Solved

hotdesking policies

Posted on 2011-09-13
2
269 Views
Last Modified: 2012-05-12
we have been asked to review how prepared we would be for "hotdesking" and moving to thin client infrastructure as opposed one machine per employee.

In terms of moving to hot desking, what technical IT policies need to be considered on the technology itself? Even dow to things such as can users lock a machine and go to a meeting thus tying up this shared machine from others.
0
Comment
Question by:pma111
2 Comments
 
LVL 78

Accepted Solution

by:
David Johnson, CD, MVP earned 300 total points
ID: 36533930
I use MDOP with user state virtualization http://technet.microsoft.com/en-us/windows/ff629664
0
 
LVL 25

Assisted Solution

by:Tony1044
Tony1044 earned 200 total points
ID: 36534469
Well the thing with hotdesking that I've noticed is that people come in to an office in a morning and sit at a free desk. They are then at that desk until they go home (mostly at the end of that day).

So that machine and desk become unavailable for the entire duration.

That means you have to do some calculations of how much concurrency you would need - do 100% of the staff need to come in every day and just move around (you'll find they tend to gather at the same desks anyway)? Or would it be closer to say 80%?

Depending on your requirements, and numbers of users, you may want to investigate using RDS in 2008 R2 as opposed to say Citrix or 2X. This can give you pretty much the same solutions (publishing applications or desktops, publishing over the web etc).

In terms of moving to a thin-client based estate - there are many benefits to this: If they're windows based devices, they usually have a write filter that prevents anything being saved locally. They're much lower power and smaller than desktops and as a result, costs of running come down and desk space is reclaimed.

But then why stop there? You could introduce a bring your own PC infrastructure, where you allowed them to buy and use their own laptop (you can get low-end laptops for less than mid-range thin clients now).

Each scenario is unique but there are usually common factors to consider.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now