2. 2 Confidential
View Environment Upgrade
System Overview
Architectural Overview
Rollout Methodology
Advantages of View
Benefits
3. 3 Confidential
What is View?
View is a centralized environment where desktops are hosted.
Rather than running one OS on a local machine, it’s now running in
a virtual machine at the data center.
In short the desktop or laptop OS has been shifted to the data
center and is being accessed remotely.
Move OS to DC
4. 4 Confidential
Tell Me More About View
View is an enterprise-class, product-ready desktop solution
• Stands for Virtual Desktop Infrastructure Industry Standard – “VDI”
• Processing power securely located at remote back-end data center
• Offers superior solution: Agility-Performance-Transparency
• Reduced capital expenditures
• Decreased operational expense
• Lower technical support needs
• Business continuity
5. 5 Confidential
What are the Benefits of View?
Advantages
• Easier to maintain from a central place
• Automatic backup
• Fast log-on time
• Always up to date regarding security and patches
• Upgrades are done in the background
• Provisioning is in minutes rather than hours
• Use of fault-tolerant systems in the data center
Business Agility and Acceleration
• Cloning
• Virtual mobility
• Flexible upgrades
• Centralized platform management
• Enterprise-wide configuration consistency
• Reliability and longevity
• Each VM (View desktop) is mapped to an individual user and client device
User Benefits
• Ease, performance, security, access and transparency during upgrades
• Broad range of devices
6. 6 Confidential
View Implementation Methodology at a Glance
Socialized the technology within the department
• Determined engagement directors per business unit (BU)
Divided user base into four sets of users
• Pilot
• C-Staff
• Managers
• Community
Send questionnaires to pilot users
Determine use cases per BU based on job function (create user profiles)
Determine candidates for thin clients (such as contractors)
Finalized list of apps. per BU
Created pools where necessary
Agreed to timeline
8. 8 Confidential
The Two Types of VMs
Two types of VMs exist on View
Linked clones
Everyone uses the same OS image, and applications are centrally managed.
No admin. rights are provided to the users.
Stability and storage savings are the primary advantages.
Designed for the majority of task and knowledge users.
Individual applications can be added as Thin App packages.
VMs are recomposed every month (all changes are wiped out, OS patched and
enhanced, new apps).
Full Virtual Machines
Each user works on a full copy of the OS with full admin rights.
It’s equivalent to having a regular PC.
Advantages are having control; disadvantages are that patching, upgrading and client
management is up to the user.
Designed mainly for power users.
9. 9 Confidential
View Architecture - Clusters
What is a Cluster?
A cluster is a group of hosts. When you add a
host to a cluster, the host's resources become
part of the cluster's resources. The cluster
manages the resources and of all hosts within it.
Clusters enable the VMware High Availability
(HA) and VMware Distributed Resource
Scheduler (DRS) solutions.
10. 10 Confidential
View Architecture - Hosts
What is a Host?
A host is a computer that uses virtualization
software, such as an ESX Server, to run virtual
machines (Win7 Desktops).
Hosts provide the CPU and memory resources
that virtual machines use and give virtual
machines access to storage and network
connectivity.
11. 11 Confidential
View Architecture - Pools
There are currently eight major VM pools in production
Pools can have the following options:
• Automated, manual, individual
• Dedicated, floating
• Linked clone, full clone
12. 12 Confidential
View Architecture – Virtual Machines
• Windows XP SP3 (32 Bit)
• 1 vCPU
• 1GB RAM *
• 20GB OS Drive
• 10GB User Data Disk
• My Documents folder redirected to user’s
Home Directory (H: Drive)
• VMware Standard Apps:
• Office 2007 Pro Plus SP2
• Firefox 3.6
• Adobe Reader
• 7-Zip
• McAfee VirusScan 8.7i with Anti Spyware
The typical Virtual Machine has the following specifications:
13. 13 Confidential
For More Information
Guy de Meester, IT Director, Global Client Services &
International - gdemeester@vmware.com
Marie O’Leary, Sr. Project Manager, IT Operations: Layer 3
End-user Computing - moleary@vmware.com