Welcome!

Related Topics: Containers Expo Blog, Java IoT, Microservices Expo, @CloudExpo, Cloud Security, SDN Journal

Containers Expo Blog: Blog Feed Post

There Are Three S's in Success(ful VDI Deployments)

They stand for simple, speedy and secure

BYOD may be the word of the day on the street but underlying the "come as you are" approach to computing is a variety of technology that enables organizations to confidently take up the gauntlet thrown down by users to support their demand to use the computing platform of their choice.

Organizations aren't as averse to BYOD when its coupled with a sound desktop virtualization strategy. Such strategies enable organizations to support "work from anywhere" initiatives while simultaneously increasing manageability, lowering costs, and increasing overall network and data security.

But barriers still exist to successfully deploying VDI (Virtual Desktop Infrastructure) architectures. Initial investments, resulting poor performance and greater operational complexity can prevent a successful rollout.

barriers-to-succesful-vdi-deployments

VMware Horizon View—part of VMware’s Horizon Suite of products—alleviates two major management headaches: location and standardization. To solve the location problem, virtual desktop infrastructure (VDI) deployments virtualize user desktops by delivering them to individual clients over the network from a central location. Those desktops are stored and run in the data center, rather than having individual desktop and laptop machines in the field running localized operating systems. This seamless virtualization goes undetected by users.

To solve the standardization problem, VMware enables business groups that have specific desktop needs to be clustered together in the data center and managed as a unit. For example, when all the Windows machines need a new service pack, it can be installed to the master image in the data center, which is delivered to users the next morning when they log in. Because IT staff no longer have to visit each local system or push software installs down through remote tools, users aren’t forced to reboot during the business day.

But along with benefits comes challenges, which organizations consistently cite as barriers to success. F5 helps organizations overcome those barriers by focusing on the three S's in success: simple, speedy, and secure with its latest offerings supporting VMware EUC.

Simple
New technology is rarely deployed in a green field. Existing infrastructure is extended, integrated and incorporated into new technology deployments. This process is natural, but it breeds complexity that can threaten the operational stability of the entire data center.

Simplifying infrastructure architecture and underlying network topologies can greatly reduce operational costs as well as the risk associated with more complex systems. The broad set of services available from F5 Synthesis Software Defined Application Services (SDAS) means organizations can consolidate services on a consistent, scalable platform. Doing so simplifies architectures and network topologies and enables a stable, successful deployment.

F5 application services supporting VMware EUC solutions include security, availability,and identity and access control. Along with native PCoIP support, F5 services can take on the responsibility for load balancing View Connection Servers as well as replace View Security Servers.

VDI-simplify

To make deployments even simpler, F5 is announcing the availability of a new VMware Horizon View Reference Architecture. This reference architecture contains the diagrams, documents, and deployment guides necessary to successfully implement a fast, reliable and secure architecture for delivering virtual desktops in a VMware EUC environment.

Additionally, F5 is making available four new virtual edition packages specifically designed to support the needs of VMware Horizon View. These virtual editions include F5 Synthesis Access and Identity Services and are sized to support a varying number of end-users, enabling organizations to align access control and optimization with their environment.

Secure

F5 platforms are available in a number of form factors (appliance, virtual edition, cloud and chassis hardware). Regardless of form factor, F5 platforms share full feature parity and are security hardened. For some organizations, particularly where regulation govern certifications and compliance requirements, FIPS and ICSA certification is a must. F5 can fulfill these requirements across a variety of form factor and service combinations, offering a FIPS compliant alternative  to the View Security Server along with ICSA certified capabilities.

Before

before and after together

Speedy
Deploying services to support a successful View deployment requires thoughtful consideration to the different configuration options. For someone who is not familiar with View or BIG-IP, the process can take longer than necessary. How do you provide the breadth and depth of functionality of a BIG-IP to power users, but reduce configuration complexity that would otherwise slow down deployment?

F5's answer to this is iApps. iApps are pre-configured packages of configurations designed for specific applications that enable very rapid deployment of F5 application services in optimal settings.

f5-vmware-euc-iapp

F5 has invested significant time, effort and joint testing with VMware to design an iApp for VMware View that saves significant time when deploying F5’s application services for View. Additionally, by leveraging the iApp wizard-like environment, errors often introduced by manual configuration are avoided – saving both, time and money.

Today, F5 is announcing the availability of a new iApp for VMware Horizon View that further improves the speed of provisioning by incorporating VMware and F5 expertise in deploying and optimally delivering Horizon View deployments. F5 iApp for VMware Horizon View can reduce the amount of time it takes to deploy application delivery services from days to less than 1 hour.

With F5 and VMware together, VDI deployments can be successful, allowing organizations to reap the benefits.

Additional Resources:

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

Latest Stories
In his session at @DevOpsSummit at 20th Cloud Expo, Kelly Looney, director of DevOps consulting for Skytap, showed how an incremental approach to introducing containers into complex, distributed applications results in modernization with less risk and more reward. He also shared the story of how Skytap used Docker to get out of the business of managing infrastructure, and into the business of delivering innovation and business value. Attendees learned how up-front planning allows for a clean sep...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...