Home Applications Desktop Transformation Success Begins with Understanding your Users

Desktop Transformation Success Begins with Understanding your Users

0
0

Resistance is futile. Desktop transformations are assimilating the standard corporate computer. I was speaking to a friend and former colleague the other day that had recently turned in his corporate laptop, and was glad to be rid of it! He was now working from home three days a week, using his personal computer to connect to a virtual desktop environment hosted in the corporate datacenter. He had connected his iPhone to his company’s email server for mobile access to email and calendar appointments. His company had not provided him with a single device with a hard drive (for a financial company this had huge security benefits) and my friend hadn’t even noticed. The only hardware device that his company was providing was a low powered Linux thin client for the days my friend ventured into the office.

In July 2011, Forrester Research reported that 60% of companies were supporting a bring-your-own-device (BYOD) policy and Gartner Research forecasts that Virtual Desktops will account for 10% of enterprise desktops by 2014. For this new wave of desktop computing to roll out successfully, IT must accept that one solution will not fit all. Trying to migrate 100% of desktops to thin clients will fail. Trying to migrate 100% of laptops to tablets will also fail. IT must learn to "right-size" their users by matching their computing needs to a menu of new device options. Some will be best suited with traditional desktops and laptops. For others, a thin client or a tablet may suffice. And some may not need any corporate provisioned devices at all.

To make this assessment IT needs a much deeper understanding of their users than ever before.

  • What applications are they using? Can those applications be virtualized or run in a multi-user environment?
  • How much data is stored in the user’s profile? Does it need to be secured?
  • How often does the user require mobile access? Will they need offline access, or will they always have an internet connection? …

To learn more and to read the entire article at its source, please refer to the following page, Desktop Transformation Success Begins with Understanding your Users

     
 

Featured Resources:

Related Articles:

DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!
| LATEST RESOURCES

White Papers

    NEW VMware Whitepaper – Deliver Office 365 in VMware Horizon 7 with Published Applications

    By Frank Anderson, End-User-Computing Solutions Architect, Desktop Technical Marketing, VMware and Cindy Heyer Carroll, Technical Writer, End-User-Computing Technical Marketing, VMware We are excited to announce a new white paper, Best Practices for Delivering Microsoft Office 365 in VMware Horizon 7 with Published Applications, now available to help you avoid risks that can occur during setup […]

    Downloads

      FREE Tool – Troubleshoot Remote Desktop Connections

      Everyone wants to do things in a simple and effortless way. From a child that plays with a remote controlled car to a photographer who uses a drone for landscape photography, nowadays nearly everything can be automated or operated remotely. And system administration is no exception. Troubleshooting remote desktops is now as easy as using […]

      On-Demand Webinars

        How analyzing data patterns can improve IT service delivery – On-Demand Webinar

        Watch this webinar to know how to use Analytics Plus to- 1. Identify data patterns using visual analysis to spot trends easily. 2. Correlate data from multiple sources and get unified visibility into your IT. 3. Create live dashboards to make continuous improvements in ITSM processes. This video is from the fine folks at ManageEngine

        Latest Videos

          VMware TrustPoint and AirWatch Integration Demo Video

          Learn how out-of-the-box integration of VMware TrustPoint and AirWatch further enhances securing and managing mobile, desktop and server environments, and dynamically drives policy configuration changes across the organization for even stronger compliance and faster threat containment. This video is from the fine folks at VMware EUC.

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win a Tesla P100D

          Visit our Sponsors!


          Close