Desktop Virtualization (DV) Is Disrupting the Computer Model – Reality or Hype?

Desktop Virtualization disrupting computer modelAuthor: liza252

The buzz about desktop virtualization is mired in plenty of questions, like whether desktop virtualization’s virtues are real or simply hype. Does it truly simplify the issues of desktop management that have been troubling IT managers for over two decades now? Can it live up to the tall promises of savings, flexibility and security? Is it really the ‘next big thing’ in IT? So let’s separate the wheat from the chaff now, shall we?

There can be no denying that enterprise customers have seen enormous benefits from virtualization for effective server consolidation. Furthermore, it has simplified storage management and assisted in enhanced resource utilization and availability. With the proliferation of data centers, there has been a marked upswing in vendors’ ability to use the virtualization approach. This has further brought about problems of diverse constituents with opposing requirements, which can create a strong detachment between customers and vendors. So the actual crux of the success of virtualization lies in the right desktop virtualization product which can deliver according to customer demands and user requirements.

Traditional Desktop Challenges

Traditional desktop computing faces different kinds of challenges that can seem like nightmares for IT managers across the world. A few problems include:

a) IT enterprises globally face tremendous pressure to ensure efficient centralization of desktops and improved levels of productivity. The emphasis is on diminishing costs, guaranteeing complete control over information assets, compliance with security regulations and standardized data sharing practices across the enterprise.

b) Mobility is another obstacle that conventional desktop computing often faces. According to the International Telework Association, in 2010 almost 70% of US workers were mobile. This essentially meant that traditional desktop centralization models proved ineffective in accommodating mobile laptop users.

c) Application compatibility is another pressing issue with conventional centralized desktop computing.

d) Endpoint security and data leakage are prime concerns among enterprises that are using traditional centralized desktop models. An IDC report claims that 60% of most enterprises’ confidential information resides on endpoints, and close to 42% of data breaches occur owing to a lost device, be it a laptop or a mobile phone.

These challenges can be ably met by  desktop virtualization; however every enterprise should have the necessary infrastructure to competently manage virtualization. Additionally enterprises should be skilled enough to deal with the demands of any virtual desktop solution. Most end users want desktops to be independent of OS and free from any installation requirements. They also want easy accessibility of single copy software and the ability to rent or subscribe to applications anywhere in the world. Therefore the reality of the success of desktop virtualization depends on whether the applications that users require are delivered in the way they want and when they need them. The idea is to keep it simple and yet meet TCO and IT industry requirements.

Article Source:

About the Author: