56
1 EMC CONFIDENTIAL—INTERNAL USE ONLY

End User Computing In The Post PC Era

  • Upload
    sloan

  • View
    54

  • Download
    4

Embed Size (px)

DESCRIPTION

End User Computing In The Post PC Era. Tom Twyman Sr. vSpecialist EMC [email protected]. Agenda. Where Are We? Keys To Success – People / Process Keys To Success – Technology Wrap Up & Next Steps. Ubiquitous Access. Recognizing users are working differently. Diverse Access - PowerPoint PPT Presentation

Citation preview

Page 1: End User Computing In The Post PC Era

1EMC CONFIDENTIAL—INTERNAL USE ONLY

Page 2: End User Computing In The Post PC Era

2EMC CONFIDENTIAL—INTERNAL USE ONLY

End User Computing In The Post PC EraTom TwymanSr. [email protected]

Page 3: End User Computing In The Post PC Era

3EMC CONFIDENTIAL—INTERNAL USE ONLY

Agenda Where Are We? Keys To Success – People / Process Keys To Success – Technology Wrap Up & Next Steps

Page 4: End User Computing In The Post PC Era

4EMC CONFIDENTIAL—INTERNAL USE ONLY

Ubiquitous Access

Page 5: End User Computing In The Post PC Era

5EMC CONFIDENTIAL—INTERNAL USE ONLY

Recognizing users are working differently

Diverse AccessU.S. Employees Survey 37% use do-it-yourself tech97% carry > 2 devices

Diverse Devices2010 Shipments Tablets + Smartphones > PC2015 shipments1.1B cell phones, 300M tablets

Diverse Apps2015 Mobile App Market: $38B

Sources: Morgan Stanley 2011, Gartner 2011, Forrester 2010, Pew 2011

Page 6: End User Computing In The Post PC Era

6EMC CONFIDENTIAL—INTERNAL USE ONLY

Consumer Technology is driving ITApp StoresUsers provision and install their own apps…within app store guidelines & protection

Application UpdatesApplications are updated through the App Store…by the End User, and not IT

Page 7: End User Computing In The Post PC Era

7EMC CONFIDENTIAL—INTERNAL USE ONLY

Access to dataUnsecure Unsanctioned File

Access and Sharing

Unsanctioned Access

File Servers

Users are frustrated with their file-sharing experience and are less productive

Leveraging multiple unsanctioned services to meet needs

Internal Users

Page 8: End User Computing In The Post PC Era

8EMC CONFIDENTIAL—INTERNAL USE ONLY

Flexible Application Delivery

Deliver just an application

From the cloud

Page 9: End User Computing In The Post PC Era

9EMC CONFIDENTIAL—INTERNAL USE ONLY

Where it’s going…

Desktop Service

App Catalog Service

Data ServiceSecure

Universal AccessUsers, Application,

Data Policies

Mobile

Entprs

Win

SaaS

Win

Entprs

Simplify Manage Connect

UniversalServices Broker

Page 10: End User Computing In The Post PC Era

10EMC CONFIDENTIAL—INTERNAL USE ONLY

This is dead and gone. Let it go.

Page 11: End User Computing In The Post PC Era

11EMC CONFIDENTIAL—INTERNAL USE ONLY

Agenda Where Are We? Keys To Success – People / Process

– Your Organizaton– Your Users

Keys To Success – Technology Wrap Up & Next Steps

Page 12: End User Computing In The Post PC Era

12EMC CONFIDENTIAL—INTERNAL USE ONLY

Why? Understand that the WHY is just as

important as the HOW The use cases for transformation are the key to success…base your decisions on what’s good for YOUR organization

This is the hard stuff...

Page 13: End User Computing In The Post PC Era

13EMC CONFIDENTIAL—INTERNAL USE ONLY

Kills projects before they start

Kills projects after they start

You will need executive sponsorship

But your users are asking for it!

Keeps everyone focused on the prize

Go in with the right expectations…There is NO CAPEX SAVINGS!

You can’t build it like “regular” VMs

Focus on end-user experience

The experience WILL CHANGE!

Bottom-up approach won’t work…

Page 14: End User Computing In The Post PC Era

14EMC CONFIDENTIAL—INTERNAL USE ONLY

All in good time…

Avoid the Traps….Thin Clients

$$$$Other Toys

It’s all academic - until…The Great Protocol Debate

Don’t just kick the tires…The Proof of Concept

This is not your father’s vm…Choice of Disk

Page 15: End User Computing In The Post PC Era

15EMC CONFIDENTIAL—INTERNAL USE ONLY

What’s driving VDI Adoption? Executive Order Windows 7 migrations Security and compliance challenges Consumerization of IT Consolidation of desktop management Flexible Workforce Reduction in support personnel Work-from-Home and Telecommuting Initiatives Disaster Recovery and Business Continuity

Page 16: End User Computing In The Post PC Era

16EMC CONFIDENTIAL—INTERNAL USE ONLY

3

• How can we simplify desktop management?

• How can we standardize desktop images?

• How quickly can we move to Windows 7?

• How do we extend the hardware lifecycle?

• Do we let users bring in their own devices?

• How do we make our mobile workforce more productive?

Why are WE Moving to VDI? Desktop management complexity• Backup for 47,000+ desktop devices • Ensure security patching compliance• Thousands of user-installed

applications create performance and compatibility issues

Old desktops and OS• Average PC is 3-4 years old & under-

powered• Windows XP is in extended support• Annual cost of refresh > $20M

Poor user experience• No choice of platform • Limited ability to provide “anywhere,

anytime” universal access

1

2

Page 17: End User Computing In The Post PC Era

17EMC CONFIDENTIAL—INTERNAL USE ONLY

The 5 W’s Who? What? When Where? Why? Understand your use cases

– Who is getting which application?– From Where?– When?– On which Devices? ? ??

?

?

Page 18: End User Computing In The Post PC Era

18EMC CONFIDENTIAL—INTERNAL USE ONLY

Developing the SolutionUse Case(s)

Application MappingPolicy / Governance

Capability Requirements

Solution Stack:- Broker- App delivery / presentation- Protocol Choices- Stateful / stateless- Et cetera…

Page 19: End User Computing In The Post PC Era

19EMC CONFIDENTIAL—INTERNAL USE ONLY

Agenda Where Are We? Keys To Success – People / Process Keys To Success – Technology

– Deconstructing the Desktop– Infrastructure– Operations

Wrap Up & Next Steps

Page 20: End User Computing In The Post PC Era

20EMC CONFIDENTIAL—INTERNAL USE ONLY

Deconstruct the Desktop

Let your app(s) dictate image strategy The best image is one that’s empty

– Virtualize everything possible– Use the Network for user data and application settings

User Data

Operating SystemApplications

Page 21: End User Computing In The Post PC Era

21EMC CONFIDENTIAL—INTERNAL USE ONLY

User Data “Conscious” and “subconscious” User Data

– Re-directed folders, home shares– Enterprise Data Portals (DKO/AKO)

Persona management– R0@m1ng Pr0f1le$! (bad word)– VDI integrated and third party solutions

Page 22: End User Computing In The Post PC Era

22EMC CONFIDENTIAL—INTERNAL USE ONLY

Infrastructure Compute Network Storage

Page 23: End User Computing In The Post PC Era

23EMC CONFIDENTIAL—INTERNAL USE ONLY

Compute best practices Go back to Assessment Determine Usage Matrix, characteristics Desktop to Core ratios Cluster HA considerations Memory is king

Page 24: End User Computing In The Post PC Era

24EMC CONFIDENTIAL—INTERNAL USE ONLY

Network Considerations Latency = The Enemy Bandwidth Display Protocol considerations Security (VLANS, ACLs) Continuity and Recovery

Page 25: End User Computing In The Post PC Era

25EMC CONFIDENTIAL—INTERNAL USE ONLY

The Storage Dilemma• Most people think of storage

in terms of capacity• You need to think of storage

in terms of performance• Size doesn’t matter… as much• Do it right the first time• Virtual desktop performance should be as

good or better than a physical PC

Page 26: End User Computing In The Post PC Era

26EMC CONFIDENTIAL—INTERNAL USE ONLY

Consider Delivery Type• Thick, persistent desktops

• Consume same space as physical• Easier to size, mostly based on capacity

• Thin, non-persistent desktops• Based on common image• Massive space savings = consolidated IO• Harder to size, based on performance

• Use the right drives in the right place• Mega cache for reads… and WRITES

Page 27: End User Computing In The Post PC Era

27EMC CONFIDENTIAL—INTERNAL USE ONLY

IO Profiles• Reads AND Writes? • What is the average desktop Read/Write IO profile? • 20% Reads, 80% Writes• Cache considerations should include writes

Page 28: End User Computing In The Post PC Era

28EMC CONFIDENTIAL—INTERNAL USE ONLY

Read IOPS• Technologies help with read IOPS• Array based cache

• RAM based, SSD Based

• Host based cache• PCIe, Hypervisor caching

• Storage tiering• Master image on SSD

Page 29: End User Computing In The Post PC Era

29EMC CONFIDENTIAL—INTERNAL USE ONLY

Write IOPS• Handling write IOPS is trickier• In general you need to build out the number of

spindles to support write IOPS• Don’t forget the RAID type caveat• SSD writes are slower than reads but still fast• Sizing for write IOPS is probably the most critical

area

Page 30: End User Computing In The Post PC Era

30EMC CONFIDENTIAL—INTERNAL USE ONLY

Solving the storage barriersBalancing COST and PERFORMANCE

• What governs $/client and user experience?▪Handling more IOPS with less LATENCY

• How do we solve that?▪Intelligent Mix of Dynamic Tiering and Drive Types

Page 31: End User Computing In The Post PC Era

31EMC CONFIDENTIAL—INTERNAL USE ONLY

NL-SAS/SATA

SAS

Solid StateFlash drives

Tiered StorageFully Automated Storage Tiering (FAST)

Intelligently migrate chunks data between multiple tiers of disk

Keep “Hot” data on the best performing storage, “Cold” data on the most cost effective storage

Page 32: End User Computing In The Post PC Era

32EMC CONFIDENTIAL—INTERNAL USE ONLY

Dynamic Read & Write Caching• FAST Cache enables you to architect for the

NORM…not the PEAK

• Lower the cost of the infrastructure without decreasing the performance or user experience

• Leverages EFD (Enterprise Flash Drives) to act as a “Cache” for READ and WRITE activity

• Accommodate VDI Performance AND Capacity Requirements

Page 33: End User Computing In The Post PC Era

33EMC CONFIDENTIAL—INTERNAL USE ONLY

Operations Don’t drag your current process forward Integration begets:

– Simplicity– Transparency– Efficiency

Page 34: End User Computing In The Post PC Era

34EMC CONFIDENTIAL—INTERNAL USE ONLY

Cloud InfrastructureVMware vSphere

Vmax | VNX | Isilon Cisco | HP | IBM | DellCisco | Brocade | Juniper

Backup / Recovery Cloud StorageArchive / Rich MediaMulti-Site Cloud TechnologiesAvamar | Networker | DataDomain | DPA AtmosRecoverPoint | SRDF | Vplex

Page 35: End User Computing In The Post PC Era

35EMC CONFIDENTIAL—INTERNAL USE ONLY

“Where Does Integration Happen?”

FCFCoEiSCSIArray APIs/Mgmt

vCenter

VAAI SCSI cmds

ESX Storage Stack

Datamover

Vendor-specific vCenter Plug-In

View VMware-to-Storage relationshipsProvision datastores more easily

Leverage array features (compress/dedupe, file/filesystem/LUN snapshots)

VI Client VM

Storage Array

VMFS NFS

NFSclient

Network Stack

VMware LVM

HBA Drivers

VSS via VMware Tools Snap request

SvMotion requestVM provisioning cmdTurn thin prov on/off

Standards-based VAAI SCSI command support

vStorage API for Multi- pathingNMP

NFS

NIC Drivers

vStorage API for Data Protection (VADP)

Vendor Specific vStorage API for

SRM

SRM

VM object Awareness

in array

Co-opCo-op

Vendor-specific VAAI NFS operation support

VASA Module

NFS VAAI Module

iSCSI/FCoE SW Vendor-specific VAAI block module

Page 36: End User Computing In The Post PC Era

36EMC CONFIDENTIAL—INTERNAL USE ONLY

Integration Delivers Management Simplicity

VAAI OFFLOAD

10XENABLES UP TOFASTER PROVISIONINGMORE VMs

LESS NETWORK LOADLESS HOST LOAD

FASTER REPLICATION

EMC VSI Makes vCenter“EMC Array Aware”

EMC Arrays Natively Are“VM-aware”

STORAGE TO VM VM TO STORAGE

MANAGE END-TO-END

Page 37: End User Computing In The Post PC Era

37EMC CONFIDENTIAL—INTERNAL USE ONLY

EMC PowerPath

Monitoring and Management

EMCPowerPathMultipathing

Data EncryptionPowerPath Migration Enabler Virtualization

Nondisruptive array migrations

SAN

HypervisorPowerPath

SERVICECONSOLE

HBA HBA HBA HBA

SAN

Page 38: End User Computing In The Post PC Era

38EMC CONFIDENTIAL—INTERNAL USE ONLY

EMC vSphere Integrations.Better Infrastructure Efficiency.Easier Storage Management.Stronger Security.Better Deployments.Greater Expertise.

Page 39: End User Computing In The Post PC Era

39EMC CONFIDENTIAL—INTERNAL USE ONLY

Datacenter Management

Cloud Infrastructure

Self Service Consumption Multi-Tenancy and ChargebackService Catalog

VMware vSphere

Vmax | VNX | Isilon Cisco | HP | IBM | DellCisco | Brocade | JuniperUnified Infrastructure ManagerVblock

Backup / Recovery Cloud StorageArchive / Rich MediaMulti-Site Cloud TechnologiesAvamar | Networker | DataDomain | DPA AtmosRecoverPoint | SRDF | Vplex

Datacenter Automation Layer

Federated CMDB

Portal

Monitoring / Alerting

Page 40: End User Computing In The Post PC Era

40EMC CONFIDENTIAL—INTERNAL USE ONLY

Open APIs

The Cloud Management StackAutomation / Orchestration

Store

Network

Compute

Virtualization

Orchestration

Service Catalog

Portal

EMCUIM

vCloud Director

Tidal

newScale

AtriumOrchestrator

Service RequestManagement

myServices

vOrchestrator

vServiceManager

CA ProcessOrchestration

CA ServiceCatalog

Open

API

s

Array Element Mgr

Net Element Mgr

Comp Element Mgr

Virt Element Mgr

VMware Cisco BMCCA

IT Orchestrator

EMC

Page 41: End User Computing In The Post PC Era

41EMC CONFIDENTIAL—INTERNAL USE ONLY

Open APIs

vCenter Operations Suite

Open APIs

The Cloud Management StackService Assurance and Compliance

Store

Network

Compute

Virtualization

Orchestration

Service Catalog

Portal

EMCUIM

vCloud Director

Tidal

newScale

vOrchestrator

vServiceManager

Open

API

s

Array Element Mgr

Net Element Mgr

Comp Element Mgr

Virt Element Mgr

VMware Cisco

IT Orchestrator

EMC

vCenter Operations

vCenter Capacity IQ

vCenter Config Mgr

vCenter Chargeback

SCA

Auto Perf Grapher

NCM

vFabric

IT Operations Intelligence

Watch4Net

Page 42: End User Computing In The Post PC Era

42EMC CONFIDENTIAL—INTERNAL USE ONLY

Cloud Infrastructure

Multi-Tenancy and ChargebackService Catalog

VMware vSphere

Vmax | VNX | Isilon Cisco | HP | IBM | DellCisco | Brocade | JuniperUnified Infrastructure ManagerVblock

vShieldEdgevCloud Director

Backup / Recovery Cloud StorageArchive / Rich MediaMulti-Site Cloud TechnologiesAvamar | Networker | DataDomain | DPA AtmosRecoverPoint | SRDF | Vplex

vCenterChargebackvCloud

API

vCloud Service ManagervCenter

OrchestratorvCloud

Connector

Cloud Application PlatformvFabricSpring Cloud

Foundry

End User Computing

View ThinApp Zimbra MozyProject Horizon

Legacy AppsSAPMS Oracle

Data AnalyticsHadoopGreen

plum

Page 43: End User Computing In The Post PC Era

43EMC CONFIDENTIAL—INTERNAL USE ONLY

EMC Consulting

EMC Education

Cloud InfrastructureVMware vSphere

Unified Infrastructure Manager

vShieldEdgevCloud Director

Avamar | Networker | DataDomain | DPA AtmosRecoverPoint | SRDF | Vplex

vCenterChargeback

vCloud Service ManagervCenter

OrchestratorvCloud

Connector

Cloud Application PlatformvFabricSpring Cloud

Foundry

End User ComputingView ThinApp Zimbra MozyProject

Horizon

Legacy AppsSAPMS Oracle

Data AnalyticsHadoopGreen

plum

vCloudAPI

Vblock

Page 44: End User Computing In The Post PC Era

44EMC CONFIDENTIAL—INTERNAL USE ONLY

The Build your Own Cloud Model

Page 45: End User Computing In The Post PC Era

45EMC CONFIDENTIAL—INTERNAL USE ONLY

The Converged ModelHypervisor to Storage in One single supported unit

Page 46: End User Computing In The Post PC Era

46EMC CONFIDENTIAL—INTERNAL USE ONLY

Vblock Fastpath desktop virtualization platform

Enterprise-class,1000s of Users Price TransparencyAutomation Facilitates

Rapid DeploymentSupport: Simple,

Seamless, Smart

Page 47: End User Computing In The Post PC Era

47EMC CONFIDENTIAL—INTERNAL USE ONLY

Data How do we protect the company? How do we protect the data? How do we protect the solution?

Page 48: End User Computing In The Post PC Era

48EMC CONFIDENTIAL—INTERNAL USE ONLY

De-duplicate data within and across VM files

Change-block tracking minimizes recovery time

File level recovery from image backup

Replication provides DR for backed up VMs

Resource Pool

VMware Virtualization Layerx86 Architecture

Physical server

Virtual Machines

SANstorag

e

Avamarserver

Mount

= Avamar Software AgentPhysical Server

CPU USAGE NETWORK USAGE DISK USAGE

VMware Virtualization Layerx86 Architecture

Resource Pool

Image-Level Backup

VM Guest OS Backup

= Avamar Software Agent

Protecting your data with EMC Avamar

Page 49: End User Computing In The Post PC Era

49EMC CONFIDENTIAL—INTERNAL USE ONLY

Disaster RecoveryImage RecoveryFil

e Rec

over

y

SimpleAutomated

Application Integrated

Customer Recovery Challenges

Page 50: End User Computing In The Post PC Era

50EMC CONFIDENTIAL—INTERNAL USE ONLY

ALWAYSON DESKTOP Logical Diagram

• Shared Applications

• Workload Generators

User authenticates and connects to Site ASite A Fails XUsers' Session Drops/Fails

User is automatically connected to Site B

User re-authenticates

Page 51: End User Computing In The Post PC Era

51EMC CONFIDENTIAL—INTERNAL USE ONLY

The “Oh No” Moment

(1) http://www.thesun.co.uk/sol/homepage/news/3637704/Missing-Laptop-with-86million-medical-records.html

“The computer vanished from an NHS building in the biggest-ever

security breach of its kind. […] A LAPTOP holding the medical records of eight MILLION patients has gone missing. […] The unencrypted laptop contains sensitive details of 8.63 million people plus records of 18 million hospital visits, operations and procedures.” (1)

NHS

Page 52: End User Computing In The Post PC Era

52EMC CONFIDENTIAL—INTERNAL USE ONLY

Some Threats Mitigated, but others remain…Threats Solved with VDI? Traditional

Deployments?Threat: Asset Identification(where are desktops?)Threat: Real-time association of User to Desktop (visibility)Threat: Lack of IT controls on Employee owned devices

Threat: User Data Privacy & Encryption (e.g. compliance & removable devices)

Threat: Provisioning Vulnerable Desktops

Threat: Desktop Configuration Compliance

Threat: Desktops as Servers

Integration of Endpoint to Security Ops Monitoring

??

??

?

Page 53: End User Computing In The Post PC Era

53EMC CONFIDENTIAL—INTERNAL USE ONLY

Maintaining Security and Compliance

Clients

VMware Infrastructure

VMwarevCenter

Active Directory

RSA Archer Compliance Dashboard

RSA SecurID/CAC for remote

authentication

RSA SecurIDfor ESX Service

Console and vMA

RSA enVision log mgmt for:• VMware vCenter & ESX(i)• VMware View• RSA SecurID• RSA DLP• Active Directory

RSA DLP for protection of data

in use

Page 54: End User Computing In The Post PC Era

54EMC CONFIDENTIAL—INTERNAL USE ONLY

Know Thy Users

Know Thy App

What Should you take Away?

How will you deliver?

What are your use cases?

Great Courage = Great Results!Be bold! Embrace the change!

Know Thy DataHow Best to Protect the Data?

Know Thy StackRequirements Should Drive Technology

Know Thy SelfGo in with the right expectations…

Page 55: End User Computing In The Post PC Era

55EMC CONFIDENTIAL—INTERNAL USE ONLY

Thank You! Q & A Next Steps Wrap Up

Page 56: End User Computing In The Post PC Era