Feeds

5000 desktops and a virtualisation project

Real world tales from a Reg reader

  • alert
  • submit to reddit

Website security in corporate America

Webcast If you’ve got ‘Virtualise Desktops’ on your to-do list for 2010, you might want to hold your horses a minute, because we’ve got something that might make that project a little more pleasant.

On 18 Feb at 11am GMT we’ve got the project leads from a 5,000 strong desktop virtualisation project joining us in our studio.

They come from Lancashire Constabulary and to say they know what it takes to tackle a project like this would be some understatement. They’ve been there, completed a successful beta program, and are rolling out the project as we speak.

The boys in blue will be joined by our usual panel of experts, Tony Lock from Freeform Dynamics and Neil Sanderson from Microsoft. As ever, the entire affair will be fronted by Reg host, the inimitable Tim Phillips. Together, the panel will run through all kinds of aspects of a desktop virtualisation project – both the theoretical and the real practicalities courtesy of Lancashire Constabulary’s experience – so you know exactly what to do when you’re embarking on such a venture.

This will include:

- Considering virtualisation, and how a beta program can shed some serious findings on the plans for a broader roll-out.

- Engaging with the business, including managing the costs and resources, and making sure you find the right solution for your organisation.

- Managing risks, how Lancashire Constabulary identified and managed the risks of this project.

- The operational considerations, explaining how they got the network managers up to speed, and got their storage management tuned to perfection.

Top tips from the experts: These guys are rolling out the project as we speak and can talk with considerable aplomb about the challenges they've encountered so far.

If you fancy it, and we suspect you do, you can sign up right here.

If you can’t make it on the day, just register today and we’ll send you the recorded version of the event to watch at your leisure.

Choosing a cloud hosting partner with confidence

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.