Citrix has acquired Virtual, a company specialized in ARM-based hypervisors to check and develop mobile applications. This recent purchase has brought to light the new interests of this company, that could be planning to take new steps in the market, like the release of a new virtual mobile infrastructure.
The fact that Virtual employees are experts in hardware, security and jailbreaking prompts other speculations, such as the possibility of developing a mobile hypervisor for smartphones which may allow running operating systems on incompatible devices, improving the security of its existing products or integrating both Citrix and Virtual tecnologies.
At the very beginning of this week we provided some advices you should keep in mind before adopting a desktop virtualization platform. Today, we conclude those recommendations with the next steps you should take after analyzing the business and users’ needs and the existing environment.
All VDI projects that end successfully get started with a pilot test before undergoing production. This pilot allows the IT department to design, test and optimize a prototype of the environment. Before carrying out the pilot we recommend clearly identifying the solution use case, the desired functionality and the advantages and key milestones during implementation. For a pilot to be successful, collaboration between the team involved and the end user is vital.
A new technological trend has arisen after the massive adoption of BYOD (Bring Your Own Device) by most users, who use their own mobile devices for both personal and proffesional purposes. This new trend is called BYOID, Bring Your Own Identity, and it is based on the use of the same digital identities used in the social media profiles to access corporative applications.
The employees welcome this option, as they don’t need to create different accounts for the different web sites they access everyday but the IT departments face new necurity risks. Companies must catch up on this trend and make the adoption easier for the staff without threatening the security of corporate data.
The adoption of a VDI platform without taking some previous steps will surely lead the project to direct failure. In order to avoid this outcome, the UDS Enterprise Team describes below the most important elements you should bear in mind before implementing a virtual desktops platform into production.
Analyzing the current situation
Before implementing a VDI platform, we advise you to evaluate the requirements of the end user station environment and their states, and determine what the needs and advantages that desktop virtualization could provide to the organization. This is vital to carrying out these projects successfully. The work done during this initial phase will allow you to accurately define the most suitable parameters so that you can shape the solution that you need.
Red Hat has announced the availability of Red Hat Enterprise Linux’s new version, 5.11. The company reinforces its commitment for security and performance introducing important improvements in these areas.
One of the most outstanding features in this edition is the new OpenSCAP version, with new qualified providers for this standard.
This new platform introduces other interesting features, such as new storage controls, improvements in Red Hat Access Support depuration capacities and in Red Hat Enterprise Linux hosts which operate in VMware ESXi.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.