The recent release of a new version of XenServer 6.5 and a new version of the XenServer Workload Balancing (WLB) adds more features, a better user interface, more advanced monitoring features and changes in licensing, making this technology really useful for Citrix XenServer, XenDesktop, HDX and XenApp users.
The WLB is made up of 4 layers. The upper layer is the most important, since it allows to automate workload balancing, but the most used and powerful are the 3 underlying layers.
A few weeks ago we told you how the University of Sevilla achieved a significant cost saving migrating from vsphere to oVirt. Today we come back to this topic to describe the VDI architecture used by this organization to make the most out of its resources.
First of all, it is necessary to have a suitable chassis to the virtual infrastructure deployed. The University of Sevilla uses Dell Blade iron they already had and they have been incorporating Blade servers to add new elements to the infrastructure. In this way, the initial investment was not too expensive, and as you can extend it easity, it turns out to be a quite affordable solution and easy to pay off.
Over the last few months, we have started to know more about a new technology called virtual mobile infrastructure or VMI. In general terms, VMI is for the mobile devices and applications the same as VDI for desktop applications.
A mobile virtual infrastructure allows you to access remote mobile applications from a mobile device. With this technology, when a user clicks an icon to use an application on a device, the app appears as usual, but rather than run locally on the client device, it runs in an Android virtual machine (VM) hosted in a remote data center.
Last week we talked broadly about graphic station environments virtualization and the solutions available in the market today. As we already anticipated in that publication, in these specialized environments, the selection of the connection protocol for the virtual graphic stations is one fundamental piece.
There are several protocols in the market that are optimized for these types of tasks:
Work station environments, habitually used by engineers and graphic designers, can be distinguished from the ones used by other users because they are more complicated to manage and maintain, they result in greater use of resources, use a more specific hardware and data security is more critical.
Virtualizing this type of work stations becomes a complicated task since it is necessary to analyze a variety of platforms, connection protocols, architecture designs and specific hardware in order to adopt the ideal solution.
While in a standard virtual desktop environment we recommend performing a concept test, for the virtualization of graphic stations or work stations it is practically essential to be able to commission the deployed platform with full guarantees.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.