Technology &Business Proposal for IDV, VDI Or Thin-Client Solutions

Technology &Business Proposal for IDV, VDI Or Thin-Client Solutions

Technology and Business Proposal of Phantosys Technology &Business proposal for IDV, VDI or Thin-client Solutions selection IDV: Intelligent Desktop Virtualization: ● Centralized management, but local execution ● Layered images delivered intelligently (layered images are virtual environments constructed on the fly that include system software, application software, application data, user preferences and user data) ● Intelligent device management that uses the capabilities available on the machine in the most intelligent way (Graphs would be processed locally, If a system has a high performance graphics system, for example)---- Issued by Intel VDI: Virtualized Desktop Infrastructure: Desktop virtualization is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it. Desktop virtualization can be used in conjunction with application virtualization and (Windows) user profile management systems, now termed "user virtualization," to provide a comprehensive desktop environment management system.( From Wikipedia, the free encyclopedia) Thin-client: A thin client (sometimes also called a lean, zero or slim client) is a computer or a computer program that depends heavily on some other computer (its server) to fulfill its computational roles. (From Wikipedia, the free encyclopedia) ! ! © Generated by Steven Chiu,Phantosys Ltd. Technology and Business Proposal of Phantosys TABLE OF CONTENTS 1 ! Page !1 ! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys Background ........................................................................................................................................4 Introduction of current major solutions in the marketing .............................................................4 1. Citrix 4 2. Microsoft 5 3. VMware 7 2. Phantosys Technology .......................................................................................................7 1. Challenges of Enterprises/Government/educational IT Environments ............................8 1.2.2 Service Availability .............................................................................................................9 1.2.3 Service Performance .........................................................................................................9 1.2.4 Service Access ................................................................................................................10 1.2.5 Escalating Total Cost of Service Availability..................................................................... 10 3. The Phantosys Solution................................................................................................... 12 1.3.1 How Does Phantosys Solution Work? .............................................................................14 1.3.2 Phantosys Solution Manages User Services Easily ........................................................16 1.3.3 What's DOEc™ Protocol?................................................................................................ 20 1.3.4 The Phantosys solution shows the following features: ....................................................21 1.3.5 Phantosys Solution Compared to Other Computing Models ...........................................22 2. System Introduction—Unique and outstanding technologies .......................................................24 2.1. Autonomous Transmission protocol ................................................................................24 2.1.1. DOEc™ Protocol: “Please refer to “What's DOEc™ Protocol” on page 19 ..................24 2.1.2 EDSC Protocol: Ethernet Disk Sector Communication.................................................. 24 2.2. Cross-platform Cluster Files System—PIM .....................................................................26 2.3. Multiple OS, Nodes and Inheritance Technology ............................................................ 27 2.4. Local HDD as cache ........................................................................................................27 2.5. Top secure level design ...................................................................................................29 1. How secure we are ........................................................................................................29 2. Three models for Option: ................................................................................................30 2.1. Diskless — just like any thin-client (server-based )solution did. .....................................30 2.2. Local cache—HDD as cache ..........................................................................................30 2.3. All Local cache—Whole HDD as cache ..........................................................................31 6. Input/output ports blocked ..............................................................................................31 7. Internal and external network completely separated centrally .........................................32 8. Mini OS guide control System .........................................................................................33 9. Multiple authentication security mechanism ...................................................................34 ! Page !2 ! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys 10. No back door of detection or monitoring for any organization or government ................34 11. 801.1X authentication .....................................................................................................35 12. Friendly Interface, localization and useful DLL ................................................................35 3. Application fields ........................................................................................................................37 1. SOE be centrally managed, deployed and dispatched ......................................................37 2. Mobile Devices Security Management ............................................................................39 2.1. Solution brief .................................................................................................................39 2.2. Design Concept: ............................................................................................................39 2.3. Running Windows Operation System on mobile devices .............................................39 2.4. Running MAC Operating System on mobile devices ....................................................41 2.5. Solution advantages: .....................................................................................................42 3. FTP/Email/File etc. servers security.................................................................................. 43 4. Website server security management—Machine gun .........................................49 5. Anti-Ransomware solution ..................................................................................50 6. Education field applications --Computer room, Classroom, Administration......... 53 6.1. IT problems and management issues in current environment ...........................53 3.6.2 Digitalization of teaching in any classroom environment .................................................54 7. Phantosys advantages for education, training center .........................................55 3.7.1 SOE, central deployment and management via WAN or cloud .......................................59 3.7.2 The virtual lab. And Experiment Environment Established ............................................60 8. Government/Enterprises/Defence fields applications ..........................................66 4. Cost comparison and analysis .............................................................................................73 4.1 ICT manpower saving ........................................................................................................73 4.2 Idle loss ..............................................................................................................................74 4.3 Licenses fee issue .............................................................................................................74 4.4 Power consumption in whole environment ........................................................................75 4.5 Invisible Intellectual Property Loss cost .............................................................................79 1. System requirement and supporting ..........................................................................................80 6 Criteria for handling our solution ..................................................................................................81 7 ROI analysis and Business Model ............................................................................................82 8. Typical Reference Sites .............................................................................................................82 9.Future 84 ! Page !3 ! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys Background Introduction of current major solutions in the marketing There are a lot of VDI, IDV or thin-client solution in the market. As we known major players are Citrix, VMware, MS etc. 1. Citrix Citrix(NASDAQ︰CTXS) Is the leader of thin client solution provider of the world Using

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    86 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us