Expression and Purification of the HIV Type 1 Rev Protein Produced in Escherichia coli and Its Use...

27
End User Computing Evolving to better meet customer needs

Transcript of Expression and Purification of the HIV Type 1 Rev Protein Produced in Escherichia coli and Its Use...

End User Computing

Evolving to better meet customer needs

End User Computing

#1 Consumerization of IT will make the biggest impact on enterprise IT in the next decade (Gartner 1)

Percent growth in the number of devices IT is expected to support by 2012 (IDC 2)

66% In 2011, the first students to grow up with the Internet will graduate from college.

2011

Market size of media tablet in units by 2014. (Gartner 3) 208M

2 Confidential

1,400 The minutes per month the average Facebook user spends on the site

63M Number of employees who will telecommute by 2016. Equals 43% of the American workforce.

77% 28% Of large businesses said securing corporate data on mobile devices was their most important security objective.1

Users who already use their personal devices while at work to access social networking sites such as Facebook. 6

The landscape is changing

Technology End Users

End User Computing 3 Confidential

Different users with very different needs

End User Computing

Changing computing dynamics…

4 Confidential

End User Computing 5 Confidential

Resulting in a computing transformation

Always on, anywhere Limited connectivity

Primary device is fixed

IT chooses the PC

Email or IM (one-to-one) communications

Primary device is mobile

Devices that reflect “me”

Freedom to participate (one to many)

Moving from… …to

One device Multi-device ecosystem

Management and security inside the firewall

Management and security inside the firewall

Boundary-less security and manageability

End User Computing 6 Confidential

With change comes organizational challenges:

• Meet the needs of end users

• Cultural changes

• Determine what devices best suit end user needs

• Implement more flexible work schedules, KPIs

• Talent acquisition tied to IT tools and devices for workforce

• Device, OS and application integration and management

• Secure data from data center to device

• New virtualization & cloud computing architectures

• Identify and manage all end points

• Automating device lifecycle management

Managing technology Managing people

End User Computing

The status quo is no longer sustainable.

7 Confidential

End User Computing

End user computing is no longer just about the device or technology…

8 Confidential

It’s about the overall experience: • Enabling end users to do more without making IT sacrifices

• Making data access pervasive anytime, anywhere, on any device

• Developing a deeper understanding of end users, roles and needs

It’s about maximizing end user productivity and IT control:

9 Confidential

• Making users more productive than ever by mapping to technology interaction, data access and device usage

• Empowering IT professionals with tools to more efficiently deploy, manage, secure and support their changing workforce

It’s about meeting end user needs on their terms: • Forming in-depth insights into technology

usage and interaction

• Delivering mission-driven and user-focused devices and solutions

• Designing the experience and enhancing it with professional tools that have consumer appeal

10 Confidential End User Computing

End User Computing

Dell End User Computing

11 Confidential

• Customer inspired design across a complete portfolio of systems, services and solutions

• Seamless experience across multiple devices, operating systems and applications

• Tailored solutions optimized for management, security and productivity

is about:

End User Computing

Dell End User Computing

12 Confidential

delivering open, capable and affordable solutions for an evolving workforce.

is about:

13 Confidential

• Improve data security for a mobile workforce

• Redirect IT’s role to innovation

• Simplify IT deployment and management

• Improve IT process and policy adherence

• Improve productivity

across the organization

• Improve employee satisfaction

• Improve talent acquisition & retention

• Increase brand awareness

CEO/Organization CIO and IT Staff

• Attractive/flexible work environment

• Improved productivity

• Broader device choice and OS flexibility

• Improved ability to innovate & collaborate

Employees

Simplify technology and people management, improve productivity

End User Computing

Mobility & Collaboration

Management

Desktop Virtualization

Systems and services designed & certified for optimal mobility and collaboration experience to maximize productivity and provide the best solutions for your workforce.

Enhance workforce productivity, improve security, and streamlining desktop management with simplified, preconfigured solution stacks and integrated virtual desktops

KACE Appliances and management utilities designed to automate processes, centralize management, and reduce support costs

Cloud, Service and Support

Flexible deployment, licensing and image management, global asset recovery and support

Security The most comprehensive and flexible data protection with Dell Data Protection|Encryption

14 Confidential

Delivering a Solution Continuum •Maximizing end user productivity and IT Control

•Optimized to business & end-user workload needs •End-to-end capabilities and pervasive across device portfolio

End User Computing

Dell Desktop Virtualization Solutions Minimize risk while empowering end users

15 Confidential

Integrated solution

Flexible delivery models

Managed Cloud Managed Customer

Custom

Best practices implementation

Open Standards

• Pre-configured, pre-tested data center architecture

• Reduces deployment time

• Removes the burden of design and configuration – delivering a right-sized, scalable solution

• Thousands of hours of integration testing

• Same infrastructure, on-site or through the cloud

• Includes Implementation Services and ProSupport

You manage Dell manages

Feasibility Discovery Blueprint

Assessment

Design &

Implement

Operate &

Manage

End User Computing

Dell Enterprise Mobility Solutions Boost user productivity and secure your data and devices

Connect mobile devices to enterprise resources, enabling IT to remotely manage and secure.

16 Confidential

Mobile Device Management

Telecom Expense Management

Custom Application Development

Application Management

Security & Compliance

Develop an end-to-end best practice approach to management of voice, data, wireless and VOIP spend with Telecom Lifecycle Management.

Adapt quickly to today's fast-changing environment with rapid application development on newly emerging mobility devices like phones and tablets with multi-platform, multi-carrier enablement.

Deploy with Dell Mobility Application Platform (DMAP) and mobilize business applications across any user, device and location — on any network or platform.

Secure email solutions on both personal and corporate owned devices as well as virtualization for any screen secure access.

End User Computing 17 Confidential

Centralized management provides cost savings and a foundation for user protection

17

* Source: KACE Annual Customer Survey, November 2009

Centralized management can reduce support costs 42%

• Implement a KACE management appliance – 61%* report the appliance paid for itself in less than 3 months

• Have Dell do it for you with Dell Distributed Device Manager – helps reduce your TCO by up to 50%

• Do it yourself with a leading client management solution

Centralized Management

End User Computing

Dell Security Solutions Protect data no matter where it is

Powerful, ultra-flexible encryption

Physical

protection no matter where your

end user is

One of the most secure paths to

strong authentication

Integrated systems

and security management

• Encryption that doesn’t hinder IT

• Built for real IT environments

• Protects data for every user need

• Meets real business need

• Ecosystem of manageable authentication

• More secure credential processing

• Integrated solutions to meet your needs

• Lightweight yet comprehensive solution

• One console for asset, patch, software and security management

• Helping you delete, destroy or recover data

• Track systems for recovery

Delivered the way you want to deploy: SaaS, managed service or on-premise

18 Confidential

End User Computing

Dell Cloud (SaaS) Solutions Address high-impact IT problems

19 Confidential

Offload and automate manual, resource-intensive tasks such as: • email management • software license management • desktop management

Easy to Scale Quickly scale up or

down without additional costs (servers,

resources, time)

Rapid Deployment No army of consultants

to deploy services

Automatic Updates New capabilities added

automatically

Built-in High Availability

without the cost of purchasing/building

redundancy

No Complex VPN Needed

Updates occur in the background without employee assistance

End User Computing

We can do everything for you, on location or offsite

After we build it, we operate it for as long as you want us to

• We design and implement

• You run it

• We design it

• You build and operate

Tailored services Simplify delivery and maximize efficiency

Business Ready Configurations

Build & transfer

Build & operate

As-a-Service delivery

Dell Confidential 20

FLEXIBLE DELIVERY MODELS

+ Our comprehensive portfolio includes assessment and planning services to uncover the insights you need to empower your workforce as well as ProSupport for ongoing support.

+ With Dell’s consultative approach and open architecture, you can implement your strategy step by step, pay as you go, avoid a hit to capex, and add increased capabilities over time.

End User Computing

Commercial brands evolving with end user needs, enabling them to do more than ever before

Dell Confidential 21

Latitude & OptiPlex Dell Precision Vostro

Big Ideas for Small Business

Professional Class Laptops & Desktops

The Ultimate in Workstation Performance

XPS

Empower your passions

Driving enterprise efficiency and TCO. Elevating design. Redefining durable,

powerful, secure, manageable.

Worry-free business solutions

and services designed for small

business.

Artful blend of high performance

and purposeful design for consumers.

End User Computing

Latitude and OptiPlex Inspired Design Long-lasting durability, uncompromised reliability and flexible integration into your organization with environmentally conscious principles to respect our planet. Smart/Go-Anywhere Productivity Performance, versatility and collaboration features that that help end users be more productive than ever. Business-Class Control Efficient manageability, confident security, long-term stability and proven service and support for uncompromised IT control over your client systems. Integrated Solutions Tailored solutions for cost effective security, management, and productivity in next-generation end user computing environments.

Dell Confidential 22

End User Computing

Dell Precision Rock Solid Dependability Maximize uptime and efficiency with workstations that are designed and ISV certified for professional grade software.

Voracious Productivity ISV certified to create whenever and wherever you are with superb scalability and performance precisely tuned to your specific needs.

Harmonious Manageability Secure, manageable and serviceable workstations that seamlessly integrate into your environment.

End User Computing Dell Confidential 23

End User Computing

Vostro Enduring value for big ideas Delivering the right features and technology for small business. Vostro systems are easy to configure, simple to run and highly productive – all for a reasonable price. IT support that gets small business Dedicated support to small businesses without an IT staff. Vostro provides experts who understand the nature of small businesses and the technology they depend on. Reliable and secure Focused on protecting valuable data. Offering security solutions ranging from strong authentication to data protection services that are simple to use and require little or no maintenance.

Dell Confidential 24 End User Computing

End User Computing

XPS Tailored experiences Delivering superior experiences with no details overlooked. Meaningful and targeted performance with software and services that stand behind you. Thoughtful design Thoughtfully designed for performance and function. Every material was selected to enhance performance and create an object that the user can experience without boundary. Sleek and beautiful overall design is a side effect of careful performance driven construction. Uncompromised mobility We keep you up, running, and on the move. Thin with uncompromised power, keeping users connected anytime, anywhere.

Dell Confidential 25 End User Computing

End User Computing

Dell Tablets and Smartphones Inspired Design Designed for both personal and professional usage with consumer appeal and an easy-to-use, seamless experience across multiple devices. Go-Anywhere Productivity Dedicated to keeping end users connected with easy access to data and business applications anywhere/anytime. Integrated Solutions Focused on seamless integration within an IT environment with security, management, virtualization, and applications solutions.

Dell Confidential 26 End User Computing

End User Computing

Get started today.

Deploy end point devices (new and repurposed) that best meet individual usage needs of end users in your environment.

27 Confidential

Develop a 3 to 5 year strategic end user computing plan that increases productivity and cost savings:

1

2

3

4

5

Secure corporate data from data center to endpoint according to updated security policies.

Optimize the deployment and management of all end point devices.

Virtualize when/where it’s beneficial for your environment and end user based on your analysis of end user roles.

Implement pilot programs for the phased adoption of personally-owned devices into your environment where applicable.