Feeds

Controlling the desktop through user scenarios

Give 'em enough slack?

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Desktop An optimised desktop doesn't mean one for which all users have control over every function. So what should they control and how do you decide?

Once you've started down the road of optimising desktops there's a lot to consider. Although it may simplify the role of the IT professional, with easier to manage images and reduced maintenance costs, the approach will change your users' relationships with their PCs.

What used to be a free-for-all where users could install whatever they wanted, often regardless of licences and policies, is more often than not now locked down and centrally controlled, with streamed applications instead of local copies.

Of course, users don't always need to be that tightly controlled. Well-designed desktop optimisation systems can balance control and freedom, keeping things manageable while still giving users the flexibility they want.

With more than one approach to desktop optimisation, from centrally managed images, to application virtualisation, and to virtual desktops, there's plenty of choice in just what solution you deploy, and for which users.

Five types of workers

Microsoft's Windows desktop optimisation tools are designed to support several different types of user, focusing on five scenarios. No matter what type of desktop optimisation approach you use, these scenarios are a good place to start. You can mix and match concepts and solutions based on them, with the aim of reducing both complexity and risk.

The most obvious is the office worker. Information workers rely on their PCs, and any optimised desktop needs to quickly support their needs. That means you'll need to mix control with flexibility, focusing on a defined image and appropriate user profiles.

Application streaming can be used to deliver core applications, and roaming profiles to redirect them to centralised storage, speeding up deployment and recovery while still allowing ad-hoc installations.

Mobile workers have very similar needs and expectations to office workers – though with one key difference. Unreliable connectivity means that you're unlikely to be able to use roaming profiles to handle central storage, and application streaming is only really possible when in the office. Technologies such as Direct Access can improve connectivity, and using policy-driven security tools like BitLocker will help secure their data.

Much less flexibility is needed for task workers. Working in call centres or handling data entry, they just need specific applications and perhaps a web browser. Desktop optimisation means they always have the most current tools need for the task at hand - and you're also able to use the same tools to extend the life of desktop hardware. Why deploy high-end PCs when all you need is a virtual desktop or remote access from a zero-client terminal to a specific application?

Things get more complex when you're supporting contract workers or consultants. They're often bringing their own hardware into your network, as they need access to their own applications - and to applications and services their company's IT professionals have provided.

You won’t be able to control their machine completely, so using virtual desktops to deliver access to your tools while segregating their machines in quarantine networks can simplify controlling their access to your services, while keeping your network and data secure.

You'll need to take a similar approach when supporting home workers – especially if they're using their own hardware. Users bringing their own tools to a job don't expect to have their machines tightly controlled – and the potential of lawsuits mean you need to minimise any form of business risk.

Generally home workers are task workers, so you can use remote desktop tools to deliver application screens to their PCs without having to install software or worry about data on unmanaged disks. Home workers with more complex needs can use virtual desktops – or you could take advantage of Windows 7's ability to boot virtual disks as an alternative to the users' own operating systems and data.

There's a balance to be struck between control and freedom, between over-management and laxity. Economies of scale dictate that you're unlikely to be able to manage this down to the level of the individual user - unless they're the MD - but you can use scenarios that allow you to deliver the right desktop experience at the right time to the right user. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
That dreaded syncing feeling: Will Microsoft EVER fix OneDrive?
Microsoft's long history of broken Windows sync
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
SLURP! Flick your TONGUE around our LOLLIPOP – Google
Android 5 is coming – IF you're lucky enough to have the right gadget
Nokia's N1 fondleslab's HIDDEN BRILLIANCE: The 'Z Launcher'
Sugarcoating Android's Lollipop makes tab easier to swallow
Bug fixes! Get your APPLE BUG FIXES! iOS and OS X updates right here!
Yosemite fixes Wi-Fi hiccup, older iOS devices get performance boost
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
Meet Windows 10's new UI for OneDrive – also known as File Explorer
New preview build continues Redmond's retreat to the desktop
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.