SlideShare a Scribd company logo
Desktop Virtualization


      Oded Rotter
  oded1233@gmail.com
Key Points
• Not just VDI !!!
• There are a lot of solutions/vendors out there
• Not necessarily one solution fits all of your
  users
• Keep an open mind: maybe some of your
  users need just regular PC…
• BYOD – Bring your own device
What types of solutions around ?
• VDI - Abstraction of desktop image from the
  HW by running hosted vm’s.
• Local Vm’s – Local execution on local vm’s
• Streaming – Abstraction the application from
  the underlying OS/HW
• Client – Centralized the image management
  but with local execution
Main steps to evaluate
• Segment your users against the technologies
• Check expected TCO – Don’t be optimistic
  there is no magic here …
• Choose your vendors
• Keep in mind user & admin experience
• How mature is your IT (Atomization for
  example) ?
• DC footprint (HVAC, rack space)

More Related Content

Similar to Desktop virtualization

Desktop Virtualization Smackdown
Desktop Virtualization SmackdownDesktop Virtualization Smackdown
Desktop Virtualization Smackdown
C/D/H Technology Consultants
 
ch1_010902 (1).ppt
ch1_010902 (1).pptch1_010902 (1).ppt
ch1_010902 (1).ppt
Sambasiva62
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
C/D/H Technology Consultants
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
C/D/H Technology Consultants
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationwebhostingguy
 
Introduction to Embedded system
Introduction to Embedded systemIntroduction to Embedded system
Introduction to Embedded system
tmnportal
 
Building IoT Devices - From Prototype to Production
Building IoT Devices - From Prototype to ProductionBuilding IoT Devices - From Prototype to Production
Building IoT Devices - From Prototype to Production
Anwaarullah
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
Manju Nathan
 
Are you ready for Windows 8 - Nicconf 2013
Are you ready for Windows 8 - Nicconf 2013Are you ready for Windows 8 - Nicconf 2013
Are you ready for Windows 8 - Nicconf 2013
Olav Tvedt
 
Presentation design - key concepts and approaches for designing your deskto...
Presentation   design - key concepts and approaches for designing your deskto...Presentation   design - key concepts and approaches for designing your deskto...
Presentation design - key concepts and approaches for designing your deskto...
xKinAnx
 
Real-world Vision Systems Design: Challenges and Techniques
Real-world Vision Systems Design: Challenges and TechniquesReal-world Vision Systems Design: Challenges and Techniques
Real-world Vision Systems Design: Challenges and Techniques
Yury Gorbachev
 
"Real-world Vision Systems Design: Challenges and Techniques," a Presentation...
"Real-world Vision Systems Design: Challenges and Techniques," a Presentation..."Real-world Vision Systems Design: Challenges and Techniques," a Presentation...
"Real-world Vision Systems Design: Challenges and Techniques," a Presentation...
Edge AI and Vision Alliance
 
Virtual Private Data Center Solution Overview
Virtual Private Data Center Solution OverviewVirtual Private Data Center Solution Overview
Virtual Private Data Center Solution Overview
Angela Chavez
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013Olav Tvedt
 
Unit 1 INTRODUCTION (COMPUTER AIDED DESIGN AND MANUFACTURING )
Unit 1 INTRODUCTION (COMPUTER AIDED DESIGN AND MANUFACTURING )Unit 1 INTRODUCTION (COMPUTER AIDED DESIGN AND MANUFACTURING )
Unit 1 INTRODUCTION (COMPUTER AIDED DESIGN AND MANUFACTURING )
ravis205084
 
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
Ron Munitz
 
Hyun goo oVirt study - Presentation
Hyun goo oVirt study - PresentationHyun goo oVirt study - Presentation
Hyun goo oVirt study - Presentation
Johnny Hyun Goo
 
CAD/CAM
CAD/CAMCAD/CAM
CAD/CAM
adi000055
 
2 mobile development frameworks and tools dark temp
2   mobile development frameworks and tools dark temp2   mobile development frameworks and tools dark temp
2 mobile development frameworks and tools dark temp
Shahid Riaz
 
VMware VCP7-DTM: More than just Horizon View
VMware VCP7-DTM: More than just Horizon ViewVMware VCP7-DTM: More than just Horizon View
VMware VCP7-DTM: More than just Horizon View
Matt Crape
 

Similar to Desktop virtualization (20)

Desktop Virtualization Smackdown
Desktop Virtualization SmackdownDesktop Virtualization Smackdown
Desktop Virtualization Smackdown
 
ch1_010902 (1).ppt
ch1_010902 (1).pptch1_010902 (1).ppt
ch1_010902 (1).ppt
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Introduction to Embedded system
Introduction to Embedded systemIntroduction to Embedded system
Introduction to Embedded system
 
Building IoT Devices - From Prototype to Production
Building IoT Devices - From Prototype to ProductionBuilding IoT Devices - From Prototype to Production
Building IoT Devices - From Prototype to Production
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Are you ready for Windows 8 - Nicconf 2013
Are you ready for Windows 8 - Nicconf 2013Are you ready for Windows 8 - Nicconf 2013
Are you ready for Windows 8 - Nicconf 2013
 
Presentation design - key concepts and approaches for designing your deskto...
Presentation   design - key concepts and approaches for designing your deskto...Presentation   design - key concepts and approaches for designing your deskto...
Presentation design - key concepts and approaches for designing your deskto...
 
Real-world Vision Systems Design: Challenges and Techniques
Real-world Vision Systems Design: Challenges and TechniquesReal-world Vision Systems Design: Challenges and Techniques
Real-world Vision Systems Design: Challenges and Techniques
 
"Real-world Vision Systems Design: Challenges and Techniques," a Presentation...
"Real-world Vision Systems Design: Challenges and Techniques," a Presentation..."Real-world Vision Systems Design: Challenges and Techniques," a Presentation...
"Real-world Vision Systems Design: Challenges and Techniques," a Presentation...
 
Virtual Private Data Center Solution Overview
Virtual Private Data Center Solution OverviewVirtual Private Data Center Solution Overview
Virtual Private Data Center Solution Overview
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013
 
Unit 1 INTRODUCTION (COMPUTER AIDED DESIGN AND MANUFACTURING )
Unit 1 INTRODUCTION (COMPUTER AIDED DESIGN AND MANUFACTURING )Unit 1 INTRODUCTION (COMPUTER AIDED DESIGN AND MANUFACTURING )
Unit 1 INTRODUCTION (COMPUTER AIDED DESIGN AND MANUFACTURING )
 
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
 
Hyun goo oVirt study - Presentation
Hyun goo oVirt study - PresentationHyun goo oVirt study - Presentation
Hyun goo oVirt study - Presentation
 
CAD/CAM
CAD/CAMCAD/CAM
CAD/CAM
 
2 mobile development frameworks and tools dark temp
2   mobile development frameworks and tools dark temp2   mobile development frameworks and tools dark temp
2 mobile development frameworks and tools dark temp
 
VMware VCP7-DTM: More than just Horizon View
VMware VCP7-DTM: More than just Horizon ViewVMware VCP7-DTM: More than just Horizon View
VMware VCP7-DTM: More than just Horizon View
 

More from Oded Rotter

מפקד האוכלוסין של ישראל ומפתח להבנתם כולל האיסור לספרית בני ישראל
מפקד האוכלוסין של ישראל ומפתח להבנתם כולל האיסור לספרית בני ישראלמפקד האוכלוסין של ישראל ומפתח להבנתם כולל האיסור לספרית בני ישראל
מפקד האוכלוסין של ישראל ומפתח להבנתם כולל האיסור לספרית בני ישראל
Oded Rotter
 
הסיפור המקראי והבנת ספרי המקרא תוך כדי ניתוח הסיפור
הסיפור המקראי והבנת ספרי המקרא תוך כדי ניתוח הסיפורהסיפור המקראי והבנת ספרי המקרא תוך כדי ניתוח הסיפור
הסיפור המקראי והבנת ספרי המקרא תוך כדי ניתוח הסיפור
Oded Rotter
 
יהוה.pdf
יהוה.pdfיהוה.pdf
יהוה.pdf
Oded Rotter
 
שלמה המלך.pdf
שלמה המלך.pdfשלמה המלך.pdf
שלמה המלך.pdf
Oded Rotter
 
ארון הברית.pdf
ארון הברית.pdfארון הברית.pdf
ארון הברית.pdf
Oded Rotter
 
the Golden calf.pdf
the Golden calf.pdfthe Golden calf.pdf
the Golden calf.pdf
Oded Rotter
 
exodus from Egypt.pdf
exodus from Egypt.pdfexodus from Egypt.pdf
exodus from Egypt.pdf
Oded Rotter
 
תפילת חנה.pdf
תפילת חנה.pdfתפילת חנה.pdf
תפילת חנה.pdf
Oded Rotter
 
עליות משה להר סיני.pdf
עליות משה להר סיני.pdfעליות משה להר סיני.pdf
עליות משה להר סיני.pdf
Oded Rotter
 
ניהול אנרגיה בארגונים עסקיים.pdf
ניהול אנרגיה בארגונים עסקיים.pdfניהול אנרגיה בארגונים עסקיים.pdf
ניהול אנרגיה בארגונים עסקיים.pdf
Oded Rotter
 
חיפוש עבודה באינטרנט.pdf
חיפוש עבודה באינטרנט.pdfחיפוש עבודה באינטרנט.pdf
חיפוש עבודה באינטרנט.pdf
Oded Rotter
 
Serverless
ServerlessServerless
Serverless
Oded Rotter
 
BBR
BBRBBR
NB-IoT
NB-IoTNB-IoT
NB-IoT
Oded Rotter
 
Lo ra
Lo raLo ra
Tls 1 3
Tls 1 3Tls 1 3
Tls 1 3
Oded Rotter
 
Bufferbloat
BufferbloatBufferbloat
Bufferbloat
Oded Rotter
 
Sdn dell lab report v2
Sdn dell lab report v2Sdn dell lab report v2
Sdn dell lab report v2
Oded Rotter
 
SDDC
SDDCSDDC
Container networking
Container networkingContainer networking
Container networking
Oded Rotter
 

More from Oded Rotter (20)

מפקד האוכלוסין של ישראל ומפתח להבנתם כולל האיסור לספרית בני ישראל
מפקד האוכלוסין של ישראל ומפתח להבנתם כולל האיסור לספרית בני ישראלמפקד האוכלוסין של ישראל ומפתח להבנתם כולל האיסור לספרית בני ישראל
מפקד האוכלוסין של ישראל ומפתח להבנתם כולל האיסור לספרית בני ישראל
 
הסיפור המקראי והבנת ספרי המקרא תוך כדי ניתוח הסיפור
הסיפור המקראי והבנת ספרי המקרא תוך כדי ניתוח הסיפורהסיפור המקראי והבנת ספרי המקרא תוך כדי ניתוח הסיפור
הסיפור המקראי והבנת ספרי המקרא תוך כדי ניתוח הסיפור
 
יהוה.pdf
יהוה.pdfיהוה.pdf
יהוה.pdf
 
שלמה המלך.pdf
שלמה המלך.pdfשלמה המלך.pdf
שלמה המלך.pdf
 
ארון הברית.pdf
ארון הברית.pdfארון הברית.pdf
ארון הברית.pdf
 
the Golden calf.pdf
the Golden calf.pdfthe Golden calf.pdf
the Golden calf.pdf
 
exodus from Egypt.pdf
exodus from Egypt.pdfexodus from Egypt.pdf
exodus from Egypt.pdf
 
תפילת חנה.pdf
תפילת חנה.pdfתפילת חנה.pdf
תפילת חנה.pdf
 
עליות משה להר סיני.pdf
עליות משה להר סיני.pdfעליות משה להר סיני.pdf
עליות משה להר סיני.pdf
 
ניהול אנרגיה בארגונים עסקיים.pdf
ניהול אנרגיה בארגונים עסקיים.pdfניהול אנרגיה בארגונים עסקיים.pdf
ניהול אנרגיה בארגונים עסקיים.pdf
 
חיפוש עבודה באינטרנט.pdf
חיפוש עבודה באינטרנט.pdfחיפוש עבודה באינטרנט.pdf
חיפוש עבודה באינטרנט.pdf
 
Serverless
ServerlessServerless
Serverless
 
BBR
BBRBBR
BBR
 
NB-IoT
NB-IoTNB-IoT
NB-IoT
 
Lo ra
Lo raLo ra
Lo ra
 
Tls 1 3
Tls 1 3Tls 1 3
Tls 1 3
 
Bufferbloat
BufferbloatBufferbloat
Bufferbloat
 
Sdn dell lab report v2
Sdn dell lab report v2Sdn dell lab report v2
Sdn dell lab report v2
 
SDDC
SDDCSDDC
SDDC
 
Container networking
Container networkingContainer networking
Container networking
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Desktop virtualization

  • 1. Desktop Virtualization Oded Rotter oded1233@gmail.com
  • 2. Key Points • Not just VDI !!! • There are a lot of solutions/vendors out there • Not necessarily one solution fits all of your users • Keep an open mind: maybe some of your users need just regular PC… • BYOD – Bring your own device
  • 3. What types of solutions around ? • VDI - Abstraction of desktop image from the HW by running hosted vm’s. • Local Vm’s – Local execution on local vm’s • Streaming – Abstraction the application from the underlying OS/HW • Client – Centralized the image management but with local execution
  • 4. Main steps to evaluate • Segment your users against the technologies • Check expected TCO – Don’t be optimistic there is no magic here … • Choose your vendors • Keep in mind user & admin experience • How mature is your IT (Atomization for example) ? • DC footprint (HVAC, rack space)