Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium,...

31
Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL ® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL ® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS. Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. No computer system can provide absolute security under all conditions. Intel ® Trusted Execution Technology requires a computer system with Intel ® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. Legal Disclaimers

Transcript of Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium,...

Page 1: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Copyright © 2009 Intel Corporation

Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

*Other names and brands may be claimed as the property of others.

INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL ® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS.

Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.

No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE).  The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses.

Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance.

All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.

Legal Disclaimers

Page 2: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Intel Confidential

Evaluating Thin Clients & Alternative Compute Models

Chee Pung LoyIntel Americas

Channel Solutions Account ManagerOctober 2009

Page 3: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Members Only Members Only WebsiteWebsite

Subscribe today. It’s FREE!

Stay Connected Intel Premier IT Professional (IPIP) Program

Exclusive Exclusive MagazineMagazine

Events Events & Networking& Networking

• 14 events in US & Canada

• Analyst presentations & whitepapers

• Intel technology roadmap

• Intel IT best practices

• ISV presentations

• Participate in online social media

• Download up-to-date technical resources

Monthly Monthly NewsletterNewsletter

Page 4: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Evaluating Thin Clients & Alternative Compute Models

• IT Business Perspective

•Different compute models

•Future Perspective

•Ecosystem & Intel

Page 5: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Executive Challenges

IT Business Challenges

Improve Security and Simplify Management

Minimize risk, streamline operations

Business Continuity

High availability and accessibility of applications,

data, collaboration

Growing Complexity and TCO

Budgetary pressure to cut operating expenses

Business Responsiveness

Flexibility and agility to deliver applications depending on

location and device

Page 6: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

IT Under Pressure: Response

Growing complexity and TCO

• Budgetary pressure to cut costs

Business Continuity

• Highly availability and accessibility of applications, data, collaboration

Improve Security and Simplify Manageability

• Minimize risk and streamline operations

Business Responsiveness

• Flexibility and agility to deliver applications and data

Improved Client Management and Security

Capabilities

New Software and Data Delivery Models

Pain Points

Response

Drive for Centralized

Control Via…

+

The Dynamic Virtual Client

Page 7: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Lets look at what Gartner has found

“The total cost of ownership of server-based computing is from 12 percent to 48 percent less

than for comparable PCs.”

- Gartner, June 2006

Page 8: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Gartner’s Path to 48% TCO Reduction from an Unmanaged Desktop

-15%

-25%

-7%

-1%

Total: 48% TCO Reduction

Reduction from better mgmt:

40%

Reduction from server-based model: 8%

StartUnmanaged Windows* XP

Desktop

Typically Managed Windows XP Desktop

Well-Managed Windows XP Desktop

Windows-Based Terminal (32-Bit)

Windows-Based Terminal (64-Bit)

Unmanaged Windows* XP Desktop

Typically Managed Windows XP Desktop

Well-Managed Windows XP Desktop

Windows-Based Terminal (32-Bit)

Windows-Based Terminal (64-Bit)

*Other names and brands may be claimed as the property of others.*Other names and brands may be claimed as the property of others.

Page 9: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Adoption of Virtualization and Streaming

“A NEW information technology discipline is emerging around application delivery to control

desktop management costs and security… the next generation of

delivery is application streaming.”

--Martin Gilliland, Gartner

“In the future, IDC believes that application virtualization and streaming technology will become an increasingly common way for many IT organizations to deploy and manage applications.“

--Mike Rose, IDC

Enterprises are Seeking New Application Delivery Methods

Source: IDC, 2008

Page 10: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Spectrum of Compute Models

Mobile Capable

Off-Network Option

Network Connected Only

OS+App Streaming

App Streaming

Local, Rich Client

1:1 Blade PC

Virtual Container

Web-Based Apps

Terminal Services

Virtual Hosted Desktop

1:Many Blade PC

Client-Side Compute & Centralized or Local

Data Storage

OS+App Streaming

App Streaming/

Virtualizaton

Distributed, Rich Client

1:1

Blade PC

Virtual Containers (Emerging)

Web-Based Apps

Terminal Services

Virtual Hosted Desktop

1:Many Blade PC

Client-Side Compute,

Centralized Data Storage

Server-Side Compute & Centralized Data Storage

Page 11: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Virtual Container Video

Page 12: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

What is the Right Solution for My Business ?

IT Requirements

SecurityImage Management

License ManagementSupport StructureDisaster Recovery

User ExperienceMobility

ResponsivenessCustomizationConnectivity

Ownership and Privacy

Available Infrastructure

ServersStorage

Space, Power, CoolingNetwork Bandwidth

Budget Priorities

Application WorkloadsCompute LoadGraphics Load

Delay Sensitivity (i.e., Video, VOIP)Headroom

Evaluate for Each User Segment

Appropriate Solution is a Balance of Many Interrelated Factors

Page 13: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Mixed Delivery Models Often Required to Meet All User and IT Requirements

Construction Estimator

University Student

Marketing Staffer

Call Center Representativ

e

Terminal Services

Scheduling database

Purchasing database

Order database

Virtual Hosted Desktop

Remote access to standard dept image

Streaming Technology

CAD packageCourse-specific

applicationsPhoto & video

editing packages

Local InstallOffice apps,

Browser

Office apps, Browser, Media

players

Office apps, Browser, Media

players

Appropriate Device

Laptop PC Laptop PCLaptop or

Desktop PCDesktop PC or Thin terminal

Page 14: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Real World Solutions May Mix Models

•Diverse user and IT needs will likely result in hybrid models– Same user accesses software through multiple models

•100% single-model deployments may be rare– Single model may make sense when security, management and

workload requirements are unlikely to change over time

•Selected client devices should accommodate the most demanding requirements of target users– Desktop & laptop PCs provide most flexibility for all models

– Thin terminals appropriate for 100% server-side deployments

Page 15: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Compute Model Taxonomy

Terminal Services

(aka Session Virtualization)

Virtual Hosted Desktops(aka Virtual

Desktop Infrastructure)

OS and Application Streaming

Application Streaming

(aka Application Virtualization)

Virtual Containers

Rich, Distributed Computing

(aka Rich Client, Fat Client)

Execution Server-based Server-based Client-based Client-based Client-based Client-based

Application Executable Storage

Server Server ServerServer

(Client caching option)

Server (Client caching option)

Client

Application Data Storage

Server, NAS or SAN

Server, NAS or SAN

Server, NAS or SAN

Server, NAS or SAN (Client

caching option)

Client, Server, NAS or SAN

Client, Server, NAS or SAN

Mobility / Off-Network Operation

No No No Yes Yes Yes

Local Device Synchronization (bar code reader, PDA, phone, etc.)

No Limited Yes Yes Yes Yes

Acceptable ClientsTerminal, Desktop

PC, Laptop PC

Terminal, Desktop PC, Laptop PC

Desktop PC, Laptop PC

Desktop PC, Laptop PC

Desktop PC, Laptop PC

Desktop PC, Laptop PC

Major Providers Citrix*, Microsoft* VMware*, Citrix CitrixMicrosoft, Citrix,

LANDesk*, Altiris*, AppStream*

VMWare vClient*Microsoft Med-V*

Traditional PC software providers

NAS = Network Attached StorageSAN = Storage Area Network *Other names and brands may be claimed as the property of others.*Other names and brands may be claimed as the property of others.

Page 16: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Processor Chipset Network

Intel® Core™2 Duo

Intel® Core™2 Quad

Intel®Express Chipset

Intel® Gigabit Network

Intel® Anti-Theft

Technology

Intel® Active Management Technology

Intel® Virtualization Technology

Intel® Trusted Execution

Technology

Intel® vPro™ Technology

Intel vPro Technology: Virtualization, Security, and Management

Page 17: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Intel® vPro™ Technology

Intel® Anti-Theft

Technology

Intel® Virtualization Technology

Intel® Trusted Execution

Technology

Intel® Active Management Technology

Secured Virtualization for New Compute Models

Virtual Containers

Clients

Local OS

Virtual Container

Virtualization

Hardware

Partition Manager

Partition 1 Partition n

Guest OS

App App

Guest OS

App App

Protection from within

Protection between partitions

Physical hardware protection

System Protection

Protection from outside

Trusted Platform Protection Areas

Streaming Server

Master OS

image

Master Apps

image

Page 18: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Intel® vPro™ Technology

Intel® Anti-Theft

Technology

Intel® Virtualization Technology

Intel® Trusted Execution

Technology

Intel® Active Management Technology

Enhanced Security and Manageability for New Compute Models

OS Streaming

or Remote OS Boot

Application streaming & virtualization

Virtual Containers

OS Streaming

Clients

Virtualization

Virtual Application

Local OS

Virtual Container

Virtualization

Page 19: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Summary

•Software delivery models have evolved and IT has more choices than ever

•The appropriate compute model for a user segment is a balance of many factors

•Optimization of IT and User needs will likely result in a mix of delivery models, even within a single user segment

•PCs with Intel® vPro™ and Centrino® Pro processor technology are the most manageable, secure PCs on which to deliver all compute models

Page 20: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Thank you.

Page 21: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Backup

Page 22: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Thin ClientTerminal

Mobile CapableOff-Network

Option

Network Connected

Only

Server Compute

Centralized Management

Centralized Data Storage

Client Compute Centralized and

Local Data Storage

Options

Client Compute

Centralized Management

Centralized and Local

Data Storage Options

Managed Rich Client

DT & NB clients

DynamicDynamicVirtual ClientVirtual Client

Centralized apps and data

Rich or Thin? It’s No Longer a Binary Decision

Page 23: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Intel’s Dynamic Virtual Client (DVC)

Streaming Server

Master OS

image

Master Apps

image

A Family of Compute Models Based On Streaming and Virtualization

• Simplified centralized workplace management (applications and data)

• Improved security

• Rich client performance and experience with mobile capabilities

Application Streaming & Virtualization

Virtual Containers

OS Streaming

Clients Network Server

On-Demand Delivery

Data SynchronizationOS

Streaming

or

Remote OS Boot

Virtualization

Virtual Applicatio

n

Local OS

Virtual Container

Virtualization

Page 24: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

DVC Solutions and Intel® vPro™ Technology Enabling

Solution Compute Model Intel® vPro™ Technology Link Status

Microsoft SCCM R2* + App-V 4.5

App virtualization App-V now enabled to use Intel® vPro™ technology secure managementt link to push an update to a locally-cached, virtualized app regardless of OS state along with license management using TPDS

Shipping

Symantec Workspace Virtualization* v6.1 SP1

App streaming/ virtualization

SWS can write app licensing and usage information into vPro technology’s non-volatile memory. Info can be read OOB and used to make optimal license purchasing decisions. Mobility SDK support provided

Q2’09

Lenovo Secure Managed Client* (SMC)

Remote OS boot SMC uses a thin, Intel® Virtualization Technology-enabled VMM to redirect storage from the local disk to a SAN. SMC clients are Lenovo M-Series* vPro technology desktops

v1.2 (US release May’09)Global GA –Q3/09

Dell On-Demand* Desktop Streaming(ODDS)

OS Streaming Dell has bundled Citrix PVS* (OS streaming) with diskless vPro technology desktops for a turnkey solution

Shipping

Citrix Provisioning Server* for Desktops v5.0 also integrated into Citrix Xen Desktop* V3

OS streaming On an 802.1x, NAC or NAP network, vPro technology systems with the Intel® Embedded Trust Agent can present network security credentials prior to receiving a streamed OS, providing assurance that only authorized systems access the network

Shipping

Citrix -Project Independence*

Virtual containers A joint development project between Citrix and Intel; uses an Intel® VT-d, VT-x and TXT-aware VMM

In development. Expected 2H’09

VMware - Client Virtualization Platform*

Virtual containers Optimized for Intel vPro technology. In development. Expected 2H’09

*Other brands and names may be claimed as property of others.

All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.

Page 25: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Key Compute Model ISVs

Model ISV & Product Intel® vPro™ Technology Optimization?

OS Streaming Citrix Provisioning Server for Desktops* v4.5 and greaterCitrix XenDesktop* V3Dell On-Demand Streaming Solution

Intel® Embedded Trust AgentIntel® Embedded Trust Agent

Intel® AMT, Intel® ETA

Remote OS Boot Lenovo Secure Managed Client* Intel® AMT, Intel® VT

App Streaming/ Virtualization

Citrix XenApp* (supports both terminal services and application streaming)Microsoft SCCM/R2* Symantec SWV 6.1*VMware View 3(with Thinapp)*Others

-Intel® AMTIntel® AMT

Intel Mobile SDK -Symantec-

Virtual Containers Citrix – Intel collaboration (Q1’10, codenamed Project Independence)Microsoft Enterprise Desktop Virtualization*VMware ACE*, VMware Player*VMware future Client Virtualization Platform (2H’09)

Intel® AMT, Intel® VT---

Intel® AMT, Intel® VT

Enhanced Network Display Protocols

Citrix ICA*HP Remote Graphics Software*Microsoft RDP replacement in Windows* 7 (formerly Calista*)Teradici PC-over-IP*Others

----

* Other brands and names may be claimed as property of others.

Page 26: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Presentation Virtualization: Terminal Services

Presentation VirtualizationIT Benefits

• Centralized image and security

• Proven technology

• Less infrastructure than virtual hosted desktop approach

• Access from any connected client

• Stateless client

Limitations• No mobility

• Responsiveness varies (workload and latency)

• Poor motion graphics, streamed audio, and peripheral synch

• User satisfaction issues

Local OS

Terminal Software

Server OS

Terminal Server

Application

Session A

Session B

RDP Remote Display

Protocol

Page 27: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Virtual Hosted Desktop

Virtual Hosted Desktop

Local OS

Terminal sw

VMM

APP

OS

APP

OS

RDP Remote Display

Protocol

APP

OS

APP

OS

IT Benefits• Centralized image and security

• User customization

• Access from any connected client

• Stateless client

Limitations• No mobility

• Lower users/processor ratio than terminal services

• Costly data center build-out

• Responsiveness varies (workload and latency)

• Poor motion graphics, streamed audio, and peripheral synch

• Immature deployment and management tools

Page 28: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Operating System and Application Streaming

Operating System and Application Streaming

Streamed OS

Virtual App Mgr

Streaming Server

OS, Virtual App Mgr and Application streamed over

Network

Streamed App

OS

App Mgr

App

IT Benefits• Centralized image, data, and security

• Single image serves many clients (less storage)

• Responsive compute and graphics

• User customization

• Increased security and compatibility with application virtualization

• Less infrastructure than server-side models

• “Stateless” client

Limitations• Limited mobility; no local caching

• Network boot storms

• Some application incompatibilities

• Validation can be labor-intensive

Page 29: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Application Streaming and Virtualization

Application Streaming

Local OS & Apps

Virtual App Mgr

Streaming Server

Application streamed over

Network

App

IT Benefits• Centralized application, data, and

security

• Single application image serves many clients (less storage)

• Responsive compute and graphics

• User customization

• Increased security, compatibility with application virtualization

• Less infrastructure than server-side models

• Off-network mobility

Limitations• Centralizes applications and data

only, not whole image

• Some application incompatibilities

• Validation can be labor-intensive

App App

App App App

Page 30: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Virtual Containers

Virtual Containers

Local OS & Apps

VMM

Streaming Server

Streamed, DVD, or USB Drive

IT Benefits• Image-level delivery

• Off-network mobility

• Application performance

• Multiple images/client (e.g., corporate/private, contractor)

• Low data center cost

Limitations• Technology and tool

immaturity

• Complexity of current solutions

App

OS

App

OS

App

OS

App

OS

Page 31: Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered.

Revision - 01

Intel Confidential

Intel® vPro™ Technology Capabilities & Alternative Compute Models

Compute modelvPro capability

Terminal Services

Virtual Hosted Desktop

OS + App Streaming

App Streaming (Local OS)

Rich Client or Mixed Model

Accurate count of clients (regardless of power or OS state)

X X X X X

Accurate HW inventory (regardless of power or OS state)

X X X X X

Accurate SW inventory (regardless of power or OS state)

X(inventory & update

terminal SW)

X(inventory & update

terminal SW)X X

Secure wake-&-update

X X

Isolate an infected client

X X X

Monitor agent presence

X X X

Encrypt data on hard drive (Danbury Tech ’08)

X X