11
Business Client PCInvest in the Complete
Intelligence Package
Addressing IT Priorities and User Needs
INTEL INDONESIA
Oct 2010
Arya SanjayaBusiness Development Manager
2
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
2010: Addressing Both IT Priorities and User Needs
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
33
4
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
"Microsoft Windows 7 Transition
Should Start in 2010, Says Gartner”
1
Business Imperatives are Driving the Windows* 7 Transition
1 Source: :‟ Gartner: Windows 7 is 'all but inevitable‟ , Mary Jo Foley | October 13, 2009 http://www.zdnet.com/blog/microsoft/gartner-windows-7-is-all-but-inevitable/42272 Source: „Wolfe's Den: Windows 7 Deep Dive‟ Alexander Wolfe, InformationWeek March 3, 2009 http://www.informationweek.com/news/windows/operatingsystems/showArticle.jhtml;jsessionid=BTB5H1ZH0FXUGQSNDLPCKH0CJUNN2JVN?articleID=2156002203 Source: Microsoft's Windows 7 Means End of XP for Business, Says Report ,Nicholas Kolakowski, 2009-10-18 http://www.eweek.com/c/a/Windows/Microsofts-Windows-7-Means-End-of-XP-for-Business-Says-Report-694810/4 Source: Microsoft, http://www.microsoft.com/windows/enterprise/products/windows-7/features.aspx#bitlocker
Easier MaintenanceGartner: “a generalized lack of XP support from independent software vendors (ISVs) will start around the end of 2011, with a support „XP danger zone‟ developing at the end of 2012.”3
Stronger Security
Protect data from unauthorized viewing with Windows* 7 BitLocker Drive Encryption4
Greater Productivity
Designed to start up and shut down fast. Easy to multitask, find information and connect.
Which factors are driving your migration to Windows* 7?2
0% 10% 20% 30% 40%
End of Windows* XP Support
Security Needs
Earlier Decision to Skip Windows* Vista
5
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Risks Associated with Deploying Windows* 7 with Older PCs
5 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles”, Wipro Technologies, March 2009 (www.wipro.com/industryresearch). Based on an Intel Corporation-sponsored survey of 106 firms in North America and representing 15 different industries and projections based on a Model Company developed by Wipro Technologies. Computer system price data updatedNovember 2009. Actual results may vary based on the number of use-cases implemented and may not be representative of results that individual businesses may realize. For additionalimplementation examples refer to Intel Case Studies available at http://communities.intel.com/docs/DOC-3144. 6 “Keeping Notebooks Past Their Prime”, J. Gold Associates Research Report, April 2009: http://download.intel.com/business/resources/reports/keepingnotebookspastprime.pdf
After 3 years
PCs can cost more in
support than the purchase of a new PC5
$1,42524%
The failure rate in year four is
about 24% (which is) twice the rate in year
one6
53%
On average, a 4-year-old PC can experience
53% more annual security incidents, than it did in its first
year. 5
More Security Incidents
Failure Rate
Per Out of Warranty
RepairAn out-of-
warranty repair for a failed
(laptop) PC is approximately
$1,425. 6
6
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
End-user Needs Have Evolved
7 Source: Increasing Productivity with Mobile Business PCs, IT@Intel, May 2010, http://download.intel.com/it/pdf/Increasing_Productivity_with_Mobile_PCs.pdf8 Source: Published By: Microsoft http://www.greymatter.com/product/Microsoft/Office-Communicator/4624349 Source: Adobe Flash Player Enterprise Penetration, Adobe, last retrieved August 16, 2010 - http://www.adobe.com/products/player_census/flashplayer/enterprise_penetration.html10 Source: Business internet traffic increases to Facebook and YouTube, Kate Hartley Carrot Communications 15 April 2010 http://www.network-box.com/node/533
PC-Based Video
conferencing
Intel: USD 14 million savings per year by avoiding
travel7
HD Video
Supported by
mainstream applications (i.e. Office
Communicator 2007*)8
Flash* Widely Accepted in
the Enterprise
98.2% of Enterprise PCs
June 20099
YouTube*
10 percent of all corporate
bandwidth is taken up watching
YouTube videos10
7
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Virus Scan
The Business Needs Have ChangedTherefore the Business PC Has Changed
Increasing workload:foreground and background
Desktop Search
Unified Messaging
Video and Voice Conferencing
Collaboration
Windows* 7 + Office 2010
Rich Content Creation
Flash and Video intensive Web
IM + Web Browser
CRM, SCM, ERP Applications
Windows* XP + Office 2003
Foreground
Background
Synchronization
Anti-Spyware
Firewall/Intrusion-Detection
Authentication/Encryption
Back-Up
Compression
Virus Scan
Back-Up
Compression
Java Applets
System Management
2007 2010
Software Update Automation
Content Subscription Services
Java Applets
System Management
Peer-to-Peer Services
Directory Services
CRM, SCM, ERP Applications
Authentication/Encryption
Synchronization
Peer-to-Peer Services
Directory Services
Content Subscription Services
8
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
New Business PCs: Intelligent Performance for Windows* 7 and Evolving Business Needs
11 Comparing Intel® Core™ i5-520M processor based laptops to theoretical installed base of Intel® Core™2 Duo processor T5500. Business productivity claims based on SYSmark* 2007. Multitasking claims based on financial calculations workload consisting of advanced spreadsheet calculation measured using Microsoft* Excel* Monte Carlo Simulation plus Virus Scan. Security workload consists of SiSoftware Sandra* 2010 - AES256 CPU Cryptographic subtest measures CPU performance while executing AES (Advanced Encryption Standard) encryption and decryption algorithm.12 Source: Tom's Hardware, Jan 2010. http://www.tomshardware.com/reviews/intel-clarkdale-core-i5-661,2514-16.html
VS.
2007 2010
“We‟re left with a positive impression of Clarkdale (Intel® Core™ i5 Processor) as the engine in a business platform … completely eclipses the Core 2 Duo ...”
--Toms Hardware12
2.5xUp to two
times faster multitasking11
80%Runs Business Productivity
Applications up to 80% faster11
4xEncrypt sensitive
data up to 4 times faster11
9
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Migration to Windows* 7 Why Intel® Core™ Processor Family?
11 Source: Comparing Intel® Core™ i5-520M processor based laptops to theoretical installed base of Intel® Core™2 Duo processor T5500. Multitasking claims based on financial calculations workload consists of advanced spreadsheet calculation measured using Microsoft* Excel* Monte Carlo Simulation plus Virus Scan. Business productivity claims based on BAPCo* SYSmark* 2007, which is the latest version of the premier performance metric that measures and compares PC performance based on real world applications.13 Source: Intel® Hyper-Threading Technology (Intel® HT Technology) requires a computer system with a processor supporting Intel HT Technology and an Intel HT Technology-enabled chipset, BIOS and operating system.14 Source: Intel® Turbo Boost Technology available on the Intel® Core™ i7 processor and the Intel® Core™ i5 processor only.15 PCs based on Intel® Core™Processor family include support for Intel Virtualization technology. Please check with your PC vendor for Intel Virtualization technology support. 16 Source: AES-NI is available on Intel® Core™ i5-600 Desktop Processor Series, Intel® Core™ i7-600 Mobile Processor Series, and Intel® Core™ i5-500 Mobile Processor Series.
Windows* 7 BitLocker*
Intel®
AES-NI16
Windows* XP Mode
Intel® Virtualization Technology15
Windows* 7 multitasking architecture
Intel® Hyper-Threading Technology13 and Intel®
Turbo Boost Technology14
Data Protection
Encrypt and protect sensitive data faster11
Application Compatibility
Provides capability to run older Windows* XP productivity
applications from Windows* 7
Intelligent Performance
Faster PC responsiveness and multitasking11 for greater
productivity
10
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Each processor core works on two tasks at the same time
Intel® Core™ i5 Processor with
Intel® Hyper-Threading Technology13
Accelerate Workforce with Enhanced Multitasking Performance
13 Source: Intel® Hyper-Threading Technology (Intel® HT Technology) requires a computer system with a processor supporting Intel HT Technology and an Intel HT Technology-enabled chipset, BIOS and operating system.
Core 1
Core 2
Thread 1
Thread 2
Thread 4
Thread 3
11
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Automatically speeds up the processor when the user‟s workload requires extra performance
Greater Responsiveness with a Performance Boost
14 Source: Intel® Turbo Boost Technology available on the Intel® Core™ i7 processor and the Intel® Core™ i5 Processor only
With Intel® Turbo-Boost Technology
Without Intel® Turbo-Boost Technology14
Processor clock speed accelerates
up to
20%faster
Max Core Speed: 2.53 GHz
Max Core Speed: 3.00 GHz
1212
13
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Maintain business continuityunder adverse conditions
One Volcano Disruption:19
Total flights canceled: 100,000
European economy lost $1.9 billion in the first 6 days
Total passengers stranded: 7 million
Increased Need for Greater Productivity Drives Mobility in the Enterprise
18 Source: “Increase Productivity by Providing Notebooks Beyond Road Warriors,” Forrester Consulting, October 2008 (http://ipip.intel.com/go/wp-content/uploads/2009/06/increase-productivity-byproviding-notebooks-beyond-the-road-warriors.pdf)19 Source: Volcano air, tourism costs may hit EUR 2.5bn in Europe,EU Business, April 27, 2010 - http://www.eubusiness.com/news-eu/iceland-volcano.4be/
Eruption of Iceland's Eyjafjallajökull volcano
82% of employees are increasingly
required to access enterprise applications and data whilst away from their desks18
On average, mobile users are
51 additional minutes more productive each day18
14
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
454
42
0
50
100
150
200
250
300
350
400
450
500
Intel® Core™2 Duo E6300
processer
(2MB Cache, 1.86 GHz)
unmanaged
Intel® Core™ i5-540M
processor
(3MB Cache, 2.53 GHz)
managed
Kilo
Watt
ho
urs c
on
su
med
per y
ear
New Business Laptops Drive Greater Energy Savings and Reduced Carbon Footprint
20 Intel EEP methodology was used to determine energy consumption and it is described here: http://www.intelcapabilitiesforum.net/EEP/. System Configurations and Disclaimers in Appendix
Reducing energy use brings benefits
Annual Net Benefit per SeatAnnual Energy Cost Saving:
$44.70
CO2 Emissions Prevented:
638.18 pounds
Calculation:KWh 454 – KWh 42 = KWh 412KWh 412 * $0,1085 = $44,70KWh 412 * p1,549 = 638,18 pounds
Lower is better
Circa 2007 Circa 2010
Going from unmanaged power settings on a desktop
to managed power settings on a laptop PC20
CO² Emission depend on how energy is produced, water, wind, solar, atomic, coal it various country by country
Energy Cost: 10,85 cents/KWh / Factor California 1KWh=1,549 pounds
15
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Increased Need for Data Security Solutions
Mobility Drives Higher Need for Protection
23 Source: Processor, May19,2006. http://www.processor.com/editorial/article.asp?article=articles/P2820/30p20/30p20.asp&guid=024E96876DB944D89AA42906DB9FFE8424 Source: Ponemon Institute , April 2009 , http://communities.intel.com/docs/DOC-307625 Source: CNET News.com, from Ponemon Institute Survey (163 F1000 companies) ,January 2005, http://forums.cnet.com/5208-6132_102-0.html?threadID=5656626 Source: Symantec Global Internet Security Threat Report Trends for 2008,Volume XIV, Symantec, April 2009 http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf
Frequent
2M laptops/year are reported as stolen and 97% are never found23
Costly
The average cost of a lost laptop is $49,24624
Often from the inside
70% of all reported security breacheswere due to insiders25
78% of US organizations
have some type of encryption strategy in 2009, up from 66 percent in 200726
>59% of respondents say
it is very important to encrypt employee‟s mobile
devices26
16
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
New laptop with Intel® Core i5
processor up to 50% more energy efficient28 versus
a 3 year old laptop with an Intel® Core™ 2 Duo processor
Mobilize Workforce without Sacrificing Data Security Why Laptops Based on Intel® Core™ Processor Family?
16 Source: AES-NI is available on Intel® Core™ i5-600 Desktop Processor Series, Intel® Core™ i7-600 Mobile Processor Series, and Intel® Core™ i5-500 Mobile Processor Series.27 Intel® Anti-Theft Technology requires the computer system to have an Intel® AT-enabled chipset, BIOS, firmware release, software, and an Intel AT-capable Service Provider/ISV application and service subscription.28 Source: Comparing Intel® Core™ i5-520M Processor based laptops to theoretical installed base of Intel® Core™2 Duo Processor T5500. Energy figures derived from Intel Energy Efficient 2.0 methodology.29 Source: Computers for Consumers, ENERGY STAR denotes a system level energy specification, defined by the US Environmental Protection Agency, that relies upon all of the system‟s components, including processor, chipset, power supply, HDD, graphics controller, and memory to meet the specification. For more information, see http://www.energystar.gov/index.cfm?fuseaction=find_a_product.showProductGroup&pgw_code=CO
Faster Data Protection
Intel® Core™ i5 and Intel®
Core™ i7 processors
encrypt sensitive data
faster16
Meet ENERGY STAR*
Requirements
Long Battery Life
Ability to Disable Lost
or Stolen PCs
When optional Intel® Anti-Theft technology27 is
enabled, laptops can even disable
themselves if they get lost or stolen
Built-in energy saving features help PCs meet ENERGY STAR* requirements29
17
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
"There's a definite benefit to… AES-NI instructions...This is huge for corporate
desktops/notebooks“30 Anandtech*
0 1 2 3 4
Keep Data Safer and End-users More Productive
11 Comparing Intel® Core™ i5-520M processor based laptops to theoretical installed base of Intel® Core™2 Duo processor T5500. Security workload consists of SiSoftware Sandra* 2010 -AES256 CPU Cryptographic subtest measures CPU performance while executing AES (Advanced Encryption Standard) encryption and decryption algorithm.30 The Clarkdale Review: Intel's Core i5 661, i3 540 & i3 530, Anand Lal Shimpi, Anandtech, January 2010. http://www.anandtech.com/show/2901/5
Up to 4xfaster encryption11
Intel® AES New Instructionsaccelerate encryption operations
i5-650 (desktop)i5-520M (laptop)
E6400 (desktop)T5500 (laptop)
Helps Speed Data Protection11
Whole-disk encryption
Internet Security
File Storage Encryption
18
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Intel® Core™ Processor Family with Optional Intel® Anti-Theft Technology
27 Intel® Anti-Theft Technology requires the computer system to have an Intel® AT-enabled chipset, BIOS, firmware release, software, and an Intel AT-capable Service Provider/ISV application and service subscription.
What is Intel® Anti-Theft Technology?
Hardware based security building blocks to help protect your PC when it is lost or stolen
IT Help Desk
3
5
Or PC is disabled via poison pill over the internet
PC can be easily reactivated via a local password or server-generated code
Anti-theft capability with activated Intel® Anti-Theft Technology271
Local intelligence on PC detects potential theft and triggers action2
Lost or Stolen PC
Hard Drive
Intel®
Network
Intel®
Chipset
Intel®
Core™ i5 vPro™ Processor
PC remains disabled even if OS is re-installed or BIOS is re-flashed
4
19
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Support for Intel® Anti-Theft TechnologyEnabled Security Service or Software
27 Intel® Anti-Theft Technology requires the computer system to have an Intel® AT-enabled chipset, BIOS, firmware release, software, and an Intel AT-capable Service Provider/ISV application and service subscription.
Technology27 Designed to Help Business Deter PC Theft and Protect Data when PC Lost or Stolen
Absolute* Computrace* with Microsoft* System Center Service Manager 2010*
PGP* Whole Disk Encryption Solutions*
WinMagic* Secure Doc Full-disk Encryption*
Ability to disable lost or stolen PC
Video
Video
Video
Enabled Security Service or Software, Such As:
20
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Optimize the Intel® Core™ Processor Family Based Laptop ExperienceWith Intel® HD Graphics, Intel® Solid State Drives and Intel® Centrino® Wireless Products
31 Source: Enterprise Wide Deployment of Notebook PCs with Solid-State Drives, IT@Intel, August 2009, http://download.intel.com/it/pdf/Enterprise-wide_Deployment_of_Notebook_PCs_with_Solid-State_Drives.pdf\32 System config: Intel® Core™ i5-520M (3 MB Cache, 2.4 GHz), in Lenovo* ThinkPad* T410 on Intel® HM55 Express Chipset; RAM: Dual-channel DS Micron* 4 GB (2x2 GB) DDR3-1066 withIntel® HD Graphics; Intel® Rapid Storage Technology: 9.6.0.1014; BIOS: 6IET47WW (1.07); Intel® INF: 9.1.1.1023; Graphics: 8.15.10.2086, Microsoft* Windows* 7 Ultimate 64-bit; Storage:Intel® X25-M Solid-State Drive, 80 GB SATA II 2.5in (Firmware: 02HD), and HDD: Hitachi* 320 GB 7200RPM. Running the PCMark* Vantage HDD Suite, which is a combination of tests covering common disk drive usages including Windows* start up, spyware scanning, gaming, importing pictures and music, video editing, and application loading.
Superb Visual Performance and Long Battery Life with Intel® HD Graphics - Without the added cost and additional power
demands of an add-in graphics card
Fast Wireless Connectivity with Intel® Centrino® Wireless Products
When combined with Intel® Centrino® Wireless Products, laptop PCs provide great coverage and reliable connectivity while consuming minimal power
Reduce Data Loss due to Hard Drive Failure with Intel® Solid State Drives
“Intel® Solid State Drives (Intel® SSDs) are expected to have a 90 percent lower failure rate than traditional Hard Disk Drives (HDDs) over a three-year refresh period within Intel‟s infrastructure” – IT@Intel31
Breakthrough Storage Performance
Experience up to 6x faster storage performance when combining the Intel® Core™ i5 processor with an Intel® Solid-State Drive32
2121
22
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
2. IT and business alignment
3. Business agility and speed to market
4. Business process reengineering
5. IT cost reduction
CIO Priorities for 2010
33 IT Management: CIO Priorities for 2010, Ericka Chickowski, 2009-09-28 http://www.baselinemag.com/c/a/IT-Management/CIO-Priorities-for-2010-706071/
Cost Reduction and Business Productivity Remain Top CIO Priorities33
The sour economy will still play a role in IT decision-making in
2010. The top priority for CIOs: business productivity and cost reduction
1
23
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Intel® Core™ vPro™ Processor Family:Cost-saving Manageability & Smart Security17
17 Intel® Active Management Technology requires the computer system to have an Intel® AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection37 Results shown are from the 2007 EDS Case Studies with Intel® Centrino® Pro and the 2007 EDS case studies with Intel® vPro™ processor technology, by LeGrand and Salamasick., 3rd party audit commissioned by Intel, of various enterprise IT environments and the 2007 Benefits of Intel® Centrino® Pro Processor Technology in the Enterprise, Wipro Technologies study commissioned by Intel..38 “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles”, Wipro Technologies, March 2009 (www.wipro.com/industryresearch). Based on an Intel Corporation-sponsored survey of 106 firms in North America and representing 15 different industries and projections based on a Model Company developed by Wipro Technologies.
Up to 56% faster time
to patch saturation37
Recoup Investment in as little
as 9 months38
Reduce software-
related desk-side
visits by up to 58%37
24
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Invest in the Intelligent Choice for BusinessIntel® Core™ vPro™ Processor Family39
39 Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro/
Processor
Chipset
Network
Firmware2010 Business Desktops
and Laptops
IT Management Console or Service Provider with
Enabled Software
Hardware-assisted Smart Security and Cost Saving Manageability
25
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Committed to Year on Year Innovation
39 Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro/40 KVM Remote Control (Keyboard Video Mouse) is only available with dual-core Intel® Core™ i5 vPro™ processors and i7 vPro™ processors with Intel® Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported.
2006
EnterpriseRemote
Management39
2007
Enhanced Security,Wireless
2008
ReachBeyondFirewall
2010
KVM Remote Control40
Beyond Performance, Solving IT Issues
2626
27
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Gartner Identifies Top 10 Strategic Technologies for 2010
44 Top 10 technologies and trends, Gartner, Gartner Symposium/Itxpo, October 18, 2009, http://www.gartner.com/it/page.jsp?id=1210613
“Virtualization is bringing new ways of packaging client computing applications and capabilities …
Enterprises should proactively build a five to eight year strategic client computing roadmap” 44
28
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Flexibility to Support All Desktop Virtualization Options
Intel® Core™ vPro™ Processor Family based PCs support ALL Desktop Virtualization models
Terminal Services
• Citrix* XenApp
• Microsoft* Terminal Server
Virtual Hosted Desktop
• VMware* View VDI
• Citrix* XenDesktop 4
• Microsoft* VDI
Virtual Container
• Citrix* XenClient
• VMware* Offline Mode
• Microsoft* MED-V7 and VPC7
OS Image Streaming
• Citrix* XenDesktop 4 (XenApp & Provisioning Server)
• Dell* On-Demand Streaming Solution
Application Virtualization
• Microsoft* App-V
• Citrix * XenDesktop 4 (XenApp)
• Symantec* SVS Pro
29
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Some Desktop Virtualization Options Can Put Additional Strain on the Datacenter
45 Source: Planning for Virtualization? Beware of server overload, Sandra Gittlen, Computerworld, February 8, 2010, http://www.computerworld.com/s/article/346395/Virtualization_Beware_of_Server_Overload
Internal Private Cloud
“Planning for virtualization?Beware of server overload”45
February 2010
Datacenter Rendering
Endpoint Application Performance
DatacenterWorkload
30
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Remote Desktop Protocols Can Help Offload the Workload to Intelligent PCs
46 Source: Steve Ballmer: Worldwide Partner Conference 2010 Transcript, July 12, 2010 http://www.microsoft.com/presspass/exec/steve/2010/07-12WPC.mspx
DatacenterWorkload
“The rich device can be higher performance … can do more on behalf of the user without network latency … [ and ] saves bandwidth”46
—Steve Ballmer, Microsoft CEO, July 15, 2010
Endpoint Rendering
Remote Desktop Protocols
(Citrix* HDX, Microsoft* RemoteFX, VMWare* PCoIP)
Endpoint Application Performance
Datacenter Rendering
Internal Private Cloud
31
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Usage: Isolate critical security or mgmt services outside main user OS
Usage: Personal and Work environments isolated, bring your own PC
Usage: Isolate highly sensitive data & applications
Client-side Virtual Containers
Virtual Machine
Standard Security Level
Virtual Machine
Restricted Security Level (Streamed)
Virtual Machine
Personal workspace (Flexible)
Virtual Machine
Enterprise workspace (Locked, Streamed / cached)
Virtual Machine
User Environment
Virtual Appliance
Mgmt or Security App
Unlocking New Usage Models in Your Infrastructure
32
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.
Processors That Adapt to Your Business Needs
Intel® Core™ Processor Family
Processors with intelligent performance that adapt to your business needs.
Intel® Core™ vPro™ Processor Family
More Secure. More Manageable. Intelligent Performance.
* Other names and brands may be claimed as the property of others. All plans, dates and features are subject to change without notice. Copyright © 2010, Intel Corporation.