So, how do you calculate and quantify those advantages, choose the right technology and build out a successful hosted virtual desktop infrastructure (VDI)? Computerworld asked consultants, analysts and users who have been there to report on what works, what doesn't and how you can learn from their experiences. The first place to start, they say, is with a clear-eyed understanding of the potential benefits.
The gains you should expect from hosted desktop virtualization projects are very different from what accrues from server virtualization. While server virtualization produces visible savings by consolidating physical server hardware and increasing resource utilization, most shops will find that hosting virtual Windows PCs requires a greenfield build-out of new infrastructure in the data center.
But that hasn't stopped some IT shops from exploring the options.
When it comes to hosted virtual desktops, many organizations are already kicking the tires. "Most of my customers are asking about it, if not going to a proof of concept," says Scott Mayers, a principal director at Align, an IT solutions provider focused on the financial services and retail industries.
"2011 is the year when a lot of those concepts will mature into actual deployments," says Ian Song, an analyst at IDC. But so far, he adds, most deployments are still fairly small-scale. The market research firm projects that only about 13.5 million out of 400 million PC shipments this year will be VDI implementations -- just over 3%. By 2014 that number will more than double, to 34 million, accounting for nearly 7% of the market.
Song expects the trend to eventually top out at about 15% to 18% of all enterprise desktops. Gartner's figures are even more conservative. "While it's a big opportunity, we believe that only 10% to 12% of the installed base of PC users will actually use it over the next two to three years," says Mark Margevicius, an analyst at Gartner. It's a technology that needs to be chosen for the right use cases, he explains.
While VDI is at the top of the hype cycle today, there are many flavors and options. For example, you can choose a "persistent" desktop, where every user gets his own dedicated, fully customizable installation of Windows residing within a hosted virtual machine, or go with the more efficient "nonpersistent" VDI model, in which many users' virtual desktops are spun up from a single, common cookie-cutter disk image.
There is no one-size-fits-all solution. "Every group has its own set of requirements and parameters," so a different mix of technologies may be appropriate for different groups within an organization, says Steve Kaplan, vice president of the data center virtualization practice at infrastructure services provider INX. And for some applications, the technology simply doesn't make sense.
The cost of deployment has been coming down also, although the upfront investment in data center infrastructure is still high. "We don't envision hosted desktops being less expensive than a PC, from a capital investment standpoint," Margevicius says. He puts the total cost at about 1.3 to 1.5 times what IT would pay for a traditional PC deployment. "The initial capital investment is the limiting factor for our clients," he says.
On the plus side, desktop virtualization's benefits include better security, operational efficiencies and faster restoration in the event of a business outage.
Given all that, how do you navigate through the process? Consultants and users recommend a cautious, methodical approach. Here are some considerations as you move from a review of the basic value propositions and potential use cases into pilots and actual deployments.
This independent paper from senior analyst Jon Collins at FreeForm Dynamics considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could potentially increase the attack surface of the companies. It defines the scale and types of threat, what to look for in a corporate web security solution and compares the different types of technological approach available to companies and the processes that need to be considered for effective protection.Security is not an option. This KnowledgeVault Series offers professional advice how to be proactive in the fight against cybercrimes and multi-layered security threats; how to adopt a holistic approach to protecting and managing data; and how to hire a qualified security assessor. Make security your Number 1 priority.Social-networking sites have revolutionized how businesses use the Internet. Instead of relying on faltering newspapers to find job candidates, companies can access thousands of potential employees through Facebook and Twitter. But social-networking sites have also left businesses vulnerable to new security threats. So are they tools to be used or security traps to be avoided?
Previously I heard more information about hosting but this blog is totally different. Now only I have got it.
ReplyDeleteI am looking for remotely managed computing services. I heard that Hosted Virtual Desktops hosted in a secure data centre can access my applications, data and programs via any computing device, including PCs, laptops. Is that true?
ReplyDeleteHosted Virtual Desktops
I would like to try the 30day demo of your virtual desktop. Thanks For shearing your useful tips.
ReplyDeleteThin Client Hardware & Citrix Thin Client
Great tips dear. I like it Thin Clients & Windows Thin Client
ReplyDeleteYou got a really useful blog I have been here reading for about an hour. I am a newbie and your success is very much an inspiration for me.
ReplyDeleteRefurbished Laptops & Laptop Distributor