Linux Client Migration Cookbook Version 2

Total Page:16

File Type:pdf, Size:1020Kb

Linux Client Migration Cookbook Version 2 Front cover Linux Client Migration Cookbook, Version 2 A Practical Planning and Implementation Guide for Migrating to Desktop Linux For any organization that is exploring or planning for a Linux desktop migration Provides in-depth detail on the technical and organizational challenges Includes methods for planning and implementation Chris Almond Jeroen van Hoof Nick Lassonde Ben Li Kurt Taylor ibm.com/redbooks International Technical Support Organization Linux Client Migration Cookbook, Version 2 A Practical Planning and Implementation Guideline October 2006 SG24-6380-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Second Edition (October 2006) © Copyright International Business Machines Corporation 2004, 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Forward . xv Bernard Golden, Navica . xv Greg Kelleher, IBM . xvii Preface . xix The team that wrote this redbook. xx Acknowledgements . xxi Become a published author . xxii Comments welcome. xxii Part 1. Choosing Linux. 1 Chapter 1. Introduction. 1 1.1 The migration landscape today . 2 1.2 Identifying suitable environments . 2 1.3 Strategic context . 3 1.4 Client environments. 5 1.5 Why Linux . 6 1.6 Linux overview and distribution choices . 7 1.7 Desktop Linux futures . 7 1.8 The rest of this book . 23 Chapter 2. The case for migration . 25 2.1 Why migrate . 27 2.1.1 Desktop security . 27 2.1.2 Costs related to Linux client . 32 2.1.3 Manageability of the Linux client . 34 2.1.4 Client customization . 37 2.1.5 Free software and the open source philosophy . 38 2.1.6 Ease of use and retraining . 38 2.1.7 New economies of scale . 38 2.2 When to migrate - Or not to migrate . 39 2.2.1 Desktop Linux markets — the threshold of entry . 39 2.2.2 Client roles fit thin and slim client model . 40 2.2.3 High number of migratable applications . 41 2.2.4 Organizational readiness . 41 © Copyright IBM Corp. 2004, 2006. All rights reserved. iii 2.3 What makes Linux so different . 42 2.3.1 The movements: free software and open source . 42 2.4 Migration goals . 43 2.4.1 Pilot migration . 44 2.4.2 Full migration. 44 Part 2. Planning the pilot migration . 47 Chapter 3. Organizational and human factors planning . 49 3.1 Assessing usage patterns . 50 3.1.1 Functional segmentation - Fixed function to general office. 50 3.1.2 Surveying user data . 52 3.1.3 User survey . 52 3.2 Establishing functional continuity . 53 3.2.1 Bridging applications . 53 3.2.2 Functionally equivalent utility applications . 54 3.2.3 Web applications. 55 3.2.4 Building bridges to the server . 55 3.3 Human factors . 56 3.4 Retraining considerations . 57 3.4.1 Bridging applications can separate retraining from migration . 58 3.4.2 Learning a new look and feel . 58 3.4.3 Familiar actions . 58 3.4.4 File systems: Everything has been moved . 58 3.4.5 Hands-on Linux prior to migration . 59 Chapter 4. Technical planning . 61 4.1 Assessing the client IT environment . 63 4.1.1 Assessing the client hardware . 63 4.1.2 Assessing the client software configuration . 65 4.1.3 Assessing data dependencies . 66 4.1.4 Assessing application equivalency . 67 4.1.5 Assessing the infrastructure . 67 4.1.6 Assessing the user . 68 4.2 Integrating with existing network services . 69 4.2.1 Setting the environment . 69 4.2.2 Authenticating within a Windows domain . 70 4.2.3 File sharing using domain shares . 72 4.2.4 Printing services in the domain . 73 4.2.5 DHCP and DNS configuration. 75 4.2.6 Web proxy interface . 75 4.3 Standardizing the desktop. 75 4.3.1 Linux distributions . 76 4.3.2 Linux desktop environments . 76 iv Linux Client Migration Cookbook, Version 2 4.3.3 Look and feel. 79 4.3.4 User lockdown. 83 4.3.5 Application choices . 83 4.3.6 File systems and partitions . 83 4.4 Migrating applications . 84 4.4.1 Moving back to client/server computing . 84 4.4.2 Logical segmentation - Thin, slim, or fat . 85 4.5 Client administration planning . 86 4.5.1 Operating system and vendor distribution updates. 87 4.5.2 Application updates. 88 4.5.3 Remote administration . 88 4.5.4 Rollout of additional or replacement clients . 89 4.5.5 Backup of clients . ..
Recommended publications
  • About SEP Sesam Hybrid Backup and Disaster Recovery
    Hybrid Backup & Disaster Recovery SEP sesam’s Backup & Disaster Recovery Capabilities for the Red Hat Ecosystem 1 Global Storage Management SEP sesam’s Backup and Disaster Recovery Capabilities for the Red Hat Ecosystem Table of Contents Table of Contents 1 About this Document 3 About SEP 3 About SEP sesam Hybrid Backup and Disaster Recovery 3 SEP’s Mission 4 Red Hat Statement 4 SEP‘s Collaboration with Red Hat 5 Value Proposition for Red Hat Solutions 5 Red Hat® Enterprise Linux 7 Bare Metal Recovery Capability for Linux 8 Red Hat® Virtualization 8 Red Hat® Virtualization Backup White Paper 8 Red Hat® Storage 9 SEP‘s Collaboration with SAP 9 SAP HANA Certifications 10 SAP Ecosystem - Protection Overview 10 Datacenter 10 Platforms 10 Hypervisors 10 Operating Systems 10 Databases 11 Applications 11 SAP Statement 11 SEP sesam Customer References in SAP Environments 11 Uniorg 11 Kwizda 12 Linck 12 Inecom Business Solutions 12 Service Provider and Cloud engagement 12 SEP was named one of the 2018 Gartner Peer Insights Customers’ 12 Choice for Data Center Backup and Recovery Software Here are a few examples of our customers statements: 13 Summary / Authors 13 www.sepsoftware.com I SEP sesam’s Backup and Disaster Recovery Capabilities for the Red Hat Ecosystem 2 Global Storage Management SEP sesam’s Backup and Disaster Recovery Capabilities for the Red Hat Ecosystem About this Document This document serves a Red Hat® and SEP value proposition for the joint solutions. Beside of general information we will highlight the sup- port of Red Hat® Virtualization, Red Hat® Enterprise Linux®, Red Hat® Storage, SAP and Service Providers.
    [Show full text]
  • Head-To-Head: Zimbra Vs Scalix
    Head-to-Head: Zimbra vs Scalix Key Positioning vs Scalix • Innovation leadership . Zimbra has consistently demonstrated innovation leadership in emerging areas of messaging and collaboration, including web-based mash-ups (Zimlets), rich web document authoring and sharing, native over-the-air mobile synchronization, comprehensive server-side indexing/search, and VOIP. Conversely, with less demonstrable innovation, Scalix has relied mostly upon TCO positioning based on Linux. In addition, Scalix’s reliance on HP OpenMail (15+ years old and discontinued by HP) and Oddpost limit Scalix’s ability to innovate in core product areas. • Foundation in open source. Zimbra started as an open source company (as most leading open source projects have done) and open sources all of its key product components -- providing full product transparency and customer investment protection. Conversely, Scalix is attempting to migrate to open source (a strategy without successful market precedent), is open sourcing a discontinued code base (likely not attractive to the open source community), and has no plans or entitlements to open source its web client. In addition, Zimbra has strong relationships with leading open source companies (such as Red Hat and MySQL), is deployed at many leading open source vendors (such as Digium/Asterisk and Mozilla), and has been a key contributor to open source projects such as the OpenAjax Alliance. Finally, Zimbra’s open source foundation enables clean bundling of best-of-breed open source components as product building blocks – a strategy Zimbra regularly employs with the Zimbra Collaboration Suite (which currently bundles 40+ open source components) to rapidly provide innovation and high-quality solutions.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Installing the Scalix Management Console
    Scalix Installation Guide Version 11.0.01 1 Scalix Installation Guide Notices The information contained in this document is subject Published by Scalix Corporation to change without notice. 1400 Fashion Island Blvd., Suite 602 Scalix Corporation makes no warranty of any kind with San Mateo, CA 94404-2061 regard to this material, including, but not limited to, the implied warranties of merchantibility and fitness USA for a particular purpose. Scalix Corporation shall not be liable for errors contained herein or for incidental Contents copyright © 2007 Scalix Corporation. or consequential damages in connection with the All rights reserved. furnishing, performance, or use of this material. Product Version: 11.0.1 Unix is used here as a generic term covering all versions of the UNIX operating system. UNIX is a E: 2.12.2007 registered trademark in the United States and other countries, licensed exclusively through X/Open Company Limited. Linux is a registered trademark of Linus Torvalds. Red Hat, and Fedora are registered trademarks of Red Hat Software Inc. rpm is a trademark of Red Hat Software Inc. SUSE is a registered trademark of Novell Inc. Java is a registered trademark of Sun Microsystems Inc. Microsoft, Windows XP, Windows 2000, Windows NT, Exchange, Outlook, Active Directory, and Internet Explorer are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. Restricted Rights Legend Use, duplication, or disclosure is subject to restrictions as set forth in contract subdivision (c)(1)(ii) of the Rights in Technical Data and Computer Software clause 52.227-FAR14. 2 Scalix Installation Guide | Contents Introduction To This Guide .
    [Show full text]
  • Auf Und Ab Groupware
    08/2015 Die Entwicklungen bei Linux-Groupware – eine Zwischenbilanz Sysadmin Auf und ab Groupware 58 Der Groupwaremarkt ist ebenso groß wie schwierig: Microsoft Exchange und Lotus Notes halten die dicken Brocken fest, soziale Netzwerke und Google drängen nach. Freie Software kann gleichwohl auf schöne Erfolge verweisen, gerät aber immer wieder in die Opferrolle – meist wegen externer Finanzierung. Markus Feilner, Dirk Ahrnke www.linux-magazin.de Connect (Abbildungen 1 und 2). Obwohl einige Einzellösungen aus dem Linux- und Open-Source-Umfeld, zum Beispiel Spam assassin, Open SSL und Qt, inte- griert sind, vertreibt Kerio sein Produkt Connect vollständig und ohne jede Aus- nahme unter einer proprietären und rein © mahout, 123RF © mahout, kommerziellen Lizenz. Außer für Linux ist das Produkt darüber hinaus auch für Windows und Mac OS X erhältlich. Gerade Letzteres dürfte eini- ges zur Verbreitung beigetragen haben, denn für die Apple-Serverplattform gibt es relativ wenige Groupwarelösungen. Kerio hat zudem auch als einer der ersten Dritthersteller eine Implementierung der Exchange Web Services (EWS) geschafft. Unter OS X setzt mittlerweile nicht nur Outlook auf die HTTP-basierte Anbin- dung an Exchange. Seit OS X (Snow Leo- Vier Jahre her ist der letzte Groupware- sehen sich dabei natürlich Produkte, pard) lässt sich auch das zum Mac-Sys- vergleich im Linux-Magazin [1] – Grund deren Entwicklung (zum Teil) in einer tem gehörende Mail via EWS anbinden. genug, erneut den Blick auf die für Un- Community erfolgt – sprich Open-Source- ternehmen wichtige Collaboration-Sparte Software. Diese Einschätzung teilt die Caldav und Carddav zu richten, die allein in Deutschland rund Wagniskapitalbranche offenbar, denn in 700 Millionen Euro Jahresumsatz schwer die meisten Groupware-Unternehmun- Es sind allerdings nicht nur die alterna- ist.
    [Show full text]
  • Glossaire Infographique
    Glossaire Infographique André PASCUAL [email protected] Glossaire Infographique Table des Matières GLOSSAIRE ILLUSTRÉ...............................................................................................................................................................1 des Termes techniques & autres,.....................................................................................................................................1 Prologue.......................................................................................................................................................................................2 Notice Légale...............................................................................................................................................................................3 Définitions des termes & Illustrations.......................................................................................................................................4 −AaA−...........................................................................................................................................................................................5 Aberration chromatique :..................................................................................................................................................5 Accrochage − Snap :........................................................................................................................................................5 Aérosol,
    [Show full text]
  • Exploring Open Source Options the Redmonk Going Open Source Series, Part 1
    April 19, 2007 Page 1/9 Exploring Open Source Options The RedMonk Going Open Source Series, Part 1 Overview Now more than ever, one of the top questions for a software company is: Michael Coté to what degree should we participate in open source? Open source is James Governor indisputably the most significant trend affecting the software world at the current time. More than any other single approach, strategy, or tactic, open Stephen O'Grady source has compelled vendors once thought to be unassailable in their respective markets - such as IBM, Microsoft and Oracle – to significantly alter their strategies. While substantial attention is paid to the source aspects of the code –the fact that it is visible, and in some cases alterable and distributable – the distribution advantages may be the most transformative, at least in the commercial world. From application servers to operating systems to programming languages to relational databases to web servers, very few categories of infrastructure software have been immune to open source competition. The packaged application market appears to be the next archipelago in the path of the tsunami, and vertical applications are undoubtedly close behind. None of this is to say that open source is necessarily the single path forward for software vendors; while that may or may not be true in the distant future, it is being actively refuted by the continuing ability of vendors such as Microsoft and Oracle to sell products that are less freely available and higher priced than their open source competition. In the case of many, if not most, of these established vendors, however, success rests more on the basis of significant market barriers to entry than on pure technical grounds.
    [Show full text]
  • Funambol Installation and Administration Guide
    Funambol Installation and Administration Guide Last modified: January 5, 2011 Table of Contents 1. Introduction....................................................................................................................... 6 2. Getting started................................................................................................................... 7 2.1. Preparing a host computer............................................................................................................... 7 2.1.1. Minimum system requirements...............................................................................................7 2.1.2. Preparing the Funambol Server package installation............................................................ 7 2.2. Obtaining the Funambol Server package......................................................................................... 8 3. Installing the Funambol Server package......................................................................... 9 3.1. Installation on a Windows host server.............................................................................................. 9 3.1.1. Verifying the server startup..................................................................................................... 9 3.1.2. What to do if the server does not automatically start............................................................ 10 3.1.3. Run Funambol As Microsoft Windows Service (from XP to above)...................................... 10 3.2. Installation on a Linux host
    [Show full text]
  • This Is a Free, User-Editable, Open Source Software Manual. Table of Contents About Inkscape
    This is a free, user-editable, open source software manual. Table of Contents About Inkscape....................................................................................................................................................1 About SVG...........................................................................................................................................................2 Objectives of the SVG Format.................................................................................................................2 The Current State of SVG Software........................................................................................................2 Inkscape Interface...............................................................................................................................................3 The Menu.................................................................................................................................................3 The Commands Bar.................................................................................................................................3 The Toolbox and Tool Controls Bar........................................................................................................4 The Canvas...............................................................................................................................................4 Rulers......................................................................................................................................................5
    [Show full text]
  • Servicio De Mensajería De Correo Utilizando Software Libre Para
    Servicio de mensajería de correo utilizando software libre para mejorar el tiempo de respuesta de atención Tesis para optar el Título de Ingeniero de Sistemas y Cómputo Presentado por César Antonio Rojo López Asesor Dr. Santiago Raúl Gonzales Sánchez Lima – Perú Noviembre de 2020 DEDICATORIA Dedico este trabajo a mi familia particularmente a mis padres Mercedes López de Rojo y César Rojo Fernando como también a mi prometida Ximena Veliz que dia a dia me dan fuerza y motivacin para seguir adelante, como también al Gerente General de TecnoWeb Latam Diego Benavente por brindarme todas las herramientas para la implementación tecnologcia. 2 ÍNDICE ÍNDICE DE FIGURAS ............................................................................................................................. 5 INDICE DE TABLAS ............................................................................................................................... 7 RESUMEN ................................................................................................................................................. 8 ABSTRACT ............................................................................................................................................... 9 INTRODUCCIÓN ................................................................................................................................... 10 CAPÍTULO I: PLANTEAMIENTO DEL PROBLEMA ..................................................................... 12 1.1. Situación Problemática ..........................................................................................................
    [Show full text]
  • Global Illumination for Fun and Profit
    A New Interface for Cloning Objects in Drawing Systems Loutfouz Zaman, Wolfgang Stuerzlinger York University, Toronto, Canada top to bottom, such clones are then similar to a series of events in ABSTRACT an ordered sequence. The similarity is even more apparent, if the Cloning objects is a common operation in graphical user objects were cloned via copy & paste. Changes to the physical interfaces. One example is calendar systems, where users appearance, such as shape or color, are then similar to changing commonly create and modify recurring events, i.e. repeated clones event attributes, such as time. Editing all following events can be of a single event. Inspired by the calendar paradigm, we introduce thought of as modifying clones created after a given clone. a new cloning technique for 2D drawing programs. This technique allows users to clone objects by first selecting them and then dragging them to create clones along the dragged path. Moreover, it allows editing the generated sequences of clones similar to the editing of calendar events. Novel approaches for the generation of clones of clones are also presented. Figure 1. Editing recurring events in Google Calendar. We compared our new clone creation technique with generic In this paper, we present Skencil-C, a mouse-based system duplication via copy-and-paste, smart duplication, and a dialog which implements a new interface to cloning objects in 2D driven technique on a standard desktop system. The results show graphics environment, based on the paradigm discussed above. that the new cloning method is always faster than dialogs and We evaluated the new techniques against existing techniques in smart duplication for most conditions.
    [Show full text]
  • Scalix Installation Guide
    Scalix Installation Guide Version 12.5 1 Scalix Installation Guide Notices The information contained in this document is subject Published by Scalix, Inc. to change without notice. Scalix Inc. Scalix Inc. makes no warranty of any kind with regard 488 Madison Ave, to this material, including, but not limited to, the 4th Floor, implied warranties of merchantability and fitness for New York, NY a particular purpose. Scalix Inc. shall not be liable for 10022 errors contained herein or for incidental or conse- quential damages in connection with the furnishing, performance, or use of this material. Copyright © 2015 Scalix, Inc. All rights reserved. UNIX is a registered trademark of The Open Group. Product Version: 12.5 Linux is a registered trademark of Linus Torvalds. Document Revision: 5 Fedora is a registered trademark of Red Hat, Inc. Red Hat is a registered trademark of Red Hat Software, Inc. Enterprise Linux is a trademark of Red Hat, Inc. RPM is Notice for Open-Source Software a trademark of Red Hat Software, Inc. Copyright (c) 1998-2013 The OpenSSL Project. All rights reserved. SUSE is a registered trademark of Novell, Inc. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are Java is a registered trademark of Sun Microsystems, met: Inc. 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Microsoft Windows 8,Windows 7,Windows XP, 2. Redistributions in binary form must reproduce the above copyright Windows 2000, Windows NT, Exchange, Outlook, notice, this list of conditions and the following disclaimer in the doc- umentation and/or other materials provided with the distribution.
    [Show full text]