by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : March 2013
6 of client virtualization technology, not just presentation virtualization and VDI. In addition, the physical data center itself should be taken into consideration. Presentation virtualization and VDI workloads can be particularly demanding in terms of power and cooling requirements. For example, current-generation, high-density blade systems are ideally suited for a client virtualization workload, but data center infrastructure services must be equipped to support them. With a typical heat load of 300 watts per square foot, blade systems can cause a temperature rise of 25 degrees Fahrenheit in less than a minute when powered on. Starting up a large number of blades at the beginning of the workday may present a challenge to cooling systems designed for load levels that fluctuate more slowly. Addressing Security For many organizations, the Common Criteria for Information Technology Security Evaluation, an international standard for computer security certification, is an important requirement when procuring IT products and systems. To this end, all leading client virtualization solutions have either obtained or are in the process of obtaining Common Criteria certification. Regardless of their status, all client virtualization solutions can provide enhanced security compared with conventionally managed, distributed-desktop environments. By ensuring that all desktops are managed through a single, central point of control, client virtualization solutions can inherently improve security, regardless of where the endpoints are located. At the same time, by offering a user-centric management approach, client virtualization application delivery can ensure that users get the applications they need, when they need them, without requiring any special or elevated privileges. Presentation virtualization and VDI solutions provide heightened security been performed by servers outside the data center. Similarly, file and print services, which might have been deployed outside the data center, may need to be relocated when moving to VDI or presentation virtualization. e challenge of delivering thousands of desktop environments from data center to end user is significantly different than delivering hundreds of servers. e existing storage and virtualization infrastructures will need careful assessment to ensure that they are capable of supporting a VDI implementation. In fact, it may be appropriate to implement separate storage and virtual infrastructures to support VDI. When implementing a VDI system, in particular, extra attention must be paid to storage considerations. e primary challenge is not capacity, but rather throughput. Conventional data center storage area network (SAN) storage is ill-equipped for the I/O demands that the simultaneous boot-up of hundreds of virtual desktops places on disk storage. Poorly specified data center storage can be a significant bottleneck for VDI deployments, resulting in poor performance and desktop logon times measured in minutes rather than seconds. However, scaling out storage in order to deliver the required random read/write input/output operations per second (IOPS) isn't always economically feasible. Data center storage for supporting client virtualization is a rapidly advancing area, with new developments announced on an almost weekly basis. Ensuring access to up-to-date advice is essential to managing VDI storage costs. For client virtualization to be effective, the entire network infrastructure must ensure appropriate bandwidth to accommodate the different network traffic patterns seen in presentation virtualization or VDI. e adoption of Quality of Service (QoS) measures and WAN optimization controllers to prioritize, compress and cache network traffic applies to all forms by physically isolating the virtual desktop in a secure data center and passing along to the end user only the desktop image and the keyboard/mouse movement. All files remain secure in the data center. To secure the remote display protocol between the data center and endpoint (and to secure data in transit), the right client virtualization solutions support government cipher suites using RSA key exchange and Triple Data Encryption Standard (DES) encryption, as well as the Federal Information Processing Standard (FIPS) Publication 197, Advanced Encryption Standard (AES) 256-bit encryption. Support for multifactor authentication technologies, such as the Defense Department's Common Access Card, is also common. Presentation virtualization and VDI solutions also simplify the introduction of both perimeter and enclave-boundary Client Virtualization