A special kind of cloud and cloud-related provider, operates like an ISP in the he/she must be near enough to its clients to he/she can get a least 10 MBit Ethernet speed (glass to the doorstep). But then, all he/she offers is virtual servers and the like, so that nearby companies can totally outsource everything in their environment except a router and some thin clients, if that all they need. They can get Windows, exchange Linux, SQL server, cloud stuff, data storage, they can event rent the MS apps like word from the CSP, and avoid the licensing noise with MS. Backup = solved.
You are here
Virtualization has its limits, but its benefits are a driving factor and the technology is rapidly catching up with the user scenarios playing out today. Developing a virtual desktop environment isn't an easy feat, but there are many reasons why it's worth the effort. The top four reasons to invest in virtual desktops now are the desktop support cost reduction possibilities, application and data security improvements, software licensing management options and system stability and reliability.
With market total today at $1.5B, we are looking at an HVD boom
By Liam Lahey
The worldwide hosted virtual desktop (HVD) market will accelerate through 2013 to reach 49 million units, up from more than 500,000 units in 2009, according to Gartner Inc. Worldwide HVD revenue will grow from about $1.3 billion to $1.5 billion in 2009, which is less than 1 percent of the worldwide professional PC market, to $65.7 billion in 2013, which will be equal to more than 40 percent of the worldwide professional PC market.
Posted by Alessandro Perilli | Thursday, June 04, 2009 | 0 Comments
On the Windows Server Division blog, Ward Ralston, Group Product Manager of Windows Server Marketing, announced that Windows Server 2008 R2 will reach the RTM milestone the same time of Windows 7.
Both will be generally available on October 22, 2009.
The big question is when Hyper-V 2.0 will be available then.
Gary Clayton and Kevin Coleman note the critical absence of rules of the engagement governing digital attack and defense
By Gary Clayton and Kevin Coleman