Access Virtualization – Which Protocol Is The Best?
As organizations look for ways to reduce the cost of installing, updating, managing and making secure desktop and laptop systems, they come across the idea of viewing the laptop or desktop as just an endpoint or access point device. Once they’ve gotten to this point, they start thinking about all of the ways applications can be "projected" to that device.
The Kusnetzky Group model of virtualization technology describes this type of technology "access virtualization." This technology may be used to project access to an application running on a local blade PC, a remote blade server or a general purpose server.
To learn more and to read the entire article at its source, please refer to the following page, Access Virtualization – Which protocol is the best? – ZDNET