Cloud Software Technology

Source: Internet
Author: User

The application virtualization technology used on the cloud is different from the well-known hardware Virtualization Technologies (such as VMware and Virtual PC) and operating system virtualization (such as kerberozzo, cloud-based application virtualization is more lightweight and more suitable for desktops and applications.ProgramSuch as virtualization, to bring a better desktop and software use experience in the PC field.

Implementation Principle
The following uses the hidden and activated functions of the cloud as an example to briefly describe the implementation principles of cloud application virtualization.
No cloud PC is used
System Environment: the system contains locally installed software A and other system processes.
When the system does not use the cloud, after installing software a locally using the common method, there is a registry entry set for software a in the registry system and a file set for software a in the file system. At the same time, the registry system and the file system also have the registry keys and file sets of other processes of the system.
A and other system processes can generally access the registry system and file system anywhere, regardless of whether the registry key and file set are their own or other processes. The results of all write operations are stored in the original physical location.
Cloud PC: Virtual software B, activated
System Environment: the system contains virtualized software B, locally installed software B, and other system processes.
After software B is virtualized on the cloud, software B is separated from the file written to the registry system by software B and stored in the registry cache and File Cache of software B, the cached data is stored in the unique cloud cache (cloudcache ).
When software B is activated on the cloud, the cloud projects the Registry cache of software B to the registry of the real system, without occupying the physical location space. The same applies to file systems, the File Cache is projected into a real file system, which does not occupy physical space.
In this case, software A and other processes installed in the system can see the registration items and file set of software B, and think it is true. They access and use each other's registry items and file sets as usual.
However, the write and read operations on the registry and file projection of software B are directly targeted at the cache, rather than the locations seen by software A and other processes.
PC on the cloud: Software B in the hidden state
System Environment: there are hidden software B in the system, locally installed software A and other system processes.
S when software B is hidden, the cloud will cancel the projection of the original registry and file of software B, and the process of software A and other systems will not be seen. The effect is equivalent to software B being detached from the system.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.