Some benefits I saw: 1. Zero-touch Desktops - With a device like the Wyse V10L you can take it out of the box and use it as-is. DHCP option 188 provides the thin client with the connectio...
See more...
Some benefits I saw: 1. Zero-touch Desktops - With a device like the Wyse V10L you can take it out of the box and use it as-is. DHCP option 188 provides the thin client with the connection broker to connect to and other centralized config possibilities (like an FTP server with a config file) can give the WYSE thin client all other needed settings automatically such as screen resolution and so forth. If a user or someone near them can plug in a power cable, an ethernet cable, a keyboard/mouse combo, and hit their power button... Their PC is ready to go. 2. Automatic Desktop Deployment - Since you can tell VDM to pre-provision X PC's per pool, there will always be, say, 3 new accounting PC's ready to go... All but one might be in a suspended state. When a new user grabs one another is automatically deployed. YOU DO NOTHING. 3. Centrallized Software Deployment/OS upgrade - With the linked clone technology you can switch out the base clone and all users get the updates at once and still have their own data intact. 4. Freshly Built Desktops Everytime - How many times does a fresh rebuild fix issue and/or simply help performance? You could do this everytime. Even without linked clones you can have the VM deleted each time on logofff and new ones are already ready to go. 5. RAID & Backup Protection - Its not as good as many solutions but I know way too many environments where desktop data never gets backed up. At least this way its RAID protected on your SAN with Global Hot Spares and so forth. Even permenantly checked out Offline VDI sessions can be backed up periodically (requires end user to click a button)... 6. Easy DR Integration - DR is so much easier if your key desktops also come over with your other important data. Saves tons of time. 7. Security Benefits - No issue now with stolen desktops/thin clients. Less issue with stolen laptops. All data is centrally located, etc. Those are just what come to mind at the moment...Im sure I missed many.