ZTE has made a breakthrough in cloud desktop technology and launched its cloud desktop integration solution based on server and PC virtualization technology.
ZTE's solution enables users to access the cloud desktop with a terminal, laptop, tablet, thin terminal, netbook/cloudbook or PC at any time or place. This is achieved by innovatively combining high-performance computing and 3D design scenarios supported by the PC-based virtualized desktop and the mobile office, flexible computing, and highly-centralised management scenarios supported by the server-based virtualized desktop.
The solution supports network access from any location, at any time, multi-screen interaction and account and application data sharing on different screens, completely changing the way desktops operate and enabling integration of data, application, and management.
This integrated solution takes the technical advantages of both the cloud and PC desktops, and overcomes the bottleneck in the deployment of the cloud desktop. Users can access the same data disk from any of the desktops as the data can be shared between all versions of the desktop.
ZTE's innovative application management method provides enterprises with a new way of application procurement, deployment, and management. Enterprises can centrally manage applications, deploy applications with one-click, and release or terminate applications as and when this is required.
The solution supports managing applications centrally among different desktop systems, which can greatly reduce the number of key licenses that enterprises need to purchase. The cloud desktop also supports centrally managing virtualized software, cloud desktops, desktop users, desktop pools, server-based virtualized desktops, and PC-based virtualized desktops on the same management portal.
The cloud desktop solution can be used to reduce hardware and software costs, increasing management efficiency and reducing the difficulty of maintenance overall. With the cloud desktop, users can centrally manage existing PCs that are used separately by configuring a unified security policy.
The separation of data disks from system disks ensures manageable and controllable data security. Specifically, user data can be stored and uniformly controlled at the server side to prevent illegal data downloads and file sharing, ensuring the security of user data. As for the safe system access, the cloud desktop solution supports multiple authentication methods, including USB Key and dynamic password authentication.