Feeds

Virtualised desktops: provisioning done the MS way

Two paths to IT happiness

Boost IT visibility and business value

A virtualised desktop offers huge advantages, both to the user and to the IT department.

For anyone using a laptop at home or on the move, the experience is the same and everything is exactly as when they left it.

What they see is the image of a desktop running in a virtual machine on a server in the data centre. Users log onto the server via their browsers and are offered a virtual desktop and other resources appropriate to their role. They have entered a secured virtual environment where they can start being productive.

From an IT perspective, a virtualised desktop offers easier, centralised management and a decoupling of the hardware from the operating system and application set.

This makes the desktop more secure and insulates the software, which avoids the perpetual race to upgrade hardware.

That is the promise, and essentially there are two ways of delivering it.

Suits you, sir

The first and most cost-effective way, also known as session virtualisation, is suited to very thin clients, users with fairly standard needs such as call centre employees, and places where the network link can be relied upon.

For this you need a server running Microsoft Windows Server 2008 R2 or later. This includes Remote Desktop Services (RDS), whose core job is to manage the process of connecting to a machine which has been configured by the IT admins.

Applications then run in that session as if they were on a physical device. The connection, including the screen image, is delivered by the Remote Desktop protocol, which allows multiple users to share the resources of the server.

If end-users need more than a handful of standard applications, the alternative is to use a form of virtual desktop infrastructure. This is suited to home and mobile workers who need access to the corporate desktop, and places where the network link may be intermittent.

A bit rich

The desktop – one per user – runs as a virtual machine on a host server in the data centre. The desktop experience is richer than with RDS and closer to what is offered by one running locally, while giving the IT department the benefits of more control and centralised management. Additionally, there is a much wider range of available applications.

For this scenario you will need a virtual machine host running a hypervisor such as Microsoft Hyper-V. The system's connection broker knows which virtual machine to offer the user and manages the processes of authentication with a directory service, or similar.

It then connects the client to the right machine, which might be running on one of many hosts. Because the user has established a connection with the broker, reconnecting in the event of a dropped link is simplified: all it needs to do is re-establish the link from one of its cached sessions. IT admins can manage the process with Microsoft System Center.

It is all very different from dumping a box on users' desks and leaving them to install the operating system and get themselves up and running.

Virtualisation makes desktop management easier and, for a wide range of users, offers a good compromise between local processing that delivers the full-fat media experience and a desktop focused on the task at hand. ®

Application security programs and practises

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.