Free Essay

Cs Case Study

In:

Submitted By aiveegatzz
Words 8990
Pages 36
NORTHWEST SAMAR STATE UNIVERSITY Graduate School and Training Academy Calbayog City

Course: Master of Science in Information Technology
Subject: Client Server Computing
Professor: Mr. Donald M. Patimo, MPM
Student: Riva A. Gatongay

CASE STUDIES IN THIN CLIENT ACCEPTANCE

The challenge facing the acceptance of Thin Clients is a combination of architectural design and integration strategy rather than a purely technical issue, and a careful selection of services to be offered over Thin Clients is essential to their acceptance.

I. INTRUDUCTION

It is generally accepted that in 1993 Tim Negris coined the phrase “Thin Client” in response to Larry Ellison’s request to differentiate the server centric model of Oracle from the desktop centric model prevalent at the time. Since then the technology has evolved from a concept to a reality with the introduction of a variety of hardware devices, network protocols and server centric virtualized environments. The Thin Client model offers users the ability to access centralized resources using full graphical desktops from remotely located, low cost, stateless devices. While there is sufficient literature in support of Thin Clients and their deployment, the strategies employed are not often well documented. To demonstrate the critical importance of how Thin Clients perform in relation to user acceptance this paper presents a series of case studies highlighting key points to be addressed in order to ensure a successful deployment.

II. BACKGROUND

a. Statement of the Problem

The aim of this research has been to identify a successful strategy for Thin Client acceptance within an educational institute. There is sufficient literature which discusses the benefits of Thin Client adoption, and while this was referenced it was not central to the aims of this research as the barrier to obtaining these benefits was seen to be acceptance of the technology. Over a four year period, three Thin Client case studies were run within the Dublin Institute of Technology with the explicit aim of determining the success factors in obtaining user satisfaction. The following data criteria were used to evaluate each case study in addition to referencing the Universal Theory of User Acceptance Testing
(UTUAT)

1) Login events on the Thin Clients.
2) Reservation of the Thin Client facility.
3) The cost of maintaining the service.

b. Facts surrounding the case

The history of Thin Clients is marked by a number of overly optimistic predictions that it was about to become the dominant model of desktop computing. In spite of this there have been a number of marked developments in this history along with those of desktop computing in general which are worth reviewing to set the context for examining the user acceptance of this technology. Thin Clients have established a role in desktop computing although not quite the dominant one initially predicted. These developments have usually been driven by increases in processing power (and reductions in the processor costs) in line with Moore’s law, but the improvements in bandwidth and storage capacity are having an increasing effect on desktop computing and on Thin Client computing driving the move towards more powerful lower cost desktops but also the possibilities of server virtualization and Thin Client computing with the ability to run Thin Clients over WANs. The first wave of computing was one where centralized mainframe computers provided the computing power as a shared resource which users accessed using dumb terminals which provided basic text based input and output and then limited graphics as they became graphics terminals. These mainframes were expensive to purchase and were administered by specialists in managed environments and mostly used for specific tasks such as performing scientific calculations and running highly specialized bespoke payroll systems. The next wave was that of personal computing, whereby users administered their own systems which provided a platform for their personal applications, such as games, word-processor, mail and personal data. Since then the personal computer has undergone a number of significant changes, but the one of most interest was the nature of the interface provided to the user which has grown into a rich Graphical User Interface where the Personal Computer became a gateway to the Internet with the Web browser evolving into a platform for delivery of rich media content, such as audio and video. This move from a mainframe centralized computing model to a PC distributed one resulted in a number of cost issues related to administration. This issue was of particular concern for corporate organizations, in relation to licensing, data security, maintenance and system upgrades. For these cost reasons and the potential for greater mobility for users, the use of Thin Clients is often put forward as a way to reduce costs using the centralized model of the Thin Client architecture. This also offers lower purchase costs and reduces the consumption of energy.

The challenge faced by Thin Client technology is to deliver on these lower costs and mobility, while continuing to provide a similarly rich GUI user experience to that provided by the desktop machine (a challenge helped by improved bandwidth, but latency is still often a limiting factor) and the flexibility with regard to applications they have on their desktop. Typically, current Thin Client systems have an application on a server (generally Windows or Linux) which encodes the data to be rendered into a remote display protocol. This encoded data is sent over a network to a Thin Client application running on a PC or a dedicated Thin Client device to be decoded and displayed. The Thin Client will send user input such as keystrokes to the application on the server. The key point is that the Thin Client does not run the code for the user's application, but only the code required to support the remote display protocol. While the term Thin Client was not used for dumb terminals attached to mainframes in the 1970's, the mainframe model shared many of the attributes of Thin Client computing. It was centralized, the mainframe ran the software application and held the data (or was attached to the data storage) and the terminal could be shared by users as it did not retain personal data or applications, but displayed content on the screen as sent to it by the mainframe. From a desktop point of view, the 1980's were dominated by the introduction and adoption of the Personal Computer. Other users requiring higher performance and graphics used Unix Workstations from companies like Apollo and Sun Microsystems. The X Window System was used on many Workstations and X terminals were developed as a display and input terminal and provided a lower cost alternative to a Unix Workstation, with the X terminal connecting to a central machine running an X display manager. As such, they shared some of the characteristics of a Thin Client system, although the X terminal ran an X Server making it more complicated than Thin Client devices. The 1990's saw the introduction of several remote display protocols, such as Citrix’s ICA Microsoft's RDP and AT&T's VNC for UNIX that took advantage of the increasing bandwidth available on a LAN to provide a remote desktop to users. Terminal Services was introduced as part of Windows NT4.0 in 1996 and it offered support for the Remote Desktop Protocol (RDP) allowing access to Windows applications running on the Server, giving users access to a desktop on the Server using an RDP client on their PC. RDP is now offered on a range of Windows platforms. Wyse and vendors such as Computing launched terminals, which didn't run the Windows operating system, but accessed Windows applications on a Windows Server using RDP, which is probably still the dominant role of dedicated hardware Thin Clients. Similarly VNC is available on many Linux and UNIX distributions and is commonly used to provide remote access to a user's desktop. These remote display protocols face increasing demands for more desktop functionality and richer media content, with ongoing work required in how, where and when display updates are encoded, compressed or cached. Newer remote display protocols such as THINC have been designed with the aim of improving these capabilities. In 1999, Sun Microsystems took the Thin Client model further with the SunRay, which was a simple network appliance, using its own remote display protocol called ALP. Unlike some of the other Thin Clients which ran their own operating system, SunRay emphasized its completely stateless nature. This stateless nature meant that no session information or data was held or even cached (not even fonts) on the appliance itself and enabled its session mobility feature, whereby a smart card was used to identify a user with a session so that with the smartcard the user could login from any SunRay connected to the session's server and receive the desktop as it was previously. Many of these existing players have since focused on improving their remote desktop protocols and support for multimedia or creating new hardware platforms. There have also been some newer arrivals like Pano Logic and Teradici who have developed specific client hardware to create “zero” clients, with supporting server virtualization to render the remote display protocols. Also, there are a number of managed virtual desktops hosted in a data centre now being offered. One of the drivers behind Thin Client Technology, particularly when combined with a dedicated hardware device, is to reduce the cost of the client by reducing the processing requirement to that of simply rendering content, but a second driver (and arguably more important one) is to gain a level of universality by simplifying the variations in the client side environment. This has been met in a number of new ways using Virtual Machine players and USB memory in Microsoft's research project “Desktop on a Keychain” (DOK) and also the Moka5 product, allowing the mobility (and security) benefits attributed to Thin Clients. This can be enhanced with the use of network storage to cache session information. It can be seen that Thin Clients have evolved along with other desktop computing approaches, often driven by the same factors of increasing processing power, storage capacity and bandwidth. However, newer trends that are emerging with regard to virtualization, internet and browser technologies, together with local storage, present new challenges and opportunities for Thin Client technology to win user acceptance. As Weiser said in 1999 in this new era, “hundreds or thousands of computers do our bidding. The relationship is the inverse of the mainframe era: the people get the air conditioning now, and the nice floors, and the computers live out in cyberspace and sit there waiting eagerly to do something for us”.

c. THE CASE FOR THIN CLIENTS

There are many stated benefits for Thin Clients all of which are well documented. While there is no single definitive list, potential system designers may have different aims when considering Thin Clients, these benefits should be clearly understood prior to embarking on any deployment and are discussed below.

Reduced cost of software maintenance

The administrative cost benefit of the Thin Client model, according to Jern is based on the simple observation that there are fewer desktop images to manage. With the combination of virtualization environments and Windows Terminal Service (WTS) systems it would not be uncommon for twenty five or more desktop environments to be supported from a single installation and configuration. This reduces the number of upgrades and customizations required for desktop images in computer laboratories where the aim is to provide a consistent service from all systems. Kissler and Hoyt remind us that the “creative use of Thin Client technology can decrease both management complexity and IT staff time.” In particular they chose Thin Client technology to reduce the complexity of managing a large number of kiosks and quick-access stations in their new thirty three million dollar library. They have also deployed Thin Client devices in a range of other roles throughout Valparaiso University in Indiana. Golick on the other hand suggests that the potential benefits of a Thin Client approach include the lower mean time to repair (MTTR) and lower distribution costs. It is interesting to note that he does suggest that the potential cost savings for hardware are a myth, but that administration savings still make a compelling case for using Thin Client technology.

Enhanced Security

Speer and Angelucci suggest that security concerns should be a major factor in the decision to adopt Thin Client systems and this becomes more apparent when referencing the Gartner Thin Client classification model. The Thin Client approach ensures that data is stored and controlled at the data-centre hosting the Thin Client devices. It is easy to argue that the user can retain the mobility of laptops but with enhanced security and the data is not mobile, just the access point. The argument is even easier to make when we consider recent high-profile cases of the theft of unencrypted laptops containing sensitive medical or financial records. The freedom conferred on users of corporate desktop and laptop PCs undermines the corporation’s obligations in relation to data privacy and security. Steps taken to protect sensitive data on user devices are often too little and too late. Strassmann states that the most frequent use of a personal computer is for accessing web applications and states that the Thin Client model demonstrates significantly lower security risks for the corporation. Five security justifications for adopting the Thin Client model were proposed.

1. Zombie Prevention 2. Theft Dodging 3. File Management 4. Software Control 5. Personal Use Limitations

Strassmann concedes that Thin Clients are not necessarily best for every enterprise and every class of user, but for enterprises with a large number of stationary “non-power” users, “Thin Clients may present the best option in terms of security, cost effectiveness and ease of management.”

User Mobility

User mobility can refer to the ability of a user to use any device, typically within the corporation’s intranet, as a desktop where the user will see a consistent view of the system, for example, SunRay hot-desking. While user profiles in Microsoft Windows support this, it is often only partially implemented. Session mobility can be viewed as the facility for users to temporarily suspend or disconnect their desktop session and to have it re-appear, at their request, on a different device at a later time. This facility removes the need for users to log-out or to boot-up a desktop system each time they wish to log-in. Both of these potential features of Thin Client technologies help to break the sense of personal ownership that users often feel for their desktop or laptop computers. It is this sense of personal ownership which makes the maintenance and replacement of corporate PCs a difficult task, and this feeling of ownership and control is often a reason why users resist the adoption of a centrally controlled Thin Client to replace their desktop, whereas this is exactly why IT management may want to adopt it.

Environmental Costs

In the article “An Inefficient Truth” Plan reveals a series of “truths” supported by a number of case studies directed at the growing costs of Information and Communication Technologies. One such case study is of Reed Managed Services where 4,500 PCs were replaced with Thin Clients, and a centralized blade server providing server based virtualized desktops. Savings are reported as follows:

1. 5.4 million kWh reduction, 2. 2,800 tones of CO2 saved annually 3. Servers reduced by a factor of 20 4. IT budget cut by a fifth

Indeed there are many deployments focused on obtaining energy savings through the use of Thin Clients. In a case study where SunRay systems were introduced into Sparkasse a public German Bank, Bruno-Britz reports that the savings in electricity costs alone were enormous. The University of Oxford has deployed SunRay Thin Client devices in their libraries citing the cooler and quieter operation as factors in their decision. These devices, having no local hard disk and no fan operate at a lower temperature and more quietly than traditional PCs. This characteristic has environmental implications from noise, cooling and power consumption perspectives.

Summary of Benefits

In summary, we can extract the benefits observed within literature and case studies as follows:
1) Increased security as data maintained centrally
2) Reduced cost of hardware deployment and management and faster MTTR
3) Reduced administration support costs
4) Environmental costs savings
5) Reduced cost of software maintenance
6) Reduced cost of software distribution
7) Zero cost of local software support
8) The ability to leverage existing desktop hardware and software
9) Interface portability and session mobility
10) Enhanced Capacity planning
11) Centralized Usage Tracking and Capacity Planning

Thin Clients vs. Fat Clients Thin Client technology has evolved in sophistication and capability since the middle of the 1990s, however the “thickness” (the amount of software and administration required on the access device) of the client is a source of distinction for many vendors. Regardless of “thickness”, Thin Clients require less configuration and support when compared to Fat Clients (your typical PC). In the early 1990s Gartner provided a client-server reference design shown in Figure 1. This design provides clarity for the terms “thin” and “fat” clients by viewing applications in terms of the degree of data access, application and presentation logic present on the server and client sides of the network. The demand for network based services such as email, social networking and the World Wide Web has driven bandwidth and connectivity requirements to higher and higher levels of reliability and performance. As we progress to an “always on”
Network infrastructure the arguments focused against Thin Clients based on requiring an offline mode of usage are less relevant. The move from Fat Client to Thin Client is however often resisted as individuals find themselves uncomfortable with the lack of choice provided when the transition is made, as observed by Wong et al.

[pic]

Figure 1: Gartner Group Client/Server Reference Design

CASE STUDIES

No matter how well documented the benefits of Thin Clients may be, there is still an issue of acceptance to be addressed. While it may be tempting to assume that the implementation of technology is a technical issue and that simply by building solutions a problem is effectively solved, evidence would point to the contrary. As there can often be a disparity between what is built and what is required or needed. Too often requirements gathering, specification definition and user consultation are forgotten in the rush to provide new services which are believed to be essential. In essence the notion of “if we build it they will come” is adopted, inevitably causing confusion and frustration for both service provider and the user. For example, during Sun Microsystems’ internal deployment of its own SunRay Thin Client solution many groups and functions sought exemptions from the deployment as they believed that their requirements were sufficiently different to the “generic user” to warrant exclusion from the project. The same arguments still exist today and it is often those with a more technical understanding of the technology who are the agents of that technology’s demise. By providing interesting and often creative edge cases which identify the limitations of a technology, they can, by implication, tarnish it as an incomplete and flawed technology. In the case of Thin Clients, it should be accepted that there are tradeoffs to be made. One of the appealing aspects of the Fat client is its ability to be highly flexible which facilitates extensive customization. However not every user will require that flexibility and customization. Thin Clients are not going to be a silver bullet addressing all users needs all of the time. All three case studies were evaluated under the following headings in order to allow a direct comparison between each. These criteria were selected to ensure that there was a balance between the user acceptance of the technology and the technical success of each deployment.

1) Login events on the Thin Clients
2) Reservation of the Thin Client facility
3) The cost of maintaining the service

[pic]

Figure 2: Case Study 1

DIT Case Study 1

In 2005 the DIT introduced the SunRay Thin Client technology into the School of Computing. In a similar approach to many other technology deployments the strengths of the technology were reviewed and seen as the major selling points of the deployment. In the case of SunRay there was a cheap appliance available which would provide the service of graphical based Unix desktops. Centralized administration ensured that the support costs would be low and the replacement requirements for systems for the next five years would be negligible. In essence the technological and administrative advantages were the focus of this deployment. Few of the services offered within the existing PC infrastructure were included in the deployment. This deployment sought to offer new services to students and introduced Thin Clients for the first time to both students and staff.
Design

A single laboratory was identified for deploying the SunRay systems and all PC in that lab were replaced with SunRay 150 devices. A private network interconnect was built which ensured that all data sent from the clients traversed a private network to the SunRay server. The initial design of this case study is shown in Figure 2 and it allowed students within this new Thin Client lab access to the latest version of Solaris using a full screen graphical environment as opposed to an SSH command-line Unix shell which was the traditional method still used from existing computing laboratories. A new authentication system was introduced based on LDAP which required students to have a new username and password combination which was different to the credentials already in use within the Active Directory domain used for the existing PC network. The reason for this alternative authentication process was due to the difficulty of authenticating on a UNIX system using Active Directory. Once the server was running, the Thin Client laboratory was ready to provide graphical based UNIX login sessions at a considerable reduced price when compared to an investment of UNIX workstations for each desk. In total 25 Thin Client devices were installed which were all connected to a single Solaris server. In summary the key components within the design were as follows 1. The service was on a private network 2. New authentication process was introduced 3. New storage mechanism was introduced 4. Devices were all in the same location 5. Service provided was a CDE desktop on Solaris 6. Graphical desktops running on Linux servers also accessible

Results The login events are a measure of the general activity of the devices themselves and were considered to be a reasonable benchmark for comparison with existing laboratories within the institute. One interesting point is that the comparison of facilities is not necessarily relevant when the facilities provide different services. Due to the fact that UNIX instead of Windows was provided meant that, with the exception of those taking courses involving UNIX, the majority of students were unfamiliar with the technology and did not seek to use the systems.

Login events on the Thin Clients: The login events were extracted from the Solaris server by parsing the output of the last command which displays the login and logout information for users which it extracts from the /var/adm/wtrmpx file. The number of login events per day was calculated and plotted in the graph shown in Fig. 3. Immediately obvious was the low use of the system. Given that the nature of the service did not significantly change over the course of the three years that the system was in place with the exception of semester activity in line with student presence in the institute, it is clear that there was low utilization of the service. The graph shows raw data plotted, where login events were less than 10 per day.

[pic]

Figure 3: User Login Events

Reservation of the Thin Client Facility: Each laboratory may be reserved by staff for the delivery of tutorial sessions and exercises. The hourly reservations for this laboratory were reduced as a result of the introduction of Thin Clients with only 1 to 2 hours being reserved per day. One of the primary reasons for the reduction in the use of this facility was the fact that it had now become special purpose and the bookings for the room were limited to the courses which could be taught within it.

The Cost of Maintaining the Service: A detailed analysis of cost savings associated with the introduction of Thin Clients within our institute and specifically the costs associated with this case study was performed by Reynolds and Gleeson, [30]. In their study they presented evidence of savings in relation to the cost of support, the cost of deployment and a basic analysis of the power consumption costs. They review both the system and the software distribution steps associated with Thin Clients and PC systems and present a point of quantifiable comparison between the two. Key findings of this analysis were as follows:

1) Time spent performing system upgrades and hardware maintenance was reduced to virtually zero as no hardware or software upgrades were required.
2) A single software image was maintained at the central server location and changes were made available instantly to all users.
3) No upgrade costs were incurred on the Thin Clients or server hardware. All systems have remained in place throughout both case studies. The devices in this lab are now 8 years old and are fulfilling the same role today as they did when first installed.
4) The Thin Client lab is a low power consumption environment due to the inherent energy efficiency of the Thin Client hardware over existing PCs. This can provide up to 95% energy savings when compared to traditional PCs.

Analysis

There has been extensive research in the area of user acceptance of technology, but perhaps the most relevant work in this area is the Unified Theory of Acceptance and Use of Technology (UTAUT) which identifies four primary constructs or factors a) Performance Expectancy b) Effort Expectancy c) Social Influence d) Facilitating Conditions

While there are additional factors such as Gender, Age and Experience, within the student populations these are for the most part reasonably consistent and will be ignored. It should be stressed that although the UTAUT was developed for an industry based environment it is easily adapted for our purposes. It was felt that this model serves as a relevant reference point when discussing the performance of the case studies. Clearly Case Study 1 failed to gain acceptance despite belief that it would in fact be highly successful at its inception. We review the case study under the four UTAUT headings to identify the source of the user rejection of the Thin Clients.
a) Performance Expectancy This factor is concerned with the degree to which the technology will assist in enhancing a users own performance. Clearly however the services provided an advantage to those students who wished to use UNIX systems. Since the majority of courses are based on the Windows operating system it would be reasonable to assume that there was no perceived advantage in using a system which was not 100% compatible with the productivity applications used as part of the majority of courses.
b) Effort Expectancy This factor is concerned with the degree of ease associated with the use of the system. One of the clear outcomes of Case Study 1 was that students rejected the UNIX systems as it was seen to be a highly complex system, requiring additional authentication beyond what was currently used in traditional laboratories
c) Social Influence This is defined as the degree to which there is a perception of how others will view or judge them based on their use of the system. Clearly by isolating the devices and having it associated with specialized courses, there was no social imperative to use the labs. UNIX as a desktop was relatively uncommon in the School at the time of the case study and there would have been a moderate to strong elitist view of those who were technical enough to use the systems.
d) Facilitating Conditions This is defined as the degree to which an individual believes in the support for a system. At first glance this does not appear to be a significant factor considering that the services were created by the support team and there was considerable vested interest in seeing it succeed. However additional questions asked by the UTAUT include the issue of compatibility with systems primarily used by the individual. Each of the UTAUT factors can be considered significant for Case Study 1. Many of the issues raised hang on the fundamental issue that the new services offered on the Thin Client were different to existing services and for all practical purposes seen as incompatible with the majority of systems available to students elsewhere. The fact that the technology itself may have worked flawlessly, and may have delivered reduced costs was irrelevant as the service remained under utilized. Given that the reason for this lack of acceptance was potentially inherent in the implementation of services and not due to failings in the technology itself it was clear that a second case study was required which would address the issue of service.
[pic]

[pic]
[pic]

Figure 4: Case Study 2

Case Study 2

The second case study is a modification of the basic implementation of the first case study with changes focused on increasing student acceptance of the Thin Client facility. Removing the UNIX centric nature of the existing service was central to the system redesign. It was decided that additional services could be easily and cheaply offered to the Thin Client environment providing users with the ability to access more compatible services from within the Thin Client environment. Figure 4 identifies the key components within the design.

Design

The most important addition to the second case study was the provision of additional services which were similar to those available in PC labs. This was to ensure that students could use this facility and have an experience on a par with the PC labs. A new domain was created where UNIX and Windows shared a common authentication process. Due to difficulties integrating UNIX and the existing Windows authentication process, the new Domain was built on the LDAP system with SAMBA providing the link between the new Windows Terminal Servers and the LDAP system. While students could now use the same username and password combination for Windows and UNIX systems this was not integrated into the existing Windows authentication process. Students were still required to have two sets of credentials, the first for the existing PC labs, and the second for access to a new domain containing a number of Windows Terminal Servers and the original graphical UNIX desktop. While the Thin Clients now provided Windows and Unix graphical desktops, the new Windows Domain was also accessible from existing PC labs via RDP connections to the Terminal Servers. This allowed classes to be scheduled either inside or outside of the Thin Client laboratory. In addition to providing Windows Terminal Services (WTS), student owned virtual machines were now also available. Due to the fact that most services were now available from all locations, the ease of access to the services from within the Thin Client lab was improved by providing users with a menu of destinations upon login. This new login script effectively provided a configurable redirection service to the WTS and Virtualization destinations using the desktop utility which performed a full screen RDP connection to specified destinations. An interesting outcome of this destination chooser was that any RDP based destination could be included regardless of the authentication process used. This would however require a second authentication process with the connecting service. The new services provided were as follows:

a) A general purpose Windows Terminal Server with mounted storage for all students and staff.
b) Course specific Windows Terminal Servers for courses where there were specific software requirements not common to all students.
c) Individual Virtualized desktops for students in specific modules where administration rights were required.
d) All services were made available from both the Thin Client and PC labs as they were available over the Remote Desktop Protocol RDP.
e) Provisioning of an easy access point to all services from within the Thin Client environment which was not available from PC systems.

Results

The data gathered for Case Study 2 was evaluated under same three headings as per case study 1.

1) Login events on the Thin Clients
2) Reservation of the Thin Client facility.
3) The cost of maintaining the service.

[pic]

Figure 5: User Login Event Comparison

Login events on the Thin Clients:
Figure 5 shows a comparison of activity during the same time period for the two case studies. To identify trends in the data a displacement forward moving average was performed on the data as shown in Eq. (1).

[pic]

It is clear that for the same time period there was a significant increase in the use of the system as the number of login events increased by a factor of 4. Once again the login events were extracted from the Solaris server by parsing the output of the last command.

Reservation of the Thin Client Facility:
The changes to the Thin Client facility were announced at the start of the second academic semester as a PC upgrade and the number of room bookings increased as shown in Figure 6 from 6 hours a week to 20 hours a week. This was due to the use of the room as a Windows based laboratory using the new WTS and virtualization services.
[pic]

Figure 6: Thin Client Room Reservations

The Cost of Maintaining the Service:
All of the benefits observed from the first case study were retained within this case study. The addition of terminal services reduced the reliance of students on Fat Client installations. Students are now using virtual machines and terminal servers on a regular basis from all labs.

Analysis

This second case study certainly saw an improvement over its earlier counterpart and students and staff could now access more familiar services from the Thin Client lab. Given the dramatic increase relative to the earlier results it could be stated that the introduction of the more familiar services increased the acceptance of the facility. Both case studies demonstrated equally well that it is possible to obtain the total cost of ownership benefits using a Thin Client model, but the services offered has a dramatic affect on user acceptance. It is useful to review the outcome in relation to the UTUAT.

a) Performance Expectancy Given that new services such as personalized virtual machines were now available, staff and students could identify a clear advantage to the system where administration rights could be provided in a safe manner, allowing more complex and previously unsupported activities to take place. For example, the Advanced Internet module for the MSc. students could now build and administer full web servers which could remain private to the student ensuring that no other student could access or modify a project which was a work in progress.

b) Effort Expectancy Considerable improvements were made in this case study to allow users to access well known environments from both the Thin Clients and PC systems. Students who were taught modules using the new WTS or virtual environments were trained on how to access the systems, and once they used them they continued to do so throughout the year. Those who did not have modules being taught using these new services were still required go through a new login/access process which was not well documented. For example within the Thin Client labs the new username/password combination was required to access the choice of destinations from the devices. This acted as a barrier to use even though emails were sent to students and information on how to access these accounts were posted in the labs. Usernames were based on existing student ID numbers.

c) Social Influence
Little changed in this case study for those who did not have a teaching requirement based on the new services.

d) Facilitating Conditions With the provision of WTS services and virtual machines which provided Windows environments the issue of compatibility was reduced. However two issues remained which were not addressed. Firstly while users could now share a common data store between systems on this new domain there was no pre-packaged access to the data store on the existing PC domain. While it was technically possible to combine both under a single view, this required user intervention and additional training which was not provided. Secondly the sequence of steps required to access choices from the Thin Clients was a non-standard login process which now required a second login, the first of which was at a UNIX graphical login screen. For many this initial login step remained as a barrier to using the system.

The most striking result from this case study is that while the second case study demonstrated significant increase in acceptance and use, the PC environments remained the system of choice for students, as shown in Figure 7. In this graph we show the typical use PC laboratory within the same faculty. Thin Client use remained less than one third of the use of the busiest computer laboratory. Thin Clients are shown to be capable of providing services equally well to both Windows and UNIX users by introducing the ability of students to access their own private desktop from many locations, however this feature alone was not enough to entice users from the existing PC infrastructure. Clearly the introduction of virtualization to the infrastructure allowed new services to be developed and used from Thin and Fat clients which could be seen as a potential for migrating users to a Thin Client/Virtualization model, which indeed is a future planned initiative. The results show a definite increase in the use of the Thin Client facilities with data being gathered from the same period over both case studies to eliminate any bias which might occur due to module schedule differences at different time periods during the year. The timing and method used to announce the changes was critical to the increase in acceptance. The announcement of the systems as a PC upgrade removed some of the barriers which existed for users who did not feel comfortable with a UNIX environment but failed to attract a majority of the students.
[pic]

Figure 7: Comparison with PC Computer Labs

Case Study 3

The third case study was designed using the experiences of the first two case studies and was extended beyond the School of Computing. It was aimed at demonstrating the capability of the Thin Client technology in two different demographic environments, the first was one of the Institute Libraries where PCs were used by students from many different faculties and the second was within the Business faculty where computer system use was provided in support of modules taught within that faculty. This case study expressed the following aims at the outset
1) To demonstrate the use of Thin Client technology within the student population and determine the level of student acceptance of that technology.
2) To implement a number of alternative technologies in order to provide a point of comparison with respect to their overall performance and acceptance.
3) To determine the capability of the existing network infrastructure to support Thin Clients.

Design

Unlike the previous case studies the aim was to insert Thin Clients into the existing environment as invisibly as possible. This meant that existing authentication processes were to be maintained. There were two different authentication processes in place which needed to be support, Novell Client for the Business faculty and Active Directory for the Library. In both cases a WTS system was built which joined to the respective domains. Applications were installed on the Thin Client in order to mirror those that were present on existing PCs in the chosen locations. It was essential that the Thin Clients were not to be identifiable by students if at all possible, and to co-locate them with existing PC systems. To ensure that all devices behaved in a consistent manner to PCs they must boot and present the same login screen as would be expected on a PC in the same location. To achieve this all Thin Client devices with the exception of the SunRay systems used a Pre-boot Execution Environment (PXE) boot process to connect to a Linux Terminal Server Project server (LTSP). The server redirected the user session to the correct WTS using desktop where the user was presented with a Windows login screen identical to those on adjacent PC systems.

The SunRay systems were run in Kiosk mode which allowed the boot sequence to redirect the session to a WTS also via the desktop utility. The WTS were installed on a VMWare ESX Server to allow rollback and recovery of the servers. This however was not central to the design of the case study and only served as a convenience in sharing hardware resources between multiple servers. The only concern was the potential performance of the WTS under a virtualized model. Given that the applications were primarily productivity applications such as word processing and browsing, and that the maximum number of users allowable on any WTS was 25 (based on the number of devices which were directly connected to the WTS) this was considered to be within the acceptable performance range of the architecture. This assumption was tested prior to the case study being made accessible to students with no specific issues raised as to warrant further restructuring of the architecture

Seventy five Thin Clients were deployed in six locations. The following Thin Client devices were used as shown in Figure 8 and Table 1.

Figure 8: Case Study 3

Table 1: Thin Clients deployed

Linux Terminal Server Project

LTSP works by configuring PCs or suitable Thin Clients to use PXE-Boot to obtain the necessary kernel and RDP client used as part of this project. These are obtained from a TFTP server whose IP address is provided as a DHCP parameter when the client PXE-Boots. As part of the DHCP dialogue, devices configured to PXE-Boot are given settings by the DHCP server. These include; TFTP Boot Server Host Name and Boot file Name. The necessary settings were configured on each of the DHCP servers serving the relevant locations within the DIT so as to point any PXE-Boot devices to the relevant LTSP boot server and to specify the kernel to be loaded by the PXE-Boot client. Using these settings the PXE-Boot clients load a Linux kernel and then an RDP client which connects to one of the three WTS used as part of this case study.

Figure 9: User Login Event Comparison

Results Use of the Thin Clients was recorded using login scripts on the Windows Terminal Servers which recorded login and logout events. As expected the use of the Library systems exceed the use of the laboratories but both were in line with typical use patterns expected for each location. What was immediately obvious was that each location had a higher utilization than the previous two case studies but comparable with the PC labs shown in Figure 9. One of the difficulties with the comparison however is that the final case study was performed at a different point in the teaching semester and use of the systems declined as students prepared for examinations. Lab 1 was a “quiet lab” located remotely from the primary labs within the Business faculty and traditionally did not have high use. Lab 2 was a more central location and again as expected this exhibited greater user activity. The systems remained in operation continually for the period of the case study which was over one month during which data was collected from the three WTS systems.

User Survey Once the case study was running a desktop satisfaction survey which employed the Likert scale [33] was conducted to obtain feedback from students using the Thin Client systems. The design of the questionnaire was such that students were asked to identify their desktop using a colour coded system which was known only to the authors. Each of the Thin Clients and a selection of PC systems (which were not PXE booted) where targeted for the survey to allow a comparative analysis between all Thin Clients and existing PC systems to be performed. The survey did not reference Thin Clients in any of the questions but rather sought feedback on application use and overall satisfaction with the performance of the system through a series of questions. There were 234 responses recorded for the survey. The key questions in the survey were as follows.
1) Please rate the overall performance of the machine you are currently using
2) Please identify the primary reason you used this computer
3) How would you rate your overall satisfaction with this desktop?
4) Would you use this desktop computer again?

[pic]

Figure 10: User satisfaction rating of desktop performance

The issue of overall performance was broken down by the device used which was identified using the color coded scheme described earlier. Figure 10 below represents the average rating of satisfaction reported by users broken down by device and primary application in use. Since over 50% of responses identified “Browsing” as the primary reason for using the machine there are two satisfaction ratings provided as a point of comparison. Figure 11 shows the combined rating of user’s responses to overall satisfaction with desktop, desktop performance and application performance.
[pic]

Figure 11: Combined rating of desktop performance

b

Analysis This final case study while shorter in length than the other case studies demonstrated significant progress in user acceptance. As part of the survey users were asked if they would consider reusing the system and as can be seen in Figurtfgte 12 there was significant support for the systems. The small number of responses representing those who did not wish to reuse the system cited USB performance as the primary cause of their dissatisfaction. This was identified early in the testing of the Thin Clients that all systems performed noticeably slower than the PC systems in this respect. Questions regarding the primary storage method used by students were added to the survey as was a satisfaction rating. From the results in Figure 13 it is clear that while the PC systems did perform better when users primarily used USB storage, the satisfaction in storage performance for all other options were comparable. The HP satisfaction rate had a low survey response rate and hence was not considered significant in our analysis given the small number of data points.

[pic]

Figure 12: User Response "Would you use this system again"

[pic]

Figure 13: Storage Satisfaction Rating

By making the Thin Clients as invisible as possible and comparing satisfaction and user access to the existing PC systems it was clear that for the majority of users there was no apparent change to the services provided. Integrating into the existing authentication process was an essential feature of this case study as was the presenting of a single authentication process at the WTS login screen. Efforts were also made to ensure that the applications installed on the WTS were configured to look and feel the same as those on the standard PC. As with the previous case studies it is useful to review the case study in relation to the UTUAT.

a) Performance Expectancy With the exception of increasing the number of desktops in the Library, the primary deployment mainly replaced existing systems, so users were not provided with any reminders that they were using a different system. In effect there was no new decision or evaluation by the user to address the questions which were relevant in the previous case studies.
b) Effort Expectancy The reuse of the existing login/access procedure which was well known and part of the normal process for students using existing PC systems again allowed for this factor to become mainly irrelevant. Usernames, passwords, applications and system behavior were identical to those on the PCs.
c) Social Influence Without perceiving a difference in service, social influence as a factor was also eliminated. Only the SunRay systems had different keyboards and screens, and as these screens were of higher resolution than existing PCs they were if anything seen as a more popular system.
d) Facilitating Conditions Unlike the previous case studies support for the facility was more complex. Different levels of expertise and engagement were required. Thin Clients were now part of a larger support structure where many individuals were not core members of the technical team who built the systems. However given that only three support calls were raised during the case study there was little pressure on this factor either. The calls raised were not in fact directly related to the Thin Client devices, but rather the network and the virtual environments used to host the centralized servers.

III. Reflection or Reaction

The UTUAT provides a useful reference point in understanding some of the factors affecting acceptance of the Thin Clients. In the first case study the primary barrier to acceptance was the incompatibility of the new system with the existing system. Students were not motivated to use the new system as there were few advantages to doing so and considerable effort in learning how to use it. The second case study while more successful still failed to gain acceptance despite the expansion of services offered being comparable with existing Windows services. The session mobility and access from anywhere feature, while useful did not overcome the resistance of users to migrate to the Thin Clients. Thin Clients still required separate credentials and the login process was still different to the PC systems. The third and final case study was designed to provide the same existing services as the PC only using a centralized server and Thin Client model. No new services for the user were provided. The primary aim was to have the systems indistinguishable from the existing installation of PCs, effectively running a blind test for user acceptance. Once the users accepted the new systems, further machines could be deployed quickly and cheaply. The total cost of ownership and centralized support savings demonstrated in the first two case studies were just as relevant in the third case study.

There is considerable literature in support of Thin Client technology, and while there may be debate regarding the finer points of its advantages the issue has been and continues to be one of acceptance. Acceptance for Thin Clients as a technology is often confused with the non technical issues arising from the deployment. The UTUAT helps distinguish between technical and non-technical issues and as shown within the case studies, the way in which the technology was presented to the user had a higher impact on acceptance than had the technology itself. This point is highlighted by the fact that the Thin Client devices which were not widely used in first case study were integrated seamlessly into the third case study. These three case studies provide data centric analysis of user acceptance and identify the evolving designs of its deployments. To gain acceptance of Thin Clients within an educational institute these case studies identified these key factors
1) Locate the Thin Clients among the existing PC systems, do not separate them or isolate them.
2) Ensure that the login process and credentials users are identical to the existing PC systems.
3) Ensure that the storage options are identical to the existing PC systems
4) Focus on providing exactly the same services that already exist as opposed to focusing on out new services.

IV. REPERENCES

V. Venkatesh, M.G. Morris, G.B. Davis, and F.D.Davis, “User acceptance of information technology: Toward a unified view,” Mis Quarterly, 2003, pp. 425-478.

D. Tynan, “Think thin,” InfoWorld, Jul. 2005.

S.J. Yang, J. Nieh, M. Selsky, and N. Tiwari, “The Performance of Remote Display Mechanisms for Thin-Client Computing,” IN PROCEEDINGS OF THE 2002 USENIX ANNUAL TECHNICAL CONFERENCE, 2002.

T. Richardson, Q. Stafford-Fraser, K. Wood, and A. Hopper,“Virtual network computing,” Internet Computing, IEEE, vol. 2, 1998, pp. 33-38.

J. Nieh, S.J. Yang, and N. Novik,“A comparison of thin-client computing architectures,”Network Computing Laboratory, Columbia University, Technical Report CUCS-022-00, 2000.

R.A. Baratto, L.N. Kim, and J. Nieh, “Thin: A virtual display architecture for thin-client computing,” Proceedings of the twentieth ACM symposium on Operating systems principles, ACM New York, NY, USA, 2005, pp. 277-290.

B.K. Schmidt, M.S. Lam, and J.D. Northcutt, “The interactive performance of SLIM: a stateless, thin-client architecture,” Proceedings of the seventeenth ACM symposium on Operating systems principles, Charleston, South Carolina, United States: ACM, 1999, pp. 32-47.

“MokaFive, Virtual Desktops,” http://www.mokafive.com/.

[M. Jern, “"Thin" vs. "fat" visualization clients,” Proceedings of the working conference on Advanced visual interfaces, L'Aquila, Italy: ACM, 1998, pp. 270-273.

M. Jern, “"Thin" vs. "fat" visualization clients,” L'Aquila, Italy: ACM, 1998, pp. 270-273.

S. Kissler and O. Hoyt, “Using thin client technology to reduce complexity and cost,” New York, NY, USA: ACM, 2005, pp. 138–140.

J. Golick,“Network computing in the new thin-client age,”netWorker, vol. 3, 1999, pp. 30-40.

S.C. Speer and D. Angelucci, “Extending the Reach of the Thin Client.,” Computers in Libraries, vol. 21, 2001, pp. 46 - .

P.A. Strassmann, “5 SECURE REASONS FOR THIN CLIENTS,” Baseline, 2008, p. 27.

Paul Doyle, Et.al,”Thin Client Acceptance”, School of Computing, Dublin Institute of Technology, Ireland WiSAR Lab, Letterkenny Institute of Technology

-----------------------

|Device |Boot Mode |Quantity |
|Dell GX260 |PXE Boot PC |15 |
|Dell FX 160 |PXE Boot TC |25 |
|HP T5730 |PXE Boot TC |8 |
|Fujitsu FUTRO S |PXE Boot TC |2 |
|SunRay 270 |SunRay |25 |

Similar Documents

Premium Essay

Cs Case Studies

...CASE STUDIES in CS 17 Mr. Eldimario O. Antiquina, CPA, MBA Professor Ms. Crismarjoe Dara L. Vasay Student 1. Breezy Company EXECUTIVE SUMMARY The sales manager of Breezy Company, John Breezy moved to Alaska so Chuck Breezy, President of Breezy Company hired a young college graduate to fill the position. Trying to keep sales level up, Chuck established a reward incentive based on net sales. Bob Sellmore as the new sales manager was eager to set his career in motion and decided he would attempt to increase the sales levels. He recruited new customers while keeping the old clientele. For one year, Bob had proved himself to Chuck, who decided to introduce an advertising program to further increase sales which brought in orders from a number of new customers, many of whom Breezy had never done business with before. With the influx of orders from new customers, Chuck became excited that he instructed Jane Breezy, the finance manager to raise the initial credit limit for new customers that induce them to purchase more. As the finance manager, Jane performs credit checks. At first, Jane really sees to it that credits are approved on the basis of past behavior to those customers who she had been familiar. When there are new customers, she usually approved low credit at first but increases it after the customer exhibited reliability. But Chuck felt that this policy is restricting a further increase on sales that he decided to increase credit limits even to new customers...

Words: 1152 - Pages: 5

Free Essay

Case Study Method

...Case Study Method The case method of teaching is widely used in business and science education today. By definition, a case is a written account of an actual condition that has occurred. This account is used as a real life example of a situation that can be analyzed by the students to teach concepts related to course study. Most often teaching with the case method requires facilitation and discussion of the account by the students (Foran, 2002). The aim is to analyze and apply the various course concepts as they pertain to the events in the case study. Some of the tools used by the teacher in the case method may be debate, or collaboration by placing students in groups. William Perry is a psychologist professor at Harvard and has commented on what is known as the Perry model for student learning. During early education students learn in what is called the dualist mode, where educators are the authority figures that students model and accept as 100% accurate in everything they say (Herreid, 2004). These authority figures lecture them on what is right and wrong and the students do not question this authority. The answers given by the teachers are the only correct ones and so the student learns to memorize these answers. During tests these answers are the only ones accepted as correct. Perry notes that this lecture mode only emphasizes the dualist mode where students are not allowed to think for themselves. He also makes the point that this is not how science works (Herreid...

Words: 1014 - Pages: 5

Free Essay

Diadeo Case Study Hns Hbs

...High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/6c92feaa-fc0f-11e0-b1d8-00144feab49a.html#ixzz2Cu5c99bj Case study: Diageo By Abby Ghobadian The story: After a series of mergers, demergers and acquisitions, the management of Diageo, the conglomerate formed by the 1997 merger of Guinness and Grand Met, made a strategic decision to focus on premium alcohol drinks. Diageo was in charge of an expanding and wide-ranging collection of brands, some of which had broad appeal across many countries while others had more regional appeal, sometimes limited to just a few markets. The challenge: After both organic growth and acquisitions, three key dilemmas emerged by 2002. First, how to manage brands with significantly different appeal, such as Guinness, a brand with strong Irish roots but huge global appeal, or Buchanan’s, the leading Scotch whisky in Latin America. Second, how to rejuvenate tired brands and third, how to improve the market share of the most successful brands, such as Captain Morgan, J & B, Smirnoff and Johnnie Walker. The initial strategy: To help managers maintain focus and allocate resources, Diageo developed three brand classifications: global priority, local priority and category. The global priority brands were the big sellers that were...

Words: 1041 - Pages: 5

Premium Essay

Hbs Case Study

...Hikmi Syed AbdullahHaza Nuzly Abdull Hamed Aryati BakriNorasnita Ahmad | 32432/ N28-403-1532423/N28-403-0932426/N28-403-2132405/N28-402-1232421/N28-403-0732430/N28-403-1732433/N28-403-1432427/N28-403-20 | iskandar@utm.mymhafiz@utm.myhalina@utm.myhaslinah@utm.mynorris@utm.myhaza@utm.myaryati@utm.mynorasnita@utm.my | Synopsis | This 1-credit course will provide an extension to the existing 2-credit subject (UCD2762) on how to analyze and evaluate the business opportunities using the knowledge and skills acquired from the previous subject. Class members will consider business planning, self-assessment, idea generation, and operating strategies required to start a new small business. Students will also be exposed to Harvard Business School Case Method in order to give them exposure to the real world problems and their solutions. Active participation by students during class discussions and activities is encouraged & expected. Students successfully completing this course will be able to: * Research, recognize and access business opportunities. * Use analytical and critical thinking skills to determine the feasibility of a business concept. * Gained hands on experience with conducting research, develop, write, evaluate, presenting and defending segments of a business plan. | | Learning Outcomes | At the end of the semester, the student will have the: | CO | Course Outcomes | Related Program Outcome (PO) | Evaluation Method | 1. | Ability to think...

Words: 610 - Pages: 3

Premium Essay

Cma Guideline

...carefully since it outlines all of the rules governing the Program. These rules are intended to ensure, on the one hand, that all candidates master the skills necessary to practice the profession and, on the other hand, that everyone is treated equally. It is in this spirit that the moderators, correctors and staff of the Order make sure that they are respected. Note: Wherever there is a difference in interpretation, the French version of this Guide will prevail over the English version. o Happy reading! 2 2013-2014 Candidate’s Guide Table of contents Note to Readers Chapter 1 CMA Strategic Leadership Program (SLP) 1.1 1.2 SLP objectives and basics The SLP in steps 1.2.1 Phase 1 - Development 1.2.1.1 Learning activities 1.2.2 Case Examination 1.2.3 Phase 2 - Application 1.2.4 Report to the Board 1.2.5 Practical experience Evaluation methods for learning activities and national examinations 1.3.1 Evaluation of learning activities 1.3.2 Evaluation of the national examinations SLP management rules 1.4.1 Educational material and SLP Site 1.4.2 Attendance at interactive sessions 1.4.2.1 Lateness or absences of less than three hours 1.4.2.2 Absences of three hours or more 1.4.3 Group and team formation 1.4.4 Changing groups and teams Other useful information 1.5.1...

Words: 6775 - Pages: 28

Premium Essay

Timberland Case Study Review

...Timberland Jason Patterson Responsible Corporate Leadership Professor David Shirley October 23, 2011 Timberland: Commerce and Justice Case Study Analysis Overview The Timberland case study documents the company’s path towards incorporating service to community into their business strategy and overall infrastructure. Under the leadership and vision of Jeff Schwartz, Timberland began this undertaking almost immediately after the company went public in 1987. Using “doing well and doing good” as a mantra for their dual commitment to the enrichment of business and community, Timberland forged relationships with regional based organizations like City Year and Skills USA. With these organizations, Timberland formed strategic and interdependent alliances that were mutually beneficial to the continuing growth of Timberland’s business and service operations and the organizations they served (X). Building on the positive momentum Timberland gained through the fore mentioned relationships, Timberland went on to develop their own company based community service initiative called Path to Service. Through PTS, Timberland afforded company employees allotted leave hours that could be used to serve surrounding communities, whether they were company sponsored events or personal service commitments. In 1998, Timberland introduced the program Serv-A-Palooza (the largest day of service) as their cornerstone service initiative, making a commitment to surpass previous service hour standards...

Words: 990 - Pages: 4

Premium Essay

N/a More and More

...PREPARATION - When it came to resume building, I mentioned my internship (which was in Samsung), projects I did and the co-curricular activities - I was confident about my aptitude and was focussing mainly core and analytics. - I didn’t prepare for GD but finally had to give GD in Coca Cola, ITC and Schlumberger. So you can never be too sure of what comes your way during the placements. PLACEMENT EXPERIENCE - I started my placement journey by getting shortlisted in Capital One on Day 1. They shortlisted 125 candidates on the basis of resume. Then they took a case study interview and reduced the number to 30. Then again took an aptitude test but finally didn’t give offer to anyone. - Then came Coca Cola on Day 2. They organised GD in the groups of ten each and then there was a single interview of about half an hour which mainly consisted of HR based questions. The topic of the GD was “Are Engineering students wasting time in studies ?”. The interview mainly focussed on the commitment to work with them and asked whether I did any activity depicting leadership skills. - Coca Cola shortlisted candidates with medium profile like moderate CPI with few extracurrecs. I had a target of gettng placed in Qualcomm from second year itself. It came on Day 2 and I got a call from Qualcomm in the middle of the interview of Coca Cola so I could not take their call. Immediately after this I went for the Qualcomm interview but they were not happy and asked me to leave without much interrogation. The...

Words: 23427 - Pages: 94

Premium Essay

Case

...THE ON OT C OP YO CASE STUDY HANDBOOK RP OS T ON OP YO RP OT C OS T THE ON OT C Write Persuasively About Cases OP CASE STUDY HANDBOOK How to Read, Discuss, and William Ellet Harvard Business School Press Boston, Massachusetts YO RP OS T Copyright 2007 William Ellet All rights reserved Printed in the United States of America 11 10 09 08 07 5 4 3 2 1 No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording, or otherwise), without the prior permission of the publisher. Requests for permission should be directed to permissions@hbsp.harvard.edu, or mailed to Permissions, Harvard Business School Publishing, 60 Harvard Way, Boston, Massachusetts 02163. The copyright on each case in this book unless otherwise noted is held by the President and Fellows of Harvard College and they are published herein by express permission. Permission requests to use individual Harvard copyrighted cases should be directed to permissions@hbsp.harvard.edu, or mailed to the Permissions Editor, Harvard Business School Publishing, 60 Harvard Way, Boston, MA 02163. ON OT C Case material of the Harvard Graduate School of Business Administration is made possible by the cooperation of business firms and other organizations which may wish to remain anonymous by having names, quantities, and other...

Words: 96750 - Pages: 387

Premium Essay

Case Study Handbook

...1/22/07 3:37 PM Page i RP OS T ElletFM.qxp THE DO N OT C OP YO CASE STUDY HANDBOOK 1/22/07 3:37 PM Page ii DO N OT C OP YO RP OS T ElletFM.qxp 1/22/07 3:37 PM Page iii RP OS T ElletFM.qxp YO THE OP CASE STUDY HANDBOOK How to Read, Discuss, and OT C Write Persuasively About Cases DO N William Ellet Harvard Business School Press Boston, Massachusetts 1/22/07 3:37 PM Page iv RP OS T ElletFM.qxp Copyright 2007 William Ellet YO All rights reserved Printed in the United States of America 11 10 09 08 07 5 4 3 2 1 OP No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording, or otherwise), without the prior permission of the publisher. Requests for permission should be directed to permissions@hbsp.harvard.edu, or mailed to Permissions, Harvard Business School Publishing, 60 Harvard Way, Boston, Massachusetts 02163. The copyright on each case in this book unless otherwise noted is held by the President and Fellows of Harvard College and they are published herein by express permission. Permission requests to use individual Harvard copyrighted cases should be directed to permissions@hbsp.harvard.edu, or mailed to the Permissions Editor, Harvard Business School Publishing, 60 Harvard Way, Boston, MA 02163. OT C Case material of the Harvard Graduate School of Business Administration is made possible by the...

Words: 99835 - Pages: 400

Premium Essay

Case Studies

...GOOD PRACTICE CASE STUDIES IN UNIVERSITY-BUSINESS COOPERATION PART OF THE DG EDUCATION AND CULTURE STUDY ON THE COOPERATION BETWEEN HIGHER EDUCATION INSTITUTIONS AND PUBLIC AND PRIVATE ORGANISATIONS IN EUROPE EUROPEAN COMMISSION Directorate-General for Education and Culture Directorate C: Lifelong learning: higher education and international affairs European Institute of Innovation and Technology; economic partnership Public open tender EAC/37/2009: CONTENTS CONTENTS INTRODUCTION Scope of report Introduction to UBC Elements in the UBC Ecosystem 5 5 5 5 AIMS & METHODOLOGY Introduction Objective Process for selection Basis for selection Countries considered in the selection of the cases Case study partners 7 7 7 7 8 8 9 CASE STUDIES Case study key insights Classification of countries Nature of case study Case study quick-find 10 10 12 12 13 NORTHERN Europe Case 1: SEA, Denmark Case 2: ETM, Estonia Case 3: Demola, Finland Case 4: REAP, Ireland Case 5: Mobility at UL, Latvia Case 6: CSE, Sweden Case 7: SMIL, Sweden Case 8: SPEED, UK Case 9: IDI/Digital City, UK Case 10: Acua Limited, UK 18 19 25 30 35 41 46 52 57 63 70 76 80 84 90 96 EASTERN EUROPE Case 11: GIS, Bulgaria Case 12: TTO Pécs, Hungary Case 13: The Science and Economy Project, Poland Case 14: WCTT, Poland Case 15: Q-PlanNet, Romania 75 1 © Science-to-Business Marketing Research Centre CONTENTS SOUTHERN EUROPE Case 16: MUHC, Malta Case 17: PNICube, Italy...

Words: 60370 - Pages: 242

Premium Essay

Managing Information Technology (7th Edition)

...CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 ...

Words: 239887 - Pages: 960

Free Essay

Role of Power

...contemporary organizational issue you find intriguing. Use one field site or example for the entire paper. Also, be explicit about the level issue. For example, if you are using the concept of personality then it is an individual level issue. A list of concepts and their related levels is provided in a separate document. Focus of paper-related requirements: Outline: Submit a formal outline for your paper, complete with references. The purpose of the outline is to help you organize your content, which also results in increased clarity, improved logic, and better structure of the paper. There may be adjustments from this document to your final paper, but at this stage the paper should not require major revisions. Final Paper: Use a case study format for the structure of your paper. Identify and analyze issues using course concepts, and propose recommendations for the organization you are focusing on. Use of course concepts 1. Use a minimum of 8 concepts for the paper. Include a list of the concepts you used at the beginning of the paper. 2. Briefly define each concept you use within the text (a paragraph or two). 3. For each concept, write a diagnosis at one level (e.g., the person level). For example, you might write “The employee misses work frequently due to stress from conflict with her supervisor.” Note, stress and conflict would require definitions.) 4. For each concept, write a solution or solutions. Identify the level(s) you addressed in Step 2...

Words: 594 - Pages: 3

Premium Essay

Ungs2050

...Calendar Overall for Case-Study Presentation & Mid-Term Exam – MGT 4760 (Strategic Management) Sem 1, 2012/2013 Sec 8 (M-W) No. | Week | Topics | Class Day | Date | Schedule | Details | | 1 | Chapter 1: The Nature of Strategic Management | 1- Mon 2- Wed | 10/912/9 | | | | 2 | Chapter 2: The Business Vision and Mission | 3- Mon 4- Wed | 17/919/9 | | | | 3 | Chapter 3: The External Assessment | 5- Mon 6- Wed | 24/926/9 | | | | 4 | Chapter 4: The Internal Assessment | 7- Mon 8- Wed | 1/103/10 | Quiz 1 (Chapter 1.2.3) | | | 5 | Chapter 4: The Internal Assessment | 9- Mon 10- Wed | 8/1010/10 | | | | 6 | Chapter 5: Strategies in Action | 11- Mon 12- Wed | 15/1017/10 | | | | | BREAK(22/10 – 28/10) | 13- Mon 14- Wed | 22/1024/10 | | | | 7 | Chapter 5: Strategies in Action | 15- Mon 16- Wed | 29/1031/10 | Case Presentation Session 1Case Presentation Session 2 | Group 1:L: Lia Hilaliah (Case Study 3)Group 2:L: Mas Syairah bte Mohamad (Case Study 5) | | 8 | Chapter 6: Strategy Analysis and Choice | 17- Mon 18- Wed | 5/117/11 | | (Mid-Term Exam 7/11 Wednesday)Seminar Room 1.1 | | 9 | Chapter 6: Strategy Analysis and Choice | 19- Mon 20- Wed | 12/1114/11 | Case Presentation Session 3Case Presentation Session 4 | Group 3:L: Mohamed Sheikh (Case Study 9) Group 4:L: Izzati Nor binti Salleh (Case Study 14) | | 10 | Chapter 7: Implementing Strategies: Management and Operations...

Words: 418 - Pages: 2

Premium Essay

Ob, Arctic Minings Consultants, Case Study

...ARCTIC MINING CONSULTANTS Case Synopsis Arctic Mining Consultants is a mining company that deals with mineral exploration. In this case study, the project given is staking 15 claims in Eagle Lake, Alaska. The project Manager was Tom Parker, who has a wide experience and specialized knowledge in all nontechnical aspects of mineral exploration. He is a geological field technician and field coordinator for Arctic Mining Consultants. He assigned his previous field assistants John Talbot, Greg Boyce and Brian Millar to help him complete the project. The job required them to stake at least 7 lengths each day in order to be completed on time. However, the whole team has became very tense and agitated, especially Tom Parker, as the deadline was just around the corner and there’s still many to be finished within the limited time. The problem became worse with the way Tom managed and treated his team. The only motivation to the team was the $300 bonuses promised by the company when the job is done on time, otherwise, they might wished to give up already. This happened because working as a field assistant and in long-working hours only giving them low wages, which is considered unreasonable compared to what they have to do. During the eight hard days, everything had actually proved the strengths and weaknesses of each of the team members, including Tom. Case analysis symptoms 1) What symptom(s) exist in this case to suggest that something has gone wrong? The symptom(s) to suggest...

Words: 2346 - Pages: 10

Premium Essay

Case Study Sample

...Running head: CASE STUDY XYZ Case Study XYZ: An Examination of Project Procurement Management Practices Group 12 John Doe Jane Smith Bobbie Sue University of Maryland University College Project Procurement Management, Semester XXXX, Section XXXX Professor Stephen R. Guth MMMM DD, YYYY [No Abstract or Introduction required for this assignment] The Inception Phase Rating Scale: 5—Excellent, 4—Very Good, 3—Good, 2—Poor, 1—Very Poor |Project Management Area |Inception Phase | |Scope Management | | |Time Management | | |Cost Management | | |Quality Management | | |Human Resource Management | | |Communication Management | | |Risk Management | | |Procurement Management | ...

Words: 804 - Pages: 4