Coming out of this holiday season there will be many who got new, more versatile, mobile devices and will want to use them to access information from work. In the nearly 15 years since the introduction of the two way pager, mobile device manufacturers have been trying to build a platform for business applications to take on messaging as the next “killer application.” Virtual Desktop Clients may be the application that finally steps up to the task.
TVP Strategy Archives
2009 – the "Long View": Hadoop and Cloudera
In the long term, 2009 is likely to be known as the year that a commercial framework emerged around the Open source Hadoop framework for map-reduce.
2009 – the “Long View”: Hadoop and Cloudera
In the long term, 2009 is likely to be known as the year that a commercial framework emerged around the Open source Hadoop framework for map-reduce.
Hyper-V: Free or Licensed the Choice is Yours
Which is better Hyper-V version deploy for production environments? For a traditional server based virtualization project, it makes financial sense to deploy Datacenter, and this is most likely the case for a hybrid deployment of Server and Desktop devices. However, for raw VDI and Open source deployments, it is obviously more fiscally prudent to utilise the free version which has been available for over a year.
Citrix still at forefront of Mobile Device Access for VDI
Citrix have released an updated version 2 of their Receiver for the iPhone, but if they are to keep ahead of the competition, is delivering VDI access to the all powerful iPhone the best device to grab a CIO’s attention with?
Virtual Disk Encryption
In the article End-to-End Virtual Machine Backup I mentioned the new VMware Workstation 7.0 feature that creates an encrypted disk but in reality it is an encrypted virtual machine, which also implies encrypting the virtual disk. This one option to VMware Workstation is something that is needed within VMware vSphere as well as the other hypervisors. Encrypting virtual disk data can add to the overall security stance based on the encryption technology employed. So what do we need with virtual disk encryption?