VMware ThinApp is an agentless application virtualization solution that allows any Windows application to be run virtually from various devices without installing it locally or making changes to the underlying operating system. It uses a single executable or MSI file to encapsulate and isolate applications. ThinApp packages can be seamlessly deployed on any existing management framework and streamed from a file server to multiple users without additional infrastructure. It ensures security by executing applications in user-mode and sandboxing any registry or file system changes made by the application.
World renowned virtualization aficionados Eric Inch and Jason Cooper combine their collective 30 years of experience to provide a side-by-side comparison of the heavy hitters in application virtualization.
On one side: Microsoft App-V, part of the Desktop Optimization Pack and the Johnny-come-lately, streaming application packages to desktops and servers with ease.
On the other: VMware ThinApp, the 800-pound gorilla with a huge install base, incredible features, and a clear advantage over the up-and-comer.
Which of these sluggers will end up on top of the pile? View the Application Virtualization Smackdown slide deck to find out!
And for more information about this and other topics check our blog at www.cdhtalkstech.com.
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
Citrix CloudGateway 2.5 Technical Overview and TroubleshootingDavid McGeough
This is part of the Citrix Support Secrets Webinar Series.
CloudGateway is an enterprise mobility management solution that securely delivers mobile, web and Windows apps and data. This webinar will cover an overview of the features in CloudGateway 2.5, different options for deploying CloudGateway and troubleshooting. Join this webinar to learn about CloudGateway.
What you will learn:
- What is CloudGateway
- What’s new on CloudGateway 2.5
- Deployment scenarios
- Troubleshooting
This webinar took place on January 24th 2013, recording here
https://www1.gotomeeting.com/register/683430680
World renowned virtualization aficionados Eric Inch and Jason Cooper combine their collective 30 years of experience to provide a side-by-side comparison of the heavy hitters in application virtualization.
On one side: Microsoft App-V, part of the Desktop Optimization Pack and the Johnny-come-lately, streaming application packages to desktops and servers with ease.
On the other: VMware ThinApp, the 800-pound gorilla with a huge install base, incredible features, and a clear advantage over the up-and-comer.
Which of these sluggers will end up on top of the pile? View the Application Virtualization Smackdown slide deck to find out!
And for more information about this and other topics check our blog at www.cdhtalkstech.com.
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
Citrix CloudGateway 2.5 Technical Overview and TroubleshootingDavid McGeough
This is part of the Citrix Support Secrets Webinar Series.
CloudGateway is an enterprise mobility management solution that securely delivers mobile, web and Windows apps and data. This webinar will cover an overview of the features in CloudGateway 2.5, different options for deploying CloudGateway and troubleshooting. Join this webinar to learn about CloudGateway.
What you will learn:
- What is CloudGateway
- What’s new on CloudGateway 2.5
- Deployment scenarios
- Troubleshooting
This webinar took place on January 24th 2013, recording here
https://www1.gotomeeting.com/register/683430680
This is my 75 minutes "highlights" presentation on what's new in WS2012 R2. It's not all encompassing - intended just to get across the key points of the core OS. It followed a "Cloud OS" keynote and preceded a "System Center hybrid cloud" presentation.
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding_Humair_Ahmed_
XenServer, Hyper-V, and ESXi hypervisor comparison in regards to market share, architecture/installation, and APIs/coding. Technical details, demos, and code provided. Visit my blog at http://humairahmed.com/blog/.
Virtualization using VMWare WorkstationHitesh Gupta
This presentation contains an introductory view of techniques in virtualization and its implementation using VMWARE Workstation. So, if you are a complete beginner in this field, you may find this useful. If you need an accompanying 70 page document file, please feel free to ask.
*******************
I have used official VMWARE theme with permission and copyright information attached along with.
**********************
As the invited speaker during Microsoft Technical Partner Community Event @Microsoft KLCC Auditorium , i have presented 3 Key Area: Scalability,Mobility and Delivery High Availabili
This is my 75 minutes "highlights" presentation on what's new in WS2012 R2. It's not all encompassing - intended just to get across the key points of the core OS. It followed a "Cloud OS" keynote and preceded a "System Center hybrid cloud" presentation.
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding_Humair_Ahmed_
XenServer, Hyper-V, and ESXi hypervisor comparison in regards to market share, architecture/installation, and APIs/coding. Technical details, demos, and code provided. Visit my blog at http://humairahmed.com/blog/.
Virtualization using VMWare WorkstationHitesh Gupta
This presentation contains an introductory view of techniques in virtualization and its implementation using VMWARE Workstation. So, if you are a complete beginner in this field, you may find this useful. If you need an accompanying 70 page document file, please feel free to ask.
*******************
I have used official VMWARE theme with permission and copyright information attached along with.
**********************
As the invited speaker during Microsoft Technical Partner Community Event @Microsoft KLCC Auditorium , i have presented 3 Key Area: Scalability,Mobility and Delivery High Availabili
Application Virtualization, University of New HampshireTony Austwick
Presentation to EDUCAUSE, NERCOMP by David Blezzard from University of New Hampshire.
More here http://www.educause.edu/nercomp-annual-conference/2016/2016/streamlining-application-deployment-and-management-through-virtualization
We will report how using the Application Jukebox application virtualization solution at the University of New Hampshire has saved time and simplified management of public and department-specific computer labs and our VDI environment. Traditionally, we used a combination of imaging and then various scripted deployments to install applications. With application virtualization, we have been able to move over a hundred Windows applications into virtual packages that can be "installed" by users on demand. We will discuss the general problem of managing large numbers of complex applications across a range of computer environments while also trying to be flexible and responsive to users.
Outcomes: Understand how application virtualization can overcome issues with deploying software * Appreciate the capabilities of Application Jukebox to be able to assess its utility to your campus * Obtain a model for evaluating a tool's potential savings
VMworld 2013: ThinApp 101 and What's New in ThinApp Next VersionVMworld
VMworld 2013
Peter Björk, VMware
Tina de Benedictis, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...VMworld
VMworld 2013
Anthony Davis, VMware
Bruce Perram, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld
VMworld 2013
Jared Cook, VMware
Ashish Jain, VMware
Andrew Johnson, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Deploying PHP applications on the cloud can be a tricky task, especially when it comes to automation and clustered environments that scale up and down. If you’re looking for ways to improve or automate your code deployment methods and use continuous integration and delivery, this session is for you.
Linux VDI with OpenStack – How to Deliver Linux Virtual Desktops on DemandLeostream
It’s no secret that Linux has a loyal fan-base across the development community and industries such as government, engineering, and oil & gas. But, when it comes to VDI, the operating system often gets the short end of the stick.
How can you lower IT costs when applications run on a Linux operating system? How can you handle a mixture of Windows and Linux in a hosted environment? And, how do you ensure a seamless end-user experience, while maximizing resource usage and minimizing downtime?
The truth is, Linux VDI doesn’t have to be hard. You can create a virtual Linux environment that provides an efficient way to access hosted resources on centrally managed servers. By combining the Leostream Connection Broker with a high-performance protocol, managing a hosted Linux environment can be as simple, seamless, and powerful as a hosted Windows environment.
DeskStream’s platform offers flexible deployment methods, enables rapid deployment even on the existing infrastructure, with currently available tools and expertise to maintain the rollout.
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3Digicomp Academy AG
In Kurzpräsentationen und Live-Demos wurden in der Präsentation folgende Themen vorgestellt:
Neuerungen in VMware Horizon View 5.3
- HTML-5-Zugriff
- Grafik-Beschleunigung (vSGA & vDGA)
- Vorschau vSAN-Technologie
Neuerungen in VMware Horizon Mirage 4.3
- Zentralisiertes Image-Management für physische und virtuelle Desktops
- Weitere Use Cases: OS/HW-Migrationen, Disaster Recovery, Backup, Restore
Neuerungen in VMware Horizon Workspace
- Zugriff auf Anwendungen und Daten von jedem beliebigen Gerät
- Zentrale Bereitstellung, Verwaltung und Sicherung dieser Ressourcen durch die IT
Enterprise-Mobility-Management für Android und iOS
Die Aufzeichnung des Referats finden Sie im YouTube-Channel von Digicomp: http://www.youtube.com/user/DigicompAcademy
Excalibur - Was ist das? Vor allem was kann das? Was passiert mit XenApp und was passiert mit XenDesktop? Informieren Sie sich schon heute über Excalibur - Die neue Citrix-Lösung.
In this presentation we present the new architecture and features of the security framework 2.0 shipped with Flow 3.0. Additionally the usage of this new architecture, to implement access controls for the whole editing process within the Neos CMS ist shown.
Astaro Security Wall - Sechs Schritte zur sicheren ITnetlogix
Lernen Sie die sechs Schritte zur sicheren IT mit Astaro kennen: Sicherstellen des reibungslosen Betriebs der Prozesse, zentrale Verwaltung der IT, Sichern des Zugriffs auf Dienste und Daten, Analyse, Filterung und Verschlüsselung des Datenverkehrs, Sensibilisierung der Mitarbeiter für das Thema IT-Security, Absicherung von Endpoints gegen Verlust und Infektion.
SMS PASSCODE ermöglicht Zwei-Faktor-Authentifizierung durch den Versand einer SMS an ein Handy. Damit ersetzt die Lösung Tokens und Zertifikate durch ein einziges Gerät.
EMA - Enterprise Managed Archive: globales Informationsmanagement clever gel...netlogix
EMA Enterprise Managed Archive deckt durch die Komponenten Print to Archive, Scan to Archive, Voice to Archive, File to Archive, die bekannte E-Mail-Archivierungs-Lösung Mail to Archive (EMA E-Mail Archive Appliance) sowie ediscovery das gesamte Spektrum der digitalen Sicherung und Archivierung geschäftlich relevanter Inhalte für lokale und globale Umgebungen ab.
Traditionelle Desktops sind komplex, unflexibel und schwer abzusichern. Mit Citrix XenDesktop transformieren Sie Windows-Desktops in einenOn-Demand Service - für jeden Nutzer und jedes Endgerät.
McAfee MOVE (Management for Optimized Virtual Environments) bietet Sicherheitsmanagement für virtuelle Umgebungen. Außerdem werden Lösungen für Endpoint Security vorgestellt.
Next Generation Unified Communications mit Microsoft Lync 2010netlogix
Microsoft Lync Server ist die nächste Generation von Microsoft Office Communicator 2007 R2, Microsoft Office Live Meeting und Microsoft Office Communications Server 2007 R2 für unternehmens- und standortübergreifende Echtzeitzusammenarbeit von überall aus.
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Servicenetlogix
Mit steigender IT-Abhängigkeit fast aller Prozesse werden Ausfallzeiten schnell zum Kostenfaktor. Mit netlogix Care bieten wir Ihnen eine Lösung zur Überwachung Ihrer Systeme - cloudbasiert, d.h. ohne eigene Hardware und ohne aufwändige Einrichtung.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. The VMware ThinApp Solution
Agentless architecture
• Single file – EXE, MSI
• No installation or changes to registry
• Zero management required on end point device
Seamlessly fits into any environment
• No streaming server hardware or software needed
• Plugs into any existing management framework
Run Virtually Any Application from Any Device
• Desktop, USB, flash, terminal services, Citrix
• Any windows application – simple to complex
• Supporting components can be run side by side (Java, .Net)
Ensuring security without compromising user flexibility
• User-Mode execution
• Virtual Registry/File System protects underlying host OS
• No pre-installed agent required on underlying OS
3. Create Conflict Free Desktops
Problem:
Tightly coupled relationships between OS,
Applications and Data
Symptoms:
• Application Conflicts
• Complex Compatibility Test Matrices
• Diminished Time to Deployment
• Loss of User Productivity
• Increased helpdesk support calls
Solution: VMware ThinApp 2009 Reader’s Choice Award
• Agentless application virtualization 2010 Best product in category
decouples applications and data www.virtualizationreview.com
from the OS
4. How ThinApp Works
VMware ThinApp Links the Application, Virtual Operating System
(VOS), File System and Registry into a Single EXE MSI File
• Application Encapsulation
Windows & Isolation
Operating System • Intercepts file and system calls
ThinApp Secure • Process Loading- start exe from
Compressed Container (EXE) VOS, Launch from host OS
Application
(Virtual/Physical).
Registry Access Virtual
Registry
Physical
Registry • DLL Loading. Loads
EXE/DLL/OCX dependencies.
Virtual Physical
File Access File System File System
• Thread & Process Management.
Virtual OS Sandbox
VOS tracks all processes and
threads inside virtual registry
(Sandbox of Runtime
Modifications).
6. ThinApp 4.5 what’s new
Full Windows 7 support Performance Accelerator
Virtualize legacy apps on Reduced page file usage and
older Windows platform for increased memory sharing for
deployment to Windows 7 faster delivery at reduced
bandwidth consumption
Relink
Registry Transaction Protection
Upgrade existing ThinApp
packages without the need of Ensure registry file integrity and
application project files eliminate potential data corruption
due to crash or system failure
ThinApp SDK
Published APIs to allow for
integration of ThinApp with
Enhanced Supportability third party software
ThinApp Community Portal
Customers have option to
Users can upload
share packaging results with
application instructions and
VMware for better support….
share with the community
7. Windows 7 and Server 2008 R2 Support
• Full support for the following Windows operating systems at the same level
as Windows XP and Windows Vista
Windows 7 (32-bit and 64-bit)
Windows Server 2008 R2
• New applications captured on older platforms (XP or Vista) can still run on
Windows 7/Server 2008
• Windows 7/Server 2008 can also be used to capture new applications
Best practice: Capture platform <= Deployment platform
8. Seamless Package Upgrades with Relink Tool
• Upgrades ThinApp runtime within existing
packages.
Makes older ThinApp packages Win 7
compatible.
• Does NOT require original project rebuild.
• Preserves original ThinApp packages as
.BAK files.
Ensure disk space is available!
• Supports wildcards and recursion.
• Easy command line & scripting potential.
Syntax:
relink [-Recursive] <path_to_package> *.exe *.dat *.msi
Examples: relink -recursive c:Thinapps*.exe
relink AdobeReader.exe
9. ThinApp 4.5 Performance Accelerator
• Significant performance improvements in VDI environments w/shared storage.
Shorter application startup time
Lower network bandwidth consumption
Lower disk IOPs
Reduced memory consumption and page file usage
• Implemented with new PACKAGE.INI parameter
OptimizeFor=Memory
Streaming Improvements from ThinApp 4.0.4 to 4.5
Launch Time (sec) Mem Used (MB) Network Payload (KB)
Excel -46.4 % -57.8 % -42.0 %
Word -23.5 % -88.7 % -38.9 %
PPT -34.5 % -35.6 % -36.6 %
Outlook -48.3 % -57.7 % -38.9 %
Adobe -20.5 % -0.7 % -44.1 %
10. Setup Capture Changes
• Improvements made to Setup Capture wizard for enhanced customer experience.
• Context-sensitive Help, Help buttons, and External Links added to many screens.
12. Technical Architecture – User Mode Architecture
• User mode architecture provides transparency and best in class compatibility.
ThinApp packaged apps do not require kernel mode for CPU-level privileges.
- No more BSODs!!
- Host OS and other apps are protected from potential corruptions by app modifications.
ThinApp packaged apps do not require Admin mode for OS-level privileges.
- No more Local Admins!
- Users can run apps on locked-down PCs or Kiosks as “guest” user.
Ring 3 Applications
Ring 2 Device Drivers
Least Privileged
Ring 1 Device Drivers
Ring 0 Kernel
Most Privileged
13. Technical Architecture – Sandbox & Isolation
• Sandboxing & Isolation Modes provide security and persistence.
ThinApp redirects all runtime changes to private, per-user/per-app sandbox location.
Sandbox location is configurable:
- Network share (i.e. Home Drives).
- Removable USB volume or VMware View User Data Disk.
- User-specific directory (i.e. %appdata%thinstall).
- Honors system variables (i.e. %UserName%, %ComputerName%, etc.)
Reset apps to default behavior by deleting the sandbox.
15. ThinApp Deployment Scenarios
Stream From Share Locally Deploy Flash Device
Efficiently Stream Deploy ThinApp Enable Workforce
Applications to Packages through Mobility And Full
Multiple Users existing Application
From a Single distribution to Portability Without
Network Share managed desktops Compromising
Security
16. ThinApp Streaming from Network Share
Cost Efficient Application File Server “Network Share”
Density on the LAN Enterprise software Licenses
• Deliver applications to
multiple users from
a single network share
• Stream into memory without
local disk footprint
• Read-only Network Share is
only support burden
• Utilize DFS for replication
and branch office solution
• Excellent mechanism for
integration with View
desktops
17. Locally Deploy with Existing Management Framework
Deliver using existing process and
Locally Deploy workflow to variety of End Points.
• Leverage existing workflow
to distribute as MSI or Exe Package / Publish Distribute
packages
• Application performance
based on local resources
• Simplicity for harvesting
inventory and usage
3rd Party Config
Management
Various Endpoints
18. ThinApp from USB
Enabling Mobility without
Compromising on Security USB Applications
ThinApp (EXE or MSI)
• Run applications from Flash
devices on any end point ThinApp VOS
• User-mode only execution Applications
allows for deployment on
locked-down PCs
• End users can continue with
their activity with their favorite
applications
• No Install Required!
Kiosk Locked Down Laptop Home PC
Desktop
19. Simplify Desktop Delivery with View
Simplify Software Delivery
(no agents/infrastructure)
• Freedom from application
conflicts.
• Integration without dedicated
server infrastructure.
Streamline Patch Updates
• Modify 1 app for an entire
environment.
• In place upgrades.
Reduce Storage
• Reuse templates.
• Reduce image size and
complexity.
• Apps delivered from network.
21. Application Link – Connect ThinApps
Primary Application Dependency Primary Application
Seamless Interoperability Enhance License Management
• ThinApp packages can talk • Reduces package size to
together and with OS ease deployment and delivery
• Enables interoperability • Enhances software license
between virtual applications management tracking via
and underlying OS current inventory tools
22. Application Sync : Update ThinApp Packages
Package / Publish Deliver Manage Mobility with Ease
• Manage applications in the
HTTP/HTTPS/FILE Server
extended enterprise: Partners,
App Subsidiaries
(Version C)
• Ship only what they need,
when they need it
App
(Version B to C) Enable Workforce Mobility
App • Flexible delivery to a variety of
(Version A to C) devices (USB, Thin Client, PC)
• Conflict free application
updates for unmanaged PCs
SMB/HTTP/HTTPS Byte Level Updates (WAN)
over WAN/LAN via Active Directory
23. Introduction to Application Packaging
Steps for packaging an application with ThinApp:
• The Setup Capture utility creates a baseline snapshot before the
application is installed (pre-scan)
• The application is traditionally installed
• The Build phase of Setup Capture creates the virtualized application
package (post-scan)
• Set package “entry points” and package options
• Finish by browsing and building the project
Pre-scan Install Set package Browse and
Post-scan
application options build package
25. Desktop Integration Questions
How do I register applications?
Deploy MSI Packages
Use ThinReg in a Script
Answer: Application
Registration
26. Application Virtualization “Grey Areas”
Every appvirt product has these four issues!
Competitors have additional issues!
•Drivers – Drivers cannot be virtualized as they are Windows OS Level controlled
components which must interface with a logical or physical device.
•COM Plus – COM Plus objects cannot be virtualized as they are Windows OS Level
controlled components (ThinApp can virtualize COM objects).
•Network DCOM – Network DCOM objects cannot be virtualized (DCOM – a.k.a.
Local DCOM – objects can be virtualized by ThinApp) as there are two sides to
Network DCOM objects – a local and a remote side.
•Windows Components – ThinApp does not support virtualizing some OS Level
Windows components such as DNS (client/server), DHCP (client/server),
WINS (client/server), IIS, etc.
27. Wrap Up
Agentless Architecture
Agentless Architecture
• No compatibility issues with multiple
versions
• No backend infrastructure requirements
• 100% User mode execution
Wide Platform Support
• Support for 16, 32 & 64bit Windows.
• Windows NT – Win 7, W2K – W2K8.
• Citrix XenApp & MS Terminal
Services.
Agentless Architecture
Works with What You Have Now!
• Various multiple .NET and Java
• HP • IBM
runtimes.
• BMC (Marimba) • CA
• Multiple versions of Internet Explorer
– run IE 6, IE 7, & IE8 on the same • SMS/SCCM • BigFix
machine (Not Easy!). • LanDesk • Many, Many More!
Confidential