The information about the Remote PCs project, the differences between ESXi and Hyper-V and virtualization of graphic station environments have been the most interesting topics during the last two weeks according to our followers.
If you didn’t have the chance to read them, you can find the links to these articles below:
If we have a look at how Microsoft Hyper-V and VMware ESXi work, we see many differences in terms of architecture. However, most virtualization administrators aren’t aware of these differences. In fact, many of them don’t really know how Hyper-V hypervisor works on the host operating system.
A very common misunderstanding about Microsoft Hyper-V is that since Windows operating system is required to install Hyper-V, it operates on the host OS instead of directly on the hardwar
Are you a Windows 8 or Windows 8.1 Pro user? In this post we explain how to enable the Hyper-V hypervisor in this operating system to deploy virtual desktops or to perform a dynamic allocation of RAM or to compact, extend and reduce volumes or use volumes of dynamic allocation of space.
There are several options that administrators should keep in mind in order to isolate virtual machines inside a Hyper-V virtual switch and thus monitor incoming and outgoing traffic and improve the environment security. Yo can secure the switch:
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.