Persistent vs Non-persistent virtual desktops (Second Part)

by | Oct 30, 2014

ETIQUETAS: Hot news | Tips | VDI-en

A few days ago, we analyzed in a post the advantages and disadvantages of persistent virtual desktops. To complete that information and gather all the data to decide which type of virtual desktops is the best for us to deploy, today we're going to do the same with non-persistent virtual desktops:

When users access non-persistent desktops, none of their application data or configurations is saved with the desktop. When the session is over, the virtual desktop returns to its original state before another user can connect, or it is destroyed and assigns the user a new virtual desktop each time a connection is made.

Pros: Easy administration, more security and less storage space

Since non-persistent desktops are created from a single image, it’s very easy for administrators to apply new patches, update and backup images, or deploy applications to users within the organization. Users cannot alter the desktop configuration, nor can they install applications on the desktop, which makes the virtual desktop a much safer and robust environment. Furthermore, facing any kind of incident detected in the virtual desktop, simply restarting the system or closing the user session returns the system to a consistent state, and the user is presented with a completely new virtual desktop. Since all virtual desktops are based on the same image and any changes made to the desktop are minimal, much less storage space is required than in a persistent desktop VDI infrastructure. Additionally, the administrators can separate the data, configurations and user profiles into shared resources hosted on a cheaper storage unit.

Cons: Complex personalization and less flexibility in publishing applications

On the one hand, with non-persistent desktops, users can’t easily personalize their desktop since virtual desktops don’t use user profiles. In order to personalize non-persistent desktops, prior administrative work is required (creation and configuration of shared resources, creation and configuration of user policies and user groups, creation of mobile user profiles), which can be quite laborious. On the other hand, complementary technologies exist for publishing personalized applications for user groups such as the virtualization of applications or the virtualization of user profiles.

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content