SlideShare a Scribd company logo
1 of 13
Download to read offline
Introduction to vDesk
Contents of This White Paper                                           Today’s enterprises are under pressure to lower
                                                                       costs, increase productivity, and accelerate
Barriers to Desktop Virtualization
    Adoption ......................................... 2               business initiatives. IT organizations have
   The Barriers to Local Virtual Machine                               already driven down costs, increased efficiency,
   Adoption ................................................. 2        and been able to stay ahead of growing
   The Barriers to Virtual Desktop                                     business demands by applying virtualization
   Infrastructure (VDI) Adoption.................. 2
                                                                       technology to servers in the datacenter. Desktop
The Need for Convergence in Desktop
   Virtualization ................................... 3                virtualization has the potential to have an even

   Desktop Virtualization User Requirements
                                                                       greater impact on business computing. This
   ............................................................... 3   technology could reduce the source of the
   Task Workers ......................................... 4            largest IT support and provisioning costs, and
   Campus Workers ................................... 4                make businesses far more agile. However,
   Mobile Workers ...................................... 4             enterprise attempts to apply traditional server-
   Remote Workers .................................... 4               centric virtualization technology to desktop
   Unmanaged, Contractors and                                          computing for the majority of their users have
   Consultants ............................................ 5
                                                                       not succeeded because provisioning, storing,
Overview ............................................... 5             licensing and managing virtual machines is too
   How Does vDesk Work? ........................ 6                     complex and costly. In addition, users are
   vDesk End-User Experience .................. 6                      reluctant to accept virtualization when it means
   Features ................................................. 7        that their applications perform more slowly
   Benefits .................................................. 7       and/or they can no longer take their desktop
Workspace Virtualization Technology .. 8                               environment offline.
   How Does RingCube Workspace
   Virtualization Engine (WVE) Work? .......10                         In this paper, we’ll discuss the barriers of
   How Does Application Virtualization                                 desktop virtualization adoption in the enterprise,
   Works? ..................................................11         the need for convergence in desktop
Summary ............................................ 12                virtualization approaches and the unique
About RingCube ................................. 13                    requirements across different types of enterprise
                                                                       users.

                                                                       Finally, we’ll review the RingCube vDesk
                                                                       solution, including how it works and how it’s
                                                                       Workspace Virtualization Engine (WVE)
                                                                       overcomes the barriers posed by legacy
                                                                       virtualization technologies.

                                                                       For a more technical look at desktop
                                                                       virtualization technologies, please refer to
                                                                       Introduction to Virtual Desktop Architectures
                                                                       white paper.



                                                                                                                          1
Barriers to Desktop Virtualization Adoption
       Virtualization, which has saved enterprises millions in the data center, is now moving to
       the desktop. Desktop virtualization promises to cut desktop management costs, increase
       user productivity and fundamentally change desktop computing. However, existing
       desktop virtualization approaches have had limited success in delivering a viable
       alternative to traditional PCs both in terms of cost savings and user experience. To
       achieve broad adoption, desktop virtualization must dramatically reduce desktop
       management costs while preserving the user’s familiar desktop experience.


The Barriers to Local Virtual Machine Adoption
       A virtual machine is a software implementation of a computer that enables the sharing of
       the underlying physical machine resources between different virtual machines, each
       running their own operating system. While local virtual machines have been widely
       adopted for development and testing applications, their adoption for general desktop
       computing has been limited due to resource requirements. When PCs run local virtual
       machines with a second operating system (type II hypervisor), the PC requires large
       amounts of CPU and memory resources to run properly. The result is poor application
       performance, the requirement to purchase and manage a second operating system
       license and a monolithic virtual machine that is hard to provision and tied to a single PC.

       Key Barriers to Adoption:

               Application performance
                 nd
               2 operating system

               Additional CPU and memory

               Central management and delivery


The Barriers to Virtual Desktop Infrastructure (VDI) Adoption
       Virtual Desktop Infrastructure (VDI) is a solution for server-based virtual desktop
       computing that improves control and manageability while providing end users with a
       familiar desktop experience. A total cost of ownership (TCO) comparison by Gartner
       shows that switching from traditional PCs to VDI requires millions in upfront capital
                                                                           1
       expenditures and only saves between 2% and 10% in the long run . For users, a switch


1                                                                  th
 Mark A. Margevicius, Michael A. Silver, Federica Troni, August 4 , 2008,
Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops,
Gartner, Inc.



                                                                                                     2
to VDI means that they cannot install their own applications or work offline as they could
      with their traditional laptops without incurring significantly higher costs and infrastructure
      build-out. Even the latest generation of VDI solutions that piece together hosted virtual
      desktops, application streaming/virtualization and roaming user profiles force enterprises
      to choose between an acceptable user experience or lower costs.

      Key Barriers to Adoption:

              Server, storage, and infrastructure costs

              Offline mobility

              User personalization

              Application provisioning and patching



The Need for Convergence in Desktop Virtualization
      Desktop and application virtualization technologies have made incremental progress by
      developing specific approaches to solve individual desktop computing challenges. Local
      virtual machines have been successful in development and testing because they provide
      complete operating system isolation. Server-based computing and VDI have enabled
      enterprises to centralize desktop computing in the data center for task workers and
      outsourcers to increase security and availability. Application virtualization and streaming
      have enabled enterprises to distribute applications without installation and run multiple
      versions of the same application at the same time. However, no single approach to
      desktop virtualization has delivered a compelling solution to replace traditional PCs
      because each has significant barriers to widespread adoption. What is needed is a
      desktop virtualization solution that provides complete convergence and delivers the
      familiar experience of a Windows desktop using the right desktop virtualization
      technology for the right user scenario.


Desktop Virtualization User Requirements
      Enterprises are made up of different types of workers that have unique desktop
      computing requirements. While the percentage breakdown for each type of worker varies
      by industry and company, most large enterprises have some population within each
      category (see Figure 1). Traditional PCs have evolved over the past two decades to meet
      the requirements of each type of user. To replace traditional PCs, desktop virtualization
      must provide a single desktop virtualization platform that can meet the needs of task
      workers, campus workers, mobile workers, remote workers and address unmanaged PCs
      used by employees, contractors and consultants.




                                                                                                       3
Figure 1. Desktop Virtualization User Segmentation


Task Workers
     Task workers use a thin client or low end PC to accomplish a specific task while working
     on a campus network. This type of user does not typically require personalization or the
     ability to install applications. In fact, task workers often share the same PC with other
     users during different shifts. VDI or server-based computing is often ideal for this type of
     user because of the ability to centralize and pool resources. Network streaming can also
     be used for these types of users.


Campus Workers
     The campus worker uses a desktop PC (or thin client) on the internal LAN to connect to
     computing services. Campus workers prefer a personalized desktop environment where
     they can install their own plug-ins and applications and configure settings to their
     preference. Depending on the types of campus worker, local desktop virtualization,
     network streaming or VDI may be appropriate.


Mobile Workers
     Mobile workers use a laptop as their primary workstation. These users work at home, on
     the road, and in the office. They use a mix of wired and wireless networking to connect to
     computing services over the LAN and over the WAN using VPN. Mobile workers require
     personalization, the ability to work offline and sync their desktop, particularly if they have
     multiple computing devices. Using local desktop virtualization on a laptop or running their
     virtualized desktop from a portable drive is ideal for mobile workers.


Remote Workers
     Remote workers work primarily at home or at a remote branch office that is connected
     over a WAN using a VPN. Remote workers use either a laptop or a desktop computer
     depending on their mobility and rarely if ever work on campus. Using local desktop


                                                                                                      4
virtualization on a laptop or running their virtualized desktop from portable drive is ideal
     for the mobile worker.


Unmanaged, Contractors and Consultants
     Unmanaged workers (contractors, consultants, temporary workers, outsourced workers)
     are provided with a computing environment on a project basis to perform a specific set of
     tasks. They are usually a subset user group within the mobile, remote, and campus
     workforce. When their project is completed, their computing environment needs to be de-
     provisioned and their user data secured. Depending on the type of unmanaged worker,
     local desktop virtualization, network streaming, VDI or running their virtualized desktop
     from a portable drive may be appropriate. vDesk Solution Overview



vDesk Solution Overview
     RingCube vDesk is a high-performance enterprise desktop virtualization solution that
     simplifies the creation, access and management of Windows desktops through
     Workspace Virtualization. The vDesk solution increases user productivity, lowers desktop
     management costs and eliminates the performance and resource overhead of legacy
     virtualization technologies. Users may run their virtual desktop at the office or on
     unmanaged PCs – at home, or at a client site. When users start their vDesk workspace, it
     transforms any PC into their own familiar and personalized workspace where they can
     access their files, applications, settings and entire
     desktop, just as if they were on their own PC.
     RingCube’s innovative desktop virtualization
     platform, Workspace Virtualization Engine
     (WVE), is the industry’s first workspace
     virtualization solution to deliver a lightweight and
     complete virtual desktop that can join an
     enterprise domain, has an isolated network stack
     and supports applications such as endpoint
     security, databases, and PC management
     software that require drivers and security
     services. Today, vDesk is the only desktop
     virtualization solution that meets the enterprise
     cost, management, mobility, performance and

     security requirements to deploy desktop
                                                             Figure 2. vDesk Workspace Components
     virtualization throughout the entire enterprise.




                                                                                                    5
How Does vDesk Work?
     vDesk’s virtualization technology, with 24 virtualization patents pending, separates the
     user’s desktop environment, including applications, data, and settings, from the operating
     system and encapsulates it into a virtual workspace. To self-provision vDesk workspaces,
     users login to the vDesk Client Portal, select a master workspace, and create their own
     personalized workspace instances. vDesk has the flexibility to deliver virtual desktops to
     users wherever they are through a variety of deployment options, including:

             vDesk on a PC – vDesk is stored and runs locally on the users’ PC

             vDesk on a Drive – vDesk is stored on USB drive or other removable media and
             run locally

             vDesk over the Network – vDesk is stored on a network file share and runs
             locally

             vDesk over VDI (Virtual Desktop Infrastructure) – vDesk is stored in the data
             center and accessed remotely over VDI

     For example, users can access their vDesk over the network while in the office and check
     out their vDesk workspace to a laptop or portable drive for a business trip or to work at
     home. When they come back to the office, they are prompted automatically to check in
     and synchronize their vDesk workspace to the network. Once checked in, users can
     access their vDesk workspace through the network and have all the changes that were
     made offline reflected in their online vDesk workspace.


vDesk End-User Experience
     Typically to get started, users enter their Active Directory username and password into
     the vDesk client which can easily be downloaded through the vDesk client portal from a
     web browser. Then, the users will see their familiar Microsoft Windows desktop
     environment in the vDesk workspace. Upon first login, they will see the standard desktop
     that was configured by the administrator as part of the vDesk master workspace. Users
     can customize their vDesk workspace as they would a standard PC by installing
     applications, changing settings (wallpaper, themes, plug-ins) and creating their own data
     files (documents, presentations, spreadsheets). Based on the policies defined by the
     administrator, the user may be able to use any combination of the PC, Drive, Network or
     VDI deployment methods to access their personalized desktop.




                                                                                                  6
Features
      USABILITY: MobileSync and Deployment Methods

      vDesk MobileSync enables users to synchronize their vDesk Workspace between any of
      the four vDesk deployment options (PC, Drive, Network, VDI) and work offline. While
      offline, users become truly mobile by being able to access their virtual workspace
      anytime, anywhere.

      NETWORKING: Network Virtualization and Isolation

      vDeskNet provides network virtualization and isolation of network traffic between the host
      PC and the vDesk virtual workspace. The separation of network traffic both enables
      VPNs to run inside the virtual workspace and prevents the malware on the host PC from
      viewing traffic coming from the vDesk virtual workspace.

      SECURITY: Integrated Encryption and Security
                         rd
      vDesk integrates 3 party encryption tools to protect against data loss and provides
      native host security scanning capabilities to ensure that the host PC is secure prior to
      launching a vDesk virtual workspace.

      MANAGEMENT: Provisioning and Policy Enforcement

      vDesk provides automated provisioning and enables IT administration to distribute
      updates to thousands of vDesk workspaces by updating one master workspace.
      Administrators can also enforce security policies assigned to vDesk workspaces.


Benefits

      Lower Desktop Management Costs and Licensing

      vDesk enables IT organizations to dramatically lower the cost of desktop management by
      accelerating desktop provisioning, simplifying backup and increasing user productivity.

      High Performance and Lightweight Execution

      vDesk provides a virtual desktop that performs at 99% of a host PC’s native performance
      with a virtualization layer that requires only 40-60MB of disk space and 45MB of RAM. In
      comparison, a local virtual machine or VDI deployment performs at roughly 70% of a host
      PC’s native performance with a virtualization layer that requires 2-4GB of disk space and
      512MB-2GB of dedicated RAM.




                                                                                                 7
Increased User Mobility and Productivity

     vDesk enables users to become truly mobile by being able to move their personalized
     desktop between a desktop PC, a laptop, VDI and a portable drive to provide access to
     their desktop from any PC, whether they are online or offline.

     Business Continuity and Disaster Recovery

     vDesk automatically backs up every workspace to a network file share. If a user loses
     their PC or portable drive containing their vDesk workspace, they can login to the vDesk
     User Portal to download an up-to-date copy of their personalized workspace and be up
     and running in minutes without the help of their IT organization.



Workspace Virtualization Technology
     Sitting in the architectural middle-ground between application virtualization and
     hypervisor-based virtualization (virtual machines) is workspace virtualization. Workspace
     virtualization is an approach that encapsulates and isolates an entire computing
     workspace. At a minimum, the workspace is comprised of everything above the operating
     system kernel – applications, data, settings, and any non-privileged operating system
     subsystems required to provide a functional Windows desktop computing environment.
     For deeper workspace virtualization, the virtualization engine implementation virtualizes
     privileged code modules and full operating system subsystems through a kernel-mode
     Workspace Virtualization Engine (WVE).




                                                                                                 8
Virtualization                           Type II Hypervisor (Local        Application
                         RingCube WVE
  Characteristics                            Virtual Machines/VDI)          Virtualization

Performance
(compared to host
                        ~99%               ~70%                            ~99%
PC’s native
performance)
Workspace/VM Size                                                          Varies by
                        ~40MB              ~4096MB
with Windows XP                                                            application

                                                                           Varies by
Memory Utilization      45MB               512MB-2GB
                                                                           application

OS License Required     NO                 YES                             NO
Unique Network
Identity and Network    YES                YES                             NO
Traffic Isolation
Separate User
Space (AD Domain        YES                YES                             NO
Join, GINA)
Virtualized Security
                        YES                YES                             NO
Services
Kernel Driver
                        YES                YES                             NO
Support
                    Figure 3. Comparison of Virtualization Approaches

    Key components of the RingCube WVE:

            Virtual Networking, called vDeskNet, allows the virtual workspace to separate
            and isolate network traffic from the host PC including VPN clients running within
            the virtual workspace.

            Virtual User Management allows the virtual workspace to have a unique set of
            user accounts separate from the host PC. Also, vDesk users within the virtual
            workspace can add/join an Active Directory domain independent of the user
            authentication and authorization rights of the host PC.

            Virtual Security Store provides a separate protected storage area within the
            virtual workspace where items like certificates are kept isolated from the host PC.

            Virtual Windows Services allows greater process and application isolation from
            the host PC. Virtualized services within the virtual workspace include LSA (Local
            Security Authority), Microsoft TCP/IP networking, and NTFS volumes. These
            virtualized services help to increase the number of kernel-mode applications that
            can be supported within the virtual workspace.

            Generic Driver Support provides a virtualized framework for the installation of
            drivers within the virtual workspace which includes a virtualized Plug-and-Play




                                                                                                9
service. The generic driver framework increases application support particularly
              when new drivers are required.


How Does RingCube
Workspace Virtualization
Engine (WVE) Work?
      The RingCube WVE
      encapsulates and isolates
      a complete computing
      workspace by virtualizing
      both user space and
      kernel components of the
      Microsoft Windows
      operating system. WVE
      virtualizes LSA and
      Winlogon that enable each
      workspace to have
                              Figure 4. RingCube Workspace Virtualization Engine Architecture
      separate user
      accounts, a Graphical Identification and Authentication (GINA), join enterprise domains,
      support Group Policy Objects (GPOs) and provide cryptographic services. In order to
      support critical applications such as VPNs and endpoint security, WVE provides full
      virtualization of the native Windows kernel API and device drivers. To isolate network
      traffic and provide a unique network identity, WVE includes a virtualized network
      subsystem called vDeskNet that partially virtualizes the Windows Network Driver
      Interface Specification (NDIS). In order to achieve the highest possible performance and
      most efficient use of hardware resources, RingCube specifically designed WVE to pass
      through the session manager (SMSS), Graphics Device Interface (GDI), the graphics
      subsystem and memory management components to the host operating system.
      RingCube’s Workspace Virtualization Engine provides an ideal desktop virtualization
      architecture that achieves high-performance, broad application support and strong
      isolation between the vDesk workspace and the host PC.




                                                                                               10
How Does Application
Virtualization Works?
     Application virtualization is
     designed to encapsulate only
     user mode applications rather
     than the entire desktop or
     lower level applications that
     require services or kernel
     components. Application
     containers use interception and
     sequencing technology to
     virtualize the file system and
     named objects. The registry is
     typically redirected or emulated
     while the Service Control
     Manager (SCM) is passed-
     through or rewritten         Figure 5. Typical Application Virtualization Engine Architecture
     rather than
     virtualized. This type of virtualization is useful for distributing user mode applications so
     that they can be used without installation but is not suitable for a complete desktop
     virtualization solution. In addition, critical applications commonly used in an enterprise
     environment that install services or drivers will either fail to install or not run properly once
     virtualized.

         Types of Virtualization                                          Application
                                         Types of Applications
        (Windows Components)                                             Virtualization
       User-mode applications
                                        Web browsers, IM clients       Yes
       (registry, file systems)

       User-mode services (SCM:
       MSI, RPCSS, COM,                 PDF distiller                  Partially
       DCOM, COM+, spooler)

       user-mode subsystems             Font management,
                                                                       Partially
       (CSRSS)                          Runtime DLLs
       Kernel-mode drivers (Plug-       Printers, Encryption,
                                                                       No
       n-Play)                          CD/DVD
       File system volumes (NTFS
                                        Commercial licensing           No
       volumes)
       Security subsystems (LSA,        PC Management tools,
                                                                       No
       protected storage)               Databases, VoIP clients
       Network subsystems               VPNs, Firewalls, IPS,
                                                                       No
       (TCP/IP networking)              VoIP clients


     Figure 6. Supported Applications with Application Virtualization Technology


                                                                                                     11
Summary
   Organizations have tried to implement desktop virtualization for years but had limited
   success in finding a viable alternative to traditional PCs both in terms of cost savings and
   user experience. VDI, local virtual machines and application virtualization are useful to
   solve individual desktop computing problems but also have barriers that prevent their
   adoption for large segments of users. Rather than piecing together existing desktop
   virtualization approaches, organizations should consider a new approach to desktop
   computing that eliminates the native barriers by leveraging the existing windows desktop
   infrastructure to reduce the cost of deploying desktop virtualization, provides the
   performance of a traditional PC and delivers the mobility and personalization that users
   expect.

   vDesk is a high-performance enterprise desktop virtualization solution that simplifies the
   creation, access and management of Windows desktops through workspace
   virtualization. The vDesk solution increases user productivity, lowers desktop
   management costs and eliminates the performance and resource overhead of legacy
   virtualization technologies. RingCube’s innovative desktop virtualization platform,
   Workspace Virtualization Engine (WVE), is the industry’s first workspace virtualization
   solution to deliver a lightweight and complete virtual desktop that can join an enterprise
   domain, has an isolated network stack and supports applications such as endpoint
   security, databases, and PC management software that require drivers and security
   services. Today, vDesk is the only desktop virtualization solution that meets the
   enterprise cost, management, mobility, performance and security requirements to deploy
   desktop virtualization throughout the entire enterprise.




                                                                                                12
About RingCube
         RingCube is the leading provider of workspace virtualization. The company’s innovative
         virtualization solution, vDesk, enables users to securely access their complete desktop
         computing experience from any Windows PC anywhere in the world. With vDesk,
         organizations can increase user productivity, lower desktop management and support
         costs, and eliminate the performance and resource overhead commonly found with
         legacy virtualization approaches.




         RingCube Technologies, Inc.
         100 W. Evelyn Ave., Suite 210
         Mountain View, CA 94041
         United States
         Main: 1-866-323-4278
         International: 650-605-6900
         Fax: 408-605-6901




© 2009. All rights reserved. RingCube and vDesk are trademarks of RingCube Technologies, Inc. All other trademarks
and registered trademarks are the properties of their respective holders.

More Related Content

What's hot

Idc quantifying-business-value-v mware-view-wp
Idc quantifying-business-value-v mware-view-wpIdc quantifying-business-value-v mware-view-wp
Idc quantifying-business-value-v mware-view-wpkimsach
 
VDI Monitoring
VDI MonitoringVDI Monitoring
VDI Monitoringkrajav
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareIBM India Smarter Computing
 
DTI Custom Publication, 2011
DTI Custom Publication, 2011DTI Custom Publication, 2011
DTI Custom Publication, 2011joeldeer
 
Virtual Desktop Computing _White Paper - by David Roth
Virtual Desktop Computing _White Paper - by David RothVirtual Desktop Computing _White Paper - by David Roth
Virtual Desktop Computing _White Paper - by David RothDavid Roth
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609patriciafriar
 
DTI Custom Publication, 2009
DTI Custom Publication, 2009DTI Custom Publication, 2009
DTI Custom Publication, 2009joeldeer
 
VDI Simplified: Desktops in the Cloud
VDI Simplified: Desktops in the CloudVDI Simplified: Desktops in the Cloud
VDI Simplified: Desktops in the CloudDesktone
 
Whitepaer VDI and DaaS -- June 2015
Whitepaer VDI and DaaS -- June 2015Whitepaer VDI and DaaS -- June 2015
Whitepaer VDI and DaaS -- June 2015Greg Spence
 
Insight - HCL Next-Generation Enterprise Virtual Desktop Infrasturcture Solut...
Insight - HCL Next-Generation Enterprise Virtual Desktop Infrasturcture Solut...Insight - HCL Next-Generation Enterprise Virtual Desktop Infrasturcture Solut...
Insight - HCL Next-Generation Enterprise Virtual Desktop Infrasturcture Solut...HCL Infotech Ltd.
 
Desktop virtualization customer presentation
Desktop virtualization customer presentationDesktop virtualization customer presentation
Desktop virtualization customer presentationNuno Alves
 
TechNet Live spor 2 sesjon 3 - vdi overview
TechNet Live spor 2   sesjon 3 - vdi overviewTechNet Live spor 2   sesjon 3 - vdi overview
TechNet Live spor 2 sesjon 3 - vdi overviewAnders Borchsenius
 
The Success Guide V4
The Success Guide V4The Success Guide V4
The Success Guide V4Brett Loveday
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayObserveIT
 
Idc Quantifying Business Value V Mware View
Idc Quantifying Business Value V Mware ViewIdc Quantifying Business Value V Mware View
Idc Quantifying Business Value V Mware ViewZernike College
 
TCA/TCO Benefits of Consolidating Databases and x86 Servers on IBM Enterprise...
TCA/TCO Benefits of Consolidating Databases and x86 Servers on IBM Enterprise...TCA/TCO Benefits of Consolidating Databases and x86 Servers on IBM Enterprise...
TCA/TCO Benefits of Consolidating Databases and x86 Servers on IBM Enterprise...IBM India Smarter Computing
 

What's hot (19)

Idc quantifying-business-value-v mware-view-wp
Idc quantifying-business-value-v mware-view-wpIdc quantifying-business-value-v mware-view-wp
Idc quantifying-business-value-v mware-view-wp
 
IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure
 
VDI Monitoring
VDI MonitoringVDI Monitoring
VDI Monitoring
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and Software
 
DTI Custom Publication, 2011
DTI Custom Publication, 2011DTI Custom Publication, 2011
DTI Custom Publication, 2011
 
Virtual Desktop Computing _White Paper - by David Roth
Virtual Desktop Computing _White Paper - by David RothVirtual Desktop Computing _White Paper - by David Roth
Virtual Desktop Computing _White Paper - by David Roth
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609
 
DTI Custom Publication, 2009
DTI Custom Publication, 2009DTI Custom Publication, 2009
DTI Custom Publication, 2009
 
VDI Simplified: Desktops in the Cloud
VDI Simplified: Desktops in the CloudVDI Simplified: Desktops in the Cloud
VDI Simplified: Desktops in the Cloud
 
Whitepaer VDI and DaaS -- June 2015
Whitepaer VDI and DaaS -- June 2015Whitepaer VDI and DaaS -- June 2015
Whitepaer VDI and DaaS -- June 2015
 
Insight - HCL Next-Generation Enterprise Virtual Desktop Infrasturcture Solut...
Insight - HCL Next-Generation Enterprise Virtual Desktop Infrasturcture Solut...Insight - HCL Next-Generation Enterprise Virtual Desktop Infrasturcture Solut...
Insight - HCL Next-Generation Enterprise Virtual Desktop Infrasturcture Solut...
 
Desktop virtualization customer presentation
Desktop virtualization customer presentationDesktop virtualization customer presentation
Desktop virtualization customer presentation
 
TechNet Live spor 2 sesjon 3 - vdi overview
TechNet Live spor 2   sesjon 3 - vdi overviewTechNet Live spor 2   sesjon 3 - vdi overview
TechNet Live spor 2 sesjon 3 - vdi overview
 
The Success Guide V4
The Success Guide V4The Success Guide V4
The Success Guide V4
 
The Case for Virtual Desktops
The Case for Virtual Desktops The Case for Virtual Desktops
The Case for Virtual Desktops
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
 
Idc Quantifying Business Value V Mware View
Idc Quantifying Business Value V Mware ViewIdc Quantifying Business Value V Mware View
Idc Quantifying Business Value V Mware View
 
TCA/TCO Benefits of Consolidating Databases and x86 Servers on IBM Enterprise...
TCA/TCO Benefits of Consolidating Databases and x86 Servers on IBM Enterprise...TCA/TCO Benefits of Consolidating Databases and x86 Servers on IBM Enterprise...
TCA/TCO Benefits of Consolidating Databases and x86 Servers on IBM Enterprise...
 
zEnterprise Executive Overview
zEnterprise Executive OverviewzEnterprise Executive Overview
zEnterprise Executive Overview
 

Viewers also liked

Grafites Argentinos com legenda
Grafites Argentinos com legendaGrafites Argentinos com legenda
Grafites Argentinos com legendaLucio Borges
 
Petrochemistry 2016 a4 brochure
Petrochemistry 2016 a4 brochurePetrochemistry 2016 a4 brochure
Petrochemistry 2016 a4 brochureSanfour Adlen
 
Ramblin' man fair stage times
Ramblin' man fair   stage timesRamblin' man fair   stage times
Ramblin' man fair stage timesRamblin' Man Fair
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionKrishna De
 
CSI Engineering Brochure
CSI Engineering BrochureCSI Engineering Brochure
CSI Engineering Brochurekcann88
 
Revista Mundo Contact Septiembre 2013
Revista Mundo Contact Septiembre 2013Revista Mundo Contact Septiembre 2013
Revista Mundo Contact Septiembre 2013Mundo Contact
 
Ruta de resistencia de brasil 12. capao. español.
Ruta de resistencia de brasil 12. capao. español.Ruta de resistencia de brasil 12. capao. español.
Ruta de resistencia de brasil 12. capao. español.CEUNA
 
Swarovski, Austria.
Swarovski, Austria.Swarovski, Austria.
Swarovski, Austria.anu partha
 
Planificador de proyectos
Planificador de proyectosPlanificador de proyectos
Planificador de proyectosstyand
 
Cemil Tarhan CV 2013
Cemil Tarhan CV 2013Cemil Tarhan CV 2013
Cemil Tarhan CV 2013cemil tarhan
 
Kitchen Service Cookware
Kitchen Service CookwareKitchen Service Cookware
Kitchen Service CookwareMark Moreno
 
Mk vs dcu_guia_x360
Mk vs dcu_guia_x360Mk vs dcu_guia_x360
Mk vs dcu_guia_x360makarena
 
Memoria DreamsLab - Emocionari
Memoria  DreamsLab - EmocionariMemoria  DreamsLab - Emocionari
Memoria DreamsLab - Emocionarijoanaliau22
 
Intermedios Primavera Verano 2014 Moda Club Catalogo
Intermedios Primavera Verano 2014 Moda Club CatalogoIntermedios Primavera Verano 2014 Moda Club Catalogo
Intermedios Primavera Verano 2014 Moda Club CatalogoModaClub
 

Viewers also liked (20)

Grafites Argentinos com legenda
Grafites Argentinos com legendaGrafites Argentinos com legenda
Grafites Argentinos com legenda
 
Petrochemistry 2016 a4 brochure
Petrochemistry 2016 a4 brochurePetrochemistry 2016 a4 brochure
Petrochemistry 2016 a4 brochure
 
Ramblin' man fair stage times
Ramblin' man fair   stage timesRamblin' man fair   stage times
Ramblin' man fair stage times
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
CSI Engineering Brochure
CSI Engineering BrochureCSI Engineering Brochure
CSI Engineering Brochure
 
1100 fluidtime
1100 fluidtime1100 fluidtime
1100 fluidtime
 
Agenda's 2014 priced - smb - nl
Agenda's 2014   priced - smb - nlAgenda's 2014   priced - smb - nl
Agenda's 2014 priced - smb - nl
 
Revista Mundo Contact Septiembre 2013
Revista Mundo Contact Septiembre 2013Revista Mundo Contact Septiembre 2013
Revista Mundo Contact Septiembre 2013
 
taller powerpoint
taller powerpointtaller powerpoint
taller powerpoint
 
Lookbook LOHE International - Spring/Summer 2015 Collection.
Lookbook LOHE International - Spring/Summer 2015 Collection.Lookbook LOHE International - Spring/Summer 2015 Collection.
Lookbook LOHE International - Spring/Summer 2015 Collection.
 
Ruta de resistencia de brasil 12. capao. español.
Ruta de resistencia de brasil 12. capao. español.Ruta de resistencia de brasil 12. capao. español.
Ruta de resistencia de brasil 12. capao. español.
 
Swarovski, Austria.
Swarovski, Austria.Swarovski, Austria.
Swarovski, Austria.
 
Planificador de proyectos
Planificador de proyectosPlanificador de proyectos
Planificador de proyectos
 
Cemil Tarhan CV 2013
Cemil Tarhan CV 2013Cemil Tarhan CV 2013
Cemil Tarhan CV 2013
 
Kitchen Service Cookware
Kitchen Service CookwareKitchen Service Cookware
Kitchen Service Cookware
 
Biblia y-ciencia31
Biblia y-ciencia31Biblia y-ciencia31
Biblia y-ciencia31
 
Mk vs dcu_guia_x360
Mk vs dcu_guia_x360Mk vs dcu_guia_x360
Mk vs dcu_guia_x360
 
Informe Ecologia
Informe EcologiaInforme Ecologia
Informe Ecologia
 
Memoria DreamsLab - Emocionari
Memoria  DreamsLab - EmocionariMemoria  DreamsLab - Emocionari
Memoria DreamsLab - Emocionari
 
Intermedios Primavera Verano 2014 Moda Club Catalogo
Intermedios Primavera Verano 2014 Moda Club CatalogoIntermedios Primavera Verano 2014 Moda Club Catalogo
Intermedios Primavera Verano 2014 Moda Club Catalogo
 

Similar to vDesk: Introduction to Desktop Virtualization

The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop RevolutionYankee Group
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Md Yousup Faruqu
 
Ci oezine v2
Ci oezine v2Ci oezine v2
Ci oezine v2hoyinc
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Flexera
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Futurestevej7699
 
What is desktop virtualization and how does it work
What is desktop virtualization and how does it workWhat is desktop virtualization and how does it work
What is desktop virtualization and how does it workTemok IT Services
 
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server FamilyThe Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server FamilyIBM India Smarter Computing
 
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server FamilyThe Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server FamilyIBM India Smarter Computing
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewDavid Barry
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
 
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationHTS Hosting
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure247 Invest
 
Microsoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft Private Cloud
 
Impacto Economico de windows virtual server
Impacto Economico de windows virtual serverImpacto Economico de windows virtual server
Impacto Economico de windows virtual serverCade Soluciones
 
Deconstructing the brian paradox
Deconstructing the brian paradoxDeconstructing the brian paradox
Deconstructing the brian paradoxChetan Venkatesh
 
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWAREPRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWAREIBM India Smarter Computing
 
virtualization whitepaper en
virtualization whitepaper envirtualization whitepaper en
virtualization whitepaper eneyeOS
 

Similar to vDesk: Introduction to Desktop Virtualization (20)

The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop Revolution
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Ci oezine v2
Ci oezine v2Ci oezine v2
Ci oezine v2
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
VDI Cost benefit analysis
VDI Cost benefit analysisVDI Cost benefit analysis
VDI Cost benefit analysis
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Future
 
What is desktop virtualization and how does it work
What is desktop virtualization and how does it workWhat is desktop virtualization and how does it work
What is desktop virtualization and how does it work
 
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server FamilyThe Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
 
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server FamilyThe Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of View
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop Virtualization
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
N computing with-vmware-citrix
N computing with-vmware-citrixN computing with-vmware-citrix
N computing with-vmware-citrix
 
Microsoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows Whitepaper
 
A0950107
A0950107A0950107
A0950107
 
Impacto Economico de windows virtual server
Impacto Economico de windows virtual serverImpacto Economico de windows virtual server
Impacto Economico de windows virtual server
 
Deconstructing the brian paradox
Deconstructing the brian paradoxDeconstructing the brian paradox
Deconstructing the brian paradox
 
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWAREPRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
 
virtualization whitepaper en
virtualization whitepaper envirtualization whitepaper en
virtualization whitepaper en
 

More from RingCube Technologies, Inc. (7)

RingCube vDesk with VMware Fusion
RingCube vDesk with VMware FusionRingCube vDesk with VMware Fusion
RingCube vDesk with VMware Fusion
 
Ds vdesk
Ds vdeskDs vdesk
Ds vdesk
 
Ds vdesk
Ds vdeskDs vdesk
Ds vdesk
 
Ds vdesk
Ds vdeskDs vdesk
Ds vdesk
 
Introduction to vDesk
Introduction to vDeskIntroduction to vDesk
Introduction to vDesk
 
RingCube vDesk with Parallels Desktop for the Mac
RingCube vDesk with Parallels Desktop for the MacRingCube vDesk with Parallels Desktop for the Mac
RingCube vDesk with Parallels Desktop for the Mac
 
Electric Supply Distributor deploys virtual desktops for increased mobility, ...
Electric Supply Distributor deploys virtual desktops for increased mobility, ...Electric Supply Distributor deploys virtual desktops for increased mobility, ...
Electric Supply Distributor deploys virtual desktops for increased mobility, ...
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

vDesk: Introduction to Desktop Virtualization

  • 1. Introduction to vDesk Contents of This White Paper Today’s enterprises are under pressure to lower costs, increase productivity, and accelerate Barriers to Desktop Virtualization Adoption ......................................... 2 business initiatives. IT organizations have The Barriers to Local Virtual Machine already driven down costs, increased efficiency, Adoption ................................................. 2 and been able to stay ahead of growing The Barriers to Virtual Desktop business demands by applying virtualization Infrastructure (VDI) Adoption.................. 2 technology to servers in the datacenter. Desktop The Need for Convergence in Desktop Virtualization ................................... 3 virtualization has the potential to have an even Desktop Virtualization User Requirements greater impact on business computing. This ............................................................... 3 technology could reduce the source of the Task Workers ......................................... 4 largest IT support and provisioning costs, and Campus Workers ................................... 4 make businesses far more agile. However, Mobile Workers ...................................... 4 enterprise attempts to apply traditional server- Remote Workers .................................... 4 centric virtualization technology to desktop Unmanaged, Contractors and computing for the majority of their users have Consultants ............................................ 5 not succeeded because provisioning, storing, Overview ............................................... 5 licensing and managing virtual machines is too How Does vDesk Work? ........................ 6 complex and costly. In addition, users are vDesk End-User Experience .................. 6 reluctant to accept virtualization when it means Features ................................................. 7 that their applications perform more slowly Benefits .................................................. 7 and/or they can no longer take their desktop Workspace Virtualization Technology .. 8 environment offline. How Does RingCube Workspace Virtualization Engine (WVE) Work? .......10 In this paper, we’ll discuss the barriers of How Does Application Virtualization desktop virtualization adoption in the enterprise, Works? ..................................................11 the need for convergence in desktop Summary ............................................ 12 virtualization approaches and the unique About RingCube ................................. 13 requirements across different types of enterprise users. Finally, we’ll review the RingCube vDesk solution, including how it works and how it’s Workspace Virtualization Engine (WVE) overcomes the barriers posed by legacy virtualization technologies. For a more technical look at desktop virtualization technologies, please refer to Introduction to Virtual Desktop Architectures white paper. 1
  • 2. Barriers to Desktop Virtualization Adoption Virtualization, which has saved enterprises millions in the data center, is now moving to the desktop. Desktop virtualization promises to cut desktop management costs, increase user productivity and fundamentally change desktop computing. However, existing desktop virtualization approaches have had limited success in delivering a viable alternative to traditional PCs both in terms of cost savings and user experience. To achieve broad adoption, desktop virtualization must dramatically reduce desktop management costs while preserving the user’s familiar desktop experience. The Barriers to Local Virtual Machine Adoption A virtual machine is a software implementation of a computer that enables the sharing of the underlying physical machine resources between different virtual machines, each running their own operating system. While local virtual machines have been widely adopted for development and testing applications, their adoption for general desktop computing has been limited due to resource requirements. When PCs run local virtual machines with a second operating system (type II hypervisor), the PC requires large amounts of CPU and memory resources to run properly. The result is poor application performance, the requirement to purchase and manage a second operating system license and a monolithic virtual machine that is hard to provision and tied to a single PC. Key Barriers to Adoption: Application performance nd 2 operating system Additional CPU and memory Central management and delivery The Barriers to Virtual Desktop Infrastructure (VDI) Adoption Virtual Desktop Infrastructure (VDI) is a solution for server-based virtual desktop computing that improves control and manageability while providing end users with a familiar desktop experience. A total cost of ownership (TCO) comparison by Gartner shows that switching from traditional PCs to VDI requires millions in upfront capital 1 expenditures and only saves between 2% and 10% in the long run . For users, a switch 1 th Mark A. Margevicius, Michael A. Silver, Federica Troni, August 4 , 2008, Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops, Gartner, Inc. 2
  • 3. to VDI means that they cannot install their own applications or work offline as they could with their traditional laptops without incurring significantly higher costs and infrastructure build-out. Even the latest generation of VDI solutions that piece together hosted virtual desktops, application streaming/virtualization and roaming user profiles force enterprises to choose between an acceptable user experience or lower costs. Key Barriers to Adoption: Server, storage, and infrastructure costs Offline mobility User personalization Application provisioning and patching The Need for Convergence in Desktop Virtualization Desktop and application virtualization technologies have made incremental progress by developing specific approaches to solve individual desktop computing challenges. Local virtual machines have been successful in development and testing because they provide complete operating system isolation. Server-based computing and VDI have enabled enterprises to centralize desktop computing in the data center for task workers and outsourcers to increase security and availability. Application virtualization and streaming have enabled enterprises to distribute applications without installation and run multiple versions of the same application at the same time. However, no single approach to desktop virtualization has delivered a compelling solution to replace traditional PCs because each has significant barriers to widespread adoption. What is needed is a desktop virtualization solution that provides complete convergence and delivers the familiar experience of a Windows desktop using the right desktop virtualization technology for the right user scenario. Desktop Virtualization User Requirements Enterprises are made up of different types of workers that have unique desktop computing requirements. While the percentage breakdown for each type of worker varies by industry and company, most large enterprises have some population within each category (see Figure 1). Traditional PCs have evolved over the past two decades to meet the requirements of each type of user. To replace traditional PCs, desktop virtualization must provide a single desktop virtualization platform that can meet the needs of task workers, campus workers, mobile workers, remote workers and address unmanaged PCs used by employees, contractors and consultants. 3
  • 4. Figure 1. Desktop Virtualization User Segmentation Task Workers Task workers use a thin client or low end PC to accomplish a specific task while working on a campus network. This type of user does not typically require personalization or the ability to install applications. In fact, task workers often share the same PC with other users during different shifts. VDI or server-based computing is often ideal for this type of user because of the ability to centralize and pool resources. Network streaming can also be used for these types of users. Campus Workers The campus worker uses a desktop PC (or thin client) on the internal LAN to connect to computing services. Campus workers prefer a personalized desktop environment where they can install their own plug-ins and applications and configure settings to their preference. Depending on the types of campus worker, local desktop virtualization, network streaming or VDI may be appropriate. Mobile Workers Mobile workers use a laptop as their primary workstation. These users work at home, on the road, and in the office. They use a mix of wired and wireless networking to connect to computing services over the LAN and over the WAN using VPN. Mobile workers require personalization, the ability to work offline and sync their desktop, particularly if they have multiple computing devices. Using local desktop virtualization on a laptop or running their virtualized desktop from a portable drive is ideal for mobile workers. Remote Workers Remote workers work primarily at home or at a remote branch office that is connected over a WAN using a VPN. Remote workers use either a laptop or a desktop computer depending on their mobility and rarely if ever work on campus. Using local desktop 4
  • 5. virtualization on a laptop or running their virtualized desktop from portable drive is ideal for the mobile worker. Unmanaged, Contractors and Consultants Unmanaged workers (contractors, consultants, temporary workers, outsourced workers) are provided with a computing environment on a project basis to perform a specific set of tasks. They are usually a subset user group within the mobile, remote, and campus workforce. When their project is completed, their computing environment needs to be de- provisioned and their user data secured. Depending on the type of unmanaged worker, local desktop virtualization, network streaming, VDI or running their virtualized desktop from a portable drive may be appropriate. vDesk Solution Overview vDesk Solution Overview RingCube vDesk is a high-performance enterprise desktop virtualization solution that simplifies the creation, access and management of Windows desktops through Workspace Virtualization. The vDesk solution increases user productivity, lowers desktop management costs and eliminates the performance and resource overhead of legacy virtualization technologies. Users may run their virtual desktop at the office or on unmanaged PCs – at home, or at a client site. When users start their vDesk workspace, it transforms any PC into their own familiar and personalized workspace where they can access their files, applications, settings and entire desktop, just as if they were on their own PC. RingCube’s innovative desktop virtualization platform, Workspace Virtualization Engine (WVE), is the industry’s first workspace virtualization solution to deliver a lightweight and complete virtual desktop that can join an enterprise domain, has an isolated network stack and supports applications such as endpoint security, databases, and PC management software that require drivers and security services. Today, vDesk is the only desktop virtualization solution that meets the enterprise cost, management, mobility, performance and security requirements to deploy desktop Figure 2. vDesk Workspace Components virtualization throughout the entire enterprise. 5
  • 6. How Does vDesk Work? vDesk’s virtualization technology, with 24 virtualization patents pending, separates the user’s desktop environment, including applications, data, and settings, from the operating system and encapsulates it into a virtual workspace. To self-provision vDesk workspaces, users login to the vDesk Client Portal, select a master workspace, and create their own personalized workspace instances. vDesk has the flexibility to deliver virtual desktops to users wherever they are through a variety of deployment options, including: vDesk on a PC – vDesk is stored and runs locally on the users’ PC vDesk on a Drive – vDesk is stored on USB drive or other removable media and run locally vDesk over the Network – vDesk is stored on a network file share and runs locally vDesk over VDI (Virtual Desktop Infrastructure) – vDesk is stored in the data center and accessed remotely over VDI For example, users can access their vDesk over the network while in the office and check out their vDesk workspace to a laptop or portable drive for a business trip or to work at home. When they come back to the office, they are prompted automatically to check in and synchronize their vDesk workspace to the network. Once checked in, users can access their vDesk workspace through the network and have all the changes that were made offline reflected in their online vDesk workspace. vDesk End-User Experience Typically to get started, users enter their Active Directory username and password into the vDesk client which can easily be downloaded through the vDesk client portal from a web browser. Then, the users will see their familiar Microsoft Windows desktop environment in the vDesk workspace. Upon first login, they will see the standard desktop that was configured by the administrator as part of the vDesk master workspace. Users can customize their vDesk workspace as they would a standard PC by installing applications, changing settings (wallpaper, themes, plug-ins) and creating their own data files (documents, presentations, spreadsheets). Based on the policies defined by the administrator, the user may be able to use any combination of the PC, Drive, Network or VDI deployment methods to access their personalized desktop. 6
  • 7. Features USABILITY: MobileSync and Deployment Methods vDesk MobileSync enables users to synchronize their vDesk Workspace between any of the four vDesk deployment options (PC, Drive, Network, VDI) and work offline. While offline, users become truly mobile by being able to access their virtual workspace anytime, anywhere. NETWORKING: Network Virtualization and Isolation vDeskNet provides network virtualization and isolation of network traffic between the host PC and the vDesk virtual workspace. The separation of network traffic both enables VPNs to run inside the virtual workspace and prevents the malware on the host PC from viewing traffic coming from the vDesk virtual workspace. SECURITY: Integrated Encryption and Security rd vDesk integrates 3 party encryption tools to protect against data loss and provides native host security scanning capabilities to ensure that the host PC is secure prior to launching a vDesk virtual workspace. MANAGEMENT: Provisioning and Policy Enforcement vDesk provides automated provisioning and enables IT administration to distribute updates to thousands of vDesk workspaces by updating one master workspace. Administrators can also enforce security policies assigned to vDesk workspaces. Benefits Lower Desktop Management Costs and Licensing vDesk enables IT organizations to dramatically lower the cost of desktop management by accelerating desktop provisioning, simplifying backup and increasing user productivity. High Performance and Lightweight Execution vDesk provides a virtual desktop that performs at 99% of a host PC’s native performance with a virtualization layer that requires only 40-60MB of disk space and 45MB of RAM. In comparison, a local virtual machine or VDI deployment performs at roughly 70% of a host PC’s native performance with a virtualization layer that requires 2-4GB of disk space and 512MB-2GB of dedicated RAM. 7
  • 8. Increased User Mobility and Productivity vDesk enables users to become truly mobile by being able to move their personalized desktop between a desktop PC, a laptop, VDI and a portable drive to provide access to their desktop from any PC, whether they are online or offline. Business Continuity and Disaster Recovery vDesk automatically backs up every workspace to a network file share. If a user loses their PC or portable drive containing their vDesk workspace, they can login to the vDesk User Portal to download an up-to-date copy of their personalized workspace and be up and running in minutes without the help of their IT organization. Workspace Virtualization Technology Sitting in the architectural middle-ground between application virtualization and hypervisor-based virtualization (virtual machines) is workspace virtualization. Workspace virtualization is an approach that encapsulates and isolates an entire computing workspace. At a minimum, the workspace is comprised of everything above the operating system kernel – applications, data, settings, and any non-privileged operating system subsystems required to provide a functional Windows desktop computing environment. For deeper workspace virtualization, the virtualization engine implementation virtualizes privileged code modules and full operating system subsystems through a kernel-mode Workspace Virtualization Engine (WVE). 8
  • 9. Virtualization Type II Hypervisor (Local Application RingCube WVE Characteristics Virtual Machines/VDI) Virtualization Performance (compared to host ~99% ~70% ~99% PC’s native performance) Workspace/VM Size Varies by ~40MB ~4096MB with Windows XP application Varies by Memory Utilization 45MB 512MB-2GB application OS License Required NO YES NO Unique Network Identity and Network YES YES NO Traffic Isolation Separate User Space (AD Domain YES YES NO Join, GINA) Virtualized Security YES YES NO Services Kernel Driver YES YES NO Support Figure 3. Comparison of Virtualization Approaches Key components of the RingCube WVE: Virtual Networking, called vDeskNet, allows the virtual workspace to separate and isolate network traffic from the host PC including VPN clients running within the virtual workspace. Virtual User Management allows the virtual workspace to have a unique set of user accounts separate from the host PC. Also, vDesk users within the virtual workspace can add/join an Active Directory domain independent of the user authentication and authorization rights of the host PC. Virtual Security Store provides a separate protected storage area within the virtual workspace where items like certificates are kept isolated from the host PC. Virtual Windows Services allows greater process and application isolation from the host PC. Virtualized services within the virtual workspace include LSA (Local Security Authority), Microsoft TCP/IP networking, and NTFS volumes. These virtualized services help to increase the number of kernel-mode applications that can be supported within the virtual workspace. Generic Driver Support provides a virtualized framework for the installation of drivers within the virtual workspace which includes a virtualized Plug-and-Play 9
  • 10. service. The generic driver framework increases application support particularly when new drivers are required. How Does RingCube Workspace Virtualization Engine (WVE) Work? The RingCube WVE encapsulates and isolates a complete computing workspace by virtualizing both user space and kernel components of the Microsoft Windows operating system. WVE virtualizes LSA and Winlogon that enable each workspace to have Figure 4. RingCube Workspace Virtualization Engine Architecture separate user accounts, a Graphical Identification and Authentication (GINA), join enterprise domains, support Group Policy Objects (GPOs) and provide cryptographic services. In order to support critical applications such as VPNs and endpoint security, WVE provides full virtualization of the native Windows kernel API and device drivers. To isolate network traffic and provide a unique network identity, WVE includes a virtualized network subsystem called vDeskNet that partially virtualizes the Windows Network Driver Interface Specification (NDIS). In order to achieve the highest possible performance and most efficient use of hardware resources, RingCube specifically designed WVE to pass through the session manager (SMSS), Graphics Device Interface (GDI), the graphics subsystem and memory management components to the host operating system. RingCube’s Workspace Virtualization Engine provides an ideal desktop virtualization architecture that achieves high-performance, broad application support and strong isolation between the vDesk workspace and the host PC. 10
  • 11. How Does Application Virtualization Works? Application virtualization is designed to encapsulate only user mode applications rather than the entire desktop or lower level applications that require services or kernel components. Application containers use interception and sequencing technology to virtualize the file system and named objects. The registry is typically redirected or emulated while the Service Control Manager (SCM) is passed- through or rewritten Figure 5. Typical Application Virtualization Engine Architecture rather than virtualized. This type of virtualization is useful for distributing user mode applications so that they can be used without installation but is not suitable for a complete desktop virtualization solution. In addition, critical applications commonly used in an enterprise environment that install services or drivers will either fail to install or not run properly once virtualized. Types of Virtualization Application Types of Applications (Windows Components) Virtualization User-mode applications Web browsers, IM clients Yes (registry, file systems) User-mode services (SCM: MSI, RPCSS, COM, PDF distiller Partially DCOM, COM+, spooler) user-mode subsystems Font management, Partially (CSRSS) Runtime DLLs Kernel-mode drivers (Plug- Printers, Encryption, No n-Play) CD/DVD File system volumes (NTFS Commercial licensing No volumes) Security subsystems (LSA, PC Management tools, No protected storage) Databases, VoIP clients Network subsystems VPNs, Firewalls, IPS, No (TCP/IP networking) VoIP clients Figure 6. Supported Applications with Application Virtualization Technology 11
  • 12. Summary Organizations have tried to implement desktop virtualization for years but had limited success in finding a viable alternative to traditional PCs both in terms of cost savings and user experience. VDI, local virtual machines and application virtualization are useful to solve individual desktop computing problems but also have barriers that prevent their adoption for large segments of users. Rather than piecing together existing desktop virtualization approaches, organizations should consider a new approach to desktop computing that eliminates the native barriers by leveraging the existing windows desktop infrastructure to reduce the cost of deploying desktop virtualization, provides the performance of a traditional PC and delivers the mobility and personalization that users expect. vDesk is a high-performance enterprise desktop virtualization solution that simplifies the creation, access and management of Windows desktops through workspace virtualization. The vDesk solution increases user productivity, lowers desktop management costs and eliminates the performance and resource overhead of legacy virtualization technologies. RingCube’s innovative desktop virtualization platform, Workspace Virtualization Engine (WVE), is the industry’s first workspace virtualization solution to deliver a lightweight and complete virtual desktop that can join an enterprise domain, has an isolated network stack and supports applications such as endpoint security, databases, and PC management software that require drivers and security services. Today, vDesk is the only desktop virtualization solution that meets the enterprise cost, management, mobility, performance and security requirements to deploy desktop virtualization throughout the entire enterprise. 12
  • 13. About RingCube RingCube is the leading provider of workspace virtualization. The company’s innovative virtualization solution, vDesk, enables users to securely access their complete desktop computing experience from any Windows PC anywhere in the world. With vDesk, organizations can increase user productivity, lower desktop management and support costs, and eliminate the performance and resource overhead commonly found with legacy virtualization approaches. RingCube Technologies, Inc. 100 W. Evelyn Ave., Suite 210 Mountain View, CA 94041 United States Main: 1-866-323-4278 International: 650-605-6900 Fax: 408-605-6901 © 2009. All rights reserved. RingCube and vDesk are trademarks of RingCube Technologies, Inc. All other trademarks and registered trademarks are the properties of their respective holders.