Ten Steps to Successful Virtual Desktop Deployments for SMBs

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Previous Next

Click through for 10 steps that must be taken before the benefits of a virtual desktop deployment can be realized, as identified by Darren Schoen, director of technology infrastructure for the Broward Center for the Performing Arts and a regional trainer for Spiceworks.

Topics : Nortel, Citrix Systems, Storage Virtualization, Server Virtualization, Hardware Virtualization

At this point, most small to medium-sized businesses have tackled some level of virtualization. While many IT leads lost sleep in the process, they were able to work some serious magic with their server environments. With a virtual environment now in place, the next logical step is figuring out how to use that infrastructure in other areas of the enterprise — it’s time to look at bringing virtual desktops into the mix.

Once the decision has been made to attempt a virtual desktop deployment, there are some key steps that have to be taken before the benefits can be realized. Darren Schoen, director of technology infrastructure for the Broward Center for the Performing Arts, has jumped through these hurtles himself and has identified 10 steps to help demystify the process so others can complete it more smoothly.

 

More Slideshows

MeriTalkFedAgileDataCtr-190 Agile Federal Data Centers: The Drive to Thrive

How valuable is real-time data access to federal employees, and what are federal IT departments doing to ensure reliability and security? ...  More >>

MeriTalkGovInitiatives0x Mix of IT Initiatives Offer Compelling, Immediate Savings for Federal Agencies

Existing infrastructure is preventing savings with two-thirds of Federal network managers saying their networks are not sufficient to deliver cost-saving initiatives. ...  More >>

cloud14-290x195 Data Center Applications and the Cloud: What You Need to Know

Virtualizing a physical data center and moving it to a private or hybrid cloud requires careful analysis of both security and connectivity needs. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.