Documente Academic
Documente Profesional
Documente Cultură
No security guarantee
The security of local data is also a matter of
great concern. The decentralized nature of the
traditional client/server architecture leaves en-
terprises vulnerable to security risks. Whatever
the level of desktop security, sensitive company
information leaks out with great regularity.
Desktop capacity is not utilized
Modern workstations have an enormous com- Phase 2: VMware vSphere (optional) implementation
puting capacity. However, because the user
only performs one or two tasks simultaneously, Objective
only ten percent of this computing capacity In this phase, the basic VMware infrastructure will be installed. The VMware View solution
might be exploited. All of these problems re- uses VMware vSphere. If the vSphere infrastructure is already present, then this phase can be
quire a revised desktop strategy and a smar- skipped. Any modifications are implemented in consultation (if necessary, from the site check
ter, more efficient and more secure way of information). If the client does not yet have a VMware vSphere infrastructure, this will be in-
distributing applications to the users. This can stalled in the form of a server with the corresponding virtual machines.
be achieved by setting up a ‘Virtual Desktop
Infrastructure’. Description of the activities
• Existing vSphere infrastructure modification
How does it work? • VMware ESX Host installation
The VMware Virtual Desktop Infrastructure • VMware virtual centre console installation
View gives users access to desktops with the
aid of virtualization techniques. Virtualization Result
facilitates the hosting of desktop computers on After this phase, the VMware View POC is modified or installed. A VMware ESX server is incor-
servers. By using virtualization on the server, porated into the network and the VMware management console, vCenter, is configured and
it is possible to offer a large number of desk- operational. The infrastructure is modified and complies with the requirements for the next
tops on the hardware in the computer room. phase: the installation of the VMware View and the virtual desktops.
The available capacity is thus optimal and if
necessary, additional capacity can be activated
quickly and easily. Another important benefit
is that this creates better security and control.
Desktop virtualization can convert the entire
desktop into a server farm hosted environment.
The desktop is thus always accessible, dyna-
mically scalable and it can be monitored and
controlled from a central location.
Setting up a virtual desktop envi- Phase 3: VMware View Manager and virtual desktop
ronment will enable you to:
• Allocate, roll out and recover complete desk- implementation and configuration
tops which will considerably increase acces-
sibility to the desktop environment. Objective
• Offer users a complete desktop environment This phase involves the implementation of the VMware View Manager and a couple of desk-
even from a remote location tops, which are going to serve as a representative basis for the View POC. Which desktop
• Keep your sensitive business information types should be deployed for the organization will be examined during the site check in phase
secure in the central computer room 1. VMware View will be incorporated into the domain and arranged together with the client’s
• Set up a standard and centrally-controlled system manager. Devices for the POC test users will be set up and activated.
desktop environment which complies with
internal and external compliance regulations Description of the activities
• Distinguish the user type and tailor the desk- • VMware View virtual machine installation and activation
top requirements accordingly • Windows XP virtual machine installation and activation
• Windows Vista virtual machine installation and activation
Advantages of desktop • Basic configuration agents, protocols, printers, etc.
virtualization: • VMware View manager; User access, Desktops, Printers, Active directory configuration
• Savings on expenditure by reducing the TCO • Establish a number of clients (PC or Thin Client) for the POC
of the workspace • Examination of the VMware View Manager possibilities together with the systems management
• More efficient use of the existing capacity • Documentation
and therefore less energy consumption
• Automatic, proactive control Result
• Increased accessibility and fast processing After this phase, the basic VMware View infrastructure is implemented. VMware View is instal-
time led on the (existing) vSphere infrastructure. The virtual desktops are installed and configured
• Better service in the event of a calamity for use from VMware View. The systems management is familiar with the VMware View pos-
sibilities and has discussed the possibilities of the VMware View Manager configuration with
the partner’s System Engineer (SE). The basic configuration is tested and documented. The
configuration is ready and tested for further arrangement.
VMware View
VMware
Phase 4: Application virtualization with ThinApp
(optional)
Infrastructure View View ThinApp Offline Desktop
and Enterprice Composer (Expermental)
Proven Enterprice
Virtualization Desktop Storage Application Anywhere
Optimization Virtualization Mobility
Objective
Platform Manager
VMware ThinApp is a solution for virtualizing applications that allow customers to run prac-
What does VMware View tically all possible applications on any version of Microsoft Windows without any conflicts. In
consist of? this phase, five business critical applications will be virtualized.
Result
The desired functionality of VMware View, possibly in combination with Application virtualiza-
tion and user workspace management is tested by end-users. Any defects are corrected. The
systems management is familiar with the possibilities that VMware View offers and can form
an impression of the new approach to desktop management.
Phase 7: Report
Objective
To provide a clear picture in order to make the right choices by means of a report.
Result
The entire POC is described in the report. The report also includes details on the feasibility of
the desired situation and what requirements are necessary to make the functionality available
to the users. Any bottlenecks will be outlined. The feasibility of the project and the possible
implementation will also be defined.