What about security?
Firstly the article implies that MokaFive Player runs on Linux or Windows hosts. This is incorrect. The "player" runs on Mac OS and Windows hosts and enables Linux or Windows guests to run on these hosts.
Secondly the article does not provide enough detail around the security features of this solution to VDI. The "player" and LivePC (MokaFive's name for the vitual image) can both be encrypted, effectively providing full volume encryption to the virtual machine. The image can be run from either a local installtion on the host or from a USB key/drive which means that as we move more towards a bring your own PC (BYOPC) world of employee/contractor owned machines, corporations can still provide a secure, managed desktop environment to these users. This means that companies no longer need to provide a corporate machine to contractors and other 3rd parties and don't have to worry about the security of those self-provisioned devices. The LivePC provides the secure corporate environment. Additional security features include the ability to prevent copying data between the guest and host (including preventing cut-and-paste) and the ability to disable (revoke) access or kill the remote image. With v3.x the inclusion of AVG allows the "player" to scan the host before it loads the image.
The administration console provide a great deal of control over the image and the player. You can even control the minimum specification of the host to ensure optimum performance by the user.
I do not work for MokaFive nor do I have a commercial interest in the solution. I have been using it in test and pilot environments since v1 (beta) and believe it provides a better way of delivering a secure, managed desktop environment than standard hosted VDI and will open up the ability for users to "bring there own PC" in the future.