login vsi company logo login vsi company logo 250x40

 

Avoid VDI problems. Test with Login VSI.

Learn how our industry-standard software solutions can benefit your business

Learn more about our products

Reducing VDI complexity with HP Moonshot and Login AM

Reducing VDI complexity with HP Moonshot and Login AM

In the past few years, there have been many innovations in the system and application virtualization arena. Even though these innovations solve many of the daily application management challenges in the data center, they also introduced new and costly ones. The HP Moonshot system is a refreshingly simple concept. Small dedicated computer cartridges provide computing power from the data center to end users in a one-to-one relation. Each computer cartridge packs their own CPU, graphics card, networking and storage to deliver an optimal end-user experience.

A VDI solution based on HP Moonshot (called HDI) does not use virtual machines running on a hypervisor. In one big swoop, the HP Moonshot system reduces complexity by removing the need for shared storage and the need for shared graphics processors. End user performance is guaranteed and consistent since they do not need to share the resources of a single host.

Not having a hypervisor also means that some of the benefits like cloning are not available. HP Moonshot administrators need to fall back to (tried and tested) provisioning solutions that are focused on physical computer systems.

What does Login AM add to the mix?     

The HP Moonshot system provides technology to provision the hardware and operating systems but it doesn't provide any means to deploy software. This is where Login AM comes in.

With simplicity at its core, Login AM represents some of the same values as advocated by the HP Moonshot system. Login AM is a highly portable and easy to use system that automates the deployment and configuration of hosted desktop solutions and their end user applications.

Login AM is able to automate all the steps required to build hosted desktop solutions and publish applications to the end user. Like most other software deployment systems, Login AM is capable of deploying the software. Unlike most other systems, Login AM is also able to automate all steps that are required after deployment of the software:

  • Detailed application configuration and on-the-fly updates thereof;
  • Automatic creation of application authorization groups;
  • Application of security settings;
  • Automatic publication of applications.

Login AM Blueprint

Administrators can wrap an entire solution in a Login AM Blueprint. A blueprint contains all software and configuration settings needed for the creation of a new environment. It allows administrators to deploy an entire hosted desktop solution in a few easy steps. Imagine having your first users logging in only hours after installing the HP Moonshot system in the data center.

A powerful but simple and ready-to-go solution stack based on HP Moonshot and Login AM provides everything you need to deploy and manage a hosted desktop environment from your data center.

Feel free to contact us for more information about Login AM.

Tags: Login AM, Blueprints

Popular Blogs

Login VSI - Press Release - IGEL - Login VSI Partner to Optimize End User Computing Experience Image

[Press Release] IGEL Partners with Login VSI to Optimize the End User Computing Experience

Login PI enables organizations to better protect the performance and availability of their IGEL OS-powered virtual desktop environments Continue Reading
Login VSI - Blog - Login PI Blog Teaser Image - Windows Virtual Desktop: How To Monitor User Experience With Login PI

Windows Virtual Desktop – How to Monitor User Experience?

Microsoft has just announced the public preview of their new Windows Virtual Desktop (WVD) offering at Microsoft Ignite on Tour in Amsterdam today. For those of you who’ve not followed the rumors or the private beta, here’s the outline... Continue Reading
Login VSI Blog - Teaser Image - A Practical Guide to VDI Change Management - Part 1

A Practical Guide to VDI Change Management

Part 1: IT Change Management in general The first in an 8-part series, this practical guide to VDI Change Management will guide you through the transformation of the IT department from a back-end function into a core competency for every modern organization. Continue Reading
Investigating Online Application Performance with Login PI

Investigating Online Application Performance with Login PI

As many companies do, we use a CRM system. Recently, I have been getting complaints about our cloud CRM system, Microsoft Dynamics, being slow. I tried to investigate this by shadowing one of our users to see what was wrong. Continue Reading
Login VSI Blog - How-To Update, Protect Against RIDL, Fallout MDS Vulnerability

How-To: Update, Protect Against RIDL, Fallout MDS Vulnerability

RIDL & Fallout MDS vulnerabilities, impact on VDI performance & actions to take. FAQs we’re receiving & updates on performance tests executed to patch flaws Intel calls “Microarchitectural Data Sampling (M.D.S.)” aka: Rogue In-Flight Data Load (RIDL), Fallout, ZombieLoad & Store-to-Leak Forwarding. Continue Reading
Login VSI -Blog Post - IGEL Partner with Login VSI

Login PI & IGEL: Delivering Deep Application Test & Availability Monitoring

Together Login VSI and IGEL deliver deep application test and availability monitoring for the digital workspace This week we announced a partnership with IGEL that enables Login PI integration in a radical new way. Continue Reading
Cookie Settings