{"id":228,"date":"2015-05-20T13:42:06","date_gmt":"2015-05-20T12:42:06","guid":{"rendered":"https:\/\/blog.bham.ac.uk\/itinnovation\/?p=228"},"modified":"2018-05-25T13:53:18","modified_gmt":"2018-05-25T12:53:18","slug":"excitor-gon-evaluation","status":"publish","type":"post","link":"https:\/\/blog.bham.ac.uk\/itinnovation\/2015\/05\/20\/excitor-gon-evaluation\/","title":{"rendered":"Excitor G\/On evaluation"},"content":{"rendered":"<p>The aim of this experiment is to evaluate the feasibility of replacing the secured laptops with computer-on-a-stick\u00a0(G\/On Solution) in some business circumstances.<br \/>\nWe aim to evaluate the G-On solution in the following areas in the experiment:<br \/>\n\u2022 User Acceptance Testing: whether it is easy enough to use for end user<br \/>\n\u2022 Reliability Testing: does the G\/On solution works reliably to support user\u2019s day-to-day business requirements<br \/>\n\u2022 Performance Testing: if it has good\/acceptable performance to do everyday tasks<br \/>\n\u2022 Security Testing: whether it provides secure access to business applications and data<br \/>\n\u2022 Cost Comparison: whether it is a cost effective solution comparing with secured laptops<\/p>\n<p>Excitor G\/On\u00ae is a remote access solution that works with any Windows, Mac and Linux PC. G\/On OS is based on\u00a0simplified linux OS, its specific task is to provide a secure environment to give users secure access to corporate, server\u00a0side resources. It can provide secure access to Remote Desktop, Citrix or web applications from home PCs or non-corporate\u00a0owned PCs, without the need for a VPN.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-229 size-full\" src=\"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-content\/uploads\/sites\/39\/2018\/05\/Excitor-G-on.png\" alt=\"\" width=\"601\" height=\"250\" srcset=\"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-content\/uploads\/sites\/39\/2018\/05\/Excitor-G-on.png 601w, https:\/\/blog.bham.ac.uk\/itinnovation\/wp-content\/uploads\/sites\/39\/2018\/05\/Excitor-G-on-300x125.png 300w, https:\/\/blog.bham.ac.uk\/itinnovation\/wp-content\/uploads\/sites\/39\/2018\/05\/Excitor-G-on-250x104.png 250w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\">Figure 1 G\/on Client Server Architecture<\/p>\n<p><a href=\"https:\/\/intranet.birmingham.ac.uk\/it\/innovation\/documents\/public\/Excitor-G-on-Evaluation.pdf\" target=\"_blank\" rel=\"noopener\">Read the full evaluation report.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The aim of this experiment is to evaluate the feasibility of replacing the secured laptops with computer-on-a-stick\u00a0(G\/On Solution) in some business circumstances. We aim to evaluate the G-On solution in the following areas in the experiment: \u2022 User Acceptance Testing: whether it is easy enough to use for end user \u2022 Reliability Testing: does the &hellip; <a href=\"https:\/\/blog.bham.ac.uk\/itinnovation\/2015\/05\/20\/excitor-gon-evaluation\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Excitor G\/On evaluation&#8221;<\/span><\/a><\/p>\n","protected":false},"author":96,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,6],"tags":[],"class_list":["post-228","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-projects"],"_links":{"self":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/comments?post=228"}],"version-history":[{"count":1,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/228\/revisions"}],"predecessor-version":[{"id":230,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/228\/revisions\/230"}],"wp:attachment":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/media?parent=228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/categories?post=228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/tags?post=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}