Skip to main content

Xenocode Introduces New Application Virtualization Technology

I spoke to Kenji, the CEO some days back and we will publish his interview soon!


SEATTLE, WA May 20, 2008 — Xenocode, a next-generation virtualization company, today launched its flagship offering, Xenocode Virtual Application Studio. Xenocode is a next-generation application virtualization technology that allows Windows, .NET, and Java-based desktop applications to be deployed in standalone executables that run instantly and reliably, anywhere. Xenocode virtualization technology frees organizations from lengthy application setup and configuration, eliminates software conflicts and incompatibilities, and enables instant deployment via portable USB devices, intranets, the Internet, or existing desktop management infrastructure.

"Application virtualization is the next wave of virtualization technology, with compelling performance, flexibility and economic advantages over traditional hardware virtualization," Kenji Obata, Xenocode founder and chief executive officer. "With Xenocode's application virtualization technology, organizations can largely eliminate the enormous costs, risks and limitations associated with traditional desktop application deployment and enable a new level of application portability."

Xenocode Application Virtualization: Frees Applications from the Underlying OS

Xenocode specializes in application virtualization, a sophisticated technology that separates applications from the underlying operating systems on which they execute. Unlike traditional hardware virtualization solutions that require an entire copy of the host operating system, Xenocode's lightweight application virtualization technology emulates core operating system features required for application execution. As a result, applications deployed with Xenocode have essentially the same performance characteristics as native executables. “Xenocoded” applications require no setup, configuration, clients, or device drivers, are isolated from external DLL and dependency conflicts, and run properly on Windows Vista and locked-down desktops. Xenocode-virtualized applications can be easily deployed on USB devices, corporate intranets, the Internet, or existing desktop management infrastructure software such as Microsoft SMS, LANDesk, BMC, and ZENWorks. For example, using Xenocode, users can:

  • Run legacy applications without errors or UAC prompts on Windows Vista and locked-down desktops.
  • Use otherwise incompatible applications side-by-side, or multiple versions of a given application, such as Microsoft Office 2003 and 2007, simultaneously.
  • Carry applications on portable USB keys, available for instant execution on laptops or kiosks along with all user data and settings.

Xenocode Virtual Application Studio is an authoring environment that allows IT professionals to easily convert their existing Windows, .NET, and Java-based applications into virtualized applications ready for instant deployment. Xenocode-enabled applications are run on the Xenocode Virtual Operating System, a lightweight micro-kernel embedded within each virtualized application executable, allowing virtual applications to be executed without any separate client install, device drivers, or player software.

Xenocode Virtual Application Studio is available today. For more information or to download a free evaluation, please visit www.xenocode.com.

About Xenocode

Xenocode develops next-generation virtualization technologies that make applications available instantly and reliably, anywhere. The Xenocode Virtual Application Studio authoring environment and Xenocode Virtual Operating System allow IT professionals to deploy applications in lightweight, pre-configured virtual executables that run instantly on any Windows desktop via intranets, the Internet, USB keys, or existing desktop management infrastructure. Xenocode was founded in 2002 and consists of a team of veteran Microsoft engineers and academic researchers. Today, its customers include thousands of industry-leading consulting, financial, government, military, and technology companies, and tens of thousands of independent IT professionals. Xenocode is based in Seattle, Washington.

Comments

Post a Comment

Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to IdeationCloud.com; 1st Jan 2009 live

YOU DON'T HAVE TO DO ANYTHING. WITHIN 2 SECONDS YOU WILL BE REDIRECTED TO THE NEW HOME OF AVASTU BLOG. PLEASE DO UPDATE AVASTU BLOG'S URL to : http://www.ideationcloud.com on your website.

I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)




Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to IdeationCloud.com - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…