In addition to the advantages of VDI, in this document the consulting firm also details the five main challenges most companies face when they are planning to adopt this technology:
–High initial investment in hardware and licenses: Many corporations require a fast return on investment. However, this does not always occur, due to the initial investment needed. Another factor is that the cost per user makes VDI virtually unfeasible for those companies with a large amount of users.
Monitoring a server involves watching the performance of a single physical or virtual machine. Conversely, VDI almost always consists of multiple servers working together. As such, one of the big VDI monitoring challenges is scalability: Admins must simultaneously monitor the performance of each of the servers that plays a role in VDI. The second factor that complicates VDI monitoring is translating the raw performance metrics into something meaningful.
Now, imagine a VDI server clocks in with an excessively high CPU utilization value. What does it mean for the end-user experience? It is really difficult to say for sure. The user might suffer severe performance problems as a result of insufficient CPU resources.
The event organized by our partner MicroCAD Systems on the Transformation of the Datacenter where they talked about the advantages of UDS Enterprise and Nutanix Acropolis as a VDI joint solution, the new features introduced in the new version of Red Hat Enterprise Linux and how our connection broker meets the current needs of the workplace have been the most popular articles in our blog during the las two weeks.
Find below the links to the posts on these topics so that you can keep up to date with the most interesting news on virtualization and Open Source according to our readers:
The workplace currently has certain needs derived from an ongoing process of technological evolution that companies should meet to increase productivity while offering more agility, both in their relationship with the client and in their internal processes.
According to the reseach of IDC, relected in their latest report on the the user workplace, more and more specialized tools are required according to the user role within the company and new needs are arising for access to information as well as the execution of applications in remote users and those with mobile devices.
A new case study on our UDS Enterprise connection broker and a Spanish university, a report by the renowned consulting firm IDC recommending our software for VDI and a new vulnerability detected in Linux have been the most outstanding topics in our blog for the last two weeks.
Below you can find the links to the articles on these topics just in case you dind’t have the chance to read the most interesting news on virtualization and Open Source according to our community:
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.