Feeds

Windows on Mac: BootCamp vs Parallels Desktop

How to run the 'other' operating system...

The Power of One Infographic

Parallels Desktop for Mac 1.0

Parallels Desktop (PD) is very definitely for folk who want to use another operating system on a casual basis. It's benefit of fast access to the guest OS is balanced by reduced performance and limited hardware support. It's not a tool to use if you're a gamer, say, but rather for dipping into that legacy accounting package you're still using after all these years.

That's not to demean PD - getting multiple operating system to operate alongside each other simultaneously remains an impressive technological feat, and Parallels' software is both ingenious and amazingly cheap. PD manages the trick of mediating between guest operating systems, Mac OS X and the hardware they're all running on. The host OS believes its operating alone; the guests each assume they're the only show in town; PD is the magician behind the curtain making it all work seamlessly.

Installation is remarkably straightforward - particularly in comparison with BootCamp. PD itself is installed in the usual Mac OS X manner. Running it invites you to set up a Virtual Machine - the ersatz PC on which any variety of Windows, of Linux or of a number of other operating systems will be fooled into thinking they own. There's no need to re-partition your hard drive - PD creates .hdd files and ties them into each VM as if they were physical, separate hard disks.

windows on mac - parallels desktop installation

PD places the .hdd files in your own Library folder. You can move them, but you'll need to let PD know explicitly - it can't resolve aliases, for example. But even so, it's easy to move the .hdd file off onto an external drive if you don't have enough space on your main hard drive. PD ships with an integrated disk compression tool that runs in Windows to defragment the virtual hard drive, clean out unneeded temporary files and so on. Parallels also supplies a separate utility for creating and modifying hard drive and optical disc images.

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.