SlideShare une entreprise Scribd logo
1  sur  21
User Profiling and Desktop Technology Options Architecture & Design Team
User Profiling Windows Optimised Desktop Scenarios Assessment Guide defines:-  Office Worker Mobile Worker Task Worker Contract Worker Access from Home
Office Worker These users are always connected to the corporate network and expect a rich client experience that can handle the broad range of tasks for which they are responsible. They use applications such as Microsoft Office and various line-of-business (LOB) applications that run on the local computer.  These users include analysts, architects, researchers, and doctors.
Mobile Worker These types of users are highly mobile due to travel requirements, and frequently work outside the corporate network. They use a variety of applications that usually run locally on their mobile computer and, therefore, require a rich computing experience. These users need to be able to access applications and data offline, but also carry a higher risk of loss of data if their computer is lost or stolen.  These users include sales people and account executives.
Task Worker These users perform a narrow set of tasks and use systems that are connected to the corporate network. Task workers usually do not have a dedicated desktop computer; instead, they leverage a pool of designated computers to access one or a few applications.  These users include call-center analysts, warehouse workers, and retail employees.
Contract Worker These users are vendor or contract staff, often software developers, who perform a broad set of activities that require significant access to the local operating system. They work on corporate-owned intellectual property, but might be physically outside the realm of IT control. They typically use applications such as software development suites, testing tools, and project management tools.  These users include software developers and contingent staff.
Access from Home This usage scenario is for non-mobile employees who are not able to get to the office and need access to their personalized computer work environment, including applications and data. The IT department needs to ensure that corporate data remains protected and that the computing environment remains well controlled.
Technology Options (1 of 2) Virtual User State Virtualisation Presentation Virtualisation Applications Virtualisation Client Hosted Desktop Virtualisation Server Hosted Desktop Virtualisation
Technology Options (2 of 2) Physical Operating System Local Application Installation Security Encryption Rights Management Network Access Control
User State Virtualisation Benefits: Data Backup Roaming Users Migration (hardware / operating system) Technology: Roaming User Profiles Folder Redirection Client-side Caching
Presentation Virtualisation Benefits: Secure Data and Applications Accelerate Application Deployment Remote Worker Accessibility Technology: Windows Server 2008 Terminal Services Citrix XenServer Intelligent Access Gateway
Application Virtualisation Benefits: Provisioning Continuity Accessibility Centralised Management Technology: Microsoft Application Virtualisation Citrix XenApp VMware ThinApp
Client Hosted Desktop Virtualisation Benefits: Legacy Application Support Secondary Desktop Environment Technology: Microsoft Virtual PC VMware Workstation Microsoft Enterprise Desktop Virtualisation
Server Hosted Desktop Virtualisation Benefits: Security Full Desktop Environment Centrally Managed Provisioning Accessibility Technology: Windows Server 2008 with Hyper-V Citrix XenDesktop VMware View Connection Broker
Operating System Windows Vista Enterprise Edition User Account Control Bitlocker Performance and Reliability Monitoring System Restore
Example User Profiling
Example User Profiling
Example User Profiling Organisation Workers Kiosk Worker		(e.g. Receptions) Task Worker		(e.g. Facilities) Office Worker		(e.g. Clerks) Research Worker	(e.g. Statisticians) Development Worker	(e.g. Technology Directorate)
Example Solution 1 Kiosk Worker User State Virtualisation Presentation Virtualisation Application Virtualisation
Example Solution 2	 Task Worker User State Virtualisation Presentation Virtualisation Application Virtualisation
Example Solution 3	 Office Worker User State Virtualisation Application Virtualisation Operating System Client Hosted Desktop Virtualisation

Contenu connexe

Tendances

Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder
 
New resume Naveen (1)
New resume Naveen (1)New resume Naveen (1)
New resume Naveen (1)
Naveen Joy
 
Resume Hector Reyes 03.28.2015
Resume Hector Reyes 03.28.2015Resume Hector Reyes 03.28.2015
Resume Hector Reyes 03.28.2015
Hector Reyes
 
HPE resume Carlos Bermudez Vives
HPE resume Carlos Bermudez VivesHPE resume Carlos Bermudez Vives
HPE resume Carlos Bermudez Vives
Charlie Vives
 
Colin Frye resume
Colin Frye resumeColin Frye resume
Colin Frye resume
Colin Frye
 
Tom Gerrick Technical Drawing
Tom Gerrick Technical DrawingTom Gerrick Technical Drawing
Tom Gerrick Technical Drawing
Tom Gerrick
 

Tendances (19)

Network Resume
Network ResumeNetwork Resume
Network Resume
 
Mohamed original
Mohamed originalMohamed original
Mohamed original
 
Syscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software SolutionsSyscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software Solutions
 
Mohamed original(1)
Mohamed original(1)Mohamed original(1)
Mohamed original(1)
 
Resume (mohd imran ansari)
Resume (mohd imran ansari)Resume (mohd imran ansari)
Resume (mohd imran ansari)
 
James anthony 2016 resume
James anthony 2016 resumeJames anthony 2016 resume
James anthony 2016 resume
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Thilina CV
Thilina CVThilina CV
Thilina CV
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
New resume Naveen (1)
New resume Naveen (1)New resume Naveen (1)
New resume Naveen (1)
 
Cortnie Guerra
Cortnie GuerraCortnie Guerra
Cortnie Guerra
 
Resume Hector Reyes 03.28.2015
Resume Hector Reyes 03.28.2015Resume Hector Reyes 03.28.2015
Resume Hector Reyes 03.28.2015
 
final 2
final  2final  2
final 2
 
Helpdesk
HelpdeskHelpdesk
Helpdesk
 
HPE resume Carlos Bermudez Vives
HPE resume Carlos Bermudez VivesHPE resume Carlos Bermudez Vives
HPE resume Carlos Bermudez Vives
 
Tristan_CV
Tristan_CVTristan_CV
Tristan_CV
 
Colin Frye resume
Colin Frye resumeColin Frye resume
Colin Frye resume
 
Tom Gerrick Technical Drawing
Tom Gerrick Technical DrawingTom Gerrick Technical Drawing
Tom Gerrick Technical Drawing
 
cannuel's CV.
cannuel's CV.cannuel's CV.
cannuel's CV.
 

Similaire à User Profiling and Technology

Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
Telecommunications Working from home  Security and remote working ca
Telecommunications Working from home  Security and remote working caTelecommunications Working from home  Security and remote working ca
Telecommunications Working from home  Security and remote working ca
alehosickg3
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Flexera
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
olivier lussac
 

Similaire à User Profiling and Technology (20)

Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
End User Computing
End User ComputingEnd User Computing
End User Computing
 
End User Computing
End User ComputingEnd User Computing
End User Computing
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Sharanabasappa_Resume
Sharanabasappa_Resume Sharanabasappa_Resume
Sharanabasappa_Resume
 
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
 
Telecommunications Working from home  Security and remote working ca
Telecommunications Working from home  Security and remote working caTelecommunications Working from home  Security and remote working ca
Telecommunications Working from home  Security and remote working ca
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Amit Chaubey
Amit ChaubeyAmit Chaubey
Amit Chaubey
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Chiranjit S Dutta
Chiranjit S DuttaChiranjit S Dutta
Chiranjit S Dutta
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 Blueprint
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Dernier (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

User Profiling and Technology

  • 1. User Profiling and Desktop Technology Options Architecture & Design Team
  • 2. User Profiling Windows Optimised Desktop Scenarios Assessment Guide defines:- Office Worker Mobile Worker Task Worker Contract Worker Access from Home
  • 3. Office Worker These users are always connected to the corporate network and expect a rich client experience that can handle the broad range of tasks for which they are responsible. They use applications such as Microsoft Office and various line-of-business (LOB) applications that run on the local computer. These users include analysts, architects, researchers, and doctors.
  • 4. Mobile Worker These types of users are highly mobile due to travel requirements, and frequently work outside the corporate network. They use a variety of applications that usually run locally on their mobile computer and, therefore, require a rich computing experience. These users need to be able to access applications and data offline, but also carry a higher risk of loss of data if their computer is lost or stolen. These users include sales people and account executives.
  • 5. Task Worker These users perform a narrow set of tasks and use systems that are connected to the corporate network. Task workers usually do not have a dedicated desktop computer; instead, they leverage a pool of designated computers to access one or a few applications. These users include call-center analysts, warehouse workers, and retail employees.
  • 6. Contract Worker These users are vendor or contract staff, often software developers, who perform a broad set of activities that require significant access to the local operating system. They work on corporate-owned intellectual property, but might be physically outside the realm of IT control. They typically use applications such as software development suites, testing tools, and project management tools. These users include software developers and contingent staff.
  • 7. Access from Home This usage scenario is for non-mobile employees who are not able to get to the office and need access to their personalized computer work environment, including applications and data. The IT department needs to ensure that corporate data remains protected and that the computing environment remains well controlled.
  • 8. Technology Options (1 of 2) Virtual User State Virtualisation Presentation Virtualisation Applications Virtualisation Client Hosted Desktop Virtualisation Server Hosted Desktop Virtualisation
  • 9. Technology Options (2 of 2) Physical Operating System Local Application Installation Security Encryption Rights Management Network Access Control
  • 10. User State Virtualisation Benefits: Data Backup Roaming Users Migration (hardware / operating system) Technology: Roaming User Profiles Folder Redirection Client-side Caching
  • 11. Presentation Virtualisation Benefits: Secure Data and Applications Accelerate Application Deployment Remote Worker Accessibility Technology: Windows Server 2008 Terminal Services Citrix XenServer Intelligent Access Gateway
  • 12. Application Virtualisation Benefits: Provisioning Continuity Accessibility Centralised Management Technology: Microsoft Application Virtualisation Citrix XenApp VMware ThinApp
  • 13. Client Hosted Desktop Virtualisation Benefits: Legacy Application Support Secondary Desktop Environment Technology: Microsoft Virtual PC VMware Workstation Microsoft Enterprise Desktop Virtualisation
  • 14. Server Hosted Desktop Virtualisation Benefits: Security Full Desktop Environment Centrally Managed Provisioning Accessibility Technology: Windows Server 2008 with Hyper-V Citrix XenDesktop VMware View Connection Broker
  • 15. Operating System Windows Vista Enterprise Edition User Account Control Bitlocker Performance and Reliability Monitoring System Restore
  • 18. Example User Profiling Organisation Workers Kiosk Worker (e.g. Receptions) Task Worker (e.g. Facilities) Office Worker (e.g. Clerks) Research Worker (e.g. Statisticians) Development Worker (e.g. Technology Directorate)
  • 19. Example Solution 1 Kiosk Worker User State Virtualisation Presentation Virtualisation Application Virtualisation
  • 20. Example Solution 2 Task Worker User State Virtualisation Presentation Virtualisation Application Virtualisation
  • 21. Example Solution 3 Office Worker User State Virtualisation Application Virtualisation Operating System Client Hosted Desktop Virtualisation