With the latest announcement of Google Chrome’s remote desktop application, it’s a great time to look at when and where virtual desktop infrastructure (VDI) makes sense. While there are significant benefits to leveraging VDI, there are still some security risks associated with these implementations.
As part of its ongoing move towards becoming a major player in the cloud market, Dell recently slipped out an announcement with a surprising partner, Desktone. Desktone, most known for their desktop as a service (DaaS) platform which runs with both Citrix and VMware virtual machines is the newest offering available under the Dell Simplified DaaS service. For organizations looking for a solid VDI model, this might be just the trick. Continue reading
I stumbled upon a post via Twitter the other day from Scott Lowe of Tech Republic on IDV (yes, I thought at first I was getting a mild case of dyslexia, but no, it is IDV) and the difference between VDI and IDV. IDV stands for Intelligent Desktop Virtualization and although it essentially delivers the same idea as Virtual Desktop Infrastructure (VDI) it’s actually not just more efficient, it’s really quite brilliant. Continue reading
Desktop as a service is the topic today, and the last of our mini-expose on cloud service models (I can hear you all sighing “Awww…”). I covered DaaS previously from a user side, but I wanted to go a bit more into detail about the types of DaaS models, and the benefits of each. Oh and the security concerns around DaaS as well, but more on that fun topic later. For now, let’s dive right in on the last post of this week. Continue reading
It’s almost impossible to avoid the conversation of whether corporations should allow tablets and other mobile devices on the corporate network. Managers tout the benefits of a mobile workforce and the flexibility of connecting to resources from anywhere. Security engineers are worried about the security risks and increased number of unsecured hot spots generated by mobile devices. Not to mention the HR implications of bypassing acceptable-use policies that traditional network restrictions put in place.