Feeds

Managing and supporting the flexible desktop

What, where and how?

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Desktop Strategy Many organisations nowadays crave the ability to offer employees “flexible” desktops. This is seen as a way of keeping pace with more mobile, flexible working practices by providing access to the same corporate desktop systems from any, or at least approved, Internet-connected devices.

You can achieve this by virtualising applications or other desktop components using VDI, remote desktop or terminal services deployments. No surprise then that some Reg readers are turning to virtualisation technologies, including those for virtual application and profile access, to realise the benefits of increased desktop flexibility.

IT departments are implementing virtualised desktop environments to consolidate, standardise and streamline IT resource management and delivery, including licensing compliance. Instead of full PC workstation hardware, users get more flexible access, where thin clients can cut the costs of hardware and power, and virtual profiles can offer access to a personalised desktop from pretty much anywhere.

Managing and supporting more flexible desktops is not just about buying new client devices and servers though. Automating many routine PC and software maintenance tasks can offset the management load of increased uptime and security that often accompanies the delivery of increased flexibility for the end user. Organisations can also vary the degree of resources, such as processing, storage, and networking, that are needed depending on the type and scope of virtualisation technology deployment. A different or new sets of management tools may also be needed.

IT management tools must meet clearly defined resource and policy enforcement needs, according to Quocirca analyst and director, Bob Tarzey. He said research has shown that ensuring the right resources are allocated demands an understanding of the likely future requirements when desktop workloads are provisioned. For example, virtualised desktop workloads may need plenty of storage allocated to ensure users can always save their work - although thin provisioning allows you to pre-allocate storage.

The planning phase of workload requirements is the time to ensure that appropriate security is in place and that the software used by the workload is fully licensed. "Once workloads are deployed, it is necessary to measure their activity and monitor the environment they are running in," said Tarzey.

This may sometimes mean allocating more resources or perhaps moving workloads from one virtual or physical IT environment to another, and ensuring that security and compliance policies are maintained. For example you may want to ensure that users can process and store personal data in permitted locations, firmly within corporate firewalls, with encrypted transmission across a VPN.

Of course, flexible desktop initiatives need to mitigate risks from an increased reliance on connectivity to corporate or public networks for IT delivery. Putting stronger identity and access management and intrusion protection systems in place is a cost no organisation can afford to leave out of a desktop virtualisation project.

To overcome any difficulties that may affect virtualisation or the delivery of complex applications, including multimedia ones, testing, migrating and monitoring the software estate in the new desktop environment is also important, as well as setting up and maintaining driver updates for printers and other peripherals across a greater variety of access endpoints.

Major vendors are responding to demand for more flexible desktop provisioning with licensing changes. Last July, Microsoft eliminated the need for Windows Client Software Assurance customers to buy a separate licence to access its operating system in a VDI environment, folding virtual desktop access rights into its enterprise-level Software Assurance licence. It also extended access rights to virtual Windows desktops and Microsoft Office applications hosted on VDI and remote desktop technology via secondary, non-corporate network devices, such as home PCs.

Whatever the technology investment, IT datacentre managers should give full consideration to the backend impact of more flexible desktops. Without these considerations, any intended benefits might be hard to realise for IT, as well not apparent to, or at worse counterproductive for, the end user. ®

The Essential Guide to IT Transformation

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.