Feeds

Citrix counters Amazon's ambush of virtual desks with Framehawk gobble

Framebuffer-spurting tech is an answer to AWS Workspaces

High performance access to file storage

Amazon's launch of virtual desktop infrastructure has already scared the competition into panic buys, judging by Citrix's gulping of thrifty virtual desktop and app deliverer Framehawk.

The buy was announced on Wednesday, and will see Citrix combine Framehawk's tech with the proprietary data delivery HDX [PDF] component of Citrix XenApp and XenDesktop.

What Citrix's release doesn't stress is that the reason for the buy is to gain access to the proprietary Framehawk Lightweight Framebuffer Protocol (LFP), which is the startup's answer to the PC-over-IP (PCoIP) Teradici protocol that Amazon uses under license for its Workspaces VDI tech.

Framehawk's technology gives sysadmins a way to deliver traditional desktop apps to mobile devices: the software is loaded into a secure container and stored either in an enterprise-controlled data center or an off-site cloud service. An encoder pulls pixels from the virtualized app's framebuffer and squirts them into a thin-client's display over LFP.

"This architecture introduces an active 'fire break' between the public mobile networks and sensitive enterprise content because there is simply no means for the mobile device to access raw secure data," Framehawk said in a FAQ document.

The company's tech can also add things like touch functionality to desktop apps for easy fiddling on fondleslabs.

"The addition of Framehawk's technology to the HDX portfolio enables Citrix to continue to lead the industry in delivering a powerful virtual desktop and application experience," said Citrix senior veep Sudhakar Remakrishna in a canned statement.

Citrix's buy comes months after Amazon announced Workspaces – a cut-price virtual desktop infrastructure tech that can serve a low-end Windows 7 image (running on Windows Server 2008 R2) down to desktops and handheld devices. Workspaces also imbues apps with a few touch features as well.

Though Amazon is tightlipped about the delivery technologies used by Workspaces, it does say that apps are delivered by a PCoIP protocol from a company named Teradici, which also transmits pixels across IP networks.

Though Citrix is trumpeting this buy as enhancing its existing stable of products, it should also be viewed as a "me too" tech acquisition in response to Bezos & Co's juggernaut, which is limbering up to start a rumble in the usually quiet VDI jungle.

Financial terms of the Firehawk gobble were not disclosed. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.