What's Next In Desktop Virtualization - InformationWeek
Cloud // Cloud Storage
12:15 AM
Connect Directly

What's Next In Desktop Virtualization

Increased flexibility for users and improved security are expected benefits of a secure client virtual machine based on XenServer.

Client virtualization is going mainstream, says Intel's Bryant.
Intel and Citrix Systems are teaming to answer the question of how desktop virtualization will measure up to the more prevalent server virtualization.

Later this year, Intel will produce chips with its vPro virtualization technology optimized for a hypervisor on the client, as well as on Citrix's XenServer server-side hypervisor. That adaptation will set up a two-tier virtualization hierarchy in which a central server feeds interactions to a desktop PC and a client hypervisor takes over when the user disconnects.

In that scenario, the server hypervisor remains the senior partner. Once reconnected, the laptop checks in with the server hypervisor to receive updates and security changes. The mobile computer would be under the administration of a central authority, but the user's desktop image would move around with him or her on the laptop or other mobile device. Intel VP Gregory Bryant expects the collaboration with Citrix to lower barriers to implementation and bring "client virtualization to the mainstream."

Citrix and Intel plan to adhere to standards where possible, but Raj Dhingra, general manager of Citrix's Desktop Delivery Group, said in an interview that the priority is to deliver "a secure client virtual machine based on XenServer."

The vPro changes will appear in laptop versions of Intel's Nehalem chip architecture in the second half, enabling virtualization based on hardware manufactured with it.

Dhingra foresees a two-tier hypervisor hierarchy. For example, companies can let employees buy their own laptops, just as some buy cell phones, then download the corporate desktop image onto those machines. In addition, corporate data will be more freely available on mobile devices, but it will be encrypted and synchronized with central databases for backup. Management will be policy-driven and automated.

If the approach pans out, employees will be able to access corporate desktops from any device "without thinking twice," Dhingra says, just as they access e-mail from smartphones.

Bottom line:
A two-tier virtualization hierarchy retains data center control while delivering a mobile image to run on a laptop or other device. That translates into increased flexibility for users, improved security, and lower admin costs.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll