I was posed with a question today, “I’m looking for some info on account & password management for consultants that visit a lot of customers where they have to do admin stuff.” with a secondary question of “how to manage the account if a constultant leaves?” This was specific to the VMware vSphere but would apply to any hypervisor.
TVP Tag Archives
Is VMware moving to Guest based Licensing?
There has been a rumour that VMware circulating that are going to move to a per VM Guest licensing model rather than the traditional Host based licenses. Well it looks like the first move to this has been taken
Red Hat’s Spice and VMware View’s PCoiP – aligned against Microsoft
Red Hat’s emerging VDI offering is based on its acquisition of Qumranet in 2008, more specifically a technology known as Spice which is designed to replace RDP and ICA as the protocol between the server and the client. Spice was made Open Source at the end of 2009.
Virtual Desktop Clients as the next Mobile Device ‘Killer App’?
Coming out of this holiday season there will be many who got new, more versatile, mobile devices and will want to use them to access information from work. In the nearly 15 years since the introduction of the two way pager, mobile device manufacturers have been trying to build a platform for business applications to take on messaging as the next “killer application.” Virtual Desktop Clients may be the application that finally steps up to the task.
End User Environment Management for VDI
When considering your VDI deployment hosting your workspaces is not the only consideration. Careful consideration needs to be made on the management of the performance, license use and user’s environment to give, not only a good user experience, but a timely return on your investment.
Virtualization Related SSL MiTM Attack, chances?
There has been quite a bit of discussion between myself, Tim Pierson, and other with respect to SSL man-in-the-middle attack possibilities within the virtual environment. But what are the chances that such an attack will happen, or that someone would know how to perform the attack? What does the attack depend upon?