Legal Disclaimers 1 Copyright © 2009 Intel Corporation

Slides:



Advertisements
Similar presentations
Virtual Disk based Centralized Management for Enterprise Networks
Advertisements

3rd Generation Intel ® Core vPro Processor The Business Case [Presenter:] [Title:] [Date:]
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
©2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Speaker Name—Title Date the future.
Reduce Cost & Complexity Partner logo here Presenters Name (16pt) Presenters Title (14pt) Company/ (14pt) Manage and Deploy Applications using Virtualization.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Wyse.com 2010 Cameron Smith Sales Engineer for IN, KS, and MO Desktop Virtualization.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
The future of Desktops Transform Your Desktop with Virtualization.
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
Jeff Patton & Doug Whiteley It Service Group IT Roundtable July 15 th, 2009 Thin Clients & Terminal Services.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Desktop Computing Strategic Project Sandia National Labs May 2, 2009 Jeremy Allison Andy Ambabo James Mcdonald Sandia is a multiprogram laboratory operated.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Ask a question via #uktechdays or text Microsoft to What is the Optimised Desktop? Does one size fit all? Some vendors would lead you to think.
Desktop Virtualisation Sarah Mannion Desktop Technical Specialist Microsoft UK
March 2010 Zero Client Maximum Savings, Maximum Flexibility Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS.
Microsoft Virtual Server 2005 Product Overview Mikael Nyström – TrueSec AB MVP Windows Server – Setup/Deployment Mikael Nyström – TrueSec AB MVP Windows.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Intel ® Server Platform Transitions Nov / Dec ‘07.
Rob Hwacinski Sr. Program Manager Lead Microsoft Corporation WEM206 Ashwin Kulkarni Sr. Product Manager Microsoft Corporation.
Ran Oelgiesser, Sr. Product Manager Praveen Vijayaraghavan, Program Manager (Virtual PC) Yigal Edery, Group Program Manager (MED-V)
Wally Mead Senior Program Manager Microsoft Corporation.
XD 5.6 Overview. XenDesktop 5.6 Main Focus = Integration of personal vDisk Features Support for Microsoft SCVMM 2012 and SCCM 2012 Updated Citrix License.
Effectively Explaining the Cloud to Your Colleagues.
Virtual Desktops and Flex CSU-Pueblo Joseph Campbell.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Delivering the Optimized Desktop Presented by Danny Beck, Leon Booth and Jeff Johnson.
Microsoft Desktop Virtualization 1 Martin Vittrup Senior Technology Specialist Windows Client Microsoft Denmark.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Workstation Virtualization Nicholas A. Hay Technology Coordinator Jefferson Schools
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Basic Concepts Of CITRIX XENAPP.
Remote Desktop Experience Russel Wilkinson Staff Systems Engineer Enterprise Desktop Solutions VMware, Inc.
Enterprise Platforms & Services Division (EPSD) JBOD Update October, 2012 Intel Confidential Copyright © 2012, Intel Corporation. All rights reserved.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Copyright © 2006 Intel Corporation. WiMAX Wireless Broadband Access: The World Goes Wireless Michael Chen Director of Product & Platform Marketing Group.
Recognizing Potential Parallelism Introduction to Parallel Programming Part 1.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
The Drive to Improved Performance/watt and Increasing Compute Density Steve Pawlowski Intel Senior Fellow GM, Architecture and Planning CTO, Digital Enterprise.
V-Alliance Solution Overview Years of Business Success.
Boxed Processor Stocking Plans Server & Mobile Q1’08 Product Available through February’08.
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
Desktop Virtualization Joshua Bradfield Dan Bacus Data Center Solutions Manager Sr. Engineer.
Adam Hall Technology Strategist Gavin Bennett Systems Engineer – Citrix NZ Session Code: SVR309.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
David Kim Product Manager CLI306 Industry Trends Windows Vista Enterprise Flexible Desktop Computing Options Windows Vista Enterprise Centralized Desktop.
Benjamin Naden Windows Client Group Manager, Microsoft Singapore.
Hands-On Virtual Computing
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
Service Pack 2 System Center Configuration Manager 2007.
INTEL CONFIDENTIAL Intel® Smart Connect Technology Remote Wake with WakeMyPC November 2013 – Revision 1.2 CDI/IBP #:
Virtualization Vitalis Konopelec Technology Solution Professional Microsoft Slovakia s.r.o.
VDI Cyber Range Technical Requirements
Windows Server* 2016 & Intel® Technologies
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Many-core Software Development Platforms
SQL Server 2012 Licensing Overview.
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
12/26/2018 5:07 AM Leap forward with fast, agile & trusted solutions from Intel & Microsoft* Eman Yarlagadda (for Christine McMonigal) Hybrid Cloud – Product.
Intel Active Management Technology
Microsoft Virtual Academy
Agenda The current Windows XP and Windows XP Desktop situation
Expanded CPU resource pool with
Presentation transcript:

Legal Disclaimers 1 Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS. Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE).  The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. 1

Evaluating Thin Clients & Alternative Compute Models Chee Pung Loy Intel Americas Channel Solutions Account Manager October 2009

Stay Connected Intel Premier IT Professional (IPIP) Program 14 events in US & Canada Analyst presentations & whitepapers Intel technology roadmap Intel IT best practices ISV presentations Participate in online social media Download up-to-date technical resources Exclusive Magazine Monthly Newsletter Members Only Website Events & Networking Purpose: Sharing best practices with the IT community. Audience: All IT Managers/Tech Enthusiast, regardless of company size Subscribe today. It’s FREE! 3

Evaluating Thin Clients & Alternative Compute Models IT Business Perspective Different compute models Future Perspective Ecosystem & Intel

IT Business Challenges Business Responsiveness Flexibility and agility to deliver applications depending on location and device Growing Complexity and TCO Budgetary pressure to cut operating expenses Business Continuity High availability and accessibility of applications, data, collaboration Executive Challenges Improve Security and Simplify Management Minimize risk, streamline operations

IT Under Pressure: Response Pain Points Growing complexity and TCO Budgetary pressure to cut costs Business Continuity Highly availability and accessibility of applications, data, collaboration Improve Security and Simplify Manageability Minimize risk and streamline operations Business Responsiveness Flexibility and agility to deliver applications and data Response Drive for Centralized Control Via… New Software and Data Delivery Models + Improved Client Management and Security Capabilities IT is under pressure from factors that are well-understood. Cost control, security, compliance and other issues, combined with improvements in technology, are inspiring IT managers to question the status quo of how software is deployed and making centralization very appealing. Getting control of the issues will likely involve a combination of several efforts, including new ways to deliver and manage client software, as well as improving the management and security capabilities of their client devices. The Dynamic Virtual Client 6

Lets look at what Gartner has found “The total cost of ownership of server-based computing is from 12 percent to 48 percent less than for comparable PCs.” - Gartner, June 2006

Gartner’s Path to 48% TCO Reduction from an Unmanaged Desktop Unmanaged Windows* XP Desktop Typically Managed Windows XP Desktop Well-Managed Windows XP Desktop Windows-Based Terminal (32-Bit) Windows-Based Terminal (64-Bit) Start -15% Reduction from better mgmt: 40% -25% -7% Reduction from server-based model: 8% -1% Total: 48% TCO Reduction *Other names and brands may be claimed as the property of others.

Adoption of Virtualization and Streaming “In the future, IDC believes that application virtualization and streaming technology will become an increasingly common way for many IT organizations to deploy and manage applications.“ --Mike Rose, IDC “A NEW information technology discipline is emerging around application delivery to control desktop management costs and security… the next generation of delivery is application streaming.” --Martin Gilliland, Gartner Source: IDC, 2008 Enterprises are Seeking New Application Delivery Methods

Spectrum of Compute Models Server-Side Compute & Centralized Data Storage Client-Side Compute, Centralized Data Storage Client-Side Compute & Centralized or Local Data Storage Virtual Container Virtual Containers (Emerging) Mobile Capable Off-Network Option App Streaming Local, Rich Client App Streaming/ Virtualizaton Distributed, Rich Client Web-Based Apps OS+App Streaming Web-Based Apps OS+App Streaming Network Connected Only There is a wide range of compute and software delivery models available today, each with its own merits and limitations. This view breaks out the spectrum along the vectors of mobility (vertical axis) and where the computation takes place (horizontal axis). If the target user segment needs off-network mobility, then the only two options are Application Streaming and Local Rich Client. If off-network mobility is not a requirement, then all the listed models are an option and should be weighed based on several factors discussed on the next slide. In general, our view is that the client-side models provide the best user experience and greatest software compatibility. If centralization is required or desirable, the streaming models provide the best balance of centralized security and management, as well as the responsiveness of local execution. In most cases, streaming technologies do not require the same level of infrastructure build-out as server-side models. Terminal Services Virtual Hosted Desktop 1:Many Blade PC Terminal Services Virtual Hosted Desktop 1:Many Blade PC 1:1 Blade PC 1:1 Blade PC

Virtual Container Video

What is the Right Solution for My Business ? IT Requirements Security Image Management License Management Support Structure Disaster Recovery User Experience Mobility Responsiveness Customization Connectivity Ownership and Privacy Evaluate for Each User Segment Available Infrastructure Servers Storage Space, Power, Cooling Network Bandwidth Budget Priorities Application Workloads Compute Load Graphics Load Delay Sensitivity (i.e., Video, VOIP) Headroom All these factors must be considered when choosing the right compute or software delivery model. Excessive focus on only one vector will likely result in a sub-optimal solution. IT Requirements are standard IT concerns….security, mgmt, business continuity, image management, etc. Available Infrastructure refers to the hardware, connectivity and bandwidth at the company’s disposal to deliver the compute model. If the infrastructure is not in place to support a particular compute model, it must be purchased and installed or another model should be chosen. User Experience is the workflow needs of the system’s user. This included the need for mobility and performance. In many cases, either by custom or law, users have an expectation that the device may be used for some personal tasks, which may result in personally identifiable information being on the system. These issues of “ownership” and privacy should be considered. Application Workload is the compute and graphics demands of the applications the user will be running. Some applications may be intolerant of network delays, such as VOIP or streamed video. Headroom for future application growth should also be considered. Appropriate Solution is a Balance of Many Interrelated Factors 12

Construction Estimator Call Center Representative Mixed Delivery Models Often Required to Meet All User and IT Requirements Construction Estimator University Student Marketing Staffer Call Center Representative Terminal Services Scheduling database Purchasing database Order database Virtual Hosted Desktop Remote access to standard dept image Streaming Technology CAD package Course-specific applications Photo & video editing packages Local Install Office apps, Browser Office apps, Browser, Media players Appropriate Device Laptop PC Laptop or Desktop PC Desktop PC or Thin terminal For all but the call center representative, a mix of compute models is best to deliver all their requirements, provide the management and security IT needs, and work within the infrastructure constraints. When a mix of server-side and client-side models is needed, a PC is the best device for the job. Thin terminals are only appropriate for the case when a 100% server-side model makes sense.

Real World Solutions May Mix Models Diverse user and IT needs will likely result in hybrid models Same user accesses software through multiple models 100% single-model deployments may be rare Single model may make sense when security, management and workload requirements are unlikely to change over time Selected client devices should accommodate the most demanding requirements of target users Desktop & laptop PCs provide most flexibility for all models Thin terminals appropriate for 100% server-side deployments In most real-world cases, users may actually use multiple models to access different software applications. They may use a mix of local, server-side and streamed models, depending on the business need. Here at Intel, our applications are delivered in many ways. Since a mix of models is likely, the requirements of the most demanding model set the bar for the client device. Any significant local processing is a good sign that a PC is the best device. If a 100% server-side model is called for, as they are in some niches, thin terminals will make sense.

Compute Model Taxonomy Terminal Services (aka Session Virtualization) Virtual Hosted Desktops (aka Virtual Desktop Infrastructure) OS and Application Streaming Application Streaming (aka Application Virtualization) Virtual Containers Rich, Distributed Computing (aka Rich Client, Fat Client) Execution Server-based Client-based Application Executable Storage Server Server (Client caching option) Server (Client caching option) Client Application Data Storage Server, NAS or SAN Server, NAS or SAN (Client caching option) Client, Server, NAS or SAN Mobility / Off-Network Operation No Yes Local Device Synchronization (bar code reader, PDA, phone, etc.) Limited Acceptable Clients Terminal, Desktop PC, Laptop PC Desktop PC, Laptop PC Major Providers Citrix*, Microsoft* VMware*, Citrix Citrix Microsoft, Citrix, LANDesk*, Altiris*, AppStream* VMWare vClient* Microsoft Med-V* Traditional PC software providers NAS = Network Attached Storage SAN = Storage Area Network *Other names and brands may be claimed as the property of others.

Intel® vPro™ Technology Processor Chipset Network Intel® Core™2 Duo Intel® Core™2 Quad Intel® Express Chipset Intel® Gigabit Network Intel® Anti-Theft Technology Intel® Active Management Technology Intel® Virtualization Technology Intel® Trusted Execution Technology But, what exactly is vPro™? Intel® vPro Technology is “IT” embedded into the HW platform… vPro™ combines POWERFUL processor, chipset, networking silicon features along with FLASH to deliver a full tamper resistant solution when combined with EXISTING ISV consoles Component Highlights: Processor: New 45 nm Intel® Core™ 2 Duo processors can deliver up to 39% performance improvement over last generation (Source: Sysmark 2007 when comparing E8400 with E6550) Improved Power Savings - Deeper sleep states Virtualization & Security Technologies – Secure the platform Chipset & LAN: New Intel® Q45 Express Chipset supports the latest manageability capabilities even outside the firewall Enhanced manageability in secure networks Energy Star support & lower idle power vPro™‘s embedded capabilities DELIVER Security & Manageability on a chip Intel vPro Technology: Virtualization, Security, and Management 16 16 16

Intel® vPro™ Technology Intel® Anti-Theft Technology Intel® Virtualization Technology Intel® Trusted Execution Technology Intel® Active Management Technology Clients Trusted Platform Protection Areas Protection from within Streaming Server Master OS image Master Apps image Protection from outside Local OS Virtual Container Virtualization Partition 1 Partition n App App App App Guest OS Guest OS Protection between partitions Partition Manager Hardware Virtual Containers System Protection Physical hardware protection Secured Virtualization for New Compute Models 17

Intel® vPro™ Technology Intel® Anti-Theft Technology Intel® Virtualization Technology Intel® Trusted Execution Technology Intel® Active Management Technology OS Streaming or Remote OS Boot Application streaming & virtualization Virtual Containers Clients Virtualization Virtual Application Local OS Virtual Container Enhanced Security and Manageability for New Compute Models 18

Summary Software delivery models have evolved and IT has more choices than ever The appropriate compute model for a user segment is a balance of many factors Optimization of IT and User needs will likely result in a mix of delivery models, even within a single user segment PCs with Intel® vPro™ and Centrino® Pro processor technology are the most manageable, secure PCs on which to deliver all compute models

Thank you.

Backup

Rich or Thin? It’s No Longer a Binary Decision Mobile Capable Off-Network Option Managed Rich Client DT & NB clients Dynamic Virtual Client Centralized apps and data Thin Client Terminal Network Connected Only It used to be a binary decision Server Compute Centralized Management Centralized Data Storage Client Compute Centralized Management Centralized and Local Data Storage Options Client Compute Centralized and Local Data Storage Options 22 22

Intel’s Dynamic Virtual Client (DVC) Clients Network Server On-Demand Delivery Data Synchronization Local OS Virtual Container Virtualization Virtualization Virtual Application OS Streaming or Remote OS Boot Streaming Server Master OS image Master Apps image Virtual Containers Application Streaming & Virtualization OS Streaming Simplified centralized workplace management (applications and data) Improved security Rich client performance and experience with mobile capabilities A Family of Compute Models Based On Streaming and Virtualization

DVC Solutions and Intel® vPro™ Technology Enabling Compute Model Intel® vPro™ Technology Link Status Microsoft SCCM R2* + App-V 4.5 App virtualization App-V now enabled to use Intel® vPro™ technology secure managementt link to push an update to a locally-cached, virtualized app regardless of OS state along with license management using TPDS Shipping Symantec Workspace Virtualization* v6.1 SP1 App streaming/ virtualization SWS can write app licensing and usage information into vPro technology’s non-volatile memory. Info can be read OOB and used to make optimal license purchasing decisions. Mobility SDK support provided Q2’09 Lenovo Secure Managed Client* (SMC) Remote OS boot SMC uses a thin, Intel® Virtualization Technology-enabled VMM to redirect storage from the local disk to a SAN. SMC clients are Lenovo M-Series* vPro technology desktops v1.2 (US release May’09) Global GA –Q3/09 Dell On-Demand* Desktop Streaming (ODDS) OS Streaming Dell has bundled Citrix PVS* (OS streaming) with diskless vPro technology desktops for a turnkey solution Citrix Provisioning Server* for Desktops v5.0 also integrated into Citrix Xen Desktop* V3 OS streaming On an 802.1x, NAC or NAP network, vPro technology systems with the Intel® Embedded Trust Agent can present network security credentials prior to receiving a streamed OS, providing assurance that only authorized systems access the network Citrix -Project Independence* Virtual containers A joint development project between Citrix and Intel; uses an Intel® VT-d, VT-x and TXT-aware VMM In development. Expected 2H’09 VMware - Client Virtualization Platform* Optimized for Intel vPro technology. *Other brands and names may be claimed as property of others. All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. 24

Intel® vPro™ Technology Optimization? Key Compute Model ISVs Model ISV & Product Intel® vPro™ Technology Optimization? OS Streaming Citrix Provisioning Server for Desktops* v4.5 and greater Citrix XenDesktop* V3 Dell On-Demand Streaming Solution Intel® Embedded Trust Agent Intel® AMT, Intel® ETA Remote OS Boot Lenovo Secure Managed Client* Intel® AMT, Intel® VT App Streaming/ Virtualization Citrix XenApp* (supports both terminal services and application streaming) Microsoft SCCM/R2* Symantec SWV 6.1* VMware View 3(with Thinapp)* Others - Intel® AMT Intel Mobile SDK -Symantec Virtual Containers Citrix – Intel collaboration (Q1’10, codenamed Project Independence) Microsoft Enterprise Desktop Virtualization* VMware ACE*, VMware Player* VMware future Client Virtualization Platform (2H’09) Enhanced Network Display Protocols Citrix ICA* HP Remote Graphics Software* Microsoft RDP replacement in Windows* 7 (formerly Calista*) Teradici PC-over-IP* * Other brands and names may be claimed as property of others.

Presentation Virtualization: Terminal Services IT Benefits Centralized image and security Proven technology Less infrastructure than virtual hosted desktop approach Access from any connected client Stateless client Limitations No mobility Responsiveness varies (workload and latency) Poor motion graphics, streamed audio, and peripheral synch User satisfaction issues Presentation Virtualization Session A Session B Application Terminal Server Server OS RDP Remote Display Protocol Terminal Software Local OS

Virtual Hosted Desktop IT Benefits Centralized image and security User customization Access from any connected client Stateless client Limitations No mobility Lower users/processor ratio than terminal services Costly data center build-out Responsiveness varies (workload and latency) Poor motion graphics, streamed audio, and peripheral synch Immature deployment and management tools Virtual Hosted Desktop APP OS APP OS APP OS APP OS VMM RDP Remote Display Protocol Terminal sw Local OS

Operating System and Application Streaming IT Benefits Centralized image, data, and security Single image serves many clients (less storage) Responsive compute and graphics User customization Increased security and compatibility with application virtualization Less infrastructure than server-side models “Stateless” client Limitations Limited mobility; no local caching Network boot storms Some application incompatibilities Validation can be labor-intensive Operating System and Application Streaming App App Mgr OS Streaming Server OS, Virtual App Mgr and Application streamed over Network Streamed App Virtual App Mgr Streamed OS

Application Streaming and Virtualization IT Benefits Centralized application, data, and security Single application image serves many clients (less storage) Responsive compute and graphics User customization Increased security, compatibility with application virtualization Less infrastructure than server-side models Off-network mobility Limitations Centralizes applications and data only, not whole image Some application incompatibilities Validation can be labor-intensive Application Streaming App App App Streaming Server Application streamed over Network App App App Virtual App Mgr Local OS & Apps

Streamed, DVD, or USB Drive Virtual Containers Virtual Containers IT Benefits Image-level delivery Off-network mobility Application performance Multiple images/client (e.g., corporate/private, contractor) Low data center cost Limitations Technology and tool immaturity Complexity of current solutions App OS App OS Streaming Server Streamed, DVD, or USB Drive App OS App OS VMM Local OS & Apps

Intel® vPro™ Technology Capabilities & Alternative Compute Models vPro capability Terminal Services Virtual Hosted Desktop OS + App Streaming App Streaming (Local OS) Rich Client or Mixed Model Accurate count of clients (regardless of power or OS state) X Accurate HW inventory (regardless of power or OS state) Accurate SW inventory (regardless of power or OS state) (inventory & update terminal SW) Secure wake-&-update Isolate an infected client Monitor agent presence Encrypt data on hard drive (Danbury Tech ’08)