HOME

TheInfoList



OR:

{{Unreferenced, date=September 2007 A boot image control strategy is a common way to reduce
total cost of ownership Total cost of ownership (TCO) is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or service. It is a management accounting concept that can be used in full cost accounting or even ecolo ...
in organizations with large numbers of similar computers being used by users with common needs, e.g. a large corporation or government agency. This is considered part of
enterprise application integration Enterprise application integration (EAI) is the use of software and computer systems' architectural principles to integrate a set of enterprise computer applications. Overview Enterprise application integration is an integration framework compo ...
in larger shops that use that term since applications are part of the boot image, and modify the boot image, in most desktop OS.
Windows Vista Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
includes tools for boot image control, displacing third-party tools.
Mac OS Two major famlies of Mac operating systems were developed by Apple Inc. In 1984, Apple debuted the operating system that is now known as the "Classic" Mac OS with its release of the original Macintosh System Software. The system, rebranded " ...
has always had more flexible handling of boot drives, simplifying control and reducing the need to move boot images around between drives. Increasingly, boot image control is a network operating system function.


Economics

Very often a large computer vendor is required to explain in a bid in response to an RFP how they intend to simplify the purchaser's boot image control problems and the attendant service costs: The
total cost of ownership Total cost of ownership (TCO) is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or service. It is a management accounting concept that can be used in full cost accounting or even ecolo ...
correlates strongly to the total number of different images, not the total number of computers, so this is a major cost concern. Three basic strategies are commonly advised: *a single base boot image for each type of computer in the organization, customized by each user with no central control *a
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in ...
strategy where the smallest possible boot image is used, typically one that does not include a full
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
*a departmental boot image strategy where a base boot image is customized with applications to fit each group of users, but, the users do not have the ability to upgrade or alter the configurations


Thin client strategies

Organizations that do not closely track, control and set common standards for, acquisition of new computer hardware, typically can only practice a
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in ...
strategy. Which strategy will reduce total cost of operations the most depends on several factors: * whether the capabilities of a full
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
are required, or just those of a
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in ...
* whether applications with inflexible
software license A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software. Under United States copyright law, all software is copyright protected, in both sour ...
s are in use that must be paid for not only if they are used, but even if they are only installed * whether poorly-behaved applications that interact badly are in use * LAN or
removable disk Expandable storage is a form of computer storage that is designed to be inserted and removed from a system. Some forms of removable media, such as optical discs, require a reader to be installed in the computer, while others, such as USB flash dri ...
limits that make it easy or difficult to do re-imaging on demand


More complex departmental boot images

While the departmental boot image strategy seems to be the most flexible, the complexity of creating and managing several large boot images, and determining when a department needs to upgrade its applications, can easily outweigh these. Especially if users object and try to subvert the discipline of waiting for a regular boot turn to upgrade all machines at once. If each user is allowed to do this on their own, then, the discipline soon degrades into effectively a bunch of home computer whose issues are not really diagnosable nor comparable to each other. In which situation
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in ...
s may become the only practical answer: Many organizations use thin clients for applications which require high security, involve unreliable users or repurpose older machines for continued use. This much simplifies boot image control by facilitating centralized management of computers, and has many advantages: * since servers manage clients and the local environment is highly restricted (and often stateless), providing protection from
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
, support costs are reduced * since no application data typically resides on the thin client (it is entirely rendered), it is securely stored on network drives upon its creation * since disk, application memory, and processors are minimal in thin client hardware, they go obsolete slowly and cost much less * since they are not as useful as ordinary computers they are of less interest to thieves While control of the images is simpler, there are disadvantages. Thin clients: * require more network bandwidth * require more host computer power and must typically be served by much larger host boxes * typically cannot run arbitrary Windows, Linux or Mac software * perform poorly in multimedia applications or games - an advantage in many business environments Many organizations try to gain the advantages of thin clients without the disadvantages by treating many very standard machines as if they were terminals, but with very much greater capabilities. As they buy new computers, they put the demanding applications on those.


Boot turns and re-imaging

Administrators perform a regular (often bi-annual) boot turn that re-images many older, off-spec machines at once so that new hardware can be deployed for higher-end use. This procedure is called cascading: the oldest hardware is repurposed with simpler software to let it continue in use for some less demanding or more access-controlled applications, but subjects it to much more rigorous control to minimize the number of images. The
total cost of operations Total cost of ownership (TCO) is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or service. It is a management accounting concept that can be used in full cost accounting or even eco ...
correlates strongly to the total number of different images, not the total number of computers. To minimize the number of images requires additional discipline: * Specify the computer hardware to minimize unneeded machine diversity and minimize the resultant number of boot images. * Upgrade new machine specifications at low additional cost so they remain useful longer, reduce the incursion of off-spec machines later in the life-cycle, improve standardization, reduce support costs, minimize e-waste with longer lifecycles * Organize the network so that boot images can be efficiently supported and swapped, independent of data. ** Data must not be dependent on boot devices - use networks to store data on secure servers so that
data recovery In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The da ...
is literally never required even in a
disaster recovery Disaster recovery is the process of maintaining or reestablishing vital infrastructure and systems following a natural or human-induced disaster, such as a storm or battle.It employs policies, tools, and procedures. Disaster recovery focuses on ...
situation * Confirm, by hardware
acceptance testing In engineering and its various subdisciplines, acceptance testing is a test conducted to determine if the requirements of a specification or contract are met. It may involve chemical tests, physical tests, or performance tests. In systems e ...
on each new machine, that it runs the standard boot image ** Any machine that does not must be considered to be dead on arrival * A strict installation regime to ensure that only supportable standardized boot images are used and any machines that connect to the network for the first time with a nonstandard image are detected and rejected * Diagnostics and
troubleshooting Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process ope ...
so that help desk and other technical support staff can employ standardized tests to identify the source of problems: boot, software, or hardware ** Ideally, backups on hand of the boot image, or even spare identical computers that can quickly be booted up from the boot device in question to determine if it is a hard disk, computer or software/image problem. * Common desktop system recovery tools and procedures for failed desktop units, typically using backup copies of a boot image created with utilities * Rapid network recovery procedures that replace a backup boot image in a few minutes or less, with considerable cost savings over using
DVD The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kin ...
, CD or
floppy disk A floppy disk or floppy diskette (casually referred to as a floppy, or a diskette) is an obsolescent type of disk storage composed of a thin and flexible disk of a magnetic storage medium in a square or nearly square plastic enclosure lined ...
media which require human attention * Ensure
computer accessibility Computer accessibility (also known as accessible computing) refers to the accessibility of a computer system to all people, regardless of disability type or severity of impairment. The term ''accessibility'' is most often used in reference to sp ...
features are on every departmental boot image that require them, or in the
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in ...
hardware and software itself, to accommodate these users in a manner that is ubiquitous and cost effective. * Support
remote work Remote work, also called work from home (WFH), work from anywhere, telework, remote job, mobile work, and distance work is an employment arrangement in which employees do not commute to a central place of work, such as an office building, w ...
and secure off-site system access procedures in the standard boot image ** Encourage remote workers to buy identical machines to those in the office or use thin clients exclusively * Facilitate worker transfer by changing boots or authorizations instead of moving the actual computer * Install
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in ...
s on all off-spec machines to eliminate the need for special boot images for them, and subsequent diagnostic problems and data risks.


Open configuration and semantic services

Desktop computing is increasingly relying on web services, making the thin client approach more viable. Departmental boot images may remain but simply instantiate part of a semantic service-oriented architecture, especially in larger organizations. A service component architecture would further simplify the implementation of control mechanisms, especially if a single application language like
Java Java (; id, Jawa, ; jv, ꦗꦮ; su, ) is one of the Greater Sunda Islands in Indonesia. It is bordered by the Indian Ocean to the south and the Java Sea to the north. With a population of 151.6 million people, Java is the world's mo ...
was used for all custom applications in the enterprise. More importantly, shift to
software as a service Software as a service (SaaS ) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as "on-demand software" and Web-based/Web-hosted software. SaaS is co ...
by most large vendors means that applications are not tied to machines, so the number of variant boot images required (with the applications installed) is reduced. Other
open configuration Open or OPEN may refer to: Music * Open (band), Australian pop/rock band * The Open (band), English indie rock band * Open (Blues Image album), ''Open'' (Blues Image album), 1969 * Open (Gotthard album), ''Open'' (Gotthard album), 1999 * Open (C ...
technologies such as Bitfrost,
OpenID OpenID is an open standard and decentralized authentication protocol promoted by the non-profit OpenID Foundation. It allows users to be authenticated by co-operating sites (known as relying parties, or RP) using a third-party identity provid ...
and even
XMPP Extensible Messaging and Presence Protocol (XMPP, originally named Jabber) is an open communication protocol designed for instant messaging (IM), presence information, and contact list maintenance. Based on XML (Extensible Markup Language), ...
would also simplify configuration of boot images, as authentication would no longer be dealt with on the desktop/laptop device.


Vendor support

Large system vendors increasingly provide DVDs with the boot image standard for the machine as shipped to the customer, which usually includes tools to diagnose changes to the machine and download drivers. Booting Disk images Enterprise application integration