Guntermann & Drunck Offers Secure Access To KVM Cloud Control

Many facilities considering the move to cloud-based operations must first understand how their existing inventory of equipment will interoperate with virtualized services. This is often referred to as a hybrid system—on cloud and on-premise. However, to do it successfully, there’s got to be some type of gateway bridge that gets your signals from SDI into IP with efficiency and reliability.

That was the thinking among the product design engineers at Guntermann & Drunck GmbH (G&D) when they were looking at improving KVM system operation in today’s increasingly virtualized production environments. The idea was to integrate virtual machines into existing KVM matrix installations. Thus far the company’s KVM systems have traditionally been part of an on-premise installation that was easily manipulated and adjusted as required.

With the launch of RemoteAccess-CPU, G&D is enabling hybrid infrastructures. The company has released a new series of modules that are designed to make the connection between matrix systems and virtual machines easy, which can then be accessed remotely via network protocols like RDP, VNC and SSH. Support of further protocols will follow soon.

The RemoteAccess-CPU lets you seamlessly integrate virtual machines into KVM matrix installations.

The RemoteAccess-CPU lets you seamlessly integrate virtual machines into KVM matrix installations.

With its Gigabit Ethernet network interface, the RemoteAccess-CPU supports video resolutions up to 2560 x 1600 @ 60 Hz as well as USB HID and embedded audio. Users select the desired source from a standardized menu or “target list” on the device’s integrated LED screen display. This can be done regardless of whether the desired computer is in the server room, via network protocol or in the cloud. Customers can use the RemoteAccess-CPU as a thin client to set up a connection without having to purchase extra hardware.

The KVM matrix controls the logic and takes over user administration. And all connection data is forwarded in encrypted form, so security is assured.

In hybrid systems, the RemoteAccess-CPU acts as a remote gateway to access virtual machines or other remote targets. Users can choose between and operate all available virtual machines, but only one at a time. If multiple users wanted to operate a number of virtual machines from multiple RemoteAccess-CPUs, G&D has developed a pooling function called CrossDisplay-Switching that combines specific remote targets with one or more RemoteAccess-CPUs to form a remote pool. This means that the selected remote gateways are always exclusively kept free for these targets. As a result, predefined virtual machines remain accessible at all times.

G&D has a history of developing solutions for KVM, whether a user wants to operate several hundred computers from one workstation or extend access to computers to up to 10,000 meters (over fiber). It makes KVM switches, extenders, analog and digital matrix systems, digital signage system and a series of KVM accessories—which are all compatible with the new RemoteAccess-CPU.

You might also like...

Look Like A Million For Less

Every TV viewer compares live content with what they regularly see on TV, with multimillion-dollar talent with more multimillions in technical equipment and support.

Information: Part 3 - Applying Statistics

We are not done with statistics yet. In a sense we will never be done with it and it is better to know how to deal with it than to ignore it. It is better still to know how others…

Transforms: Part 5 - OFDM

Thus far we have looked at transforms from a somewhat abstract viewpoint. In contrast, here we look at an application where transforms take center stage.

Electricity: Part 3 - AC Systems

Here we look at alternating current (AC) systems and how generating AC often requires an intermediate step of converting to DC to improve the efficiencies of AC generators.

Information: Part 2 - Gaussian Distribution

Information can never be separated from its nemesis, which is uncertainty. The former is only possible by limiting the latter.