On February 9, 2016, VMware announced a flurry of new EUC-based products to go with the already-announced AppVolumes 3.0. Note I say “announced” and not “generally available.” This annoys me. If something is announced, it should be available for download; it should not be made available at a yet-to-be-announced date several weeks down the line. But that is an aside.
The two main EUC products announced are VMware Workspace ONE and Horizon 7.0. The latter is the next generation of VMware’s venerable Virtual Desktop Infrastructure product (VDI), and the former is a new suite that comprises Horizon View, AirWatch EMM Content Locker, and Workspace.
I have long had what some regard as an odd viewpoint on monitoring performance in desktop environments—which, when viewed from a traditional perspective, could be considered the case. To me, desktop monitoring covers all areas of performance monitoring, whether of physical desktops or of virtual devices delivered by way of a remoting protocol such as RDP, ICA, or PCoIP. It should be known by now that my personal view is that the only true metric is that of user perception. However, we all know this is a very difficult metric to measure, what with EUC performance being like beauty: existing in the eye of the beholder.
In my last article, I mused on VDI—sorry, I mean EUC. What could have besmirched the fine name of VDI so much that it had to undergo a radical marketing overhaul? Yes, I know that EUC is much more than VDI, but most people still refer to EUC as VDI, especially outside of the ivory tower of Silicon Valley.
Android devices recently suffered a spate of attacks. Similar attacks have been made against Apple devices and nearly every other brand of smart device. Does this mean that this is the end of Android or of mobile devices? Or does this mark the rise of mobile device management (MDM) and other software specifically designed to secure end user computing (EUC) devices? EUC security has two failure points: the handheld device and further in the network. But does an insecure device imply loss of data? Perhaps. Loss of credentials? Once more, perhaps. But do we really care? That is not known. So, let us look at a typical use case.
The virtualization industry is growing incredibly fast, and the lack of common nomenclature and acronyms has given rise to a variety of distinct dialects. It’s no wonder that we who speak 0s and 1s don’t understand each other at times, and industry marketing often causes even more confusion.
It has been thirty-one years since the first Computer Chronicles show, and that first show depicted many interesting things that were not considered new at the time. Today, we find them new and interesting, or more to the point, improved such that they are usable in ways only dreamed of then. Computer Chronicles discussed touchscreens, the importance of software over hardware, and telcos as a major source of networking. Today, we have touchscreens on EUC devices, hypervisors, and high-speed bandwidth. I wonder, would the producers of Computer Chronicles consider what we are doing today new, or just improvements on the technology of the 1970s and early ’80s?