Feeds

Desktop virtualization: One size really doesn’t fit all

Different ways to solve different problems

  • alert
  • submit to reddit

Seven Steps to Software Security

Live Broadcast Desktop virtualization isn’t quite as simple as it once sounded. Today there’s a raft of fundamental implementation decisions that need to be made based on varying levels of pay-back - save cash, reduce maintenance, maintain compatability, whatever.

But which one to choose for your target environment?

On Friday 26th November at 11:00 GMT we’ve got a few guys who know a few things about virtualization. Tony Lock from our chums Freeform Dynamics will join Ian Moulster from Microsoft and El Reg’s own effervescent Tim Phillips who will be in our studios to discuss the pros and cons of each.

The three of them are taking a deep look at the benefits of all desktop virtualisation methods and trying to ascertain which ones fit which environment.

If you join us, you’ll get to have your say too – you can ask these guys anything you want, so long as it’s broadly related to the subject obviously. They’ll all welcome your input on their view of where VDI makes sense, whether application streaming will benefit the Enterprise or if Session Virtualisation – or even if a Client Hosted Desktop is the answer.

We know you’ve all got your views, and no doubt experiences, on this, so come and share them with your friends at El Reg.

The event is 1hr long, it’s free to attend and we hope we’ve built it in such a way as to make sure you’re getting value for your time.

If that all tickles your fancy, you can register right here. If you can’t make it that day, you can still register and we’ll send you the recorded version of the show when it’s ready. ®

Boost IT visibility and business value

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.