Tag Archives: VDI

News: Teradici Rolls Out Updates to Optimize PCoIP Experience

teradici100x30Teradici, the developer of the PCoIP® protocol, has announced the release of two updates to their hardware acceleration products that are geared to optimize protocol bandwidth and improve end user experience. Continue reading News: Teradici Rolls Out Updates to Optimize PCoIP Experience

Mobility Bytes – Citrix’s Mobile Strategy Has Sharp Teeth & It’s Attacking from Every Side

DesktopVirtualizationAs you can probably tell from the title, Citrix is leveraging their biggest advantages in the mobility/BYOD race: their understanding of ALL client operating systems, multimedia in both SBC and VDI environments, and their established partnerships with hardware and OS vendors. In a conversation I had with Chris Fleck, VP Mobility & Alliances at Citrix (@chrisfleck), we spent an hour talking about the various methods Citrix has decided to use to manage mobile devices in both multi-user and multi-OS virtual environments, while extending their function from consumption to productivity. Oh, yeah, they have also changed their product and technology names to reflect their commitment to mobility; shocking I know. Continue reading Mobility Bytes – Citrix’s Mobile Strategy Has Sharp Teeth & It’s Attacking from Every Side

Rethinking Thin Clients from a Security Perspective

DesktopVirtualizationCorporate data is floating around on PC’s and laptops, sitting on cloud file-sharing platforms and being transmitted over email.  Laptops and mobile devices are sitting in the trunks of cars at the mall, being left in hotel rooms or lost in the backs of taxis.    Data has become as good as gold.  Credit Card numbers, Social Security numbers, architectural diagrams, marketing plans and source code – each a target for a particular thief.  And just like fine art and jewelry, there is a huge black market of data buyers.  Don’t think your competition wouldn’t want to get their hands on your customer accounts, price lists or intellectual property if they could. There are too many cases in recent history of massive data loss to think that this problem is something that can be easily fixed without changing the way employees get access and use corporate data. Continue reading Rethinking Thin Clients from a Security Perspective

The Potential of the Dell PowerEdge VRTX

Dell PowerEdge VRTXDell PowerEdge VRTXRight now is a particularly interesting time in the world of IT. Historically, IT has swung back & forth between centralization and decentralization, closed and open, tightly controlled and loosely controlled. Lately, though, a third option has cropped up: centralized control with decentralized workloads. In my opinion it’s a function of speed, implemented through bandwidth and processing capacity. We now have enough bandwidth between our devices to start treating the device in the next rack column like a slightly-less-local version of ourselves. We also have enough bandwidth that we’ve outstripped our need for separate storage and data networks, and can converge them into a single wire, running a single set of protocols (most notably TCP and IP). On the processing side, each node is basically a datacenter unto itself. 16, 32, 64 cores per server, terabytes of RAM. The advent of SSD and PCIe flash rounds out the package, lessening the need for large monolithic collections of spindles (aka “traditional storage arrays”). The problem then becomes one of control. How do we take advantage of the performance and cost that local processing brings, but maintain all the control, redundancy, and management benefits we had with a monolithic solution, while keeping the complexity under control? And while we usually talk about doing this at great scale, can we do this on a small scale, too?

Dell PowerEdge VRTX Continue reading The Potential of the Dell PowerEdge VRTX

EUC Security: Much More Than VDI

VirtualizationSecurityOn the May 30th Virtualization Security Podcast, Shaun Donaldson, Director of Alliances at Bitdefender Enterprise, joined us to discuss end user computing (EUC) security and how their new Gravity Zone product ties their enterprise products together under one scalable management umbrella. We had a very interesting conversation on the subject of EUC security, Bring Your Own Device (BYOD) security, and all aspects of the the EUC stack. There are quite a few moving pieces in the EUC stack. It is greater than your mobile device and the system it is accessing; there is a complete networking and political stack between the two, and perhaps many systems you have to jump through to access your data. Continue reading EUC Security: Much More Than VDI

Can Microsoft succeed as a DaaS provider with Mohoro?

DesktopVirtualizationThe recent rumors of Microsoft working on a hosted virtual desktop (DaaS)  solution to add to their cloud services offering  may actually end up being one of the most viable options for organizations who already rely heavily on Microsoft infrastructure to run their business.  Having all of your core services being delivered from a single location and  provider could ease the operational concerns of some who find running a hybrid of on-premise and hosted solutions still requiring the same amount of operational support. Continue reading Can Microsoft succeed as a DaaS provider with Mohoro?