SlideShare une entreprise Scribd logo
1  sur  21
User Profiling and Desktop Technology Options Architecture & Design Team
User Profiling Windows Optimised Desktop Scenarios Assessment Guide defines:-  Office Worker Mobile Worker Task Worker Contract Worker Access from Home
Office Worker These users are always connected to the corporate network and expect a rich client experience that can handle the broad range of tasks for which they are responsible. They use applications such as Microsoft Office and various line-of-business (LOB) applications that run on the local computer.  These users include analysts, architects, researchers, and doctors.
Mobile Worker These types of users are highly mobile due to travel requirements, and frequently work outside the corporate network. They use a variety of applications that usually run locally on their mobile computer and, therefore, require a rich computing experience. These users need to be able to access applications and data offline, but also carry a higher risk of loss of data if their computer is lost or stolen.  These users include sales people and account executives.
Task Worker These users perform a narrow set of tasks and use systems that are connected to the corporate network. Task workers usually do not have a dedicated desktop computer; instead, they leverage a pool of designated computers to access one or a few applications.  These users include call-center analysts, warehouse workers, and retail employees.
Contract Worker These users are vendor or contract staff, often software developers, who perform a broad set of activities that require significant access to the local operating system. They work on corporate-owned intellectual property, but might be physically outside the realm of IT control. They typically use applications such as software development suites, testing tools, and project management tools.  These users include software developers and contingent staff.
Access from Home This usage scenario is for non-mobile employees who are not able to get to the office and need access to their personalized computer work environment, including applications and data. The IT department needs to ensure that corporate data remains protected and that the computing environment remains well controlled.
Technology Options (1 of 2) Virtual User State Virtualisation Presentation Virtualisation Applications Virtualisation Client Hosted Desktop Virtualisation Server Hosted Desktop Virtualisation
Technology Options (2 of 2) Physical Operating System Local Application Installation Security Encryption Rights Management Network Access Control
User State Virtualisation Benefits: Data Backup Roaming Users Migration (hardware / operating system) Technology: Roaming User Profiles Folder Redirection Client-side Caching
Presentation Virtualisation Benefits: Secure Data and Applications Accelerate Application Deployment Remote Worker Accessibility Technology: Windows Server 2008 Terminal Services Citrix XenServer Intelligent Access Gateway
Application Virtualisation Benefits: Provisioning Continuity Accessibility Centralised Management Technology: Microsoft Application Virtualisation Citrix XenApp VMware ThinApp
Client Hosted Desktop Virtualisation Benefits: Legacy Application Support Secondary Desktop Environment Technology: Microsoft Virtual PC VMware Workstation Microsoft Enterprise Desktop Virtualisation
Server Hosted Desktop Virtualisation Benefits: Security Full Desktop Environment Centrally Managed Provisioning Accessibility Technology: Windows Server 2008 with Hyper-V Citrix XenDesktop VMware View Connection Broker
Operating System Windows Vista Enterprise Edition User Account Control Bitlocker Performance and Reliability Monitoring System Restore
Example User Profiling
Example User Profiling
Example User Profiling Organisation Workers Kiosk Worker		(e.g. Receptions) Task Worker		(e.g. Facilities) Office Worker		(e.g. Clerks) Research Worker	(e.g. Statisticians) Development Worker	(e.g. Technology Directorate)
Example Solution 1 Kiosk Worker User State Virtualisation Presentation Virtualisation Application Virtualisation
Example Solution 2	 Task Worker User State Virtualisation Presentation Virtualisation Application Virtualisation
Example Solution 3	 Office Worker User State Virtualisation Application Virtualisation Operating System Client Hosted Desktop Virtualisation

Contenu connexe

Tendances

Syscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software SolutionsSyscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software SolutionsNilayJhaveri
 
James anthony 2016 resume
James anthony 2016 resumeJames anthony 2016 resume
James anthony 2016 resumeAnthony James
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTimeInttelix
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
New resume Naveen (1)
New resume Naveen (1)New resume Naveen (1)
New resume Naveen (1)Naveen Joy
 
Resume Hector Reyes 03.28.2015
Resume Hector Reyes 03.28.2015Resume Hector Reyes 03.28.2015
Resume Hector Reyes 03.28.2015Hector Reyes
 
HPE resume Carlos Bermudez Vives
HPE resume Carlos Bermudez VivesHPE resume Carlos Bermudez Vives
HPE resume Carlos Bermudez VivesCharlie Vives
 
Colin Frye resume
Colin Frye resumeColin Frye resume
Colin Frye resumeColin Frye
 
Tom Gerrick Technical Drawing
Tom Gerrick Technical DrawingTom Gerrick Technical Drawing
Tom Gerrick Technical DrawingTom Gerrick
 

Tendances (19)

Network Resume
Network ResumeNetwork Resume
Network Resume
 
Mohamed original
Mohamed originalMohamed original
Mohamed original
 
Syscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software SolutionsSyscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software Solutions
 
Mohamed original(1)
Mohamed original(1)Mohamed original(1)
Mohamed original(1)
 
Resume (mohd imran ansari)
Resume (mohd imran ansari)Resume (mohd imran ansari)
Resume (mohd imran ansari)
 
James anthony 2016 resume
James anthony 2016 resumeJames anthony 2016 resume
James anthony 2016 resume
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Thilina CV
Thilina CVThilina CV
Thilina CV
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
New resume Naveen (1)
New resume Naveen (1)New resume Naveen (1)
New resume Naveen (1)
 
Cortnie Guerra
Cortnie GuerraCortnie Guerra
Cortnie Guerra
 
Resume Hector Reyes 03.28.2015
Resume Hector Reyes 03.28.2015Resume Hector Reyes 03.28.2015
Resume Hector Reyes 03.28.2015
 
final 2
final  2final  2
final 2
 
Helpdesk
HelpdeskHelpdesk
Helpdesk
 
HPE resume Carlos Bermudez Vives
HPE resume Carlos Bermudez VivesHPE resume Carlos Bermudez Vives
HPE resume Carlos Bermudez Vives
 
Tristan_CV
Tristan_CVTristan_CV
Tristan_CV
 
Colin Frye resume
Colin Frye resumeColin Frye resume
Colin Frye resume
 
Tom Gerrick Technical Drawing
Tom Gerrick Technical DrawingTom Gerrick Technical Drawing
Tom Gerrick Technical Drawing
 
cannuel's CV.
cannuel's CV.cannuel's CV.
cannuel's CV.
 

Similaire à User Profiling and Technology

Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft Private Cloud
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 
End User Computing
End User ComputingEnd User Computing
End User ComputingMudit Dhebar
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...VMworld
 
Telecommunications Working from home  Security and remote working ca
Telecommunications Working from home  Security and remote working caTelecommunications Working from home  Security and remote working ca
Telecommunications Working from home  Security and remote working caalehosickg3
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Flexera
 
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Heidi Hoff
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 BlueprintNuno Alves
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 

Similaire à User Profiling and Technology (20)

Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
End User Computing
End User ComputingEnd User Computing
End User Computing
 
End User Computing
End User ComputingEnd User Computing
End User Computing
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Sharanabasappa_Resume
Sharanabasappa_Resume Sharanabasappa_Resume
Sharanabasappa_Resume
 
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
 
Telecommunications Working from home  Security and remote working ca
Telecommunications Working from home  Security and remote working caTelecommunications Working from home  Security and remote working ca
Telecommunications Working from home  Security and remote working ca
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Amit Chaubey
Amit ChaubeyAmit Chaubey
Amit Chaubey
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Chiranjit S Dutta
Chiranjit S DuttaChiranjit S Dutta
Chiranjit S Dutta
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 Blueprint
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

User Profiling and Technology

  • 1. User Profiling and Desktop Technology Options Architecture & Design Team
  • 2. User Profiling Windows Optimised Desktop Scenarios Assessment Guide defines:- Office Worker Mobile Worker Task Worker Contract Worker Access from Home
  • 3. Office Worker These users are always connected to the corporate network and expect a rich client experience that can handle the broad range of tasks for which they are responsible. They use applications such as Microsoft Office and various line-of-business (LOB) applications that run on the local computer. These users include analysts, architects, researchers, and doctors.
  • 4. Mobile Worker These types of users are highly mobile due to travel requirements, and frequently work outside the corporate network. They use a variety of applications that usually run locally on their mobile computer and, therefore, require a rich computing experience. These users need to be able to access applications and data offline, but also carry a higher risk of loss of data if their computer is lost or stolen. These users include sales people and account executives.
  • 5. Task Worker These users perform a narrow set of tasks and use systems that are connected to the corporate network. Task workers usually do not have a dedicated desktop computer; instead, they leverage a pool of designated computers to access one or a few applications. These users include call-center analysts, warehouse workers, and retail employees.
  • 6. Contract Worker These users are vendor or contract staff, often software developers, who perform a broad set of activities that require significant access to the local operating system. They work on corporate-owned intellectual property, but might be physically outside the realm of IT control. They typically use applications such as software development suites, testing tools, and project management tools. These users include software developers and contingent staff.
  • 7. Access from Home This usage scenario is for non-mobile employees who are not able to get to the office and need access to their personalized computer work environment, including applications and data. The IT department needs to ensure that corporate data remains protected and that the computing environment remains well controlled.
  • 8. Technology Options (1 of 2) Virtual User State Virtualisation Presentation Virtualisation Applications Virtualisation Client Hosted Desktop Virtualisation Server Hosted Desktop Virtualisation
  • 9. Technology Options (2 of 2) Physical Operating System Local Application Installation Security Encryption Rights Management Network Access Control
  • 10. User State Virtualisation Benefits: Data Backup Roaming Users Migration (hardware / operating system) Technology: Roaming User Profiles Folder Redirection Client-side Caching
  • 11. Presentation Virtualisation Benefits: Secure Data and Applications Accelerate Application Deployment Remote Worker Accessibility Technology: Windows Server 2008 Terminal Services Citrix XenServer Intelligent Access Gateway
  • 12. Application Virtualisation Benefits: Provisioning Continuity Accessibility Centralised Management Technology: Microsoft Application Virtualisation Citrix XenApp VMware ThinApp
  • 13. Client Hosted Desktop Virtualisation Benefits: Legacy Application Support Secondary Desktop Environment Technology: Microsoft Virtual PC VMware Workstation Microsoft Enterprise Desktop Virtualisation
  • 14. Server Hosted Desktop Virtualisation Benefits: Security Full Desktop Environment Centrally Managed Provisioning Accessibility Technology: Windows Server 2008 with Hyper-V Citrix XenDesktop VMware View Connection Broker
  • 15. Operating System Windows Vista Enterprise Edition User Account Control Bitlocker Performance and Reliability Monitoring System Restore
  • 18. Example User Profiling Organisation Workers Kiosk Worker (e.g. Receptions) Task Worker (e.g. Facilities) Office Worker (e.g. Clerks) Research Worker (e.g. Statisticians) Development Worker (e.g. Technology Directorate)
  • 19. Example Solution 1 Kiosk Worker User State Virtualisation Presentation Virtualisation Application Virtualisation
  • 20. Example Solution 2 Task Worker User State Virtualisation Presentation Virtualisation Application Virtualisation
  • 21. Example Solution 3 Office Worker User State Virtualisation Application Virtualisation Operating System Client Hosted Desktop Virtualisation