Presentation is loading. Please wait.

Presentation is loading. Please wait.

Market Trends XP support retiring April 2012 – now 10 years old

Similar presentations


Presentation on theme: "Market Trends XP support retiring April 2012 – now 10 years old"— Presentation transcript:

0 Agenda Market Trends and Business Considerations
Fujitsu Customer Experiences Today Options Today and Beyond Q&A

1 Market Trends XP support retiring April 2012 – now 10 years old
Impact of consumerisation – gulf between the corporate platform and what users are embracing Cloud provides opportunity to do things differently Priority is to secure & protect corporate data Concurrently IT providers (customers and vendors alike) need to reduce cost of IT to business/deliver more business value Gartner Top 10 Strategic Technology Trends– 5 of top 10 relate to desktop modernisation, Cloud has dropped from 1 to 10th position possibly more an indication of a more mature understanding of the options Vendors response -Explosion of offerings -Array of options The Internet of Things – Gartner suggests strategy required mid Eg, objects such as Parking Meters communicating location and availability through 2D codes – Fujitsu examples Agricloud field sensors / Traffic Cloud turning cars into sensors - IT Enablers Sustainable solutions / Reduce energy consumption Managing users is changing – user centric All Rights Reserved, Copyright © Fujitsu Limited 2011 COMMERCIAL IN CONFIDENCE

2 Consumerisation “Can either drive IT crazy or drive IT strategy” Yankee Group Research 2011 Apple Effect (Yankee Group) Derivative Effect (Gartner) Enterprise Crowdsourcing Mobility not portability Yankee Group Research paper Source: How IT Benefits from and Enables Use of Emerging Technology Apple Effect (Yankee) – huge impact on enterprise IT depts Derivative effect (Gartner) – professional, community, family, personal = environmental change Technology vendors adapting to the new norm - driven by users Changes to support -Enterprise Crowdsourcing – new generations masters at collaboration, will use key user support/knowledgebases, changing role of help desk True mobility - user and applications/content - not tied to a specific device or OS All Rights Reserved, Copyright © Fujitsu Limited 2011 COMMERCIAL IN CONFIDENCE

3 IT’s Desktop Challenges
Reducing the cost of IT Consumerisation User trends Who’s in charge? Packaging without constraints User management, not device Cloud Technology Neophytes Reducing the cost of IT while delivering differentiation - additional business value Most organisations will typically have small IT support skill base New generation present Access Issues as no barriers to entry perception, and don’t use details - will roll out new apps without regard to issues - data loss and malware are legitimate concerns for IT providers. Rigour can be disguised eg iPhone Cloud – will be becomepoint of synchronisation Neophytes & Laggards No one solution that fits all – balance required All Rights Reserved, Copyright © Fujitsu Limited 2011 COMMERCIAL IN CONFIDENCE

4 Business Considerations
Deciding the most expedient route to desktop modernisation What services provide competitive/business advantage? What services will IT deliver and at what cost? Cloud Due Diligence Green Desktop End User Satisfaction What is most expedient route to Win7 options = on-premise – virtualisation – cloud - BYO - Gartner has seen trend to drift back to corporate PC’s where Win7 and Office 2010 have been deployed Narrowing focus to deliver on vital things What is current IT spend, what are we delivering today, are they specific to business? New end users – less tolerant – escalation Cloud Services – a lot of providers out there promoting services, apply diligence Green Desktop – use modernisation opportunity to consider how IT can contribute to energy reduction Understanding user needs intrinsic to their satisfaction All Rights Reserved, Copyright © Fujitsu Limited 2011 COMMERCIAL IN CONFIDENCE

5 Fujitsu Desktop Modernisation – Customer experience
November 2011 Copyright 2011 FUJITSU LIMITED Copyright 2010 FUJITSU LIMITED

6 Customer Experience Fujitsu’s Project Approach Migration Approaches
Customer’s Business Considerations Project Phases Business Benefits Lessons learnt XP support expires April 2014, 2½ years Customer example Win7 and Office 2010 deployment, users Complex environment: a lot of business units

7 Fujitsu’s Project Approach
8 Phased Approach Standard project approach has 6 phases, Fujitsu include Discovery and Requirements – methodology determines success Parallel streams can be run This approach suits a large project and can be scaled to fit smaller organisations All Rights Reserved, Copyright © Fujitsu Limited 2011 COMMERCIAL IN CONFIDENCE

8 Migration Approaches Big Bang Hand held Cowboy Swap Out User Initiated
Big Bang – one or several weekends. Everything needs to be in place prior. Hand held – user centric, face to face Technician, feedback looped to ensure user satisfaction Cowboy – The yahoo, bang bang bang approach! Swap out/hardware refresh – Slowest User Initiated not suit all. Fujitsu added user initiated to give power to the people who can initiate migration themselves when workload allows. Fast way, high percentage This customer used predominantly, hand held User centric business, user satisfaction paramount User Initiated All Rights Reserved, Copyright © Fujitsu Limited 2011 COMMERCIAL IN CONFIDENCE

9 Customer’s Key Considerations
Better data protection against loss or theft Extend life legacy applications Integrated secure, reliable and easy to manage desktop Increased desktop performance Key driver 1 - better data protection against loss and theft Not long before - sensitive data leaked to press thought to be through lost laptop Customer has large fleet laptops users travelling to locations where physical security not guaranteed, often have to transport laptops to dinner Data encryption paramount Key driver 2 - Extend life span of existing legacy apps - SOE XP old, holding up advances in organisations business All Rights Reserved, Copyright © Fujitsu Limited 2011 COMMERCIAL IN CONFIDENCE

10 Initial Phase Proposal was an iterative approach as requirements were settled-on progressively Discovery highlighted apps which would need testing/replacing Application Remediation initiated IE 8 user testing initiated Baseline hardware testing Customer stance: “allow everything, unless there is a security reason not to” Technical discovery – applications + hardware - Microsoft tools used Existing SOE, application portfolio already understood Discovery of apps included identification of those that required testing or remediation Existing XP SOE reduced complexity App portfolio - rationalised One version - Key task Few local administrators Tiered security model Iterative approach Windows 7 64bit = extend life Office 2010 was 32 bit to ease of migration and included Office add-ons + plug-ins Copyright 2010 FUJITSU LIMITED

11 Implementation Phase SOE build GPOs and login script remediation
BitLocker scenarios Print server drivers Application Remediation AppV infrastructure AGPM (Advanced Group Policy Management) Don’t underestimate application remediation - time line wise is longest in effort + time frames. Started soon. App remediation Existing PACKAGES testing Replace/upgrade. 16 bit apps Packaging Compatibility App Virtualisation, Microsoft‘s AppV. Desktop virtualisation – last option Microsoft’s MEDV two circumstances where this was used. One assessment - upgrade in house Other = not compatible + upgrade soon Third party tools. Didn’t need for this implementation but available for eg ChangeBaseAOK, AppDNA, Flexera. Copyright 2010 FUJITSU LIMITED

12 Release Phase Beta users, key stake holders from business
Desktop Specialists Site by Site User centric Success based predominantly on user experience and feedback Each site signed off prior to next proceeding Key task Communications plan Business involvement and informed throughout project on progress, timelines. Beta tested by stakeholders (Steering Committee) SOE tested by IT department. Desktop Specialists represented business 2-3 people per main business units 65 user pilot in all Deployment site by site, floor by floor Hand held deployment. Three hour training, machine and accounts migrated Experience: significantly more positive feedback Copyright 2010 FUJITSU LIMITED

13 Business Benefits Realised
Established integrated secure business desktop Better data protection Extended lifespan/future proof of SOE Cost effective deployment and increased performance and functionality for the business Obvious increased performance New hardware technologies in some cases 9 years newer than OS Established an SOE Secure Reliable Easy to manage Reduced RISK - accidental loss and theft Upgraded business apps future proof Outside looking in IT and Business lead. Business MORE involved in IT; decisions and direction Better relationship Copyright 2010 FUJITSU LIMITED

14 Lessons Learned Established SOE reduces complexity
Consistency of resources/knowledge retention RAM requirements Application Remediation Business involvement Project team onsite Service Desk involvement Business lead, technology followed Consistency of staff – some involved in prior XP SOE. End user perspective understood an issues known. Key challenge: Application Remediation. Single greatest piece of work, time taken and time elapsed. Don’t underestimate Start early - before implementation Key success: business involvement Decision process Testing Assisted by; early, good, thorough communication Engaged, proactive Project Executive, Involved steering committee, Desktop Specialists Business lead project; Business requirements first, technology followed Copyright 2010 FUJITSU LIMITED

15 Desktop Modernisation Today and Beyond
November 2011 Copyright 2011 FUJITSU LIMITED Copyright 2010 FUJITSU LIMITED

16 Agenda The Waves of Technology The People Vision
Migration Options for Today Evolution and Futures Virtual Client Services Mobile Device Management

17 We are entering the third wave…
Three Waves of Information Technology 1st Wave COMPUTER CENTRIC The mainframe is the information source, people need to be near the source 2nd Wave NETWORK CENTRIC Distributed computing is born allowing islands of information sources to be near where people are located We are entering the third wave… 3rd Wave PEOPLE CENTRIC Information sources exist in a controlled environment, but allow people to operate wherever they need to be Copyright 2010 FUJITSU LIMITED 17 17 All Rights Reserved, Copyright © Fujitsu Limited 2011

18 The Six Cs These six ‘C’s will drive change in IT Services… CONSOLIDATION - Better alignment and greater value from existing assets, driven by the desire for consistency and greater efficiency COMMODITISATION - Product and service becoming modular and ‘off- the-shelf’, driven by the need for greater agility and visibility of cost COLLABORATION - Web technologies and better access are driving ever greater interaction between people CONSUMERISATION - Consumer technology is overtaking business technology as the driving force of choice CONSERVATION - The need to be green, driven by ethical, reputational, regulatory and increasingly business grounds COMPLIANCE – with legislation, regulations, standards – impacting globally and locally Copyright 2010 FUJITSU LIMITED 18

19 Some Predictions (various sources)
By 2013, mobile phones will overtake PCs as the most common Web access device worldwide By 2013, 80% of businesses will support a workforce using tablets By 2014, more than three billion of the world’s adult population will be able to transact electronically via mobile and Internet technology By 2014, 90% of organizations will support corporate applications on personal devices By 2014 most mobile workers will be using their mobile phone as the primary communications device By 2014, 90% of organisations will support corporate applications on personal devices Through 2014, non iOS (i.e. non Apple OS) media tablets will take 60% of the market, but only Apple will exceed 10% market share By 2015, companies will generate 50% of Web sales via their social presence and mobile applications By 2015, 10% of your online ‘friends’ will be nonhuman Source: Fujitsu CTOs, Gartner, Ovum, IDC Copyright 2010 FUJITSU LIMITED

20 End-User Computing The Workspace Vision
All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS v2.0

21 Experience - The Workspace Vision
Workspaces become distinct and separate from back end systems enabling greater choice for users over model and form factor; content and applications are presented to software interfaces such as browsers or virtual environments. The workspace interface becomes the ‘gateway’ to the cloud. The distinction between ‘home’ and ‘work’ computing has blurred almost to obscurity, individuals choose and purchase their own technology and use it to access business and personal services accordingly – enjoying the best possible experience through doing so. The interface becomes ubiquitous; people access services regardless of where they are or what device they use and their context, such as location, is known and understood by the systems they access which respond accordingly. Types and styles of interaction between humans and computers (such as touch and movement) proliferate as new technology becomes available. The term ‘information worker’ loses its white collar implication – everybody is an information worker, because everybody has the means to consume information. Devices - consumer oriented and independent from core systems, from location and from context The ‘Devices Vision’ is about experience – creating a better experience for people through technology. Experience will be increased not only by a range of exciting new technologies but particularly by giving people the choice to use these technologies. This vision is about enabling and taking advantage of choice while removing the constraints which hold this back. A key concept in the Devices Vision is access. People needing to and having greater access to information and applications and the growth of possibilities in terms of : Where - work, home or on the move with your location becoming embedded into your transactions. When – the blurring or work and leisure time and the move towards an ‘always on’ mindset. What – computing devices are everywhere, in your car, in your white goods, even in your clothes. While some commentators talk about convergence to a single device, we think this is unlikely. Of course, some devices will prove more popular than others, but the trend is towards innovation, divergent technologies and device proliferation. Device independent applications (such as virtualisation) further drive this. 21 Copyright 2010 FUJITSU Copyright 2009 Fujitsu Services Limited Copyright 2009 Fujitsu Services Limited 21

22 Overarching Trends Copyright 2009 Fujitsu Services Limited

23 Desktop Roadmap The roadmap for desktop reflects how we will deliver services in the desktop space as we move into the future. The roadmap has been divided into two streams, Platform describing hardware, OS and personal applications and Service describing desktop services. The Platform stream illustrates a short term increase in virtualisation of platform and apps leading to a device that is independent of ‘back end’ systems and the consumerisation of the business device. In the medium term, the popularity of online spaces where people can store and collaborate over material and information that would once have been stored locally. In the longer term a move towards new interactive technology (3D, tactile, touch etc.) and to ubiquitous computing technology. The Service stream illustrates, in the short term, the continued standardisation of service and a move to include both social software technologies in desktop services as well as move to support virtual rather than physical workspaces. In the medium term, high street and cloud services are incorporated into the desktop service. Business desktop services evolve to focus much more on the security and authentication services while looking to broker different sources for all other components of the desktop service, such as hardware maintenance. Greater innovation will lead to a growth in niche services in the longer term, for example supporting new platform technologies. Copyright 2009 Fujitsu Services Limited Copyright 2009 Fujitsu Services Limited 23

24 End-User Computing Evolution and Futures
All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS v2.0 COMMERCIAL IN CONFIDENCE

25 End-User Computing Evolution
There are three distinct evolutions in the EUC space that impact elements of the EUC market Hardware Software Workspaces

26 End-User Computing Hardware Evolution
2000 2010 Beyond Multiple proprietary unconnected devices Multiple proprietary connected devices Converged, high definition cloud enabled devices Fujitsu End-User Computing Services

27 End-User Computing Software Evolution
2000 2010 Beyond Office365 Marketplaces Microsoft dominated locally installed software Multi-vendor local and cloud installed software Open source and standard cloud software Fujitsu End-User Computing Services

28 End-User Computing Workspace Evolution
2000 2010 Beyond 4G 3G Centralised office workspaces Centralised office workspaces with limited flexible working Flexible workspaces Fujitsu End-User Computing Services

29 Fujitsu Workspace Evolvement

30 Virtual Client Services
End-User Computing Virtual Client Services All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS v2.0

31 Have we been here before?
Worldwide hosted virtual desktop (HVD) market will reach 49 million units in 2013, more than 40% of the professional PC market HVD adoption is likely to be rapid during the next three to five years, particularly in mature markets where existing data centre and network infrastructures will be used to offset the cost of entry 15% of current worldwide traditional professional desktop PCs will migrate to HVDs by 2014 Lets start with what the market trends are. Industry analysts such as gartner, idc and forrester have all been saying for at least the past twelve months that desktop virtualisation is going to be big and is going to change the way desktops are delivered and managed in organisations. In 2007, gartner were saying that from 2008 desktop deployments should be based on hosted virtualisation approaches, with all new desktop deployments from the second half of 2008 taking advantage of such desktop virtualisation technologies. The truth is that the uptake of desktop virtualisation has not been as rapid as Gartner initially predicted. This is due to the inherent complexities of desktop environments and the cultural change end-users need to undergo to depart from their physical desktop, the high upfront Capex costs potentially required to replace desktops with thin clients, and the immaturity and lack of support for existing technologies (such as video redirection, mobile users, and voice and video desktop conferencing). The analysts have now changed tack and are predicting this mass uptake to occur over the coming five years with 40% of the total market in 2013 being virtualised and 15% of existing desktops being migrated to virtualised platforms. So what technology trends are driving this.

32 Desktop virtualisation
Server and storage virtualisation are well established Desktop virtualisation has yet to achieve same levels of acceptance Estimated at less than 1% of 550m business PCs (Source: Ovum, 2010) CITRIX lead the market – estimated at 90% market share Expected benefits Concerns / blockers Research of 100 private sector clients – over 2k employees Bears out our experience with clients in all sectors Source: Fujitsu research, Sept 2010 Benefits well understood – challenge is about how to make it happen successfully Copyright 2010 FUJITSU LIMITED

33 Copyright 2007 FUJITSU LIMITED
Role-based Services Segmenting user requirements Mobile Worker Office Worker Task/Blue Collar Worker Contract/ Offshore Worker Developers Power User Sales, Consultants Mobile Access Remote Access Flexibility Standard Applications Local data storage HR, Legal Connected clients Static access Personalized Desktop Central data storage Call center, accounting Connected clients Limited Set of Software Low Cost Central data storage External contractors Non-corporate clients Security Standard applications Central data storage SW developers Connected Clients Performance High personalization Local and central data storage Role based services describes our ethos of evaluating the customer‘s environments proactively in search for a perfect fit between user requirements and the best choice for our full range DTO products and services. This matching depends on the numerous factors of the customer‘s environment. We take all these factors into consideration when designing our customer solutions to ensure the optimal fit. Rich Client Cloud Based Desktop Thin/Zero Client Cloud Based Desktop Rich Client 33 Copyright 2007 FUJITSU LIMITED 33

34 Application Assessment
An Application Assessment is crucial to understand the proportion of the customers application estate that can be delivered by a given application delivery frameworks, including: Microsoft App-V; VMware ThinApp; Altiris SVS An Application Compatibility Report will provide a good insight as to how much remediation effort that might be required to move an application to a new operating system such as: Windows7; Server 2008 R2; 64bit COMMERCIAL IN CONFIDENCE - FUJITSU EYES ONLY

35 Virtual Client Computing
Modular Approach Integrate with existing desktop environments Choice of platforms for users, applications and functions Choosing the best fit Cost / Performance / Functionality Leverages the same IaaS Platform providing simplified service integration or co-location Ability to provide a device agnostic policy to employees Fujitsu Trusted Cloud Application Virtualisation App 4 App 4 HVD VDI Traditional App 1 App 2 SOE SOE CITRIX Receiver App 1 App 2 Hardware agnostic endpoints Dedicated hardware Physical Endpoints

36 Mobile Device Management
End-User Computing Mobile Device Management All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS v2.0

37 Mobile Overview Smartphones and Tablets have changed the requirements for mobile device security and management... Fujitsu have developed a range of enterprise level Mobile Device Management (MDM) solutions and services in response. 2 2 Copyright 2011 FUJITSU

38 Service overview Fujitsu Managed Mobile offering automates and eases the management of the most popular device platforms across your mobile infrastructure All Rights Reserved, Copyright © Fujitsu Limited 2011

39 Key mobile enterprise market trends
CEO Employee Partner DEVICE Any and All APPLICATIONS Ever Increasing NETWORK Any Connection to Enterprise + + DATA (Corporate IP) SMARTPHONE GROWTH AND ENTERPRISE ADOPTION In Q the number of smartphone shipments surpassed PC shipments for the first time, up 87 per cent. In Q European PC shipments down 21% whereas smartphone sales grow 74% in second quarter of 2011 By year-end 2012, over 75% of enterprise mobile users will have a smartphone CONSUMERIZATION OF IT Previously, our customers supported a limited number of smartphones through well-defined requirements, standardised on only a one type of devices. Today, users are becoming more advanced and autonomous demanding to use the newest devices and devices they bought for use. Personal – liable versus Company liable Devices total of 20% of devices used for business purposes by employee owned employees By 2014, 90% of organizations will support corporate applications on personal devices. Within the coming months our customers will be forced to alter their client computing strategies because of the “bring your own device” (BYOD) workforce’s overwhelming requests to support smartphones and tables and the significant business improvements and TCO efficiencies in offers. APPLICATIONS 49% will support more mobile applications for out-of-office users and 47% will support more mobile devices-smartphones over the next 12 months, Forrester As the adoption of smartphones and tablets continue to grow in enterprise and the number of enterprise smartphone users show double digit growth rates we see that mobile devices are rapidly becoming our customer’s computing platform of choice. The security challenge: Anywhere, Anytime, Not By Anyone How to secure devices, networks and enterprises Copyright 2010 FUJITSU

40 Which Mobile Platform? Smartphone market is dominated by iOS, Android and Blackberry Generally speaking iOS is more enterprise ready than Android for the following reasons The Apple App Store follows a certification process that provides a barrier against malware threats within published apps, the Android store does not follow this approach iOS devices have hardware based encryption built-in, allowing for remote wipe and wipe on failure of passcodes as standard A mobile device management layer is still required to sit on top of any mobile device for added security and protection in the enterprise Lets start with what the market trends are. Industry analysts such as Gartner, IDC and Forrester have all been saying for at least the past twelve months that desktop virtualisation is going to be big and is going to change the way desktops are delivered and managed in organisations. In 2007, Gartner were saying that from 2008 desktop deployments should be based on hosted virtualisation approaches, with all new desktop deployments from the second half of 2008 taking advantage of such desktop virtualisation technologies. The truth is that the uptake of desktop virtualisation has not been as rapid as Gartner initially predicted. This is due to the inherent complexities of desktop environments and the cultural change end-users need to undergo to depart from their physical desktop, the high upfront Capex costs potentially required to replace desktops with thin clients, and the immaturity and lack of support for existing technologies (such as video redirection, mobile users, and voice and video desktop conferencing). The analysts have now changed tack and are predicting this mass uptake to occur over the coming five years with 40% of the total market in 2013 being virtualised and 15% of existing desktops being migrated to virtualised platforms. So what technology trends are driving this.

41 Gartner ranks Zenprise #1
14 Copyright 2011 FUJITSU

42 Copyright 2011 FUJITSU LIMITED
Close - Q&A Experience Lab Copyright 2011 FUJITSU LIMITED COMMERCIAL IN CONFIDENCE

43 Copyright 2010 FUJITSU LIMITED


Download ppt "Market Trends XP support retiring April 2012 – now 10 years old"

Similar presentations


Ads by Google