Browse Definitions:

SearchVirtualDesktop

SearchVirtualDesktop provides in-depth technical advice and information on the products, services and business strategies that can lead to successful implementations of desktop virtualization technologies in your organization. Access unbiased news analysis, a library of essential tips, informative learning guides, white papers and more -- all created in an effort to arm you with the tools and tactics you need to do your job successfully and make the right desktop virtualization technology decisions.

View the complete archive of Virtual Desktop Management news, research and expert advice.

Go to:  SearchVirtualDesktop

Recently on  SearchVirtualDesktop

Android apps on Chromebooks hurt appeal as thin clients

All future Chromebook releases will support Android apps, which brings concerns regarding their security, management and overall usefulness as thin clients.

More Highlights
Definitions
  • Remote Desktop Connection Manager (RDCMan)

    Remote Desktop Connection Manager (RDCMan) is a tool for managing multiple remote desktop sessions. It creates a single location for IT administrators to organize, group and manage connections.

  • GPU (graphics processing unit)

    A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images.

  • user environment management (UEM)

    User environment management (UEM) is a technology designed to manage a user's complete desktop experience.

Browse Virtual Desktop Topics

Applications

Application virtualization can reduce application installation time, minimize security vulnerabilities, improve disaster recovery and reduce system bloat. You can use application streaming to deliver software on demand to PCs, Macs or terminals, and it is often combined with application virtualization. But administrators have had difficulty determining costs and return on investment because of complex licensing and pricing schemes, and also get lost in the confusion presented by different approaches to virtualization. Citrix, VMware, Symantec and Microsoft, as well as other vendors, offer varying mixes of client-side and server-side capabilities.

This section helps you sort through application streaming technologies and determine which is best for your environment. It offers news, expert technical advice, definitions, and reference and learning content to help with virtual desktop management and application virtualization. This section also helps you determine the total cost of ownership for application streaming and how to choose the best tools for your environment.

Recent Definitions

  • Glassware 2.0

    Glassware 2.0 is an application virtualization tool IT admins can use to containerize legacy apps and deliver them to users on newer operating systems.

  • Citrix XenApp

    Citrix XenApp is an application virtualization product that extends Microsoft Remote Desktop Session Host desktop sessions and apps to users via the Citrix HDX protocol. It can run on Citrix XenServer or other server virtualization platforms.

  • application layering (app layering)

    Application layering is a technology that delivers individual apps or groups of apps in layers distributed to users' virtual desktops at login. This allows IT to manage and update apps and base images separately.

Highlights

Back to Top

Management

Virtual desktop management can empower a mobile workforce, simplify desktop deployment and improve endpoint security -- but only when you create a virtual desktop strategy that suits your environment. This section helps you identify the best virtual desktop tools that enable IT to centrally manage and secure desktop images while still allowing for personalization of desktops. Administrators can run guest operating systems such as Windows or Linux beneath or on top of virtualization software, and users can use thin clients to access applications hosted on consolidated servers. This section outlines how to deploy virtual systems with a hypervisor for easier backup and more secure endpoint devices and helps you identify the best desktop virtualization software for your environment.

Our virtualization news coverage, tips and expert technical advice can help you determine how to best manage virtual desktops.

Recent Definitions

  • Remote Desktop Connection Manager (RDCMan)

    Remote Desktop Connection Manager (RDCMan) is a tool for managing multiple remote desktop sessions. It creates a single location for IT administrators to organize, group and manage connections.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

  • user environment management (UEM)

    User environment management (UEM) is a technology designed to manage a user's complete desktop experience.

Highlights

Back to Top

Virtual desktop strategies and architecture

Before investing the time and effort to configure a virtualization infrastructure, you need a virtual desktop strategy and architecture. This section can help you determine the levels of control, security and returns on investment required by your environment. You'll have an easier time gaining user acceptance if you can explain how virtual desktops offer more efficient management, higher levels of security and lower costs from reductions in the amount of hardware needed. In addition, cloud computing can provide flexibility in the number of users, but the industry still needs to agree on definitions and standards before it can be widely adopted for storage, processing or provisioning virtual desktops.

This section includes tips, news and learning content on how to devise a virtual desktop strategy and manage a virtual architecture. Also, learn about virtual desktop infrastructures and cloud computing.

Recent Definitions

  • GPU (graphics processing unit)

    A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images.

  • Citrix Secure Browser

    Citrix Secure Browser is virtualization software that allows web applications to run in incompatible browsers.

  • virtual desktop infrastructure (VDI)

    Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server.

Highlights

More Virtual desktop strategies and architecture Topics

Back to Top

Tools & Technology

This section can help you choose among virtual desktop tools that Citrix, VMware, Microsoft and other vendors claim make it easier to provision and manage virtual desktop infrastructures. Learn why end-user participation is vital in determining requirements for role-based virtualization, and read tips and expert advice on the latest technology. For example, Microsoft's Terminal Services, renamed Remote Desktop Services in Windows Server 2008 R2, provides virtual desktop sessions for scalability or virtual machines for environments that need to be isolated.

This section provides information about developments in virtual desktop tools and technology. Follow the latest news about software and services, and figure out which products best suit your needs.

Recent Definitions

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

  • user environment management (UEM)

    User environment management (UEM) is a technology designed to manage a user's complete desktop experience.

  • Citrix Secure Browser

    Citrix Secure Browser is virtualization software that allows web applications to run in incompatible browsers.

Highlights

More Tools & Technology Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close