Pervasive Personal Computing in an Internet Suspend/Resume System

Total Page:16

File Type:pdf, Size:1020Kb

Pervasive Personal Computing in an Internet Suspend/Resume System Roaming Pervasive Personal Computing in an Internet Suspend/Resume System The Internet Suspend/Resume model of mobile computing cuts the tight binding between PC state and PC hardware. By layering a virtual machine on distributed storage, ISR lets the VM encapsulate execution and user customization state; distributed storage then transports that state across space and time. This article explores the implications of ISR for an infrastructure-based approach to mobile computing. It reports on experiences with three versions of ISR and describes work in progress toward the OpenISR version. Mahadev Satyanarayanan, ortable computers have been the shops, airport lounges, dental and med- Benjamin Gilbert, driving technology behind mobile ical offices, and other semipublic spaces Matt Toups,Niraj Tolia, P computing since the early 1990s. provide hardware for their clientele. Even Ajay Surie, David R. Today, the phrase mobile computing is the foldout tray at every seat in an air- O’Hallaron,Adam Wolbach, almost synonymous with the use of lap- plane or commuter train could be a lap- Jan Harkes,Adrian Perrig, top and handheld computers. However, top. In that world, users could travel and David J. Farber the plummeting cost of hardware sug- hands-free yet make productive use of Carnegie Mellon University gests that the pervasive computing infra- slivers of time anywhere such infrastruc- structure might some day eliminate the ture is available. This technical capabili- Michael A. Kozuch need to carry such hardware. ty could inspire new business models, and Casey J. Helfrich In this article, we describe a new centered on meeting customer demand Intel Research Pittsburgh approach to mobile computing that for trustworthy computing hardware at embraces this opportunity — specifically any time and place and on preserving PC Partho Nath with the Internet Suspend/Resume (ISR) state on servers. Pennsylvania State University system that emulates the suspend/resume Why is infrastructure-based mobile capability of laptop hardware. Rather computing attractive? There are obvious H.Andrés Lagar-Cavilla than carrying hardware, we might find advantages, such as traveling with less University of Toronto and use hardware transiently at any luggage, simplifying security screening in location. Imagine a world where coffee a post-9/11 world, and being able to get 16 Published by the IEEE Computer Society 1089-7801/07/$25.00 © 2007 IEEE IEEE INTERNET COMPUTING Internet Suspend/Resume Think Wallet, Not Swiss Army Knife he Internet Suspend/Resume (ISR) mentation. For example, you would much anything you need, when and where you T system offers a fundamentally differ- rather use a full-sized screw driver, if avail- need it. ent way of thinking about mobile comput- able, than the small, hard-to-use one in a Thus, we can view a wallet as a device ing and about the resources that we need Swiss Army knife. The same logic applies to that helps transform generic infrastructure to carry. The current design philosophy for that device’s other functions. into highly personalized services. This obser- mobile devices resembles a Swiss Army Contrast this with the different design vation leads to a different design philosophy knife approach: cram as much functionality philosophy of a wallet. Virtually every for mobile devices. Rather than cramming as possible into a single device. Unfortu- adult carries a wallet. The contents vary, direct functionality into the device, we put nately, as anyone who has used a Swiss but they typically include things like cash, indirect functionality in it. This indirect func- Army knife knows, its value as survival gear credit cards, ID cards, and so on. Far from tionality leverages the external environment is much higher than its value in everyday civilization, a wallet is useless. You might to provide direct functionality on demand. use. If you are stranded far from civilization, die of starvation or thirst in the wilder- Carrying a Trust-Sniffer device integrated the many functions of a Swiss Army knife ness even with a fat wallet; a Swiss Army with USB storage for look-aside caching (such as knife, fork, can opener, corkscrew, knife would be much more useful in those brings us close to the model of carrying a screw driver, tooth pick, and so on) can be circumstances. In the context of civiliza- wallet rather than a Swiss Army knife. Such a life saver. But each function is suboptimally tion, however, a wallet is more useful. a device could even be the size of a credit implemented relative to a full-sized imple- With cash or a credit card, you can obtain card and fit into your wallet! work done at unexpected times and locations even To attain this vision, we need to solve at least if you didn’t have the foresight to bring your lap- three difficult technical problems: top. More fundamentally, infrastructure-based mobile computing can liberate us from the rigid • Provide efficient on-demand access to a user’s design constraints of portable hardware. For a entire personal computing environment. Today, given cost and level of technology, considerations users who carry a portable computer are of weight, power, size, and ergonomics exact a assured of seeing exactly the same set of per- penalty in attributes such as processor speed, sonal files, operating system, customizations, memory size, and disk capacity. Although mobile and so on everywhere they go. Precise and elements will improve in absolute ability, they will complete recreation of this familiar context is always be resource-poor relative to static elements the key to low user distraction in any future of the same vintage. Furthermore, the dependence mobile computing model. Just providing access on a finite energy source and the need to monitor to a user’s personal files or to application cus- remaining energy is an ongoing distraction for tomizations won’t suffice. mobile users. • Ensure resilience to Internet vagaries. Today, users working with local data on portable com- Liberating Personal Computing puters are unaffected by network quality. They The world we envision will retain the user cus- aren’t impacted by unpredictable bandwidth tomization aspect of personal computing. However, and latency or by occasional failures. This computers themselves will become a ubiquitous defines the standard against which consumers resource, much like light at the flip of a switch, will judge new models of mobile computing. water from a faucet, or the air we breathe. (See the Users must perceive crisp, stable, interactive “Think Wallet, Not Swiss Army Knife” sidebar for performance even under conditions of high an extended discussion of this idea.) On demand, network latency and network congestion. The any Internet-connected computer could temporari- building blocks of modern-day user interfaces ly become your personal computer. Any machine such as scrolling, highlighting, and popup will be able to acquire a user’s unique customiza- menus all assume a tight feedback loop tion and state from a server. When a user is done, between users and their applications. Only a his or her modified state is erased from that machine thick-client solution, in which the application and returned to the server. Loss, theft, or destruc- executes close to the user, can support this tight tion of the machine will become only a minor feedback loop when network connectivity is inconvenience, not a catastrophic event. poor.1 In the extreme case of network discon- MARCH • APRIL 2007 17 Roaming Guest applications seamlessly resume on another. We have built three User parcel experimental versions of ISR (ISR-1, ISR-2, and Guest operating system (OS) ISR-3) and have gained small-scale deployment experience with ISR-3. Based on our implementa- tion and usage experience, we’re working toward a Virtual machine Virtualized new version of ISR, which we call OpenISR. e n hardware achi Virtual machine monitor m ISR Architecture t n ISR builds on two technologies that have matured Clie in the past few years. Specifically, it layers virtual Disk I/O intercept and ISR smarts ISR layer machine technology on distributed storage tech- nology. Each VM encapsulates a distinct execution Hardware and and user-customization state that we call a parcel. x86 hardware host OS or The distributed storage layer transports a parcel hypervisor across space (from suspend site to resume site) and time (from suspend instant to resume instant). End-to-end encryption Users can own multiple parcels, just as they can own multiple machines with different operating Distributed storage systems or application suites. Figure 1 shows an ISR client machine’s logi- Figure 1. Modular structure of an Internet Suspend/Resume cal structure. This structure has remained invari- (ISR) client. ant across the many different ISR versions, although the components implementing each layer have changed over time. For example, the nection, the user should still be able to contin- virtual machine monitor (VMM) was VMware5 in ue working. This challenging requirement pre- early versions of ISR but now can be VMware, cludes a range of thin-client solutions such as KVM, or Xen.6 These VMMs support a mode in Sun Ray,2 Virtual Network Computing (VNC),3 which a local disk partition holds the VM state. and AJAX-based applications4 that execute on By intercepting disk I/O references from the a remote computing server. VMM to this disk partition, the ISR layer can • Establish trust in unmanaged hardware for transparently redirect the references to distrib- transient use. Today, when users sit down to uted storage. use a computer in their office or home, they As Figure 1 shows, the ISR client software implicitly assume that their machine hasn’t encrypts data from a parcel before handing it to been tampered with and that no malware such the distributed storage layer. Neither servers nor as a keystroke logger has been installed.
Recommended publications
  • Sun Ray Server Software 4.2 Installation and Configuration Guide (Solaris)
    Sun Ray Server Software 4.2 Installation and Configuration Guide (Solaris) April 2011 Sun Ray Server Software 4.2 Installation and Configuration Guide (Solaris) Copyright © 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Openoffice.Org News Highlights Table of Contents Octo Ber 2004
    OpenOffice.org News Highlights Table of Contents Octo ber 2004 ................................................................................................ R eplacing FrameMaker with OOo Writer ............................................................................................. Ger mans claim Linux lowers costs ......................................................................................................... Ope n approach offers Mindef more choice ............................................................................................ Ball mer calls for horse-based attack on Star Office ............................................................................... Ope n for Business - The 2004 OfB Choice Awards .............................................................................. Sep tember 2004 ............................................................................................ Ope nOffice.org reveals marketing ambitions ......................................................................................... No nprofit brings Linux and open source to Hawaii ............................................................................... UK charity builds Linux network on a shoestring .................................................................................. N SW opens door to Linux offers ............................................................................................................ L eading Edge Forum Report 2004 - Open Source: Open for Business .................................................
    [Show full text]
  • Sun Microsystems Solaris 10 What's
    Solaris 10 What’s New Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817–0547–15 January 2005 Copyright 2005 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, SunVTS, Java, J2SE, J2EE, JavaServer, JumpStart, Sun Fire, StarOffice, Sun Blade, Sun Ray, Solstice Enterprise Agents, CacheFS, Sun StorEdge, and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. FireWire is a trademark of Apple Computer, Inc., used under license. Netscape and Netscape Navigator are trademarks or registered trademarks of Netscape Communications Corporation. Mozilla is a trademark or registered trademark of Netscape Communications Corporation in the United States and other countries.
    [Show full text]
  • Sun Ray Server Software 4.2 Installation and Configuration Guide (Linux)
    Sun Ray Server Software 4.2 Installation and Configuration Guide (Linux) April 2011 Sun Ray Server Software 4.2 Installation and Configuration Guide (Linux) Copyright © 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • 1 Establishment of the First Java 3DTM Enabled CAVE a Whitepaper
    Establishment of the first Java 3DTM enabled CAVEÒ1 A Whitepaper Christoph W. Sensen, University of Calgary, Sun Center of Excellence for Visual Genomics Jeff Brum, Fakespace Systems, Kitchener, Ontario Paul Gordon, University of Calgary, Sun Center of Excellence for Visual Genomics Mark Hood, Sun Microsystems, Palo Alto, CA Gary Lindahl, Fakespace Systems, Kitchener, Ontario Michael Schulman, Sun Microsystems, Palo Alto, CA Chris Spindler, Sun Microsystems of Canada, Calgary, Alberta Megan Stuart, Sun Microsystems of Canada, Calgary, Alberta Stefan Unger, Sun Microsystems, Palo Alto, CA 1 Ò CAVE is a registered trademark of the University of Illinois Board of Trustees 1 Introduction The name "CAVE" is a recursive acronym (CAVE Automatic Virtual Environment). The CAVE was researched and developed by the Electronic Visualization Laboratory, at the University of Illinois at Chicago2 as a tool for scientific visualization. Since it's premiere at the 1992 SIGGRAPH conference, the CAVE has achieved international recognition as the pinnacle of immersive virtual reality system technology, providing a compelling display environment for science, engineering, and art. The intent of the CAVE is to facilitate “suspension of disbelief” by making the virtual environment as realistic as possible. The quality of the graphical images is of paramount importance to realism. Depending upon the model or environment being explored, the speed of the computer’s graphic system will affect the speed of image update. The layout of the physical CAVE structure itself (typically at least three walls with a 270 degree angle and a floor display) will also affect the sense of virtual presence. Today, the CAVE technology has been commercialized and is marketed by Fakespace Systems Inc.
    [Show full text]
  • ORACLE MAGAZINE Jonathan Vincenzo, Dan Vlamis Is PROVIDED on an “As Is” Basis
    JULY/AUGUST 2010 Oracle Enterprise Manager 11g New release delivers business-driven IT management / 21 Deriving and Sharing BI Metadata Integrate Oracle Warehouse Builder 11g Release 2 information with Oracle Business Intelligence Enterprise Edition / 59 Automating Parallelism Take the guesswork out of setting the degree of parallelism for queries / 63 On Connecting, Pivoting, and Learning New Things Our technologist bypasses TNSNAMES.ORA, turns rows to columns, and ORACLE.COM/ORACLEMAGAZINE meets the NO_DATA_FOUND exception / 69 THE VIRTUAL ENTERPRISE From desktop to datacenter, Oracle o ers a complete virtualization solution Strategize. Plan. Execute. Gain more insight with Oracle’s enhanced enterprise performance management solution Java Hits the Road Learn the latest from Java luminaries as the Java Bus goes from code to coast One City, One Week, Three Conferences Oracle OpenWorld, JavaOne, and Oracle Develop converge on San Francisco September 19–23 JA10_cover_R1.indd 2 5/25/10 2:30:41 PM Untitled-2 1 3/22/10 8:42 PM Untitled-2 2 3/22/10 8:42 PM Oracle development PL/SQL Developer by Allround Automations. everywhere... PL/SQL Developer is the Oracle development tool that gives you maximum productivity, ease of use and all the features you need, for a reasonable price. Visit our website for additional details: www.allroundautomations.com/plsqldev 4 FEATURED CONTENT VOLUME XXIV - ISSUE 4 CONTENTS THE VIRTUAL ENTERPRISE /36 Virtualization—of desktop, server, or storage resources—requires a reliable infrastructure, solid plan, and strategic management. The payoffs include IT flexibility and efficiency, as well as server consolidation and lower energy costs. Learn how Oracle’s desktop-to-datacenter solutions can virtualize your enterprise.
    [Show full text]
  • Oracle 1Z0-559 Exam
    Oracle 1Z0-559 Exam Volume: 76 Questions Question No : 1 Which three platforms are supported for the Oracle Virtual Desktop client? A. Windows 7 B. Wyse OS C. iPad iOS D. Solaris 10 E. Apple Mac OS X Answer: A,C,E Question No : 2 Identify the Desktop state where the desktop isassigned,butisnot currently in use or the userhaslogged off. A. Available B. Used C. Idle D. Reserved E. Unresponsive Answer: C Question No : 3 Which two hypervisor options do notsupport template revision management from theOracleVDIadmin GUI? A. OracleVirtualBox B. Microsoft Windows2008 Hyper-V Leading the way in IT testing and certification tools, www.examkiller.net Oracle 1Z0-559 Exam C. VMware vSphere D. Citrix XenDesktop Answer: B,C Question No : 4 Users cannot login to their desktops and after investigation it seems to have started right after the primary LDAP server went offline. What settings need to be the same on the primary LDAP server and backup LDAP server so that VDI will continue to operate? A. The same security level, TCP port, base dim, and credentials B. The same hostname,LDAP server, MAC address, and baseDN C. The same DNSname, baseDN, SSLcertificates,andversion ofLDAP D. The same toot password, base DN, SSI certificates, and forest configuration Answer: D Question No : 5 Which two guest operating systemsare supported when deploying a VMware vSphere Desktop Provider within OracleVDI? A. Oracle Linux 5.6 B. Windows 2000 SP4 C. Windows 7 D. Oracle Solaris 10 E. Windows XP Answer: B,E Question No : 6 A customer has an IT group that needs to be able to plug in USB 2.0 devices.
    [Show full text]
  • Sun Ray Software Release Notes Versions 5.3 and 5.3.X
    Sun Ray Software Release Notes Versions 5.3 and 5.3.x E25743-05 June 2013 Sun Ray Software Release Notes: Versions 5.3 and 5.3.x Copyright © 2012, 2013, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S.
    [Show full text]
  • Sun Fire X4170, X4270, and X4275 Server Architectures
    SUN FIRE™ X4170, X4270, AND X4275 SERVER ARCHITECTURE Optimizing Performance, Density, and Expandability to Maximize Datacenter Value White Paper April 2009 Abstract In compact 1U and 2U form factors, the Sun Fire X4170, X4270, and X4275 servers combine the power of a new generation of Intel Xeon processors with Sun’s system engineering expertise. Based on Sun’s Open Network System design approach, these servers offer the needed performance, density, and expandability to satisfy demanding datacenter applications, especially for virtualization and consolidation initiatives. This white paper describes the architecture of the Sun Fire X4170, X4270, and X4275 servers, including the processor technology, I/O subsystem, built-in system management features, and range of supported operating systems. Sun Microsystems, Inc. This Page Intentionally Left Blank Sun Microsystems, Inc. Table of Contents Executive Summary . 1 Managing Capacity and Complexity . 2 Introducing the Sun Fire™ X4170, X4270, and X4275 servers . 2 Comparing the Sun Fire X4170, X4270, and X4275 servers . 4 A choice of operating systems . 6 The Intel Advantage . 7 New Intel Core Microarchitecture. 7 Modular architecture . 10 Power management technologies . 10 Intel Xeon Processor 5500 platform . 11 Sun Fire X4170, X4270, and X4275 Server Architectures . 12 Sun Fire X4170 system-level architecture . 12 Sun Fire X4170 server overview. 13 Sun Fire X4170 server enclosure . 14 Sun Fire X4170 server front and rear perspectives . 14 Sun Fire X4270 system-level architecture . 16 Sun Fire X4270 server overview. 17 Sun Fire X4270 server enclosure . 17 Sun Fire X4270 server front and rear perspectives . 18 Sun Fire X4275 system-level architecture . 19 Sun Fire X4275 server overview.
    [Show full text]
  • Sun Fire X2100 M2 and X2200 M2 Server Architecture
    SUN FIRE™ X2100 M2 AND X2200 M2 SERVER ARCHITECTURE Scalable, Compact, and Efficient Systems Based on Powerful Dual-Core and Quad-Core AMD Opteron™ Processors White Paper April 2008 Sun Microsystems, Inc. Table of Contents Executive Summary . 1 Scalable Computing without Complexity . 2 Meeting Modern Enterprise Needs . 4 Raising Expectations for Entry-Level Servers . 4 Maximizing Solution Longevity. 5 AMD Opteron™ Processor Technology . 6 Second-Generation Dual-Core AMD Opteron Processors . 6 Third-Generation Quad-Core AMD Opteron Processors . 8 High-Bandwidth I/O for High Performance Computing . 11 AMD Virtualization Technology. 12 Processor Design for Energy Efficiency . 13 Sun Fire X2100 M2 and X2200 M2 Server Architecture . 16 Motherboard. 16 Memory Architecture . 18 PCI Express Expansion. 19 Disk Drive and Hardware RAID . 19 Networking and I/O . 19 Enclosure and Rackmount. 21 Power and Cooling . 21 Specifications and Compliance . 22 System Management . 23 Embedded Service Processor — Out of Band System Management . 23 In-Band System Management. 25 Sun xVM Ops Manager Software . 25 A Universal Computing Platform. 26 A Choice of Operating Systems . 27 The Solaris™ Operating System . 27 Linux Environments . 29 Microsoft Windows Environments . 29 VMware. 29 Conclusion . 31 For More Information . 32 1 Executive Summary Sun Microsystems, Inc. Executive Summary IT organizations are under constant pressure to improve operations and lower costs. Many IT managers strive to gain efficiencies by standardizing platforms and procedures. Unfortunately, these efforts can stall as datacenters are often stocked with a mix of new 64-bit applications and a large inventory of legacy 32-bit code — requiring a variety of different chip architectures and operating environments for execution.
    [Show full text]
  • Sun Ray Connector for Windows OS 2.3 Installation and Configuration Guide (Solaris)
    Sun Ray Connector for Windows OS 2.3 Installation and Configuration Guide (Solaris) February 2011 Sun Ray Connector for Windows OS 2.3 Installation and Configuration Guide (Solaris) Copyright © 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Virtualizing Desktops with Sun Ray Software and Vmware View Manager on the Web Sun.Com
    VIRTUALIZING DESKTOPS WITH SUN RAY™ SOFTWARE AND VMWARE VIEW MANAGER David Fong, Sun Microsystems Matthias Müller-Prove, Sun Microsystems Adam Workman, Sun Microsystems Sun BluePrints™ Online Part No 820-7120-10 Revision 1.0, 3/3/09 Sun Microsystems, Inc. Table of Contents The Desktop Management Challenge . .1 Desktop Virtualization with Sun and VMware Software . .2 Architecture Overview. 3 Virtualization Layer. 4 Session Management Layer . 4 Virtual Desktop Access Layer. 5 Key Capabilities. 5 Software Installation and Configuration. .7 Software Installation . 7 Configure VMware View Manager . 7 Install and Configure Sun Ray Connector for VMware View Manager . 10 Enabling SSL . 12 Generate the Certificate . 12 Enable the Certificate . 13 Install the Certificate on Sun Ray Servers. 14 Troubleshooting . 16 Best Practices for Deployment . .18 For More Information . .19 About the Authors. 19 Acknowledgments. 19 References . 19 Ordering Sun Documents . 20 Accessing Sun Documentation Online . 20 1 Virtualizing Desktops Sun Microsystems, Inc. Chapter 1 The Desktop Management Challenge Coping with a never-ending stream of software upgrades and patches, dealing with personal software on desktop PCs, and managing a variety of software versions and hardware failures all present challenges to system administrators. As the number of desktops grows, management and operational costs rise. Ensuring that every system is protected against the latest security attacks is a time-consuming task, and energy budgets inflate as more desktops are added to the environment. In addition, demonstrating compliance with industry or government legislation and internal policies is difficult when applications reside on individual PCs. Perhaps most importantly, sensitive data and critical applications on desktops and laptops are vulnerable to theft and data loss — a problem that is exacerbated by poor backup procedures.
    [Show full text]