SlideShare a Scribd company logo
User Profiling and Desktop Technology OptionsArchitecture & Design Team
User ProfilingWindows Optimised Desktop Scenarios Assessment Guide defines:- Office WorkerMobile WorkerTask WorkerContract WorkerAccess from Home
Office WorkerThese users are always connected to the corporate network and expect a rich client experience that can handle the broad range of tasks for which they are responsible. They use applications such as Microsoft Office and various line-of-business (LOB) applications that run on the local computer. These users include analysts, architects, researchers, and doctors.
Mobile WorkerThese types of users are highly mobile due to travel requirements, and frequently work outside the corporate network. They use a variety of applications that usually run locally on their mobile computer and, therefore, require a rich computing experience. These users need to be able to access applications and data offline, but also carry a higher risk of loss of data if their computer is lost or stolen. These users include sales people and account executives.
Task WorkerThese users perform a narrow set of tasks and use systems that are connected to the corporate network. Task workers usually do not have a dedicated desktop computer; instead, they leverage a pool of designated computers to access one or a few applications. These users include call-center analysts, warehouse workers, and retail employees.
Contract WorkerThese users are vendor or contract staff, often software developers, who perform a broad set of activities that require significant access to the local operating system. They work on corporate-owned intellectual property, but might be physically outside the realm of IT control. They typically use applications such as software development suites, testing tools, and project management tools. These users include software developers and contingent staff.
Access from HomeThis usage scenario is for non-mobile employees who are not able to get to the office and need access to their personalized computer work environment, including applications and data. The IT department needs to ensure that corporate data remains protected and that the computing environment remains well controlled.
Technology Options (1 of 2)VirtualUser State VirtualisationPresentation VirtualisationApplications VirtualisationClient Hosted Desktop VirtualisationServer Hosted Desktop Virtualisation
Technology Options (2 of 2)PhysicalOperating SystemLocal Application InstallationSecurityEncryptionRights ManagementNetwork Access Control
User State VirtualisationBenefits:Data BackupRoaming UsersMigration (hardware / operating system)Technology:Roaming User ProfilesFolder RedirectionClient-side Caching
Presentation VirtualisationBenefits:Secure Data and ApplicationsAccelerate Application DeploymentRemote Worker AccessibilityTechnology:Windows Server 2008 Terminal ServicesCitrix XenServerIntelligent Access Gateway
Application VirtualisationBenefits:ProvisioningContinuityAccessibilityCentralised ManagementTechnology:Microsoft Application VirtualisationCitrix XenAppVMware ThinApp
Client Hosted Desktop VirtualisationBenefits:Legacy Application SupportSecondary Desktop EnvironmentTechnology:Microsoft Virtual PCVMware WorkstationMicrosoft Enterprise Desktop Virtualisation
Server Hosted Desktop VirtualisationBenefits:SecurityFull Desktop EnvironmentCentrally ManagedProvisioningAccessibilityTechnology:Windows Server 2008 with Hyper-VCitrix XenDesktopVMware ViewConnection Broker
Operating SystemWindows Vista Enterprise EditionUser Account ControlBitlockerPerformance and Reliability MonitoringSystem Restore
Example User Profiling
Example User Profiling
Example User ProfilingOrganisation WorkersKiosk Worker		(e.g. Receptions)Task Worker		(e.g. Facilities)Office Worker		(e.g. Clerks)Research Worker	(e.g. Statisticians)Development Worker	(e.g. Technology Directorate)
Example Solution 1Kiosk WorkerUser State VirtualisationPresentation VirtualisationApplication Virtualisation
Example Solution 2	Task WorkerUser State VirtualisationPresentation VirtualisationApplication Virtualisation
Example Solution 3	Office WorkerUser State VirtualisationApplication VirtualisationOperating SystemClient Hosted Desktop Virtualisation

More Related Content

DOCX
PDF
DrewWresume
DOCX
IT Engineer Resume 2
DOCX
Yancy g. saint juste resume
PPTX
Segregation of Duties and Sensitive Access as a Service
DOCX
Michael Tillett Resume4
DOC
sara - biodata-new
DOCX
MG Resume 2017
DrewWresume
IT Engineer Resume 2
Yancy g. saint juste resume
Segregation of Duties and Sensitive Access as a Service
Michael Tillett Resume4
sara - biodata-new
MG Resume 2017

What's hot (19)

DOC
Network Resume
DOCX
Mohamed original
PPTX
Syscon Infotech - Logistics Software Solutions
DOCX
Mohamed original(1)
DOC
Resume (mohd imran ansari)
DOCX
James anthony 2016 resume
PPTX
Inttelix OnTime
PDF
DOCX
Carl Binder Resume Myrtle Beach address 1-24-17
DOC
New resume Naveen (1)
DOC
Cortnie Guerra
DOCX
Resume Hector Reyes 03.28.2015
DOCX
PPT
Helpdesk
DOCX
HPE resume Carlos Bermudez Vives
DOCX
Tristan_CV
DOCX
Colin Frye resume
DOCX
Tom Gerrick Technical Drawing
DOCX
cannuel's CV.
Network Resume
Mohamed original
Syscon Infotech - Logistics Software Solutions
Mohamed original(1)
Resume (mohd imran ansari)
James anthony 2016 resume
Inttelix OnTime
Carl Binder Resume Myrtle Beach address 1-24-17
New resume Naveen (1)
Cortnie Guerra
Resume Hector Reyes 03.28.2015
Helpdesk
HPE resume Carlos Bermudez Vives
Tristan_CV
Colin Frye resume
Tom Gerrick Technical Drawing
cannuel's CV.
Ad

Similar to User Profiling and Technology (20)

PDF
Microsoft India – Managing the Dynamic Desktop Whitepaper
PDF
Desktop virtualization best practices
PPT
W7 Enterprise
PPT
W7 for IT Professionals
DOCX
SystemsAdminSupportAnalyst
PPT
Wave 2010: The new way of working.
PDF
Res Software In Healthcare
PDF
Res Software In Healthcare
PPTX
Windows 7 Optimized Desktop
PPTX
Consumerization of IT
PDF
Future workplace
PPTX
Mobile secure workplace briefing presentation
PPTX
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
PPTX
New ways of working with Fujitsu
PPTX
Windows 7: Unleash the Power
PPT
Lime access 2013-en
PPTX
Support Goes Home
PPTX
IT is een dienst met de dynamische desktop
PDF
iStart the desktop goes virtual
PDF
Top Use Cases for Desktop Virtualization
Microsoft India – Managing the Dynamic Desktop Whitepaper
Desktop virtualization best practices
W7 Enterprise
W7 for IT Professionals
SystemsAdminSupportAnalyst
Wave 2010: The new way of working.
Res Software In Healthcare
Res Software In Healthcare
Windows 7 Optimized Desktop
Consumerization of IT
Future workplace
Mobile secure workplace briefing presentation
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
New ways of working with Fujitsu
Windows 7: Unleash the Power
Lime access 2013-en
Support Goes Home
IT is een dienst met de dynamische desktop
iStart the desktop goes virtual
Top Use Cases for Desktop Virtualization
Ad

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Spectroscopy.pptx food analysis technology
PDF
KodekX | Application Modernization Development
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Programs and apps: productivity, graphics, security and other tools
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectroscopy.pptx food analysis technology
KodekX | Application Modernization Development
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

User Profiling and Technology

  • 1. User Profiling and Desktop Technology OptionsArchitecture & Design Team
  • 2. User ProfilingWindows Optimised Desktop Scenarios Assessment Guide defines:- Office WorkerMobile WorkerTask WorkerContract WorkerAccess from Home
  • 3. Office WorkerThese users are always connected to the corporate network and expect a rich client experience that can handle the broad range of tasks for which they are responsible. They use applications such as Microsoft Office and various line-of-business (LOB) applications that run on the local computer. These users include analysts, architects, researchers, and doctors.
  • 4. Mobile WorkerThese types of users are highly mobile due to travel requirements, and frequently work outside the corporate network. They use a variety of applications that usually run locally on their mobile computer and, therefore, require a rich computing experience. These users need to be able to access applications and data offline, but also carry a higher risk of loss of data if their computer is lost or stolen. These users include sales people and account executives.
  • 5. Task WorkerThese users perform a narrow set of tasks and use systems that are connected to the corporate network. Task workers usually do not have a dedicated desktop computer; instead, they leverage a pool of designated computers to access one or a few applications. These users include call-center analysts, warehouse workers, and retail employees.
  • 6. Contract WorkerThese users are vendor or contract staff, often software developers, who perform a broad set of activities that require significant access to the local operating system. They work on corporate-owned intellectual property, but might be physically outside the realm of IT control. They typically use applications such as software development suites, testing tools, and project management tools. These users include software developers and contingent staff.
  • 7. Access from HomeThis usage scenario is for non-mobile employees who are not able to get to the office and need access to their personalized computer work environment, including applications and data. The IT department needs to ensure that corporate data remains protected and that the computing environment remains well controlled.
  • 8. Technology Options (1 of 2)VirtualUser State VirtualisationPresentation VirtualisationApplications VirtualisationClient Hosted Desktop VirtualisationServer Hosted Desktop Virtualisation
  • 9. Technology Options (2 of 2)PhysicalOperating SystemLocal Application InstallationSecurityEncryptionRights ManagementNetwork Access Control
  • 10. User State VirtualisationBenefits:Data BackupRoaming UsersMigration (hardware / operating system)Technology:Roaming User ProfilesFolder RedirectionClient-side Caching
  • 11. Presentation VirtualisationBenefits:Secure Data and ApplicationsAccelerate Application DeploymentRemote Worker AccessibilityTechnology:Windows Server 2008 Terminal ServicesCitrix XenServerIntelligent Access Gateway
  • 13. Client Hosted Desktop VirtualisationBenefits:Legacy Application SupportSecondary Desktop EnvironmentTechnology:Microsoft Virtual PCVMware WorkstationMicrosoft Enterprise Desktop Virtualisation
  • 14. Server Hosted Desktop VirtualisationBenefits:SecurityFull Desktop EnvironmentCentrally ManagedProvisioningAccessibilityTechnology:Windows Server 2008 with Hyper-VCitrix XenDesktopVMware ViewConnection Broker
  • 15. Operating SystemWindows Vista Enterprise EditionUser Account ControlBitlockerPerformance and Reliability MonitoringSystem Restore
  • 18. Example User ProfilingOrganisation WorkersKiosk Worker (e.g. Receptions)Task Worker (e.g. Facilities)Office Worker (e.g. Clerks)Research Worker (e.g. Statisticians)Development Worker (e.g. Technology Directorate)
  • 19. Example Solution 1Kiosk WorkerUser State VirtualisationPresentation VirtualisationApplication Virtualisation
  • 20. Example Solution 2 Task WorkerUser State VirtualisationPresentation VirtualisationApplication Virtualisation
  • 21. Example Solution 3 Office WorkerUser State VirtualisationApplication VirtualisationOperating SystemClient Hosted Desktop Virtualisation