slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
End User Computing In The Post PC Era PowerPoint Presentation
Download Presentation
End User Computing In The Post PC Era

Loading in 2 Seconds...

play fullscreen
1 / 56

End User Computing In The Post PC Era - PowerPoint PPT Presentation


  • 115 Views
  • Uploaded on

End User Computing In The Post PC Era. Tom Twyman Sr. vSpecialist EMC Thomas.twyman@emc.com. Agenda. Where Are We? Keys To Success – People / Process Keys To Success – Technology Wrap Up & Next Steps. Ubiquitous Access. Recognizing users are working differently. Diverse Access

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'End User Computing In The Post PC Era' - sloan


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
end user computing in the post pc era

End User Computing In The Post PC Era

Tom Twyman

Sr. vSpecialist

EMC

Thomas.twyman@emc.com

agenda
Agenda
  • Where Are We?
  • Keys To Success – People / Process
  • Keys To Success – Technology
  • Wrap Up & Next Steps
recognizing users are working differently
Recognizing users are working differently

Diverse Access

U.S. Employees Survey

37% use do-it-yourself tech

97% carry > 2 devices

Diverse Devices

2010 Shipments

Tablets + Smartphones > PC

2015 shipments

1.1B cell phones, 300M tablets

Diverse Apps

2015 Mobile App Market: $38B

Sources:

Morgan Stanley 2011,

Gartner 2011, Forrester 2010, Pew 2011

consumer technology is driving it
Consumer Technology is driving IT

App Stores

Users provision and install their own apps…within app store guidelines & protection

Application Updates

Applications are updated through the App Store…by the End User, and not IT

access to data
Access to data

Unsecure Unsanctioned File Access and Sharing

  • Users are frustrated with their file-sharing experience and are less productive
  • Leveraging multiple unsanctioned services to meet needs

Confidential Files

Internal Users

Unsanctioned Access

File Servers

flexible application delivery
Flexible Application Delivery

From the cloud

Deliver just an application

where it s going
Where it’s going…

Connect

Simplify

Manage

Desktop Service

App Catalog Service

UniversalServices Broker

Secure Universal Access

Users, Application, DataPolicies

Data Service

Entprs

Entprs

SaaS

Win

Win

Mobile

agenda1
Agenda
  • Where Are We?
  • Keys To Success – People / Process
    • Your Organizaton
    • Your Users
  • Keys To Success – Technology
  • Wrap Up & Next Steps
slide12
Why?
  • Understand that the WHY is just as important as the HOW
  • The use cases for transformation are the key to success…base your decisions on what’s good for YOUR organization
  • This is the hard stuff...
go in with the right expectations
Go in with the right expectations…

Kills projects before they start

There is NO CAPEX SAVINGS!

You can’t build it like “regular” VMs

Kills projects after they start

Focus on end-user experience

Keeps everyone focused on the prize

The experience WILL CHANGE!

But your users are asking for it!

Bottom-up approach won’t work…

You will need executive sponsorship

avoid the traps
Avoid the Traps….

All in good time…

$$$$

It’s all academic - until…

Don’t just kick the tires…

This is not your father’s vm…

Thin Clients

Other Toys

The Great Protocol Debate

The Proof of Concept

Choice of Disk

what s driving vdi adoption
What’s driving VDI Adoption?
  • Executive Order
  • Windows 7 migrations
  • Security and compliance challenges
  • Consumerization of IT
  • Consolidation of desktop management
  • Flexible Workforce
  • Reduction in support personnel
  • Work-from-Home and Telecommuting Initiatives
  • Disaster Recovery and Business Continuity
why are we moving to vdi
Why are WE Moving to VDI?
  • Desktop management complexity
    • Backup for 47,000+ desktop devices
    • Ensure security patching compliance
    • Thousands of user-installed applications create performance and compatibility issues
  • How can we simplify desktop management?
  • How can we standardize desktop images?

1

2

  • Old desktops and OS
    • Average PC is 3-4 years old & under-powered
    • Windows XP is in extended support
    • Annual cost of refresh > $20M
  • How quickly can we move to Windows 7?
  • How do we extend the hardware lifecycle?
  • Poor user experience
    • No choice of platform
    • Limited ability to provide “anywhere, anytime” universal access

3

  • Do we let users bring in their own devices?
  • How do we make our mobile workforce more productive?
the 5 w s
The 5 W’s

?

  • Who? What? When Where? Why?
  • Understand your use cases
    • Who is getting which application?
    • From Where?
    • When?
    • On which Devices?

?

?

?

?

developing the solution
Developing the Solution

Use Case(s)

Capability Requirements

Application Mapping

Policy / Governance

  • Solution Stack:
  • Broker
  • App delivery / presentation
  • Protocol Choices
  • Stateful / stateless
  • Et cetera…
agenda2
Agenda
  • Where Are We?
  • Keys To Success – People / Process
  • Keys To Success – Technology
    • Deconstructing the Desktop
    • Infrastructure
    • Operations
  • Wrap Up & Next Steps
deconstruct the desktop
Deconstruct the Desktop
  • Let your app(s) dictate image strategy
  • The best image is one that’s empty
    • Virtualize everything possible
    • Use the Network for user data and application settings

User Data

Applications

Operating System

user data
User Data
  • “Conscious” and “subconscious”
  • User Data
    • Re-directed folders, home shares
    • Enterprise Data Portals (DKO/AKO)
  • Persona management
    • R0@m1ng Pr0f1le$! (bad word)
    • VDI integrated and third party solutions
infrastructure
Infrastructure
  • Compute
  • Network
  • Storage
compute best practices
Compute best practices
  • Go back to Assessment
  • Determine Usage Matrix, characteristics
  • Desktop to Core ratios
  • Cluster HA considerations
  • Memory is king
network considerations
Network Considerations
  • Latency = The Enemy
  • Bandwidth
  • Display Protocol considerations
  • Security (VLANS, ACLs)
  • Continuity and Recovery
the storage dilemma
The Storage Dilemma
  • Most people think of storage in terms of capacity
  • You need to think of storage in terms of performance
  • Size doesn’t matter… as much
  • Do it right the first time
      • Virtual desktop performance should be as good or better than a physical PC
consider delivery type
Consider Delivery Type
  • Thick, persistent desktops
    • Consume same space as physical
    • Easier to size, mostly based on capacity
  • Thin, non-persistent desktops
    • Based on common image
    • Massive space savings = consolidated IO
    • Harder to size, based on performance
  • Use the right drives in the right place
    • Mega cache for reads… and WRITES
io profiles
IO Profiles
  • Reads AND Writes?
  • What is the average desktop Read/Write IO profile?
  • 20% Reads, 80% Writes
  • Cache considerations should include writes
read iops
Read IOPS
  • Technologies help with read IOPS
    • Array based cache
    • RAM based, SSD Based
    • Host based cache
    • PCIe, Hypervisor caching
    • Storage tiering
    • Master image on SSD
write iops
Write IOPS
  • Handling write IOPS is trickier
    • In general you need to build out the number of spindles to support write IOPS
    • Don’t forget the RAID type caveat
    • SSD writes are slower than reads but still fast
    • Sizing for write IOPS is probably the most critical area
solving the storage barriers

What governs $/client and user experience?

Handling more IOPS with less LATENCY

How do we solve that?

Intelligent Mix of Dynamic Tiering and Drive Types

Solving the storage barriers

Balancing COST and PERFORMANCE

fully automated storage tiering fast

Intelligently migrate chunks data between multiple tiers of disk

Keep “Hot” data on the best performing storage, “Cold” data on the most cost effective storage

Fully Automated Storage Tiering (FAST)

Tiered Storage

Solid State

Flash drives

SAS

NL-SAS/

SATA

dynamic read write caching
Dynamic Read & Write Caching
  • FAST Cache enables you to architect for the NORM…not the PEAK
  • Lower the cost of the infrastructure without decreasing the performance or user experience
  • Leverages EFD (Enterprise Flash Drives) to act as a “Cache” for READ and WRITE activity
  • Accommodate VDI Performance AND Capacity Requirements
operations
Operations
  • Don’t drag your current process forward
  • Integration begets:
    • Simplicity
    • Transparency
    • Efficiency
slide34

Vmax | VNX | Isilon

Cisco | Brocade | Juniper

Cisco | HP | IBM | Dell

VMware vSphere

Multi-Site Cloud Technologies

RecoverPoint | SRDF | Vplex

Cloud StorageArchive / Rich Media

Atmos

Backup / Recovery

Avamar | Networker | DataDomain | DPA

Cloud Infrastructure

where does integration happen
“Where Does Integration Happen?”

ESX Storage Stack

VI Client

VM

VMFS

NFS

NFS

client

VMware LVM

Co-op

Snap request

SvMotion request

VM provisioning cmd

Turn thin prov on/off

VSS via VMware Tools

Datamover

Co-op

vStorage API for Data Protection (VADP)

NMP

vStorage API for Multi- pathing

Network Stack

SRM

vCenter

Vendor-specific vCenter

Plug-In

iSCSI/FCoE SW

Vendor-specific VAAI block module

HBA Drivers

NIC Drivers

View VMware-to-Storage relationships

Provision datastores more easily

Leverage array features (compress/dedupe, file/filesystem/LUN snapshots)

FC

FCoE

iSCSI

Vendor Specific vStorage API for SRM

Array APIs/Mgmt

NFS VAAI Module

VM object Awareness in array

NFS

VASA Module

VAAI SCSI cmds

Storage Array

Vendor-specific VAAI NFS operation support

Standards-based VAAI SCSI command support

integration delivers management simplicity
Integration Delivers Management Simplicity

EMC VSI Makes vCenter

“EMC Array Aware”

EMC Arrays Natively Are

“VM-aware”

VAAI OFFLOAD

FASTER PROVISIONING

10X

ENABLES UP TO

MORE VMs

FASTER REPLICATION

LESS NETWORK LOAD

MANAGE END-TO-END

LESS HOST LOAD

VM TO STORAGE

STORAGE TO VM

emc powerpath

HBA

HBA

HBA

HBA

EMC PowerPath

Hypervisor

SAN

SAN

SERVICE

CONSOLE

PowerPath

EMCPowerPath

Multipathing

PowerPath Migration Enabler

Virtualization

Monitoring and Management

Data Encryption

Nondisruptive arraymigrations

emc vsphere integrations

EMC vSphere Integrations.

Better Infrastructure Efficiency.

Easier Storage Management.

Stronger Security.

Better Deployments.

Greater Expertise.

slide39

Monitoring / Alerting

Portal

Datacenter Automation Layer

Federated CMDB

Self Service Consumption

Multi-Tenancy

and Chargeback

Service Catalog

Vmax | VNX | Isilon

Cisco | Brocade | Juniper

Cisco | HP | IBM | Dell

Unified Infrastructure Manager

VMware vSphere

Vblock

Multi-Site Cloud Technologies

RecoverPoint | SRDF | Vplex

Cloud StorageArchive / Rich Media

Atmos

Backup / Recovery

Avamar | Networker | DataDomain | DPA

Cloud Infrastructure

Datacenter Management

the cloud management stack automation orchestration
The Cloud Management StackAutomation / Orchestration

VMware

Cisco

CA

BMC

EMC

Portal

myServices

newScale

CA Service

Catalog

vService

Manager

Service Request

Management

Service Catalog

Tidal

Atrium

Orchestrator

vOrchestrator

CA Process

Orchestration

IT Orchestrator

Orchestration

Open APIs

vCloud Director

Virtualization

Virt Element Mgr

EMC

UIM

Compute

Comp Element Mgr

Open APIs

Network

Net Element Mgr

Store

Array Element Mgr

the cloud management stack service assurance and compliance
The Cloud Management StackService Assurance and Compliance

VMware

Cisco

EMC

Portal

newScale

vService

Manager

Service Catalog

Tidal

vOrchestrator

IT Orchestrator

Orchestration

vCenter Chargeback

vCenter Capacity IQ

vCenter Config Mgr

vCenter Operations Suite

vFabric

Watch4Net

IT Operations Intelligence

vCenter Operations

Open APIs

Open APIs

vCloud Director

Virtualization

Virt Element Mgr

EMC

UIM

Compute

Comp Element Mgr

Auto PerfGrapher

Open APIs

NCM

Network

Net Element Mgr

Store

SCA

Array Element Mgr

slide42

End User Computing

Data Analytics

Cloud Application Platform

Hadoop

Greenplum

vFabric

Cloud Foundry

Spring

Project Horizon

Zimbra

Mozy

View

ThinApp

vCloud Service Manager

vCloudConnector

Legacy Apps

vCloudAPI

vShieldEdge

vCenterOrchestrator

Multi-Tenancy

and Chargeback

vCenterChargeback

Service Catalog

vCloud Director

SAP

Oracle

MS

Vmax | VNX | Isilon

Cisco | Brocade | Juniper

Cisco | HP | IBM | Dell

Unified Infrastructure Manager

VMware vSphere

Vblock

Multi-Site Cloud Technologies

RecoverPoint | SRDF | Vplex

Cloud StorageArchive / Rich Media

Atmos

Backup / Recovery

Avamar | Networker | DataDomain | DPA

Cloud Infrastructure

slide43

EMC Consulting

End User Computing

Data Analytics

Cloud Application Platform

Hadoop

Greenplum

vFabric

Cloud Foundry

Spring

Project Horizon

Zimbra

Mozy

View

ThinApp

vCloud Service Manager

vCloudConnector

Legacy Apps

vCenterChargeback

vCenterOrchestrator

vShieldEdge

vCloud Director

vCloudAPI

SAP

Oracle

MS

VMware vSphere

Cloud Infrastructure

Unified Infrastructure Manager

Vblock

EMC Education

RecoverPoint | SRDF | Vplex

Atmos

Avamar | Networker | DataDomain | DPA

the converged model
The Converged Model

Hypervisor to Storage in One single supported unit

vblock fastpath desktop virtualization platform
VblockFastpath desktop virtualization platform
  • Support: Simple, Seamless, Smart
  • Enterprise-class,1000s of Users
  • Automation FacilitatesRapid Deployment
  • Price Transparency
slide47
Data
  • How do we protect the company?
  • How do we protect the data?
  • How do we protect the solution?
protecting your data with emc avamar
Protecting your data with EMC Avamar
  • VM Guest OS Backup
  • Image-Level Backup
  • De-duplicate data within and across VM files
  • Change-blocktracking minimizes recovery time
  • File level recovery from image backup
  • Replication provides DR for backed up VMs

VMware Virtualization Layer

Virtual Machines

DISK USAGE

NETWORK USAGE

CPU USAGE

x86 Architecture

Resource Pool

= Avamar Software Agent

VMware Virtualization Layer

Mount

x86 Architecture

Resource Pool

= Avamar Software Agent

Physical server

SAN

storage

Avamar

server

Physical Server

customer recovery challenges
Customer Recovery Challenges

85-90% of restore

Operations

10-15% of restore

Operations

File Recovery

Image Recovery

Simple

Automated

Application Integrated

Disaster Recovery

<1% of restore

Operations

slide50

ALWAYSON DESKTOP

Logical Diagram

  • Shared Applications
  • Workload Generators

User authenticates and connects to Site A

X

Site A Fails

Users' Session Drops/Fails

User re-authenticates

User is automatically connected to Site B

the oh no moment
(1) http://www.thesun.co.uk/sol/homepage/news/3637704/Missing-Laptop-with-86million-medical-records.htmlThe “Oh No” Moment

“The computer vanished from an NHS building in the biggest-ever security breach of its kind. […] A LAPTOP holding the medical records of eight MILLION patients has gone missing. […] The unencrypted laptop contains sensitive details of 8.63 million people plus records of 18 million hospital visits, operations and procedures.” (1)

NHS

maintaining security and compliance
Maintaining Security and Compliance

RSA ArcherCompliance

Dashboard

RSA DLP for

protection of data in use

RSA SecurID/CAC

for remote authentication

  • RSA enVision log mgmt for:
  • VMware vCenter & ESX(i)
  • VMware View
  • RSA SecurID
  • RSA DLP
  • Active Directory

VMware Infrastructure

Active Directory

VMwarevCenter

RSA SecurID

for ESX Service

Console and vMA

Clients

what should you take away
What Should you take Away?

Know Thy App

Know Thy Data

Know Thy Stack

Go in with the right expectations…

Know Thy Users

What are your use cases?

How will you deliver?

Requirements Should Drive Technology

How Best to Protect the Data?

Great Courage = Great Results!

Know Thy Self

Be bold! Embrace the change!

thank you
Thank You!
  • Q & A
  • Next Steps
  • Wrap Up