XenClient CTO Series - Intelligent Desktop Virtualization as a catalyst to experience the next generation of IT - Part 1

1:20 PM
XenClient CTO Series - Intelligent Desktop Virtualization as a catalyst to experience the next generation of IT - Part 1 -

He was near six years I came to the conclusion that the virtualization system is a mandatory technology to address the key challenges with traditional computing model. Not only that, virtualization facilitates the transition to modern, secure computing, opens the doors open widely to new types of end user experience and simplifies the work of administrators.

The computing architecture envisaged for personal computers (PC) there are thirty guess the entire components of the computing experience were going to live together sharing the same hardware resources. These IT resources could be storage, CPU, memory, mouse, keyboard, display, network, printer, etc. At the time, the equipment would have cost a fortune. There was even a lack of support for color graphics, audio or video output. Thus, the sharing of software resources within the material resources had a sense of the economic point of view. The services provided by an operating system has been very limited as well and the demand for the creation of new applications for computers was very low.

The PC industry has grown rapidly over the years, especially over the last decade with great advances in hardware, operating systems and applications of CD-quality audio support capabilities, high definition video, biometric sensors and geo, etc. Moreover, we are witnessing an explosion in the types of mobile and ultra-mobile devices people use on a daily basis. A quick visit to an Apple or a Microsoft shop would tell you what I mean here. However, one thing has remained the same and is maintained almost forgot: the original architecture remained in place governing our evolution calculation for most cases, including client and server devices. The main exception here is the smart phones, government regulations mandating data isolation Telephony Modem software from the rest of the user's environment. As expected also, the concept of shared resources extended hardware resources for the software itself. So in a web browser, you can have as many plugins as you like. In the next part of this blog series, I will discuss how the sharing of hardware and software resources results in security problems for IT

A About XenClient :.

Join the conversation by connecting with Citrix XenClient team online!

  • Visit the product page XenClient
  • Follow us on Twitter
  • Like us on Facebook
  • Visit our XenClient Technical Forum

About the author:

Ahmed Sallam pushes technology and product strategy of working with ecosystem partners for Citrix XenClient and markets client devices emerging virtualization. Before Citrix, he was CTO and chief architect of McAfee's advanced technology, now part of Intel Corp. It was co-inventor and architect of DeepSAFE, co-developed with Intel Labs, and co-designer of VMM CPU VMware security technology known as VMsafe. Prior to McAfee, Ahmed was a principal architect of Nokia's Security Division and a senior engineer at Symantec. He holds 17 issued patents and over 40 patent applications pending. He earned a BA in computer science and automatic control of the University of Alexandria

Ahmed Follow on twitter :. Https://twitter.com/ahmedsallam

Check ahmed public profile: www. linkedin.com/in/ahmedsallam

Previous
Next Post »
0 Komentar