Welcome!

@BigDataExpo Authors: Yeshim Deniz, Alberto Pan, Elizabeth White, Pat Romanski, ManageEngine IT Matters

News Feed Item

Teradici Arch Published Desktop Technology Preview Now Available

Teradici, the developer of the innovative PC-over-IP® (PCoIP®) protocol that enables a true PC experience for cloud delivered desktops, today announced the availability of its Teradici Arch™ published desktop software technology preview. Teradici Arch delivers session-based Microsoft® Remote Desktop Services (RDS) desktops using the high performance PCoIP remote display protocol, the same protocol currently used in the VMware View® solution. With Teradici Arch, IT managers who deploy Microsoft RDS desktop environments can now ensure consistent performance and security to RDS desktops while enabling rich media and remote access for users. Teradici Arch allows IT managers to use all PCoIP-based solutions in their RDS deployments, including zero clients from Teradici OEM partners and the Teradici APEX server offload card for enhanced PCoIP performance and user experience.

The Teradici Arch technology preview can be downloaded from the Teradici technical support website and used free of charge for an unlimited number of users for up to 180 days.

“We are very impressed with the benefits the Teradici Arch software delivers. It was easy to install and streamlined our existing VMware and RDS infrastructure," said Phillip Valenta, Watson School system administrator, Binghamton University. "The ability to deploy zero clients to all of our desktops, including those running RDS sessions, is something we've been interested in since we started investigating desktop virtualization several years ago. With Arch we can now centrally broker multiple computing resources without adding complexity for the end user. Utilizing Teradici technologies have enabled us to achieve an on demand computing infrastructure contributing towards our building’s Platinum LEED Certification.”

“DHDW is committed to exceeding our customers’ expectations by providing the most innovative and effective remote desktop solutions. With Microsoft RDS being a widely used technology within our customer base, we are thrilled that Teradici Arch is bringing PCoIP performance and security to RDS,” said Devin Henderson, solutions architect and cofounder, DHDW Consulting, LLC. “By coupling this technology with the APEX server offload card we can accurately support a high performance, scalable solution."

With Teradici Arch, IT managers can take advantage of the only solution that enables access to the full ecosystem of PCoIP products and delivers the following benefits:

· Simplified mixed environments—The ability to broker and manage both VMware View VDI and RDS session desktops through VMware View Manager

· Improved user experience—The adaptive PCoIP protocol provides a rich, interactive experience over any network (LAN, WAN and wireless), expanding the capabilities of RDS deployments to include rich media and remote access

· Security—PCoIP zero clients are the only client devices that do not have a general purpose CPU, local data storage or application operating systems, resulting in the most secure, easiest to manage desktop clients available

· Cost savings—Teradici Arch enables the TCO savings experienced with low maintenance, ultra-secure PCoIP zero clients and eliminates the need for expensive VPN products

· Consistent performance—The ability to use the innovative Teradici APEX server offload card to offload image encoding tasks and reduce peaks in CPU utilization to protect and ensure a consistent user experience regardless of task and activity level

· Non-disruptive add-on—Teradici Arch is a simple software solution that allows customers to leverage existing infrastructure, including VMware’s connection server to deliver load balancing and fault tolerance capabilities, ensuring predictability and consistency across a farm of Windows servers

“Today’s virtualized desktop environments typically consist of mixed technologies, which tend to present management and performance challenges,” said Brett Waldman, research manager, client virtualization software at IDC. “With Arch published desktop software, IT can deliver secure and easily managed desktops, with a single protocol and advanced capabilities that improve performance and user experience for both VDI and RDS environments. Cost-effective, easy-to-use solutions like Teradici’s can reduce the complexity and TCO of virtual desktop deployments.”

“At Teradici, we are constantly looking for new and innovative ways to provide the best possible VDI experience for end users,” said Trent Punnett, vice president of marketing, product management and systems engineering, Teradici. “Through early product trials, we’ve discovered how compelling the use of the PCoIP protocol for terminal services is to our customer base. Teradici Arch delivers a highly secure, centrally managed desktop with advanced capabilities, and illustrates how the PCoIP protocol delivers the best in remote desktop computing experiences for both VDI and RDS desktop users. We are thrilled to provide customers with access to Teradici Arch through this technology preview.”

The Teradici Arch solution will be generally available in Q3, 2013 and sold for a list price of USD $60, per named user through Teradici distribution channels. This is a perpetual license and includes the first year of maintenance and support from Teradici. Subsequent years of maintenance and support are available for USD $10, per named user.

For more information on the Teradici Arch technology preview, please visit: http://www.teradici.com/arch-trials.

About PCoIP Technology

Teradici’s PCoIP protocol is an innovative remote display technology that allows the user’s desktop operating system, applications, and data to reside in the datacenter, eliminating the need for traditional desktop workstations, PCs and thin clients, and delivers an uncompromised user experience to each person, anywhere, over any network and to any type of device without incurring the security risks associated with having data reside in remote PCs, laptops, or tablets. PCoIP technology provides high resolution, full frame rate 3D graphics and high-definition media, with full USB peripheral interoperability, locally over a LAN or remotely over a high-latency WAN. It compresses, encrypts and encodes the entire computing experience at the datacenter and transmits it 'pixels only' across a standard IP network to secure, stateless PCoIP zero clients, thin clients, and mobile devices.

The PCoIP protocol is implemented in several software configurations, including VMware View™, the industry leading desktop virtualization platform as well as in silicon for hardware accelerated performance and enhanced security. A growing ecosystem of over 30 third-party vendors provide a wide variety of PCoIP products including server plug-in cards, rack and tower workstations, blade PCs, zero clients, integrated monitors, and IP phones with PCoIP capability.

About Teradici

Teradici Corporation has developed PCoIP® (PC-over-IP®) technology, a unique remote display protocol which makes network delivered computing a viable corporate computing reality. Founded in 2004 and headquartered in Burnaby, BC, Canada, Teradici for the first time enables an exceptional end user experience for datacenter-based computing. Through a combination of unique graphics algorithms, flexible software solutions, high-performance silicon processing, and workstation/server add-in cards, the company is changing how personal computers are used, deployed and managed. For more information, including current career openings, visit: www.teradici.com.

Teradici, PCoIP, PC-over-IP, APEX, and Arch are trademarks of Teradici Corporation and may be registered in the United States and/or other countries. Any other trademarks or registered trademarks mentioned in this release are the intellectual property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@BigDataExpo Stories
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Infrastructure is widely available, but who’s managing inbound/outbound traffic? Data is created, stored, and managed online – who is protecting it and how? In his session at 19th Cloud Expo, Jaeson Yoo, SVP of Business Development at Penta Security Systems Inc., discussed how to keep any and all infrastructure clean, safe, and efficient by monitoring and filtering all malicious HTTP/HTTPS traffic at the OSI Layer 7. Stop attacks and web intruders before they can enter your network.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
"We analyze the video streaming experience. We are gathering the user behavior in real time from the user devices and we analyze how users experience the video streaming," explained Eric Kim, Founder and CEO at Streamlyzer, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
"We are a leader in the market space called network visibility solutions - it enables monitoring tools and Big Data analysis to access the data and be able to see the performance," explained Shay Morag, VP of Sales and Marketing at Niagara Networks, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...