WHITEPAPER
2bf1Vga
2bf1Vga
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
With the desktop portable, improving desktop management<br />
and reducing instances and length of end-user productivity<br />
disruptions are possible. For example, if the host device is lost<br />
or stolen, the portable desktop (provided a back-up exists) is<br />
replicated on a replacement host device in less time than<br />
provisioning a replacement physical PC. Similarly, if the<br />
operating system or application software becomes corrupted,<br />
a ‘golden image’ of the corrupted software facilitates rapid<br />
recovery.<br />
While there are important portability differences across<br />
alternative personal computing models (e.g., range of<br />
compatible host devices), which will be discussed later, the<br />
portable desktop’s location is equally important. By location,<br />
meaning two locational dimensions: within the host device,<br />
and proximity to the end user. The first, within the host<br />
device, refers to whether the portable desktop operates<br />
directly on top of the host device’s hardware (native; no<br />
hypervisor) or on top of a hypervisor. Additionally, there are<br />
two types of hypervisors: Type I hypervisor (also referred to as<br />
bare metal), which runs directly on the host device’s<br />
hardware, and Type II hypervisor, which runs on top of the<br />
host device’s operating system. Exhibit 1 below illustrates the<br />
locational differences in relation to the host device’s<br />
hardware layer.<br />
Exhibit 1: Portable Desktop Locational Differences within the Host Device<br />
Portable<br />
desktop<br />
Host Image<br />
Host O/S<br />
Portable<br />
desktop<br />
Hypervisor<br />
Host Image<br />
Host O/S<br />
Portable<br />
desktop<br />
Hypervisor<br />
Hardware<br />
Hardware<br />
Hardware<br />
Source: Frost and Sullivan<br />
The ‘within the host device’ implications are:<br />
• Performance Degradation: Two performance implications<br />
associated with hypervisor-based models are the<br />
virtualization and contention caused by multiple active<br />
desktops vying for the host device’s hardware resources. In<br />
practice, the magnitude and variation in performance<br />
degradation are partially controllable through technology and<br />
architecture (e.g., optimizing hypervisor operation, and the<br />
interplay with the host device’s hardware), and by good<br />
desktop management practices in sizing and configuring the<br />
host device’s hardware infrastructure based on realistic<br />
workload requirements; and then actively monitoring and<br />
managing this shared infrastructure.<br />
• Security Risk: The host device’s operating system and<br />
hypervisor operating below the portable desktop represent<br />
reams of security risk. As software, the operating system and<br />
the hypervisor are vulnerable to hacker exploits. Additionally,<br />
each is potentially outside the direct and continuous control<br />
of the issuing agent of the portable desktop (i.e., the IT<br />
organization); for example, in a BYOD (user-owned device)<br />
circumstance or in a subscribed service instance, such as<br />
desktop as a service (third-party environment). Also, similar<br />
to other forms of software, the likelihood and severity of a<br />
security incident or incidents is unpredictable and changeable<br />
over time. Nevertheless, security risk exists and should be<br />
evaluated relative to the sensitivity and criticality of the work<br />
performed through the portable desktop.<br />
As in real estate, location also matters in the portable desktop.<br />
Distance between the end user and the location of the hosted<br />
portable desktop can negatively impact the end-user<br />
experience. Similar to performance-affecting contention of<br />
the shared computing resources in ‘within the host device,’<br />
traffic congestion on shared communication networks can<br />
also be performance impacting. Technology and management<br />
proficiency assist in curbing performance fluctuations and in<br />
reducing instances of unacceptability across the network<br />
connections between end users and portable desktops.<br />
pg | # 04