Feeds

KVM backer takes virtual desktops on the road

Have branch office. Will ship code

Securing Web Applications Made Simple and Scalable

Qumranet, the well-moneyed entity behind KVM, is asking folks to help it test out some new desktop virtualization code that sends applications out from headquarters to remote offices.

Back in April, Qumranet birthed SolidICE, which is the the company's take on desktop virtualization. Like rival software, SolidICE ships desktop software from a data center to a user's thin client or PC. The big buzz around such code is that it makes managing, upgrading and securing lots of desktops easier. The downside, however, has been that applications funneled out from the data centers tend to lag once they arrive on the desktops, much to users' chagrin.

Qumranet says it's better than the other guys because it can ship the hell out of an application. Thanks to some fancy algorithms and other intellectual property, applications appear on virtualized desktops just as they would on a real desktop, so says Qumranet President Rami Tamir.

Tamir's claims will really be put to the test now that Qumranet's wants to send applications over long distances via the beta version of Solid ICE Multi-Site.

SolidICE lets administrators create meaty software templates at a central data center. These templates include the operating system and applications used by most employees.

The remote offices then just manage lighter files associated with individual desktops. Those files could include a unique application for a single user or very basic things like their desktop background.

By splitting these sets of software and applying algorithms to improve the flow of bits between the main and remote sites, Qumranet claims to offer a proper desktop experience for branch office staff.

The multi-site software, however, is in early days to be sure, as Qumranet is only now hyping a "limited beta" program. Prove your worth to enter the trial here. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.