Feeds

Successful desktop virtualization

Difficult, but not impossible

  • alert
  • submit to reddit

Security for virtualized datacentres

Regcast Desktop virtualization: it's complex, it's controversial, it's hard to budget. It is, however, easy to make a mess of it. And if you do get it wrong, every single person in your company will want to know why.

Mess this one up and you’ll be lucky if they let you project manage buying toner cartridges for the rest of your career.

Many IT departments approach virtualizing the desktop the same way they dealt with virtualising their servers – with disastrous results. Which is why you need to watch our Regcast “The Virtual Desktop Unleashed.” It tells you how to avoid the mistakes that others have made, how to plan the project, how to work out your budget, where to allocate it, and whether you’re going to see a return on it.

The Reg's Tim Phillips is joined by Chad Bittner from Xiotech and Tony Lock from Freeform Dynamics, who spell out the common pitfalls of desktop virtualization and what you need to do to avoid them.

Watch it if you value your future happiness. Alternatively, go ahead without our help. In which case, you might want to brush up on best practice in peripheral consumable procurement. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.