The drive towards desktop virtualization

Lim, Edward
July 2008
NetworkWorld Asia;Jul2008, Vol. 4 Issue 6, p12
Academic Journal
The article presents the views of general manager of Citrix System Inc.'s Desktop Delivery Group, Raj Dhingra on the benefits of drive desktop virtualization. Dhingra believes that the migration towards new hardware and software and data protection by centralizing it are the major factors that will lead organizations towards desktop virtualization. Other factors cited by Dhingra include cost of desktop management, telecommuting, and disaster recovery.


Related Articles

  • Three key VDI storage challenges. byrne, jeff // Storage Magazine;Feb2012, Vol. 10 Issue 12, p65 

    The article discusses the three key for visual desktop infrastructures (VDIs) storage systems including poor performance, inefficient data protection and complex deployment and management. It states that each desktop is made as a virtual machine (VM) to stretch the visual image from servers to...

  • Virtualisation Needs Physical Consideration. Avanessian, Andrew // Database & Network Journal;Feb2013, Vol. 43 Issue 1, p11 

    In the article author reflects his views related to the pitfalls of use of a virtual systems in the U.S. He mentions that various companies use virtual systems to be protected from the data theft. He informs that that even in the use of virtual solution often the actual risk is simply...

  • Virtualization Drives Backup and Recovery Opportunities for the Channel. Vizard, Michael // Channel Insider;5/15/2012, p1 

    The article says that with the rise of virtualization, backup and recovery operation is becoming difficult for information technology (IT) firms. The amount of processor capacity available to the backup and recovery system on the server is being compromised due to increasing number of...

  • Bocada Launches VM Backup Monitoring Solution.  // Channel Insider;11/3/2011, p3 

    The article discusses the Virtual Machine (VM) monitoring software package launched by data-protection software maker Bocada Inc. As stated, the software is for the data-protection operations of virtual environments and has several advantages including monitoring of back up methods, problem and...

  • A Security Model for Mobile Agent in Grid Environment.  // International Journal of Computer Applications;Mar2010, Vol. 2, p10 

    The article discusses the proposed communication model that integrates both Grid system and Mobile Agent to perform parallel computations with secured communication. It provides a detailed understanding on the application of matrix multiplication to test the functionality of the model. It also...

  • Software Tools to Detect Suspicious Files. Mircea, Neamtu Iosif // Journal of Computer Science & Control Systems;2011, Vol. 4 Issue 2, p51 

    Nowadays in the technological era when the total amount of information is growing rapidly and the Internet has also become something common and insecure, most users on the web easily fall prey to viruses form accessing various links received form strangers or downloading unknown software from...

  • 5 VIRTUALIZATION SECURITY DO's & DON'Ts. Ptacek, Thomas // Information Security;Jun2008, Vol. 11 Issue 5, p18 

    The article presents tips for avoiding virtualization pitfalls. Do not let the enterprise silo vitalization security. Do practice segmentation on the physical virtual machine servers. Do not ignore the risks of virtual machine migration. Do consider virtualization security systems carefully and...

  • Fast Software Rejuvenation of Virtual Machine Monitors. Kourai, Kenichi; Chiba, Shigeru // IEEE Transactions on Dependable & Secure Computing;Nov2011, Vol. 8 Issue 6, p839 

    As server consolidation using virtual machines (VMs) is carried out, software aging of virtual machine monitors (VMMs) is becoming critical. Since a VMM is fundamental software for running VMs, its performance degradation or crash failure affects all VMs running on top of it. To counteract such...

  • pros & cons of VTLS. Preston, W. Curtis // Storage Magazine;Apr2005, Vol. 4 Issue 2, p32 

    This paper explores the advantages and disadvantages of using virtual tape libraries (VTL) as a backup approach. If the VTL needs to be expanded, one simply connect the additional storage, tell the VTL it is there and the VTL will automatically begin using the new storage. Another important...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics