Feeds

A short note about Microsoft App-V

Dev-friendly

SANS - Survey on application security programs

Desktop The application development lifecycle is less responsive than it could be. IT departments spend too much time maintaining existing software and infrastructure, time that should really be spent delivering tools to make the business run better. It's like trying to run an F1 team out of a small garage: you never have the resources to do the job that's really needed, when all you're doing is changing tyres.

Businesses need to be flexible, and that means rapid application development – and fast deployment. The latter is often the biggest bottleneck, requiring tests on every single configuration in use in your organisation. Even then something's will be missed, some configuration that you've not documented, or that has sneaked in under the radar.

What's needed is a way of reducing the maintenance overhead, so that applications can be deployed using self-service tools, and can run in safe sandboxes so they interact with as little on a target PC as possible. Tools such as Microsoft's App-V application virtualisation platform solve many of these problems.

Application virtualisation

Instead of testing on multiple platforms, a development team can build their application and then wrap it up for App-V distribution. When wrapped, it can be tested on any PC running the App-V client, with no need to worry about whatever other applications might be running. App-V keeps applications sandboxed, in their own protected area of memory, preventing interactions with other programs. Once an application's been tested, it can be added to the application catalogue and deployed to users.

You can use the same application virtualisation techniques to handle deploying updates. Support desks and users won't need to manage software upgrades. Instead, all you need to do is deploy a new application image in your application library.

Users will be switched to the new version next time they run the application, or next time they connect to the corporate network, if they're using a cached copy on a notebook PC. It's also possible to use tools like Remote Desktop Services to embed applications into web pages, leaving them running on a server without affecting desktop resources.

The next generation of desktop virtualisation tools will add additional application virtualisation features. Instead of deploying a single desktop image to a PC, you'll be able to mix and match base OS features with application images – bringing traditional virtual machines together with application virtualisation.

In this scenario, when applications are updated they're automatically replaced in the hybrid virtual machine that's delivering user desktops. It's a much simpler approach to developing desktop applications, as it means you're only supporting a single application version (and a single binary!) across an entire organisation.

Virtualisation encourages self-service approaches to provisioning and deploying desktops. Users will be able to select the elements of their custom desktop from a library, using only the components that their profile allows.

A few clicks on a web page, and they'll be up and running, with applications streaming from a central server to a local cache on their PCs. There's no support intervention, and no need to spend hours crafting and installing custom images for each user.

That time saved changes the development story, too. Instead of spending 80 per cent of your time in maintenance, you're now spending 50 per cent or even 30 per cent. That's all time that can be switched to developing new applications, spending time with stakeholders to determine just what the business needs. ®

Top three mobile application threats

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.