The Reality of Theft & Data Breaches
Review of VDI
Before we share the latest advancements for the technology of Virtual Desktop Infrastructure (VDI) we must review what it is. In one of our previous blogs on “Understanding Virtualization and How It Relates To Cloud Technology” we addressed the topic of virtualization.
“Virtualization creates a virtual—rather than physical—version o
David McCandless, a London-based author has been creating a visualization of information regarding data breaches. Check out the size and scope of data breaches over the years on his site here: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Have you ever….
I was travelling on vacation and wanted to pull up my work email. I was in a hotel and hadn't brought my laptop because I didn’t really want to spend a lot of time with it, and lugging it through customs wasn't going to be fun. So, I logged on at my hotel's workstation and checked my Gmail and my work email through Microsoft Outlook's Web Access.
I closed the browser and made sure that my session ended and I went on with my vacation.
I was at a restaurant and decided to save some data and logged onto the free Wi-Fi they offered. I logged in on my laptop and checked my email and logged into a few websites for work. It made my lunch really productive.
The Olympics just wrapped up in Rio and the U.S. went all out for Gold with amazing results in swimming and women's gymnastics, to name a few. Our athletes didn't get there by accident. They planned, visualized, prepared and, finally, executed.
Planning, visualization and preparation is necessary when preparing for a virtual desktop infrastructure, too. One of the problems we find all too often is that, when a company didn't spend enough time optimizing the Gold Image, there are issues or dissatisfaction with the implementation.
Virtual Desktop Infrastructure or VDI is, at its most basic definition, accessing a centrally managed desktop from a remote session. Sometimes it has been defined as server-based computing.
Ask a user what it is and they may say it is what allows them to choose how they work best, by providing access to systems and files anywhere they want to work, as long as they have an internet connection.