Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Chapter 10: Creating a Dynamic Data Cent... > Isolated Environments - Pg. 192

192 CHAPTER 10 Creating a dynamic data center with Microsoft System Center With application streaming, you remove the legacy operating system completely and encapsulate the application in its own virtual stream, meeting all requirements once fulfilled by the legacy operating system. Again, this is the less mature technology in the virtualization world, and it may not support all applications. You will need to investigate and test your approach thoroughly. That said, if your application works with this method, you can remove the underlying outdated operating system completely. At that point, you can stream (or present) the application to any currently supported Windows operating system. This approach has another benefit. It allows you to include the components of applications in the encapsulated stream. This is huge when you consider the traditional limitations of certain applications and their inability to reside on the same operating systems with older or newer versions of themselves. An example of this would be the Java runtime. We recently configured a similar scenario in a test environment where I "streamed" Internet Explorer 6, 7, and 8 all to run on the same operating system. This provided the web developer the ability to test his code on various versions of Internet Explorer all running on the same machine and removed the need for three individual test machines, each running a different version of Internet Explorer. ISOLATED ENVIRONMENTS The growing requirements for securing data push data center managers to pro- vide environments that are either partially or completely isolated from the rest of the enterprise environment--while still accessible to certain end users. Over the years, isolated environments have evolved considerably. There were times not so long ago where an isolated environment was easy to imagine--a locked room containing a server or a collection of servers and workstations that simply could not be accessed unless you entered the room. Technology improvements have allowed the locked room con- cept to become less and less of a requirement. Stronger log-in requirements, segmented networks, and firewalls provided the ability for these once segregated environments to be moved back into the data center or reconnected to the general network. However, growing regulatory and common sense security requirements to protect data and audit protection methods are making it more difficult to manage an isolated environment in the general data center. Microsoft System Center includes several components that meet not only the requirements of today's growing data protection needs but also the framework that allows for continued evo- lution and modification to meet the requirements of tomorrow.