The particular features of the Call Center workstation environments are positioning desktop virtualization as the ideal solution to manage and administer this kind of platforms.
Before talking about the benefits of adopting VDI in these environments, we should analyze its peculiarities:
-High operator rotation. In this type of environment, the users change more frequently than in other types of environments. A high rotation entails constant management and administration of the platform authentication system.
The XenServer team has announced the availability of XenServer Dundee pre-release, the next version of Citrix‘s Open Sourcevirtualization platform.
In this way, users may access the first software versions and they will be able to report their experience to the company.
This firts release includes one of the most demanded features from the previous edition: support for CentOS 7. Moreover, the plugin to manage dockers is already installed and it allows Xen Orchestra display the dockers running in virtual machines.
If you’d like to be one of the first ones to test it, access the download here.
The review in Red Hat’s Open Source Community blog about the VDI project with UDS Enterprise and oVirt in the University of Seville, the new software developed by Login VSI to monitor virtual desktop’s performance and the hardware requirements to deploy a desktop virtualization platform have been the most read topics in our blog for the last two weeks.
In case you didn’t have the opportunity to read them, find the links below. We encourage you to share them in your social media channels!
An identity federation or federated identity is the means of linking a person’s electronic identity and attributes, stored across multiple distinct identity management systems. It allows using single sign-on (SSO), in which a user’s single authentication ticket, or token, is trusted across multiple IT systems, organizations, companies or entities.
It is a very useful way of sharing information between organizations whithout sharing security, authentication or directory technologies.
The education sector is one of those taking advantage of this technologies. An example is CONFIA identity fedetarion, composed by several universities from Andalusia (Spain), which main goal is to enable persons belonging to this community use distributed services using the credentials of their home university.
Yesterday we had the opportunity to listen Brian Madden and Gabe Knuth, well-known virtualization experts, presenting Login PI, new Login VSI solution that monitors virtual desktop performance.
This new tool, gives IT the advantage of understanding the current end user experience within their VDI environment by using highly realistic synthetic users instead of production end users.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.