Feeds

How to survive desktop virtualisation

Don't mess up and make everyone hate you

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Regcast So you’re thinking about desktop virtualisation. Are you mad? Most of your colleagues think so. Your users hate you already, because you want to take away their PCs. Your boss suspects you’re going to blow the budget on a bunch of ugly dumb terminals that take half an hour to boot.

Mess this one up and you’ll be lucky if they let you project manage buying toner cartridges for the rest of your career.

Many IT departments approach virtualising the desktop the same was they virtualised their servers, with disastrous results. Which is why you need to watch our Regcast “The Virtual Desktop Unleashed”, because it tells you how to avoid the mistakes that others have made, how to plan the project, how to work out your budget, where to allocate it, and whether you’re going to see a return on it.

The Reg's Tim Phillips is joined by Chad Bittner from Xiotech and Tony Lock from Freeform Dynamics, who spell out the common pitfalls of desktop virtualisation and what you need to do to avoid them.

Watch it if you value your future happiness. Alternatively, go ahead without our help. In which case, you might want to brush up on best practice in peripheral consumable procurement. ®

Next gen security for virtualised datacentres

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.