The Virtualization Practice

Presentation Virtualization

Presentation Virtualization is an application delivery method that delivers users desktops and applications from a shared server, AKA server based computing. This method of delivering applications to users focuses upon running an instance of each Windows desktop operating system application i.e., Word, Excel, PowerPoint and Office for each user on a shared instance of a Windows Server operating system. ...
The most popular product in this category is Citrix XenApp and its predecessors which include Citrix Presentation Server, and Citrix MetaFrame. In the 6.0 releases of its products, Citrix bundled XenApp into XenDesktop. In the 7.0 releases of its products, XenApp has been made available separately again. Microsoft also has a product in this category – Microsoft Remote Desktop Services, but this offering is mostly used in smaller implementations that do not require the enterprise class features that Citrix offers.

DesktopVirtualizationIcon

In the virtualization marketplace, when a vendor expands its core business and attempts to grab a piece of the new market from an existing incumbent, the vendors view each other as competitors. In 2007, when Citrix purchased XenSource, VMware vSphere clearly became the enemy, and Citrix envisioned that XenServer + XenApp/XenDesktop would take over the…

DesktopVirtualization

In March 2013, Citrix announced they had GPU sharing working and available for XenApp (multi-user/RDS). In December 2013, they announced it was available for XenDesktop (multi-OS/VDI). This has been a major barrier to adoption for many companies that need the ability to deliver a high-end multimedia experience to their end users in order to gain…

ApplicationVirtualization

Virtualizing applications is simple, right? After all, Microsoft Office can be installed or packaged in a matter of minutes, so all apps must be this easy. And via a tool like Citrix App Orchestration, the application can be published, secured, and presented to users auto“magic”ally. Thus, application virtualization professionals must have easy jobs, right? 

VDI (virtual desktop infrastructure) has long been predicted to be a growth area. This year, the technology has started to edge towards adoption in newer segments, segments in which it has not had significant traction in the past. But will this continue to be the case? Is VDI the computing environment of the future, or just a stepping-stone to another environment altogether?

HP100x30

HP announced the newest addition to the top of their thin client device line. The t820 series focuses on delivering the highest level of performing thin clients, targeting users that historically have not been able to use thin clients in the past. In a press release on August 19th, “There is new and growing demand in today’s market for quad-core processing and multimedia graphics on thin clients,” said Jeff Groudan, marketing director, Thin Clients, HP. “With the HP t820, we’ve delivered a more advanced thin client solution to give companies the speed and performance required for their most demanding applications.”

DesktopVirtualization

As you can probably tell from the title, Citrix is leveraging their biggest advantages in the mobility/BYOD race: their understanding of ALL client operating systems, multimedia in both SBC and VDI environments, and their established partnerships with hardware and OS vendors. In a conversation (you can listen to it yourself by clicking the audio file above) I had with Chris Fleck, VP Mobility & Alliances at Citrix (@chrisfleck), we spent an hour talking about the various methods Citrix has decided to use to manage mobile devices in both multi-user and multi-OS virtual environments, while extending their function from consumption to productivity. Oh, yeah, they have also changed their product and technology names to reflect their commitment to mobility; shocking I know.

DesktopVirtualization

The recent events surrounding the treacherous activities of Edward Snowden should make most of us think long and hard about the measures we are taking to secure our corporate data. Are we giving our administrators too much access? Do we fail to audit and report on how the data is being accessed and used? Is our data just too mobile? Unfortunately the answer to all three of these is yes.