Desktop virtualization is a mature technology which provides huge benefits to companies; above all to those challenging cost control, constant changes and users willing to access information and corporate tools anytime, anywhere and using any device.
Therefore, the beginning of 2016 is the perfect time to consider VDI adoption. Find below five more reasons why this technology may become your best ally:
Have you bought all your Chistmas gifts? If you’re planning to give electronics, the Free Software Foundation (FSF) asks us to give some thought before buying something that could take more than it gives, since it requires, for example, to pay some license in order to use it.
They also advice us to avoid giving products with harsh rules about copying and sharing, or those which perform remote deletion of files without asking users.
The deployment of virtual desktops with UDS Enterprise & Microsoft Hyper-V, interesting tips to manage VMware vSphere and Remote PC project with UDS Enterprise introduced by the University of Sevilla at RedIRIS Technical Conference 2015 have been the most read topics in our blog during last weeks.
Find below the links to these posts so that you can keep up to date with the most highlighted news on virtualization and Open Source:
If you are an IT administrator and you manage VMware vSphere virtualization platform, have a look at these useful tips:
-Don’t use Raw Device Mappings (RDMs). Try VMware Virtual Volumes instead, which is far less complex and more useful.
-See VMFS volumes and make sure they are upgraded.
-Use vSphere tags and categories. They help you organize virtual machines (VMs) in a customized way, considering elements not related to infrastructure. You can arrange them, for example, by production, development, off-site DR…
Active Directory (AD) is one of the most used features in Windows Server. It enables administrators to manage devices and users implementing and reinforcing security policies. It also provides a centralized and hierarchical directory to manage all network resources.
In this post we’re talking about tools and best practices to ease restore & backup processes in AD.
-Use PowerShell to create a list of all your virtual machines(VM) including name and IP address without logging or going to networking tab.
-Enable router guard and DHCP guard options to avoid unauthorized networking accesses. You can do it using VM libraries, PowerShell or Set-VMNetworkAdapter cmdlet.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.