SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
Application
Streaming is dead.
A smart way to
choose an alternative
Denis Gundarev
Entisys Solutions
Agenda
• What is Application Streaming (Virtualization)?
• Application Virtualization internals
• Overview of available solutions
What is Application Virtualization?
• Application is executed inside the sandbox isolated from
operating system
• Improves security (isolates insecurity)
• Eliminate application conflicts
Package Deliver Execute
Every time you disable UAC…
Steve Ballmer kills a kitten
Every time you disable UAC…
Satya Nadella kills a kitten
Please, think of the kittens
Every time you:
• Modifying ACLs on Program Files or
HKLM
• Making user a local admin
• Just give users SeBackup,
SeRestore, SeCreateGlobal and
SeLoadDriver privileges, but keep
them as standard users
Application Isolation Environments
• Was introduced in MetaFrame Presentation Server 4.0 (2005)
• Virtualization layer that redirects system resources
• Virtualizes:
– File system
– Registry
– Named objects (events, semaphores, etc)
• Transparent to the application
• Was a great compatibility aid for:
– Applications which are not multi user friendly
– Applications which have problems coexisting on the same server
– Applications that cannot have multiple instances running simultaneously
Launching initial process into AIE
File System Isolation
Isolation Environment
Launcher (aierun.exe)
Registry and
Object Isolation
Application
(eg winword.exe)
IMA
2. Launch application
suspended
4. Resume process
File System Object
Manager
Registry
5. Read rules
from driver
and start
isolating
6. Application
execution
continues
3. Tell driver
about AIE
being
launched.
Pass down
rules
File System redirection
Registry
redirection
Named Object
redirection
File System calls
1.Retrieve
AIE data
from IMA
Isolation Environment Roots
• Specifies directories and registry locations
• User Profile Root
– Changes made by the user reside here
– Suitable for Multi-user
incompatible applications
• Installation Root
– Per Isolation environment location
– Enables conflicting applications to
coexist
Isolation Environment Rules
•Three types of Rules:
• Ignore
• Redirect
• Isolate
Isolation Environment: IGNORE Rule
• Used to create “holes” in an isolation environment
• Virtual address is not modified by the virtualization
system
• Used to allow access outside of the isolation
environment
Isolation Environment: REDIRECT Rule
• Redirects an application request for a file or registry
key to a specified location
– If an application creates the file, c:tempdata.txt, regardless
of the user, then it might be sensible to redirect those files
to c:aietemp%USERNAME%
– This means, if UserA ran the application isolated, then
c:tempdata.txt is created in c:aietempUserAdata.txt
Isolation Environment: ISOLATE Rule
• Per User:
– Ensure that each user gets his own copy of the
requested resource
• Per Isolation Environment:
– A single copy of the required system resource is
created in the installation root location and shared by
all users
Application Streaming
• Codenamed Project Tarpon
• Introduced in Citrix Presentation Server 4.5 (2007)
• Had 6 major releases before being deprecated
• Still available with XenApp 6.5 and XenDesktop 5.6
• Completely removed in XenDesktop 7
2
Tarpon Client
Extension of CPS Foundation
remote
users
firewall
firewall
local
users
Access
Gateway Advanced
Access
Control
Web Servers Application
Servers
IMA Service
PN Agent
Persistent
Store
AIE
PN Agent
Access
Management
Console
Tarpon App
Subsystem
Tarpon Session
Subsystem
Tarpon Client
Tarpon Profiler
License
Server
Web
Interface
AIE
AIE
Tarpon Client
AIE
Presentation
Servers
DatabasesFile Servers
New Apps
License
Presentation Server
Data
Collector
2
Project Tarpon Infrastructure
Profiling Station
File Share / NAS
Project Tarpon
Server Farm
Web Interface
Clients
SMB
SMB
HTTP/
HTTPS
XML
SMB
License Server
27000
23 |
Application Virtualization Internals
How it works
• Two main components of Application Virtualization:
• Isolation/Redirection
• Delivery mechanism
• Optional features:
• File type associations and OS integration
• Rights Management and usage tracking
• Packaging
• Shareable sandboxes
File I/O Redirection options
• API Hooking
• at USER or Kernel Level
• Hooking CreateFile, OpenFile, DeleteFile, NtCreateFile, NtOpenFile, NtDeleteFile etc
• Hooking into System Service Descriptor Table (SSDT)
•
• File System Filter Driver or Mini-Filter
• Write file system driver to redirect virtualized file requests.
•
Registry Redirection Options
• API Hooking at USER Level
• Hooking advapi32.dll - RegCreateKeyEx, RegDeleteKeyEx etc
• Hooking Ntdll.dll – NtCreateKey, NtDeleteKey etc
• API Hooking at Kernel Level
• Hooking SSDT – NtCreateKey, NtDeleteKey etc
Players on App Virtualization Market
Players on App Virtualization Market
• Microsoft App-V
• VMware ThinApp
• CloudVolumes
• Symantec Workspace Streaming
• Spoon (Novell ZENworks)
• Numecent Jukebox
• FSLogix
• Sandboxie
• Microsoft Windows
Microsoft App-V
• Version 2.0 was released in 2002 by Softricity
• ~8 major and ~50 minor releases before App-V 5.0
• App-V 5.0 is completely rewritten and released in 2012
• Available as a part of MDOP under SA
• App-V 5.0 is only supported version for XenDesktop 7
App-V 5.0 Cons
• Requires SA
• Requires management servers
• Requires SQL
• User-level apps only
• Cannot virtualize drivers
• Cannot isolate applications that are a part of the OS
App-V Pros
• Tons of information on Internet
• Huge user community
• Integration with System Center
• Integration with XenDesktop
• Managed by PowerShell
VMware ThinApp
• Uses user-mode hooks
• Application packaging solution, just like PortableApps.com
• emulates the Windows COM and DCOM
• Supports Streaming Execution (SMB/CIFS) and Deployed Execution
(i.e. USB)
• Does not support installed Apps
• No centralized management
CloudVolumes
• AppStack – basically a VHD or VMDK attached to a VM
• Web-based management console that communicates with hypervisor
• Full support for server software
• Available Now: VMware ESX 5.0, 5.1, Coming soon… HyperV, Azure,
Amazon EC2
CloudVolumes
CloudVolumes
CloudVolumes pros
• Server software support
• No streaming or any other delivery mechanism
• Combination of file system minifilters and a service
• Text file-driven configuration
• Storage segregation on the hypervisor layer
• Per-machine or per-user assignments
• No packaging
CloudVolumes cons
• Works with virtual workloads only
• Came out of stealth mode in 2013
• Text file-driven configuration
• No integration with VDI brokers
Symantec/Altiris SVS
• Now called Symantec Workspace Virtualization
• Kernel-level hooks
• Umanaged computers support
• Application license management
• Best in class integration with OS
Spoon
• Formerly Xenocode
• Web portal for app access
• Desktop integration
• Works over HTTP/HTTPS
• License management
• Available as SaaS offering
• Server software support
• Auditing
• Support for installed applications
• Application snapshots
Numecent Jukebox
• HTTP-based streaming
• Encrypted cache
• Virtualized File System
• DRM and license control
• OPSWAT integration
• Kernel-level file system driver
• Web portal for user access
• Currently targeted for ISVs and MSP
• No publicly available demos or code
Numecent Jukebox
• Patents:
• Software streaming system and method
• Intelligent Network Streaming and Execution System for
Conventionally Coded Applications
• Rule-based application access management
• Opportunistic block transmission with time constraints
• Deriving component statistics for a stream enabled application
FSLogix
• AIE:Ressurection
• Came out of stealth mode about in July 2013
• First release planned in Q3 2013
• No streaming, no packaging
• Combination of file system minifilter and user-level hooks
• Support changes in realtime
• Text-file based configs with a GUI editor
FSLogix
FSLogix
FSLogix
Sandboxie
• Isolated sandboxes for applications
• Virtualizes Files, Disk Devices, Registry Keys, Process and Thread
objects, Driver objects, and objects used for Inter-process
communication: Named Pipes and Mailbox Objects, Events, Mutexs
(Mutants in NT speak), Semaphores, Sections and LPC Ports
• Not designed for VDI
• Not designed for Enterprise
• Developed by one person
Microsoft Windows
• UAC Virtualization is available out of the box
• Application compatibility toolkit can be used to manage folder and
registry redirection
• No additional software needed
What Are Shims?
• Applied to specific apps
– Configured with Compatibility Administrator in the App Compat Toolkit
– Deployable to enterprise
• Changes what the app thinks it sees
• Does not change what app is allowed to do
What Are Shims Good For?
• Great for many kinds of bugs:
– Bad Windows version checks
– Writing to HKCR at runtime
– Unnecessary checks for “am I admin?”
– Writing to WRP-protected keys and files
– Windows thinks your app is an installer
– File/Registry redirections
Version Lie Shims
• Win95VersionLie
• WinNT4SP5VersionLie
• Win98VersionLie
• Win2000VersionLie
• Win2000SP1VersionLie
• Win2000SP2VersionLie
• Win2000SP3VersionLie
• WinXPVersionLie
• WinXPSP1VersionLie
• WinXPSP2VersionLie
• Win2K3RTMVersionLie
• Win2K3SP1VersionLie
• VistaRTMVersionLie
• VistaSP1VersionLie
• VistaSP2VersionLie
• Win7RTMVersionLie
Most Used Shims
• VirtualRegistry
– Fixes the problem with reading/writing
registry value
– AddRedirect ( HKLMKey ^ HKCUKey
^ HKLMKey2 ^ HKCUKey2)
• CorrectFilePaths
– Fixes the problem with reading/writing
a file
– c:Program.ini=
%AppData%Program.ini
• WRPRegDeleteKey
– Lie when app tries to delete protected
OS registry key
• ForceAdminAccess
– Spoofs queries of administrator group
membership
• VirtualizeDeleteFile
– Spoofs deletion of global file
• LocalMappedObject
– Forces global section objects into
user’s namespace
• VirtualizeHKCRLite,
VirtualizeRegisterTypeLib
– Redirects global registration of COM
objects
Conclusion
• There are many vendors on the market
• If you care about App compatibility, take a look at simple solutions
• Consider using SaaS-based services
• Check the Application Virtualization Smackdown from Ruben Spruijt
– http://www.pqr.com
– 61 pages cover major vendors on the market
Conclusion
Contacts
• @fdwl
• meetup.com/BayCUG
• denisg@entisys.com

Weitere ähnliche Inhalte

Was ist angesagt?

Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentCitrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentHuy Pham
 
Citrix XenDesktop Reference Architecture for 750 users
Citrix XenDesktop Reference Architecture for 750 usersCitrix XenDesktop Reference Architecture for 750 users
Citrix XenDesktop Reference Architecture for 750 usersX-IO Technologies
 
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Citrix Desktop Master Class - XenApp/XD Feature Pack 2Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Citrix Desktop Master Class - XenApp/XD Feature Pack 2Lee Bushen
 
Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy
 
What's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppWhat's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppCitrix
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7Nuno Alves
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentDavid McGeough
 
VMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and SecurityVMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and SecurityVMworld
 
XenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of futureXenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of futureMarketingArrowECS_CZ
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....Denis Gundarev
 
Jump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentJump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentDavid McGeough
 
Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6
Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6
Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6Lee Bushen
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...David McGeough
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualizationxKinAnx
 
Co je nového v XenDesktop 7.6 a XenApp 7.6
Co je nového v XenDesktop 7.6 a XenApp 7.6 Co je nového v XenDesktop 7.6 a XenApp 7.6
Co je nového v XenDesktop 7.6 a XenApp 7.6 MarketingArrowECS_CZ
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentDavid McGeough
 

Was ist angesagt? (20)

Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentCitrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
 
Citrix XenDesktop Reference Architecture for 750 users
Citrix XenDesktop Reference Architecture for 750 usersCitrix XenDesktop Reference Architecture for 750 users
Citrix XenDesktop Reference Architecture for 750 users
 
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Citrix Desktop Master Class - XenApp/XD Feature Pack 2Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
 
Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016
 
What's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppWhat's new in XenDesktop and XenApp
What's new in XenDesktop and XenApp
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 Deployment
 
VMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and SecurityVMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and Security
 
XenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of futureXenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of future
 
Pvs slide
Pvs slidePvs slide
Pvs slide
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
 
Jump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentJump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 Deployment
 
Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6
Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6
Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualization
 
Co je nového v XenDesktop 7.6 a XenApp 7.6
Co je nového v XenDesktop 7.6 a XenApp 7.6 Co je nového v XenDesktop 7.6 a XenApp 7.6
Co je nového v XenDesktop 7.6 a XenApp 7.6
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 Environment
 
XenApp XenDesktop 7.8 Workshop
XenApp XenDesktop 7.8 Workshop XenApp XenDesktop 7.8 Workshop
XenApp XenDesktop 7.8 Workshop
 

Andere mochten auch

How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableDenis Gundarev
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 AnnouncementsBrendan Rose
 
Liquit
LiquitLiquit
LiquitGWAVA
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?Vmwareir
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guidesolarisyougood
 
VMware View 4
VMware View 4VMware View 4
VMware View 4netlogix
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5netlogix
 
Application Virtualization, University of New Hampshire
Application Virtualization, University of New HampshireApplication Virtualization, University of New Hampshire
Application Virtualization, University of New HampshireTony Austwick
 
Applications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the CloudApplications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the CloudArraya Solutions
 
VMworld 2013: ThinApp 101 and What's New in ThinApp Next Version
VMworld 2013: ThinApp 101 and What's New in ThinApp Next VersionVMworld 2013: ThinApp 101 and What's New in ThinApp Next Version
VMworld 2013: ThinApp 101 and What's New in ThinApp Next VersionVMworld
 
V mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugV mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugAlan Maloney
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecturesolarisyougood
 
V mware horizon view™ accelerator service
V mware horizon view™ accelerator serviceV mware horizon view™ accelerator service
V mware horizon view™ accelerator servicesolarisyougood
 
Application layering vs Application Isolation
Application layering vs Application IsolationApplication layering vs Application Isolation
Application layering vs Application IsolationMarius Sandbu
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationsolarisyourep
 
No BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering SolutionsNo BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
 
RSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityRSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityMike Schwartz
 
Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Mike Schwartz
 

Andere mochten auch (20)

How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 Announcements
 
Liquit
LiquitLiquit
Liquit
 
Application Virtualization Smackdown
Application Virtualization SmackdownApplication Virtualization Smackdown
Application Virtualization Smackdown
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5
 
Application Virtualization, University of New Hampshire
Application Virtualization, University of New HampshireApplication Virtualization, University of New Hampshire
Application Virtualization, University of New Hampshire
 
Applications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the CloudApplications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the Cloud
 
VMworld 2013: ThinApp 101 and What's New in ThinApp Next Version
VMworld 2013: ThinApp 101 and What's New in ThinApp Next VersionVMworld 2013: ThinApp 101 and What's New in ThinApp Next Version
VMworld 2013: ThinApp 101 and What's New in ThinApp Next Version
 
V mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugV mware+thin app+-+gcvmug
V mware+thin app+-+gcvmug
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
 
V mware horizon view™ accelerator service
V mware horizon view™ accelerator serviceV mware horizon view™ accelerator service
V mware horizon view™ accelerator service
 
Application layering vs Application Isolation
Application layering vs Application IsolationApplication layering vs Application Isolation
Application layering vs Application Isolation
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
 
No BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering SolutionsNo BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering Solutions
 
RSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityRSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud Identity
 
Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014
 

Ähnlich wie Application Streaming is dead. A smart way to choose an alternative

Docker & aPaaS: Enterprise Innovation and Trends for 2015
Docker & aPaaS: Enterprise Innovation and Trends for 2015Docker & aPaaS: Enterprise Innovation and Trends for 2015
Docker & aPaaS: Enterprise Innovation and Trends for 2015WaveMaker, Inc.
 
Demystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data ScientistsDemystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data ScientistsDr Ganesh Iyer
 
Virtualization Vs. Containers
Virtualization Vs. ContainersVirtualization Vs. Containers
Virtualization Vs. Containersactualtechmedia
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Primend
 
12 Factor App Methodology
12 Factor App Methodology12 Factor App Methodology
12 Factor App Methodologylaeshin park
 
Habitat talk at CodeMonsters Sofia, Bulgaria Nov 27 2018
Habitat talk at CodeMonsters Sofia, Bulgaria Nov 27 2018Habitat talk at CodeMonsters Sofia, Bulgaria Nov 27 2018
Habitat talk at CodeMonsters Sofia, Bulgaria Nov 27 2018Mandi Walls
 
Dockers and kubernetes
Dockers and kubernetesDockers and kubernetes
Dockers and kubernetesDr Ganesh Iyer
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementSharkrit JOBBO
 
321 codeincontainer brewbox
321 codeincontainer brewbox321 codeincontainer brewbox
321 codeincontainer brewboxLino Telera
 
IBM InterConnect 2015 - IIB in the Cloud
IBM InterConnect 2015 - IIB in the CloudIBM InterConnect 2015 - IIB in the Cloud
IBM InterConnect 2015 - IIB in the CloudAndrew Coleman
 
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...NETWAYS
 
Week 8 lecture material
Week 8 lecture materialWeek 8 lecture material
Week 8 lecture materialAnkit Gupta
 
The challenge of application distribution - Introduction to Docker (2014 dec ...
The challenge of application distribution - Introduction to Docker (2014 dec ...The challenge of application distribution - Introduction to Docker (2014 dec ...
The challenge of application distribution - Introduction to Docker (2014 dec ...Sébastien Portebois
 
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013dotCloud
 
Docker Datacenter Overview and Production Setup Slides
Docker Datacenter Overview and Production Setup SlidesDocker Datacenter Overview and Production Setup Slides
Docker Datacenter Overview and Production Setup SlidesDocker, Inc.
 
Cloud Computing as Innovation Hub - Mohammad Fairus Khalid
Cloud Computing as Innovation Hub - Mohammad Fairus KhalidCloud Computing as Innovation Hub - Mohammad Fairus Khalid
Cloud Computing as Innovation Hub - Mohammad Fairus KhalidOpenNebula Project
 
Open Audit
Open AuditOpen Audit
Open Auditncspa
 

Ähnlich wie Application Streaming is dead. A smart way to choose an alternative (20)

Docker & aPaaS: Enterprise Innovation and Trends for 2015
Docker & aPaaS: Enterprise Innovation and Trends for 2015Docker & aPaaS: Enterprise Innovation and Trends for 2015
Docker & aPaaS: Enterprise Innovation and Trends for 2015
 
Demystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data ScientistsDemystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data Scientists
 
Virtualization Vs. Containers
Virtualization Vs. ContainersVirtualization Vs. Containers
Virtualization Vs. Containers
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016
 
12 Factor App Methodology
12 Factor App Methodology12 Factor App Methodology
12 Factor App Methodology
 
OpenStack Summit
OpenStack SummitOpenStack Summit
OpenStack Summit
 
Habitat talk at CodeMonsters Sofia, Bulgaria Nov 27 2018
Habitat talk at CodeMonsters Sofia, Bulgaria Nov 27 2018Habitat talk at CodeMonsters Sofia, Bulgaria Nov 27 2018
Habitat talk at CodeMonsters Sofia, Bulgaria Nov 27 2018
 
Dockers and kubernetes
Dockers and kubernetesDockers and kubernetes
Dockers and kubernetes
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server Management
 
321 codeincontainer brewbox
321 codeincontainer brewbox321 codeincontainer brewbox
321 codeincontainer brewbox
 
IBM InterConnect 2015 - IIB in the Cloud
IBM InterConnect 2015 - IIB in the CloudIBM InterConnect 2015 - IIB in the Cloud
IBM InterConnect 2015 - IIB in the Cloud
 
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
 
{code} and containers
{code} and containers{code} and containers
{code} and containers
 
Week 8 lecture material
Week 8 lecture materialWeek 8 lecture material
Week 8 lecture material
 
The challenge of application distribution - Introduction to Docker (2014 dec ...
The challenge of application distribution - Introduction to Docker (2014 dec ...The challenge of application distribution - Introduction to Docker (2014 dec ...
The challenge of application distribution - Introduction to Docker (2014 dec ...
 
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
 
Docker Datacenter Overview and Production Setup Slides
Docker Datacenter Overview and Production Setup SlidesDocker Datacenter Overview and Production Setup Slides
Docker Datacenter Overview and Production Setup Slides
 
Cloud Computing as Innovation Hub - Mohammad Fairus Khalid
Cloud Computing as Innovation Hub - Mohammad Fairus KhalidCloud Computing as Innovation Hub - Mohammad Fairus Khalid
Cloud Computing as Innovation Hub - Mohammad Fairus Khalid
 
Open Audit
Open AuditOpen Audit
Open Audit
 

Mehr von Denis Gundarev

Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingDenis Gundarev
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseDenis Gundarev
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityDenis Gundarev
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevDenis Gundarev
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDenis Gundarev
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...Denis Gundarev
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDenis Gundarev
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDenis Gundarev
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDenis Gundarev
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDenis Gundarev
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI securityDenis Gundarev
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5Denis Gundarev
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VDenis Gundarev
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudDenis Gundarev
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...Denis Gundarev
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterDenis Gundarev
 
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныRUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныDenis Gundarev
 
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXAlexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXDenis Gundarev
 
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейRUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейDenis Gundarev
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоDenis Gundarev
 

Mehr von Denis Gundarev (20)

Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & Troubleshooting
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobility
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix Troubleshooting
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick Dehlinger
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloud
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
 
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныRUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
 
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXAlexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
 
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейRUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
 

Kürzlich hochgeladen

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Kürzlich hochgeladen (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Application Streaming is dead. A smart way to choose an alternative

  • 1. Application Streaming is dead. A smart way to choose an alternative Denis Gundarev Entisys Solutions
  • 2. Agenda • What is Application Streaming (Virtualization)? • Application Virtualization internals • Overview of available solutions
  • 3. What is Application Virtualization? • Application is executed inside the sandbox isolated from operating system • Improves security (isolates insecurity) • Eliminate application conflicts Package Deliver Execute
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Every time you disable UAC… Steve Ballmer kills a kitten
  • 11. Every time you disable UAC… Satya Nadella kills a kitten Please, think of the kittens
  • 12. Every time you: • Modifying ACLs on Program Files or HKLM • Making user a local admin • Just give users SeBackup, SeRestore, SeCreateGlobal and SeLoadDriver privileges, but keep them as standard users
  • 13. Application Isolation Environments • Was introduced in MetaFrame Presentation Server 4.0 (2005) • Virtualization layer that redirects system resources • Virtualizes: – File system – Registry – Named objects (events, semaphores, etc) • Transparent to the application • Was a great compatibility aid for: – Applications which are not multi user friendly – Applications which have problems coexisting on the same server – Applications that cannot have multiple instances running simultaneously
  • 14. Launching initial process into AIE File System Isolation Isolation Environment Launcher (aierun.exe) Registry and Object Isolation Application (eg winword.exe) IMA 2. Launch application suspended 4. Resume process File System Object Manager Registry 5. Read rules from driver and start isolating 6. Application execution continues 3. Tell driver about AIE being launched. Pass down rules File System redirection Registry redirection Named Object redirection File System calls 1.Retrieve AIE data from IMA
  • 15. Isolation Environment Roots • Specifies directories and registry locations • User Profile Root – Changes made by the user reside here – Suitable for Multi-user incompatible applications • Installation Root – Per Isolation environment location – Enables conflicting applications to coexist
  • 16. Isolation Environment Rules •Three types of Rules: • Ignore • Redirect • Isolate
  • 17. Isolation Environment: IGNORE Rule • Used to create “holes” in an isolation environment • Virtual address is not modified by the virtualization system • Used to allow access outside of the isolation environment
  • 18. Isolation Environment: REDIRECT Rule • Redirects an application request for a file or registry key to a specified location – If an application creates the file, c:tempdata.txt, regardless of the user, then it might be sensible to redirect those files to c:aietemp%USERNAME% – This means, if UserA ran the application isolated, then c:tempdata.txt is created in c:aietempUserAdata.txt
  • 19. Isolation Environment: ISOLATE Rule • Per User: – Ensure that each user gets his own copy of the requested resource • Per Isolation Environment: – A single copy of the required system resource is created in the installation root location and shared by all users
  • 20. Application Streaming • Codenamed Project Tarpon • Introduced in Citrix Presentation Server 4.5 (2007) • Had 6 major releases before being deprecated • Still available with XenApp 6.5 and XenDesktop 5.6 • Completely removed in XenDesktop 7
  • 21. 2 Tarpon Client Extension of CPS Foundation remote users firewall firewall local users Access Gateway Advanced Access Control Web Servers Application Servers IMA Service PN Agent Persistent Store AIE PN Agent Access Management Console Tarpon App Subsystem Tarpon Session Subsystem Tarpon Client Tarpon Profiler License Server Web Interface AIE AIE Tarpon Client AIE Presentation Servers DatabasesFile Servers New Apps License Presentation Server Data Collector
  • 22. 2 Project Tarpon Infrastructure Profiling Station File Share / NAS Project Tarpon Server Farm Web Interface Clients SMB SMB HTTP/ HTTPS XML SMB License Server 27000
  • 24. How it works • Two main components of Application Virtualization: • Isolation/Redirection • Delivery mechanism • Optional features: • File type associations and OS integration • Rights Management and usage tracking • Packaging • Shareable sandboxes
  • 25. File I/O Redirection options • API Hooking • at USER or Kernel Level • Hooking CreateFile, OpenFile, DeleteFile, NtCreateFile, NtOpenFile, NtDeleteFile etc • Hooking into System Service Descriptor Table (SSDT) • • File System Filter Driver or Mini-Filter • Write file system driver to redirect virtualized file requests. •
  • 26. Registry Redirection Options • API Hooking at USER Level • Hooking advapi32.dll - RegCreateKeyEx, RegDeleteKeyEx etc • Hooking Ntdll.dll – NtCreateKey, NtDeleteKey etc • API Hooking at Kernel Level • Hooking SSDT – NtCreateKey, NtDeleteKey etc
  • 27. Players on App Virtualization Market
  • 28. Players on App Virtualization Market • Microsoft App-V • VMware ThinApp • CloudVolumes • Symantec Workspace Streaming • Spoon (Novell ZENworks) • Numecent Jukebox • FSLogix • Sandboxie • Microsoft Windows
  • 29. Microsoft App-V • Version 2.0 was released in 2002 by Softricity • ~8 major and ~50 minor releases before App-V 5.0 • App-V 5.0 is completely rewritten and released in 2012 • Available as a part of MDOP under SA • App-V 5.0 is only supported version for XenDesktop 7
  • 30. App-V 5.0 Cons • Requires SA • Requires management servers • Requires SQL • User-level apps only • Cannot virtualize drivers • Cannot isolate applications that are a part of the OS
  • 31. App-V Pros • Tons of information on Internet • Huge user community • Integration with System Center • Integration with XenDesktop • Managed by PowerShell
  • 32. VMware ThinApp • Uses user-mode hooks • Application packaging solution, just like PortableApps.com • emulates the Windows COM and DCOM • Supports Streaming Execution (SMB/CIFS) and Deployed Execution (i.e. USB) • Does not support installed Apps • No centralized management
  • 33. CloudVolumes • AppStack – basically a VHD or VMDK attached to a VM • Web-based management console that communicates with hypervisor • Full support for server software • Available Now: VMware ESX 5.0, 5.1, Coming soon… HyperV, Azure, Amazon EC2
  • 36. CloudVolumes pros • Server software support • No streaming or any other delivery mechanism • Combination of file system minifilters and a service • Text file-driven configuration • Storage segregation on the hypervisor layer • Per-machine or per-user assignments • No packaging
  • 37. CloudVolumes cons • Works with virtual workloads only • Came out of stealth mode in 2013 • Text file-driven configuration • No integration with VDI brokers
  • 38. Symantec/Altiris SVS • Now called Symantec Workspace Virtualization • Kernel-level hooks • Umanaged computers support • Application license management • Best in class integration with OS
  • 39. Spoon • Formerly Xenocode • Web portal for app access • Desktop integration • Works over HTTP/HTTPS • License management • Available as SaaS offering • Server software support • Auditing • Support for installed applications • Application snapshots
  • 40. Numecent Jukebox • HTTP-based streaming • Encrypted cache • Virtualized File System • DRM and license control • OPSWAT integration • Kernel-level file system driver • Web portal for user access • Currently targeted for ISVs and MSP • No publicly available demos or code
  • 41. Numecent Jukebox • Patents: • Software streaming system and method • Intelligent Network Streaming and Execution System for Conventionally Coded Applications • Rule-based application access management • Opportunistic block transmission with time constraints • Deriving component statistics for a stream enabled application
  • 42.
  • 43.
  • 44. FSLogix • AIE:Ressurection • Came out of stealth mode about in July 2013 • First release planned in Q3 2013 • No streaming, no packaging • Combination of file system minifilter and user-level hooks • Support changes in realtime • Text-file based configs with a GUI editor
  • 48. Sandboxie • Isolated sandboxes for applications • Virtualizes Files, Disk Devices, Registry Keys, Process and Thread objects, Driver objects, and objects used for Inter-process communication: Named Pipes and Mailbox Objects, Events, Mutexs (Mutants in NT speak), Semaphores, Sections and LPC Ports • Not designed for VDI • Not designed for Enterprise • Developed by one person
  • 49. Microsoft Windows • UAC Virtualization is available out of the box • Application compatibility toolkit can be used to manage folder and registry redirection • No additional software needed
  • 50. What Are Shims? • Applied to specific apps – Configured with Compatibility Administrator in the App Compat Toolkit – Deployable to enterprise • Changes what the app thinks it sees • Does not change what app is allowed to do
  • 51. What Are Shims Good For? • Great for many kinds of bugs: – Bad Windows version checks – Writing to HKCR at runtime – Unnecessary checks for “am I admin?” – Writing to WRP-protected keys and files – Windows thinks your app is an installer – File/Registry redirections
  • 52. Version Lie Shims • Win95VersionLie • WinNT4SP5VersionLie • Win98VersionLie • Win2000VersionLie • Win2000SP1VersionLie • Win2000SP2VersionLie • Win2000SP3VersionLie • WinXPVersionLie • WinXPSP1VersionLie • WinXPSP2VersionLie • Win2K3RTMVersionLie • Win2K3SP1VersionLie • VistaRTMVersionLie • VistaSP1VersionLie • VistaSP2VersionLie • Win7RTMVersionLie
  • 53. Most Used Shims • VirtualRegistry – Fixes the problem with reading/writing registry value – AddRedirect ( HKLMKey ^ HKCUKey ^ HKLMKey2 ^ HKCUKey2) • CorrectFilePaths – Fixes the problem with reading/writing a file – c:Program.ini= %AppData%Program.ini • WRPRegDeleteKey – Lie when app tries to delete protected OS registry key • ForceAdminAccess – Spoofs queries of administrator group membership • VirtualizeDeleteFile – Spoofs deletion of global file • LocalMappedObject – Forces global section objects into user’s namespace • VirtualizeHKCRLite, VirtualizeRegisterTypeLib – Redirects global registration of COM objects
  • 54. Conclusion • There are many vendors on the market • If you care about App compatibility, take a look at simple solutions • Consider using SaaS-based services • Check the Application Virtualization Smackdown from Ruben Spruijt – http://www.pqr.com – 61 pages cover major vendors on the market