Date post: | 26-Mar-2015 |
Category: |
Documents |
Upload: | avery-wyatt |
View: | 212 times |
Download: | 0 times |
1
Agenda
Market Trends and Business Considerations
Fujitsu Customer Experiences Today
Options Today and Beyond
Q&A
Market Trends
2 All Rights Reserved, Copyright © Fujitsu Limited 2011
Consumerisation
“Can either drive IT crazy or drive IT strategy” Yankee Group Research 2011
Apple Effect (Yankee Group)
Derivative Effect (Gartner)
Enterprise Crowdsourcing
Mobility not portability
3 All Rights Reserved, Copyright © Fujitsu Limited 2011
IT’s Desktop Challenges
Reducing the cost of IT
Consumerisation
User trends
Who’s in charge?
Packaging without constraints
User management, not device
Cloud
Technology Neophytes
4 All Rights Reserved, Copyright © Fujitsu Limited 2011
Business Considerations
Deciding the most expedient route to desktop modernisation
What services provide competitive/business advantage?
What services will IT deliver and at what cost?
Cloud Due Diligence
Green Desktop
End User Satisfaction
5 All Rights Reserved, Copyright © Fujitsu Limited 2011
November 2011
Fujitsu Desktop Modernisation – Customer experience
Copyright 2011 FUJITSU LIMITED
7
Customer Experience
Fujitsu’s Project Approach
Migration Approaches
Customer’s Business Considerations
Project Phases
Business Benefits
Lessons learnt
Fujitsu’s Project Approach
8 Phased Approach
8 All Rights Reserved, Copyright © Fujitsu Limited 2011
Migration Approaches
9 All Rights Reserved, Copyright © Fujitsu Limited 2011
Customer’s Key Considerations
Better data protection against loss or theft
Extend life legacy applications
Integrated secure, reliable and easy to manage desktop
Increased desktop performance
10 All Rights Reserved, Copyright © Fujitsu Limited 2011
Initial Phase
Proposal was an iterative approach as requirements were settled-on progressively
Discovery highlighted apps which would need testing/replacing
Application Remediation initiated
IE 8 user testing initiated
Baseline hardware testing
Customer stance: “allow everything, unless there is a security reason not to”
Implementation Phase
SOE build
GPOs and login script remediation
BitLocker scenarios
Print server drivers
Application Remediation
AppV infrastructure
AGPM (Advanced Group Policy Management)
Release Phase
Beta users, key stake holders from business
Desktop Specialists
Site by Site
User centric
Success based predominantly on user experience and feedback
Each site signed off prior to next proceeding
Business Benefits Realised
Established integrated secure business desktop
Better data protection
Extended lifespan/future proof of SOE
Cost effective deployment and increased performance and functionality for the business
Lessons Learned
Established SOE reduces complexity
Consistency of resources/knowledge retention
RAM requirements
Application Remediation
Business involvement
Project team onsite
Service Desk involvement
Business lead, technology followed
November 2011
Desktop ModernisationToday and Beyond
Copyright 2011 FUJITSU LIMITED
17
Agenda
The Waves of Technology
The People Vision
Migration Options for Today
Evolution and Futures
Virtual Client Services
Mobile Device Management
18 All Rights Reserved, Copyright © Fujitsu Limited 2011
Three Waves of Information Technology
We are entering the third wave…
1st Wave COMPUTER CENTRICThe mainframe is the information source, people need
to be near the source
2nd Wave NETWORK CENTRICDistributed computing is born allowing islands of
information sources to be near where people are located
3rd Wave PEOPLE CENTRICInformation sources exist in a controlled environment, but allow people to operate wherever they need to be
Copyright 2010 FUJITSU LIMITED18 18
The Six CsThese six ‘C’s will drive change in IT Services…
CONSOLIDATION - Better alignment and greater value from existing assets, driven by the desire for consistency and greater efficiency
COMMODITISATION - Product and service becoming modular and ‘off-the-shelf’, driven by the need for greater agility and visibility of cost
COLLABORATION - Web technologies and better access are driving ever greater interaction between people
CONSUMERISATION - Consumer technology is overtaking business technology as the driving force of choice
CONSERVATION - The need to be green, driven by ethical, reputational, regulatory and increasingly business grounds
COMPLIANCE – with legislation, regulations, standards – impacting globally and locally Copyright 2010 FUJITSU LIMITED19 19
Some Predictions (various sources) By 2013, mobile phones will overtake PCs as the most common Web
access device worldwide
By 2013, 80% of businesses will support a workforce using tablets
By 2014, more than three billion of the world’s adult population will be able to transact electronically via mobile and Internet technology
By 2014, 90% of organizations will support corporate applications on personal devices
By 2014 most mobile workers will be using their mobile phone as the primary communications device
By 2014, 90% of organisations will support corporate applications on personal devices
Through 2014, non iOS (i.e. non Apple OS) media tablets will take 60% of the market, but only Apple will exceed 10% market share
By 2015, companies will generate 50% of Web sales via their social presence and mobile applications
By 2015, 10% of your online ‘friends’ will be nonhuman
20
Source: Fujitsu CTOs, Gartner, Ovum, IDC
The Workspace Vision
End-User Computing
All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS000129 v2.0
Experience - The Workspace Vision
Workspaces become distinct and separate from back end systems enabling greater choice for users over model and form factor; content and applications are presented to software interfaces such as browsers or virtual environments. The workspace interface becomes the ‘gateway’ to the cloud.
The distinction between ‘home’ and ‘work’ computing has blurred almost to obscurity, individuals choose and purchase their own technology and use it to access business and personal services accordingly – enjoying the best possible experience through doing so.
The interface becomes ubiquitous; people access services regardless of where they are or what device they use and their context, such as location, is known and understood by the systems they access which respond accordingly.
Types and styles of interaction between humans and computers (such as touch and movement) proliferate as new technology becomes available.
The term ‘information worker’ loses its white collar implication – everybody is an information worker, because everybody has the means to consume information.
2222 Copyright 2010 FUJITSU
23
Overarching Trends
24
Desktop Roadmap
Evolution and Futures
End-User Computing
All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS000129 v2.0
End-User Computing Evolution
• There are three distinct evolutions in the EUC space that
impact elements of the EUC market
• Hardware
• Software
• Workspaces
26
End-User Computing Hardware Evolution
27
2000 2010 Beyond
Fujitsu End-User Computing Services
Multiple proprietary unconnected devices
Multiple proprietary connected devices
Converged, high definition cloud enabled devices
2000 2010 Beyond
Fujitsu End-User Computing Services
Office365
Microsoft dominated locally installed software
Multi-vendor local and cloud installed software
Open source and standard cloud software
End-User Computing Software Evolution
Marketplaces
29
2000 2010 Beyond
Centralised office workspaces Centralised office workspaces with limited flexible working
Flexible workspaces
4G3G
End-User Computing Workspace Evolution
Fujitsu End-User Computing Services
Fujitsu Workspace Evolvement
Virtual Client Services
End-User Computing
All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS000129 v2.0
Worldwide hosted virtual desktop (HVD) market will reach 49 million units in 2013, more than 40% of the professional PC market
HVD adoption is likely to be rapid during the next three to five years, particularly in mature markets where existing data centre and network infrastructures will be used to offset the cost of entry
15% of current worldwide traditional professional desktop PCs will migrate to HVDs by 2014
Have we been here before?
Desktop virtualisation Server and storage virtualisation are well established
Desktop virtualisation has yet to achieve same levels of acceptance Estimated at less than 1% of 550m business PCs (Source: Ovum, 2010)
CITRIX lead the market – estimated at 90% market share
Source: Fujitsu research, Sept 2010
Expected benefits Concerns / blockers
Benefits well understood – challenge is about how to make it happen successfully
Role-based ServicesSegmenting user requirements
Rich Client Cloud Based Desktop Thin/Zero Client Rich Client
Mobile Worker
Sales, Consultants Mobile Access Remote Access Flexibility Standard
Applications Local data storage
Sales, Consultants Mobile Access Remote Access Flexibility Standard
Applications Local data storage
Office Worker
HR, Legal Connected clients Static access Personalized
Desktop Central data
storage
HR, Legal Connected clients Static access Personalized
Desktop Central data
storage
Task/Blue Collar Worker
Call center, accounting
Connected clients Limited Set
of Software Low Cost Central data
storage
Call center, accounting
Connected clients Limited Set
of Software Low Cost Central data
storage
Contract/Offshore Worker
External contractors
Non-corporate clients
Security Standard
applications Central data
storage
External contractors
Non-corporate clients
Security Standard
applications Central data
storage
DevelopersPower User
SW developers Connected Clients Performance High
personalization Local and central
data storage
SW developers Connected Clients Performance High
personalization Local and central
data storage
34
Cloud Based Desktop
Application Assessment
An Application Assessment is crucial to understand the proportion of the customers application estate that can be delivered by a given application delivery frameworks, including:
Microsoft App-V; VMware ThinApp; Altiris SVS
An Application Compatibility Report will provide a good insight as to how much remediation effort that might be required to move an application to a new operating system such as:
Windows7; Server 2008 R2; 64bit
Virtual Client Computing
Modular Approach Integrate with existing desktop
environments Choice of platforms for users,
applications and functions
Choosing the best fit Cost / Performance /
Functionality
Leverages the same IaaS Platform providing simplified service integration or co-location
Ability to provide a device agnostic policy to employees
HVDHVD VDIVDI
TraditionalTraditional
SOESOE SOESOEApp 1App 1 App 2App 2
Application VirtualisationApplication Virtualisation
CITRIX ReceiverCITRIX Receiver
Physical EndpointsPhysical Endpoints
App 4App 4App 4App 4
App 1App 1 App 2App 2
Hardware agnostic endpoints Dedicated hardware
Mobile Device Management
End-User Computing
All Rights Reserved, Copyright © Fujitsu Limited 2011, VCS000129 v2.0
Mobile Overview
22 Copyright 2011 FUJITSU
Smartphones and Tablets have changed the requirements for mobile device security and management...
Fujitsu have developed a range of enterprise level Mobile Device Management (MDM) solutions and services in response.
39 All Rights Reserved, Copyright © Fujitsu Limited 2011
Fujitsu Managed Mobile offering automates and eases the management of the most popular device platforms across your mobile infrastructure
Service overview
DATA (Corporate IP)DATA (Corporate IP)
Key mobile enterprise market trends
DEVICEDEVICE
Any and All
APPLICATIONSAPPLICATIONS
Ever Increasing
NETWORKNETWORK
Any Connection to Enterprise
CEO PartnerEmployee
++ ++
The security challenge: Anywhere, Anytime, Not By Anyone How to secure devices, networks and enterprises
Which Mobile Platform?
Smartphone market is dominated by iOS, Android and Blackberry
Generally speaking iOS is more enterprise ready than Android for the following reasons The Apple App Store follows a certification process that provides a barrier
against malware threats within published apps, the Android store does not follow this approach
iOS devices have hardware based encryption built-in, allowing for remote wipe and wipe on failure of passcodes as standard
A mobile device management layer is still required to sit on top of any mobile device for added security and protection in the enterprise
Gartner ranks Zenprise #1
14 Copyright 2011 FUJITSU
Close - Q&A
Copyright 2011 FUJITSU LIMITED43
Copyright 2010 FUJITSU LIMITE
D
44