3Stay Connected Intel Premier IT Professional (IPIP) Program 14 events in US & CanadaAnalyst presentations & whitepapersIntel technology roadmapIntel IT best practicesISV presentationsParticipate in online social mediaDownload up-to-date technical resourcesExclusive MagazineMonthly NewsletterMembers Only WebsiteEvents & NetworkingPurpose: Sharing best practices with the IT community.Audience: All IT Managers/Tech Enthusiast, regardless of company sizeSubscribe today. It’s FREE!3
4Evaluating Thin Clients & Alternative Compute Models IT Business PerspectiveDifferent compute modelsFuture PerspectiveEcosystem & Intel
5IT Business Challenges Business ResponsivenessFlexibility and agility to deliver applications depending on location and deviceGrowing Complexity and TCOBudgetary pressure to cut operating expensesBusiness ContinuityHigh availability and accessibility of applications, data, collaborationExecutive ChallengesImprove Security and Simplify ManagementMinimize risk, streamline operations
6IT Under Pressure: Response Pain PointsGrowing complexity and TCOBudgetary pressure to cut costsBusiness ContinuityHighly availability and accessibility of applications, data, collaborationImprove Security and Simplify ManageabilityMinimize risk and streamline operationsBusiness ResponsivenessFlexibility and agility to deliver applications and dataResponseDrive for Centralized Control Via…New Software and Data Delivery Models+Improved Client Management and Security CapabilitiesIT is under pressure from factors that are well-understood. Cost control, security, compliance and other issues, combined with improvements in technology, are inspiring IT managers to question the status quo of how software is deployed and making centralization very appealing.Getting control of the issues will likely involve a combination of several efforts, including new ways to deliver and manage client software, as well as improving the management and security capabilities of their client devices.The Dynamic Virtual Client6
7Lets look at what Gartner has found “The total cost of ownership of server-based computing is from 12 percent to 48 percent less than for comparable PCs.”- Gartner, June 2006
8Gartner’s Path to 48% TCO Reduction from an Unmanaged Desktop Unmanaged Windows* XP DesktopTypically Managed Windows XP DesktopWell-Managed Windows XP DesktopWindows-Based Terminal (32-Bit)Windows-Based Terminal (64-Bit)Start-15%Reduction from better mgmt: 40%-25%-7%Reduction from server-based model: 8%-1%Total: 48% TCO Reduction*Other names and brands may be claimed as the property of others.
9Adoption of Virtualization and Streaming “In the future, IDC believes that application virtualization and streaming technology will become an increasingly common way for many IT organizations to deploy and manage applications.“--Mike Rose, IDC“A NEW information technology discipline is emerging around application delivery to control desktop management costs and security… the next generation of delivery is application streaming.”--Martin Gilliland, GartnerSource: IDC, 2008Enterprises are Seeking New Application Delivery Methods
10Spectrum of Compute Models Server-Side Compute & Centralized Data StorageClient-Side Compute, Centralized Data StorageClient-Side Compute & Centralized or Local Data StorageVirtual ContainerVirtual Containers (Emerging)Mobile CapableOff-Network OptionApp StreamingLocal, Rich ClientApp Streaming/ VirtualizatonDistributed, Rich ClientWeb-Based AppsOS+App StreamingWeb-Based AppsOS+App StreamingNetwork Connected OnlyThere is a wide range of compute and software delivery models available today, each with its own merits and limitations. This view breaks out the spectrum along the vectors of mobility (vertical axis) and where the computation takes place (horizontal axis).If the target user segment needs off-network mobility, then the only two options are Application Streaming and Local Rich Client.If off-network mobility is not a requirement, then all the listed models are an option and should be weighed based on several factors discussed on the next slide.In general, our view is that the client-side models provide the best user experience and greatest software compatibility. If centralization is required or desirable, the streaming models provide the best balance of centralized security and management, as well as the responsiveness of local execution. In most cases, streaming technologies do not require the same level of infrastructure build-out as server-side models.Terminal ServicesVirtual Hosted Desktop1:Many Blade PCTerminal ServicesVirtual Hosted Desktop1:Many Blade PC1: Blade PC1:1Blade PC
12What is the Right Solution for My Business ? IT RequirementsSecurityImage ManagementLicense ManagementSupport StructureDisaster RecoveryUser ExperienceMobilityResponsivenessCustomizationConnectivityOwnership and PrivacyEvaluate for Each User SegmentAvailable InfrastructureServersStorageSpace, Power, CoolingNetwork BandwidthBudget PrioritiesApplication WorkloadsCompute LoadGraphics LoadDelay Sensitivity (i.e., Video, VOIP)HeadroomAll these factors must be considered when choosing the right compute or software delivery model. Excessive focus on only one vector will likely result in a sub-optimal solution.IT Requirements are standard IT concerns….security, mgmt, business continuity, image management, etc.Available Infrastructure refers to the hardware, connectivity and bandwidth at the company’s disposal to deliver the compute model. If the infrastructure is not in place to support a particular compute model, it must be purchased and installed or another model should be chosen.User Experience is the workflow needs of the system’s user. This included the need for mobility and performance. In many cases, either by custom or law, users have an expectation that the device may be used for some personal tasks, which may result in personally identifiable information being on the system. These issues of “ownership” and privacy should be considered.Application Workload is the compute and graphics demands of the applications the user will be running. Some applications may be intolerant of network delays, such as VOIP or streamed video. Headroom for future application growth should also be considered.Appropriate Solution is a Balance of Many Interrelated Factors12
13Construction Estimator Call Center Representative Mixed Delivery Models Often Required to Meet All User and IT RequirementsConstruction EstimatorUniversity StudentMarketing StafferCall Center RepresentativeTerminal ServicesScheduling databasePurchasing databaseOrder databaseVirtual Hosted DesktopRemote access to standard dept imageStreaming TechnologyCAD packageCourse-specific applicationsPhoto & video editing packagesLocal InstallOffice apps, BrowserOffice apps, Browser, Media playersAppropriate DeviceLaptop PCLaptop or Desktop PCDesktop PC or Thin terminalFor all but the call center representative, a mix of compute models is best to deliver all their requirements, provide the management and security IT needs, and work within the infrastructure constraints. When a mix of server-side and client-side models is needed, a PC is the best device for the job. Thin terminals are only appropriate for the case when a 100% server-side model makes sense.
14Real World Solutions May Mix Models Diverse user and IT needs will likely result in hybrid modelsSame user accesses software through multiple models100% single-model deployments may be rareSingle model may make sense when security, management and workload requirements are unlikely to change over timeSelected client devices should accommodate the most demanding requirements of target usersDesktop & laptop PCs provide most flexibility for all modelsThin terminals appropriate for 100% server-side deploymentsIn most real-world cases, users may actually use multiple models to access different software applications. They may use a mix of local, server-side and streamed models, depending on the business need. Here at Intel, our applications are delivered in many ways.Since a mix of models is likely, the requirements of the most demanding model set the bar for the client device. Any significant local processing is a good sign that a PC is the best device. If a 100% server-side model is called for, as they are in some niches, thin terminals will make sense.
15Compute Model Taxonomy Terminal Services(aka Session Virtualization)Virtual Hosted Desktops(aka Virtual Desktop Infrastructure)OS and Application StreamingApplication Streaming(aka Application Virtualization)Virtual ContainersRich, Distributed Computing(aka Rich Client, Fat Client)ExecutionServer-basedClient-basedApplication Executable StorageServerServer (Client caching option)Server (Client caching option)ClientApplication Data StorageServer, NAS or SANServer, NAS or SAN (Client caching option)Client, Server, NAS or SANMobility / Off-Network OperationNoYesLocal Device Synchronization (bar code reader, PDA, phone, etc.)LimitedAcceptable ClientsTerminal, Desktop PC, Laptop PCDesktop PC, Laptop PCMajor ProvidersCitrix*, Microsoft*VMware*, CitrixCitrixMicrosoft, Citrix, LANDesk*, Altiris*, AppStream*VMWare vClient*Microsoft Med-V*Traditional PC software providersNAS = Network Attached StorageSAN = Storage Area Network*Other names and brands may be claimed as the property of others.
16Intel® vPro™ Technology ProcessorChipsetNetworkIntel® Core™2 DuoIntel® Core™2 QuadIntel® Express ChipsetIntel® Gigabit NetworkIntel® Anti-Theft TechnologyIntel® Active Management TechnologyIntel® Virtualization TechnologyIntel® Trusted Execution TechnologyBut, what exactly is vPro™?Intel® vPro Technology is “IT” embedded into the HW platform…vPro™ combines POWERFUL processor, chipset, networking silicon features along with FLASH to deliver a full tamper resistant solution when combined with EXISTING ISV consolesComponent Highlights:Processor:New 45 nm Intel® Core™ 2 Duo processors can deliver up to 39% performance improvement over last generation (Source: Sysmark 2007 when comparing E8400 with E6550)Improved Power Savings - Deeper sleep statesVirtualization & Security Technologies – Secure the platformChipset & LAN:New Intel® Q45 Express Chipset supports the latest manageability capabilities even outside the firewallEnhanced manageability in secure networksEnergy Star support & lower idle powervPro™‘s embedded capabilities DELIVER Security & Manageability on a chipIntel vPro Technology: Virtualization, Security, and Management161616
17Intel® vPro™ Technology Intel® Anti-Theft TechnologyIntel® Virtualization TechnologyIntel® Trusted Execution TechnologyIntel® Active Management TechnologyClientsTrusted Platform Protection AreasProtection from withinStreaming ServerMaster OS imageMaster Apps imageProtection from outsideLocal OSVirtual ContainerVirtualizationPartition 1Partition nAppAppAppAppGuest OSGuest OSProtection between partitionsPartition ManagerHardwareVirtual ContainersSystem ProtectionPhysical hardware protectionSecured Virtualization for New Compute Models17
18Intel® vPro™ Technology Intel® Anti-Theft TechnologyIntel® Virtualization TechnologyIntel® Trusted Execution TechnologyIntel® Active Management TechnologyOS StreamingorRemote OS BootApplication streaming & virtualizationVirtual ContainersClientsVirtualizationVirtual ApplicationLocal OSVirtual ContainerEnhanced Security and Manageability for New Compute Models18
19SummarySoftware delivery models have evolved and IT has more choices than everThe appropriate compute model for a user segment is a balance of many factorsOptimization of IT and User needs will likely result in a mix of delivery models, even within a single user segmentPCs with Intel® vPro™ and Centrino® Pro processor technology are the most manageable, secure PCs on which to deliver all compute models
22Rich or Thin? It’s No Longer a Binary Decision Mobile CapableOff-Network OptionManaged Rich ClientDT & NB clientsDynamic Virtual ClientCentralized apps and dataThin ClientTerminalNetwork Connected OnlyIt used to be a binary decisionServer Compute Centralized Management Centralized Data StorageClient Compute Centralized Management Centralized and Local Data Storage OptionsClient Compute Centralized and Local Data Storage Options2222
23Intel’s Dynamic Virtual Client (DVC) ClientsNetworkServerOn-Demand DeliveryData SynchronizationLocal OSVirtual ContainerVirtualizationVirtualizationVirtual ApplicationOS StreamingorRemote OS BootStreaming ServerMaster OS imageMaster Apps imageVirtual ContainersApplication Streaming & VirtualizationOS StreamingSimplified centralized workplace management (applications and data)Improved securityRich client performance and experience with mobile capabilitiesA Family of Compute Models Based On Streaming and Virtualization
24DVC Solutions and Intel® vPro™ Technology Enabling Compute ModelIntel® vPro™ Technology LinkStatusMicrosoft SCCM R2* + App-V 4.5App virtualizationApp-V now enabled to use Intel® vPro™ technology secure managementt link to push an update to a locally-cached, virtualized app regardless of OS state along with license management using TPDSShippingSymantec Workspace Virtualization* v6.1 SP1App streaming/ virtualizationSWS can write app licensing and usage information into vPro technology’s non-volatile memory. Info can be read OOB and used to make optimal license purchasing decisions. Mobility SDK support providedQ2’09Lenovo Secure Managed Client* (SMC)Remote OS bootSMC uses a thin, Intel® Virtualization Technology-enabled VMM to redirect storage from the local disk to a SAN. SMC clients are Lenovo M-Series* vPro technology desktopsv1.2 (US release May’09)Global GA –Q3/09Dell On-Demand* Desktop Streaming(ODDS)OS StreamingDell has bundled Citrix PVS* (OS streaming) with diskless vPro technology desktops for a turnkey solutionCitrix Provisioning Server* for Desktops v5.0 also integrated into Citrix Xen Desktop* V3OS streamingOn an 802.1x, NAC or NAP network, vPro technology systems with the Intel® Embedded Trust Agent can present network security credentials prior to receiving a streamed OS, providing assurance that only authorized systems access the networkCitrix -Project Independence*Virtual containersA joint development project between Citrix and Intel; uses an Intel® VT-d, VT-x and TXT-aware VMMIn development. Expected 2H’09VMware - Client Virtualization Platform*Optimized for Intel vPro technology.*Other brands and names may be claimed as property of others.All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.24
25Intel® vPro™ Technology Optimization? Key Compute Model ISVsModelISV & ProductIntel® vPro™ Technology Optimization?OS StreamingCitrix Provisioning Server for Desktops* v4.5 and greaterCitrix XenDesktop* V3Dell On-Demand Streaming SolutionIntel® Embedded Trust AgentIntel® AMT, Intel® ETARemote OS BootLenovo Secure Managed Client*Intel® AMT, Intel® VTApp Streaming/ VirtualizationCitrix XenApp* (supports both terminal services and application streaming)Microsoft SCCM/R2*Symantec SWV 6.1*VMware View 3(with Thinapp)*Others-Intel® AMTIntel Mobile SDK -SymantecVirtual ContainersCitrix – Intel collaboration (Q1’10, codenamed Project Independence)Microsoft Enterprise Desktop Virtualization*VMware ACE*, VMware Player*VMware future Client Virtualization Platform (2H’09)Enhanced Network Display ProtocolsCitrix ICA*HP Remote Graphics Software*Microsoft RDP replacement in Windows* 7 (formerly Calista*)Teradici PC-over-IP** Other brands and names may be claimed as property of others.
26Presentation Virtualization: Terminal Services IT BenefitsCentralized image and securityProven technologyLess infrastructure than virtual hosted desktop approachAccess from any connected clientStateless clientLimitationsNo mobilityResponsiveness varies (workload and latency)Poor motion graphics, streamed audio, and peripheral synchUser satisfaction issuesPresentation VirtualizationSession ASession BApplicationTerminal ServerServer OSRDP Remote Display ProtocolTerminal SoftwareLocal OS
27Virtual Hosted Desktop IT BenefitsCentralized image and securityUser customizationAccess from any connected clientStateless clientLimitationsNo mobilityLower users/processor ratio than terminal servicesCostly data center build-outResponsiveness varies (workload and latency)Poor motion graphics, streamed audio, and peripheral synchImmature deployment and management toolsVirtual Hosted DesktopAPPOSAPPOSAPPOSAPPOSVMMRDP Remote Display ProtocolTerminal swLocal OS
28Operating System and Application Streaming IT BenefitsCentralized image, data, and securitySingle image serves many clients (less storage)Responsive compute and graphicsUser customizationIncreased security and compatibility with application virtualizationLess infrastructure than server-side models“Stateless” clientLimitationsLimited mobility; no local cachingNetwork boot stormsSome application incompatibilitiesValidation can be labor-intensiveOperating System and Application StreamingAppApp MgrOSStreaming ServerOS, Virtual App Mgr and Application streamed over NetworkStreamed AppVirtual App MgrStreamed OS
29Application Streaming and Virtualization IT BenefitsCentralized application, data, and securitySingle application image serves many clients (less storage)Responsive compute and graphicsUser customizationIncreased security, compatibility with application virtualizationLess infrastructure than server-side modelsOff-network mobilityLimitationsCentralizes applications and data only, not whole imageSome application incompatibilitiesValidation can be labor-intensiveApplication StreamingAppAppAppStreaming ServerApplication streamed over NetworkAppAppAppVirtual App MgrLocal OS & Apps
30Streamed, DVD, or USB Drive Virtual ContainersVirtual ContainersIT BenefitsImage-level deliveryOff-network mobilityApplication performanceMultiple images/client (e.g., corporate/private, contractor)Low data center costLimitationsTechnology and tool immaturityComplexity of current solutionsAppOSAppOSStreaming ServerStreamed, DVD, or USB DriveAppOSAppOSVMMLocal OS & Apps
31Intel® vPro™ Technology Capabilities & Alternative Compute Models vPro capabilityTerminal ServicesVirtual Hosted DesktopOS + App StreamingApp Streaming (Local OS)Rich Client or Mixed ModelAccurate count of clients (regardless of power or OS state)XAccurate HW inventory (regardless of power or OS state)Accurate SW inventory (regardless of power or OS state)(inventory & update terminal SW)Secure wake-&-updateIsolate an infected clientMonitor agent presenceEncrypt data on hard drive (Danbury Tech ’08)