SlideShare a Scribd company logo
1 of 38
Windows Optimized Desktop Roadmap Delivering Business ValueToday and Tomorrow
Agenda Client strategy constraints Historical issues with desktop support An Optimized Desktop Windows 7
Increasing Tension Between Users And IT Client Computing Trends:  5 Cs Business End Users Need Agility   and  Flexibility  Contingency Costs IT Pros Need Control Compliance Consumerization Carbon-Neutral (“Green”)
Consumerization Contingency Costs Compliance Consumerization Carbon-Neutral (“Green”)
Applications Drive Client Options Most Applications Lead to Vista Compatibility Thin Client CE.NET Diskless Smart Client XP/Vista/Win7 Managed Smart Client XP/Vista/Win7 Thin Client XP Embedded PDA Pocket PC Windows Mobile Rendering (TS or VDI) Rendering (TS or VDI) Rendering (TS or VDI) Rendering (TS or VDI) Rendering (TS or VDI) ,[object Object]
Logic on local  or remote serverPresentation (Web client) Presentation (Web client) Presentation (Web client) Presentation (Web client) Rich Client (.NET Winforms) Rich Client (.NET Winforms) Rich Client (.NET Winforms) Rich Client (.NET Winforms) Win32  Applications ,[object Object]
IE-deployed applications
Local .NET Winform appsWin32 Applications Information Worker Tools Information Worker Tools Information Worker Tools ,[object Object]
Managed through SCCM
Mobility support
Rich user experience
Zero-touch deployment
“Locked down” for ease of management
Minimum footprint option
Imaged on boot – zero residual imageWindows Azure (Cloud Computing) Windows Vista Compatibility Windows Server 2008 Compatibility (same kernel as Windows Vista) Source: Tactics to Compete versus a Thin Client, Jeff Johnson (jejohn@microsoft.com), Eduardo Kassner (eduardok@microsoft.com)
Applications Drive Client Options Most Applications Lead to Vista Compatibility Thin Client CE.NET Diskless Smart Client XP/Vista/Win7 Managed Smart Client XP/Vista/Win7 Thin Client XP Embedded PDA Pocket PC Windows Mobile Rendering (TS or VDI) Rendering (TS or VDI) Rendering (TS or VDI) Rendering (TS or VDI) Rendering (TS or VDI) Application Compatibility depends on the supported Development Stack and Presentation Capabilities of the device One size DOES NOT FIT ALL App1 App1 App2 App2 App2 ,[object Object]
Logic on local  or remote serverPresentation (Web client) Presentation (Web client) Presentation (Web client) Presentation (Web client) App3 App3 App3 App3 App4 App4 App4 App4 App4 Rich Client (.NET Winforms) Rich Client (.NET Winforms) Rich Client (.NET Winforms) Rich Client (.NET Winforms) Win32  Applications ,[object Object]
IE-deployed applications
Local .NET Winform appsWin32 Applications Information Worker Tools Information Worker Tools Information Worker Tools ,[object Object]
Managed through SMS
Mobility support
Rich user experience
Zero-touch deployment
“Locked down” for ease of management
Minimum footprint option
Imaged on boot – zero residual imageSource: Tactics to Compete versus a Thin Client, Jeff Johnson (jejohn@microsoft.com), Eduardo Kassner (eduardok@microsoft.com)
How has thethinclientmarketgrown… 2007 Worldwide Shipments Thin Clients  –  3 Million units (1.1% WW) PCs             -  264 million units Source : Gartner, 2007 PC Market Size WW 7 July 2008 1999 Worldwide Shipments Thin Clients  –  700,000 units (0.6% WW) PCs               --  113 million units Source : IDC 1999 Enterprise Thin Client Year in Review - Jan 2000 Update IDC, 9/7/01 Thin client remain 1% of the market Source: Gartner - Dataquest, 2 October 2008  ID Number: G00160724 “Dataquest Insight: Growth in Thin-Client Terminal Markets Points to a Fundamental Shift in Computing Architecture”
So… what does Gartner recommend “Hosted Virtual-Desktop Deployments Are Set to Accelerate” Source: Gartner, Brian Gammage,  Mark A. Margevicius, 28 July 2008 Recommendations  •  Unless your organization has an urgent requirement to deploy hosted virtual desktops immediately, wait until 2009 before commencing deployment. By early 2009, improvements in how users connect to virtual desktops and manage hosted virtual-desktop images will be available.  •  Recognize that hosted virtual desktops will be suitable for some, but not all, users. Ongoing technical developments will reduce the impact of network latency issues, but will not eliminate them. Application performance from hosted virtual desktops will not be adequate for all user needs.  •  Define and optimize management processes for hosted virtual desktops just as you did for traditional PCs. Although hosted virtual-desktop images are centralized and more standardized, the capabilities for managing them across their full deployment life cycles remain incomplete. To remedy this, budget for additional point-solution management capabilities.” Microsoft Confidential
So… what does Gartner recommend Gartner Publication Date: 28 October 2008 ID Number: G00160447 “Through 2010, HVDs will be best-suited to structured task workers and will require "persistent personalization" to become viable for a broader number of users.  A nonpersistent, pooled-image approach will be suitable for many categories of structured task worker, but not for other parts of the workforce. Given the aggressive plans for HVD deployment cited to Gartner by many organizations, this will pose a barrier to deployment and likely will give rise to user satisfaction issues where deployments proceed too rapidly. Without a persistent pooled-image approach to HVD deployment (where user state and settings can be preserved from one work session to another), organizations likely will find that the HVD model works well for less than half of the user population targeted: Through 2010, deployments that overestimate HVD capabilities will reach less than 40% of target users. Organizations that can overcome this issue, either by swallowing the additional management overhead or by deploying a point solution, will increase their success rate. Organizations that deploy persistently personalized images will reach 60% of target users with HVDs in 2011” Microsoft Confidential
Carbon-Neutral (“Green”) Contingency Costs Compliance Consumerization Carbon-Neutral (“Green”)
Total Watts for thin/thick Architecture 80,000 18,400 9,240 8,800 6,900 5,750 Total Clients: 1,000 SunRay Clients / SunRay Server: 100 Thin Clients / Terminal Server: 100 Virtual Desktops / *Virtual Server: 24 Vista Clients available 23% of the time (GPO) XP/Thin/Servers available 100% of the time Desktop: 80w Laptop: 25w Wyse: 4.5w SunRay: 4w Server: 240w Carbon-Neutral (“Green”)
Cost Contingency Costs Compliance Consumerization Carbon-Neutral (“Green”)
9 Years of Gartner TCO Data 2004 Annual TCO = $5,386/PC 2006 5,867 Annual TCO = $4,593/PC 41% less 2001 Annual TCO = $3,241/PC 3,413 Annual TCO = $2,851/PC Annual TCO = $2,812/PC 15%  less 2,218 1,874 2008 Unmanaged Rich Client Typically managed Rich Client Terminal Server 32 bit  Terminal Server 64 bit  Well managed  Rich Client
Saving $$$ with Rich Clients User Benefits IT Benefits Improved productivity Reduces search time by 42% Up to $59 savings per year 1 Improved performance Up to a 3.5x network throughputimprovement 2 Improved interface Consistent, fast, reliable resume Efficient Document Sync Previous Versions (backup) Savings Green $55-$78 annual savings for desktops4 $11 (8%) savings per PC in service desk-related IT labor1 $26 per/PC cost-reduction benefit in Desktop Engineering & Support Costs1 Up to $605/PC annual savings for mobile systems5 Security Benefits3 60% fewer malware infections than Windows XP SP2 45% fewer high security vulnerabilities in year 1 1st Windows OS developed under the Microsoft Trustworthy Computing Initiative (Secure Development Lifecycle) Management & Security Features BitLocker Drive Encryption 2-way firewall w/ IPSEC(centrally managed) User Account Control (UAC) Single Global Image “Managed Desktop” Windows Defender Internet Explorer (IE) Protected Mode ActiveX/USB/Device Management Imaging tools included Single security patch supports multiple languages Network Access Protection Client Windows XP Compatibility* via: Virtual PC 2007 Microsoft Enterprise Desktop Virtualization (MED-V) 1Whitepaper: Analysis of the Business Value of Windows Vista, December 2006, http://download.microsoft.com/download/2/8/1/281dda34-b8fc-4b4c-9848-c6fa2ba8fa8a/IDC_vista_whitepaper.pdf 2Enhanced Network Performance with Microsoft Windows Vista and Windows Server 2008, Document #207180, The Tolly Group, June 2007, http://download.microsoft.com/download/4/b/4/4b455e48-72c4-4a04-b9a5-892fd497087a/TollyResults.pdf  3 Microsoft Security Intelligence Report, July – December 2007, http://www.microsoft.com/downloads/details.aspx?FamilyId=4EDE2572-1D39-46EA-94C6-4851750A2CB0&displaylang=en & http://www.microsoft.com/security/portal/sir.aspx 4 Continental Airlines Vista Case Study Video (2008) & Windows Vista Energy Conservation, October 2006, http://www.microsoft.com/whdc/system/pnppwr/powermgmt/VistaEnergyConserv.mspx 5Reducing TCO with Windows Vista: Quantified Savings for Mobile PCs, Wipro Technologies and GCR Custom Research, September 2007, http://download.microsoft.com/download/f/7/e/f7ef20ff-6bcc-4348-897b-94b22911f2dc/WIP_GCR_TCOMobilityWP_v9a.pdf
Managed and  consolidated IT  Infrastructure with maximum  automation Fully automated  management,  dynamic resource  Usage , business  linked SLA’s Managed IT  Infrastructure  with limited  automation Uncoordinated, manual infrastructure  Costs More Efficient Cost Center Business Enabler Strategic Asset Cost Center  Infrastructure Optimization Manage complexity & Achieve Agility
What about VDI TCO? What about Terminal Server TCO? What about Windows Vista?  What about Core IO? Basic Standardized Rationalize 6,000 Typical Managed Desktop VS VDI Desktop 5,309 5,047 4,752 5,000 Soft Cost 4,354 Hard Cost 2,848 4,000 2,572 3,652 3,336 2,423 3,182 3,023 2,025 2,852 2,782 914 2,709 3,000 1,315 1,121 914 741 704 914 2,000 Costs 2,738 2,461 2,475 2,329 2,329 2,111 1,000 2,109 2,078 2,061 2,021 1,795 0 VDI Heavy Workload (4/CPU) VDI Typical Workload (6/CPU) Terminal Service32 bit Terminal Service64 bit VDI LightWorkload (8/CPU) Windows XP Windows Vista Windows Vista Windows Vista Windows XP Windows XP * Data from Gartner, IDC and Research and Advisory Consulting Microsoft Confidential
And how does Gartner PC Configuration Magic Quadrant look like ? Dec 2008 FOCUS ON: Deploy PC OSs, settings and applications.  Collect and manage hardware and software inventory.   Monitor the use of software applications.  Configure and deploy software, patches and other system updates to PCs.  Remotely control PCs for troubleshooting
Compliance Contingency Costs Compliance Consumerization Carbon-Neutral (“Green”)

More Related Content

What's hot

Enterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsEnterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktops
Molten Technologies
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Flexera
 

What's hot (19)

VDI Cost benefit analysis
VDI Cost benefit analysisVDI Cost benefit analysis
VDI Cost benefit analysis
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
VDI Comparison: Five Reasons XenDesktop beats Horizon View
VDI Comparison: Five Reasons XenDesktop beats Horizon ViewVDI Comparison: Five Reasons XenDesktop beats Horizon View
VDI Comparison: Five Reasons XenDesktop beats Horizon View
 
Desktop virtualization customer presentation
Desktop virtualization customer presentationDesktop virtualization customer presentation
Desktop virtualization customer presentation
 
VDI Performance Assessment
VDI Performance AssessmentVDI Performance Assessment
VDI Performance Assessment
 
View 5 competitive sales presentation
View 5 competitive sales presentationView 5 competitive sales presentation
View 5 competitive sales presentation
 
Vdi strategy
Vdi strategyVdi strategy
Vdi strategy
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Vdi how-it-works618
Vdi how-it-works618Vdi how-it-works618
Vdi how-it-works618
 
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual WorkspaceVMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
 
dinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual DesktopdinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual Desktop
 
Xendesktop 7-on-windows-azure-design-guide
Xendesktop 7-on-windows-azure-design-guideXendesktop 7-on-windows-azure-design-guide
Xendesktop 7-on-windows-azure-design-guide
 
Virtual Desktop Computing _White Paper - by David Roth
Virtual Desktop Computing _White Paper - by David RothVirtual Desktop Computing _White Paper - by David Roth
Virtual Desktop Computing _White Paper - by David Roth
 
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
 
Enterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsEnterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktops
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?
 
Communicating Virtualization to Non-IT Audiences
Communicating Virtualization to Non-IT AudiencesCommunicating Virtualization to Non-IT Audiences
Communicating Virtualization to Non-IT Audiences
 
Virtualization Business Case
Virtualization Business CaseVirtualization Business Case
Virtualization Business Case
 

Viewers also liked

Intel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data CenterIntel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data Center
Dr. Wilfred Lin (Ph.D.)
 
Wally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration managerWally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration manager
Nordic Infrastructure Conference
 
In tune inaction
In tune inactionIn tune inaction
In tune inaction
Olav Tvedt
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
Krishnasai Gudavalli
 
Creating an Interactive Content Strategy that Works with Technology
Creating an Interactive Content Strategy that Works with TechnologyCreating an Interactive Content Strategy that Works with Technology
Creating an Interactive Content Strategy that Works with Technology
ion interactive
 

Viewers also liked (14)

Public roadmap-article
Public roadmap-articlePublic roadmap-article
Public roadmap-article
 
Intel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data CenterIntel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data Center
 
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
 
Wally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration managerWally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration manager
 
In tune inaction
In tune inactionIn tune inaction
In tune inaction
 
The Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast ChapterThe Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast Chapter
 
Free IT Support Training | Best Practices in Desktop Support
Free IT Support Training | Best Practices in Desktop SupportFree IT Support Training | Best Practices in Desktop Support
Free IT Support Training | Best Practices in Desktop Support
 
Roadmap for Desktop Support's Future
Roadmap for Desktop Support's FutureRoadmap for Desktop Support's Future
Roadmap for Desktop Support's Future
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
World Wide Technology TEC37 Webinar - Windows 10 (Transcript)
World Wide Technology TEC37 Webinar -  Windows 10 (Transcript)World Wide Technology TEC37 Webinar -  Windows 10 (Transcript)
World Wide Technology TEC37 Webinar - Windows 10 (Transcript)
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
 
End User Computing
End User ComputingEnd User Computing
End User Computing
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
 
Creating an Interactive Content Strategy that Works with Technology
Creating an Interactive Content Strategy that Works with TechnologyCreating an Interactive Content Strategy that Works with Technology
Creating an Interactive Content Strategy that Works with Technology
 

Similar to Optimized Desktop, Mdop And Windows 7

10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3
Jennifer Phillips
 
Desktop is going to be v2
Desktop is going to be  v2Desktop is going to be  v2
Desktop is going to be v2
Pini Cohen
 
dassault-systemes-catia-application-scalability-guide
dassault-systemes-catia-application-scalability-guidedassault-systemes-catia-application-scalability-guide
dassault-systemes-catia-application-scalability-guide
Jason Kyungho Lee
 
Idc Vcc Mcs 2010 Final
Idc Vcc Mcs 2010   FinalIdc Vcc Mcs 2010   Final
Idc Vcc Mcs 2010 Final
D_Burrow
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisation
Vincent Kwon
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
Amit Gatenyo
 

Similar to Optimized Desktop, Mdop And Windows 7 (20)

10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop Revolution
 
Security Architecture for Thin Client Network
Security Architecture for Thin Client NetworkSecurity Architecture for Thin Client Network
Security Architecture for Thin Client Network
 
Desktop is going to be v2
Desktop is going to be  v2Desktop is going to be  v2
Desktop is going to be v2
 
Virtual desktop-Citrix Part 2
Virtual desktop-Citrix Part 2Virtual desktop-Citrix Part 2
Virtual desktop-Citrix Part 2
 
Virtual desktop-Citrix Part 1
Virtual desktop-Citrix Part 1 Virtual desktop-Citrix Part 1
Virtual desktop-Citrix Part 1
 
dassault-systemes-catia-application-scalability-guide
dassault-systemes-catia-application-scalability-guidedassault-systemes-catia-application-scalability-guide
dassault-systemes-catia-application-scalability-guide
 
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
 
Idc Vcc Mcs 2010 Final
Idc Vcc Mcs 2010   FinalIdc Vcc Mcs 2010   Final
Idc Vcc Mcs 2010 Final
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisation
 
Desktop virtualization scott calvet
Desktop virtualization   scott calvetDesktop virtualization   scott calvet
Desktop virtualization scott calvet
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Server Virtualization - Smashing Success! Desktop Virtualization - Not So Mu...
Server Virtualization - Smashing Success!  Desktop Virtualization - Not So Mu...Server Virtualization - Smashing Success!  Desktop Virtualization - Not So Mu...
Server Virtualization - Smashing Success! Desktop Virtualization - Not So Mu...
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
 
IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure
 
Building a reliable and scalable IoT platform with MongoDB and HiveMQ
Building a reliable and scalable IoT platform with MongoDB and HiveMQBuilding a reliable and scalable IoT platform with MongoDB and HiveMQ
Building a reliable and scalable IoT platform with MongoDB and HiveMQ
 
ppt_rs.jpg
ppt_rs.jpgppt_rs.jpg
ppt_rs.jpg
 

More from Louis Göhl

Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...
Louis Göhl
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
Louis Göhl
 
HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009
Louis Göhl
 

More from Louis Göhl (19)

Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011
 
Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011
 
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
 
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
 
VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 2VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 2
 
VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1
 
Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
Hyper v and live migration on cisco unified computing system - virtualized on...
Hyper v and live migration on cisco unified computing system - virtualized on...Hyper v and live migration on cisco unified computing system - virtualized on...
Hyper v and live migration on cisco unified computing system - virtualized on...
 
HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009
 
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
 
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
 
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
 
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
 
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted DomainMGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
 
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
 
Windows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopWindows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized Desktop
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Optimized Desktop, Mdop And Windows 7

  • 1. Windows Optimized Desktop Roadmap Delivering Business ValueToday and Tomorrow
  • 2. Agenda Client strategy constraints Historical issues with desktop support An Optimized Desktop Windows 7
  • 3. Increasing Tension Between Users And IT Client Computing Trends: 5 Cs Business End Users Need Agility and Flexibility Contingency Costs IT Pros Need Control Compliance Consumerization Carbon-Neutral (“Green”)
  • 4. Consumerization Contingency Costs Compliance Consumerization Carbon-Neutral (“Green”)
  • 5.
  • 6.
  • 8.
  • 13. “Locked down” for ease of management
  • 15. Imaged on boot – zero residual imageWindows Azure (Cloud Computing) Windows Vista Compatibility Windows Server 2008 Compatibility (same kernel as Windows Vista) Source: Tactics to Compete versus a Thin Client, Jeff Johnson (jejohn@microsoft.com), Eduardo Kassner (eduardok@microsoft.com)
  • 16.
  • 17.
  • 19.
  • 24. “Locked down” for ease of management
  • 26. Imaged on boot – zero residual imageSource: Tactics to Compete versus a Thin Client, Jeff Johnson (jejohn@microsoft.com), Eduardo Kassner (eduardok@microsoft.com)
  • 27. How has thethinclientmarketgrown… 2007 Worldwide Shipments Thin Clients – 3 Million units (1.1% WW) PCs - 264 million units Source : Gartner, 2007 PC Market Size WW 7 July 2008 1999 Worldwide Shipments Thin Clients – 700,000 units (0.6% WW) PCs -- 113 million units Source : IDC 1999 Enterprise Thin Client Year in Review - Jan 2000 Update IDC, 9/7/01 Thin client remain 1% of the market Source: Gartner - Dataquest, 2 October 2008 ID Number: G00160724 “Dataquest Insight: Growth in Thin-Client Terminal Markets Points to a Fundamental Shift in Computing Architecture”
  • 28. So… what does Gartner recommend “Hosted Virtual-Desktop Deployments Are Set to Accelerate” Source: Gartner, Brian Gammage, Mark A. Margevicius, 28 July 2008 Recommendations • Unless your organization has an urgent requirement to deploy hosted virtual desktops immediately, wait until 2009 before commencing deployment. By early 2009, improvements in how users connect to virtual desktops and manage hosted virtual-desktop images will be available. • Recognize that hosted virtual desktops will be suitable for some, but not all, users. Ongoing technical developments will reduce the impact of network latency issues, but will not eliminate them. Application performance from hosted virtual desktops will not be adequate for all user needs. • Define and optimize management processes for hosted virtual desktops just as you did for traditional PCs. Although hosted virtual-desktop images are centralized and more standardized, the capabilities for managing them across their full deployment life cycles remain incomplete. To remedy this, budget for additional point-solution management capabilities.” Microsoft Confidential
  • 29. So… what does Gartner recommend Gartner Publication Date: 28 October 2008 ID Number: G00160447 “Through 2010, HVDs will be best-suited to structured task workers and will require "persistent personalization" to become viable for a broader number of users.  A nonpersistent, pooled-image approach will be suitable for many categories of structured task worker, but not for other parts of the workforce. Given the aggressive plans for HVD deployment cited to Gartner by many organizations, this will pose a barrier to deployment and likely will give rise to user satisfaction issues where deployments proceed too rapidly. Without a persistent pooled-image approach to HVD deployment (where user state and settings can be preserved from one work session to another), organizations likely will find that the HVD model works well for less than half of the user population targeted: Through 2010, deployments that overestimate HVD capabilities will reach less than 40% of target users. Organizations that can overcome this issue, either by swallowing the additional management overhead or by deploying a point solution, will increase their success rate. Organizations that deploy persistently personalized images will reach 60% of target users with HVDs in 2011” Microsoft Confidential
  • 30. Carbon-Neutral (“Green”) Contingency Costs Compliance Consumerization Carbon-Neutral (“Green”)
  • 31. Total Watts for thin/thick Architecture 80,000 18,400 9,240 8,800 6,900 5,750 Total Clients: 1,000 SunRay Clients / SunRay Server: 100 Thin Clients / Terminal Server: 100 Virtual Desktops / *Virtual Server: 24 Vista Clients available 23% of the time (GPO) XP/Thin/Servers available 100% of the time Desktop: 80w Laptop: 25w Wyse: 4.5w SunRay: 4w Server: 240w Carbon-Neutral (“Green”)
  • 32. Cost Contingency Costs Compliance Consumerization Carbon-Neutral (“Green”)
  • 33. 9 Years of Gartner TCO Data 2004 Annual TCO = $5,386/PC 2006 5,867 Annual TCO = $4,593/PC 41% less 2001 Annual TCO = $3,241/PC 3,413 Annual TCO = $2,851/PC Annual TCO = $2,812/PC 15% less 2,218 1,874 2008 Unmanaged Rich Client Typically managed Rich Client Terminal Server 32 bit Terminal Server 64 bit Well managed Rich Client
  • 34. Saving $$$ with Rich Clients User Benefits IT Benefits Improved productivity Reduces search time by 42% Up to $59 savings per year 1 Improved performance Up to a 3.5x network throughputimprovement 2 Improved interface Consistent, fast, reliable resume Efficient Document Sync Previous Versions (backup) Savings Green $55-$78 annual savings for desktops4 $11 (8%) savings per PC in service desk-related IT labor1 $26 per/PC cost-reduction benefit in Desktop Engineering & Support Costs1 Up to $605/PC annual savings for mobile systems5 Security Benefits3 60% fewer malware infections than Windows XP SP2 45% fewer high security vulnerabilities in year 1 1st Windows OS developed under the Microsoft Trustworthy Computing Initiative (Secure Development Lifecycle) Management & Security Features BitLocker Drive Encryption 2-way firewall w/ IPSEC(centrally managed) User Account Control (UAC) Single Global Image “Managed Desktop” Windows Defender Internet Explorer (IE) Protected Mode ActiveX/USB/Device Management Imaging tools included Single security patch supports multiple languages Network Access Protection Client Windows XP Compatibility* via: Virtual PC 2007 Microsoft Enterprise Desktop Virtualization (MED-V) 1Whitepaper: Analysis of the Business Value of Windows Vista, December 2006, http://download.microsoft.com/download/2/8/1/281dda34-b8fc-4b4c-9848-c6fa2ba8fa8a/IDC_vista_whitepaper.pdf 2Enhanced Network Performance with Microsoft Windows Vista and Windows Server 2008, Document #207180, The Tolly Group, June 2007, http://download.microsoft.com/download/4/b/4/4b455e48-72c4-4a04-b9a5-892fd497087a/TollyResults.pdf 3 Microsoft Security Intelligence Report, July – December 2007, http://www.microsoft.com/downloads/details.aspx?FamilyId=4EDE2572-1D39-46EA-94C6-4851750A2CB0&displaylang=en & http://www.microsoft.com/security/portal/sir.aspx 4 Continental Airlines Vista Case Study Video (2008) & Windows Vista Energy Conservation, October 2006, http://www.microsoft.com/whdc/system/pnppwr/powermgmt/VistaEnergyConserv.mspx 5Reducing TCO with Windows Vista: Quantified Savings for Mobile PCs, Wipro Technologies and GCR Custom Research, September 2007, http://download.microsoft.com/download/f/7/e/f7ef20ff-6bcc-4348-897b-94b22911f2dc/WIP_GCR_TCOMobilityWP_v9a.pdf
  • 35. Managed and consolidated IT Infrastructure with maximum automation Fully automated management, dynamic resource Usage , business linked SLA’s Managed IT Infrastructure with limited automation Uncoordinated, manual infrastructure Costs More Efficient Cost Center Business Enabler Strategic Asset Cost Center Infrastructure Optimization Manage complexity & Achieve Agility
  • 36. What about VDI TCO? What about Terminal Server TCO? What about Windows Vista? What about Core IO? Basic Standardized Rationalize 6,000 Typical Managed Desktop VS VDI Desktop 5,309 5,047 4,752 5,000 Soft Cost 4,354 Hard Cost 2,848 4,000 2,572 3,652 3,336 2,423 3,182 3,023 2,025 2,852 2,782 914 2,709 3,000 1,315 1,121 914 741 704 914 2,000 Costs 2,738 2,461 2,475 2,329 2,329 2,111 1,000 2,109 2,078 2,061 2,021 1,795 0 VDI Heavy Workload (4/CPU) VDI Typical Workload (6/CPU) Terminal Service32 bit Terminal Service64 bit VDI LightWorkload (8/CPU) Windows XP Windows Vista Windows Vista Windows Vista Windows XP Windows XP * Data from Gartner, IDC and Research and Advisory Consulting Microsoft Confidential
  • 37. And how does Gartner PC Configuration Magic Quadrant look like ? Dec 2008 FOCUS ON: Deploy PC OSs, settings and applications. Collect and manage hardware and software inventory. Monitor the use of software applications. Configure and deploy software, patches and other system updates to PCs. Remotely control PCs for troubleshooting
  • 38. Compliance Contingency Costs Compliance Consumerization Carbon-Neutral (“Green”)
  • 39. Desired Configuration Management Define configuration baselines for your business, workload or other requirements across physical and virtual environments Leverage Microsoft and third party Configuration Packs Identify required and prohibited configurations for clients, servers and applications and report on compliance against those definitions Improve systems availability, security, and performance by reducing problems associated with configuration drift Remediate non-compliance Once configurations supporting regulatory compliance are defined reporting is a streamlined effort Dashboards provide immediate visibility into the status of compliance Compliance
  • 40. iTunes Sales Applications HR Applications WinZip Adobe Reader Second Life Face Book Applications MSN IM One Off Application One Off Application One Off Application One Off Application One Off Application One Off Application Finance Applications Development Applications Core Applications Applications in Image What makes up a desktop? Hardware & OS
  • 41. Dependencies Create Complexity SeparationCreates Flexibility Data, User settings App App Applications OS Hardware
  • 42. Microsoft Virtualization Products A comprehensive set of virtualization products, from the data center to the desktop. Assets – both virtual and physical – are managed from a single platform. User State Virtualization Data App Server / Desktop Virtualization Folder Redirection Offline files OS OS Presentation Virtualization Management Desktop & Application Virtualization OS HW Application Virtualization App App App OS
  • 43. So… what does Gartner recommend Choosing From 10 Client Computing Architectural Options Source: Gartner, Brian Gammage, Mark A. Margevicius. 10 December 2007 “The number of ways in which enterprises can deliver computing environments and applications to users has expanded dramatically — from two primary architectural choices to ten. To meet changing business and user requirements, most organizations will embrace multiple delivery options, often in combination.” Microsoft Confidential
  • 44. Client Computing ScenariosGrowing variety of needs Anywhere -on non–company PC Contract/ Offshore Mobile Office Task
  • 45. Windows Optimized Desktop Scenarios Mobile Replaceable PC flexibility, easy to migrate users Application Virtualization Hot-desking flexibly, compliance, free seating Office Bitlocker Drive Encryption Folder Redirection Application Virtualization Terminal Services (LOB Application) Folder Redirection Extending PC life security, low cost, carbon–neutral Task Contract/ Offshore Windows Fundamentalsfor Legacy PCs Hosted Image security, right apps and data Terminal Services (Desktop) Windows Vista Enterprise Centralized Desktop Windows Fundamentalsfor Legacy PCs Anywhere -on non company PC Working from Anywhere security , emergency access Windows Vista Enterprise Centralized Desktop Windows Server 2008 Terminal Services Gateway
  • 46. Microsoft Desktop Optimization PackEnterprise management tools for Software Assurance customers 1 Day Deployment 1 Day Deployment Project Deployment New 1 Day Deployment 1 Day Deployment Project Deployment
  • 47. Windows 7 Builds on Windows VistaDeployment, Testing, and Pilots Today Will Continue to Pay Off Similar Compatibility: Most software that runs on Windows Vista will run on Windows 7. Exceptions will be low level code (AV, Firewall, Imaging, etc). Hardware that runs Windows Vista well will run Windows 7 well. Few Changes: Focus on quality and reliability improvements Deep Changes: New models for security, drivers, deployment, and networking
  • 48. Enterprise Search Make Users Productive Anywhere Situation Today Search Federation Consistent user experience for finding data from multiple locations, including SharePoint IT can pre-populate links on Start menu and Explorer to preferred sites with “Enterprise Search Scopes” Current desktop and Enterprise search solutions are good, but not integrated Users need to take different steps to find data on PC and data on servers Data sources are hard to discover Windows 7 Solution
  • 49. Remote Access for Mobile Workers Make Users Productive Anywhere Situation Today DirectAccess™ Home Office Home Office New network paradigm enables same experience inside & outside the office Seamless access to network resources increases productivity of mobile users Infrastructure investments also make it easy to service mobile PCs and distribute updates and polices Difficult for users to access corporate resources from outside the office Challenging for IT to manage, update, patch mobile PCs while disconnected from company network Windows 7 Solution
  • 50. Branch Office Network PerformanceMake Users Productive Anywhere Situation Today BranchCache™ Caches content downloaded from file and Web servers Users in the branch can quickly open files stored in the cache Frees up network bandwidth for other uses Application and data access over WAN is slow in branch offices Slow connections hurt user productivity Improving network performance is expensive and difficult to implement Windows 7 Solution
  • 51.
  • 52. Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III Windows 7 Solution
  • 53. Application Control Enhance Security and Control Situation Today AppLocker™ Eliminate unwanted/unknown applications in your network Enforce application standardization within your organization Easily create and manage flexible rules using Group Policy Users can install and run unapproved applications Even standard users can install some types of software Unauthorized applications may: Introduce malware Increase helpdesk calls Reduce user productivity Undermine compliance efforts Windows 7 Solution
  • 54. Virtual Desktop InfrastructureStreamline PC Management Situation Today Richer Remote Experience Richer graphics with improved multi-monitor support Use voice for telephony & applications with microphone support Improved printing Do More With VHDs What is Virtual Desktop Infrastructure? Maintain VHD: Offline servicing of VHD images with same tools used for WIM Boot from VHD: Reuse VHD files for deployment to managed desktop PCs Deploying desktops in virtual machines on server hardware Centralized management & security Users can access their desktop and applications wherever they are * Using Windows for VDI scenarios requires additional VECD license Windows 7 Solution
  • 55. AutomationStreamline PC Management Situation Today PowerShell v2.0 In the Client IT Pros rely on scripting to automate repetitive tasks Previous Windows scripting languages were limited in scope and difficult to use PowerShell helps IT professionals achieve greater control and productivity in managing servers Use the same powerful tools for automation of servers and PCs New graphical editor makes it easy for IT pros to learn and use scripting Run automated tasks remotely across your entire organization Windows 7 Solution
  • 56. Increased Value in Optimized DesktopContinued investments in SA value Make Users Productive Anywhere DirectAccess™ BranchCache™ Enterprise Search Scopes Enhance Security and Protect Data BitLocker™ & BitLocker To Go™ AppLocker™ Streamline PC Management MUI Language Packs Richer VDI Remoting & Boot from VHD(VDI requires VECD license) Subsystem for UNIX 4 Virtual Operating Systems Network Boot License
  • 57.
  • 58. Be sure to consider:
  • 59. Whether you have dedicated video RAM
  • 60. Usage of Aero User Interface
  • 63. Other 3rd party applications
  • 64. 2GB of RAM (~$25 incremental cost at time of manufacture)
  • 65. 2 Ghz or faster processors
  • 68. 7200RPM hard drivesOrganizations using Aero theme tend to have good experience with Will improve experience but not required Hardware specifications can be reduced when using the Basic appearance
  • 69. What to do Today Microsoftguidance to optimize desktop infrastructure
  • 70. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Editor's Notes

  1. Total Clients: 1,000SunRay Clients / SunRay Server: 100Thin Clients / Terminal Server: 250Virtual Desktops / *Virtual Server: 24Vista Clients available 23% of the time (GPO)XP/Thin/Servers available 100% of the timeDesktop: 80wLaptop: 25wWyse: 4.5wSunRay: 4wServer: 240w
  2. SLIDE NOTES: Desired configuration management in Configuration Manager reduces the complexities of monitoring configuration changes in even the most complex IT infrastructures. Administrators can easily monitor and capture configuration information of servers, desktops, laptops and mobile devices across their network and evaluate the compliance of those devices against regulatory and corporate requirements. You can use Configuration Manager to remediate non-compliant systems with software distribution that automatically targets computers reporting non-compliance. By helping businesses ensure that systems remain in compliance with a defined desired state, Configuration Manager can enhance IT systems availability, security features and performance while streamlining systems compliance efforts.Configuration Manager sets a configuration baseline for a collection of devices, defined by location, role or use. These baselines can be comprised of OS level, patch level, application presence/version or business rules. Once established, these baselines can then be enforced by policy at regular intervals and used to protect the infrastructure. You can identify required, approved and prohibited configurations for clients, servers and applications.. Baseline configuration knowledge in Configuration Manager 2007 can come from several sources. Administrators can build their own configuration baselines or they can import Configuration Packs from Microsoft or third party software vendors. Configuration Packs are best practices that Microsoft and other software vendors create to identify common configuration errors for applications and operating systems that compromise system availability. Configuration Packs also help IT departments identify security vulnerabilities, as defined by Microsoft and other software vendors, across their enterprise.Use improved control of IT systems to help ensure they comply with a defined desired state, enhancing availability, security features and performance while streamlining your systems compliance efforts. CUSTOMER ANECDOTES: The privacy requirements of the federal Health Insurance Portability and Accountability Act (HIPPA) require healthcare providers to encrypt the hard drives of laptop computers and other mobile devices that contain patient information. But, as an academic institution with decentralized purchasing policies Wake Forest Medical Center couldn’t ensure that all laptops were loaded with the approved PointSec encryption software. With Configuration Manager DCM it can.
  3. Traditionally, the desktop computing model has been one where the operating system, applications, and user data and settings are bonded to a single computer, making it difficult for users to move from one PC to another in case of upgrades or a lost or stolen laptop. This is a result of traditional OS/application installation and data storage technologies. With respect to desktop deployment, this means that the OS, application execution/presentation and user data are all self-contained within a single device. This model has the advantage of simplicity because it leverages well understood technologies that ship with Windows. In addition, because the PC is configured to be completely self-sufficient, this solution is well-suited to mobile use. However, the tight binding between the various layers may not be appropriate for all scenarios. Because of this, Microsoft has introduced new Windows deployment options that achieve similar results in terms of mobility but also enable increased flexibility.  By reducing the dependencies between computing layers, Microsoft enables IT to free the different elements of the system from one another. Each layer can then use other system resources generically and does not need to be configured individually for specific systems. Resources can be used on any system, in real-time, on an as-needed basis. The layers can be brought together dynamically on the users’ machines. IT can also manage the layers separately from each other.In Windows Vista timeframe we are delivering technologies allowing to separate these layers of computing stack – with technologies such as Virtual PC and new Windows Imaging format (HW/OS separation); Terminal Services and Softgrid , now called MS Application Virtualization (OS/ Application separation); and Data & Folder Redirection ( Data separation from OS and Apps). Let’s see how these different technologies apply to different user scenarios
  4. Mobile Workers These types of users are highly mobile due to travel and are frequently outside the corporate network. They use a variety of applications that are usually running locally (i.e. Office, CRM, etc.) and therefore require a rich computing experience. They also need the ability to access applications and data offline as well. Sample users include sales force and corporate executives.  Office Workers These users are connected to the corporate network most of the time, and expect a rich client experience that can handle the broad range of tasks which fall under their responsibility. They use applications such as Office, CRM and ERP Line of Business (LOB) applications, as well as web and project management tools. Sometimes, these users need the ability to access run high-end, specialized LOB applications from within the corporate network. They need highly-performing, highly available computing solutions that provide reliable access. Many of these users move frequently from one workstation to another and therefore require a free seating environment. Sample users include financial traders, CAD engineers and graphic designers. Task Workers These users have more focused responsibilities usually based on data entry tasks. They tend to use a small number of LOB applications and are always connected to the corporate network. Usually they only need limited computing performance but like the Power Information Worker, need to move from one workstation to another in a free seating environment. Sample users include call center employees, bank tellers, factory workers and retail point of sale (POS) cashiers.Contract / Offshore WorkersThese one of the most challenging scenarios for companies to address. When organizations hire contract workers they need to give these users access to their corporate applications and data – to make sure these contract workers can be get their job done. So companies either cope with unmanaged, non-corporate PCs on their network or consider providing a company PC to a contractor, which can also increase costs dramatically. Access from Anywhere on the non-company owned PCSometimes people need to connect to their corporate environment from their home PC (i.e. non-company owned PC) or even from the road in some case of work emergency – also from the non company owned PC.Transition: Historically, it was very difficult for customers to address these needs – ensure these users get access to right applications and data, while making it securely and cost-effectively - due to the limitations of the traditional client computing. 
  5. We now have a comprehensive view of the Windows Vista Optimized Desktop solutions for the different customer scenarios. To summarize quickly:  Mobile Scenarios. With Application Virtualization, Folder redirection, Bitlocker (Win Vista Enterprise), customers can enable the “Replaceable PC” scenario for mobile uses – providing flexibility of user settings; ease of user migration and the protection of the local data.  Office Scenarios. With Application Virtualization and Folder redirection as well as Terminal Services for the critical LOB application, customers can enable the “Hot desking” scenario – providing free seating (applications and data follow user) and addressing compliance needs, while also having full flexibility of user settings and rich user experience for the productivity and CPU/ GPU intensive applications.  Task Scenarios. From the organization’s standpoint, the most important capabilities for task worker scenarios are ensuring a secure, low-cost solution and enabling free-seating in an always-connected environment so that users can work productively from shared client devices, while data is stored securely and centrally. By offering , Windows Fundamentals for Legacy PCs, can extend the life on an old PC - delivering a low cost hardware solution, while also making an environmentally responsible action. With WinFLP machined and Terminal Services, task worker is given access to applications executed on the server, so the confidential data never leaves the data center, improving compliance and limiting risk of data theft. Contract/ Offshore Scenarios. When organizations hire contract workers they need to cope with unmanaged, non-corporate PCs on their network or consider providing a company PC to a contractor, which can also increase costs dramatically. A possible solution is that organizations can provide contractors with low-cost, often older PCs owned by the organization, and running Windows Fundamentals for Legacy PCs (WinFLP), while giving these contract workers access from a WinFLP PC to the applications and data they need to do their work, with Windows Vista Enterprise Centralized Desktop (hosted centrally from a Microsoft Virtual Serveror Windows Server 2008). One specific example of when companies can take advantage of such solution with Windows Vista Centralized Desktop would the outsourced software development and testing.  Anywhere access Scenario. People working from their home PC, travelling without their company owned PC or unable to get to their office due to inclement weather or other disasters can continue work within their familiar environment while the IT department can protect corporate data and maintain control of the environment. With Windows Server 2008’s Terminal Services Gateway the administrator enable these users to access their desktop, applications, and data via Windows Vista Enterprise Centralized Desktop (VECD) and a remotely accessible dedicated Windows Vista virtual machine, from any PC running Windows Vista with Service Pack 1 or Windows XP with Service Pack 3 from the Internet through Internet Explorer. Transition : now we have an all-up view of the different scenarios companies face and the solutions we offer with Windows Vista Optimized Desktop to address these scenarios. Windows Software Assurance allows customers to take advantage of the these technologies and chose solutions that best meet their needs. Let’s take a look
  6. The Microsoft Desktop Optimization Pack helps you every step of the way in accelerating and managing your desktop deployments.  It is a suite of 5 technologies with a 6th technology that has been announced, but the acquisition has not closed yet. These applications work together to help you manage your desktop environment, lower TCO and be more responsive to users providing anywhere, anytime access to the OS and Applications.You can take advantage of it today with your existing OS, and deploying these technologies will also help with future upgrades. Access to the MDOP subscription is one of the most valuable benefits of Windows Client Software Assurance and a significant part of our Windows Client roadmap. We are committed to releasing updates annually, and continually investing in new technologies that you will have access to during the duration of your subscription.Let’s take a look at each of these products.
  7. KEY TAKEAWAYS: We are not going to cause the same level of disruption as we did with Windows Vista. 2. The changes we made in WV caused problems, but the benefits are here now. The path to Windows 7 should be as smooth as the shift from RTM to SP1.In Windows 7 we are building on the advances we made in Windows Vista to help address emerging trends and technologies and meet the needs we’ve heard from our customers. Windows 7 will be built on the Windows Vista foundation and will inherit the quality improvements we’ve made in Windows Vista Service Pack 1 and Windows Server 2008.Compatibility with Windows Vista software, hardware and tools is an important goal of this release. In building Windows Vista we made some significant changes to the platform that had an impact on compatibility. Those changes were important and had a measurable improvement on security. Windows Vista is the most secure client version of Windows to date and experienced fewer than half the number of security vulnerabilities that Windows XP experienced in its first year, and fewer than one-fifth the number of security vulnerabilities as the nearest competitive operating system on the market. Windows 7 also benefits from these important changes, since we are not undoing the changes we made in Windows Vista that resulted in significant security improvements. This also means that customers still using Windows XP when Windows 7 comes out should expect a similar level of compatibility between Windows XP and Windows 7 as there is between Windows XP and Windows Vista. However, the upgrade from Windows Vista to Windows 7 should be easier, given compatibility between these two products. We recommend customers upgrade to Windows Vista now, then move to Windows 7 because the investments required to test and remediate applications, update deployment tools and processes, upgrade hardware will be similar—and you get the benefits of a more secure, modern operating system for a longer time. The client release of Windows 7 will be available in 32 & 64-bit versions.
  8. Access Information Anywhere describes a broad set of investments that we are doing in Windows 7 to make users more productive no matter where they are and no matter where the application and data that they need to access resides. One of those investments is in search.As a result of the investments we’ve made in Desktop Search, leading customers who have deployed Windows Vista and the 2007 Microsoft Office System are experiencing great benefits in more easily and quickly finding information. Improved search capabilities are one of the biggest benefits end users find in using Windows Vista. Customers are also realizing huge benefits in using search to access information stored in corporate repositories—using solutions such as Microsoft Office SharePoint Server and Microsoft Search Server. But today these two worlds of enterprise search are separated. We have great solutions for desktop search and server search but they haven’t been brought together. One of our goals in Windows 7 is to provide a more unified search experience so that from the desktop users can also find information on corporate repositories such as SharePoint or online services. We are planning to use federation to make search results from online sources accessible within the desktop search experience. We also want to make it easy for IT to customize search defaults and locations to increase usage of intranet portals—maximizing the return organizations get from those investments.“Enterprise Search Scopes” enables IT, using Group Policy, to deploy links to appear on the user’s Start menu or in Explorer. This way, you can maximize your investments in SharePoint and Enterprise search by making it easy for users to search those destinations. The screenshot shows an example of how Microsoft could use this feature and how the search options would appear in Windows Explorer. IT could deploy a link to our intranet portal “MSW” for all users, and then on a division level we can deploy links to the portal for that division (e.g., Windows). If the user can’t find what they need on one site, they can easily re-scope their search to another one.
  9. One of the goals of Windows 7 is to enable users to access the information that they need whether they are in or out of the office. In the past few years, Microsoft has made getting to email from outside the office easier.  First we had Outlook Web Access, so we could access email through the web. Then we introduced RPC over HTTP, which just requires and internet connection to connect to the Exchange server.But users still have a challenge when accessing resources that are inside the corporate network. For example users cannot open the links to an internal Web site or share included in an email. The most common method to access these resources is VPN. VPN can be hard to use for users because it takes time and multiple steps to initiate the VPN connection and wait for the PC to be authenticated from the network. Hence, most remote users try to avoid VPN’ing as much as possible and stay disconnected from corporate network for as long as they can. At this point we run into a chicken-egg problem: Since remote users are disconnected, IT cannot manage them while away from work – remote users stay more out of date and it gets harder and harder to access corporate resources… With the capabilities Windows 7 enables, users who have internet access will be automatically connected to their corporate network. A user who is sitting on a coffee shop can open his laptop, connect to the internet using the wireless access of the coffee shop and start working as if he is in the office. The user in this case will be able to not only use outlook, but also work with intranet sites, open corporate shares, use LOB applications, and basically have full access to corporate resources. This solution is also very appealing to IT Professionals:Managing mobile PCs has always been an issue since they could be disconnected from the corporate network for a long time. With this work access solution, as long as they have internet connectivity, users will be on corporate network. Servicing mobile users(such as distributing updates and Group Policy) is easier since they can be accessed more frequently by IT systems.Deploying Windows 7 will not automatically enable this type of work access connection. You will have the choice to enable it or not and it will require some changes to your backend network infrastructure, including having at least one server running Windows Server 2008 R2 at the edge of your network. The solution takes advantage of Microsoft’s investments in IPSEC and IPv6 to provide secure connectivity even when not on the physical corporate network.
  10. Even inside a single business different departments can have unique needs. For example, Branch Offices have issues and requirements that are different from the main office. Companies are investing in opening more Branch Offices to provide a work environment for mobile employees and reach more customers.This trend generates new challenges for both the end users and the IT Professionals:Branch Offices are usually connected to enterprises with a low-bandwidth link. Hence accessing corporate data located in the enterprise is slow for end users. To resolve customer pain points and increase user productivity IT Professionals are constantly looking for ways to improve network performance. With Windows 7, Microsoft will offer a software alternative to alleviate the problem—“Branch office caching”. The idea is to cache the corporate data downloaded by users locally in the branch office so it can be quickly accessed by others in the branch. With branch office caching, opening a document can take seconds instead of minutes.For example: Headquarters posts a large training presentation on a file share and sends an e-mail to all employees worldwide. The first employee who opens the presentation has to wait several minutes for the file to download across the WAN. After the file is downloaded Windows will automatically store that file in the cache for others to use. When the next employee tries to download the file Windows will automatically retrieve that file from the cache in the branch and the user can open it in much less time. The cache can be hosted on a server in the branch or distributed across a number of PCs. If the cache is distributed, the branch users automatically check the cache pool to see if the data has already been cached. If the cache is hosted on a server, the branch users check the branch server to access data. Each time the users try to access a file, the access rights of the user are authenticated against the server in the data center to make sure that the user has access to the file and is accessing the latest version.The solution enables users to have fast access to previously downloaded data in the branch and also frees network bandwidth for other uses.It caches content from Web and file servers running Windows Server 2008 R2, and if you use the hosted cache option in the branch office, that server much be running Windows Server 2008 R2 as well.
  11. The other big investment we are making to Enhance Security and Controlisaround Application Control.The longer a computer has been deployed, the more the software on it drifts away from its desired configuration. These inconsistencies are greatly accelerated by installation and execution of non-standard software within the desktop environment. Users today bring software into the environment by bringing in software from home, Internet downloads (intended and not intended!), and through email. The result is a higher incidence of malware infections, more help desk calls, and difficulty in ensuring that your PCs are running only approved, licensed software. Coupled with compliance requirements in the enterprise through OCI, SOX, HIPPA and other regulations, enterprises are renewing efforts to lock down their desktops as a means to: Reduce total cost of ownership (TCO)Increase security to safeguard against data loss/threat of IT theft and to protect privacy Support compliance solutions by validating which users can run specific applicationsWith Windows XP and Windows Vista, we gave IT administrators Software Restriction Policies to enable the definition of application lockdown policies. However, SRP was difficult to implement because the rules were based on application hashes, which meant that they had to be re-created anytime the application was updated. Windows 7 reenergizes application lockdown policies with a totally revamped set of capabilities. AppLocker provides a flexible mechanism that allows administrators to specify exactly what is allowed to run on their systems and gives users the ability to run applications, installation programs, and scripts that administrators have explicitly granted permission to execute. As a result, IT can enforce application standardization within their organization with minimal TCO implications.For example, a rule could be written that says “allow all versions greater than 8.1 of the program Photoshop to run if it is signed by the software publisher Adobe.” Such a rule can be associated with existing security groups within an organization, providing controls that allow an organization to support compliance requirements by validating and enforcing which users can run specific applications.
  12. Today, Microsoft virtualization products and technologies are already helping companies automatically match computing capabilities to business needs. Imagine your employees accessing their personalized desktop, with all of their settings and preferences intact, on any machine, from any location. Or the workloads running on servers in your data center automatically being redeployed to respond to a sudden surge in demand for a specific capability. Or your entire infrastructure restoring itself instantly following a catastrophic power outage. This is possible through Virtual Desktop Infrastructure technology. However, this is still an emerging area, and there are several challenges, including potential higher costs of running enough servers to support your users and the fact that users don’t have as rich a Windows experience when running a remote session. Keep in mind that using Windows features for VDI scenarios requires a specific VECD license.Let’s talk about some of the investments we are making in Windows 7 to make this type of virtualization more cost effective and provide a better experience for users. Richer Remoting Experience: When connecting to a Windows 7 PC, the user gets a richer experience more like a local Windows Desktop. These are some of the improvements that we are making to the user’s VDI experience:Graphics: Windows 7 enterprise will provide true Multi-Monitor support, for up to 8 monitors. A scenario where this functionality is critical is a financial trader who needs to view information on multi-monitors, while the organization wants to have the centralized security and administration of VDI. Other graphics improvements include Desktop Window Manager remoting to display Windows Aero and more efficient video remoting  with Windows Media Player. Audio: Bi-directional audio to support microphones for VOIP and speech recognition. Better audio playback over low-latency connections to mitigate A/V synchronization issues when remoting video via bitmaps (Flash, Silverlight) .Devices: Easy print makes it easy for the user to print to the correct local printer from their client computer. PnP redirection provides support for redirection of Windows Portable Devices – this category of devices includes media players based on the Media Transfer Protocol (MTP) and digital cameras based on the Picture Transfer Protocol (PTP).Physical Boot from VHD: Some customers who use VDI also have a need to reuse that same image on a physical PC. For example, imagine a call center with 200 users, 100 who work onsite with a traditional desktop and 100 who work remotely. Both sets of users are in a highly managed environment and use technologies such as folder redirection and roaming profiles so that the user’s state is not stored in the image and not tied to the OS image. These highly managed machines are typically remotely reimaged frequently (for example, using PXE with WDS to bring down the image file everyday or whenever there is a problem). In these scenarios, you can take that image you use for the VDI users and deploy it to the managed desktop PCs in the office.  This gives you the capability to use and maintain the same image for both deployment scenarios. Understand that while this technology opens up new deployment scenarios, there will not be 100% parity in the experience between WIM and VHD. This is why we only recommend physical deployment of VHDs to desktops in highly managed environments where the user’s state is not stored on the PC and you have the ability to remotely re-image the OS on the physical PC frequently. Some of the differences between booting from VHD and WIM are: VHD deployment is not recommended for mobile PCs because VHD will not support Hibernate/Sleep or BitLocker. Some features of WDS will not be available in a VHD install Setup.exe will not support installing Windows into a VHDVHD files are larger than WIM files so copying the file down will consume more network bandwidth and take longer when compared to a similar WIM.In Windows 7, our deployment tools, such as WDS, will also support deployment and servicing of VHD files. Note that the physical VHD boot feature does not use virtualization to accomplish the VHD boot, there is no hypervisor or virtualization involved. We are simply using the VHD file as a container to store the OS image. In Windows 7, you will be able to specify a local VHD file on the hard drive using the Boot Configuration Data (BCD) to boot from.
  13. Let me tell you some more details about one of the ways we are Streamlining PC Management in Windows 7—Increasing Automation.Windows PowerShell is a Windows command line shell and scripting language that helps IT professionals achieve greater control and productivity. There were close to 1 million downloads of PowerShell in its first six months of availability, and PowerShell has been included in server products, including Exchange 2007 & Windows Server 2008. While PowerShell 1.0 has been available as a separate download for Windows XP and Windows Vista, PowerShell 2.0 will be included natively in Windows 7 so you can easily take advantage of it to automate the management of your clients. Examples of how PowerShell can help the IT Pro: -Execute a command on all PCs to check if the Anti-Virus software service is stopped, and automatically restart it if necessary-Modify the security rights on files or shares-Open a data file (or OS repository like WMI) and pass the contents into a pre-formatted output file like an HTML page or Excel spreadsheet-Automate .NET applications that expose its objects for manipulation-Search and output specific information from Event Logs With the remote automation capabilities that will be new in v2.0 , an administrator can create a PowerShell script to configure a specific setting or run a complex task – defragment the hard drive, close a firewall port, etc., all from one IT Pro’s workstation, and the script will run immediately on all targeted PCs (provided they are online, of course). PowerShell will NOT be exclusive to the Enterprise SKU.
  14. The Optimized Desktop in the Windows 7 timeframe will offer even more unique value for SA customers than what we offer today. We have not completed the entire SKU plan for Windows 7, but wanted to let you know that we will continue to offer an Enterprise SKU for Software Assurance customers only that will have even greater unique value than the Windows Vista Enterprise SKU. The product features that were unique in Windows Vista Enterprise (relative to Windows Vista Business) will stay unique in Window 7 Enterprise: BitLocker™ Drive Encryption, Multilingual User Interface (MUI) Language Packs, Subsystem for Unix Applications (SUA).And in Windows 7 we will provide even more value than what was in Windows Vista Enterprise with additional exclusive features.The Windows 7 Enterprise SKU is just one part of the value we offer through SA. We encourage customers to license the Enterprise SKU as part of the Optimized Desktop, which includes the Microsoft Desktop Optimization Pack. This additional subscription gives you access to 6 additional desktop management tools and regular updates that help you get the most out of Windows. And you can take advantage of the MDOP tools today on your current OS without waiting for the next version to come out before you can realize value.
  15. Optimizing Hardware Specifications to Your Organizational NeedsWhile the minimum requirements for the Windows Vista operating system are highlighted on the Windows Vista TechCenter, it is a good idea to validate hardware performance with your intended application stack and end user expectations before baselining your organization’s standard hardware specifications. When standardizing on Windows Vista operating systems – especially for those using the Windows Aero appearance settings – many organizations have found that 2 or more GB of RAM, 2 GHz or faster processors, and compatible graphics adapters yield good results. Organizations using Windows Basic appearance settings in their PC environment can reduce these recommendations considerably and approach published minimum system requirements for those PCs. This may be useful if your organization is in the middle of a hardware refresh cycle and would like to standardized the operating system version to qualified existing hardware. Depending on how workstations are used in your organization, you can tailor hardware specifications and operating system configurations – including appearance settings – according to your user roles and operational needs.