Business Driver
            •What is Desktop Virtualization?
                - Desktop Virtualization Models
                - Desktop Virtualization Users Classification
                - Desktop Virtualization Architecture – VMware View
            •Cisco VXI Vision
            •Desktop Virtualization Challenges
            •Cisco UCS Desktop Virtualization Advantage
            •Conclusion




© 2010 Cisco and/or its affiliates. All rights reserved.       Cisco Confidential   2
                                                                                    2
Data Security       Explosion of
                                              and Compliance       New Devices




                       Rising Desktop                                Users Want Access
                      Management Costs                               Anywhere, Anytime




           Success of Server                                                Windows 7, 8
             Virtualization                                                and PC Refresh




© 2010 Cisco and/or its affiliates. All rights reserved.       3                    Cisco Confidential   3
                                                                                                         3
Gartner HVD                                           Already                                       HVDs % of
             Forecast                                          deployed some                                    Enterprise
                                                                   HVDs                                         Desktops
50


40                                                           Deployed                     37%                  6%
                                                                                                         Current

30


                                                             Plan to Deploy                    45%                       16%
20
                                                                                                         In 12 Months

10

                                                             No Plan       18%                                                             30%
  0                                                                                                      In 24 Months
            2010 2011 2012 2013
Source: Gartner HVD Forecast 2010-                         Source: Morgan Stanley, ―Hard Data on Virtual Desktop ROI & Adoption, May 2011
2014, Dec. 2010

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                         Cisco Confidential   4
                                                                                                                                                      4
Broker
 Keyboard, Video, Mouse                                    Thin               • Large OS
                                                           Client             • Many local
                                                                                         Compute
                                                                                applications
                                                                                          Storage
                                                                              • Vulnerable
                                                                    Network   • Constant patching
                                                                              • Data backup
                                                                              • Complex management
                                                                              • Software distribution
                                                                                delivery challenges
                                                                              • Skilled local support
                                                                                staff required
    • Personal Computer is disaggregated

    • Keyboard, Video, and Mouse stay with user

    • Compute and storage move to the data center

    • Network availability is required for all application access

    • Network performance is critical to user experience
© 2010 Cisco and/or its affiliates. All rights reserved.                                 Cisco Confidential   5
                                                                                                              5
Remote Workers                         Professionals            Design
                      Call Centers                           Researchers              Professionals
                      Administrative &                                                Mobile Workers
                      Clerical
                      Schools


                               Task Worker                  Knowledge Worker             Power User
                    Office Applications                                              Custom Programs
                    “Administrator Intended Applications”                            Install Requirements

                      Candidates for Thin
                                                            Rich Clients Needed – Dynamic Virtual Clients
                      and Rich Clients




Devices End Users Need
 © 2010 Cisco and/or its affiliates. All rights reserved.                                                   Cisco Confidential   6
                                                                                                                                 6
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   7
                                                                                7
Virtualization-Aware              Virtualized
                       Virtualized Data Center                                           Borderless Network         Collaborative Workspace
                       Applications/Desktop OS                                                                           Cisco Virtualization
                                                                                             Cisco®                      Experience Clients
                                                                                             Identity
                                                                                                                                  AnyConnect
                                                                                             Services
                    Desktop Virtualization Software                                          Engine                          Cisco VXC 6215
                                                                                                                                Thin Client


                                         Hypervisor                                          CDN
                                                                                                                    Cisco VXC 4000 PC
                                                                                                                          Client

        WAAS                         Quad                      AnyConnect                                WAAS
                                                                                                                                  Cisco VXC
                                                            UCS                                                                  22xx & 21xx
                       Nexus                                         ASA
                                                                                                                                  Zero Client
                       1000v                                                                 PoE        Routing

          Virtual                    Unified                           ACE
         Security                                                                                                                    Cius
         Gateway                        CM
                                                                                                                                   Business
                                                           Compute                                                                  Tablet
                                                                                           Switching
                                           Storage



                                                                           End-to-End Management and Optimization




© 2010 Cisco and/or its affiliates. All rights reserved.                                                                              Cisco Confidential   8
                                                                                                                                                           8
Virtualization-Aware              Virtualized
                       Virtualized Data Center                                     Borderless Network         Collaborative Workspace
                       Applications/Desktop OS



                  Desktop Virtualization Software



                                         Hypervisor




                                                            UCS




                                                           Compute

                                           Storage



                                                                     End-to-End Management and Optimization




© 2010 Cisco and/or its affiliates. All rights reserved.                                                                    Cisco Confidential   9
                                                                                                                                                 9
• Desktop Virtualization Density and Scalability
     ROI calculation

• Simple and efficient Desktop Management
     Rapid provisioning of new virtual desktop infrastructure

• Desktop Virtualization Security
     User desktops now sit amidst other applications and assets in the Data Center

   Enterprise assets could present larger ―attack surface‖ for compromised user
desktops

• Delivery of various Virtual Desktop Pools needs to be
     prioritized
     Co-resident workloads can compete for resources, impacting user experience

• Virtual Desktop performance especially for application
     virtualization
     Need consistent and predictable performance as user population grows

 © 2010 Cisco and/or its affiliates. All rights reserved.                            Cisco Confidential    10
                                                                                                          10
• A single system that unifies
              –Compute: Industry standard x86
              –Network: Unified fabric/Wire once
              –Storage Access: Unified fabric/ Wire once
 • Embedded management
              –Increase scalability
              –Dynamic resource provisioning
              –Ability to integrate with broad partner
              ecosystem




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential    11
                                                                                11
Desktop Density and Scalability
                                             Great virtual desktop density with linear performance scalability


                                              Rapid Provisioning of Desktops
                                              Service profile templates for rapid provisioning of desktop pools


                                              Networking Visibility and Security to the Desktops
                                              Nexus 1000V with VSG providing VM level controls


                                              Prioritization of Desktop Pools / Workloads
                                              UCS QoS and bandwidth controls deliver prioritization to desktop pools


                                             Application Performance Optimizations
                                             VM-FEX delivering deterministic performance


                                             Desktop Virtualization Ecosystem Partners and Validated Design
                                               Desktop virtualization partners and validated performance optimizations



© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   12
Desktop Density and Scalability
                                             Great virtual desktop density with linear performance scalability


                                              Rapid Provisioning of Desktops
                                              Service profile templates for rapid provisioning of desktop pools


                                              Networking Visibility and Security to the Desktops
                                              Nexus 1000V with VSG providing VM level controls


                                              Prioritization of Desktop Pools / Workloads
                                              UCS QoS and bandwidth controls deliver prioritization to desktop pools


                                             Application Performance Optimizations
                                             VM-FEX delivering deterministic performance


                                             Desktop Virtualization Ecosystem Partners and Validated Design
                                               Desktop virtualization partners and validated performance optimizations



© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   13
• 175 Desktops on B230 M2
          Knowledge Worker Profile (no
          Flash)
          384 G memory, Dual E7-2870 /
          10 Core CPU
          EMC VNX 5500 Storage                            Industry-leading
                                                              Density on

   • 186 Desktops on B200 M3                               2-socket servers

          • Knowledge Worker Profile
          • 384 G memory, Dual E5-2690 / 8
            Core CPU
          • EMC VNX 5500 Storage

   Source: Principled Technologies White Paper


© 2010 Cisco and/or its affiliates. All rights reserved.                      Cisco Confidential   14
Cisco UCS
                                                                 •   Lower cost for compute + network
                                                                     infrastructure

                                                                 •   Greater virtual desktop density without
                                                                     performance impact
                           Memory




                                                                 •   Simple Operation—start in minutes, scale in
                                                                     seconds

                                                                 •   Massive Scalability—scales easily to 1000’s
                                                           CPU       of desktops per UCS system

                   Unified Fabric
                                                                 •   Extended memory and I/O to avoid desktop
                     (FCoE)                                          virtualization bottlenecks



© 2010 Cisco and/or its affiliates. All rights reserved.                                                 Cisco Confidential   15
Mgmt   LAN             SAN A
                                                                                        SAN B

                                                                    Infrastructure
                                                                    Management Domain
                                                                    (~20K desktops)




© 2010 Cisco and/or its affiliates. All rights reserved.                                    Cisco Confidential   16
Desktop Density and Scalability
                                             Great virtual desktop density with linear performance scalability


                                              Rapid Provisioning of Desktops
                                              Service profile templates for rapid provisioning of desktop pools


                                              Networking Visibility and Security to the Desktops
                                              Nexus 1000V with VSG providing VM level controls


                                              Prioritization of Desktop Pools / Workloads
                                              UCS QoS and bandwidth controls deliver prioritization to desktop pools


                                             Application Performance Optimizations
                                             VM-FEX delivering deterministic performance


                                             Desktop Virtualization Ecosystem Partners and Validated Design
                                               Desktop virtualization partners and validated performance optimizations



© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   17
Reduced Points of Management

                      Tightly Coupled
                  Partner Mgmt. Tools
                                                           •   Unified Management Domain
                                   XML API                      Automatic discovery
                                                                Dynamic Provisioning
                                                           •   Building Blocks of Resources for rapid
                                                               provisioning
                                                           •   Simplify infrastructure management for
                                                               datacenters


                                                               Service Profile: HR-App1
                                                               Network: HR-VLAN
                                                                                              Single-click
                                                               Network QoS: High              configuration of
                                                               MAC: 08:00:69:02:01:FC         LAN, SAN and
                                                               WWN: 20:65:32:25:B5:00:A4:28   firmware
                                                               BIOS: Version 1.03
                                                               Boot Order: SAN, LAN
                                                                                              parameters

© 2010 Cisco and/or its affiliates. All rights reserved.                                               Cisco Confidential   18
Desktop Density and Scalability
                                             Great virtual desktop density with linear performance scalability


                                              Rapid Provisioning of Desktops
                                              Service profile templates for rapid provisioning of desktop pools


                                              Networking Visibility and Security to the Desktops
                                              Nexus 1000V with VSG providing VM level controls


                                              Prioritization of Desktop Pools / Workloads
                                              UCS QoS and bandwidth controls deliver prioritization to desktop pools


                                             Application Performance Optimizations
                                             VM-FEX delivering deterministic performance


                                             Desktop Virtualization Ecosystem Partners and Validated Design
                                               Desktop virtualization partners and validated performance optimizations



© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   19
•   Client LAN Features
       Port Security prevents CAM attacks, DHCP
      Starvation attacks
       DHCP Snooping prevents Rogue DHCP Server
      attacks
       Dynamic ARP Inspection prevents current ARP
      attacks
       IP Source Guard prevents IP/MAC Spoofing and a
      wide variety of TCP/UDP splicing and DoS attacks
•   Virtual Ethernet Module (VEM)
          Networking capabilities at the hypervisor level
          L2 switching, CDP, Netflow, ACLs, QoS, SNMP, SPAN, etc
          Local Switching
          Port Profile to simplify Network Policy

•   Virtual Supervisor Module (VSM)
          Mgmt, monitoring and config of VEM instances
          Sees each VEM as a virtual chassis module
          Configuration done through port-profiles
          Tight integration with Virtual Center
          Runs on dedicated appliance or virtual machine

•   Virtual Chassis Concept
          Redundant Supervisors (VSMs)
          Currently up to 128 VEM instances (128 ESX hosts)
          Presents a network view of the virtual access layer

    © 2010 Cisco and/or its affiliates. All rights reserved.       Cisco Confidential   20
Desktop Density and Scalability
                                             Great virtual desktop density with linear performance scalability


                                              Rapid Provisioning of Desktops
                                              Service profile templates for rapid provisioning of desktop pools


                                              Networking Visibility and Security to the Desktops
                                              Nexus 1000V with VSG and VM-FEX providing VM level controls


                                              Prioritization of Desktop Pools / Workloads
                                              UCS QoS and bandwidth controls deliver prioritization to desktop pools


                                             Application Performance Optimizations
                                             VM-FEX delivering deterministic performance


                                             Desktop Virtualization Ecosystem Partners and Validated Design
                                               Desktop virtualization partners and validated performance optimizations



© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   21
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   22
Desktop Density and Scalability
                                             Great virtual desktop density with linear performance scalability


                                              Rapid Provisioning of Desktops
                                              Service profile templates for rapid provisioning of desktop pools


                                              Networking Visibility and Security to the Desktops
                                              Nexus 1000V with VSG and VM-FEX providing VM level controls


                                              Prioritization of Desktop Pools / Workloads
                                              UCS QoS and bandwidth controls deliver prioritization to desktop pools


                                             Application Performance Optimizations
                                             VM-FEX delivering deterministic performance


                                             Desktop Virtualization Ecosystem Partners and Validated Design
                                               Desktop virtualization partners and validated performance optimizations



© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   23
• Options:
            Application Virtualization - Citrix XenApp, VMware ThinApp, Microsoft App-V
            Hosted Shared Desktops – Citrix XenApp, Microsoft Remote Desktop Services

• UCS Application Virtualization Optimizations with VM-FEX
            Deterministic latency behavior for applications
            Reduction in latency
            Improved performance (reduction in hypervisor code path)

• Application Traffic Monitoring and Diagnostic capability
            App level networking visibility
            Statistics, events and faults on per app basis to fine tune performance
            VLAN based SPAN on application basis to diagnose advanced issues




© 2010 Cisco and/or its affiliates. All rights reserved.                              Cisco Confidential   24
VNIC                            VM        VM      VM    VM        VM      VM       VM   VM


                          VETH
                                                                      Hypervisor                      Hypervisor

VM-FEX Basics

                                                           UCS VIC




                                                                                           UCS VIC
      Fabric Extender for VMs
     Hypervisor vSwitch removed
     Each VM assigned a PCIe
      device
     Each VM gets a virtual port on                                 UCS Server                      UCS Server
      physical switch
VM-FEX: One Network
     Collapses virtual and physical switching layers
     Dramatically reduces network management points
      by eliminating per host vSwitch
     Virtual and Physical traffic treated the same
Host CPU Cycles Relief                                                                  UCS 6100
     Host CPU cycles relieved from VM switching
     I/O Throughput improvements

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                Cisco Confidential   25
Performance                          Low Latency           Deterministic Delivery


                                                                                    Near linear deterministic
         Up to 50% increase in                             Up to 67% reduction in
                                                                                    Application delivery with
        Application performance                             Application latency
                                                                                              scale




© 2010 Cisco and/or its affiliates. All rights reserved.                                            Cisco Confidential   26
Desktop Density and Scalability
                                             Great virtual desktop density with linear performance scalability


                                              Rapid Provisioning of Desktops
                                              Service profile templates for rapid provisioning of desktop pools


                                              Networking Visibility and Security to the Desktops
                                              Nexus 1000V with VSG providing VM level controls


                                              Prioritization of Desktop Pools / Workloads
                                              UCS QoS and bandwidth controls deliver prioritization to desktop pools


                                             Application Performance Optimizations
                                             VM-FEX delivering deterministic performance


                                             Desktop Virtualization Ecosystem Partners and Validated Design
                                               Desktop virtualization partners and validated performance optimizations



© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   27
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   28
Integrated                 Roadmap /
                                 Support                   Solutions




                            Performance                     Time to
                                / SLA                       Market




© 2011 Cisco and/or its affiliates. All rights reserved.               Cisco Confidential    29
                                                                                            29
• Storage - one of the most critical aspect of implementing VDI
• Capacity
          Linked vs Full Clones vs Provisioned
          Personalized desktops
          User capacity

• IOPS
          Boot storms, login storms, AV updates/scans
          IntelliCache, VMware’s CBRC, Write Cache

• Protocol/Connectivity
          NFS/block (for XS, ESX), CIFS/block (for Hyper-V)

• Storage/DC Services
          DR/HA, Application Mobility, backup
© 2010 Cisco and/or its affiliates. All rights reserved.      Cisco Confidential   30
Validated
Designs




            www.cisco.com/go/vdi
            www.cisco.com/go/designzone

                       VBLOCK             FLEXPOD     Standard
                                                    Configurations
Infrastructure
• CVDs
            Citrix XenDesktop 5.6 on FlexPod based on Microsoft Private Cloud
                  B230 M2 blades, UCS 2.0 software, FC SAN connectivity
                  Citrix Provisioning Services 6.1
                  Microsoft Hyper-V 2008 R2 SP1
            http://www.cisco.com/en/US/docs/unified_computing/ucs/UCS_CVDs/ucs_xd56_fle
            xpod.html

            Citrix XenDesktop 5.6 with EMC VNX 5500 on vSphere 5 (2000-seat)
                            Initial launch with EMC VSPEX program
                            (Other reference architectures for 500-seat, 1000-seat VDI environments)

• Whitepapers
            NexentaStor on Cisco UCS C-Series Rack Mount Servers: Storage Platform for
            Desktop Virtualization
            PT: Cisco UCS B230 Blade Server: Uncompromised virtual desktop performance
            PT: Virtual desktop management with Cisco UCS and VMware vSphere


© 2010 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   32
Data Center Content:
• SAVTG VDI Solutions Page (link)

• VXI Data Center IWE (link)

• www.cisco.com/go/vdi

• www.cisco.com/go/vdidesigns

• ResComp Sizing Tool

• Principled Technologies Reports
            VMware Performance (link)
            Citrix Scale/Perf. (link)
            Citrix TCO (link)
            HP Competitive (link)
            VMware B200 M3
            VMware Manageability/QoS
            Citrix B200 M3




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   33
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   34
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   35
• Cisco understands Desktop Virtualization and its challenges

          • Cisco UCS is the ideal platform for Desktop Virtualization (key
                 strengths/advantage described earlier)
          • Cisco has a complete end-to-end vision on Desktop
                 Virtualization
          • Cisco, together with strong ecosystem partners, can
                 successfully deliver optimized desktop virtualization
                 solutions
          • Cisco’s validated virtual desktop design collaterals are
                 available




© 2010 Cisco and/or its affiliates. All rights reserved.                 Cisco Confidential   36
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   37
Start                        Connect
                   1 Connect to
                     Connection
                                                           2 Query for 3 Identify      4   target    5
                                                                                                          Return
                                                                                                                    6
                                                                                                                                         Successful
                                                                                                                                   7 connection
                                                              user         target VM                      VM to          VM to
                          Broker                              policy                       VM            endpoint       endpoint




        Thin Client
                                                                                           Active Directory




     Smartphone/iPad                                           Connection Broker



                                                                                                                          Virtual Infrastructure
                                                                                                Virtual
                                                                                            Infrastructure
                                                               Authentication                Management
                      Thick Client
                                                               Display Protocol

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                            Cisco Confidential    38
                                                                                                                                                         38
Stream to Physical Desktop                                                Hosted Virtual Desktop
                                                                                          Apps
O/S Desktop




                                                                     Synchronized       Apps      Apps     Apps      Apps
                                  App              Guest App                          Apps OS
                                                                       Desktop
                                                                                     AppsOS        OS       OS       OS
                                  App              Guest OS                            OS
                                                                                      OS                Hypervisor
                                           Main OS
                                                                                                                            Display Data

                                                                                    Server




                                   Application Streaming                                            Shared Hosted Desktops
                                           App
Application




                                                                                OS
                                                                                                     App App
                                                                                                         OS                      Display Data
                                                                                OS


                                    Server
                                                                                OS
                                                                                                 Terminal Server
                     Client Hosted Computing                                                      Server Hosted Computing
          © 2010 Cisco and/or its affiliates. All rights reserved.                                                                         Cisco Confidential    39
                                                                                                                                                                39
• Non-Persistent or Pooled
       Generic virtual desktop assigned to users on a per session first come first server
       basis and then returned to the pool (possibly with profile removed) or destroyed
    • Personalized
       Thin Provisioned Desktops with Persistence/Personalization
    • Persistent or Assigned
       Permanently assigned to a user statically or by first to connect

  Users and                                                                  Desktops                Pool of Virtual
  Groups                                                    Entitle Group               Assign       Machines
                                                            to Desktop                  Pool



                                                                 Personalized
                                                                 Pooled
                                                                 Desktop


                                                           Entitle User to
                                                           Desktop
                                                                                        Assign
© 2010 Cisco and/or its affiliates. All rights reserved.
                                                                                        Individual                     Cisco Confidential   40
• One bad application can kill Virtual Desktop deployment

• Anti-Virus Storms can seriously impact performance

• Anti-Virus Offloading

• McAfee MOVE (Management Optimized for Virtualized
       Environment)
• TrendMicro Deep Security Agentless Anti-Virus




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   41
• MOVE-AV (McAfee Management for Optimized Virtual
      Environments) is validated
• MOVE-AV on a UCS B250 M2 with XenDesktop 5 and ESXi
      4.1 with Windows 7/32 bit desktops and NetApp for storage
      are provided below.




• The impact of adding MOVE-AV with a default scan policy
      to a Knowledge Worker workload running on a UCS B250
      M2 is a ~10-15% impact to VM density.
         Source:
         http://www.2mul.com/en/US/docs/solutions/Enterprise/Data_Center/VXI/CVD/VXI_C
         VD_Citrix.pdf
© 2010 Cisco and/or its affiliates. All rights reserved.                          Cisco Confidential   42

Contenu connexe

Tendances

Five Pillars of SharePoint Governance Supportability
Five Pillars of SharePoint Governance SupportabilityFive Pillars of SharePoint Governance Supportability
Five Pillars of SharePoint Governance SupportabilitySentri
 
September 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetSeptember 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetTom_Webb
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Anna Stirling
 
System Center webinar
System Center webinarSystem Center webinar
System Center webinarSentri
 
Discovering Computers: Chapter 15
Discovering Computers: Chapter 15Discovering Computers: Chapter 15
Discovering Computers: Chapter 15Anna Stirling
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Khazret Sapenov
 
3 12-2013 performance-testing_service_virtualization
3 12-2013 performance-testing_service_virtualization3 12-2013 performance-testing_service_virtualization
3 12-2013 performance-testing_service_virtualizationsilviasiqueirahp
 
Novell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell
 
Webinar: Understanding the System Center suite & Windows Server 2012
Webinar: Understanding the System Center suite & Windows Server 2012 Webinar: Understanding the System Center suite & Windows Server 2012
Webinar: Understanding the System Center suite & Windows Server 2012 Sentri
 
Novell ZENworks Application Virtualization Advanced Administration
Novell ZENworks Application Virtualization Advanced AdministrationNovell ZENworks Application Virtualization Advanced Administration
Novell ZENworks Application Virtualization Advanced AdministrationNovell
 
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...EclipseDayParis
 
Essential Arb 2
Essential Arb 2Essential Arb 2
Essential Arb 2hinser14
 
Flexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanFlexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanMicrosoft Singapore
 
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...eG Innovations
 
OptiFiber Pro OTDR
OptiFiber Pro OTDROptiFiber Pro OTDR
OptiFiber Pro OTDRlenlax
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
 
1st day 3 - agility vs risk
1st day   3 - agility vs risk1st day   3 - agility vs risk
1st day 3 - agility vs riskLilian Schaffer
 
Cellution presentation july 2012
Cellution presentation july 2012Cellution presentation july 2012
Cellution presentation july 2012chuckserapilio
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011chaucheckpoint
 

Tendances (19)

Five Pillars of SharePoint Governance Supportability
Five Pillars of SharePoint Governance SupportabilityFive Pillars of SharePoint Governance Supportability
Five Pillars of SharePoint Governance Supportability
 
September 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetSeptember 2 Technology Trends Rpaquet
September 2 Technology Trends Rpaquet
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12
 
System Center webinar
System Center webinarSystem Center webinar
System Center webinar
 
Discovering Computers: Chapter 15
Discovering Computers: Chapter 15Discovering Computers: Chapter 15
Discovering Computers: Chapter 15
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...
 
3 12-2013 performance-testing_service_virtualization
3 12-2013 performance-testing_service_virtualization3 12-2013 performance-testing_service_virtualization
3 12-2013 performance-testing_service_virtualization
 
Novell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in Education
 
Webinar: Understanding the System Center suite & Windows Server 2012
Webinar: Understanding the System Center suite & Windows Server 2012 Webinar: Understanding the System Center suite & Windows Server 2012
Webinar: Understanding the System Center suite & Windows Server 2012
 
Novell ZENworks Application Virtualization Advanced Administration
Novell ZENworks Application Virtualization Advanced AdministrationNovell ZENworks Application Virtualization Advanced Administration
Novell ZENworks Application Virtualization Advanced Administration
 
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
 
Essential Arb 2
Essential Arb 2Essential Arb 2
Essential Arb 2
 
Flexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanFlexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardman
 
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...
 
OptiFiber Pro OTDR
OptiFiber Pro OTDROptiFiber Pro OTDR
OptiFiber Pro OTDR
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
 
1st day 3 - agility vs risk
1st day   3 - agility vs risk1st day   3 - agility vs risk
1st day 3 - agility vs risk
 
Cellution presentation july 2012
Cellution presentation july 2012Cellution presentation july 2012
Cellution presentation july 2012
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
 

En vedette (7)

101 cd 1345-1415
101 cd 1345-1415101 cd 1345-1415
101 cd 1345-1415
 
102 1630 1700
102 1630 1700102 1630 1700
102 1630 1700
 
101 ab 1600-1630
101 ab 1600-1630101 ab 1600-1630
101 ab 1600-1630
 
101 cd 1315-1345
101 cd 1315-1345101 cd 1315-1345
101 cd 1315-1345
 
102 1430-1445
102 1430-1445102 1430-1445
102 1430-1445
 
101 ab 1530-1600
101 ab 1530-1600101 ab 1530-1600
101 ab 1530-1600
 
101 cd 1415-1445
101 cd 1415-1445101 cd 1415-1445
101 cd 1415-1445
 

Similaire à 101 cd 1445-1515

Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Omega Peripherals
 
September 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetSeptember 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetTom_Webb
 
The DevOps PaaS Infusion - May meetup
The DevOps PaaS Infusion - May meetupThe DevOps PaaS Infusion - May meetup
The DevOps PaaS Infusion - May meetupNorm Leitman
 
Cloudify summit2012 pub
Cloudify summit2012 pubCloudify summit2012 pub
Cloudify summit2012 pubGary Berger
 
Top 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITTop 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITValencell, Inc.
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 PredictionsFlexera
 
Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Francis D'Silva
 
VMware - Snapshot sessions - Deploy and manage tomorrow's applications today
VMware - Snapshot sessions  - Deploy and manage tomorrow's applications todayVMware - Snapshot sessions  - Deploy and manage tomorrow's applications today
VMware - Snapshot sessions - Deploy and manage tomorrow's applications todayAnnSteyaert_vmware
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012Cisco Public Relations
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdeliveryKelly Emo
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMicrosoft Windows Embedded
 
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...IBM Danmark
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...ASBIS SK
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise MobilityCompTIA
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609patriciafriar
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012nerb13
 
SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12Sentri
 
Enterprise IPv6 Deployment
Enterprise IPv6 Deployment Enterprise IPv6 Deployment
Enterprise IPv6 Deployment Cisco Canada
 
Dell Management And Automation Solutions For IT Infrastructures
Dell Management And Automation Solutions For IT InfrastructuresDell Management And Automation Solutions For IT Infrastructures
Dell Management And Automation Solutions For IT InfrastructuresAgora Group
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudnooralmousa
 

Similaire à 101 cd 1445-1515 (20)

Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
September 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetSeptember 2 Technology Trends Rpaquet
September 2 Technology Trends Rpaquet
 
The DevOps PaaS Infusion - May meetup
The DevOps PaaS Infusion - May meetupThe DevOps PaaS Infusion - May meetup
The DevOps PaaS Infusion - May meetup
 
Cloudify summit2012 pub
Cloudify summit2012 pubCloudify summit2012 pub
Cloudify summit2012 pub
 
Top 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITTop 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your IT
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
 
Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009
 
VMware - Snapshot sessions - Deploy and manage tomorrow's applications today
VMware - Snapshot sessions  - Deploy and manage tomorrow's applications todayVMware - Snapshot sessions  - Deploy and manage tomorrow's applications today
VMware - Snapshot sessions - Deploy and manage tomorrow's applications today
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdelivery
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivity
 
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
 
SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12
 
Enterprise IPv6 Deployment
Enterprise IPv6 Deployment Enterprise IPv6 Deployment
Enterprise IPv6 Deployment
 
Dell Management And Automation Solutions For IT Infrastructures
Dell Management And Automation Solutions For IT InfrastructuresDell Management And Automation Solutions For IT Infrastructures
Dell Management And Automation Solutions For IT Infrastructures
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
 

Plus de Chiou-Nan Chen

Plus de Chiou-Nan Chen (20)

Moving NEON to 64 bits
Moving NEON to 64 bitsMoving NEON to 64 bits
Moving NEON to 64 bits
 
64-bit Android
64-bit Android64-bit Android
64-bit Android
 
Intelligent Power Allocation
Intelligent Power AllocationIntelligent Power Allocation
Intelligent Power Allocation
 
3. v sphere big data extensions
3. v sphere big data extensions3. v sphere big data extensions
3. v sphere big data extensions
 
4. v sphere big data extensions hadoop
4. v sphere big data extensions   hadoop4. v sphere big data extensions   hadoop
4. v sphere big data extensions hadoop
 
2. hadoop
2. hadoop2. hadoop
2. hadoop
 
1. beyond mission critical virtualizing big data and hadoop
1. beyond mission critical   virtualizing big data and hadoop1. beyond mission critical   virtualizing big data and hadoop
1. beyond mission critical virtualizing big data and hadoop
 
5. pivotal hd 2013
5. pivotal hd 20135. pivotal hd 2013
5. pivotal hd 2013
 
Emc keynote 1130 1200
Emc keynote 1130 1200Emc keynote 1130 1200
Emc keynote 1130 1200
 
Emc keynote 1030 1130
Emc keynote 1030 1130Emc keynote 1030 1130
Emc keynote 1030 1130
 
Emc keynote 0945 1030
Emc keynote 0945 1030Emc keynote 0945 1030
Emc keynote 0945 1030
 
Emc keynote 0930 0945
Emc keynote 0930 0945Emc keynote 0930 0945
Emc keynote 0930 0945
 
102 1600-1630
102 1600-1630102 1600-1630
102 1600-1630
 
102 1530-1600
102 1530-1600102 1530-1600
102 1530-1600
 
102 1315-1345
102 1315-1345102 1315-1345
102 1315-1345
 
102 1445 1515
102 1445 1515102 1445 1515
102 1445 1515
 
101 cd 1630-1700
101 cd 1630-1700101 cd 1630-1700
101 cd 1630-1700
 
101 cd 1600-1630
101 cd 1600-1630101 cd 1600-1630
101 cd 1600-1630
 
101 ab 1630-1700
101 ab 1630-1700101 ab 1630-1700
101 ab 1630-1700
 
101 ab 1600-1630
101 ab 1600-1630101 ab 1600-1630
101 ab 1600-1630
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

101 cd 1445-1515

  • 1. Cisco Desktop Virtualization Solution Robert Feng TSA robfeng@cisco.com Sept, 2012 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. •Desktop Virtualization Market Trend and Business Driver •What is Desktop Virtualization? - Desktop Virtualization Models - Desktop Virtualization Users Classification - Desktop Virtualization Architecture – VMware View •Cisco VXI Vision •Desktop Virtualization Challenges •Cisco UCS Desktop Virtualization Advantage •Conclusion © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 2
  • 3. Data Security Explosion of and Compliance New Devices Rising Desktop Users Want Access Management Costs Anywhere, Anytime Success of Server Windows 7, 8 Virtualization and PC Refresh © 2010 Cisco and/or its affiliates. All rights reserved. 3 Cisco Confidential 3 3
  • 4. Gartner HVD Already HVDs % of Forecast deployed some Enterprise HVDs Desktops 50 40 Deployed 37% 6% Current 30 Plan to Deploy 45% 16% 20 In 12 Months 10 No Plan 18% 30% 0 In 24 Months 2010 2011 2012 2013 Source: Gartner HVD Forecast 2010- Source: Morgan Stanley, ―Hard Data on Virtual Desktop ROI & Adoption, May 2011 2014, Dec. 2010 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 4
  • 5. Broker Keyboard, Video, Mouse Thin • Large OS Client • Many local Compute applications Storage • Vulnerable Network • Constant patching • Data backup • Complex management • Software distribution delivery challenges • Skilled local support staff required • Personal Computer is disaggregated • Keyboard, Video, and Mouse stay with user • Compute and storage move to the data center • Network availability is required for all application access • Network performance is critical to user experience © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 5
  • 6. Remote Workers Professionals Design Call Centers Researchers Professionals Administrative & Mobile Workers Clerical Schools Task Worker Knowledge Worker Power User Office Applications Custom Programs “Administrator Intended Applications” Install Requirements Candidates for Thin Rich Clients Needed – Dynamic Virtual Clients and Rich Clients Devices End Users Need © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 6
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 7
  • 8. Virtualization-Aware Virtualized Virtualized Data Center Borderless Network Collaborative Workspace Applications/Desktop OS Cisco Virtualization Cisco® Experience Clients Identity AnyConnect Services Desktop Virtualization Software Engine Cisco VXC 6215 Thin Client Hypervisor CDN Cisco VXC 4000 PC Client WAAS Quad AnyConnect WAAS Cisco VXC UCS 22xx & 21xx Nexus ASA Zero Client 1000v PoE Routing Virtual Unified ACE Security Cius Gateway CM Business Compute Tablet Switching Storage End-to-End Management and Optimization © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 8
  • 9. Virtualization-Aware Virtualized Virtualized Data Center Borderless Network Collaborative Workspace Applications/Desktop OS Desktop Virtualization Software Hypervisor UCS Compute Storage End-to-End Management and Optimization © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 9
  • 10. • Desktop Virtualization Density and Scalability ROI calculation • Simple and efficient Desktop Management Rapid provisioning of new virtual desktop infrastructure • Desktop Virtualization Security User desktops now sit amidst other applications and assets in the Data Center Enterprise assets could present larger ―attack surface‖ for compromised user desktops • Delivery of various Virtual Desktop Pools needs to be prioritized Co-resident workloads can compete for resources, impacting user experience • Virtual Desktop performance especially for application virtualization Need consistent and predictable performance as user population grows © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 10
  • 11. • A single system that unifies –Compute: Industry standard x86 –Network: Unified fabric/Wire once –Storage Access: Unified fabric/ Wire once • Embedded management –Increase scalability –Dynamic resource provisioning –Ability to integrate with broad partner ecosystem © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 11
  • 12. Desktop Density and Scalability Great virtual desktop density with linear performance scalability Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools Application Performance Optimizations VM-FEX delivering deterministic performance Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Desktop Density and Scalability Great virtual desktop density with linear performance scalability Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools Application Performance Optimizations VM-FEX delivering deterministic performance Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. • 175 Desktops on B230 M2 Knowledge Worker Profile (no Flash) 384 G memory, Dual E7-2870 / 10 Core CPU EMC VNX 5500 Storage Industry-leading Density on • 186 Desktops on B200 M3 2-socket servers • Knowledge Worker Profile • 384 G memory, Dual E5-2690 / 8 Core CPU • EMC VNX 5500 Storage Source: Principled Technologies White Paper © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Cisco UCS • Lower cost for compute + network infrastructure • Greater virtual desktop density without performance impact Memory • Simple Operation—start in minutes, scale in seconds • Massive Scalability—scales easily to 1000’s CPU of desktops per UCS system Unified Fabric • Extended memory and I/O to avoid desktop (FCoE) virtualization bottlenecks © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Mgmt LAN SAN A SAN B Infrastructure Management Domain (~20K desktops) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Desktop Density and Scalability Great virtual desktop density with linear performance scalability Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools Application Performance Optimizations VM-FEX delivering deterministic performance Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. Reduced Points of Management Tightly Coupled Partner Mgmt. Tools • Unified Management Domain XML API Automatic discovery Dynamic Provisioning • Building Blocks of Resources for rapid provisioning • Simplify infrastructure management for datacenters Service Profile: HR-App1 Network: HR-VLAN Single-click Network QoS: High configuration of MAC: 08:00:69:02:01:FC LAN, SAN and WWN: 20:65:32:25:B5:00:A4:28 firmware BIOS: Version 1.03 Boot Order: SAN, LAN parameters © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. Desktop Density and Scalability Great virtual desktop density with linear performance scalability Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools Application Performance Optimizations VM-FEX delivering deterministic performance Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. Client LAN Features Port Security prevents CAM attacks, DHCP Starvation attacks DHCP Snooping prevents Rogue DHCP Server attacks Dynamic ARP Inspection prevents current ARP attacks IP Source Guard prevents IP/MAC Spoofing and a wide variety of TCP/UDP splicing and DoS attacks • Virtual Ethernet Module (VEM) Networking capabilities at the hypervisor level L2 switching, CDP, Netflow, ACLs, QoS, SNMP, SPAN, etc Local Switching Port Profile to simplify Network Policy • Virtual Supervisor Module (VSM) Mgmt, monitoring and config of VEM instances Sees each VEM as a virtual chassis module Configuration done through port-profiles Tight integration with Virtual Center Runs on dedicated appliance or virtual machine • Virtual Chassis Concept Redundant Supervisors (VSMs) Currently up to 128 VEM instances (128 ESX hosts) Presents a network view of the virtual access layer © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. Desktop Density and Scalability Great virtual desktop density with linear performance scalability Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools Networking Visibility and Security to the Desktops Nexus 1000V with VSG and VM-FEX providing VM level controls Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools Application Performance Optimizations VM-FEX delivering deterministic performance Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Desktop Density and Scalability Great virtual desktop density with linear performance scalability Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools Networking Visibility and Security to the Desktops Nexus 1000V with VSG and VM-FEX providing VM level controls Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools Application Performance Optimizations VM-FEX delivering deterministic performance Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. • Options: Application Virtualization - Citrix XenApp, VMware ThinApp, Microsoft App-V Hosted Shared Desktops – Citrix XenApp, Microsoft Remote Desktop Services • UCS Application Virtualization Optimizations with VM-FEX Deterministic latency behavior for applications Reduction in latency Improved performance (reduction in hypervisor code path) • Application Traffic Monitoring and Diagnostic capability App level networking visibility Statistics, events and faults on per app basis to fine tune performance VLAN based SPAN on application basis to diagnose advanced issues © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. VNIC VM VM VM VM VM VM VM VM VETH Hypervisor Hypervisor VM-FEX Basics  UCS VIC UCS VIC Fabric Extender for VMs  Hypervisor vSwitch removed  Each VM assigned a PCIe device  Each VM gets a virtual port on UCS Server UCS Server physical switch VM-FEX: One Network  Collapses virtual and physical switching layers  Dramatically reduces network management points by eliminating per host vSwitch  Virtual and Physical traffic treated the same Host CPU Cycles Relief UCS 6100  Host CPU cycles relieved from VM switching  I/O Throughput improvements © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. Performance Low Latency Deterministic Delivery Near linear deterministic Up to 50% increase in Up to 67% reduction in Application delivery with Application performance Application latency scale © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. Desktop Density and Scalability Great virtual desktop density with linear performance scalability Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools Application Performance Optimizations VM-FEX delivering deterministic performance Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. Integrated Roadmap / Support Solutions Performance Time to / SLA Market © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 29
  • 30. • Storage - one of the most critical aspect of implementing VDI • Capacity Linked vs Full Clones vs Provisioned Personalized desktops User capacity • IOPS Boot storms, login storms, AV updates/scans IntelliCache, VMware’s CBRC, Write Cache • Protocol/Connectivity NFS/block (for XS, ESX), CIFS/block (for Hyper-V) • Storage/DC Services DR/HA, Application Mobility, backup © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. Validated Designs www.cisco.com/go/vdi www.cisco.com/go/designzone VBLOCK FLEXPOD Standard Configurations Infrastructure
  • 32. • CVDs Citrix XenDesktop 5.6 on FlexPod based on Microsoft Private Cloud B230 M2 blades, UCS 2.0 software, FC SAN connectivity Citrix Provisioning Services 6.1 Microsoft Hyper-V 2008 R2 SP1 http://www.cisco.com/en/US/docs/unified_computing/ucs/UCS_CVDs/ucs_xd56_fle xpod.html Citrix XenDesktop 5.6 with EMC VNX 5500 on vSphere 5 (2000-seat) Initial launch with EMC VSPEX program (Other reference architectures for 500-seat, 1000-seat VDI environments) • Whitepapers NexentaStor on Cisco UCS C-Series Rack Mount Servers: Storage Platform for Desktop Virtualization PT: Cisco UCS B230 Blade Server: Uncompromised virtual desktop performance PT: Virtual desktop management with Cisco UCS and VMware vSphere © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
  • 33. Data Center Content: • SAVTG VDI Solutions Page (link) • VXI Data Center IWE (link) • www.cisco.com/go/vdi • www.cisco.com/go/vdidesigns • ResComp Sizing Tool • Principled Technologies Reports VMware Performance (link) Citrix Scale/Perf. (link) Citrix TCO (link) HP Competitive (link) VMware B200 M3 VMware Manageability/QoS Citrix B200 M3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
  • 35. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
  • 36. • Cisco understands Desktop Virtualization and its challenges • Cisco UCS is the ideal platform for Desktop Virtualization (key strengths/advantage described earlier) • Cisco has a complete end-to-end vision on Desktop Virtualization • Cisco, together with strong ecosystem partners, can successfully deliver optimized desktop virtualization solutions • Cisco’s validated virtual desktop design collaterals are available © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  • 37. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  • 38. Start Connect 1 Connect to Connection 2 Query for 3 Identify 4 target 5 Return 6 Successful 7 connection user target VM VM to VM to Broker policy VM endpoint endpoint Thin Client Active Directory Smartphone/iPad Connection Broker Virtual Infrastructure Virtual Infrastructure Authentication Management Thick Client Display Protocol © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 38
  • 39. Stream to Physical Desktop Hosted Virtual Desktop Apps O/S Desktop Synchronized Apps Apps Apps Apps App Guest App Apps OS Desktop AppsOS OS OS OS App Guest OS OS OS Hypervisor Main OS Display Data Server Application Streaming Shared Hosted Desktops App Application OS App App OS Display Data OS Server OS Terminal Server Client Hosted Computing Server Hosted Computing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 39
  • 40. • Non-Persistent or Pooled Generic virtual desktop assigned to users on a per session first come first server basis and then returned to the pool (possibly with profile removed) or destroyed • Personalized Thin Provisioned Desktops with Persistence/Personalization • Persistent or Assigned Permanently assigned to a user statically or by first to connect Users and Desktops Pool of Virtual Groups Entitle Group Assign Machines to Desktop Pool Personalized Pooled Desktop Entitle User to Desktop Assign © 2010 Cisco and/or its affiliates. All rights reserved. Individual Cisco Confidential 40
  • 41. • One bad application can kill Virtual Desktop deployment • Anti-Virus Storms can seriously impact performance • Anti-Virus Offloading • McAfee MOVE (Management Optimized for Virtualized Environment) • TrendMicro Deep Security Agentless Anti-Virus © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
  • 42. • MOVE-AV (McAfee Management for Optimized Virtual Environments) is validated • MOVE-AV on a UCS B250 M2 with XenDesktop 5 and ESXi 4.1 with Windows 7/32 bit desktops and NetApp for storage are provided below. • The impact of adding MOVE-AV with a default scan policy to a Knowledge Worker workload running on a UCS B250 M2 is a ~10-15% impact to VM density. Source: http://www.2mul.com/en/US/docs/solutions/Enterprise/Data_Center/VXI/CVD/VXI_C VD_Citrix.pdf © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42