{"id":9414,"date":"2024-09-02T20:02:54","date_gmt":"2024-09-02T18:02:54","guid":{"rendered":"https:\/\/aboveit.fi\/virtualization-of-workstations-and-applications\/"},"modified":"2025-11-27T14:04:15","modified_gmt":"2025-11-27T12:04:15","slug":"virtualization-of-workstations-and-applications","status":"publish","type":"post","link":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/","title":{"rendered":"Virtualization of Workstations and Applications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9414\" class=\"elementor elementor-9414 elementor-2090\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ac5f46c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ac5f46c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-17217c7\" data-id=\"17217c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9389b18 elementor-widget elementor-widget-text-editor\" data-id=\"9389b18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Virtualization of workstations and applications \u2013 what if end users didn&#8217;t receive physical workstations when starting their work? This is something I have often pondered. Most people typically have some kind of personal computers both at home and at work, but can an organization require or ask end users to use their own personal devices for work purposes \u2013 where is the line drawn and who is then responsible for information security or data protection?  <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2cdfd9f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2cdfd9f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c4559ef\" data-id=\"c4559ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-07af889 elementor-widget elementor-widget-heading\" data-id=\"07af889\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The curse of BYOD devices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1239b13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1239b13\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d2b2938\" data-id=\"d2b2938\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfeae6a elementor-widget elementor-widget-text-editor\" data-id=\"bfeae6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-family: 'Varela Round', sans-serif; color: #7a7a7a;\"><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">The first things that come to my mind are questions of responsibility. If work is done in the organization&#8217;s IT environment and with devices provided by the organization itself, we can typically be sure that the organization&#8217;s IT management has defined the desired information security settings for the endpoints and actively monitors the implementation of information security.<\/span><\/p>\n<p style=\"font-family: 'Varela Round', sans-serif; color: #7a7a7a;\"><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">But how does responsibility shift if the end user works on their own personal device and is responsible for their own information security settings? Can the organization&#8217;s IT management then be sure that information security is configured according to the jointly agreed policy? How do we ensure that information does not leak from the workstation to outsiders? And what about the common threat scenario, how can IT management be sure that such a personal workstation hasn&#8217;t already been compromised?   <\/span><\/p>\n<p style=\"font-family: 'Varela Round', sans-serif; color: #7a7a7a;\"><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">If organizations want to utilize personal or third-party provided workstations for work, I think of<\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\"> <\/span><a style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem; background-color: #ffffff;\" href=\"https:\/\/aboveit.fi\/en\/modern-workplace\/\">device management<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\"> <\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">implemented &#8220;BYOD&#8221; configurations, but above all, workstation virtualization technologies such as Windows 365 and Azure Virtual Desktop. What are these basically about, and what can the technology enable?<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-686e836 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"686e836\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-117e380\" data-id=\"117e380\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-783fa90 elementor-widget elementor-widget-heading\" data-id=\"783fa90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Windows 365<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8335462 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8335462\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aae590a\" data-id=\"aae590a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a61413f elementor-widget elementor-widget-text-editor\" data-id=\"a61413f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section-wrapper\" data-id=\"7t137z\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-7t137z layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-8T5m1S\">\n<div class=\"guten-column-wrapper\" data-id=\"8T5m1S\">\n<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">A couple of years ago, Microsoft introduced <\/span><a style=\"background-color: #ffffff; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\" href=\"https:\/\/www.microsoft.com\/fi-fi\/windows-365\">Windows 365 technology<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\"> to virtualize workstation usage. It is an easily purchasable and configurable virtualization technology that enables the use of a virtual desktop in the organization&#8217;s own Microsoft cloud.<\/span><\/p>\n<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">Windows 365 is licensed per user, either with Business, Enterprise, or Frontline models. There&#8217;s not much difference in resource pricing between these, but with Enterprise licensing models, you can, for example, connect the desktop to a virtual network on the company&#8217;s Azure subscription and thus access resources in the company&#8217;s internal network. Frontline licensing allows the use of individual licenses among multiple &#8220;frontline&#8221; workers, typically referring to productive workers in industrial environments, for instance. Business licensing is a purely cloud-based virtual workstation separate from environments, but even here: Intune device management enables the control and configuration of information security, just like with physical workstations, so that responsibility and visibility remain with IT management.   <\/span><\/p>\n<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">Windows 365 is largely based on the same technology as Azure Virtual Desktop solutions built on the Azure side, but the licensing is fixed and easily understandable, just like with other Microsoft 365 type services. But how is Azure Virtual Desktop then structured? <\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-be9c1dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be9c1dd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-01965a3\" data-id=\"01965a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6036ac elementor-widget elementor-widget-heading\" data-id=\"e6036ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Virtual Desktop<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f32aed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0f32aed\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-164b03f\" data-id=\"164b03f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a5828fe elementor-widget elementor-widget-text-editor\" data-id=\"a5828fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section-wrapper\" data-id=\"7t137z\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-7t137z layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-8T5m1S\">\n<div class=\"guten-column-wrapper\" data-id=\"8T5m1S\">\n<p style=\"color: #000000;\">While Windows 365 is an easily purchasable and licensable SaaS service, implementing the same solution as <a href=\"https:\/\/azure.microsoft.com\/en-us\/products\/virtual-desktop\/\">Azure Virtual Desktop technology<\/a> is often technically a bit more laborious and a self-maintained entity, but it allows flexibility in terms of usage and its costs, which many organizations may feel they need. Let&#8217;s take as an example a group of several hundred employees who use a virtual desktop irregularly at different times, on different days of the week. Despite the total number of users, there may only be a few dozen concurrent users, in which case it might be expensive to buy fixed licenses and pay a fixed fee for each and every user on a monthly basis.  <\/p>\n<p style=\"color: #000000;\"><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">Azure Virtual Desktop as an IaaS solution brings flexibility here. You can build virtual resources in your own Azure environment, allocate them with the number of instances you want reflecting peak demand, which automatically scales resource usage according to the actual number of users. Of course, the solution must take into account the centralized profile storage resources shared between instances in the background, and there are some other moving parts in the technical implementations. However, with good planning, the whole can be made into an easily maintained Azure solution, the costs of which can be very low compared to Windows 365 solutions, interpreting on a case-by-case basis, of course!   <\/span><\/p>\n<p style=\"color: #000000;\"><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">In addition, Azure Virtual Desktop usage scenarios have one use case that Windows 365 does not enable as a technology. Instead of publishing an entire desktop, you can publish just applications to end users in a Citrix-like manner. And this is what we&#8217;re talking about with application virtualization. From the end user&#8217;s perspective, the application looks on their own workstation as if it were running on their own workstation. So, for example, if you were running your organization&#8217;s ERP solution on Azure public cloud servers and still needed some kind of client application to use it, this could very well be the usage method that minimizes latencies between the workstation and server and makes the application work as it has historically been used from one&#8217;s own workstation. This as a usage scenario example.     <\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-30b0fba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"30b0fba\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-98f9b61\" data-id=\"98f9b61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43a6d59 elementor-widget elementor-widget-heading\" data-id=\"43a6d59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Use of virtual resources?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16014a8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16014a8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fa2ebf5\" data-id=\"fa2ebf5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-463828c elementor-widget elementor-widget-text-editor\" data-id=\"463828c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section-wrapper\" data-id=\"7t137z\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-7t137z layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-8T5m1S\">\n<div class=\"guten-column-wrapper\" data-id=\"8T5m1S\">\n<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">Whatever the implementation and licensing method for virtual resources, the usage models are the same in both technologies. Microsoft enables both browser-based use and a locally installed Remote Desktop application on workstations for the use of virtual resources as needed. When using from personal devices, IT management can instruct to use resources via browser, and correspondingly, for corporate workstations, the Remote Desktop application can be pushed and centrally configured for application virtualization.  <\/span><\/p>\n<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">In terms of licensing, when planning the use of resources, it&#8217;s good to consider the requirements related to VDI use, which should be taken into account when considering usage. In a large part of Microsoft 365 licenses, such as Microsoft 365 Business Premium, for example, such licensing is considered in the form of Windows licensing, as well as in the Microsoft 365 F3 license from Frontline bundles. <\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b61d5a5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b61d5a5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7b72f31\" data-id=\"7b72f31\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22f20f1 elementor-widget elementor-widget-heading\" data-id=\"22f20f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Best choices for your own business?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d55af7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d55af7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-98bf39e\" data-id=\"98bf39e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53c5a2a elementor-widget elementor-widget-text-editor\" data-id=\"53c5a2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">Different businesses have different needs. IT managements need to consider needs on a case-by-case basis and strive to find <\/span><a style=\"background-color: #ffffff; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\" href=\"https:\/\/aboveit.fi\/en\/platform-services\/\">from these technologies as well<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\"> the solutions that best suit their own needs and are most cost-effective. And when you limit your company&#8217;s work use to those managed resources in your own environment \u2013 be they virtual, IT management can be sure in terms of management where the company&#8217;s data is stored and ends up. Instead of giving an external consultant a company laptop, what if you give them access to a virtual desktop you manage in the future?<\/span><\/p>\n<p>We&#8217;ve come a long way from the early days of the &#8220;Windows Virtual Desktop&#8221; service, when these were proudly piloted to various customers at the forefront. Now grown to adulthood, the &#8220;Azure Virtual Desktop&#8221; technology is a trusted virtualization solution for desktops and applications for many companies. Our own customer base has selected several technologically oriented customers for whom desktop and application virtualization has been built for various usage needs. We indeed feel that we are a trusted domestic Microsoft consultant for IT managements, who may have something to offer for your IT management as well.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d8936d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d8936d6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-37615f93\" data-id=\"37615f93\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4bb0fed0 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4bb0fed0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<div class=\"section-wrapper\" data-id=\"7t137z\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-7t137z layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<p><\/p>\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-8T5m1S\">\n<div class=\"guten-column-wrapper\" data-id=\"8T5m1S\">\n<p><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"section-wrapper\" data-id=\"esvy7k\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-esvy7k layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-xEg4kC\">\n<div class=\"guten-column-wrapper\" data-id=\"xEg4kC\">\n<blockquote class=\"wp-block-quote\">\n<p><em>Above IT is a partner and resource for IT managements. A trusted &#8216;consigliere&#8217; of Azure services<\/em>. <em>As our customer, you get genuine expertise also related to desktop and application virtualization, based on strong experience.<\/em><\/p>\n<p><\/p>\n<\/blockquote>\n<p><\/p>\n<\/div>\n<\/div>\n<p><\/p>\n<\/div>\n<\/section>\n<\/div>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Virtualization of workstations and applications \u2013 what if end users didn&#8217;t receive physical workstations when starting their work? This is something I have often pondered. Most people typically have some kind of personal computers both at home and at work, but can an organization require or ask end users to use their own personal devices [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":9415,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[303,236,354,319],"tags":[304,237,418],"class_list":["post-9414","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-microsoft-365","category-modern-workplace","category-platform-services","tag-azure","tag-microsoft365","tag-windows365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Virtualization of Workstations and Applications - Above IT Oy<\/title>\n<meta name=\"description\" content=\"Virtualization of workstations and applications improves information security by providing the ability to manage information work within your own organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtualization of Workstations and Applications - Above IT Oy\" \/>\n<meta property=\"og:description\" content=\"Virtualization of workstations and applications improves information security by providing the ability to manage information work within your own organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Above IT Oy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/aboveitfi\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T18:02:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-27T12:04:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/09\/pexels-flodahm-699459-scaled-e1725298731323.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juha Kari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juha Kari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/\"},\"author\":{\"name\":\"Juha Kari\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/8b6b16ca2927e8021cd0a2fc2a09ce5d\"},\"headline\":\"Virtualization of Workstations and Applications\",\"datePublished\":\"2024-09-02T18:02:54+00:00\",\"dateModified\":\"2025-11-27T12:04:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/\"},\"wordCount\":1201,\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/pexels-flodahm-699459-scaled-e1725298731323.jpg\",\"keywords\":[\"Azure\",\"microsoft365\",\"windows365\"],\"articleSection\":[\"Azure\",\"Microsoft 365\",\"Modern Workplace\",\"Platform Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/\",\"name\":\"Virtualization of Workstations and Applications - Above IT Oy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/pexels-flodahm-699459-scaled-e1725298731323.jpg\",\"datePublished\":\"2024-09-02T18:02:54+00:00\",\"dateModified\":\"2025-11-27T12:04:15+00:00\",\"description\":\"Virtualization of workstations and applications improves information security by providing the ability to manage information work within your own organization.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/pexels-flodahm-699459-scaled-e1725298731323.jpg\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/pexels-flodahm-699459-scaled-e1725298731323.jpg\",\"width\":1920,\"height\":1920,\"caption\":\"Office desktop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/virtualization-of-workstations-and-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Etusivu\",\"item\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Virtualization of Workstations and Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"name\":\"We Are Above IT\",\"description\":\"Tietohallinnon voimavarakumppani\",\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\",\"name\":\"Above IT Oy\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"width\":1613,\"height\":383,\"caption\":\"Above IT Oy\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/aboveitfi\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/aboveitfi\",\"https:\\\/\\\/instagram.com\\\/aboveitfi\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/8b6b16ca2927e8021cd0a2fc2a09ce5d\",\"name\":\"Juha Kari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g\",\"caption\":\"Juha Kari\"},\"sameAs\":[\"https:\\\/\\\/aboveit.fi\"],\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/author\\\/juha-kariaboveit-fi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virtualization of Workstations and Applications - Above IT Oy","description":"Virtualization of workstations and applications improves information security by providing the ability to manage information work within your own organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/","og_locale":"en_US","og_type":"article","og_title":"Virtualization of Workstations and Applications - Above IT Oy","og_description":"Virtualization of workstations and applications improves information security by providing the ability to manage information work within your own organization.","og_url":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/","og_site_name":"Above IT Oy","article_publisher":"https:\/\/www.facebook.com\/aboveitfi","article_published_time":"2024-09-02T18:02:54+00:00","article_modified_time":"2025-11-27T12:04:15+00:00","og_image":[{"width":1920,"height":1920,"url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/09\/pexels-flodahm-699459-scaled-e1725298731323.jpg","type":"image\/jpeg"}],"author":"Juha Kari","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Juha Kari","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/#article","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/"},"author":{"name":"Juha Kari","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/8b6b16ca2927e8021cd0a2fc2a09ce5d"},"headline":"Virtualization of Workstations and Applications","datePublished":"2024-09-02T18:02:54+00:00","dateModified":"2025-11-27T12:04:15+00:00","mainEntityOfPage":{"@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/"},"wordCount":1201,"publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"image":{"@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/09\/pexels-flodahm-699459-scaled-e1725298731323.jpg","keywords":["Azure","microsoft365","windows365"],"articleSection":["Azure","Microsoft 365","Modern Workplace","Platform Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/","url":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/","name":"Virtualization of Workstations and Applications - Above IT Oy","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/#primaryimage"},"image":{"@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/09\/pexels-flodahm-699459-scaled-e1725298731323.jpg","datePublished":"2024-09-02T18:02:54+00:00","dateModified":"2025-11-27T12:04:15+00:00","description":"Virtualization of workstations and applications improves information security by providing the ability to manage information work within your own organization.","breadcrumb":{"@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/#primaryimage","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/09\/pexels-flodahm-699459-scaled-e1725298731323.jpg","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/09\/pexels-flodahm-699459-scaled-e1725298731323.jpg","width":1920,"height":1920,"caption":"Office desktop"},{"@type":"BreadcrumbList","@id":"https:\/\/aboveit.fi\/en\/virtualization-of-workstations-and-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Etusivu","item":"https:\/\/aboveit.fi\/en\/"},{"@type":"ListItem","position":2,"name":"Virtualization of Workstations and Applications"}]},{"@type":"WebSite","@id":"https:\/\/aboveit.fi\/en\/#website","url":"https:\/\/aboveit.fi\/en\/","name":"We Are Above IT","description":"Tietohallinnon voimavarakumppani","publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aboveit.fi\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aboveit.fi\/en\/#organization","name":"Above IT Oy","url":"https:\/\/aboveit.fi\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","width":1613,"height":383,"caption":"Above IT Oy"},"image":{"@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/aboveitfi","https:\/\/www.linkedin.com\/company\/aboveitfi","https:\/\/instagram.com\/aboveitfi"]},{"@type":"Person","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/8b6b16ca2927e8021cd0a2fc2a09ce5d","name":"Juha Kari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g","caption":"Juha Kari"},"sameAs":["https:\/\/aboveit.fi"],"url":"https:\/\/aboveit.fi\/en\/author\/juha-kariaboveit-fi\/"}]}},"_links":{"self":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/comments?post=9414"}],"version-history":[{"count":11,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9414\/revisions"}],"predecessor-version":[{"id":9479,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9414\/revisions\/9479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media\/9415"}],"wp:attachment":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media?parent=9414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/categories?post=9414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/tags?post=9414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}