- Boot image control
A boot image control strategy is a common way to reduce
total cost of ownership in organizations with large numbers of similar computers being used by users with common needs, e.g. a large corporation or government agency. "This is considered part ofenterprise application integration in larger shops that use that term since applications are part of the boot image, and modify the boot image, in most desktop OS."Windows Vista includes tools for boot image control, displacing third party tools.Mac OS has always had more flexible handling ofboot drive s, simplifying control and reducing the need to move boot images around between drives. Increasingly, boot image control is a network operating system function.Economics
Very often a large computer vendor is required to explain in a bid in response to an
RFP how they intend to simplify the purchaser's boot image control problems and the attendant service costs:The
total cost of ownership correlates strongly to the total number of different images, not the total number of computers, so this is a major cost concern. Three basic strategies are commonly advised:
*a single baseboot image for each type of computer in the organization, customized by each user with no central control
*athin client strategy where the smallest possibleboot image is used, typically one that does not include a fulloperating system
*adepartmental boot image strategy where a baseboot image is customized with applications to fit each group of users, but, the users do not have the ability to upgrade or alter the configurationsThin client strategies
Organizations that do not closely track, control and set common standards for, acquisition of new computer hardware, typically can only practice a
thin client strategy.Which strategy will reduce total cost of operations the most depends on several factors:
*whether the capabilities of a fulloperating system are required, or just those of athin client
*whether applications with inflexiblesoftware license s are in use that must be paid for not only if they are used, but even if they are only installed
*whether poorly-behaved applications that interact badly are in use
*LAN orremovable disk limits that make it easy or difficult to dore-imaging on demandMore complex departmental boot images
While the
departmental boot image strategy seems to be the most flexible, the complexity of creating and managing several large boot images, and determining when a department needs to upgrade its applications, can easily outweigh these. Especially if users object and try to subvert the discipline of waiting for a regular boot turn to upgrade all machines at once. If each user is allowed to do this on their own, then, the discipline soon degrades into effectively a bunch of home computer whose issues are not really diagnosable nor comparable to each other. In which situationthin client s may become the only practical answer:Many organizations use thin clients for applications which require high security, involve unreliable users or repurpose older machines for continued use. This much simplifies boot image control by facilitating centralized management of computers, and has many advantages:
*since servers manage clients and the local environment is highly restricted (and often stateless), providing protection frommalware , support costs are reduced
*since no application data typically resides on the thin client (it is entirely rendered), it is securely stored on network drives upon its creation
*since disk, application memory, and processors are minimal in thin client hardware, they go obsolete slowly and cost much less
*since they are not as useful as ordinary computers they are of less interest to thievesWhile control of the images is simpler, there are disadvantages. Thin clients:
*require more network bandwidth
*require more host computer power and must typically be served by much larger host boxes
*typically cannot run arbitrary PC or Mac software
*perform poorly in multimedia applications or games - an advantage in many business environmentsMany organizations try to gain the advantages of thin clients without the disadvantages by treating many very standard machines as if they were terminals, but with very much greater capabilities. As they buy new computers, they put the demanding applications on those.
Boot turns and re-imaging
Administrators perform a regular (often bi-annual) boot turn that
re-image s many older, off-spec machines at once so that new hardware can be deployed for higher-end use. This procedure is called cascading: the oldest hardware is repurposed with simpler software to let it continue in use for some less demanding or more access-controlled applications, but subjects it to much more rigorous control to minimize the number of images.The
total cost of operations correlates strongly to the total number of different images, not the total number of computers. To minimize the number of images requires additional discipline:
* Specify the computer hardware to minimize unneeded machine diversity and minimize the resultant number of boot images.
* Upgrade new machine specifications at low additional cost so they remain useful longer, reduce the incursion of off-spec machines later in the life-cycle, improve standardization, reduce support costs, minimizee-waste with longer lifecycles
* Organize the network so that boot images can be efficiently supported and swapped, independent of data.
**Data must not be dependent onboot device s - use networks to store data on secure servers so thatdata recovery is literally never required even in adisaster recovery situation
*Confirm, byhardware acceptance testing on each new machine, that it runs the standard boot image
**Any machine that does not must be considered to be dead on arrival
*A strict installation regime to ensure that only supportable standardizedboot image s are used and any machines that connect to the network for the first time with a nonstandard image are detected and rejected
*Diagnostics andtroubleshooting so that help desk and other technical support staff can employ standardized tests to identify the source of problems: boot, software, or hardware
**Ideally, backups on hand of theboot image , or even spare identical computers that can quickly be booted up from theboot device in question to determine if it is a hard disk, computer or software/image problem.
*Commondesktop system recovery tools and procedures for failed desktop units, typically using backup copies of a boot image created with utilities
*Rapid network recovery procedures that replace a backup boot image in a few minutes or less, with considerable cost savings over usingDVD , CD orfloppy disk media which require human attention
*Ensureservices for the disabled are on everydepartmental boot image that require them, or in thethin client hardware and software itself, to accommodate these users in a manner that is ubiquitous and cost effective.
*Supporttelework and secure off-site system access procedures in the standard boot image
**Encourage teleworkers to buy identical machines to those in the office or use thin clients exclusively
*Facilitate worker transfer by changing boots or authorizations instead of moving the actual computer
*Installthin client s on all off-spec machines to eliminate the need for special boot images for them, and subsequent diagnostic problems and data risks.Open configuration and semantic services
Desktop computing is increasingly relying on
web service s, making the thin client approach more viable. Departmental boot images may remain but simply instantiate part of asemantic service-oriented architecture , especially in larger organizations. Aservice component architecture would further simplify the implementation of control mechanisms, especially if a single application language like Java was used for all custom applications in the enterprise. More importantly, shift tosoftware as a service by most large vendors means that applications are not tied to machines, so the number of variant boot images required (with the applications installed) is reduced.Other
open configuration technologies such asBitfrost ,OpenID and evenjabber would also simplify configuration of boot images, as authentication would no longer be dealt with on the desktop/laptop device.Vendor support
Large system vendors increasingly provide DVDs with the boot image standard for the machine as shipped to the customer, which usually includes tools to diagnose changes to the machine and download drivers.
Wikimedia Foundation. 2010.