Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Elizabeth White, Yeshim Deniz, Liz McMillan, Pat Romanski

Related Topics: @CloudExpo, Microservices Expo, Open Source Cloud, Containers Expo Blog

@CloudExpo: Blog Post

The Opportunities for Cloud Desktops

The implementation leverages zero client laptops connected to desktop images streamed from regional data centers

Recently the US Navy announced that they would start a 7,500 seat virtual desktop deployment next month as a way to lower IT and maintenance costs.

The implementation leverages zero client laptops connected to desktop images streamed from regional data centres. The advantage of this type of deployment is not just the savings from lower priced hardware, but administrative costs and extra staffing required to maintain them. But there is a bigger advantage for governments who want to follow in these footsteps.

The enhanced security benefits, on top of the ease of administering these types of systems is a critical driving force behind the adoption of virtual desktop deployments in government. Firstly, because the new laptops have no operating system, the need to update, upgrade and manage content is practically eliminated. Additionally, without USB ports or CD drives, the risk of data loss is reduced significantly, and because the operating systems are hosted centrally, in the even of theft the risk of personal data loss is less than with traditional devices.

On the administration side, since images can be standardized depending on job functions, the complexity of managing applications is reduced. The images can be deployed across multiple platforms including smartphones and tablets, or more notably on home computers using secured authentication controls. IT and Security departments also control the applications that are available to end users, making systems more efficient and eliminating the risk of unsupported and potentially harmful applications being installed by end users.

From a content management perspective, government adoption of virtual desktop models would provide more stringent controls over data usage as data would only be accessible during the remote session, not on the systems themselves. This is key since the number one risk of sensitive data leakage is caused by theft of computer systems. By keeping data centrally located, there is no risk of files being copied locally for offline editing or viewing, and the need for large hard drive storage is no longer required. For industries such as the government, where data must be controlled under strict regulations, the ability to eliminate the risk of data leakage is a key benefit of implementing this type of cloud-based model.

While virtual desktop models are still in early phases of adoption, and there are still barriers to full implementation, it's promising to see government agencies recognize the benefits that these types of models provide. Not just from a cost savings perspective, but as a way to introduce new security models and flexibility in end user experiences.

Read the original blog entry...

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

CloudEXPO Stories
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like "How is my application doing" but no idea how to get a proper answer.
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next-gen applications and how to address the challenges of building applications that harness all data types and sources.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O'Reilly author.