Feeds

Easing the pain of applications delivery

Gain time and control with virtualisation

Internet Security Threat Report 2014

Desktop Application virtualisation separates the application not just from the underlying hardware but also from the operating system. That means, for example, that you can run applications side by side in separate virtualised spaces without fear of clashes between them or with the operating system.

Application virtualisation is primarily seen as a desktop technology. A key advantage is that you can deliver applications in a variety of ways because they are independent of the client architecture, .

Just a mirage

Applications can be installed inside their own virtualised space on the client, or they can be streamed so that the user sees only an image of the application, with almost no code downloaded. You can deploy applications quickly and manage them centrally, keeping users current with security patches and updates.

This can be a big win for users. There is often a tension between the device they use and the applications they need to do their job. Sometimes these applications are supported on the device they want, but all too often they are not.

Allowing users to select their device and know that pretty much any application will run on it could be a big selling point.

Peace and harmony

Application virtualisation is also a big time-saver. Regression testing almost disappears, speeding up deployment: you test once inside the virtual environment, and the application is ready to go. Dependencies and conflicts with operating systems, hardware drivers or other applications can almost disappear.

It helps with licence management and application provisioning too. You know where all the applications are deployed at any time and how many users are accessing each one, and you can analyse the data.

Effectively, it's a step in the direction of a private cloud

You can, for example, look up the maximum number of concurrent users and incorporate that intelligence into your licence purchasing plans – you might be surprised to discover how many unused licences the company has bought.

And when it's time for an application to be retired, you just delete it from the server: no more uncertainty about whether there are unlicensed copies still being used out there.

You can see how this kind of fine-grained access to application usage could help to apply chargeback mechanisms. Effectively, it's a step in the direction of a private cloud.

Keep it simple

Server applications can be virtualised too, for many of the same reasons that apply to desktop applications and with similar advantages. For example, it simplifies application and operating system updates and deployment, resulting in fewer application images to maintain and a reduction in management costs.

This is especially useful for server applications, which are usually much more complex to install and configure than desktop applications. Additionally, server applications are tightly coupled into virtual machine images, making it tough to update either without disruption. Once the application is virtualised, this problem is mitigated to a large degree.

As with any technology, there are disadvantages. Application virtualisation adds complexity - the bugbear of any IT deployment. As we all know, the more complex it is, the more choices need to be made and the more likely it is that things will go wrong. And when they do, problems will be harder to find and eliminate.

User rage

Once the system is up and running, it will need to be maintained and managed, which is a cost item. Virtualising applications may also increase back-end costs: applications that are no longer running on client machines still need CPU time and memory, so they need to be factored into server capacity planning.

And on the desktop side, users won't take kindly to having their applications messed about with. Get it wrong and the helpdesk lines will glow.

All that said, however, virtualisation can help you deliver applications on demand, reduce testing times massively, and make application deployment easier and faster.

And on a strategic level, it may be a key element of what the finance director is promising the board right now. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Apple's OS X Yosemite slurps UNSAVED docs into iCloud
Docs, email contacts... shhhlooop, up it goes
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.