Today the term "thin-client computing" defines a network-based approach to information processing that comprises both hardware and software elements. Together, thin-client hardware and software translate to simpler, more cost-effective access to information.
A thin-client PC is a "box" coupled with software to make it look and function like a standard thin-client. Thin-client PCs provide all the advantages of thin-clients such as ease-of-management, reliability and increased control, while avoiding the known limitations associated with typical thin-client devices.
The thin-client PC solution is secure by definition and can support environments needing the locked down desktop control, while maintaining the flexibility of a PC for local application and I/O support.
It is perfect for organisations requiring a full-function local Internet browser, local applications and access to the proven benefits of server-based computing such as greater control, scalability and cost containment. IT teams also find this solution ideal for terminal replacement or kiosk projects, which can be implemented prior to investing in Microsoft Terminal Services or Citrix MetaFrame.
Thin-client incognito
Although not inherently "thin-client", PCs can serve as thin-client devices via a special piece of software - for example, Citrix Systems` Independent Computing Architecture, or Microsoft`s Remote Desktop Protocol - that sits on the PC.
The primary difference between a true thin-client (in which all applications reside on the server) and a PC that is used as a thin-client is the PC`s ability to maintain some storage and applications at the local level. This is not possible with thin-clients.
Sean Owen-Jones, HP spokesperson, maintains that although the thin-client solution originally had a slow start, it will become a technology to be reckoned with.
He adds that corporates are interested in going the thin-client route, but most are concerned about implementation times. Another issue is that some companies expect immediate savings, but need a two- to three-year analysis to realise they can manage up to 20% to 30% savings on total cost of ownership, labour and support costs.
Almost all vendors and system integrators seem to agree that cost savings are significant only on a large scale - that on smaller implementations, savings can be quite insignificant.
Muggie van Staden, MD of Obsidian, echoes Owen-Jones`s sentiments, adding that there are issues of compatibility with groupware on the Linux and open source side, but that it is better on applications such as Open Office.
Access strategies
A company needs to take a two- to three-year analysis.
Sean Owen-Jones, spokesperson, HP
Because nowadays connectivity to corporate back-ends has evolved enough to include devices besides PCs and thin-client boxes, Citrix Systems says the whole process and technology builds a case for every organisation to develop an access strategy.
The company`s country manager, Chris Norton, says: "Access is about connecting people to information. In other words: about connecting information demand to information supply. Information demand is complex due to a variety of users, roles, client devices, locations and network connectivity. Information supply is complex due to a variety of application, platforms and vendors."
In an attempt to map supply with demand, case by case and need by need, many organisations have stitched together a series of "if-then" access tactics: If you`re working in the office and you access an ERP application, then... do it one way. If you`re working from home, then... access the application another way, and so on.
This list of "if-then" tactics pertains to one application. Consider the permutations for the dozens of applications and corresponding uses in most companies. As these "if-then" access tactics proliferate, further magnifying the computing complexity of the enterprise, they limit IT`s flexibility and responsiveness, lead to access situations that fall short of users` expectations, compromise information security, and make systems management far more cumbersome and costly.
IT must replace these "if-then" access tactics of the past with a holistic access strategy for the future. CIOs need to look at applications holistically, as part of an overall system, a larger environment of information supply and demand. Within this framework, they need to create and execute an overall access strategy that addresses the heterogeneity of all applications and all access scenarios, says Norton.
According to Citrix, an access strategy can transform an organisation into an on-demand enterprise by guaranteeing managed, secure access to any information, wherever it resides, for any entitled individual or group, any time, using any device, over any connection. The key is to develop an access strategy that preserves past and future choice, and which has built-in change and technology evolution, making infrastructure flexible and IT an enabler of business initiatives.
"Citrix is now delivering our third-generation of access infrastructure. Each generation has subsumed the previous capabilities into the new generation. For example, we`re about much more than just Remote Windows - and the same can be said about the fact that we are still about server-based, or centralised, computing," Norton says.
Manoj Bhoola, Microsoft SA`s group manager (Server and Tools), says in today`s business environment, thin-client technology is more suited to the needs of routine workers than to those of more creative employees. For big business, he says, it is great for purposes such as device management, which results in reduced spend on support and management of systems.
He explains that in future, companies large and small will not opt for one specific solution, but will rather implement hybrid solutions that will allow their users to switch between a robust 32-bit client and a thin client, depending on the task at hand.
On the point of which system would be preferable and more secure, everyone seems to agree that the decision depends on the end-user`s needs. One school of thought might argue that a centralised way of working gives thin-clients an added advantage, but then again, having a single point of failure might not be so desirable.
Terminal forecast
<B>PC plays thin-client</B>
Although the technology to allow a PC to behave as a thin-client is not new, current and future end-users have a number of concerns, including:
o Is the technology developed enough to meet today`s business needs?
o Do corporates understand the cost-saving potential that the solution provides?
o Do they understand the benefits associated with better network security?
o Does the solution provide for better security and disaster recovery capabilities?
o Does it reduce downtime?
Gartner Dataquest predicts that the worldwide thin-client hardware market will grow between 20% and 25% per year through 2006. This growth rate will gradually slow in 2007 and beyond. Thin-client shipments will reach 2.9 million units by 2008.
One of the drivers of this growth will be the replacement of ageing ASCII-based machines with thin-client terminals, particularly in North America and Western Europe. Gartner Dataquest estimates that Windows-based, thin-client terminals will replace the approximately 30 million ASCII-based terminals in use worldwide. Since ASCII-based terminals tend to have long product lifespans, it will take the next several years for this replacement to occur. Once it does, thin-client terminal shipment growth will slow.
In contrast, the replacement of traditional desktop PCs with thin-client terminals will not be a major driver for thin-client terminal growth. When an organisation decides to switch from a traditional PC architecture to a thin-client architecture, it locks down most user desktops and uses them as thin-client terminals.
But using PCs as thin-clients doesn`t fully deliver all the benefits of a true thin-client terminal environment.
The other growth driver would be a growing interest in data security issues. Since a service-based computing (SBC) environment provides more security and control for the data and its IT management, many security-conscious customers have become interested in SBC deployment.
Thin-client software market
Gartner Dataquest estimates that approximately 4.1 million new thin-client software licences were shipped to the worldwide market in 2003, a 20% increase compared with 2002.
The new-licence shipments grew at a slightly faster rate than thin-client terminal shipments.
Gartner projects that thin-client terminal shipments will grow at a faster pace through 2006, driven mainly by ASCII-based terminal replacement. When these are replaced, the market growth will slow. Then, the market`s growth will be led by new shipments in regions where the thin-client terminal market is less saturated.
Even though thin-client terminal growth will slow, overall SBC deployment will grow consistently via the deployment of desktop PCs that are dedicated as thin-client architecture.
Click here to see the worldwide thin-client shipments and growth graph.
* Article first published on brainstorm.itweb.co.za
Share