Citrix Remote PC: VDI complexity solved, or a kick start to a VDI project?

synergyAt Citrix Synergy in Barcleona, I got to have a look at Citrix’s latest addition to the FlexCast technology stack, Citrix RemotePC. Citrix RemotePC was released as part of Citrix XenDesktop 5.6 Feature Pack 1. While XenDesktop is Citrix’s hosted desktop solution, but Citrix Remote PC is not a virtualised desktop. Citrix Remote PC is secure brokering of a physical Windows endpoint (be that a desktop or a laptop) in your office, via Citrix’s HDX technology. Continue reading Citrix Remote PC: VDI complexity solved, or a kick start to a VDI project?

Move to the Cloud: Wait Out the Storm

VirtualizationBackupThe east coast is experiencing the tail end of a very large storm named ‘Sandy’. We all had plenty of time to prepare for the storm, but did we? Individually, we probably did, but what about our data? Those 24/7 critical processes to allow our customers to view and respond to the data our organizations provide? We were lucky—we had no issues during the storm, but now we await issues during storm clean up. So how do you prepare for such disasters? Do you move to the cloud? Continue reading Move to the Cloud: Wait Out the Storm

Dell Planning New Storage Tech for 2013

DataCenterVirtualizationDays after announcing its converged infrastructure platform, the Active System 800, Dell is already dropping hints about its future development path, confirming its intention to use the tech it acquired with RNA Networks to deliver new storage options.

Speaking at the Dell Storage Forum in Sydney last week, Ben Roscoe (Dell, General Manager – PowerVault Data Management) said the company is looking to use the technology acquired with RNA Networks to provide “integration points closer to the server”. This builds directly from the presentation that Don Ferguson (Dell CTO Dell Software Group) and Jai Menon (Dell CTO Enterprise Solutions Group) gave at the Dell Enterprise Strategy Update in San Francisco last week where Dell introduced the Active System 800. Ferguson and Menon shared their vision on how pooling server-side flash across multiple Active System nodes would speed performance of database and web apps. Continue reading Dell Planning New Storage Tech for 2013

News: Browsium Catalyst Multi-browser Management Tool Released to Beta

Browsium CatalystBrowsium has released Catalyst to public beta. Browsium hopes that Catalyst will transform how organisations manage multi-browser environments.

A browser is a gateway to the Internet, to applications, to data. Many home users have multiple browsers; increasingly many corporations do, too. This might be because different browser versions are needed to maintain access to legacy applications while offering modern access to the Internet. Maybe it is to give users more choice. Maybe it is in an effort to reduce the possibility of a security breach. Maybe it is because users have just installed a second browser because they can. Regardless, managing user use of multiple  browsers—so they are working productively and not bogging down the help-desk—is a complex undertaking.

Browsium, which has developed Browsium Ion to allow management of Internet Explorer, is looking to solve this multi-browser problem with Catalyst.

Continue reading News: Browsium Catalyst Multi-browser Management Tool Released to Beta

Liquidware Labs ProfileUnity v5.2: does it out sense AppSense or haze Mirage?

DesktopVirtualizationLiquidware Labs has released an update to their user environment management product, setting ProfileUnity v5.2 out into the wild. ProfileUnity FlexApp is capable of presenting organisations with a comprehensive user environment management solution encompassing both user virtualization and a virtualized software distribution system. An impressive customer and partner engagement programme has resulted in a growing number of customers who can relate to its straightforward deployment, low acquisition cost, and its ability to manage both user profiles and data and application delivery on demand, in virtualized and physical desktop environments.

We have mentioned before that a commonality between users is their desire to be different. While embracing diversity is a Good Thing, it can be a complex and expensive process in a VDI environment using persistent virtual machines alone. A number of  vendors provide tools to decouple components of user workspaces, to provide for personalisation within a standard environment. This provides cost savings by allowing core standardisation, while reducing the need for the user to change their working practices and allowing them to be as productive as possible. Moreover, few organisations find that a VDI-only solution deals with all of their user use cases – laptops and PCs are still not dead as devices. How do you manage environments across both virtual and physical desktops?

There are more established players in this market. AppSense. RES Software. Indeed VDI vendors are introducing their own solutions. Citrix has incorporated its own Profile Management, Personal vDisks, and has recreated XenClient with their NxTop acquisition. VMware is planning to utilise its Wanova Mirage acquisition to enable IT to centralize PC images of virtual and physical machines and do single image management while users execute locally.

What new features are included Liquidware Labs’ ProfileUnity 5.2, how does it compare against other offerings and differences can it make to your organisation?

Continue reading Liquidware Labs ProfileUnity v5.2: does it out sense AppSense or haze Mirage?

Defense in Depth: Hardware Security

VirtualizationSecurityOn the last Virtualization Security podcast, our guest was Robert Rounsavall, CEO of Trapezoid. Trapezoid is looking into how to alleviate supply chain security issues; in essence, the security of the hardware. At many a presentation, I have asked attendees, “Do you trust the hardware?” Many times the answer is that they do; at other times, it is that they do not. Whether you trust the hardware depends entirely on your thoughts with respect to hardware security. But what can you do about hardware security? What is the worst that can happen if the hardware is infiltrated? Continue reading Defense in Depth: Hardware Security