CN107844356A - A kind of Table top virtualizes user's application strategy implementation method - Google Patents
A kind of Table top virtualizes user's application strategy implementation method Download PDFInfo
- Publication number
- CN107844356A CN107844356A CN201711110216.3A CN201711110216A CN107844356A CN 107844356 A CN107844356 A CN 107844356A CN 201711110216 A CN201711110216 A CN 201711110216A CN 107844356 A CN107844356 A CN 107844356A
- Authority
- CN
- China
- Prior art keywords
- user
- virtual machine
- application strategy
- desktop
- table top
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The present invention relates to a kind of Table top to virtualize user's application strategy implementation method, this method preserves general virtual machine template in desktop virtual system, each user can match corresponding application strategy when logging in virtual machine, i.e. virtual machine is when user logs in, general purpose virtual machine template is loaded first, then the application program used further according to corresponding application strategy loading user, to form the particular virtual machine used for the user, another this method can according to the homoplasy of user it is big the characteristics of form user's group application strategy, all it is identical application program when all users load in i.e. same user's group, to lift the operational efficiency of desktop virtualization.
Description
Technical field
Patent of the present invention is related to computer desktop virtualization field.
Background technology
Desktop virtualization refers to the terminal system of computer(Also referred to as desktop)Virtualized, to reach desktop use
Security and flexibility.We in any place, it is personal can be belonged to by network access by any equipment any time
Desktop system.
First generation desktop virtual technology, truly by the remote access capability and virtual opetrating system of remote desktop
Combine so that enterprise's application of desktop virtualization is also possibly realized.First, the maturation of server virtualization technology, with
And the enhancing of server computational power so that server can provide the computing capability of more table surface operating systems, and manage into
This, safety factor, be not calculated in also in, so the appearance of server virtualization technology so that the enterprise of desktop virtual technology
Sparetime university's sizable application is possibly realized.Certainly, run if simply operation operating system on desktop computer is transformed on server
Virtual machine, and user can not access, certainly will not be by anyone receiving.So the core of virtual desktop and key, no
It is that background server virtualization technology says that desktop is virtual, but allows user can be by various means, any time, anyly
Point, by it is any can networked devices can have access to the ability of the desktop of oneself, i.e. remote network access.And this is rotated back into
With the common ground of application virtualization, i.e., in the high efficiency of remote access protocol.
Second generation desktop virtual technology is further by the running environment of desktop system and installation environment fractionation, application and table
The fractionation in face, the fractionation of configuration file, so as to greatly reduce management complexity and cost, improve the efficiency of management.It is this to tear open
Divide the demand being greatly reduced to storage(199 xp storage is lacked), reduce buying and maintenance cost.It is prior
It is from the efficiency of management, keeper is only needed to an either application progress patch installing or the upgrading of a mirror image, all use
Family can all obtain the result after latest update, and so as to improve the safety and stability of system, workload is also greatly reduced.
During using desktop virtualization, virtual machine adjustment security strategy is daily management caused by occurrences in human life change
In one of work, the operating efficiency of administrative staff can effectively be lifted by how reducing the workload of adjustment security strategy.
Patent of invention content
Patent of the present invention is related to a kind of Table top virtualization user's application strategy implementation method, and this method is in desktop virtualization system
General virtual machine template is preserved in system, each user can match corresponding application strategy when logging in virtual machine, i.e. virtual machine exists
When user logs in, general purpose virtual machine template is loaded first, the application then used further according to corresponding application strategy loading user
Program, to form the particular virtual machine that is used for the user, another this method can according to the homoplasy of user it is big the characteristics of form
User's group application strategy, i.e., during all users' loadings all it is identical application program in same user's group, it is virtual to lift desktop
The operational efficiency of change.
Brief description of the drawings
Fig. 1 is that a kind of Table top of patent of the present invention virtualizes user's application strategy implementation method structural representation.
Embodiment
In order that the object, technical solution and advantage of patent of the present invention are more clearly understood, below in conjunction with accompanying drawing and implementation
Example, patent of the present invention is further elaborated.It should be appreciated that specific embodiment described herein is only explaining
Patent of the present invention, is not intended to limit the present invention patent.
Referring to Fig. 1, a kind of Table top that Fig. 1 is patent of the present invention virtualizes user's application strategy implementation method structure
Schematic diagram.
A kind of Table top virtualizes user's application strategy implementation method, it is characterised in that it is empty that methods described includes desktop
Planization system(10), virtual machine template(11), using a(12a), using b(12b), using c(12c), application strategy(13), it is empty
Plan machine a(14a), virtual machine b(14b), virtual machine c(14c), user a(15a), user b(15b)With user c(15c), this method
Desktop virtual system(10)There is virtual machine template(11), using a(12a), using b(12b)With using c(12c), user a
(15a), user b(15b)With user c(15c)Can first loaded virtual machine template when request logs in virtual machine(11), reload use
Family a(15a), user b(15b)With user c(15c)Match respective application strategy(13)Apply a(12a), using b(12b)With
Using c(12c), to form user a(15a), user b(15b)With user c(15c)The virtual machine a used(14a), virtual machine b
(14b)With virtual machine c(14c).
A kind of Table top virtualizes user's application strategy implementation method, it is characterised in that this method desktop virtualization system
System(10)Middle user a(15a)In matching application strategy(13)After when loading corresponding application program, the application program number that can load
Measure as the positive integer more than or equal to 1.
A kind of Table top virtualizes user's application strategy implementation method, it is characterised in that this method desktop virtualization system
System(10)It is middle to apply a(12a)It can be loaded by the positive integer user more than or equal to 1.
A kind of Table top virtualizes user's application strategy implementation method, it is characterised in that this method desktop virtualization system
System(10)In multiple users be identical application strategy(13)When, multiple users can be created as to user's group, desktop virtualization system
System(10)Application strategy will be carried out to user's group(13)Matching, i.e. user a(15a), user b(15b)With user c(15c)Can
Think user's group a, user's group b and user's group c.
The preferred embodiment of patent of the present invention is the foregoing is only, is not intended to limit the invention patent, it is all at this
All any modification, equivalent and improvement made within the spirit and principle of patent of invention etc., should be included in patent of the present invention
Protection domain within.
Claims (4)
1. a kind of Table top virtualizes user's application strategy implementation method, it is characterised in that it is virtual that methods described includes desktop
Change system(10), virtual machine template(11), using a(12a), using b(12b), using c(12c), application strategy(13), it is virtual
Machine a(14a), virtual machine b(14b), virtual machine c(14c), user a(15a), user b(15b)With user c(15c), this method table
Face virtualization system(10)There is virtual machine template(11), using a(12a), using b(12b)With using c(12c), user a
(15a), user b(15b)With user c(15c)Can first loaded virtual machine template when request logs in virtual machine(11), reload use
Family a(15a), user b(15b)With user c(15c)Match respective application strategy(13)Apply a(12a), using b(12b)With
Using c(12c), to form user a(15a), user b(15b)With user c(15c)The virtual machine a used(14a), virtual machine b
(14b)With virtual machine c(14c).
2. a kind of Table top virtualization user's application strategy implementation method according to claim 1, it is characterised in that should
Method desktop virtual system(10)Middle user a(15a)In matching application strategy(13)After when loading corresponding application program, can
The number of applications of loading is the positive integer more than or equal to 1.
3. a kind of Table top virtualization user's application strategy implementation method according to claim 1, it is characterised in that should
Method desktop virtual system(10)It is middle to apply a(12a)It can be loaded by the positive integer user more than or equal to 1.
4. a kind of Table top virtualization user's application strategy implementation method according to claim 1, it is characterised in that should
Method desktop virtual system(10)In multiple users be identical application strategy(13)When, multiple users can be created as user
Group, desktop virtual system(10)Application strategy will be carried out to user's group(13)Matching, i.e. user a(15a), user b(15b)
With user c(15c)Can be user's group a, user's group b and user's group c.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711110216.3A CN107844356A (en) | 2017-11-12 | 2017-11-12 | A kind of Table top virtualizes user's application strategy implementation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711110216.3A CN107844356A (en) | 2017-11-12 | 2017-11-12 | A kind of Table top virtualizes user's application strategy implementation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107844356A true CN107844356A (en) | 2018-03-27 |
Family
ID=61681563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711110216.3A Pending CN107844356A (en) | 2017-11-12 | 2017-11-12 | A kind of Table top virtualizes user's application strategy implementation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107844356A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109669422A (en) * | 2018-12-29 | 2019-04-23 | 武汉考克利尔工程技术有限公司 | A kind of system of real-time data acquisition |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101754466A (en) * | 2008-12-10 | 2010-06-23 | 运软网络科技(上海)有限公司 | Mobile virtualization base installation and mobile virtualization base platform |
CN104144173A (en) * | 2013-05-06 | 2014-11-12 | 上海宏第网络科技有限公司 | Campus cloud platform system and method based on distributed virtual service technology |
CN105592114A (en) * | 2014-10-22 | 2016-05-18 | 北京云巢动脉科技有限公司 | Application software issuing method in virtual desktop environment |
CN105677342A (en) * | 2016-01-06 | 2016-06-15 | 四川中电启明星信息技术有限公司 | Framework and method for achieving composite desktop virtualization of heterogeneous operating system |
-
2017
- 2017-11-12 CN CN201711110216.3A patent/CN107844356A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101754466A (en) * | 2008-12-10 | 2010-06-23 | 运软网络科技(上海)有限公司 | Mobile virtualization base installation and mobile virtualization base platform |
CN104144173A (en) * | 2013-05-06 | 2014-11-12 | 上海宏第网络科技有限公司 | Campus cloud platform system and method based on distributed virtual service technology |
CN105592114A (en) * | 2014-10-22 | 2016-05-18 | 北京云巢动脉科技有限公司 | Application software issuing method in virtual desktop environment |
CN105677342A (en) * | 2016-01-06 | 2016-06-15 | 四川中电启明星信息技术有限公司 | Framework and method for achieving composite desktop virtualization of heterogeneous operating system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109669422A (en) * | 2018-12-29 | 2019-04-23 | 武汉考克利尔工程技术有限公司 | A kind of system of real-time data acquisition |
CN109669422B (en) * | 2018-12-29 | 2021-09-14 | 宝信软件(武汉)有限公司 | Real-time data acquisition system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108965480A (en) | Cloud desktop login management-control method, device and computer readable storage medium | |
US20150074054A1 (en) | Virtual machine cloning | |
EP2587375A1 (en) | Securely hosting workloads in virtual computing environments | |
CN104951694A (en) | Isolation method and apparatus for management virtual machine | |
Devi et al. | Security in virtual machine live migration for KVM | |
CN106254471A (en) | Resource United Dispatching method and system under a kind of isomery cloud environment | |
CN108900366A (en) | Uniform data central management system and its management method | |
CN104104716B (en) | Virtual desktop system and its method based on cloud computing | |
CN103501295B (en) | A kind of remote access method based on virtual machine (vm) migration and equipment | |
CN104536805A (en) | Resource providing system and method of virtualization platform | |
Hossain et al. | Active & Idle Virtual Machine Migration Algorithm-a new Ant Colony Optimization approach to consolidate Virtual Machines and ensure Green Cloud Computing | |
Kanthimathi et al. | An enhanced approach of genetic and ant colony based load balancing in cloud environment | |
CN109309581B (en) | Container management system crossing hardware architecture | |
CN112995112A (en) | Resource management method of cross-cloud management platform | |
CN106850695A (en) | Strange land isomery virtualized management method, apparatus and system under a kind of cloud computing environment | |
CN107844356A (en) | A kind of Table top virtualizes user's application strategy implementation method | |
Rathod | A survey on different virtual machine placement algorithms | |
CN107918732A (en) | A kind of desktop virtualization virtual machine (vm) migration security policy manager method | |
Joshi et al. | Cloud computing: architecture & challenges | |
CN108268307A (en) | A kind of Table top virtualizes live migration of virtual machine implementation method | |
Jeincy et al. | A secure virtual machine migration using memory space prediction for cloud computing | |
Muñoz et al. | How to run scientific applications with dirac in federated hybrid clouds | |
CN108365970A (en) | A kind of automatic realization of debugging method of virtual desktop net card failure | |
Fanning et al. | Virtualization: What are the security risks? | |
CN105897890A (en) | Intelligent terminal application cloud preview system and method of realizing intelligent terminal target application preview through cloud service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180327 |
|
WD01 | Invention patent application deemed withdrawn after publication |