Presentation is loading. Please wait.

Presentation is loading. Please wait.

0 Agenda Market Trends and Business Considerations Fujitsu Customer Experiences Today Options Today and Beyond Q&A.

Similar presentations


Presentation on theme: "0 Agenda Market Trends and Business Considerations Fujitsu Customer Experiences Today Options Today and Beyond Q&A."— Presentation transcript:

1 0 Agenda Market Trends and Business Considerations Fujitsu Customer Experiences Today Options Today and Beyond Q&A

2 Market Trends 1 All Rights Reserved, Copyright © Fujitsu Limited 2011

3 Consumerisation Can either drive IT crazy or drive IT strategy Yankee Group Research 2011 Apple Effect (Yankee Group) Derivative Effect (Gartner) Enterprise Crowdsourcing Mobility not portability 2 All Rights Reserved, Copyright © Fujitsu Limited 2011

4 ITs Desktop Challenges Reducing the cost of IT Consumerisation User trends Whos in charge? Packaging without constraints User management, not device Cloud Technology Neophytes 3 All Rights Reserved, Copyright © Fujitsu Limited 2011

5 Business Considerations Deciding the most expedient route to desktop modernisation What services provide competitive/business advantage? What services will IT deliver and at what cost? Cloud Due Diligence Green Desktop End User Satisfaction 4 All Rights Reserved, Copyright © Fujitsu Limited 2011

6 November 2011 Fujitsu Desktop Modernisation – Customer experience Copyright 2011 FUJITSU LIMITED

7 6 Customer Experience Fujitsus Project Approach Migration Approaches Customers Business Considerations Project Phases Business Benefits Lessons learnt

8 Fujitsus Project Approach 8 Phased Approach 7 All Rights Reserved, Copyright © Fujitsu Limited 2011

9 Migration Approaches 8 All Rights Reserved, Copyright © Fujitsu Limited 2011 Big Bang Hand held Cowboy Swap Out User Initiated

10 Customers Key Considerations Better data protection against loss or theft Extend life legacy applications Integrated secure, reliable and easy to manage desktop Increased desktop performance 9 All Rights Reserved, Copyright © Fujitsu Limited 2011

11 Initial Phase Proposal was an iterative approach as requirements were settled-on progressively Discovery highlighted apps which would need testing/replacing Application Remediation initiated IE 8 user testing initiated Baseline hardware testing Customer stance: allow everything, unless there is a security reason not to

12 Implementation Phase SOE build GPOs and login script remediation BitLocker scenarios Print server drivers Application Remediation AppV infrastructure AGPM (Advanced Group Policy Management)

13 Release Phase Beta users, key stake holders from business Desktop Specialists Site by Site User centric Success based predominantly on user experience and feedback Each site signed off prior to next proceeding

14 Business Benefits Realised Established integrated secure business desktop Better data protection Extended lifespan/future proof of SOE Cost effective deployment and increased performance and functionality for the business

15 Lessons Learned Established SOE reduces complexity Consistency of resources/knowledge retention RAM requirements Application Remediation Business involvement Project team onsite Service Desk involvement Business lead, technology followed

16 November 2011 Desktop Modernisation Today and Beyond Copyright 2011 FUJITSU LIMITED

17 16 Agenda The Waves of Technology The People Vision Migration Options for Today Evolution and Futures Virtual Client Services Mobile Device Management

18 17 All Rights Reserved, Copyright © Fujitsu Limited 2011 Three Waves of Information Technology We are entering the third wave… 1st Wave COMPUTER CENTRIC The mainframe is the information source, people need to be near the source 2nd Wave NETWORK CENTRIC Distributed computing is born allowing islands of information sources to be near where people are located 3rd Wave PEOPLE CENTRIC Information sources exist in a controlled environment, but allow people to operate wherever they need to be Copyright 2010 FUJITSU LIMITED 17

19 The Six Cs These six Cs will drive change in IT Services… CONSOLIDATION - Better alignment and greater value from existing assets, driven by the desire for consistency and greater efficiency COMMODITISATION - Product and service becoming modular and off- the-shelf, driven by the need for greater agility and visibility of cost COLLABORATION - Web technologies and better access are driving ever greater interaction between people CONSUMERISATION - Consumer technology is overtaking business technology as the driving force of choice CONSERVATION - The need to be green, driven by ethical, reputational, regulatory and increasingly business grounds COMPLIANCE – with legislation, regulations, standards – impacting globally and locally Copyright 2010 FUJITSU LIMITED 18

20 Some Predictions (various sources) By 2013, mobile phones will overtake PCs as the most common Web access device worldwide By 2013, 80% of businesses will support a workforce using tablets By 2014, more than three billion of the worlds adult population will be able to transact electronically via mobile and Internet technology By 2014, 90% of organizations will support corporate applications on personal devices By 2014 most mobile workers will be using their mobile phone as the primary communications device By 2014, 90% of organisations will support corporate applications on personal devices Through 2014, non iOS (i.e. non Apple OS) media tablets will take 60% of the market, but only Apple will exceed 10% market share By 2015, companies will generate 50% of Web sales via their social presence and mobile applications By 2015, 10% of your online friends will be nonhuman 19 Source: Fujitsu CTOs, Gartner, Ovum, IDC

21 The Workspace Vision End-User Computing All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS v2.0

22 Experience - The Workspace Vision Workspaces become distinct and separate from back end systems enabling greater choice for users over model and form factor; content and applications are presented to software interfaces such as browsers or virtual environments. The workspace interface becomes the gateway to the cloud. The distinction between home and work computing has blurred almost to obscurity, individuals choose and purchase their own technology and use it to access business and personal services accordingly – enjoying the best possible experience through doing so. The interface becomes ubiquitous; people access services regardless of where they are or what device they use and their context, such as location, is known and understood by the systems they access which respond accordingly. Types and styles of interaction between humans and computers (such as touch and movement) proliferate as new technology becomes available. The term information worker loses its white collar implication – everybody is an information worker, because everybody has the means to consume information. 21 Copyright 2010 FUJITSU

23 22 Overarching Trends

24 23 Desktop Roadmap

25 Evolution and Futures End-User Computing All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS v2.0

26 End-User Computing Evolution There are three distinct evolutions in the EUC space that impact elements of the EUC market Hardware Software Workspaces 25

27 End-User Computing Hardware Evolution Beyond Fujitsu End-User Computing Services Multiple proprietary unconnected devices Multiple proprietary connected devices Converged, high definition cloud enabled devices

28 Beyond Fujitsu End-User Computing Services Office365 Microsoft dominated locally installed software Multi-vendor local and cloud installed software Open source and standard cloud software End-User Computing Software Evolution Marketplaces

29 Beyond Centralised office workspacesCentralised office workspaces with limited flexible working Flexible workspaces 4G 3G End-User Computing Workspace Evolution Fujitsu End-User Computing Services

30 Fujitsu Workspace Evolvement

31 Virtual Client Services End-User Computing All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS v2.0

32 Worldwide hosted virtual desktop (HVD) market will reach 49 million units in 2013, more than 40% of the professional PC market HVD adoption is likely to be rapid during the next three to five years, particularly in mature markets where existing data centre and network infrastructures will be used to offset the cost of entry 15% of current worldwide traditional professional desktop PCs will migrate to HVDs by 2014 Have we been here before?

33 Desktop virtualisation Server and storage virtualisation are well established Desktop virtualisation has yet to achieve same levels of acceptance Estimated at less than 1% of 550m business PCs (Source: Ovum, 2010) CITRIX lead the market – estimated at 90% market share Source: Fujitsu research, Sept 2010 Expected benefitsConcerns / blockers Benefits well understood – challenge is about how to make it happen successfully

34 Role-based Services Segmenting user requirements Rich ClientCloud Based DesktopThin/Zero ClientRich Client Mobile Worker Sales, Consultants Mobile Access Remote Access Flexibility Standard Applications Local data storage Sales, Consultants Mobile Access Remote Access Flexibility Standard Applications Local data storage Office Worker HR, Legal Connected clients Static access Personalized Desktop Central data storage HR, Legal Connected clients Static access Personalized Desktop Central data storage Task/Blue Collar Worker Call center, accounting Connected clients Limited Set of Software Low Cost Central data storage Call center, accounting Connected clients Limited Set of Software Low Cost Central data storage Contract/ Offshore Worker External contractors Non-corporate clients Security Standard applications Central data storage External contractors Non-corporate clients Security Standard applications Central data storage Developers Power User SW developers Connected Clients Performance High personalization Local and central data storage SW developers Connected Clients Performance High personalization Local and central data storage 33 Cloud Based Desktop

35 Application Assessment An Application Assessment is crucial to understand the proportion of the customers application estate that can be delivered by a given application delivery frameworks, including: Microsoft App-V; VMware ThinApp; Altiris SVS An Application Compatibility Report will provide a good insight as to how much remediation effort that might be required to move an application to a new operating system such as: Windows7; Server 2008 R2; 64bit

36 Virtual Client Computing Modular Approach Integrate with existing desktop environments Choice of platforms for users, applications and functions Choosing the best fit Cost / Performance / Functionality Leverages the same IaaS Platform providing simplified service integration or co-location Ability to provide a device agnostic policy to employees Fujitsu Trusted Cloud HVD VDI Traditional SOE App 1 App 2 Application Virtualisation CITRIX Receiver Physical Endpoints App 4 App 1 App 2 Hardware agnostic endpointsDedicated hardware

37 Mobile Device Management End-User Computing All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS v2.0

38 Mobile Overview 2 2 Copyright 2011 FUJITSU Smartphones and Tablets have changed the requirements for mobile device security and management... Fujitsu have developed a range of enterprise level Mobile Device Management (MDM) solutions and services in response.

39 38 All Rights Reserved, Copyright © Fujitsu Limited 2011 Fujitsu Managed Mobile offering automates and eases the management of the most popular device platforms across your mobile infrastructure Service overview

40 DATA (Corporate IP) Key mobile enterprise market trendsDEVICE Any and AllAPPLICATIONS Ever Increasing CEOPartnerEmployee The security challenge: Anywhere, Anytime, Not By Anyone How to secure d evices, networks and enterprises

41 Which Mobile Platform? Smartphone market is dominated by iOS, Android and Blackberry Generally speaking iOS is more enterprise ready than Android for the following reasons The Apple App Store follows a certification process that provides a barrier against malware threats within published apps, the Android store does not follow this approach iOS devices have hardware based encryption built-in, allowing for remote wipe and wipe on failure of passcodes as standard A mobile device management layer is still required to sit on top of any mobile device for added security and protection in the enterprise

42 Gartner ranks Zenprise #1 14 Copyright 2011 FUJITSU

43 Close - Q&A Copyright 2011 FUJITSU LIMITED 42

44 Copyright 2010 FUJITSU LIMITED 43


Download ppt "0 Agenda Market Trends and Business Considerations Fujitsu Customer Experiences Today Options Today and Beyond Q&A."

Similar presentations


Ads by Google