HOME

TheInfoList



OR:

{{Unreferenced, date=September 2007 A boot image control strategy is a common way to reduce
total cost of ownership Total cost of ownership (TCO) is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or service. It is a management accounting concept that can be used in full cost accounting or even ecolog ...
in organizations with large numbers of similar computers being used by users with common needs, e.g. a large corporation or government agency. This is considered part of
enterprise application integration Enterprise application integration (EAI) is the use of software and computer systems' architectural principles to integrate a set of enterprise computer applications. Overview Enterprise application integration is an integration framework comp ...
in larger shops that use that term since applications are part of the boot image, and modify the boot image, in most desktop OS.
Windows Vista Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
includes tools for boot image control, displacing third-party tools.
Mac OS Two major famlies of Mac operating systems were developed by Apple Inc. In 1984, Apple debuted the operating system that is now known as the "Classic" Mac OS with its release of the original Macintosh System Software. The system, rebranded "M ...
has always had more flexible handling of boot drives, simplifying control and reducing the need to move boot images around between drives. Increasingly, boot image control is a network operating system function.


Economics

Very often a large computer vendor is required to explain in a bid in response to an RFP how they intend to simplify the purchaser's boot image control problems and the attendant service costs: The
total cost of ownership Total cost of ownership (TCO) is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or service. It is a management accounting concept that can be used in full cost accounting or even ecolog ...
correlates strongly to the total number of different images, not the total number of computers, so this is a major cost concern. Three basic strategies are commonly advised: *a single base
boot image A boot image is a type of disk image (a computer file containing the complete contents and structure of a storage medium). When it is transferred onto a boot device it allows the associated hardware to boot. The ''boot image'' usually includes t ...
for each type of computer in the organization, customized by each user with no central control *a
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in th ...
strategy where the smallest possible
boot image A boot image is a type of disk image (a computer file containing the complete contents and structure of a storage medium). When it is transferred onto a boot device it allows the associated hardware to boot. The ''boot image'' usually includes t ...
is used, typically one that does not include a full
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also i ...
*a departmental boot image strategy where a base
boot image A boot image is a type of disk image (a computer file containing the complete contents and structure of a storage medium). When it is transferred onto a boot device it allows the associated hardware to boot. The ''boot image'' usually includes t ...
is customized with applications to fit each group of users, but, the users do not have the ability to upgrade or alter the configurations


Thin client strategies

Organizations that do not closely track, control and set common standards for, acquisition of new computer hardware, typically can only practice a
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in th ...
strategy. Which strategy will reduce total cost of operations the most depends on several factors: * whether the capabilities of a full
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also i ...
are required, or just those of a
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in th ...
* whether applications with inflexible
software license A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software. Under United States copyright law, all software is copyright protected, in both source ...
s are in use that must be paid for not only if they are used, but even if they are only installed * whether poorly-behaved applications that interact badly are in use * LAN or removable disk limits that make it easy or difficult to do re-imaging on demand


More complex departmental boot images

While the departmental boot image strategy seems to be the most flexible, the complexity of creating and managing several large boot images, and determining when a department needs to upgrade its applications, can easily outweigh these. Especially if users object and try to subvert the discipline of waiting for a regular boot turn to upgrade all machines at once. If each user is allowed to do this on their own, then, the discipline soon degrades into effectively a bunch of home computer whose issues are not really diagnosable nor comparable to each other. In which situation
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in th ...
s may become the only practical answer: Many organizations use thin clients for applications which require high security, involve unreliable users or repurpose older machines for continued use. This much simplifies boot image control by facilitating centralized management of computers, and has many advantages: * since servers manage clients and the local environment is highly restricted (and often stateless), providing protection from malware, support costs are reduced * since no application data typically resides on the thin client (it is entirely rendered), it is securely stored on network drives upon its creation * since disk, application memory, and processors are minimal in thin client hardware, they go obsolete slowly and cost much less * since they are not as useful as ordinary computers they are of less interest to thieves While control of the images is simpler, there are disadvantages. Thin clients: * require more network
bandwidth Bandwidth commonly refers to: * Bandwidth (signal processing) or ''analog bandwidth'', ''frequency bandwidth'', or ''radio bandwidth'', a measure of the width of a frequency range * Bandwidth (computing), the rate of data transfer, bit rate or thr ...
* require more host computer power and must typically be served by much larger host boxes * typically cannot run arbitrary Windows, Linux or Mac software * perform poorly in multimedia applications or games - an advantage in many business environments Many organizations try to gain the advantages of thin clients without the disadvantages by treating many very standard machines as if they were terminals, but with very much greater capabilities. As they buy new computers, they put the demanding applications on those.


Boot turns and re-imaging

Administrators perform a regular (often bi-annual) boot turn that re-images many older, off-spec machines at once so that new hardware can be deployed for higher-end use. This procedure is called cascading: the oldest hardware is repurposed with simpler software to let it continue in use for some less demanding or more access-controlled applications, but subjects it to much more rigorous control to minimize the number of images. The total cost of operations correlates strongly to the total number of different images, not the total number of computers. To minimize the number of images requires additional discipline: * Specify the computer hardware to minimize unneeded machine diversity and minimize the resultant number of boot images. * Upgrade new machine specifications at low additional cost so they remain useful longer, reduce the incursion of off-spec machines later in the life-cycle, improve standardization, reduce support costs, minimize e-waste with longer lifecycles * Organize the network so that boot images can be efficiently supported and swapped, independent of data. ** Data must not be dependent on
boot device In computing, booting is the process of starting a computer as initiated via hardware such as a button or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so so ...
s - use networks to store data on secure servers so that
data recovery In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The dat ...
is literally never required even in a disaster recovery situation * Confirm, by hardware acceptance testing on each new machine, that it runs the standard boot image ** Any machine that does not must be considered to be dead on arrival * A strict installation regime to ensure that only supportable standardized
boot image A boot image is a type of disk image (a computer file containing the complete contents and structure of a storage medium). When it is transferred onto a boot device it allows the associated hardware to boot. The ''boot image'' usually includes t ...
s are used and any machines that connect to the network for the first time with a nonstandard image are detected and rejected * Diagnostics and
troubleshooting Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process op ...
so that help desk and other technical support staff can employ standardized tests to identify the source of problems: boot, software, or hardware ** Ideally, backups on hand of the
boot image A boot image is a type of disk image (a computer file containing the complete contents and structure of a storage medium). When it is transferred onto a boot device it allows the associated hardware to boot. The ''boot image'' usually includes t ...
, or even spare identical computers that can quickly be booted up from the
boot device In computing, booting is the process of starting a computer as initiated via hardware such as a button or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so so ...
in question to determine if it is a hard disk, computer or software/image problem. * Common desktop system recovery tools and procedures for failed desktop units, typically using backup copies of a boot image created with utilities * Rapid network recovery procedures that replace a backup boot image in a few minutes or less, with considerable cost savings over using
DVD The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kind ...
, CD or floppy disk media which require human attention * Ensure
computer accessibility Computer accessibility (also known as accessible computing) refers to the accessibility of a computer system to all people, regardless of disability type or severity of impairment. The term ''accessibility'' is most often used in reference to spe ...
features are on every departmental boot image that require them, or in the
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in th ...
hardware and software itself, to accommodate these users in a manner that is ubiquitous and cost effective. * Support remote work and secure off-site system access procedures in the standard boot image ** Encourage remote workers to buy identical machines to those in the office or use thin clients exclusively * Facilitate worker transfer by changing boots or authorizations instead of moving the actual computer * Install
thin client In computer networking, a thin client is a simple (low-performance) computer that has been optimized for establishing a remote connection with a server-based computing environment. They are sometimes known as ''network computers'', or in th ...
s on all off-spec machines to eliminate the need for special boot images for them, and subsequent diagnostic problems and data risks.


Open configuration and semantic services

Desktop computing is increasingly relying on web services, making the thin client approach more viable. Departmental boot images may remain but simply instantiate part of a semantic service-oriented architecture, especially in larger organizations. A
service component architecture Service Component Architecture (SCA) is a software technology designed to provide a model for applications that follow service-oriented architecture principles. The technology, created by major software vendors, including IBM, Oracle Corporatio ...
would further simplify the implementation of control mechanisms, especially if a single application language like
Java Java (; id, Jawa, ; jv, ꦗꦮ; su, ) is one of the Greater Sunda Islands in Indonesia. It is bordered by the Indian Ocean to the south and the Java Sea to the north. With a population of 151.6 million people, Java is the world's mos ...
was used for all custom applications in the enterprise. More importantly, shift to
software as a service Software as a service (SaaS ) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as "on-demand software" and Web-based/Web-hosted software. SaaS is con ...
by most large vendors means that applications are not tied to machines, so the number of variant boot images required (with the applications installed) is reduced. Other open configuration technologies such as Bitfrost,
OpenID OpenID is an open standard and decentralized authentication protocol promoted by the non-profit OpenID Foundation. It allows users to be authenticated by co-operating sites (known as relying parties, or RP) using a third-party identity provider ...
and even
XMPP Extensible Messaging and Presence Protocol (XMPP, originally named Jabber) is an open communication protocol designed for instant messaging (IM), presence information, and contact list maintenance. Based on XML (Extensible Markup Language), i ...
would also simplify configuration of boot images, as authentication would no longer be dealt with on the desktop/laptop device.


Vendor support

Large system vendors increasingly provide DVDs with the boot image standard for the machine as shipped to the customer, which usually includes tools to diagnose changes to the machine and download drivers. Booting Disk images Enterprise application integration