Feeds

We need to talk about desktop virt

Readers, we want you

  • alert
  • submit to reddit

Security for virtualized datacentres

Sometimes we are forced to acknowledge that there is a group of people even more knowledgeable and informed than even Register journalists: you, our beloved readers.

So we turn to you for help with a question that bears proper scrutiny. All this talk of cloud (and let’s face it, there has been a fair bit) has prompted some more cynical heads to wonder: “Cloud? That’s just virtualisation with a shiny new label, isn’t it?”

That may or may not be so, depending on this kind of cloud project you’re talking about. But doesn’t it also slightly suggest that virtualisation is a simple business about which we know all, and have no problems?

It might be less cutting edge, but desktop virtualisation can still be a tangly problem, the knock on effects of a poorly planned project can be painful to deal with. So here’s a question for you clever people:

“How is desktop virtualisation likely to impact my existing network and storage infrastructure?”

As ever, we’ll be looking through the comments for the most interesting answers. If you have some thoughts, convert them to text below. If not, just vote for the answer you think hits the nail on the head.

Have at it. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.