Hi [[ session.user.profile.firstName ]]

The Next Generation Desktop

The Next Generation Desktop: Bring a more optimized desktop to your business

Sarah Mannion is a Desktop Optimization Specialist at Microsoft. Sarah has worked in IT for over a decade in both support and pre-sales roles and has been at Microsoft for the last three years. Her role involves assisting customers and partners with their desktop strategies and deployments and showing the value of a well-managed dynamic desktop.

• Are you looking to upgrade your desktop estate to Windows 7 in the next 2 years?
• Are you currently using either roaming profiles or folder redirection in your organization?
• Is a thin client/VDI deployment a potential desktop strategy for some or all of your users in the next 5 years?
• Do you allow consumerization in your organization? (Essentially, bring your own PC to work, or an iPad)?
Recorded Aug 25 2010 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sarah Mannion, Optimized Desktop Specialist, Microsoft
Presentation preview: The Next Generation Desktop

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Actual Reality: Desktop Virtualization Solutions from Microsoft Recorded: Jul 17 2013 48 mins
    Mitch Garvis, Virtual Technical Evangelist for Windows Infrastructure, Microsoft
    Hyper-V is no longer just for servers; with Windows 8 Microsoft has brought Layer 1 Virtualization to the desktop. However with Windows Server 2012 they have also done a great job of putting Windows 8 into the virtual desktop infrastructure (VDI).

    In the first part of this session we will discuss VDI and the components necessary to build out a virtual desktop infrastructure and discuss many of the cool new features, such as multi-monitor VMs, touch interface, and pooled versus personal VMs.

    Once that is done we will discuss Remote Applications and publish them to our desktops so that the users can use the full power of the server for their applications!
  • What are the best practices for PCoIP device management? Recorded: Mar 14 2013 60 mins
    Mirela Cunjalo, Product manager Desktop Solutions
    As the number of PCoIP zero clients increases in an organization, managing the endpoint devices from a centralized tool becomes essential. Teradici’s PCoIP Management Console helps IT Professionals save time and costs by providing the ability to centrally and remotely monitor, configure and update their entire ecosystem of PCoIP devices and proactively resolve problems. Are you interested in learning how to get the most of the PCoIP Management Console and fine tune your deployments? Are you interested in understanding about new management capabilities being added?
    Listen to this webinar to learn the benefits and best practices of the PCoIP Management Console and how it will streamline the management of your PCoIP ecosystem. In this presentation we will cover:
    - PCoIP Management Console and Zero Clients overview and benefits
    - Best Practices guide and tips to get the most out of the PCoIP Management Console
    - New capabilities on the roadmap for the PCoIP Management Console
    - Customer case study
  • Introducing the Virtual Workspace Recorded: Feb 20 2013 29 mins
    Simon Bramfitt, Founder and Research Director, Entelechy Associates
    About the Presenter:
    Simon Bramfitt is the founder and principal analyst at Entelechy Associates where he covers application delivery, desktop management and virtualization technologies. He has over 25 years of experience in designing high-availability application delivery and virtualization environments in Europe, the Middle East, and the USA. Prior to founding Entelechy Associates, Mr. Bramfitt covered desktop virtualization at Burton Group and Gartner and was a senior architect at Kaiser Permanente. His experience also includes IT administration, consulting, service delivery and IT management. Mr. Bramfitt blogs at simonbramfitt.com.
  • The Journey to the Modern Desktop: 5 Steps of Workspace Virtualization Recorded: Feb 13 2013 43 mins
    Karin Kelley, Analyst, Infrastructure Software, 451 Research; Sean Donahue, Sr. Director of Global Alliances, RES Software
    The way people work today has been transformed. Today’s users want access to enterprise IT services 24/7 from any location, and a traditional PC simply does not support this. However, to accommodate the flexible workstyles of mobile workers, IT is forced to come up with solutions for managing this increasingly complex environment. Workspace virtualization helps IT take on the challenges of mobility and security, while maintaining productivity across every line of business. In fact, workspace virtualization enables IT to centrally deliver, manage and secure the key elements of a user’s computing experience, independently of workstyles and devices.

    Join us for your 5 step guide to:

    •Operate much more efficiently
    •Lower the cost of daily operations
    •Improve the user experience dramatically
    •Boost security & compliance with context awareness and automation

    About the Presenters:
    Karin Kelley, Analyst, Infrastructure Software, 451 Research
    Karin is an Analyst with 451 Research's Infrastructure Computing for the Enterprise (ICE) practice. With a key focus on workspace virtualization, Karin also specializes in systems management in distributed desktop environments. Karin's IT industry experience began in 1997 as a research and administrative assistant in Merrill Lynch's Palo Alto technology investment banking office.

    Sean Donahue, Senior Director of Global Alliances, RES Software
    Sean has spent the greater part of the past 20 years evangelizing and working across Citrix and Microsoft technologies. Prior to RES, Sean spent 5 years working at Microsoft in the System Center Alliance group managing the partners in the App-V ecosystem as well as the Citrix alliance. Sean came to Microsoft through the acquisition of Softricity in 2006. In his current role at RES Software Sean owns the strategic alliances programs and manages all ISV relationships including Citrix, Microsoft, VMware as well as Tier 2 ISVs.
  • Make the Service Desk More Relevant Within Your Organization Recorded: Feb 7 2013 35 mins
    Mark Smiley, ITSM Advisor, Cask, LLC
    This discussion will highlight some key attributes of the Service Desk that often can go unrecognized:

    - Discussion around cross training for your S.D. personnel. How to make that happen, and the positive consequences as a result
    - Keys to marketing the Service Desk within your organization
    - Going on “fishing expeditions” to seek out potential opportunities for the Service Desk
    - Focus on career growth. See the Service Desk as an entry point, not a dead end, to your IT organization.

    Mark Smiley is ITIL® & HDI certified with over a decade of ITSM and Service Desk experience.  He's worked with various clients and industries from around the world, including the government, healthcare, and education sectors, ranging from 5,000 to 400,000 users. Most recently, he has assisted in the establishment and development of three Service Desks, in addition to directly managing teams dedicated to customer support. He currently is working as a senior advisor to the United States Marine Corps as they establish their own Service Desk to support their day to day operations.
  • Securing Mobile Devices – Challenges and Opportunities for IT Security Recorded: Feb 6 2013 45 mins
    Steve Durbin, Vice President, Information Security Forum
    Recently highlighted as being one of the top 5 threats for 2013 by the ISF, this webinar maps out how you can respond to the ‘consumerisation’ challenge today – whatever stage you are at – based on current efforts to formulate good practice at leading ISF Member organisations around the world. It offers independent guidance on how to plan your security response not only in terms of how your people use mobile devices, but also in terms of protection solutions, provisioning and support, and meeting statutory requirements.

    About the speaker:
    Steve Durbin is Global Vice President of the Information Security Forum (ISF). He is a regular speaker and chair at global events and is quoted in the Financial Times, Wall Street Journal, Forbes, Deutsche Presse, Süddeutsche Zeitlung, CIO Forum, ZD Net, and Information Week.
    Steve has considerable experience working in the technology and telecoms markets and was previously senior vice president at Gartner. He is also currently chairman of the Digiworld Institute senior executive forum in the UK, a think tank comprised of Telecoms, Media and IT leaders and regulators.
  • High Performance Wireless for BYOD: The Task in Hand Recorded: Jan 17 2013 47 mins
    Perry Correll, Senior Technologist, Xirrus
    BYOD is no longer a consideration, it’s a reality. Every day over 2 million new wireless devices are being activated and these devices will show up on you network. And while most wireless vendors are talking about the potential security risks, which are considerable, almost no one is discussing the impact the sheer numbers of devices will have on your networks performance.

    A recent Gartner study did and stated that ‘By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning’. Many administrators still designing for coverage, when capacity limits are the true Achilles heel of wireless deployments. This session will discuss the varied client types and their capabilities, best practices to address growing device densities and how both impact overall network performance. IT administrator looking at a BYOD deployment or even just a wireless upgrade will gain valuable insight from this presentation.

    Perry Correll is a Senior Technologist as well as the Director of Product Marketing at Xirrus. His extensive networking background extends from original Ethernet Thicknet technology, through the switching revolution and now is involved in pushing advancements in Wi-Fi technology to displace wired solutions. Previous roles included technologist and management roles at Cabletron, Xylan and Alcatel.
  • Real Life Lessons Learned From Implementing Incident & Problem Management Recorded: Jan 16 2013 49 mins
    Paula Hero, itSMF USA
    You’ve implemented the ITIL Incident and Problem Management processes but have run into one or more roadblocks.


    • Managers don’t see the process value and aren’t supporting the implementation
    • Incident management is increasing “Average Talk Time” in your Call Center
    • Technical SME’s see the Problem process as overhead and “just a paper exercise”.
    • People say “ our environment is just too complex for real Problem Management
    • How Do We Find Root Cause?
    • How Do We Work With Vendors to Get to Root Cause?
    • Governance is Easier Said Than Done

    Join Paula Hero of itSMF USA as she shares the roadblocks she experienced in her organization and the lessons learned and practical suggestions for removing barriers and making the processes produce solid results.
  • Double Dipping: Incident and Problem Management & "Your SLA's" Recorded: Jan 16 2013 37 mins
    Richard Pilgrim, Sr. ITSM Advisor, Cask, LLC
    Often times we experience availability incidents. These incidents hold a different service level than those incidents caused by connectivity incidents. So what next?

    Join Rich Pilgrim, an experienced IT professional with over 20 years in the ITSM field, as he discusses the categorization of incidents and how they affect your SLA's, the link between incidents and problems and who should be looking at your SLA's for better service delivery.
  • Encryption: Is There a Difference Between Cloud and Internal Data? Recorded: Jan 16 2013 47 mins
    Vladimir Jirasek, Director of Research, Cloud Security Alliance
    Data is what underpins many companies' success, yet when it comes to protecting it, companies are underinvesting in security capabilities. With the move to cloud computing, data security issues are not going away, instead are getting bigger visibility. However, should companies only care about data security when their data is in the Cloud? Or should it be irrelevant where it is processed or stored, with data security high on CIOs agenda? This session will look both at strategic options and discuss people, processes and technologies that companies should be considering.

    Speaker bio:
    Vladimir is an expert in cloud computing and a highly qualified independent security professional. He has over 16 years of IT industry experience and over 12 years in information security and security, risk and compliance.
    Vladimir has both led and managed global teams in security, risk and compliance for multinational corporations. Utilising this experience, he has successfully constructed and implemented diverse Security, Risk and Compliance architectures, policies and strategies, by using accepted international standards. Lately he has setup an independent security management consulting practice.
    Vladimir is a major force and influencer in the newly established UK chapter of the Cloud Security Alliance, where he has the role of the Director of Research.
  • Strategies for Ensuring Desktop Virtualization SLAs Recorded: Nov 16 2012 30 mins
    Jeff Parillo, Managing Director, North American Sales & Ryan, Ahlers, Director, Sales Engineering , Aternity, Inc.
    Desktop Virtualization is the top cloud-based technology impacting End User Computing. And, user-centric, Service Level Agreement (SLA) Management is the primary factor against which cloud-based virtual desktop solutions and providers are and will be evaluated. If you are currently evaluating, planning, or managing application performance in a Virtualized Desktop Environment, don't let your VDI project get derailed by poor end user experience.

    In VDI environments, traditional system metrics, such as CPU, memory, and network utilization, are marginal indicators of actual performance. As a result, Desktop Virtualization demands a user-centric vs. device-centric approach to service management. End User Experience (EUE) management becomes an essential barometer to ensure that end-user facing systems are responsive and high-performing. During this webinar, the following topics for ensuring Desktop Virtualization SLAs through a user-centric approach to service management will be covered:

    - How to gain comprehensive visibility into exactly how virtualized desktop and remote workstation users are experiencing critical application performance
    - How to proactively detect when performance degradations occur
    - Methods for correlating PC-over-IP® (PCoIP®) latency with the actual business
    transaction response times and the VM image’s health
    - How to gain an in-depth understanding of application performance within the VMware View™ environment, exactly as experienced by the users themselves
    - Advanced analytics around key PCoIP metrics, such as Image Quality, Round Trip Latency, Packet Lost Percentage, Available Network Bandwidth, and many other performance impacting factors
  • Five Pillars of VDI Success Recorded: Nov 15 2012 35 mins
    Scott Miller, National Technical Solutions Architect, World Wide Technology, Inc.
    According to industry researchers nearly 75 percent of the organizations who have deployed a virtual desktop environment have stalled their deployment before completion leaving frustrated employees in departments ranging from IT, to the business units, to the executive suite. It isn’t a lack of good intentions causing these deployments to fail, but rather a lack of understanding of the holistic approach needed to successfully deploy a virtual desktop environment. Join WWT’s Dave Kinsman, National Technical Solutions Architect, as he discusses the 5 Pillars to VDI success.
  • 12 Steps To A Better Virtualized Desktop Service Recorded: Nov 15 2012 39 mins
    Andrew Wood, Analyst, The Virtualization Practice
    A virtual desktop is a common goal. The functional requirement of that goal – an experience as good as or better than a physical desktop for both the user and the administrator. How do you achieve that?

    In a growing environment of “consumerization of IT” how do you ensure that the delivery of your virtual desktop service is easy to use, effective, and reliable? How does, how will, your virtual desktop environment score as you take 12 steps to a better virtualized desktop service?
  • Protecting Web and Mobile Apps: Why Changing Passwords Doesn't Work Recorded: Nov 14 2012 46 mins
    Kevin Donovan, VP of Business Development, VASCO Data Security
    “Human factor” is often cited as one of the weakest links in the security architecture of web and mobile applications. With the proliferation of apps and the rise of a digital identity, users find it difficult to manage their passwords. As a consequence, many users resort to a simple but insecure practice of re-using one password across all applications and all platforms. Enforcing complex or frequently changing passwords exacerbates the issue. Besides being an annoyance to the users, it does not significantly improve identity assurance for secure login practices.

    As an ASP or an enterprise what can you do to protect your users or customers without adding too much complexity to their online experience? An optimal solution is always a compromise between usability, security, and cost. Join the experts from VASCO Data Security to learn more about the role of two-factor authentication in this paradigm. We will discuss how your organization can become one of the pioneers in bringing convenience and security to online account access.

    We will cover topics such as:

    - Security in an electronic environment: user as the weakest point

    - Password policies: why static complex passwords don’t work

    - Two-factor authentication as a control mechanism

    - Authentication business models: traditional vs new

    - Mobile apps and security

    - How to simplify user login experience and improve user convenience across all platforms

    - What’s in it for you: the future of digital identity
  • The 3 Things to Consider When Securing Mission-Critical Portals in the Cloud Recorded: Oct 18 2012 48 mins
    Kevin Donovan, VP of Business Development, VASCO Data Security
    With hundreds of cloud applications and portals hacked monthly, millions of passwords and confidential records get into the hands of cyber fraudsters. The cost of fixing the consequences of these hacks can be enormous. Factor in the reputational damage and you get the picture. You clearly don’t want your application or portal to be on this list.

    What can you do to protect your users without adding too much complexity to their online experience? Whether you are in the B2B or B2C business or running an employee internal portal, this dilemma is almost as old as the Internet itself. Low security is considered one of the key obstacles to the adoption of cloud applications. But now you can become one of the pioneers in bringing convenience and security to online account access with strong authentication. To learn how, join our strong authentication experts for an educational webinar.

    We will cover topics such as:

    •Security in the cloud: user as the weakest point

    •How to boost user trust in cloud apps

    •Authentication business models: traditional vs new

    •How to simplify user experience and improve user convenience in the cloud

    •What’s in it for you: what is the real value of security for the application owners and enterprises
  • The Service Desk: Open for Business Recorded: Aug 7 2012 47 mins
    Julie Mohr and Mark Galligan, itSMF USA
    After nearly half a decade of economic turbulence the Service Desk remains the center piece of the “way in” and often the “way out” of today’s IT Operations. With staffing cuts, freezes, an increasing volume of work and a need to improve operating effectiveness while increasing operating efficiencies, how can today’s Service Desk survive and even thrive?

    Please join Julie Mohr and Mark Galligan in an open presentation and discussion of how Service Desk’s are rising to today’s business challenges.

    Topics of conversation:
    - Today’s IT Service market place
    - Open for Business
    - Being passionate about Service Desk services (‘cause the sane ones quit)
    - Your IT Store Front – (Self Service)
    - Investing in technology simplification
    - Recursive issues
    - Share your experiences

    About Julie and Mark
    Julie is passionate about service & support management providing imaginative insight & dynamic leadership to transform service & support organizations into best practice, customer-focused environments. She is an expert instructor, a certified Helpdesk Director and certified ITIL® Service Manager/Expert. Julie is the author of Mapping Support Processes: Blueprint for Success, The Help Desk Audit: Blueprint for Success, The Help Desk Toolkit: Companion CD & The Help Desk Dictionary.

    Mark is a dedicated IT professional and is passionate about improving IT operations and the services it offers. He has over 25 years of leadership, management and technology experience improving technology operations, IT services and customer satisfaction while reducing operating expense for Fortune 500 companies. Mark is an active member of the Information Technology Service Management Forum and the Help Desk Institute, and is currently serving as the communication chair for both organizations local chapters.
  • Data Encryption and Computer Hard Drives Recorded: Jan 12 2012 25 mins
    Andrew Blyth, Head of Information Security Research Group, University of Glamorgan
    In this talk we will discuss the role that data encryption plays on a computer hard-drive and in particular the impact that this has on the ability to perform computer forensics.
  • I am a Luddite, So Is My Wife: How Consumeration Fits In Your Desktop Strategy Recorded: Nov 10 2011 40 mins
    Andrew Wood, Consultant, The Virtualization Practice
    The PC has been a device that has been adopted by both the consumer and corporate markets - but is it now dead? As CTOs look to plan for the next generation how do, and must they deliver services to accommodate generation Y's demand for tablet and smartphone connectivity? Must traditional PC deployments be replaced with virtualised desktops and applications hosted in the cloud?

    How does each desktop virtualisation technology fit into an enterprise desktop strategy - and is there a single vendor that offers a complete and wholly encompassing solution? In order to help you make a decision - what factors do you need to consider for your users and application estate.
  • Performance Management for Desktop Virtualization and Terminal Services Recorded: Sep 8 2011 37 mins
    Andrew Wood, Desktop Superhero Alliance
    VDI has created new hope for broadening the appeal of a centralized desktop/application delivery approach, but it is liable to fall prey to the issues that have always held back Server Based Computing – delivering and maintaining a service that delivers as good as or better than a ‘personal computer’ is difficult in a shared resource environment

    What are the requirements for applications performance and end-user experience management in Terminal Services/RDS and desktop Virtualization Environments? As organisations look to move to these solutions. Is the old problem of measuring applications performance and end user experience for Citrix XenApp (MetaFrame/Presentation Server), and Microsoft Remote Desktop Services/Terminal Services related to the new problem of measuring applications performance and end user experience for desktop virtualization solutions from vendors such as Citrix, Ericom, Quest and VMware?
  • The Mobile Enterprise: Cloud Hosted Virtual Desktops Recorded: Jul 12 2011 43 mins
    David Grant, VP of Marketing, Desktone
    The mobile enterprise requires mobile desktops. By moving virtual desktops to a cloud-hosted service model, instead of an internally deployed and managed data center, companies can realize all the promised benefits of desktop virtualization—centralized management, improved data security and simplified deployment— without the costs or hassles of onsite virtual desktop infrastructure (VDI). Now users can use any mobile device they desire such as iPads, Android Tablets, or Google Chromebooks and still have complete access to their Windows desktop.

    This webinar will explore the reasons for changing traditional desktop computing strategies, why cloud-hosted virtual desktops are a compelling solution for many businesses, and how to leverage cloud-hosted desktops for Windows 7 migrations, mobile and departmental workers, and disaster recovery scenarios.
Improving skills and awareness for desktop support
Subscribe to this channel to find out current trends and continuing education for desktop support professionals. This channel will include webinars on usage management, diagnostics, monitoring, mobile devices, cloud computing and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Next Generation Desktop
  • Live at: Aug 25 2010 10:00 am
  • Presented by: Sarah Mannion, Optimized Desktop Specialist, Microsoft
  • From:
Your email has been sent.
or close