Thin clients are one useful option for VDI access. Some of these devices don’t require antimalware software, as they are secure enough by their own.
But some others require extra protection in order to assure data and users security. One example are repurposed PCs as thin clients, since although they are not usually configured to run software locally, they are tecnically vulnerable to different types of malware.
Cloning a virtual machine (VM) and creating a VM template are similar processes, since both make it easier to build and deploy VMs, but they serve different purposes in a virtual desktops infrastructure.
A VM clone is a VM copy performed at a specific time, an exact copy of the latest saved version, with the same configuration settings and identifiers. This may cause interoperability issues. Each clone can be modified as needed while the original VM keeps the same, so new changes or new copies can be made.
OpenStack and Docker are two complementary technologies very useful for IT administrators in traditional data centers.
In this post we tell you how to deploy a Docker cluster capable of using external storage provided byOpenStack Cinder.
The deployment of clusters is usually performed through OpenStack Magnum, which leverages Heat templates. But, how can we ensure Magma deploys and configures container infrastructure inclusive of providing external storage support for containers.?
Linux allows to assign more than one IP address to a single physical network interface. That’s a really useful technique, e.g. when working with Apache and virtual servers, as it enables to access the same Apache server using two different IP addresses.
Creating a virtual network interface in Linux is quite easy, here’s a comprehensive tutorial describing all the steps you should follow: Linuxconfig.org
Nowadays, IT administrators face the challenge of monitoring thousands of users accessing corporate environments at the same time 24×7. These users can be anywhere and they use a wide variety of devices. In this scenario, how can we catch performance issues before they happen?
One of the options is monitoring VDI workloads effectively. If admins know how a virtual dektops environment behaves, they can provide a better experience to end users.
Operating System patching and virtualization deployment, among other things, may change the virtual desktops configuration set by the administrator.
In a Windows environments, these configuration drifts may be detected using Microsoft System Center Configuration Manager (SCCM) to create a configuration baseline featuring groups of different configuration items and apply this baseline to a virtual desktop deployment.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.