Beruflich Dokumente
Kultur Dokumente
ents of VM
With the complim
VMware Special Ed
ition
s
n
o
i
t
a
c
i
l
App
Learn to:
Overcome app delivery and
management challenges
Build a winning
applicationstrategy
Charles Barrett
Mark Ewert
Ben Goodman
About VMware
VMware is a leader in cloud infrastructure and
business mobility. Built on VMwares industry-leading
virtualization technology, our solutions deliver a
brave new model of IT that is fluid, instant and more
secure. Customers can innovate faster by rapidly
developing, automatically delivering and more safely
consuming any application. With 2014 revenues of
$6 billion, VMware has more than 500,000 customers
and 75,000 partners. The company is headquartered
in Silicon Valley with offices throughout the world
and can be found online at www.vmware.com.
Applications
Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
About This Book ...................................................................................1
Foolish Assumptions ............................................................................2
How This Book is Organized ..............................................................2
Icons Used in This Book ......................................................................3
Where to Go from Here ........................................................................3
iv
Table of Contents
Appendix: Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
vi
Introduction
Foolish Assumptions
In writing this book, we made some assumptions about you:
Chapter 1: Its All About the Apps. This chapter sets the
scene for the whole book, giving a brief run-down of apps
and application delivery, and the best approaches to
getting this right.
Introduction
Chapter 1
Understanding Apps
Apps (or applications, to be precise) have been a nuisance
for IT since the dawn of computing, and are split between
client and server applications. This book focuses on the enduser type of applications (applications installed or launched
on a users desktop/mobile device): It covers how they have
evolved, where they are heading (we do a bit of star gazing)
and what you should be focusing on to ensure that your business can move forward, both handling modern applications as
well as supporting the legacy applications that your organization has grown up on.
Applications are some of the most expensive parts of any IT
organization, and they have a profound impact on the performance of the business, either negatively or positively, depending on the way in which they have been implemented. I only
wish my children would heed my advice of only subscribing to
the applications they need access to when I look at their tablet
computers, which are a rainbow of applications. Theycarry a
Vive La (Continuous)
Revolution
The IT industry has undergone significant transitions roughly
each decade, and you can boil those transitions down as
follows:
Licensing: Each delivery method has an impact on licensing options, and those options lead to cost. Work out the
right blend of delivery methods to support your cost
model.
Thats a lot to consider, and I think you will agree (if you are
like me) that you didnt get into IT to patch servers or desktops. You got into IT to make a digital difference and to simplify end-user experience. If so, I also hope you will agree that
there hasnt been a more exciting or complicated time to be in
the world of end-user technology.
We hope you enjoy your read.
Chapter 2
10
11
12
Technology triumphant:
transistors and integrated circuits
The big innovations during this period began with the transistor. In 1955 the transistor started to replace the vacuum tubes
that had provided the computing power for earlier machines.
A fraction of the cost and size of vacuum tubes, requiring
much less power and giving off far less heat, transistors enabled building smaller and smaller computers at lower costs
without reducing performance. Transistors actually enabled
computer processing power to steadily increase through the
sixties as engineers could harness thousands of them to build
systems that would have been simply impractical to build with
enormous and expensive vacuum tubes.
Innovations in transistors led to the development of the
integrated circuit in 1959. Combining advances in the miniaturization of transistors with the advent of semi-conductors,
integrated circuits took thousands of tiny transistors and
connected them together without wires using a conductive
material. Because wires were no longer needed, smaller and
smaller transistors could be created. Early integrated circuits
used germanium, but silicon was soon found to be a superior
13
14
15
16
17
Programmers proliferate
All of these use cases accelerated the development of new
software applications. The availability of affordable computers
also enabled more and more people to learn how to program,
providing the developers were required to meet the demand
for new software. The 1980s saw the founding of Adobe,
18
19
20
21
22
Getting mobile
Since their debut in the mid-2000s, billions of smartphones
and tablets have been sold globally, supported by millions of mobile applications. Although they have largely
23
24
Chapter 3
Word processors
Presentation applications
26
Instant messaging
Social media
Applications which improve our working efficiency include:
Spreadsheets
Calculators
Determining Whether to
Buildor Buy
If the first step is figuring out whether or not you need an
application, the next step is deciding whether to build the
app that is, develop it yourself or buy it.
Whether to build or buy is one of the most contentious decisions in information technology. The first step is truly understanding what you need. You must then marry those needs
with what is available in the market and decide whether whats
already out there fits with what you want.
27
28
29
Will you have to bring back your consultants or developers to update your customizations every time you refresh
the core software?
The answers to these questions may vary based on the customization or the organization, but it is critical to take these
things into consideration as you modify or customize software
to fit your specific needs.
30
31
32
33
34
Chapter 4
Deploying Applications
Before you can use an application, you have to deploy it.
Deployment is simply another term for installation. This section gives you what you need to know on deployment.
36
37
Managing Applications
Like all technology, applications need to be managed.
Application management covers all aspects of the application lifecycle from application selection and handling
requests for new applications, to deployment, application
inventory, license tracking, end-user training, support, patching and planning for application upgrades, and ultimately
decommissioning.
38
Monitoring Applications
You need to monitor applications that are essential to the business. You can monitor applications for availability, health, performance, security and faults, notifying the IT department of
application issues before end users notice anything is wrong.
Many enterprise applications have monitoring capabilities
built in. These applications are able to log errors and automatically send alerts and performance data to support technicians.
If applications do not have comprehensive monitoring capabilities, you can still monitor them using special monitoring
systems. These systems are typically capable of monitoring
multiple applications, and some also keep an eye on the health
of the underlying computer and network infrastructures supporting the application.
However these monitoring systems are often expensive
and complex, requiring a significant investment of time and
resources by IT. For organizations that do not have the capability to support such systems, Software as a Service (SaaS)
applications are a good solution. One of the value-added benefits of SaaS applications is that both the application and its
supporting infrastructure are monitored for the customer by
the SaaS vendor.
39
Securing Applications
Securing the computing infrastructure against misuse and
data theft is absolutely critical, and this includes applications.
Many applications provide access to sensitive and valuable
data. With identify theft and hacker attacks on the rise, you
must properly secure all applications.
Controlling access
The next line of defense is access control. Some applications
have their own mechanism for limiting access to only authorized user accounts. Many applications rely on the devices
operating system and a centralized directory of user accounts
to govern access. This approach helps reduce the burden on
both IT departments and end users as there are fewer user
accounts for IT to track and passwords for users to remember.
Many modern application control systems feature a single
sign-on capability. Single sign-on systems aggregate access to
multiple applications with separate authentication systems
using a single user account. This simplifies access for end
users while providing IT a central point to control and monitor
application usage.
40
Introducing role-based
accesscontrol
Once the user has been authenticated and permitted access,
some applications further limit what the user can do with the
program. Applications with role-based access control (RBAC)
are able to define different classes of users, each with different
levels of authority to use parts of the application. A banking
program for example, might have one role for tellers enabling
them to service customer accounts but preventing them from
creating new ones. A supervisor role could provide all the
capabilities of a teller, plus the ability to monitor the activities
of all tellers. A security officer role would enable monitoring
use of the system to help detect and prevent fraud, but not
allow security staff to manipulate customer accounts. And an
administrator role would provide access to the entire system,
including the ability to assign user accounts to specific roles.
Decommissioning Applications
When you no longer need an application, you should decommission it. Decommissioning an application means removing
it from service. Sometimes you need to do this because a new
application provides a better solution or includes the functionality provided by the one being decommissioned. The need
may also be because of changing business requirements that
make the old application obsolete.
Whatever the reason, when an application is decommissioned
you must remove it from any systems it has been installed
upon. Even if an application is no longer used, it can still cause
conflicts with other applications. Removing decommissioned
41
applications may also be required in order to comply with software license agreements that require an application to be fully
uninstalled when the terms of the agreement end.
Applications that are installed also need to be updated with
security patches, even if they are no longer needed. Leaving
them installed could make it possible for a hacker to use them
to steal data or disrupt the business.
Removing an application from a device is typically the reverse
of the process used to install it. Applications can be manually
uninstalled by technicians or the end user by using the applications uninstallation routine. Most application deployment
systems for computers, tablets and smartphones are also able
to uninstall applications, reversing the process they used to
install them. If the application was installed as part of a system
image, like those used to deploy virtual desktops and hosted
application servers, it can be removed by deploying a new
image.
When you have fully decommissioned an application, be sure
to update application inventories and system documentation
to help maintain a supportable infrastructure.
42
Chapter 5
Innovation, Innovation,
Innovation
To look forward we need to briefly look back, and not too far:
Its only in Chapter 2. IT has evolved at an alarming rate since
its first beginnings in the 1940s, but the one thing that has
remained constant is the velocity at which complexity and
choice has continued to impact organizations. The pace of
innovation has been phenomenal in the last 10 years, to the
point where it is easy to see why end users are disappointed
with the IT they use at work, because in reality they are IT
44
45
HTML5
HTML5 is seen as a silver bullet by many organizations to solve
the challenge of cross platform development, but in reality you
cant beat developing applications that are native to the device,
which can leverage built-in device capabilities. But as we have
already discussed that comes with technical and cost challenges depending on your hardware policy.
An HTML5 mobile app is basically a series of web pages that
are designed to work on a small form factor. HTML5 apps are
device agnostic and can be opened with any modern mobile
browser. HTML5 has become a very popular way for building
mobile applications. Multiple UI frameworks are available for
solving very complex problems that stop you having to reinvent the wheel.
46
Touch features
Fast graphics
Hardware components
Fluid animation
Ease of adoption
Sounds great, right? But remember, you might have a plethora
of devices and operating systems to support across your
business.
Cloud/SaaS
Like it or hate it, cloud is no longer a buzzword with limited
meaning: It has become a de facto standard which organizations are adopting to deliver scalable end-user services. In the
context of end-user applications we are specifically talking
about SaaS applications.
Organizations are adopting SaaS applications, which have historically been in-house services involving, for example, collaboration and messaging, to reduce cost and support the organizations entrance into the cloud era. One of the challenges with
SaaS happens when you need to standardize on an authentication mechanism and wish to provide a single password, to
47
DevOps
As your organization continues to move to a more agile way
of developing business applications that support the mobile
cloud era, a fundamental shift in your development cycle
needs to happen: Hence the industry-wide interest in DevOps.
DevOps is a software development methodology that highlights the importance of communication, collaboration, integration, automation, and measurement of cooperation. DevOps
48
Application virtualization
An industry-accepted way to support legacy applications with
modern ones is Application Virtualization. Many organizations
have a desire to move towards an Application as a Service
model where they are no longer in the business of managing
desktops. Their future vision is SaaS, mobile and browser but
they still have the annoyance of Windows client server applications. This is where application virtualization becomes strategic in your migration plans.
Application virtualization is software technology that
abstracts and encapsulates the application from the underlying operating system on which it is executed. A fully virtualized application is not installed, although it is still executed as
if it were. The application behaves at runtime like it is directly
interfacing with the original operating system and all the
resources managed by it, but can be containerized to varying
degrees.
When you combine this model with your SaaS and mobile
applications you need to aggregate them to the end user to
simplify access. The role of the workspace (amongst others)
49
50
51
Haptic Technology
Haptic technology is tactile technology, which recreates the
sense of touch through the application of force, vibration or
motion to the user via the device they are using. The simulation can support the creation and control of virtual objects,
and further supports the remote control of machines and
devices. Haptic technology will be integrated into the touch
device era on tablets and smartphones, offering up a world
of innovative applications that need to capture user exertion
levels.
Gesture Recognition
Gesture computing has already entered the home through
the gaming world, and offers the ability for humans to communicate with machines without any mechanical devices. The
concept, for example allows an individual to point a finger at
a computer and control the interactions, making traditional
input devices such as mouse, keyboard and touch-screens
redundant.
52
GPS.
53
Geofencing
Geofencing is a feature that uses the GPS or RFID to define
geographical boundaries. A geofence is a virtual barrier. You
as a business can define what happens to the users asset once
they enter or leave the area surrounded by that virtual barrier. You may, for arguments sake, wish for all applications to
be run through a central data center, leveraging technologies
such as VDI, so you can control usage. Again you might force
a user to connect back to the office before consuming SaaS
applications. The advantage of this is that you can then apply
additional security mechanisms to the users session.
Other examples of geofencing might be where a network
administrator can set up alerts so that when a corporate
owned tablet leaves the business premises, the administrator
can disable the device. A marketer can geofence a shop and
send an e-voucher to a customer who has downloaded a particular mobile app when the customer and device enters the
store.
Device Switching
It is highly unlikely that users will consolidate the volume of
devices they have access to over the next five years. In fact
it is estimated that consumers will access on average nine
devices a day. This poses real questions about how we switch
between each device and maintain productivity. Well, if you
have read the entire book so far (I hope you have) you will
have (hopefully) started to piece together both some scenarios and some technologies that can help.
54
Chapter 6
Buying or Building
Applications are fundamentally built to help us do things
more efficiently. If the efficiency gained using an application
is greater than the cost of buying or building it, then you have
the beginning of a business case for that application.
The decision to buy or build an application is a difficult one
and will be different for every use case and every application.
There are diverse toolsets available for building, deploying
and running applications, and you should investigate which
ones make the most sense for you.
56
57
58
Appendix
Resources
60
Charles Barrett has been working in IT for over 18 years as a Consultant, Architect,
Board Director and as a Business Solution Architect at VMware. Charles was also
co-author of the VMware BYOD for Dummies guide released in 2014.
Mark Ewert has been working with IT for over 25 years and has designed hundreds
ofsuccessful IT solutions. Currently Mark is the Lead Technologist on VMwares EUC
Competitive Marketing Team.
Ben Goodman is the Lead Evangelist for VMwares End-User Computing products.
Heis responsible for helping craft and articulate VMwares vision and strategy for enduser computing. Prior to his time at VMware he was the Principal Identity Strategist at
Novell, where he helped build and grow their Identity Management portfolio.
ISBN: 978-1-119-09005-2
Not for resale