In this post we continue our analysis on VDI adoption and lifecycle management of virtual desktops. In previous articles we discussed about the planning and acquisition phases, and today we talk about the deployment of the new fleet of desktops
Desktop virtualization offers a great advantage when managing computers, because with the VDI management software and from a single administration point, you can complete almost all the tasks that allow you to deploy the virtual desktops:
In our post today we go back to VDI adoption and its involvement in the lifecycle management of the virtual desktops. A few days ago we talked about the planning phase and today we focus on the acquisition one. This is approximately 50% of the total cost of the desktop lifecycle.
At this stage, negotiations will be conducted for the purchase of the server platform that will host the virtual desktops and the unpacking of the platform will also be carried out. The IT department will work on the physical installation and connection of the components, the installation of peripherals and image creation (OS and applicationinstallation).
Later, there comes the moment to deploy the new fleet of desktops, a topic that we will describe in next articles.
Adopting virtual desktops greatly affects the desktops’ lifecycle in each of its stages, improving operations and providing better customer service and updates management as well as desktop security.
Today we begin a series of posts dealing with each one of the desktop lifecycle stages and the resulting improvements that come from implementing virtual PCs.
First of all we are going to talk about Planning. During this stage, the server platform, shared storage and software that will manage the virtual desktop fleet are defined. In this case, calculations are made to determine which shared resources are needed to host the virtual desktops. Making a pilot or concept test is essential in this phase.
UDS Enterprise releases a new new section of its website: the Newsroom.
Here you will find all the information related to the connection broker spread by the media and on the websites of technology partners such as OpenStack, oVirt or Citrix.
You can find all technical information about the software, white papers and manuals in the Documents section.
Our analysis about KVM hypervisor management tools and the cost savings by migrating from a desktop virtualization platform with vSphere to another with oVirt have been the most read articles in our blog during the first half of December.
Below you can find the links to these 3 posts so you don’t lose track of the most outstanding information according to our followers:
Economic costs may be one of the major obstacles when it comes to deploy a virtual desktop infrastructure. But, if instead of using licensed tools we undertake the project with Open Source tools, the costs drops dramatically.
That was precisely the option chosen by the University of Sevilla, since its goal was to save as much as possible without giving up the best service, performance and availability.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.