Solved

Hosting applications

Posted on 2014-09-11
2
160 Views
Last Modified: 2014-09-11
I have a desktop application that I'd like to make commercially available via remote access.

Thus a user would remote into a machine, enter their username and password and then be able to access the application.

It'd be as if I were setting up a terminal server.

Does anyone know of companies that provide "terminal server" types of access that I am looking for?  In other words I don't want to obtain a term server, etc.  Want to outsource it.
0
Comment
Question by:classnet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 35

Accepted Solution

by:
Kimputer earned 500 total points
ID: 40316810
Most VPS companies (Virtual Private Server) can do that. They will have a Windows 2012 image ready, and you just tell them what you want (CPU, memory, bandwidth, how many Windows users, how many Office users, how many Remote Desktop users). According to this info, you will pay xx amount per month.
0
 

Author Closing Comment

by:classnet
ID: 40316822
Thanks!  Sounds like what I am looking for.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When working with Microsoft SCVMM (System Center Virtual Machine Manager) in a Hyper-V virtualization environment, we have run across scenarios in which the failed migration of a VM from one host to another may leave the VM in a failed state. Specif…
Nowadays, Virtual Machines are used equally by small and large scale organizations. However the issue is that VMDK files are also prone to corruption. So, in this article we are looking at how to recover VMDK files from hard disk of host operating s…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question