Application Streaming: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
80 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Application Streaming: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors , livre ebook

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
80 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Application streaming is a form of on-demand software distribution.
The basic concept of application streaming has its foundation in the way modern computer programming languages and operating systems produce and run application code. Only specific parts of a computer program need to be available at any instance for the end user to perform a particular function. This means that a program need not be fully installed on a client computer, but parts of it can be delivered over the network as and when they are required.
Application streaming is usually combined with application virtualization, so that applications are not installed in the traditional sense.


This book is your ultimate resource for Application Streaming. Here you will find the most up-to-date information, analysis, background and everything you need to know.


In easy to read chapters, with extensive references and links to get you to know all there is to know about Application Streaming right away, covering: Application streaming, Absolute Manage, Amazon Machine Image, Software appliance, Application directory, AspectJ, Binary delta compression, Black Legend (software publisher), Code on demand, Commercial software, Eclipse Buckminster, Freightgate, Fully Automatic Installation, GetApp.com, Hybrid SaaS, Intellectual property brokering, Klik (packaging method), List of software package management systems, LitwareHR, M23 software distribution system, On-premises software, Operation: Bot Roast, Opsi, Organization of Independent Software Vendors, Personal Package Archive, Software package (installation), Package management system, Pre-installed software, Product bundling, Software publisher, Package development process, Software repository, Retail software, Self service software, Self service software vendors, Shovelware, Software as a service, Software broadcasting, Software deployment, Software distribution, Software manufacturing, Software propagation, Software remastering, Superdistribution, Virtual appliance, XCOPY deployment, Zero Install


This book explains in-depth the real drivers and workings of Application Streaming. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Application Streaming with the objectivity of experienced professionals.

Sujets

Informations

Publié par
Date de parution 24 octobre 2012
Nombre de lectures 0
EAN13 9781743332863
Langue English
Poids de l'ouvrage 2 Mo

Informations légales : prix de location à la page 0,1598€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

Topic relevant selected content from the highest rated entries, typeset, printed and shipped.
Combine the advantages of up-to-date and in-depth knowledge with the convenience of printed books.
A portion of the proceeds of each book will be donated to the Wikimedia Foundation to support their mission: to empower and engage people around the world to collect and develop educational content under a free license or in the public domain, and to disseminate it effectively and globally.
The content within this book was generated collaboratively by volunteers. Please be advised that nothing found here has necessarily been reviewed by people with the expertise required to provide you with complete, accurate or reliable information. Some information in this book maybe misleading or simply wrong. The publisher does not guarantee the validity of the information found here. If you need speciîc advice (for example, medical, legal, înancial, or risk management) please seek a professional who is licensed or knowledgeable in that area.
Sources, licenses and contributors of the articles and images are listed in the section entitled “References”. Parts of the books may be licensed under the GNU Free Documentation License. A copy of this license is included in the section entitled “GNU Free Documentation License”
All used third-party trademarks belong to their respective owners.
Contents
Articles Application streaming Absolute Manage Amazon Machine Image Software appliance Application directory AspectJ
Binary delta compression Black Legend (software publisher) Code on demand Commercial software Eclipse Buckminster Freightgate Fully Automatic Installation GetApp.com Hybrid SaaS Intellectual property brokering klik (packaging method)
List of software package management systems LitwareHR M23 software distribution system On-premises software Operation: Bot Roast Opsi Organization of Independent Software Vendors Personal Package Archive Software package (installation)
Package management system Pre-installed software Product bundling Software publisher Package development process Software repository Retail software Self service software
1 3 5 6 8 10 13 14 15 15 17 18 20 20 22 23 24 26 29 30 32 33 34 37 38 38 39 43 45 47 48 49 51 52
Self service software vendors Shovelware Software as a service Software broadcasting Software deployment Software distribution Software manufacturing Software propagation Software remastering Superdistribution Virtual appliance
XCOPY deployment
Zero Install
References Article Sources and Contributors Image Sources, Licenses and Contributors
Article Licenses License
53 54 56 61 61 64 65 66 66 67 68 70 71
73 76
77
Application streaming
Application streaming
Computerapplication streamingis a form of on-demand software distribution. The basic concept ofapplication streaminghas its foundation in the way modern computer programming languages and operating systems produce and run application code. Only specific parts of a computer program need to be available at any instance for the end user to perform a particular function. This means that a program need not be fully installed on a client computer, but parts of it can be delivered over the network as and when they are required. Application streaming is usually combined with application virtualization, so that applications are not installed in the traditional sense.
Stream server [1] [2] An application isPackagedand stored on a streaming server.Packagingorsequencingproduces an image of [1] the application in a way that either orders delivery and/or predictively optimizes delivery to the client.
Launch & Streaming of Application The initial launch of an application would be important for the end user and the Packaging process might be optimized to achieve this. Once launched, common functions would be followed. As these functions are requested by [1] [2] the end user, these may be Streamed in a similar manner. In this case the client is pulling the application from the stream server. Otherwise, the full application might be delivered from the server to the client in background. In this case, the server pushes the application to the client.
Advantages Given the complexity of modern applications, many functions are never or seldom used, and pulling the [3] application on demand is more efficient in terms of server, client and network usage [2] ` Simplified operating system migrations [1] ` Accelerated application deployment [1] [4] [2] ` Centralised application management, with local execution [2] Ability to continue to use applications when off-line (in contrast to pure web-applications) Delivers fully featured desktop applications (in contrast to browser-driven web-applications) [3] Software license optimisation by controlling simultaneous users of software
Vendor-specific implementations [5] ` Microsoft Application Virtualization ` Symantec Workspace Streaming ` Citrix Application Streaming: XenApp Offline Plugin [6] ` Novell ZENworks Application Virtualization [7] ` Endeavors Technologies Application Jukebox
1
Application streaming
References
[1] "Desktop Virtualization Comes of Age" (http://www.dabcc.com/documents/DesktopVirtualization_11_26_07.pdf). Credit Suisse. 2007-11-26. . Retrieved 2008-03-03. [2] "Virtual Panacea Found in Application Streaming" (http://itmanagement.earthweb.com/netsys/article.php/3764396/ Virtual-Panacea-Found-in-Application-Streaming.htm). Datamation. 2008-08-11. . Retrieved 2010-09-10. [3] Dan Kusnetzky (2007-07-25). "Application Streaming And Why Your Organization Should Care" (http://www.zdnet.com/blog/ virtualization/application-streaming-and-why-your-organization-should-care/195). ZDNet.com. . Retrieved 2010-9-10. [4] Robert L. Mitchell (2005-11-21). "Streaming the Desktop" (http://www.computerworld.com/softwaretopics/software/apps/story/ 0,10801,106354,00.html). computerworld.com (http://www.computerworld.com). . Retrieved 2008-03-04. [5] http://www.microsoft.com/systemcenter/appv/default.mspx [6] http://www.novell.com/products/zenworks/applicationvirtualization/ [7] http://www.endeavors.com/products/jukebox/
2
Absolute Manage
Absolute Manage
Developer(s)
Stable release
Operating system
Type
License
Website
Absolute Software
5.2.2 / November 10, 2009
Windows, Mac OS X
Network management, Systems management, IT automation, Software Asset Management
Proprietary
[1] www.absolute.com
Absolute Manage(formerly LANrev) is a systems lifecycle management software for system administrators which [2] automates IT administration tasks. The product is composed of a server and client ("agent") software that runs on [3] Windows and Mac OS X. Vancouver-based Absolute Software acquired LANrev from Pole Position Software in December 2009, for US$12.1 [4] million in cash and 500,000 shares of Absolute's common stock. LANrev was rebranded as Absolute Manage in [5] February 2010.
Features LANrev's features include: • Asset inventory • Theft Recovery • Software distribution • License management • Patch management • Remote management • iPhone management • Disk imaging • Power management • Package building (see LANrev InstallEase) • Role-based administration • Security configuration for FDCC
3
Absolute Manage
School webcam controversy In the 2010Robbins v. Lower Merion School Districtcase, plaintiffs charged two suburban Philadelphia high schools secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home, and therefore infringed on their privacy rights. The schools admitted to [6] [7] secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms. LANrev software was used in the Lower Merion school district's student laptop program, overseen by network [8] technician Michael Perbix. In February 2010, Perbix and other administrators in the district were accused of using the software to take undisclosed and unauthorized photographs of students through the webcams on their Macintosh [9] laptops. The lawsuit was brought by the parents of 15-year-old sophomore, Blake Robbins, who was allegedly accused of illicit behavior seen through his computer's webcam of him in his bedroom. The photographs, taken from [10] a laptop that was reportedly not stolen, were then allegedly used as evidence in a disciplinary action. The FBI [11] [12] investigated the incident, and a Philadelphia federal judge intervened to sort out issues relating to the lawsuit. Perbix had previously praised Theft Track, the name of the feature that lets administrators remotely photograph potential thieves if a computer is reported stolen, noting in a Youtube video he produced that: Itexcellent feature. Yes, we have used it, and yes, it has gleaned some results for us. But it, in ands an of itself, is just a fantastic feature for trying toespecially when youre in a school environment and you have a lot of laptops and youre worried about, you know, laptops getting up and missing. Ive actually had some laptops we thought were stolen which actually were still in a classroom, because they were misplaced, and by the time we found out they were back, I had to turn the tracking off. And I had, you [13] know, a good twenty snapshots of the teacher and students using the machines in the classroom.
LANrev's new owner, Absolute Software staunchly denounced the use of their software for any illegal purpose, [14] emphasizing that theft recovery should be left to law enforcement professionals. They further denied any knowledge of or complicity in either Perbix's or the school district's actions. Absolute stated that the next update of [15] LANrev, which would ship in the next several weeks, would permanently disable Theft Track.
Partners • Enterprise Desktop Alliance • Group Logic • IBM • Parallels, Inc. • Web Help Desk • Microsoft System Center Alliance [16] • LiveTime CMDB
References [1] http://www.absolute.com/ [2] Faas, Ryan (January 9, 2009). "The Top Five Solutions for Mac/Windows Client Deployment" (http://www.informit.com/articles/article. aspx?p=1315435). InformIT. . Retrieved June 23, 2009. [3] Best, Brian (2008). "Managing Your Loadset, Post-Deploy" (http://www.mactech.com/articles/mactech/Vol.24/24.01/ ManagingYourLoadset-Post-Deploy/index.html).MacTech24(1). . Retrieved June 23, 2009. [4] Absolute Software (December 3, 2009). "Absolute Software Acquires LANrev product suite from Pole Position Software" (http://www. absolute.com/company/pressroom/news/2009/12/lanrev). Press release. . Retrieved January 19, 2010. [5] [backPid (http://www.lanrev.com/company/news/single/article/ absolute-software-unveils-new-cross-platform-it-asset-management-solution.html?tx_ttnews)=3&cHash=093df143d9 "Absolute Software Unveils New Cross-Platform IT Asset Management Solution"].Press Release. February 2, 2010. [backPid]=3&cHash=093df143d9. [6] Doug Stanglin (February 18, 2010). "School district accused of spying on kids via laptop webcams" (http://content.usatoday.com/ communities/ondeadline/post/2010/02/school-district-accused-of-issuing-webcam-laptops-to-spy-on-students/1).USA Today. . Retrieved
4
Absolute Manage
February 19, 2010. [7] "Initial LANrev System Findings" (http://lmsd.org/documents/news/100503_l3_report.pdf), LMSD Redacted Forensic Analysis, L-3 Servicesprepared for Ballard Spahr (LMSD's counsel), May 2010. Retrieved August 15, 2010. [8] School District Faces Lawsuit Over Webcam Spying Claims (http://www.pcworld.com/businesscenter/article/190101/ school_district_faces_lawsuit_over_webcam_spying_claims.html) [9] Worden, Amy (February 22, 2010). "Laptop camera snapped away in one classroom | Philadelphia Inquirer | 02/22/2010" (http://www. philly.com/inquirer/front_page/20100222_Laptop_camera_snapped_away_in_one_classroom.html). Philly.com. . Retrieved August 10, 2010. [10] Font size Print E-mail Share 13 Comments (February 18, 2010). "Suit: Schools Spied on Students Via Webcam" (http://www.cbsnews. com/stories/2010/02/18/national/main6220751.shtml?tag=leftCol;post-1534). CBS News. . Retrieved August 10, 2010. [11] Claburn, Thomas. "FBI Investigating Web Spycam" (http://www.informationweek.com/news/security/privacy/showArticle. jhtml?articleID=223100403). InformationWeek. . Retrieved August 10, 2010. [12] Tanfani, Joseph (February 23, 2010). "Rare ban in laptop lawsuit | Philadelphia Inquirer | 02/23/2010" (http://www.philly.com/philly/ news/homepage/85021742.html). Philly.com. . Retrieved August 10, 2010. [13] "FBI, US Attorney Probing Penn. School District's Computer Spying" (http://www.democracynow.org/2010/2/24/headlines/ fbi_us_attorney_probing_penn_school_districts_computer_spying). Democracynow.org. . Retrieved August 10, 2010. [14] http://www.computerworld.com/s/article/9160278/Software_maker_blasts_vigilantism_in_Pa._school_spying_case?taxonomyId=12 [15] "LANrev to lose Theft Track feature following Pa. school spying allegations | TR Dojo | TechRepublic.com" (http://blogs.techrepublic. com.com/itdojo/?p=1559). Blogs.techrepublic.com.com. February 23, 2010. . Retrieved August 10, 2010. [16] http://www.livetime.com/itil-service-management/service-manager/configuration-management-cmdb/
External links • Official homepage (http://www.absolute.com/en/products/absolute-manage/features.aspx)
Amazon Machine Image
AnAmazon Machine Image (AMI)is a special type of virtual appliance which is used to instantiate (create) a virtual machine within the Amazon Elastic Compute Cloud. It serves as the basic unit of deployment for services [1] delivered using EC2.
Contents Like all virtual appliances, the main component of an AMI is a read-only filesystem image which includes an operating system (e.g., Linux, UNIX, or Windows) and any additional software required to deliver a service or a [2] portion of it. The AMI filesystem is compressed, encrypted, signed, split into a series of 10MB chunks and uploaded into Amazon S3 for storage. An XML manifest file stores information about the AMI, including name, version, architecture, default kernel id, decryption key and digests for all of the filesystem chunks. An AMI does not include a kernel image, only a pointer to the default kernel id, which can be chosen from an approved list of safe kernels maintained by Amazon and its partners (e.g., RedHat, Canonical, Microsoft). Users may [3] choose kernels other than the default when booting an AMI.
5
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents