Real World Considerations for Implementing Desktop Virtualization
|
|
|
- Kevin Murphy
- 10 years ago
- Views:
Transcription
1 Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by
2 Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI vs. Session Virtualization... 3 What Makes Up a VDI Implementation?... 5 Be nefits of Desktop Virtualization... 6 Benefits for IT Desktop Admins... 6 Benefits for End Users... 6 Benefits for the Company... 7 Pros and Cons of Desktop Virtualization... 7 VDI Display Protocol... 7 VDI Persona Management... 8 VDI Storage Management... 8 Summary... 9 i
3 Copyright Statement 2012 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at [email protected]. ii
4 Introduction to Desktop Virtualization for the IT Pro Since the creation of the traditional desktop computer, administrators and end users alike have appreciated the computing power but have been frustrated by the associated expense, complexity, and security issues that result from desktops used in the enterprise. These issues are caused not from lack of investment by the business or lack of effort by administrators but simply by how desktop computers are designed. With traditional desktops: All processing and most storage is on the local desktop Operating systems (OSs) and applications are installed individually, imaging software is used, or remote installation is done Roaming profiles are employed for user customization File shares are used for storage Applications and OSs are updated with a software deployment tool This design is inefficient and everyone pays the price. Organizations end up with: Too many desktops to easily deal with Too much time spent administering those desktops Too many application updates A never ending desktop life cycle replacement process Issues with roaming users and remote access Frustrated end users Exhausted desktop admins There is a better way! The solution is desktop virtualization. 1
5 What Is Desktop Virtualization? With desktop virtualization, administrators deliver end user desktops as a managed service from the company data center. For those in IT, the thought of offering controlled and reliable services from the data center is a comforting feeling and a solution to the problems with traditional desktops. How does it work? With desktop virtualization (specifically VDI, or virtual desktop infrastructure), your end user desktop computers are virtualized and run as virtual machines, on your servers, in the data center. For those familiar with server virtualization, the end user desktops run on the hypervisor just like virtualized servers. The end user virtual machines contain the user s OS, applications, personalizations, and data, as Figure 1 shows. Figure 1: Desktop virtualization. What makes desktop virtualization different from server virtualization is that the end user virtual machines (desktops) are accessed remotely, over the network, using a remote access protocol such as Remote Desktop Protocol (RDP) or PC Over IP (PCoIP), as Figure 2 shows. 2
6 Figure 2: In VDI, end user virtual machines (desktops) are accessed remotely, over the network. Something else that makes VDI different from server virtualization is the VDI connection broker. This specialized piece of software is what controls what user or device will access what virtual desktop (the virtual machine running on the hypervisor) or pool of desktops. Desktop, laptop, or thin client devices can all be used to access the virtual desktops, running as virtual machines, on top of the hypervisor, in the data center. Those devices could be very close, on a local area network (LAN), or around the world, connected via the Internet, virtual private network (VPN), or private wide area network (WAN). VDI vs. Session Virtualization There is a lot of confusion about VDI versus session virtualization. With VDI, each user or device has its own virtual machine that contains an OS, applications, data, and persona/user customizations. With session virtualization, a physical server is loaded with an OS, session virtualization software, and end user applications. The OS and applications are then shared by the users connected to that host (see Figure 3). 3
7 Figure 3: Comparison of session virtualization and VDI. This sharing of the OS and applications (which is typically unsupported by application vendors) can cause problems, as the applications were never designed to be shared. In addition, one end user can cause performance issues or even crash an entire physical server that is being shared with session virtualization. Despite this, virtualization is popular for specific use cases. Namely for a large group of task based users that need access only to the same few applications. If there is no customization of applications for end users, and a very short list of applications can be delivered to a large group of similar end users, session virtualization can be a good fit. Also, because all users are sharing the same host OS and applications, you can get more session virtualization user connections per host than with you can with VDI. The problem that most companies run into with session virtualization (and the same problems I have experienced) is that, initially, end users start off being task oriented and, later, you find out that they need many more custom applications than originally indicated. Unexpected actions by end users can slow down other users (or all users on a server), and even, in some cases, bring down the server. I know first hand that tracking down and troubleshooting these types of issues is a very painful process for admins and end users alike. 4
8 Although VDI will use more server resources than session virtualization will use, by each user getting their own connection (OS and applications), there is no chance of them making trouble for other VDI users. It s easy to install and offer custom application. For these reasons (and more), VDI is a much more reliable, robust, and secure solution than is session virtualization. What Makes Up a VDI Implementation? You might be wondering what makes up a desktop virtualization implementation. Chances are that you have many of the pieces already in your data center. Consider the illustration in Figure 4. A VDI setup includes: Figure 4: Example VDI. Infrastructure Traditional physical servers, storage, and network equipment in the data center Hypervisor Running on top of the physical severs VDI broker A specialized piece of software that directs end user devices to their virtual desktop Thin clients/desktops with software/mobile devices The end user client devices OSs and applications Installed inside each virtual desktop, you have common end user desktop OSs and applications End user customizations The end users (with their desktop customizations) are the reason you re building a VDI 5
9 Benefits of Desktop Virtualization By using desktop virtualization, administrators, end users, and organizations will gain many benefits. The following sections explore how desktop virtualization benefits organizations. Benefits for IT Desktop Admins Daily, IT admins struggle with patching, updating, securing, and tracking end user desktops. The solution to these struggles isn t a new desktop management tool. The remedy is to change the design of desktop infrastructure to a more intelligent design. The following list highlights ways that desktop virtualization can help IT desktop admins: Patching Keeping applications up to date will no longer require sending updates to many machines over the network (and sometimes having to roll back the updates due to failed updates and application conflicts). With desktop virtualization, thanks to its link to application virtualization tools, admins can run different versions of the same application concurrently and update an application simply by replacing the application package. Deployment No longer will admins have to manually build desktop PCs and painfully deploy them to end users. Desktop virtualization provides the ability to simply clone a golden image to create a new virtual machine. That virtual machine can then be linked to by all end users virtual machine disks. Only the changes from the original virtual disk will be saved and will consume disk space. End users can easily access their virtual desktop using any form of thin client device including software clients on desktops, laptops, tablets, or thin client devices. Disaster recovery All virtual desktops are stored in the data center, making backup, recovery, and disaster recovery (DR) of desktops and virtual machine files easy. Thanks to the separation of end user data from apps and the OS, only end user data needs to be backed up. Benefits for End Users Not only will IT benefit from desktop virtualization but so will end users. Although end users might not know to ask for desktop virtualization by name, they will enjoy the benefits once they try it. End user benefits include: Identical user experience on every device Regardless of whether they are at their desks, on laptops, using tablets, or at home, end users get the exact same desktop customizations, applications, and data. Plus, unlike remote access with a VPN, desktop virtualization will deliver predictable performance no matter what end users do. Gain new application and OS updates faster Desktop virtualization makes it much easier to test and deploy new applications, enabling end users to gain access to the latest applications and OSs without delay. 6
10 Fast deployment for new users When one or multiple new employees start at a company, all they need is a thin client device to begin using the same applications as everyone else. No longer is there a long wait to order a new desktop PC, configure the OS, and install applications. Plus, users can bring their own device (BYOD) and immediately get to work, thanks to desktop virtualization. Benefits for the Company With IT desktop admins and end users enjoying the benefits of desktop virtualization, the organization as a whole gains: Agility With end users able to access the same applications and data no matter where they are, and IT able to deploy new desktops in a few minutes, the business has the ability to quickly bring up new employees on company applications and move employees around to whatever office works best. Standardization All companies appreciate the efficiency of standardization. Desktop virtualization standardizes the applications, access, and experience of end users while making IT more efficient. Security The additional security offered by desktop virtualization means that IT (and the company) retains control and are able to secure company data in the data center. Pros and Cons of Desktop Virtualization Every business choice must consider the good and bad. Desktop virtualization is no different. The following list highlights pros and cons of desktop virtualization: Pro Streamline IT desktop management, making IT desktop admins more efficient Pro Provide the business with agility, scalability, standardization, and security Pro Offer a consistent user experience that reduces support calls while giving end users greater flexibility Con Initiative is needed by IT to learn, pilot, and deploy this more intelligent and efficient design for end user desktops Con Business leaders must be open to change in order to leverage the power of desktop virtualization VDI Display Protocol Unlike a traditional desktop where the display, keyboard, and mouse are all local, a VDI requires a special display protocol. The job of the display protocol is to send the virtual desktop s display to the end user device (whatever that might be) and to receive (from the end user device) back on the virtual desktop computer in the data center. 7
11 The VDI display protocol needs to be fast and efficient. If a user is watching a video or making updates to a presentation, the user expects the display to perform as well as it did on a physical desktop, even if the user is working across the country, thousands of miles from the actual virtual desktop. Additionally, as there could be very limited bandwidth at remote locations (like a coffee shop or hotel), the display protocol must be efficient on the bandwidth that it uses and what it sends across the network. VDI Persona Management Personas are end user desktop customizations such as a change to the desktop background or the speed that the mouse moves. Traditionally, these types of changes were stored in the OS and then, wherever the user logged in, these changes were downloaded and applied. However, as users move around to different devices or work remotely, it is common to have trouble with this legacy method. By having persona management built into a desktop virtualization solution, IT admins no longer have to rely on the OS to preserve and apply these important end user customizations. Persona management preserves user profiles and dynamically synchronizes them with a remote profile repository. VDI Storage Management As desktop virtualization implementations grow, intelligent management of virtual desktop storage is crucial. Virtual machine disk files must be linked to a single golden image so that your disk utilization doesn t grow proportionately to the number of virtual machines you add. Also, efficient caching, virtual disk reclamation, and coordination with hardware storage all become critical to ensuring that something like a mass power on or antivirus storm doesn t slow the performance of your desktop virtual infrastructure. VDI desktops are stored in shared storage used by the virtual infrastructure; thus, shared storage needs to be taken into account. Although it s possible to store VDI desktops on local storage, such as virtualized servers, VDI desktops are typically stored on SAN or NAS storage. With VDI having greater I/O demands than traditional do virtualized servers, new specialized VDI solutions have come to market. They include solid state drives(ssds) only storage and tiered SSD storage, both of which offer the much better I/O performance than dedicated SS or tiered SSD storage. 8
12 Summary Implementing desktop virtualization is one of the best moves an organization can make, as it offers so many benefits for desktop admins, end users, and companies as a whole. Built on top of a solid virtual infrastructure and hypervisor, a VDI setup utilizes a VDI broker to connect end user devices to their virtualized desktops. As not all VDI solutions are equal, you ll want to make sure that the solution you choose offers advanced features such as a robust display protocol, persona management, and advanced storage features. Additionally, keep in mind that VDI is not only a technology solution but also a business solution. As part of your VDI proof of concept, you ll want to ensure that you achieve business buy in. That business buy in will be crucial as you deploy VDI across your organization. 9
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Virtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
Data Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
How Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
How the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
The Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
Why Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
Controlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
Becoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
The Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
Realizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Auditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
Collaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones, Series Editor For
The Definitive Guide to Cloud Acceleration
The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential
Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
Quickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
IBM FlashSystem and Atlantis ILIO
IBM FlashSystem and Atlantis ILIO Cost-effective, high performance, and scalable VDI Highlights Lower-than-PC cost Better-than-PC user experience Lower project risks Fast provisioning and better management
Simplify VDI and RDS Private Clouds for SMBs
PRODUCT BRIEF Simplify VDI and RDS Private Clouds for SMBs VDI Private Cloud Konect Elite is an application and virtual desktop delivery software that offers the ability to dynamically sync, create, configure,
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Using Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
How to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
Isolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
Microsoft Virtual Desktop Infrastructure (VDI) FAQ
Microsoft Virtual Desktop Infrastructure (VDI) FAQ Q1: What is VDI? A1: Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution that enables organizations to store and execute desktop
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
Account Access Management - A Primer
The Essentials Series: Managing Access to Privileged Accounts Understanding Account Access Management sponsored by by Ed Tittel Understanding Account Access Management...1 Types of Access...2 User Level...2
Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering
Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation
Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2
Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Enterprise Desktop Solutions: VMware View 4.5
C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform
Windows Server 2012 2,500-user pooled VDI deployment guide
Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
ROCKING THE CLOUD VDI AT SAINT PAUL COLLEGE. Najam Saeed Lisa Nguyen Rob Reiter
ROCKING THE CLOUD VDI AT SAINT PAUL COLLEGE Najam Saeed Lisa Nguyen Rob Reiter VDI Virtual Desktop Infrastructure Desktop Delivery Model User has access to a full desktop environment using Virtual Machine
W H I T E P A P E R M y t h s a n d R e a l i t i e s o f C e n t r a l i z e d V i r t u a l D e s k t o p A d o p t i o n
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R M y t h s a n d R e a l i t i e s o f C e n t r a l i z e d V i r t u a l D e
VDI Optimization Real World Learnings. Russ Fellows, Evaluator Group
Russ Fellows, Evaluator Group SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material
Desktop Virtualization and Storage Infrastructure Optimization
Desktop Virtualization and Storage Infrastructure Optimization Realizing the Most Value from Virtualization Investment Contents Executive Summary......................................... 1 Introduction.............................................
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
An Oracle White Paper July 2011. Oracle Desktop Virtualization Simplified Client Access for Oracle Applications
An Oracle White Paper July 2011 Oracle Desktop Virtualization Simplified Client Access for Oracle Applications Overview Oracle has the world s most comprehensive portfolio of industry-specific applications
Outgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
Remote Desktop Services
Remote Desktop Services White Paper November 2014 Maximizing the Value and Performance of QuickBooks Enterprise with Remote Desktop Services Formerly known as Windows Terminal Services, Remote Desktop
(VDI) William Stein, LHRIC. Jim Geueke, MainLine
Virtual Desktop Infrastructure (VDI) William Stein, LHRIC Jim Geueke, MainLine Why Desktop Virtualization? Central management of desktop images User receives a fresh image every time Easier Windows OS
Windows Server 2012 R2 VDI - Virtual Desktop Infrastructure. Ori Husyt Agile IT Consulting Team Manager [email protected]
Windows Server 2012 R2 VDI - Virtual Desktop Infrastructure Ori Husyt Agile IT Consulting Team Manager [email protected] Today s challenges Users Devices Apps Data Users expect to be able to work in any
Dell vworkspace Supports Higher Education s Desktop Virtualization Needs
Dell vworkspace Supports Higher Education s Desktop Virtualization Needs Prepared by Chris Lyman, Senior Systems Consultant Dell Cloud Client Computing Solutions Abstract As adoption of desktop virtualization
The Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
Eradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
Desktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
Server based computing An introduction to server based computing, its advantages and how it works.
Server based computing An introduction to server based computing, its advantages and how it works. This whitepaper explains the concept of server based computing and defines the main components of its
Automating Windows 7 Installation for Desktop and VDI Environments
Automating Windows 7 Installation for Desktop and VDI Environments Greg Shields Ch apter 8: Integrating Automated Windows 7 Installation into VDI Environments... 122 Ste p Fifteen: Integrating MDT into
How To Get A Client Side Virtualization Solution For Your Financial Services Business
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage [email protected]
Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage [email protected] Little video to start with... The Problem with Laptops Windows XP support is expiring
