Chasing the Mobile Desktop: How to Tame your Distributed Desktop Environment

Size: px
Start display at page:

Download "Chasing the Mobile Desktop: How to Tame your Distributed Desktop Environment"

Transcription

1 1 Table of Contents Executive Summary... 1 Desktop Management Checklist... 2 Traditional Desktop Systems Management... 3 PCLM Challenges... 4 PC Backup and Restore Challenges... 6 Desktop Virtualization... 7 Desktop Virtualization Challenges... 7 Extending Desktop Management to a Remote and Mobile Workforce... 9 Distributed Desktop Virtualization Chasing the Mobile Desktop: How to Tame your Distributed Desktop Environment Executive Summary Distributed organizations have unique desktop management challenges. End users span the globe, are often offline or connected via higher latency links, and typically have administrative privileges that can lead to a more unstable PC environment. Emerging technologies show promise for reducing desktop TCO, but assessing how they will work in a distributed environment is critical. This white paper surveys existing and emerging approaches to desktop management in the enterprise, covering both traditional systems management methods, as well as newer desktop virtualization technologies. We will discuss their advantages and shortcomings of each approach, and propose an alternative paradigm to desktop management that attempts to reconcile the conflicting needs of user experience and mobility vs. centralized management and control. Page 1

2 2 The Scope of Desktop and Laptop Management Tasks The management of desktops in the distributed enterprise encompasses all tasks related to keeping the desktops functional and their users productive. In this white paper, we focus on the tasks that can be automated with a desktop management system. When considering a desktop management solution, one should consider whether it addresses the following checklist of capabilities: Deployment, Migration and Retirement OS deployment and provisioning What are the tools and process for deploying the OS to newly provisioned machines, including delivery, boot and system configuration? Single image management Can you configure, update and patch a base image, consisting of the OS and a core set of applications that are common to some or all users? Hardware and OS migration/refresh Can you refresh the hardware while retaining user data, user-installed applications, and environment?; What is the process for migrating existing desktops to a new operating system (e.g., XP to Win7)? Archival of the desktop environment When de-provisioning hardware or when users leave the company, can you retain a copy of the user environment? Management and Operations Asset management What tools are available to track and manage software licenses, devices and inventory? Software distribution What process, tools and infrastructure are required to deliver application packages to all users, both LAN connected and distributed? Update and patch management How are endpoints updated with applications, drivers and OS patches? Compliance management Can you ensure that endpoints comply with corporate policies, including applications (black lists and white lists), versions, patches, and malware? Support Helpdesk operations What tools are available to helpdesk staff identify end user issues quickly? Break/fix, troubleshooting What methods and tools are available to help troubleshoot and quickly fix problems reported by end users? Remote control Can helpdesk staff remotely access an endpoint to troubleshoot a device? Restore from a snapshot Can a desktop be restored to a last known working configuration, in case of malware or software problems that reduce user productivity? Page 2

3 Backup and Continuous Data Protection Disaster recovery (system level ) Can a user be restored to a fully operational state after a laptop is lost, stolen or broken including user-installed applications, user data, and personal settings? What level of downtime is acceptable? Backup/restore (file level) Can end users restore individual files/directories that were deleted by accident, or retrieve older versions of files? Does this require helpdesk intervention? Restore persona (different desktops) Can a user s full environment be restored onto a different desktop environment (different hardware, virtual hardware, etc.?) Once core capabilities are defined, a desktop management system can then be evaluated against the following characteristics: 1. Coverage How comprehensively does a solution address the above functions? 2. Support for distributed users How effective are these solutions for users who are connected to the enterprise through VPN and/or WAN connections, and what is their user-experience, both during regular end user operation as well as during the management system s operation? For example, how quickly can IT get an end user back to full productivity after restoring a desktop over a WAN? Another consideration would be to determine how effectively a distributed user s desktop could be repaired or updated with latest patches? 3. TCO How much IT labor is necessary to perform management tasks (Opex), and what infrastructure (storage, servers, network, etc.,) is required to make the system optimally functional (Capex)? 3 Traditional Desktop Systems Management Managing desktops in the enterprise has traditionally been addressed by two types of disparate and non-integrated systems: PC Lifecycle Management (or PCLM 1 ) PC backup and business continuity systems PCLM systems are used to manage the desktops in a centralized and automated fashion. They are typically comprised of a suite of loosely-coupled tools with some common management that facilitates integration of the individual tasks into a controlled and monitored workflow. A typical PCLM system is comprised of the following components: Desktop agent(s) One or more thick services that execute at the endpoint and carry out various tasks related to the management/operations category. For example, the agent performs inventory 1 Gartner has recently termed this category PC Configuration and Lifecycle Management (PCCLM) Page 3

4 tracking and periodic scanning of the desktop to check for compliance with corporate policies. The agent is also responsible for receiving application packages (new or updates) from the server, installing them locally on the desktop, and reporting on the outcome of the installations. Management server The systems back-end that controls the management of the endpoints, including the distribution of software, collecting and controlling the asset management data, and providing the tools to construct and manage the images for deployment purposes. Note that the server does not contain any instance of the data or the meta-data of the endpoint, only a template to be distributed to a group of endpoints. OS deployment tool Typically provided as a separate tool intended to manage the first time provisioning of images to endpoints, or migrating users to new endpoints during a hardware refresh. This subsystem includes tools to construct the common image, a pre-installation environment, as well as definition of sequencing events that tailor the image to the specific hardware by executing scripts at the endpoint during different phases of the installation. Once an image has been deployed, all consequent updates to that endpoint are incremental and may vary from endpoint to endpoint, as users install their own applications and settings. Branch Proxy Infrastructure nodes that are used to push large data files to branches so that endpoints can read these large files from their local proxy instead of across a WAN. A typical PC backup/restore systems is comprised of the following components: Backup/restore desktop agent An agent that executes on the desktop and is responsible for tracking changes made by the user or the system, and uploading the changes efficiently to a backup server. Upon restore, the agent restores individual files (typically in a self-service mode) or an entire system (typically with the assistance of IT) back to operation. Backup/restore server The counterpart to the backup/restore agent, responsible for storing the desktop files efficiently and for restoring data to the endpoints, either in a file-level fashion, or for the entire system. 3.1 PCLM Challenges While PCLM systems have been in use for many years, they have several major architectural drawbacks, especially when managing mobile laptops and knowledge workers in distributed enterprises Challenge: Image Sprawl As mentioned above, a controlled image is deployed once to an endpoint, and from then on each endpoint evolves in its own way as different users (or IT administrators) install a variety of applications on the endpoints. Over time, the individual image contents diverge, leading to what is known as an image sprawl with the following downsides: PC instability: As users install applications and patches, the system has a higher likelihood of becoming unstable over time. Less stability means less user productivity, and more calls to the helpdesk. Troubleshooting complexity: Since PCs deviate from the originally deployed image, it is harder to troubleshoot a problem when a desktop is not functioning properly, since any of Page 4

5 the added applications could have contributed to the problem, and because there is no comparable system in the data center with which to experiment and understand the issue. Support escalations: Slow resolution of a user s problem can result in escalations to more expensive support resources Challenge: Delivering Software and Updates to Remote Users PCLM systems often rely on endpoints being connected to the corporate Intranet, and are not suitable for operation over a VPN connection or directly over the Internet. However, many remote users such as road warriors or outsourced employees that work at another company do not bother to connect to their corporate Intranet, and even if they do, the VPN connections are often limited in duration and in bandwidth. As a result, those desktops are often poorly managed. Another issue with managing distributed users is related to software and patch distribution. Typically, PCLM systems rely on proxy servers in order to perform the updates within a reasonable time and without requiring undue bandwidth. Since remote users often do not have access to branch proxy servers, the software updates or patches never make it to the end user, or take a very long time to occur, often resulting in calls to the helpdesk related to timeouts and connection failures in the midst of a PCLM operation. Recently, some PCLM systems started to introduce Internet-based client management systems. However, they offer very limited functionality (e.g., no support for client/os deployment, software distribution) and no support for network optimizations to enable effective management for remote users Challenge: Limited Break-Fix and Support Tools PCLM systems do not provide effective tools for IT to improve helpdesk operations and reduce user downtime. For example, there are no good tools to clean up a faulty machine and get it back into a working state by restoring it from snapshot, or by enforcing a good corporate image on the endpoint, without wiping out user personalization. Lack of support tools is even more painful when supporting remote users. As an example, consider the following scenario: In many organizations there is a threshold, typically minutes, after which a helpdesk employee stops trying to fix a PC problem and resorts to re-imaging the desktop with a fresh base image. This procedure is a painful process from an end-user perspective, because it means that all applications that were installed on that desktop on top of the base image are removed and must be reinstalled by the user. Furthermore, any user data on the desktop would need to be restored from the PC backup system (assuming it was backed up in the first place, including all environment and settings). Last but not least, re-imaging is both problematic and impractical for distributed WAN users, since sending a multi-gb image over the WAN is both time and bandwidth intensive. Alternatively, image servers must be deployed at the edges of the network, but this is a costly infrastructure and adds complexity to the PCLM system. In lieu of image servers at the branches, IT can ship DVDs or portable hard drives with the restore material, but this process is slow, vulnerable from data protection perspective, and usually leaves the user without PC access for days Challenge: Complexity of PCLM Agents and Contention with User Applications Page 5

6 A typical PCLM solution employs multiple agents on the desktop including agents for asset management, system recovery, remote access, and for patch, update and software delivery management. Furthermore, most of these agents perform heavy computation on the endpoints. For example, a typical PCLM agent performs scanning for asset management and confirms installation of all software packages, which might contend for machine resources with user applications. More generally, the proliferation of uncoordinated heavy desktop agents impacts both the performance and stability of the desktop operation. In a sense, the complexity and execution overhead of these management tools defeats the purpose for which these tools were constructed to improve the quality of the user experience with respect to desktop usage. 3.2 PC Backup/Restore Challenges for Distributed Desktops Challenge: Full Desktop Restore Most PC backup systems focus on file level restores. Some provide system-wide restore on a separate hidden drive on the desktop, and a few can offer a whole system backup that is stored on the backup server. However, all systems are challenged when restoring a whole desktop environment to WANconnected users, due to the sheer amount of data that needs to be transferred, and the impact on user downtime. Further, most systems lack automation for full desktop restore, often requiring user access to boot-media and additional IT-support. Finally, none of these systems offer an automated full desktop restore (including user-installed applications, user data and settings, and corporate image) onto a different hardware platform, or into a virtual machine, (e.g., to enable temporary access to his/her desktop via a virtual machine until a physical device becomes available and is shipped to the user. ) Challenge: Snapshot Restore PC backup systems typically maintain multiple versions of specific files in the backup server, but they do not maintain complete snapshots of the entire desktop, including user-installed applications and system configuration. Hence, if the desktop gets corrupted (e.g., due to malware, or due to an application that was installed and is incompatible with the rest of the system) there is no good way to revert the desktop to last known working state from, say, a week ago Challenge: Backup Performance PC backup agents perform scanning of the desktop to check for updates, which impacts system resources on the desktop and often prompt end users to disable the service. To reduce this intrusion the frequency of the backup interval is typically limited to once a day at most. 4 Desktop Virtualization Desktop Virtualization (DV) is a new approach to desktop management that has gained traction in recent years. In this approach, IT can centrally manage and deploy desktops on virtual machines, which abstract the hardware and lead to a common machine image that is stored in a file (e.g., VMDK or VHD virtual disk format). This image can then be delivered to (virtual) endpoints. For a DV product to be considered Page 6

7 a desktop management solution, it must also address the functional requirements listed in Section 2. For example, a DV solution should have an image management sub-system for constructing, configuring and delivering desktop images to virtual endpoints. In addition, on-going incremental updates to the images in the form of software and patch updates and application delivery should be supported. Finally, a comprehensive solution should include an integrated method for data protection and business continuity. There are two main types of desktop virtualization: Server-based DV Whereby the desktops execute in the data center on a pool of virtual machines, and are accessed by users via a thin-client protocol such as RDP or ICA. Such systems use a connection broker, which is an intermediary system component that accepts user requests, authenticates them, and provisions a virtual machine (possibly on-demand) loaded with the user s virtual desktop. In addition, a system for managing a pool of VMs to match the needs of end users and overall system load must be in place. Server-based DV is particularly relevant in LAN environments with fixed connectivity and can be effective for task workers, who often access limited application sets and have minimal requirements to keep data on the desktop. Client-based DV In this model, the desktop image (also referred to as a guest OS) executes on a virtual machine that is hosted on the client endpoint, as opposed to running in the data-center. One relevant use case for client-based DV is when the physical desktops are owned and managed by the end-user (also known as Bring Your Own PC, or BYOPC). Another use case is for third party contractors that need temporary access to a corporate PC to conduct their work. They are, however, less relevant for enterprise-owned PCs, where IT needs to manage both the PC and the native operating system. Client-based DV can be further classified into two types: o Type-2 Hypervisor The virtual machine runs as a process on top of a standard host operating system such as Windows or Mac-OS. The underlying host OS is completely unmanaged and not part of the DV solution. Because the OS is completely abstracted from the hardware, type-2 hypervisors offer more portability. o Type-1 (bare metal) Hypervisor The virtual machine runs on a specialized OS (e.g., Xen) that executes on bare-metal hardware and is dedicated and optimized to execute VMs. Type-1 hypervisors allow for faster access to the hardware and they can offer better security. 4.1 Desktop Virtualization Challenges While Desktop Virtualization is effective for certain use cases as described above, it introduces many challenges, especially when applied to distributed laptop users Server-Based DV Challenges User-experience for distributed and mobile knowledge workers While today s server-based DV systems can offer adequate user experience for task workers that are connected over LAN and use simple applications, they do not provide reasonable user experience for distributed and mobile knowledge workers, who are often connected over WAN and VPN connections, use sophisticated applications (e.g., enhanced graphics) and consume rich media. Page 7

8 o Predictable performance Users don t want to depend on the network for every keyboard stroke or mouse movement they make, especially when they are mobile or connect from different networks to the data center. o Offline Many laptop users must be able to operate offline when not connected or when connectivity is intermittent or slow. Workflow consistency Server-based DV is a different paradigm for end users that can require a complete shift in how they work. Further, the transition from thick to thin clients requires many significant changes in IT process. Compute and storage infrastructure build out - Server based DV requires significant infrastructure build-out in both compute and storage resources, since all desktops now need to execute in real time, as well as be stored in the data center Client-based DV challenges Image Size: A major challenge in client-based DV is how to maintain and deliver a large multi-gb virtual machine image to remote endpoints over the WAN. Backup over WAN: A similar challenge exists for data protection how to continuously and efficiently protect remote/mobile laptops over WAN, especially for knowledge workers who generate large files in their desktops and install their own applications. Type-2 Hypervisor-specific issues: There are a number of challenges that are specific to a Type- 2 hypervisor, including: o Unmanaged Host OS This model leaves the underlying host OS unmanaged, yet the operation of the guest-managed OS depends on the health of the host OS. Furthermore, IT still needs to manage the host OS in many cases (e.g., using traditional systems management software), so the fundamental desktop management problem remains unresolved. o Security A compromised host OS can make the guest OS vulnerable to security attacks. o Performance Since the guest VM/OS runs as a process, its performance is degraded every access to devices needs to be translated via the host OS. Furthermore, each OS needs to run anti-virus and other infrastructure software, further taxing the shared CPU. Type-1 hypervisor-specific issues: Additional challenges that are associated with Type-1 hypervisors include: o General availability One of the main challenges in type-1 HV is lack of wide support for drivers (especially paravirtualized drivers, which are optimized for a type-1 environment), particularly in the mobile laptop world with many unique devices such as power status, GPU access, multi-touch pointers, and fingerprint readers. In addition, most type-1 hypervisors require hardware assisted virtualization, which is not available on all hardware platforms. o Deployment Deployment is generally harder than with type-2 hypervisors because the type-1 needs to be installed on the bare-metal, wiping out the previous image, and then the managed OS must be re-deployed on top of the type-1 HV. o Managing the hypervisor The Hypervisor OS still needs to be managed and maintained in addition to the managed host OS. Page 8

9 4.1.3 Common DV Challenge: Supporting Single Image Management with User Personalization A basic premise behind DV-based management is the provisioning and management of virtual PCs, which are essentially virtual disk images encapsulated in a VMDK (or VHD) file. This approach allows IT to create a common image for all endpoints (unlike physical devices in which images differ based on the hardware configuration of the target device). However, the delivery of whole VMs implies that these systems cannot cope with any persistent changes made by the user. For example, if a user installs an application on top of the provisioned VM, the application would be kept on a delta disk, which together provides a uniform view of the modified virtual disk. However, if the IT administrator changes the common VM image and distributes it to the endpoints, any changes made by the user will be removed. In other words, there is typically no support for merging persistently user-installed changes that must exist in the system virtual machine disk. This challenge exists in both server-based and clientbased DV. 5 Addressing the Desktop Management Challenges As we observed, traditional systems management solutions, which can be effective in LAN-based settings, are complex to manage, interfere with end-user operations, lack integrated support for backup, continuity and support, and are particularly challenging when supporting distributed users. DV solutions improve on some of the issues by keeping and managing the desktop instances in the datacenter, enhancing protection, support, security and continuity. However, they introduce a new set of challenges, particularly for endpoints that are mobile and distributed, including offline support, performance, user-experience over WAN, personalization preservation, disruption to existing models, and high cost of the overall solution. A key question is whether a third solution category can be found. This paper claims there is such model, as highlighted below. 5.1 Cloud Desktop Management This new approach reconciles the seemingly conflicting requirements of centralization and userexperience. Instead of moving the entire desktop to the data center, including the physical compute resources and desktop image, as is the case with server-based DV solutions; or alternatively keeping the entire desktop at the end-point desktop, as is the case with systems management and client-based DV solutions the cloud-based desktop management model offers a third alternative. Specifically designed to address the needs of distributed organizations, cloud desktop management can uniquely: Migrate the complete image of each desktop instance (including OS, applications, and all user data), into the data center so that they can be managed and protected centrally. Use the physical compute resources at the endpoint to execute the desktop workloads on a secondary (or cached) copy of the desktop image giving the end user local execution, including performance, the ability to personalize, and operate offline. Page 9

10 Modularize the desktop image into three logical layers an IT-managed base image (OS and core IT applications), user-installed applications and settings, and user-data. Provide for efficient and consistent bi-directional synchronization between the centrally-stored and distributed desktop copies, in which the managed base-image propagates down to endpoints, while personally-generated data and user-installed applications continuously propagate up for backup and continuity purposes. Provide the capability to quickly reassign and stream the logical desktop onto different execution containers across geographical distances and over WAN, using optimizations and inplace image swapping technologies. Provide the capability to reassign logical desktops to different hardware platforms, as well as transition between physical and virtual machines. Leverage the endpoints already deployed, and ensure optimal efficiency across the network, server and storage infrastructure. The key advantage of this approach is in aligning the roles and responsibilities of the different types of users with their location and environment. That is, IT administrators can consolidate the management, protection and control of all desktop images in one location at the data center (in a similar fashion to what VDI systems offer), while end users execute the applications and access their personal data locally at the distributed endpoints (in a similar fashion to thick client environments managed by systems management tools), hence with good performance, offline capability, and native user-experience. While most organizations will harness a range of solutions to meet their varying needs, new solutions are available that are specifically designed to unify desktop management and data protection across distributed organizations. For more details on this architecture, visit Wanova.com. Page 10

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring

More information

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information

Desktop Delivery: Making Desktop Virtualization Work

Desktop Delivery: Making Desktop Virtualization Work Desktop Delivery: Making Desktop Virtualization Work Published: April, 2008 TABLE OF CONTENTS SUMMARY...2 CHALLENGES WITH TRADITIONAL DESKTOPS...3 DESKTOP VIRTUALIZATION OVERVIEW...4 DESKTOP VIRTUALIZATION

More information

Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER

Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER Storage I/O Performance on VMware vsphere 5.1 over 16 Gigabit Fibre Channel Table of Contents Abstract.... 3 The Problem with Windows

More information

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About

More information

The Power of One. A Wanova / Intel White Paper. 560 S. Winchester Blvd. San Jose, CA 95128 408-236-7440. wanova.com

The Power of One. A Wanova / Intel White Paper. 560 S. Winchester Blvd. San Jose, CA 95128 408-236-7440. wanova.com A Wanova / Intel White Paper The Power of One 560 S. Winchester Blvd. San Jose, CA 95128 408-236-7440 wanova.com July, 2011 2011 Wanova, Inc. All rights reserved. CONTENTS INTRODUCTION Introduction 2 Intelligent

More information

How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER

How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER Table of Contents. Introduction... 3 Intended Audience.... 3 What Is VMware Mirage?... 3 What

More information

Desktop Virtualization: A Buyer s Guide

Desktop Virtualization: A Buyer s Guide Desktop Virtualization Buyer s Guide Desktop Virtualization: A Buyer s Guide Published: May, 2008 TABLE OF CONTENTS INTRODUCTION... 2 A BRIEF OVERVIEW OF THE DESKTOP DELIVERY APPROACH... 3 User experience

More information

How bare-metal client hypervisors will mean the end of agent-based Windows management

How bare-metal client hypervisors will mean the end of agent-based Windows management How bare-metal client hypervisors will mean the end of agent-based Windows management Abstract... 2 Understanding the old (current?) way of managing desktops.... 2 How do companies manage desktops currently?...

More information

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center VMware Virtual Infrastucture From the Virtualized to the Automated Data Center Senior System Engineer VMware Inc. ngalante@vmware.com Agenda Vision VMware Enables Datacenter Automation VMware Solutions

More information

Protect sensitive data on laptops even for disconnected users

Protect sensitive data on laptops even for disconnected users WHITE PAPER A Citrix XenClient technical paper focusing on the security benefits of local virtual desktop technology for laptops Protect sensitive data on laptops even for disconnected users Use local

More information

Server-Hosted Virtual Desktop Infrastructure (VDI)

Server-Hosted Virtual Desktop Infrastructure (VDI) White Paper Server-Hosted Virtual Desktop Infrastructure (VDI) The Future of Desktop Computing 2007 Virtual Iron Software, Inc. -1- April 14, 2007 Introduction With the widespread adoption of personal

More information

IT@Intel. Developing an Enterprise Client Virtualization Strategy

IT@Intel. Developing an Enterprise Client Virtualization Strategy White Paper Intel Information Technology Computer Manufacturing Client Virtualization Developing an Enterprise Client Virtualization Strategy Intel IT is investigating virtualization because it has the

More information

Desktop Virtualization (VDI) Overview VMware Horizon View

Desktop Virtualization (VDI) Overview VMware Horizon View Desktop Virtualization (VDI) Overview VMware Horizon View Jim Rowland Senior System Architect and Project Manager Daly How do I maintain or improve desktop management when I m required to do more with

More information

Virtualization for Desktops

Virtualization for Desktops Red Hat Enterprise Virtualization for Desktops Delivering on the promises of Desktop Virtualization www.redhat.com TABLE OF CONTENTS 3 Benefits of desktop virtualization 3 Benefits for IT Departments 3

More information

Virtual Client Solution: Desktop Virtualization

Virtual Client Solution: Desktop Virtualization IBM System x and BladeCenter Virtual Client Solution: Desktop Virtualization Powered by and VMware View June 29, 2010 Agenda 1 2 3 4 5 6 Virtual client solution overview Addressing companies pain points

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Security and Data Protection with Intelligent Desktop Virtualization Bernd Harzog Analyst Virtualization Management January 2012 2012 The Virtualization Practice.

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

VDI can reduce costs, simplify systems and provide a less frustrating experience for users. 1 INFORMATION TECHNOLOGY GROUP VDI can reduce costs, simplify systems and provide a less frustrating experience for users. infor ation technology group 2 INFORMATION TECHNOLOGY GROUP CONTENTS Introduction...3

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

VMware End User Computing Horizon Suite

VMware End User Computing Horizon Suite VMware End User Computing Horizon Suite Luc Gallet lgallet@vmware.com 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work

More information

Frequently Asked Questions: Desktone s Offerings and Market

Frequently Asked Questions: Desktone s Offerings and Market Frequently Asked Questions: Desktone s Offerings and Market General Virtualization Q: What is desktop virtualization? A: Desktop virtualization is the separation of a client operating system/environment

More information

Rose Business Technologies

Rose Business Technologies Virtualization and Consolidation vs. Application Performance and WAN Optimization Virtualization and infrastructure consolidation can offer significant benefits for both IT and business operations. The

More information

WHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops. www.citrix.com

WHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops. www.citrix.com WHITE PAPER Citrix XenDesktop Cost savings with centralized virtual desktops www.citrix.com Introduction Centralized virtual desktops optimize the efficiency, security and flexibility of any PC environment.

More information

Outgoing VDI Gateways:

Outgoing VDI Gateways: ` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents

More information

Virtualization s Evolution

Virtualization s Evolution Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,

More information

Competitive Comparison Between Microsoft and VMware Desktop Virtualization Solutions

Competitive Comparison Between Microsoft and VMware Desktop Virtualization Solutions Competitive Comparison Between Microsoft and VMware Desktop Virtualization Solutions Introduction Virtualization has helped organizations reduce cost and increase efficiency in the datacenter, and new

More information

Accelerating Microsoft Windows 7 migrations with Citrix XenApp

Accelerating Microsoft Windows 7 migrations with Citrix XenApp Citrix XenApp and Microsoft Windows 7 White Paper Accelerating Microsoft Windows 7 migrations with Citrix XenApp XenApp will accelerate your Windows 7 migration, save money and resources, minimize disruption

More information

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends

More information

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows

More information

Using Live Sync to Support Disaster Recovery

Using Live Sync to Support Disaster Recovery Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

How Using V3 Appliances Virtual Desktop Total Cost of Ownership (TCO) is Reduced: A Superior Desktop Experience For Less Money

How Using V3 Appliances Virtual Desktop Total Cost of Ownership (TCO) is Reduced: A Superior Desktop Experience For Less Money How Using V3 Appliances Virtual Desktop (TCO) is Reduced: A Superior Desktop Experience For Less Money www. ipro-i nc.com/i t Contents VDI Overview...3 Introduction...3 Examining V3 s VDI...3 General Benefits

More information

Southwest District Health Nomination Narrative

Southwest District Health Nomination Narrative EXECUTIVE SUMMARY Southwest District Health was created by the Idaho Legislature in 1970. The mission of the Health District is to promote and protect the health of people and their environment in Adams,

More information

Take Back Control in IT. Desktop & Server Management (DSM)

Take Back Control in IT. Desktop & Server Management (DSM) Take Back Control in IT Desktop & Server Management (DSM) Table of Contents 1. Abstract... 3 2. Migrating to the virtual, fluid model of client computing... 4 3. Challenges in the new era of client computing...

More information

DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS

DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS International Journal of Computer Science Engineering and Information Technology Research Vol.1, Issue.1 (2011) 1-9 TJPRC Pvt. Ltd., DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS

More information

An infrastructure and virtualization company. a virtualization company

An infrastructure and virtualization company. a virtualization company Clint Adkins, Service Delivery Manager Cyndi Meinke, East Region Account Executive Larry Zimmerman, Senior Account Executive An infrastructure and virtualization company a virtualization company Company

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER

Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER Introduction This paper describes how GANTECH, a systems integrator specializing in virtualization, used

More information

Server-centric client virtualization model reduces costs while improving security and flexibility.

Server-centric client virtualization model reduces costs while improving security and flexibility. BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

What s New with VMware Virtual Infrastructure

What s New with VMware Virtual Infrastructure What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

Licensing Windows for Virtual Desktops

Licensing Windows for Virtual Desktops Licensing Windows for Virtual Desktops This document is intended to explain licensing Windows virtual desktops and how to calculate the number of licenses required for common usage scenarios. Contents

More information

Introduction. Setup of Exchange in a VM. VMware Infrastructure

Introduction. Setup of Exchange in a VM. VMware Infrastructure Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an

More information

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and

More information

Desktop Virtualization: New Business Opportunities with Cost-Effective, Flexible Desktops As A Service

Desktop Virtualization: New Business Opportunities with Cost-Effective, Flexible Desktops As A Service Desktop Virtualization: New Business Opportunities with Cost-Effective, Flexible Desktops As A Service Introduction Service providers and enterprises today are working to reach a shared goal: how to better

More information

Top 10 Myths of Desktop Virtualization

Top 10 Myths of Desktop Virtualization Top 10 Myths of Desktop Virtualization www.virtualcomputer.com Copyright Virtual Computer, Inc. 2011 Top 10 Myths of Desktop Virtualization The Myths 1. Desktop virtualization is costly and requires big

More information

EMA Product Brief: Desktop Virtualization with Quest

EMA Product Brief: Desktop Virtualization with Quest EMA Product Brief: Desktop Virtualization with Quest HIGHLIGHTS Vendor name: Quest Software Product name: vworkspace Production function: Desktop Virtualization Host Operating Systems Support: Windows

More information

Corporate PC Backup - Best Practices

Corporate PC Backup - Best Practices A Druva Whitepaper Corporate PC Backup - Best Practices This whitepaper explains best practices for successfully implementing laptop backup for corporate workforce. White Paper WP /100 /009 Oct 10 Table

More information

Virtualization in Enterprise Environment. Krisztian Egi

Virtualization in Enterprise Environment. Krisztian Egi Virtualization in Enterprise Environment Krisztian Egi Session Outline Virtualization technology overview Challenges in enterprise environment Q & A 2 Virtualization technology overview What s virtualization

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

Implementing and Managing Windows Server 2008 Hyper-V

Implementing and Managing Windows Server 2008 Hyper-V Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:

More information

Virtual Desktop Infrastructure

Virtual Desktop Infrastructure Virtual Desktop Infrastructure Improved manageability and availability spur move to virtualize desktops Many companies have turned to virtualization technologies for their servers and in their data centers

More information

Desktop Virtualization for the Banking Industry. Resilient Desktop Virtualization for Bank Branches. A Briefing Paper

Desktop Virtualization for the Banking Industry. Resilient Desktop Virtualization for Bank Branches. A Briefing Paper Desktop Virtualization for the Banking Industry Resilient Desktop Virtualization for Bank Branches A Briefing Paper September 2012 1 Contents Introduction VERDE Cloud Branch for Branch Office Management

More information

Augmenting VMware View Horizon (VDI) with Micro Focus Client Management

Augmenting VMware View Horizon (VDI) with Micro Focus Client Management White Paper ZENworks Augmenting VMware View Horizon (VDI) with Micro Focus Client Management Table of Contents page Making the VMware View Horizon Management Solution Work Beyond Your Wildest Dreams...2

More information

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing 1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control

More information

Getting Familiar with Cloud Terminology. Cloud Dictionary

Getting Familiar with Cloud Terminology. Cloud Dictionary Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

More information

Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide

Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide www.citrix.com Overview XenDesktop offers IT administrators many options in order to implement virtual

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

How To leverage VMware solutions for Manageability & Security of Desktop. Matteo Uva Channel Manager Italy and Greece

How To leverage VMware solutions for Manageability & Security of Desktop. Matteo Uva Channel Manager Italy and Greece How To leverage VMware solutions for Manageability & Security of Desktop Matteo Uva Channel Manager Italy and Greece Agenda 1. What is VDI & How can it help my customers? 2. Building a VDI solution 3.

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

Windows Server 2008 R2 Hyper V. Public FAQ

Windows Server 2008 R2 Hyper V. Public FAQ Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

How To Get A Client Side Virtualization Solution For Your Financial Services Business

How To Get A Client Side Virtualization Solution For Your Financial Services Business SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops July 2009 Table of Contents Introduction... 3 What are Outsourced Hosted Virtual Desktops?... 3 How Outsourced Hosted Virtual

More information

Enterprise Desktop Solutions: VMware View 4.5

Enterprise Desktop Solutions: VMware View 4.5 C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

TechTarget Windows Media

TechTarget Windows Media TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net E-Guide Desktop Virtualization: An Expert

More information

Red Hat VDI. David Simmons

Red Hat VDI. David Simmons Red Hat VDI David Simmons Senior Architect, Red Hat Virtualization AGENDA Open Source and the Evolution of Virtualization Desktop VDI Value Components Real VDI TCO The Future of the Desktop and the savings

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

www.rackwareinc.com RackWare Solutions Disaster Recovery

www.rackwareinc.com RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery Overview Business Continuance via Disaster Recovery is an essential element of IT and takes on many forms. The high end consists

More information

2009 AAMGA Automation Conference

2009 AAMGA Automation Conference 2009 AAMGA Automation Conference Kenny Morris, MCSE Manager of Network Services CRC Insurance Services, Inc. kmorris@crcins.com Server Infrastructure 170 servers 70% in Central Datacenter 25% of server

More information

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana 2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...

More information

What is virtualization

What is virtualization Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them

More information

CLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS

CLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE... 2 4 TAILORED INFRASTRUCTURE... 3 5 COMPUTE... 3 6 SECURITY... 9 TELSTRA GLOBAL. Cloud Services (Infrastructure) Part C updated as

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents P h y s i c a l V i r t u a l - C l o u d Securing Your Journey to the Cloud Managing security across platforms today and for the future Table of Contents Executive summary 1 Journey to the cloud varies,

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost

More information

A New Strategy for Data Management in a Time of Hyper Change

A New Strategy for Data Management in a Time of Hyper Change 1 A New Strategy for Data Management in a Time of Hyper Change 2 Everyone Claims to Do Data Protection How Do Enterprises Protect Data Today? In Medium to Large Enterprises, traditional backup is today

More information

Grant Aitken. Area Vice-President VMware Canada (B) 905 470-0235 (M) 416 566-2693 gaitken@vmware.com

Grant Aitken. Area Vice-President VMware Canada (B) 905 470-0235 (M) 416 566-2693 gaitken@vmware.com Grant Aitken Area Vice-President VMware Canada (B) 905 470-0235 (M) 416 566-2693 gaitken@vmware.com 1122 International Blvd Burlington ON L7L 6Z8 Canada 1 The Problem 5% Infrastructure Investment Where

More information

Increasing Your VDI Project s Return on Investment Using Workspace Virtualization

Increasing Your VDI Project s Return on Investment Using Workspace Virtualization W H I T E P A P E R Increasing Your VDI Project s Return on Investment Using Workspace Virtualization W H I T E P A P E R Increasing Your VDI Project s Return on Investment Using Workspace Virtualization

More information

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers What You Will Learn This document describes how you can use Cisco Wide Area Application Services (WAAS) Software

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Virtualization Support - Real Backups of Virtual Environments

Virtualization Support - Real Backups of Virtual Environments Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in

More information

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course 6437A : Three days; Instructor-Led Introduction This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual

More information

Virtualization and Windows 7

Virtualization and Windows 7 9 Chapter Virtualization and Windows 7 Information in this Chapter Windows XP Mode Many Forms of Virtualization Summary Windows Virtual PC is an optional component of Windows 7 Professional, Enterprise,

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops January 2015 Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops Executive Summary Physical desktop and notebook computer infrastructures no longer make sense for the corporate

More information