Three key VDI storage challenges

byrne, jeff
February 2012
Storage Magazine;Feb2012, Vol. 10 Issue 12, p65
The article discusses the three key for visual desktop infrastructures (VDIs) storage systems including poor performance, inefficient data protection and complex deployment and management. It states that each desktop is made as a virtual machine (VM) to stretch the visual image from servers to user desktops. It also mentions that the VDI provide increased security and control to information technology (IT) managers while user improves access to the data.


Related Articles

  • Virtualisation Needs Physical Consideration. Avanessian, Andrew // Database & Network Journal;Feb2013, Vol. 43 Issue 1, p11 

    In the article author reflects his views related to the pitfalls of use of a virtual systems in the U.S. He mentions that various companies use virtual systems to be protected from the data theft. He informs that that even in the use of virtual solution often the actual risk is simply...

  • The drive towards desktop virtualization. Lim, Edward // NetworkWorld Asia;Jul2008, Vol. 4 Issue 6, p12 

    The article presents the views of general manager of Citrix System Inc.'s Desktop Delivery Group, Raj Dhingra on the benefits of drive desktop virtualization. Dhingra believes that the migration towards new hardware and software and data protection by centralizing it are the major factors that...

  • 'Hey Cortana', I'm an Apple Mac.  // Choice Computer;Nov/Dec2015, p6 

    The article offers information on the Parallels Desktop 11 for MAC virtualisation software.

  • Virtualization Drives Backup and Recovery Opportunities for the Channel. Vizard, Michael // Channel Insider;5/15/2012, p1 

    The article says that with the rise of virtualization, backup and recovery operation is becoming difficult for information technology (IT) firms. The amount of processor capacity available to the backup and recovery system on the server is being compromised due to increasing number of...

  • Bocada Launches VM Backup Monitoring Solution.  // Channel Insider;11/3/2011, p3 

    The article discusses the Virtual Machine (VM) monitoring software package launched by data-protection software maker Bocada Inc. As stated, the software is for the data-protection operations of virtual environments and has several advantages including monitoring of back up methods, problem and...

  • A Security Model for Mobile Agent in Grid Environment.  // International Journal of Computer Applications;Mar2010, Vol. 2, p10 

    The article discusses the proposed communication model that integrates both Grid system and Mobile Agent to perform parallel computations with secured communication. It provides a detailed understanding on the application of matrix multiplication to test the functionality of the model. It also...

  • Software Tools to Detect Suspicious Files. Mircea, Neamtu Iosif // Journal of Computer Science & Control Systems;2011, Vol. 4 Issue 2, p51 

    Nowadays in the technological era when the total amount of information is growing rapidly and the Internet has also become something common and insecure, most users on the web easily fall prey to viruses form accessing various links received form strangers or downloading unknown software from...

  • 5 VIRTUALIZATION SECURITY DO's & DON'Ts. Ptacek, Thomas // Information Security;Jun2008, Vol. 11 Issue 5, p18 

    The article presents tips for avoiding virtualization pitfalls. Do not let the enterprise silo vitalization security. Do practice segmentation on the physical virtual machine servers. Do not ignore the risks of virtual machine migration. Do consider virtualization security systems carefully and...

  • Fast Software Rejuvenation of Virtual Machine Monitors. Kourai, Kenichi; Chiba, Shigeru // IEEE Transactions on Dependable & Secure Computing;Nov2011, Vol. 8 Issue 6, p839 

    As server consolidation using virtual machines (VMs) is carried out, software aging of virtual machine monitors (VMMs) is becoming critical. Since a VMM is fundamental software for running VMs, its performance degradation or crash failure affects all VMs running on top of it. To counteract such...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics