Feeds

KVM backer takes virtual desktops on the road

Have branch office. Will ship code

Intelligent flash storage arrays

Qumranet, the well-moneyed entity behind KVM, is asking folks to help it test out some new desktop virtualization code that sends applications out from headquarters to remote offices.

Back in April, Qumranet birthed SolidICE, which is the the company's take on desktop virtualization. Like rival software, SolidICE ships desktop software from a data center to a user's thin client or PC. The big buzz around such code is that it makes managing, upgrading and securing lots of desktops easier. The downside, however, has been that applications funneled out from the data centers tend to lag once they arrive on the desktops, much to users' chagrin.

Qumranet says it's better than the other guys because it can ship the hell out of an application. Thanks to some fancy algorithms and other intellectual property, applications appear on virtualized desktops just as they would on a real desktop, so says Qumranet President Rami Tamir.

Tamir's claims will really be put to the test now that Qumranet's wants to send applications over long distances via the beta version of Solid ICE Multi-Site.

SolidICE lets administrators create meaty software templates at a central data center. These templates include the operating system and applications used by most employees.

The remote offices then just manage lighter files associated with individual desktops. Those files could include a unique application for a single user or very basic things like their desktop background.

By splitting these sets of software and applying algorithms to improve the flow of bits between the main and remote sites, Qumranet claims to offer a proper desktop experience for branch office staff.

The multi-site software, however, is in early days to be sure, as Qumranet is only now hyping a "limited beta" program. Prove your worth to enter the trial here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.