TECH BRIEF

Sun releases Virtual Desktop Infrastructure 3

Sun Microsystems has released Virtual Desktop Infrastructure Software 3, a major update to the company's virtualization management suite. The new version includes expanded support for VMware, Sun Open Storage and Microsoft Active Directory, among other enhancements.

Sun VDI Software 3 is built on a variety of open-source technologies, including MySQL, OpenSolaris, Open Storage and VirtualBox. It supports the deployment of a range of guest operating systems on desktop PCs, including Macs and thin clients, and it works with VMware Infrastructure or Sun's built-in virtualization capabilities — or a combination of the two.

Version 3’s new features include integration with Open Storage and Solaris ZFS, Sun's local file system. It expands VMware support, adding VMware ESX Server 3.5 and VMware VirtualCenter 2.5. The product comes with a single installer for core components, and it supports Remote Desktop Protocol devices without the need to install additional software.

At Northern Arizona University, officials reported that they saved 95 percent on electrical costs associated with computing by switching to Sun Ray thin clients, and they are eager to use Sun VDI Software 3.

"I am really impressed with Sun VDI Software 3," said Richard Toeniskoetter, technology director at the university’s W. A. Franke College of Business, in a statement released March 24. "The open architecture will provide us with a broad choice of client device, virtualization host and virtual desktop OS. That's really important to us at NAU because flexible access to Windows and Unix desktops, some of which have been in production for over seven years, maximizes our IT utilization and simplifies our management."

Sun VDI Software 3 is available now, with subscription options starting at $40 per user per year. Free trial software is available here. Further information can be found here.

About the Author

Dave Nagel is the executive editor for 1105 Media's educational technology online publications and electronic newsletters.

inside gcn

  • automated security (Oskari Porkka/Shutterstock.com)

    How to create a secure cyber environment

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group