Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

9/17/2010
01:46 PM
George Crump
George Crump
Commentary
50%
50%

Desktop Virtualization And The Storage Challenges It Creates

As server virtualization becomes more widespread desktop virtualization is quickly becoming the next big project that IT Managers have on their white board. As with any new IT project it has the opportunity to bring added flexibility and cost savings to the organization while at the same time increasing IT efficiency. However like server virtualization before desktop virtualization brings a whole new set of storage challenges.

As server virtualization becomes more widespread desktop virtualization is quickly becoming the next big project that IT Managers have on their white board. As with any new IT project it has the opportunity to bring added flexibility and cost savings to the organization while at the same time increasing IT efficiency. However like server virtualization before desktop virtualization brings a whole new set of storage challenges.Desktop virtualization comes in several forms. The first is where virtual machines are stored and processed on a physical server host. Instead of server virtualization where we may be dealing with dozens of virtual machines per host in desktop virtualization we are dealing with hundreds if not thousands per host. In fact look for the new bragging benchmark for both storage and server hardware vendors to be how many virtual desktops can they support per host, per storage. This form of desktop virtualization is best used in the shift worker type of environments where multiple users will be sharing the same desktop hardware at different points throughout the day. It also has the largest potential to drive down costs.

The other form of desktop virtualization is for the knowledge or mobile worker where one user will have one desktop or laptop. Here the virtualization is done on the laptop or desktop. Essentially the corporate environment is run in a virtual machine package on the user device. This allows for offline use and greater mobility but does consume local processing power and storage. It does not have as great an impact on hard costs as the shift worker case but should provide IT operational savings.

There is a third form of desktop virtualization also. A hybrid approach that is a blending of knowledge worker form with the shift worker form where you can use the data center processing power while connected to the data center and then the local processing power of the laptop/desktop when it can't connect to the data center. Changes are then synchronized when the device is reconnected to the data center.

From a storage perspective the first form, the fully hosted shift worker solution and the last form, the hybrid solution, can cause the most storage challenges. We will cover these challenges in detail over the next several entries and on our upcoming webcast "Making Sure Desktop Virtualization Won't Break Storage". At a high level the most common challenges that you deal with in these forms of desktop virtualization is periodic storage performance problems related to boot, login, logoff, shutdown, patch and antivirus updates, most commonly summarized by the term boot storms. The second challenge is dealing with new or remaining data preservation issues.

Finally there is also the cost issue. You are essentially taking the least expensive storage in the enterprise (user desktop/laptop hard drives) and putting them on a SAN and potentially using solid state disk to address the boot storm issues. As a result optimization of the data associated with desktop virtualization is critical as is keeping the cost of the storage system under control while maintaining consistent performance. Next up in this series is going to be detailing the boot storm problem and possibilities to address it.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21441
PUBLISHED: 2021-06-16
There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS A...
CVE-2020-9493
PUBLISHED: 2021-06-16
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
CVE-2021-28815
PUBLISHED: 2021-06-16
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link vers...
CVE-2021-3535
PUBLISHED: 2021-06-16
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. ...
CVE-2021-32685
PUBLISHED: 2021-06-16
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-5...