SlideShare a Scribd company logo
Marius Sandbu
Application virtualization vs Application
layering
Bio
Agenda:
• Where we are today
• Application Virtualization
• ThinApp, App-V
• Application Layering
• Unidesk, AppVolumes, AppDisks
• Demo
• Summary
Where we are today
Application 1 Application 2
 Group Policy
 System Center
 Script
 Deployment
tools
 Base image
Shared OS Resources
MSVCRT.DLLRegistry File explorer
Server
 VM Template
 VM Service
 PXE Boot
 MDT/System
Center
Some issues:
• Patch management
• Application Compability
• Application Security
• Software dependency
• Application testing
• Software rot & dll-hell
• The big bad image
• Application lifecycle
management
Fixes?
• Status Quo
• App virtualization
• App layering
Application Virtualization
Isolated
Application 1
Isolated
Application 2 Microsoft
App-V
 Vmware
ThinApp
MSVCRT.DLL Registry
File explorer
Server
 VM Template
 VM Service
 PXE Boot
 MDT/System
Center
MSVCRT.DLL Registry
File explorer
Shared
Resources
Some common
properties:
• Virtual file tree and registry
• Includes its own software
dependency
• Can if allowed in the
package read/write to the
underlaying OS
• Each application is isolated
• Can be grouped together
• Streaming/Cached
Application Virtualization
Advantages
• No install required
• Fix application conflicts
• No registry and system
bloat
• Multiple runtime
enviroments
• Easier update
management
• Versioning
• Improved Security
• Easier to do app
customization
Disadvantages
• Bandwidth
Requirements
• I/O Requirements
• More Infrastructure
• Cost / Training
• Sequencing / Capturing
Apps that cannot be
virtualized
• Device drivers
• Boot services
• Applications part of the OS
• COM+
• Antivirus/firewalls
• VPN clients
Microsoft App-V 5
App-V Sequencing
machine
 App-V
Management
 Publishing
 Reporting Server
App-V Database
Share
Non-persistent
SCS
Cache
Persistent ( RSDH)
Testing
Pros
• Infrastructure or
PowerShell
• Large support and
integration options
• App-V license included in
RDS CAL!
• Large Community
• Simple with Office
• Many recipies
Cons
• No support for Internet
Explorer sequencing
• Requires a client installed
on each host
• Consumes more disk I/O
Vmware ThinApp
ThinApp Capturing
File Repository
AppSync
Script/ESD
Testing
Pros
• Does not require any agent
• Deployed as reguler exe or
MSI
• Integrates into existing
deployment using MSI
• Can virtualize Internet
Explorer
• Autoupdates within
configuration
Cons
• No central management
unless you have Horizon
• No PowerShell support
• No built-in application
usage tracking
Application Layering
Some common
properties:
• Multiple virtual disks
merged
• May contain read/write
layers
• May seperated into
application/personal/os
layers
• Applications behave like
normal
• Mulitple applications can be
placed within the same
layer
• Write filters and seperating
I/O traffic Windows (OS)
Application 2
Application 1 (R)
Application 3
Personalization (R/W)
Layers
Machine
NTFS/File System Drivers
Mini filter driver
Application Layering
Advantages
• Simpler application
«capture»
• Delivery application
updates
• One image!
• Works with
drivers/services
• Can manage personal
data*
Disadvantages
• Some specific
hypervisor requirement
• No appliation isolation
• Yet another solution?
Things Apps that
cannot be layered
• Depending on the
vendor..
Unidesk
Windows (OS)
Application 2
Application 1
(R)
Application 3
Personalization (R/W)
Layers
Terminal Servers/VDI
Hypervisor
Unidesk Management
Applicance
Unidesk Cachepoint
Windows (OS)
Application 2
Application 1
(R)
Application 3
Personalization (R/W)
Layers
Copy layers to the host
Collection
Installation Machine
Advantages
• Can layer pretty much
everything
• Integrated within the
Hypervisor
• Support for Hyper-V, Azure
and ESX
• Support for RSDH, XenApp
and Horizon
Disadvantages
• Silverlight based console 
• No instant app delivery
method
• Only on virtual machines
Citrix AppDisks*
Application 2
Application 1
Application 3
AppDisks
Terminal Servers/VDI
Hypervisor
Desktop Delivery
Controller
Orchestrate updates
Machine Catalog -
MCS
OS
MCS Master Image
Personalization layer
PVD
Preparation Machine
Advantages
• Integrated into Citrix
Studio
• Simple management
• Can be setup using Citrix
MCS or PVS
• Can be integrated with
either XenServer or ESX
Disadvantages
• Requires a Citrix
enviroment
• Virtual Machines only
• No Instant-app delivery
• Only layering for the
applications
Vmware AppVolumes
 Non-persistent
 Constant network
connection
 VHD-In-guest mode
AppStack
AppStack
Writeable Volume
AppVolumes
Terminal Servers/VDI
Hypervisor AppVolumes Manager
Assign resources
Provisioning Machine
AppVolumes
Agent
AppVolumes Agent
AppVolumes Agent
Advantages
• HTML5 based management
• Instant-app delivery*
• Physical and virtual
delivery
• Simple to setup
• Writeable layers
Disadvantages
• Only ESX hypervisor
support
• Wierd requirements for
physical devices
Demo-time!
Summary (When to use what)
Application virtualization:
Pros:
• Isolated applications
• Flexible delivery methods
• Application Compability
fixes
• Multiple runtime
applications
Application layering:
Pros:
• Simple capturing process
• Can include profile
management
• Makes application lifecycle
simpler
Moving forward
• Project Centennial
• App-Containers
Q?
Thank you!

More Related Content

What's hot

Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
valerian_ceaus
 
Securing and Automating Kubernetes with Kyverno
Securing and Automating Kubernetes with KyvernoSecuring and Automating Kubernetes with Kyverno
Securing and Automating Kubernetes with Kyverno
Saim Safder
 
Frequently Asked Questions on AUTOSAR Services
Frequently Asked Questions on AUTOSAR ServicesFrequently Asked Questions on AUTOSAR Services
Frequently Asked Questions on AUTOSAR Services
Embitel Technologies (I) PVT LTD
 
Live VM Migration
Live VM MigrationLive VM Migration
Live VM Migration
Shivam Singh
 
Xen on ARM for embedded and IoT: from secure containers to dom0less systems
Xen on ARM for embedded and IoT: from secure containers to dom0less systemsXen on ARM for embedded and IoT: from secure containers to dom0less systems
Xen on ARM for embedded and IoT: from secure containers to dom0less systems
Stefano Stabellini
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Mark Ryan Castellani
 
Kubernetes extensibility: CRDs & Operators
Kubernetes extensibility: CRDs & OperatorsKubernetes extensibility: CRDs & Operators
Kubernetes extensibility: CRDs & Operators
SIGHUP
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENDaron Walker
 
DevOps with Ansible
DevOps with AnsibleDevOps with Ansible
DevOps with Ansible
Swapnil Jain
 
8 statement level
8 statement level8 statement level
8 statement level
Munawar Ahmed
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliationGurjan Oberoi
 
Run Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using YoctoRun Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using Yocto
Marco Cavallini
 
Developing Automotive Linux
Developing Automotive LinuxDeveloping Automotive Linux
Developing Automotive Linux
Alison Chaiken
 
Hands on OpenCL
Hands on OpenCLHands on OpenCL
Hands on OpenCL
Vladimir Starostenkov
 
GitOps with Amazon EKS Anywhere by Dan Budris
GitOps with Amazon EKS Anywhere by Dan BudrisGitOps with Amazon EKS Anywhere by Dan Budris
GitOps with Amazon EKS Anywhere by Dan Budris
Weaveworks
 
Container Monitoring with Sysdig
Container Monitoring with SysdigContainer Monitoring with Sysdig
Container Monitoring with Sysdig
Sreenivas Makam
 
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and Entitlements
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and EntitlementsRuxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and Entitlements
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and Entitlements
Stefan Esser
 
ISO 26262 Unit Testing | Functional Safety in Automotive
ISO 26262 Unit Testing | Functional Safety in Automotive ISO 26262 Unit Testing | Functional Safety in Automotive
ISO 26262 Unit Testing | Functional Safety in Automotive
Embitel Technologies (I) PVT LTD
 

What's hot (20)

Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 
Securing and Automating Kubernetes with Kyverno
Securing and Automating Kubernetes with KyvernoSecuring and Automating Kubernetes with Kyverno
Securing and Automating Kubernetes with Kyverno
 
Frequently Asked Questions on AUTOSAR Services
Frequently Asked Questions on AUTOSAR ServicesFrequently Asked Questions on AUTOSAR Services
Frequently Asked Questions on AUTOSAR Services
 
Live VM Migration
Live VM MigrationLive VM Migration
Live VM Migration
 
Xen on ARM for embedded and IoT: from secure containers to dom0less systems
Xen on ARM for embedded and IoT: from secure containers to dom0less systemsXen on ARM for embedded and IoT: from secure containers to dom0less systems
Xen on ARM for embedded and IoT: from secure containers to dom0less systems
 
127 iio a-new-subsystem
127 iio a-new-subsystem127 iio a-new-subsystem
127 iio a-new-subsystem
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
 
Kubernetes extensibility: CRDs & Operators
Kubernetes extensibility: CRDs & OperatorsKubernetes extensibility: CRDs & Operators
Kubernetes extensibility: CRDs & Operators
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
 
DevOps with Ansible
DevOps with AnsibleDevOps with Ansible
DevOps with Ansible
 
8 statement level
8 statement level8 statement level
8 statement level
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
 
Run Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using YoctoRun Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using Yocto
 
Developing Automotive Linux
Developing Automotive LinuxDeveloping Automotive Linux
Developing Automotive Linux
 
Mohamed -CV 2016
Mohamed -CV 2016 Mohamed -CV 2016
Mohamed -CV 2016
 
Hands on OpenCL
Hands on OpenCLHands on OpenCL
Hands on OpenCL
 
GitOps with Amazon EKS Anywhere by Dan Budris
GitOps with Amazon EKS Anywhere by Dan BudrisGitOps with Amazon EKS Anywhere by Dan Budris
GitOps with Amazon EKS Anywhere by Dan Budris
 
Container Monitoring with Sysdig
Container Monitoring with SysdigContainer Monitoring with Sysdig
Container Monitoring with Sysdig
 
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and Entitlements
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and EntitlementsRuxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and Entitlements
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and Entitlements
 
ISO 26262 Unit Testing | Functional Safety in Automotive
ISO 26262 Unit Testing | Functional Safety in Automotive ISO 26262 Unit Testing | Functional Safety in Automotive
ISO 26262 Unit Testing | Functional Safety in Automotive
 

Viewers also liked

No BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering SolutionsNo BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering Solutions
Unidesk Corporation
 
Svetislav_Janac_Architect_CV2015
Svetislav_Janac_Architect_CV2015Svetislav_Janac_Architect_CV2015
Svetislav_Janac_Architect_CV2015Svetislav Janac
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application VirtualizationAmit Gatenyo
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
Vmwareir
 
Application Virtualization Smackdown
Application Virtualization SmackdownApplication Virtualization Smackdown
Application Virtualization Smackdown
C/D/H Technology Consultants
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 Announcements
Brendan Rose
 
Liquit
LiquitLiquit
Liquit
GWAVA
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
netlogix
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
solarisyougood
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5
netlogix
 
Application Virtualization, University of New Hampshire
Application Virtualization, University of New HampshireApplication Virtualization, University of New Hampshire
Application Virtualization, University of New Hampshire
Tony Austwick
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentation
solarisyourep
 
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
VMworld
 
Storage Efficiency Poster Pdfnewfor2011[1]
Storage Efficiency Poster Pdfnewfor2011[1]Storage Efficiency Poster Pdfnewfor2011[1]
Storage Efficiency Poster Pdfnewfor2011[1]Michael Hudak
 
MAV-Vis: A Notation for Model Uncertainty
MAV-Vis: A Notation for Model UncertaintyMAV-Vis: A Notation for Model Uncertainty
MAV-Vis: A Notation for Model UncertaintyMichalis Famelis
 
VMworld 2014: Virtual Volumes Technical Deep Dive
VMworld 2014: Virtual Volumes Technical Deep DiveVMworld 2014: Virtual Volumes Technical Deep Dive
VMworld 2014: Virtual Volumes Technical Deep Dive
VMworld
 
VMworld 2013: EUC Application Strategy Best Practices
VMworld 2013: EUC Application Strategy Best Practices VMworld 2013: EUC Application Strategy Best Practices
VMworld 2013: EUC Application Strategy Best Practices
VMworld
 
Introducción a Docker - LibreCon 2016
Introducción a Docker - LibreCon 2016Introducción a Docker - LibreCon 2016
Introducción a Docker - LibreCon 2016
LibreCon
 
Applications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the CloudApplications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the Cloud
Arraya Solutions
 

Viewers also liked (20)

No BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering SolutionsNo BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering Solutions
 
Svetislav_Janac_Architect_CV2015
Svetislav_Janac_Architect_CV2015Svetislav_Janac_Architect_CV2015
Svetislav_Janac_Architect_CV2015
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Christopher Moll Resume
Christopher Moll ResumeChristopher Moll Resume
Christopher Moll Resume
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
 
Application Virtualization Smackdown
Application Virtualization SmackdownApplication Virtualization Smackdown
Application Virtualization Smackdown
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 Announcements
 
Liquit
LiquitLiquit
Liquit
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5
 
Application Virtualization, University of New Hampshire
Application Virtualization, University of New HampshireApplication Virtualization, University of New Hampshire
Application Virtualization, University of New Hampshire
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentation
 
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
 
Storage Efficiency Poster Pdfnewfor2011[1]
Storage Efficiency Poster Pdfnewfor2011[1]Storage Efficiency Poster Pdfnewfor2011[1]
Storage Efficiency Poster Pdfnewfor2011[1]
 
MAV-Vis: A Notation for Model Uncertainty
MAV-Vis: A Notation for Model UncertaintyMAV-Vis: A Notation for Model Uncertainty
MAV-Vis: A Notation for Model Uncertainty
 
VMworld 2014: Virtual Volumes Technical Deep Dive
VMworld 2014: Virtual Volumes Technical Deep DiveVMworld 2014: Virtual Volumes Technical Deep Dive
VMworld 2014: Virtual Volumes Technical Deep Dive
 
VMworld 2013: EUC Application Strategy Best Practices
VMworld 2013: EUC Application Strategy Best Practices VMworld 2013: EUC Application Strategy Best Practices
VMworld 2013: EUC Application Strategy Best Practices
 
Introducción a Docker - LibreCon 2016
Introducción a Docker - LibreCon 2016Introducción a Docker - LibreCon 2016
Introducción a Docker - LibreCon 2016
 
Applications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the CloudApplications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the Cloud
 

Similar to Application layering vs Application Isolation

Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
Denis Gundarev
 
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep DiveVMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk Corporation
 
Deploying PHP apps on the cloud
Deploying PHP apps on the cloudDeploying PHP apps on the cloud
Deploying PHP apps on the cloud
Zend by Rogue Wave Software
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
solarisyourep
 
VMware Dell řešení pro VDI
VMware Dell řešení pro VDIVMware Dell řešení pro VDI
VMware Dell řešení pro VDI
MarketingArrowECS_CZ
 
Application Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs SecurityApplication Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs Security
Lumension
 
Lick my Lollipop
Lick my LollipopLick my Lollipop
Lick my Lollipop
Tamara Momčilović
 
Android System Architecture And  Pen-testing of Android applications
Android System Architecture  And  Pen-testing of Android applications Android System Architecture  And  Pen-testing of Android applications
Android System Architecture And  Pen-testing of Android applications
yavuzwb
 
Androidoverview 100405150711-phpapp01
Androidoverview 100405150711-phpapp01Androidoverview 100405150711-phpapp01
Androidoverview 100405150711-phpapp01Santosh Sh
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
Microsoft TechNet - Belgium and Luxembourg
 
SUM304 - Application streaming uncovered.ppt
SUM304 - Application streaming uncovered.pptSUM304 - Application streaming uncovered.ppt
SUM304 - Application streaming uncovered.ppt
dismantlinghue7028
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseNetSPI
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
Sam Bowne
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Nederland
 
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris NormanDeveloping Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris NormanRyo Jin
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
Aravindharamanan S
 
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld
 

Similar to Application layering vs Application Isolation (20)

Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep DiveVMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
 
Deploying PHP apps on the cloud
Deploying PHP apps on the cloudDeploying PHP apps on the cloud
Deploying PHP apps on the cloud
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
 
VMware Dell řešení pro VDI
VMware Dell řešení pro VDIVMware Dell řešení pro VDI
VMware Dell řešení pro VDI
 
Application Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs SecurityApplication Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs Security
 
Lick my Lollipop
Lick my LollipopLick my Lollipop
Lick my Lollipop
 
Android System Architecture And  Pen-testing of Android applications
Android System Architecture  And  Pen-testing of Android applications Android System Architecture  And  Pen-testing of Android applications
Android System Architecture And  Pen-testing of Android applications
 
Google android os
Google android osGoogle android os
Google android os
 
Androidoverview 100405150711-phpapp01
Androidoverview 100405150711-phpapp01Androidoverview 100405150711-phpapp01
Androidoverview 100405150711-phpapp01
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
SUM304 - Application streaming uncovered.ppt
SUM304 - Application streaming uncovered.pptSUM304 - Application streaming uncovered.ppt
SUM304 - Application streaming uncovered.ppt
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris NormanDeveloping Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
 
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
 

More from Marius Sandbu

Securing Virtual Machines in Microsoft Azure
Securing Virtual Machines in Microsoft AzureSecuring Virtual Machines in Microsoft Azure
Securing Virtual Machines in Microsoft Azure
Marius Sandbu
 
Hackcon - Ransomware
Hackcon - RansomwareHackcon - Ransomware
Hackcon - Ransomware
Marius Sandbu
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
Marius Sandbu
 
Ransomware - Hvordan beskytte seg mot slike angrep?
Ransomware - Hvordan beskytte seg mot slike angrep? Ransomware - Hvordan beskytte seg mot slike angrep?
Ransomware - Hvordan beskytte seg mot slike angrep?
Marius Sandbu
 
Ransomware erfaringer 2021
Ransomware erfaringer 2021Ransomware erfaringer 2021
Ransomware erfaringer 2021
Marius Sandbu
 
Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and Beyond
Marius Sandbu
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
Marius Sandbu
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
Marius Sandbu
 
Windows Virtual Desktop
Windows Virtual DesktopWindows Virtual Desktop
Windows Virtual Desktop
Marius Sandbu
 
Azure sentinel
Azure sentinelAzure sentinel
Azure sentinel
Marius Sandbu
 
Citrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudCitrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public Cloud
Marius Sandbu
 
Citrix with Microsoft EMS
Citrix with Microsoft EMSCitrix with Microsoft EMS
Citrix with Microsoft EMS
Marius Sandbu
 
Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure
Marius Sandbu
 
Netscaler and system center
Netscaler and system centerNetscaler and system center
Netscaler and system center
Marius Sandbu
 

More from Marius Sandbu (14)

Securing Virtual Machines in Microsoft Azure
Securing Virtual Machines in Microsoft AzureSecuring Virtual Machines in Microsoft Azure
Securing Virtual Machines in Microsoft Azure
 
Hackcon - Ransomware
Hackcon - RansomwareHackcon - Ransomware
Hackcon - Ransomware
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
 
Ransomware - Hvordan beskytte seg mot slike angrep?
Ransomware - Hvordan beskytte seg mot slike angrep? Ransomware - Hvordan beskytte seg mot slike angrep?
Ransomware - Hvordan beskytte seg mot slike angrep?
 
Ransomware erfaringer 2021
Ransomware erfaringer 2021Ransomware erfaringer 2021
Ransomware erfaringer 2021
 
Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and Beyond
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 
Windows Virtual Desktop
Windows Virtual DesktopWindows Virtual Desktop
Windows Virtual Desktop
 
Azure sentinel
Azure sentinelAzure sentinel
Azure sentinel
 
Citrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudCitrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public Cloud
 
Citrix with Microsoft EMS
Citrix with Microsoft EMSCitrix with Microsoft EMS
Citrix with Microsoft EMS
 
Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure
 
Netscaler and system center
Netscaler and system centerNetscaler and system center
Netscaler and system center
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Application layering vs Application Isolation

  • 2. Bio
  • 3. Agenda: • Where we are today • Application Virtualization • ThinApp, App-V • Application Layering • Unidesk, AppVolumes, AppDisks • Demo • Summary
  • 4. Where we are today Application 1 Application 2  Group Policy  System Center  Script  Deployment tools  Base image Shared OS Resources MSVCRT.DLLRegistry File explorer Server  VM Template  VM Service  PXE Boot  MDT/System Center Some issues: • Patch management • Application Compability • Application Security • Software dependency • Application testing • Software rot & dll-hell • The big bad image • Application lifecycle management Fixes? • Status Quo • App virtualization • App layering
  • 5. Application Virtualization Isolated Application 1 Isolated Application 2 Microsoft App-V  Vmware ThinApp MSVCRT.DLL Registry File explorer Server  VM Template  VM Service  PXE Boot  MDT/System Center MSVCRT.DLL Registry File explorer Shared Resources Some common properties: • Virtual file tree and registry • Includes its own software dependency • Can if allowed in the package read/write to the underlaying OS • Each application is isolated • Can be grouped together • Streaming/Cached
  • 6. Application Virtualization Advantages • No install required • Fix application conflicts • No registry and system bloat • Multiple runtime enviroments • Easier update management • Versioning • Improved Security • Easier to do app customization Disadvantages • Bandwidth Requirements • I/O Requirements • More Infrastructure • Cost / Training • Sequencing / Capturing Apps that cannot be virtualized • Device drivers • Boot services • Applications part of the OS • COM+ • Antivirus/firewalls • VPN clients
  • 7. Microsoft App-V 5 App-V Sequencing machine  App-V Management  Publishing  Reporting Server App-V Database Share Non-persistent SCS Cache Persistent ( RSDH) Testing Pros • Infrastructure or PowerShell • Large support and integration options • App-V license included in RDS CAL! • Large Community • Simple with Office • Many recipies Cons • No support for Internet Explorer sequencing • Requires a client installed on each host • Consumes more disk I/O
  • 8. Vmware ThinApp ThinApp Capturing File Repository AppSync Script/ESD Testing Pros • Does not require any agent • Deployed as reguler exe or MSI • Integrates into existing deployment using MSI • Can virtualize Internet Explorer • Autoupdates within configuration Cons • No central management unless you have Horizon • No PowerShell support • No built-in application usage tracking
  • 9. Application Layering Some common properties: • Multiple virtual disks merged • May contain read/write layers • May seperated into application/personal/os layers • Applications behave like normal • Mulitple applications can be placed within the same layer • Write filters and seperating I/O traffic Windows (OS) Application 2 Application 1 (R) Application 3 Personalization (R/W) Layers Machine NTFS/File System Drivers Mini filter driver
  • 10. Application Layering Advantages • Simpler application «capture» • Delivery application updates • One image! • Works with drivers/services • Can manage personal data* Disadvantages • Some specific hypervisor requirement • No appliation isolation • Yet another solution? Things Apps that cannot be layered • Depending on the vendor..
  • 11. Unidesk Windows (OS) Application 2 Application 1 (R) Application 3 Personalization (R/W) Layers Terminal Servers/VDI Hypervisor Unidesk Management Applicance Unidesk Cachepoint Windows (OS) Application 2 Application 1 (R) Application 3 Personalization (R/W) Layers Copy layers to the host Collection Installation Machine Advantages • Can layer pretty much everything • Integrated within the Hypervisor • Support for Hyper-V, Azure and ESX • Support for RSDH, XenApp and Horizon Disadvantages • Silverlight based console  • No instant app delivery method • Only on virtual machines
  • 12. Citrix AppDisks* Application 2 Application 1 Application 3 AppDisks Terminal Servers/VDI Hypervisor Desktop Delivery Controller Orchestrate updates Machine Catalog - MCS OS MCS Master Image Personalization layer PVD Preparation Machine Advantages • Integrated into Citrix Studio • Simple management • Can be setup using Citrix MCS or PVS • Can be integrated with either XenServer or ESX Disadvantages • Requires a Citrix enviroment • Virtual Machines only • No Instant-app delivery • Only layering for the applications
  • 13. Vmware AppVolumes  Non-persistent  Constant network connection  VHD-In-guest mode AppStack AppStack Writeable Volume AppVolumes Terminal Servers/VDI Hypervisor AppVolumes Manager Assign resources Provisioning Machine AppVolumes Agent AppVolumes Agent AppVolumes Agent Advantages • HTML5 based management • Instant-app delivery* • Physical and virtual delivery • Simple to setup • Writeable layers Disadvantages • Only ESX hypervisor support • Wierd requirements for physical devices
  • 15. Summary (When to use what) Application virtualization: Pros: • Isolated applications • Flexible delivery methods • Application Compability fixes • Multiple runtime applications Application layering: Pros: • Simple capturing process • Can include profile management • Makes application lifecycle simpler Moving forward • Project Centennial • App-Containers
  • 16. Q?

Editor's Notes

  1. Showing and regular machine with adobe reader installed and try to install a new version….. Showing a simple application capturing on app-v and thinapp Showing deployment of app-v using regular setup and SCS on App-V using multiple adobe reader versions Showing I/O and network traffic Showing rollout of ThinApp and auto updates using adobe reader Showing Internet explorer virtualized using ThinApp Showing setup of application layering on appvolumes and and capturing process. Show management and setup an application layering process (App volumes) Show on how to attach and application layering at boot (Appvolumes) Show how to attach an writeable volume to an machine (Appvolumes) Show on how to create an collection of RSDH hosts using different layers in Unidesk management Show how they merge on a virtual machine in Hyper-V manager Login to the virtual machine Add another applicaiton layer, reboot and notice the application
  2. Bruke Client performance analyzer for å verifisere at det er en bra connection mot miljøet. Lage en configurasjonsfil for å laste ned office og innstallere med shared computer support (bruk eksisterende configurasjonsfil for å innstallere Office-pakken, UTEN OneDrive) mens den driver å laste inn, bruk tiden til å legge inn Office2016 Group Policy ADMX templates. Når den er ferdig start den. Prøv deretter å innstallere 32-bits, vis at det ikke funker. Visst hvordan vi lager en app-v pakke i 32-bits, start den via App-V) Vis hvilken versjon av Office som ligger der. Start Office365 Pro Plus, vis at shared computer support ikke er aktivert, legg inn reg nøkkel for å fikse det. Vis at det ikke er noen produktnøkkel i imaget via cscript.exe "%programfiles%\Microsoft Office\Office15\ospp.vbs" /dstatus) Authentiser og vis at tokenet blir generert i Lokal. Start Skype for Buisness via RDP start video samtale via andre Pcen. Se på ytelsen som blir startet….Logg av. Start Skype for Buisness via Citrix ICA, logg på Skype for Buisness. Start Video samtale på nytt, vis ytelsen på CPU og minne i sesjonen samt via i Performance monitor at traffiken går lokalt..