Presentation is loading. Please wait.

Presentation is loading. Please wait.

Legal Disclaimers 1 Copyright © 2009 Intel Corporation

Similar presentations


Presentation on theme: "Legal Disclaimers 1 Copyright © 2009 Intel Corporation"— Presentation transcript:

1 Legal Disclaimers 1 Copyright © 2009 Intel Corporation
Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS. Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE).  The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. 1

2 Evaluating Thin Clients & Alternative Compute Models
Chee Pung Loy Intel Americas Channel Solutions Account Manager October 2009

3 Stay Connected Intel Premier IT Professional (IPIP) Program
14 events in US & Canada Analyst presentations & whitepapers Intel technology roadmap Intel IT best practices ISV presentations Participate in online social media Download up-to-date technical resources Exclusive Magazine Monthly Newsletter Members Only Website Events & Networking Purpose: Sharing best practices with the IT community. Audience: All IT Managers/Tech Enthusiast, regardless of company size Subscribe today. It’s FREE! 3

4 Evaluating Thin Clients & Alternative Compute Models
IT Business Perspective Different compute models Future Perspective Ecosystem & Intel

5 IT Business Challenges
Business Responsiveness Flexibility and agility to deliver applications depending on location and device Growing Complexity and TCO Budgetary pressure to cut operating expenses Business Continuity High availability and accessibility of applications, data, collaboration Executive Challenges Improve Security and Simplify Management Minimize risk, streamline operations

6 IT Under Pressure: Response
Pain Points Growing complexity and TCO Budgetary pressure to cut costs Business Continuity Highly availability and accessibility of applications, data, collaboration Improve Security and Simplify Manageability Minimize risk and streamline operations Business Responsiveness Flexibility and agility to deliver applications and data Response Drive for Centralized Control Via… New Software and Data Delivery Models + Improved Client Management and Security Capabilities IT is under pressure from factors that are well-understood. Cost control, security, compliance and other issues, combined with improvements in technology, are inspiring IT managers to question the status quo of how software is deployed and making centralization very appealing. Getting control of the issues will likely involve a combination of several efforts, including new ways to deliver and manage client software, as well as improving the management and security capabilities of their client devices. The Dynamic Virtual Client 6

7 Lets look at what Gartner has found
“The total cost of ownership of server-based computing is from 12 percent to 48 percent less than for comparable PCs.” - Gartner, June 2006

8 Gartner’s Path to 48% TCO Reduction from an Unmanaged Desktop
Unmanaged Windows* XP Desktop Typically Managed Windows XP Desktop Well-Managed Windows XP Desktop Windows-Based Terminal (32-Bit) Windows-Based Terminal (64-Bit) Start -15% Reduction from better mgmt: 40% -25% -7% Reduction from server-based model: 8% -1% Total: 48% TCO Reduction *Other names and brands may be claimed as the property of others.

9 Adoption of Virtualization and Streaming
“In the future, IDC believes that application virtualization and streaming technology will become an increasingly common way for many IT organizations to deploy and manage applications.“ --Mike Rose, IDC “A NEW information technology discipline is emerging around application delivery to control desktop management costs and security… the next generation of delivery is application streaming.” --Martin Gilliland, Gartner Source: IDC, 2008 Enterprises are Seeking New Application Delivery Methods

10 Spectrum of Compute Models
Server-Side Compute & Centralized Data Storage Client-Side Compute, Centralized Data Storage Client-Side Compute & Centralized or Local Data Storage Virtual Container Virtual Containers (Emerging) Mobile Capable Off-Network Option App Streaming Local, Rich Client App Streaming/ Virtualizaton Distributed, Rich Client Web-Based Apps OS+App Streaming Web-Based Apps OS+App Streaming Network Connected Only There is a wide range of compute and software delivery models available today, each with its own merits and limitations. This view breaks out the spectrum along the vectors of mobility (vertical axis) and where the computation takes place (horizontal axis). If the target user segment needs off-network mobility, then the only two options are Application Streaming and Local Rich Client. If off-network mobility is not a requirement, then all the listed models are an option and should be weighed based on several factors discussed on the next slide. In general, our view is that the client-side models provide the best user experience and greatest software compatibility. If centralization is required or desirable, the streaming models provide the best balance of centralized security and management, as well as the responsiveness of local execution. In most cases, streaming technologies do not require the same level of infrastructure build-out as server-side models. Terminal Services Virtual Hosted Desktop 1:Many Blade PC Terminal Services Virtual Hosted Desktop 1:Many Blade PC 1: Blade PC 1:1 Blade PC

11 Virtual Container Video

12 What is the Right Solution for My Business ?
IT Requirements Security Image Management License Management Support Structure Disaster Recovery User Experience Mobility Responsiveness Customization Connectivity Ownership and Privacy Evaluate for Each User Segment Available Infrastructure Servers Storage Space, Power, Cooling Network Bandwidth Budget Priorities Application Workloads Compute Load Graphics Load Delay Sensitivity (i.e., Video, VOIP) Headroom All these factors must be considered when choosing the right compute or software delivery model. Excessive focus on only one vector will likely result in a sub-optimal solution. IT Requirements are standard IT concerns….security, mgmt, business continuity, image management, etc. Available Infrastructure refers to the hardware, connectivity and bandwidth at the company’s disposal to deliver the compute model. If the infrastructure is not in place to support a particular compute model, it must be purchased and installed or another model should be chosen. User Experience is the workflow needs of the system’s user. This included the need for mobility and performance. In many cases, either by custom or law, users have an expectation that the device may be used for some personal tasks, which may result in personally identifiable information being on the system. These issues of “ownership” and privacy should be considered. Application Workload is the compute and graphics demands of the applications the user will be running. Some applications may be intolerant of network delays, such as VOIP or streamed video. Headroom for future application growth should also be considered. Appropriate Solution is a Balance of Many Interrelated Factors 12

13 Construction Estimator Call Center Representative
Mixed Delivery Models Often Required to Meet All User and IT Requirements Construction Estimator University Student Marketing Staffer Call Center Representative Terminal Services Scheduling database Purchasing database Order database Virtual Hosted Desktop Remote access to standard dept image Streaming Technology CAD package Course-specific applications Photo & video editing packages Local Install Office apps, Browser Office apps, Browser, Media players Appropriate Device Laptop PC Laptop or Desktop PC Desktop PC or Thin terminal For all but the call center representative, a mix of compute models is best to deliver all their requirements, provide the management and security IT needs, and work within the infrastructure constraints. When a mix of server-side and client-side models is needed, a PC is the best device for the job. Thin terminals are only appropriate for the case when a 100% server-side model makes sense.

14 Real World Solutions May Mix Models
Diverse user and IT needs will likely result in hybrid models Same user accesses software through multiple models 100% single-model deployments may be rare Single model may make sense when security, management and workload requirements are unlikely to change over time Selected client devices should accommodate the most demanding requirements of target users Desktop & laptop PCs provide most flexibility for all models Thin terminals appropriate for 100% server-side deployments In most real-world cases, users may actually use multiple models to access different software applications. They may use a mix of local, server-side and streamed models, depending on the business need. Here at Intel, our applications are delivered in many ways. Since a mix of models is likely, the requirements of the most demanding model set the bar for the client device. Any significant local processing is a good sign that a PC is the best device. If a 100% server-side model is called for, as they are in some niches, thin terminals will make sense.

15 Compute Model Taxonomy
Terminal Services (aka Session Virtualization) Virtual Hosted Desktops (aka Virtual Desktop Infrastructure) OS and Application Streaming Application Streaming (aka Application Virtualization) Virtual Containers Rich, Distributed Computing (aka Rich Client, Fat Client) Execution Server-based Client-based Application Executable Storage Server Server (Client caching option) Server (Client caching option) Client Application Data Storage Server, NAS or SAN Server, NAS or SAN (Client caching option) Client, Server, NAS or SAN Mobility / Off-Network Operation No Yes Local Device Synchronization (bar code reader, PDA, phone, etc.) Limited Acceptable Clients Terminal, Desktop PC, Laptop PC Desktop PC, Laptop PC Major Providers Citrix*, Microsoft* VMware*, Citrix Citrix Microsoft, Citrix, LANDesk*, Altiris*, AppStream* VMWare vClient* Microsoft Med-V* Traditional PC software providers NAS = Network Attached Storage SAN = Storage Area Network *Other names and brands may be claimed as the property of others.

16 Intel® vPro™ Technology
Processor Chipset Network Intel® Core™2 Duo Intel® Core™2 Quad Intel® Express Chipset Intel® Gigabit Network Intel® Anti-Theft Technology Intel® Active Management Technology Intel® Virtualization Technology Intel® Trusted Execution Technology But, what exactly is vPro™? Intel® vPro Technology is “IT” embedded into the HW platform… vPro™ combines POWERFUL processor, chipset, networking silicon features along with FLASH to deliver a full tamper resistant solution when combined with EXISTING ISV consoles Component Highlights: Processor: New 45 nm Intel® Core™ 2 Duo processors can deliver up to 39% performance improvement over last generation (Source: Sysmark 2007 when comparing E8400 with E6550) Improved Power Savings - Deeper sleep states Virtualization & Security Technologies – Secure the platform Chipset & LAN: New Intel® Q45 Express Chipset supports the latest manageability capabilities even outside the firewall Enhanced manageability in secure networks Energy Star support & lower idle power vPro™‘s embedded capabilities DELIVER Security & Manageability on a chip Intel vPro Technology: Virtualization, Security, and Management 16 16 16

17 Intel® vPro™ Technology
Intel® Anti-Theft Technology Intel® Virtualization Technology Intel® Trusted Execution Technology Intel® Active Management Technology Clients Trusted Platform Protection Areas Protection from within Streaming Server Master OS image Master Apps image Protection from outside Local OS Virtual Container Virtualization Partition 1 Partition n App App App App Guest OS Guest OS Protection between partitions Partition Manager Hardware Virtual Containers System Protection Physical hardware protection Secured Virtualization for New Compute Models 17

18 Intel® vPro™ Technology
Intel® Anti-Theft Technology Intel® Virtualization Technology Intel® Trusted Execution Technology Intel® Active Management Technology OS Streaming or Remote OS Boot Application streaming & virtualization Virtual Containers Clients Virtualization Virtual Application Local OS Virtual Container Enhanced Security and Manageability for New Compute Models 18

19 Summary Software delivery models have evolved and IT has more choices than ever The appropriate compute model for a user segment is a balance of many factors Optimization of IT and User needs will likely result in a mix of delivery models, even within a single user segment PCs with Intel® vPro™ and Centrino® Pro processor technology are the most manageable, secure PCs on which to deliver all compute models

20 Thank you.

21 Backup

22 Rich or Thin? It’s No Longer a Binary Decision
Mobile Capable Off-Network Option Managed Rich Client DT & NB clients Dynamic Virtual Client Centralized apps and data Thin Client Terminal Network Connected Only It used to be a binary decision Server Compute Centralized Management Centralized Data Storage Client Compute Centralized Management Centralized and Local Data Storage Options Client Compute Centralized and Local Data Storage Options 22 22

23 Intel’s Dynamic Virtual Client (DVC)
Clients Network Server On-Demand Delivery Data Synchronization Local OS Virtual Container Virtualization Virtualization Virtual Application OS Streaming or Remote OS Boot Streaming Server Master OS image Master Apps image Virtual Containers Application Streaming & Virtualization OS Streaming Simplified centralized workplace management (applications and data) Improved security Rich client performance and experience with mobile capabilities A Family of Compute Models Based On Streaming and Virtualization

24 DVC Solutions and Intel® vPro™ Technology Enabling
Compute Model Intel® vPro™ Technology Link Status Microsoft SCCM R2* + App-V 4.5 App virtualization App-V now enabled to use Intel® vPro™ technology secure managementt link to push an update to a locally-cached, virtualized app regardless of OS state along with license management using TPDS Shipping Symantec Workspace Virtualization* v6.1 SP1 App streaming/ virtualization SWS can write app licensing and usage information into vPro technology’s non-volatile memory. Info can be read OOB and used to make optimal license purchasing decisions. Mobility SDK support provided Q2’09 Lenovo Secure Managed Client* (SMC) Remote OS boot SMC uses a thin, Intel® Virtualization Technology-enabled VMM to redirect storage from the local disk to a SAN. SMC clients are Lenovo M-Series* vPro technology desktops v1.2 (US release May’09) Global GA –Q3/09 Dell On-Demand* Desktop Streaming (ODDS) OS Streaming Dell has bundled Citrix PVS* (OS streaming) with diskless vPro technology desktops for a turnkey solution Citrix Provisioning Server* for Desktops v5.0 also integrated into Citrix Xen Desktop* V3 OS streaming On an 802.1x, NAC or NAP network, vPro technology systems with the Intel® Embedded Trust Agent can present network security credentials prior to receiving a streamed OS, providing assurance that only authorized systems access the network Citrix -Project Independence* Virtual containers A joint development project between Citrix and Intel; uses an Intel® VT-d, VT-x and TXT-aware VMM In development. Expected 2H’09 VMware - Client Virtualization Platform* Optimized for Intel vPro technology. *Other brands and names may be claimed as property of others. All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. 24

25 Intel® vPro™ Technology Optimization?
Key Compute Model ISVs Model ISV & Product Intel® vPro™ Technology Optimization? OS Streaming Citrix Provisioning Server for Desktops* v4.5 and greater Citrix XenDesktop* V3 Dell On-Demand Streaming Solution Intel® Embedded Trust Agent Intel® AMT, Intel® ETA Remote OS Boot Lenovo Secure Managed Client* Intel® AMT, Intel® VT App Streaming/ Virtualization Citrix XenApp* (supports both terminal services and application streaming) Microsoft SCCM/R2* Symantec SWV 6.1* VMware View 3(with Thinapp)* Others - Intel® AMT Intel Mobile SDK -Symantec Virtual Containers Citrix – Intel collaboration (Q1’10, codenamed Project Independence) Microsoft Enterprise Desktop Virtualization* VMware ACE*, VMware Player* VMware future Client Virtualization Platform (2H’09) Enhanced Network Display Protocols Citrix ICA* HP Remote Graphics Software* Microsoft RDP replacement in Windows* 7 (formerly Calista*) Teradici PC-over-IP* * Other brands and names may be claimed as property of others.

26 Presentation Virtualization: Terminal Services
IT Benefits Centralized image and security Proven technology Less infrastructure than virtual hosted desktop approach Access from any connected client Stateless client Limitations No mobility Responsiveness varies (workload and latency) Poor motion graphics, streamed audio, and peripheral synch User satisfaction issues Presentation Virtualization Session A Session B Application Terminal Server Server OS RDP Remote Display Protocol Terminal Software Local OS

27 Virtual Hosted Desktop
IT Benefits Centralized image and security User customization Access from any connected client Stateless client Limitations No mobility Lower users/processor ratio than terminal services Costly data center build-out Responsiveness varies (workload and latency) Poor motion graphics, streamed audio, and peripheral synch Immature deployment and management tools Virtual Hosted Desktop APP OS APP OS APP OS APP OS VMM RDP Remote Display Protocol Terminal sw Local OS

28 Operating System and Application Streaming
IT Benefits Centralized image, data, and security Single image serves many clients (less storage) Responsive compute and graphics User customization Increased security and compatibility with application virtualization Less infrastructure than server-side models “Stateless” client Limitations Limited mobility; no local caching Network boot storms Some application incompatibilities Validation can be labor-intensive Operating System and Application Streaming App App Mgr OS Streaming Server OS, Virtual App Mgr and Application streamed over Network Streamed App Virtual App Mgr Streamed OS

29 Application Streaming and Virtualization
IT Benefits Centralized application, data, and security Single application image serves many clients (less storage) Responsive compute and graphics User customization Increased security, compatibility with application virtualization Less infrastructure than server-side models Off-network mobility Limitations Centralizes applications and data only, not whole image Some application incompatibilities Validation can be labor-intensive Application Streaming App App App Streaming Server Application streamed over Network App App App Virtual App Mgr Local OS & Apps

30 Streamed, DVD, or USB Drive
Virtual Containers Virtual Containers IT Benefits Image-level delivery Off-network mobility Application performance Multiple images/client (e.g., corporate/private, contractor) Low data center cost Limitations Technology and tool immaturity Complexity of current solutions App OS App OS Streaming Server Streamed, DVD, or USB Drive App OS App OS VMM Local OS & Apps

31 Intel® vPro™ Technology Capabilities & Alternative Compute Models
vPro capability Terminal Services Virtual Hosted Desktop OS + App Streaming App Streaming (Local OS) Rich Client or Mixed Model Accurate count of clients (regardless of power or OS state) X Accurate HW inventory (regardless of power or OS state) Accurate SW inventory (regardless of power or OS state) (inventory & update terminal SW) Secure wake-&-update Isolate an infected client Monitor agent presence Encrypt data on hard drive (Danbury Tech ’08)


Download ppt "Legal Disclaimers 1 Copyright © 2009 Intel Corporation"

Similar presentations


Ads by Google