The Dynamic Desktop Browse by Tags - Mert's Desktop - Site Home - TechNet Blogs

Mert's Desktop

This blog is about enterprise computing

Browse by Tags

Related Posts
  • Blog Post: VDI Forum

    Please use the following forum for Microsoft VDI related questions. I will be following this forum regularly
  • Blog Post: Desktop Virtualization Strategy - Part I

    There are many desktop virtualization options and possible combinations and therefore the development of a desktop virtualization strategy requires three distinct steps: Map the available technologies Define user needs Match technologies with user needs. Mapping the Technologies...
  • Blog Post: Windows Server 2008 R2 Beta VDI Solution

    VDI is attracting our enterprise customers for certain user scenarios. Most common user scenario is the task worker where they want to extend the the hardware lifecycle, improve desktop and application control and centralize the user data. Also contractors and external employees are strong candidates...
  • Blog Post: XP Performance Optimizations for VDI solutions

    Paul Wilson has a usefull article on Windows XP Performance Optimizations in VDI scenarios. This one is optimized for Citrix XenDesktop. Windows XP Performance Optimizations for XenDesktop and Provisioning Server vDisks
  • Blog Post: VDI Security - Virtual Desktop Configuration

    The following recommended best practices can help you enhance security when configuring virtual machines on servers running the Hyper-V role: · Configure virtual machines to use fixed-sized virtual hard disks. · Store virtual hard disks and snapshot files in a secure location. · Decide how much...
  • Blog Post: MED-V v1 Released

    Microsoft Enterprise Desktop Virtualization (MED-V) provides deployment and management of virtual Windows desktops to enable key enterprise scenarios. MED-V 1.0 helps enterprises upgrade to the latest version of Windows even when some applications are not yet compatible. MED-V builds on top of Microsoft...
  • Blog Post: VDI Security - Hardening Virtual Desktops

    The same security measures and hardening you would apply to a physical computer should be applied to virtual machines. You should perform hardening steps for the virtual machine's server role as indicated in the “Server Role Security Configuration” section in chapter 1, including consulting the appropriate...