Application Virtualization

Application Virtualization covers application layering and application delivery approaches like streaming applications, and local application virtualization. Infrastructure as a Service focuses upon isolating the operating system from its underlying hardware and allowing multiple instances of operating systems to share that underlying hardware. Application Virtualization focuses upon isolating application from their underlying operating systems. (Read More)

This make it unnecessary to install applications into operating systems, makes it easier to update new versions of applications, and breaks the dependencies between versions of applications and the specific versions of operating systems. Popular application virtualization offerings include Microsoft App-V, VMware ThinApp, and the XenApp Plugin for Hosted and Streaming applications.

Mobile Devices and Desktops = Secure, Virtualized Applications?

ApplicationVirtualizationWith the number of mobile devices in use now surpassing that of desktops worldwide, the application virtualization requirements of business mobile users continues to grow exponentially. Whether these users access their business apps from a smartphone, tablet, or—the latest buzzword—“phablet,” their common denominator is their demand for more and better business applications on the go.

Continue reading Mobile Devices and Desktops = Secure, Virtualized Applications?

The Circle of Virtualization: Yesterday, Today, and Tomorrow

DesktopVirtualizationWith half of the first quarter of 2015 already behind us, many IT organizations are in fast-forward mode, making progress on addressing annual projects and goals, including many that involve virtualization. With the plethora of new products and services available, how many of those virtualization projects are based on shifting gears to new vendors or technologies in order to address business and technical requirements? Continue reading The Circle of Virtualization: Yesterday, Today, and Tomorrow

MVP, CTP, vExpert, and More: The Alphabet Soup of Titles

DataCenterVirtualizationAmong technologists, it’s not unusual to see an acronym or two after a person’s name. In some cases, these acronyms refer to certifications, but sometimes, they reflect participation in one or more elite vendor programs. What are the various elite programs, and how does one become invited to participate?

Continue reading MVP, CTP, vExpert, and More: The Alphabet Soup of Titles

Citrix Cuts 900 Jobs: How Does That Impact Technical Customers?

citrix100x30Citrix shocked many this week with its announcement of 900 job cuts, 700 of which were full-time employees and 200 contractors. Although quota sales positions will be less impacted than other departments, the overall 10% reduction throughout the company will no doubt impact engineering, product management, support, and other technical groups upon which architects, administrators, and engineers rely to produce and support virtualization products.

Continue reading Citrix Cuts 900 Jobs: How Does That Impact Technical Customers?

Skinning the Apps

ApplicationVirtualizationOur recent Virtualization EUC podcast conversation with Itzik Spitzen, CTO of Reddo Mobility, explained how his company turns Microsoft programs into web apps. Gray dogs like myself will remember how, back in the days of “everything is turning into a web app,” we used XenApp as a temporary solution. Because of this, most of Citrix’s original customers are still using Citrix.

Continue reading Skinning the Apps

Managing Legacy Java Versions

ApplicationVirtualizationJava is currently the leading exploit vector for Windows machines, and Java vulnerabilities are packaged into many of the “exploit kits” available in the darker corners of the Internet (see Internet Explorer, Flash Player, and even the Windows operating system itself have done a good job of either improving the security of their products or improving their patching processes. Java, however, still lags noticeably behind in both user/media awareness and quality of code. According to some statistics, Java vulnerabilities account for up to 70% of successful exploits, making it a veritable nightmare from a security perspective.

Continue reading Managing Legacy Java Versions