Feeds

Virtual desktops mean virtual applications

You can’t have one without the other

Secure remote control for conventional and virtual desktops

Desktop Virtualisation Virtualising the client is not just about the desktop. It is also about application virtualisation.

“Half of large organisations with more than 5,000 PCs have already adopted application virtualisation,” says Gartner analyst Terry Cosgrove.

That compares with perhaps one per cent worldwide that have adopted a virtual hosted desktop infrastructure (VDI).

In fact, it is hard to virtualise the desktop unless you also virtualise applications. “We see this as almost a prerequisite. If you think about how VDI would work at scale, you need some way of layering the applications onto a virtual desktop. Otherwise you will have each user with a dedicated image and you won’t get cost savings,” says Cosgrove.

Image is all

What is application virtualisation? Like desktop virtualisation, it comes in several guises. One long-standing variant is where the application runs on the server but the user interacts with an image of the application window. Microsoft’s RemoteApp works like this, and so does Citrix XenApp in its session virtualisation mode.

This type of solution has its place but there are performance and availability drawbacks. Another type of application virtualisation overcomes these by running locally, but in an isolated environment that does not touch the system state of the host computer.

Dependencies such as DLLs and other components are packaged into a bundle. Examples are Microsoft’s App-V, Citrix XenApp in application virtualisation mode, VMWare ThinApp, and Symantec’s Altiris Software Virtualisation Solution. The resulting bundle can either be installed on the host PC or streamed on demand.

Preparing an application package can be a chore. The process for App-V, for example, involves installing the application on a test base machine while the App-V sequencer monitors the install.

Clean sweep

Once done, the sequencer creates a package that captures the changes and dependencies and packages them for execution by the App-V client. Sometimes some clean-up work is necessary. Sequencing needs to be done every time the application is updated.

Once the package is created, though, the user experience is good and administrators get a near-guarantee that it will run successfully, without dependencies and setup failures.

Not all applications take kindly to virtualisation

“Our data shows that overall packaging and testing time can be reduced by 60 per cent,” says Cosgrove. “A sample of 24 organisations we surveyed in the fourth quarter of 2010 reported an average reduction of help desk calls by 18 per cent.” (The figures relate to application virtualisation generally)

The most obvious reason to virtualise applications. is compatibility, a common example being Microsoft’s Internet Explorer 6.0.

Awkward squad

“Microsoft actually prohibits that but it’s a very common use case,” says Cosgrove. The reason is that IE 6.0 does not run on Windows Vista or 7, but is required by some legacy web applications.

Another reason to virtualise is simply to avoid setup and dependency problems. Some organisations are using application virtualisation as a run-up to a VDI.

Unfortunately, not all applications take kindly to virtualisation. According to Gartner’s research, about 20 per cent of applications cannot be virtualised and about half should not be virtualised.

They include applications that rely on device drivers, or that start running before user log-in. Applications like Microsoft Office which have many integration points with the operating system are poor candidates, and it is probably better to make this part of a base operating system image rather than attempt to virtualise it.

California streaming

Application streaming, where the application is downloaded on demand, is a compelling approach which is not yet widely adopted. Streaming gives IT admins a little more control over deployment.

You can set up applications to block streaming once the licensed number of concurrent users is exceeded, for example. Or you can ensure that users run only the latest patched version. Offline use is possible using a local cache, blurring the boundary between streamed and non-streamed approaches.

In the end you cannot contemplate virtualising the desktop without first figuring out how to run the applications users require.

“Provision the users with the applications they need, regardless of how, with what device, and where they are consuming it,” says Fredrik Sjostedt, EMEA president at VMWare.

This type of application-centric approach makes sense. If desktop virtualisation is the destination, application virtualisation is likely to be part of the journey. ®

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.