The present disclosure relates to methods and systems for providing access to user files. In particular, the present disclosure relates to methods and systems for providing a modifiable virtual machine base image with a personalized desktop environment in a combined computing environment.
In the emerging Virtual Desktop Infrastructure (VDI) space, a personal computer desktop, including its applications, files and data, is separate from the physical machine. Typically, users use advanced terminals (called desktop appliances) to connect to a remote or “virtualized” desktop. In particular, a desktop appliance is a machine allowing a user to access a resource provided by a remote computer via a network display protocol such as Citrix ICA, Microsoft RDP, VNC, or the X11 protocol. Moreover, the desktop appliance may execute a local operating system to handle basic functions, such as receiving user input and rendering the output data generated by the resource provided by the remote computer. The remote desktop is stored on a remote central server instead of on the hard-drive of the local personal computer (i.e. the desktop appliance). Accordingly, The remote desktop may execute a single user operating system, such as Windows XP or Windows Vista, or a multi-user operating system such as Windows Server 2003 or 2008 that allows multiple independent connections to separate virtual desktops, where the different users of the independent connections are capable of having different levels of authorization privileges.
Thus the desktop appliance remotely provides access to a computing environment presenting a desktop paradigm. That is, when users work from the desktop appliance, all of the programs, applications, processes and data used by the desktop are kept and run centrally, allowing users to remotely access their desktops on any device which is capable of displaying the desktop, such as, for example, a PC, a laptop, a smart phone or a thin client.
Although desktop appliances are often referred to as ‘dumb’, they are often highly configurable and perform a high degree of local processing, such as, for example management of local screen and keyboard, management of locally connected devices, and the handling of specific keys and/or key combinations. However, it is often inconvenient and confusing for a user to configure both the local appliance and the virtual desktop since the VDI provides for the perception that the desktop appliance is merely an extension of the remote desktop.
In addition, administrators of modern computing environments face many challenges when providing users with access to resources. One such challenge arises when an administrator uses a product that provides the administrator with the ability to provision many desktops to physical or virtual machines from a single shared base image. This type of product typically simplifies the administrative experience because an administrator only needs to maintain a small number of images, which are deployed to multitudes of users. However, typically, the images deployed to users are transient—when the machine running the image shuts down or reboots, any changes made during the lifetime of the image are lost. If a user were to install a personalized application in these conventional environments, such as, for example, iTunes or Skype, the application would be lost upon reboot of the machine and the user would have to re-install any personalized applications each time the user logged in or powered on the machine. Thus, the end-user experience is sub-optimal in such an arrangement because the user's environment is not persistent. Moreover, the user's provisioned machine does not provide the functionality of a regular machine. Therefore, the experience of the end-user and the administrator are in conflict in such an arrangement—the administrator has simplified image management at the expense of users being able to retain their customized environments.
The solutions attempting to separate user customizations from base machine images typically attempt to do so at a disk block level. For example, linked clones from VMWare, operate at a disk block level, provides a fixed base image and creating delta disk images storing disk block changes made by the users. Although operating at disk block level allows for the rapid deployment of images, once a linked clone has been made, changes can only be made to the delta disk. If changes were made to the base disk, it would conflict with the file allocations on the delta disk, thus compromising the benefits of maintaining a shared image. However, embodiments that operate at a disk block level do not typically provide functionality for changing the base disk image since, in these embodiments, such a change would conflict with the file allocations on the delta disk. Thus, an improved end-user experience typically comes at the expense of administrative experience, particularly with regards to ease of management and maintenance.
Accordingly, there is a need for a system and method to provide the administrative benefit of simplified image management that provisioning servers provided, while providing users an experience that can match or exceed the experience provided by a shared base image.
The present invention describes a system and method for controlling configuration data associated with a property of a desktop appliance via a user interface generated by a remote machine. In addition, the presently described method and system separates a base machine image from the changes made by a user during the machine's lifetime to separate disks. The system then presents a unified view of the disk to the local user, combining the base and user data together.
In one embodiment, a method for modifying a machine base image having a personalized desktop environment includes executing an operating system provided by a base disk deployed by a server, the base disk having a machine base image; capturing, by a filter driver, an instruction from at least one of a plurality of resources to modify a setting stored in at least one of a file system and a registry, the plurality of resources executing inside an isolation environment; redirecting, by the filter driver to a user delta disk, a copy of the modified setting, the modified setting saved in the user delta disk; and merging and storing, by the filter driver, the machine base image and the user delta disk for creating a unified environment, where the modified setting is persistent to the user delta disk. The method further includes restarting at least one operating system associated with the machine base image, where the unified environment is restored and recording, by the filter driver, each modification of the setting stored in the at least one of a file system and a registry, and where the filter driver periodically reports the modification to the user delta disk.
In another embodiment, the method for modifying, in a combined computing environment, a machine base image having a personalized desktop environment, includes executing an operating system associated with a base disk; intercepting, by a filter driver, an instruction from at least one of a plurality of resources to modify a setting stored in one of a file system and a registry, the plurality of resources executing inside an isolation environment; storing, in a delta disk, a copy of the modified setting; restarting the operating system; replacing the setting stored in the at least one of the file system and the registry with the copy of the modified setting stored on the delta disk; and restarting at least one operating system process incorporating the modified setting. The method further includes merging the stored copy of the modified setting with a user data for creating a personalized desktop environment. and recording, by a filter driver, each modification of the setting stored in the at least one of a file system and a registry, and where the filter driver periodically reports the modification to the delta disk. In one embodiment, the modification of the setting stored in the file system or registry is preserved in the delta disk. In another embodiment, the modification of the setting stored in the file system or registry is relinquished when the setting is associated with a read-only request. In addition, the delta disk includes any modifications to the content of the base disk. Moreover, the filter driver includes a registry filter driver for recording any registry operations that occur. In one embodiment, the filter driver includes an executable file system filter driver for sending the modifications to at least one of a base disk and the delta disk. In another embodiment, the filter driver includes a registry filter driver for recording any modification to the register.
In another embodiment, a modifiable machine base image having a personalized desktop environment in a combined computing environment includes a base disk having a plurality of operating files, the base disk deployed by a server; at least one user delta disk having a plurality of applications specified by a user and operating in an isolation environment, the plurality of applications corresponding to changes made to at least one of a file and a registry associated with the base disk; and a filter driver for merging the base disk and the at least one user delta disk into one unified disk having the plurality of operating files and the plurality of applications, where the filter driver records and preserves the plurality of operating files and the plurality of applications in the at least one user delta disk. The modifiable machine base image further includes an executable base machine image associated with the base disk, where modifications to the base machine image are not propagated to the at least one user delta disk, and a plurality of resources, executing inside an isolation environment, associated with the user delta disk. In one embodiment, the filter driver is connected to the plurality of resources, the filter driver captures instructions from the plurality of resources to modify a setting stored in at least one of a file system and a registry; and the user delta disk stores a copy of the modified setting. In one particular embodiment, the modified setting is stored in the delta disk is persistent to the delta disk. In another embodiment, the machine base image further includes a registry filter driver for recording modifications to the registry by a user, the registry filter driver preserving the modification to the user delta disk. In yet another embodiment, the machine base image further includes a file system driver for isolating and recording every modification and a file system isolation driver connected to the file system filter driver for recording modifications made to plurality of applications.
Other aspects, features and advantages of the presently disclosed systems and methods for providing a modifiable machine base image with a personalized desktop environment will be more fully apparent from the following detailed description taken in conjunction with the accompanying drawings, which illustrate, by way of example, the presently disclosed system and method.
Referring now to
Although
The network 104 may be any type and/or form of network and may include any of the following: a point to point network, a broadcast network, a wide area network, a local area network, a telecommunications network, a data communication network, a computer network, an ATM (Asynchronous Transfer Mode) network, a SONET (Synchronous Optical Network) network, a SDH (Synchronous Digital Hierarchy) network, a wireless network and a wireline network. In some embodiments, the network 104 may comprise a wireless link, such as an infrared channel or satellite band. The topology of the network 104 may be a bus, star, or ring network topology. The network 104 may be of any such network topology as known to those ordinarily skilled in the art capable of supporting the operations described herein. The network may comprise mobile telephone networks utilizing any protocol or protocols used to communicate among mobile devices, including AMPS, TDMA, CDMA, GSM, GPRS or UMTS. In some embodiments, different types of data may be transmitted via different protocols. In other embodiments, the same types of data may be transmitted via different protocols.
In some embodiments, the system may include multiple, logically grouped servers 106. In one of these embodiments, the logical group of servers may be referred to as a server farm 38. In another of these embodiments, the servers 106 may be geographically dispersed. In other embodiments, a server farm 38 may be administered as a single entity. In still other embodiments, the server farm 38 comprises a plurality of server farms 38. The servers 106 within each server farm 38 can be heterogeneous—one or more of the servers 106 can operate according to one type of operating system platform (e.g., WINDOWS NT, manufactured by Microsoft Corp. of Redmond, Wash.), while one or more of the other servers 106 can operate on according to another type of operating system platform (e.g., Unix or Linux).
The servers 106 of each server farm 38 do not need to be physically proximate to another server 106 in the same server farm 38. Thus, the group of servers 106 logically grouped as a server farm 38 may be interconnected using a wide-area network (WAN) connection or a metropolitan-area network (MAN) connection. For example, a server farm 38 may include servers 106 physically located in different continents or different regions of a continent, country, state, city, campus, or room. Data transmission speeds between servers 106 in the server farm 38 can be increased if the servers 106 are connected using a local-area network (LAN) connection or some form of direct connection.
Server 106 may be a file server, application server, web server, proxy server, appliance, network appliance, gateway, application gateway, gateway server, virtualization server, deployment server, SSL VPN server, or firewall. In some embodiments, a server 106 provides a remote authentication dial-in user service, and is referred to as a RADIUS server. In other embodiments, a server 106 may have the capacity to function as either an application server or as a master application server. In still other embodiments, a server 106 is a blade server. In yet other embodiments, a server 106 executes a virtual machine providing, to a user or client computer 102, access to a computing environment.
In one embodiment, a server 106 may include an Active Directory. The server 106 may be an application acceleration appliance. For embodiments in which the server 106 is an application acceleration appliance, the server 106 may provide functionality including firewall functionality, application firewall functionality, or load balancing functionality. In some embodiments, the server 106 comprises an appliance such as one of the line of appliances manufactured by the Citrix Application Networking Group, of San Jose, Calif., or Silver Peak Systems, Inc., of Mountain View, Calif., or of Riverbed Technology, Inc., of San Francisco, Calif., or of F5 Networks, Inc., of Seattle, Wash., or of Juniper Networks, Inc., of Sunnyvale, Calif.
In some embodiments, a server 106 executes an application on behalf of a user of a client 102. In other embodiments, a server 106 executes a virtual machine, which provides an execution session within which applications execute on behalf of a user or a client 102. In one of these embodiments, the execution session is a hosted desktop session. In another of these embodiments, the execution session provides access to a computing environment, which may comprise one or more of: an application, a plurality of applications, a desktop application, and a desktop session in which one or more applications may execute.
In some embodiments, a client 102 communicates with a server 106. In one embodiment, the client 102 communicates directly with one of the servers 106 in a server farm 38. In another embodiment, the client 102 executes a program neighborhood application to communicate with a server 106 in a server farm 38. In still another embodiment, the server 106 provides the functionality of a master node. In some embodiments, the client 102 communicates with the server 106 in the server farm 38 through a network 104. Over the network 104, the client 102 can, for example, request execution of various applications hosted by the servers 106a-106n in the server farm 38 and receive output of the results of the application execution for display. In some embodiments, only the master node provides the functionality required to identify and provide address information associated with a server 106b hosting a requested application.
In one embodiment, the server 106 provides the functionality of a web server. In another embodiment, the server 106a receives requests from the client 102, forwards the requests to a second server 106b and responds to the request by the client 102 with a response to the request from the server 106b. In still another embodiment, the server 106 acquires an enumeration of applications available to the client 102 and address information associated with a server 106′ hosting an application identified by the enumeration of applications. In yet another embodiment, the server 106 presents the response to the request to the client 102 using a web interface. In one embodiment, the client 102 communicates directly with the server 106 to access the identified application. In another embodiment, the client 102 receives output data, such as display data, generated by an execution of the identified application on the server 106.
In some embodiments, the server 106 or a server farm 38 may be running one or more applications, such as an application providing a thin-client computing or remote display presentation application. In one embodiment, the server 106 or server farm 38 executes as an application any portion of the CITRIX ACCESS SUITE by Citrix Systems, Inc., such as the METAFRAME or CITRIX PRESENTATION SERVER and/or any of the MICROSOFT WINDOWS Terminal Services manufactured by the Microsoft Corporation. In another embodiment, the application is an ICA client, developed by Citrix Systems, Inc. of Fort Lauderdale, Fla. In still another embodiment, the server 106 may run an application, which, for example, may be an application server providing email services such as MICROSOFT EXCHANGE manufactured by the Microsoft Corporation of Redmond, Wash., a web or Internet server, or a desktop sharing server, or a collaboration server. In yet another embodiment, any of the applications may comprise any type of hosted service or products, such as GOTOMEETING provided by Citrix Online Division, Inc. of Santa Barbara, Calif., WEBEX provided by WebEx, Inc. of Santa Clara, Calif., or Microsoft Office LIVE MEETING provided by Microsoft Corporation of Redmond, Wash.
A client 102 may execute, operate or otherwise provide an application, which can be any type and/or form of software, program, or executable instructions such as any type and/or form of web browser, web-based client, client-server application, a thin-client computing client, an ActiveX control, or a Java applet, or any other type and/or form of executable instructions capable of executing on client 102. In some embodiments, the application may be a server-based or a remote-based application executed on behalf of the client 102 on a server 106. In one embodiments the server 106 may display output to the client 102 using any thin-client or remote-display protocol, such as the Independent Computing Architecture (ICA) protocol manufactured by Citrix Systems, Inc. of Ft. Lauderdale, Fla. or the Remote Desktop Protocol (RDP) manufactured by the Microsoft Corporation of Redmond, Wash. The application can use any type of protocol and it can be, for example, an HTTP client, an FTP client, an Oscar client, or a Telnet client. In other embodiments, the application comprises any type of software related to voice over internet protocol (VoIP) communications, such as a soft IP telephone. In further embodiments, the application comprises any application related to real-time data communications, such as applications for streaming video and/or audio.
The client 102 and server 106 may be deployed as and/or executed on any type and form of computing device, such as a computer, network device or appliance capable of communicating on any type and form of network and performing the operations described herein.
The central processing unit 110 is any logic circuitry that responds to and processes instructions fetched from the main memory unit 112. In many embodiments, the central processing unit 110 is provided by a microprocessor unit, such as: those manufactured by Intel Corporation of Mountain View, Calif.; those manufactured by Motorola Corporation of Schaumburg, Ill.; those manufactured by Transmeta Corporation of Santa Clara, Calif.; the RS/6000 processor, those manufactured by International Business Machines of White Plains, N.Y.; or those manufactured by Advanced Micro Devices of Sunnyvale, Calif. The computing device 100 may be based on any of these processors, or any other processor capable of operating as described herein.
Main memory unit 112 may be one or more memory chips capable of storing data and allowing any storage location to be directly accessed by the microprocessor 110, such as Static random access memory (SRAM), Burst SRAM or SynchBurst SRAM (BSRAM), Dynamic random access memory (DRAM), Fast Page Mode DRAM (FPM DRAM), Enhanced DRAM (EDRAM), Extended Data Output RAM (EDO RAM), Extended Data Output DRAM (EDO DRAM), Burst Extended Data Output DRAM (BEDO DRAM), Enhanced DRAM (EDRAM), synchronous DRAM (SDRAM), JEDEC SRAM, PC100 SDRAM, Double Data Rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), SyncLink DRAM (SLDRAM), Direct Rambus DRAM (DRDRAM), or Ferroelectric RAM (FRAM). The main memory unit 112 may be based on any of the above described memory chips, or any other available memory chips capable of operating as described herein. In the embodiment shown in
A wide variety of I/O devices 134a-134n may be present in the computing device 100. Input devices include keyboards, mice, trackpads, trackballs, microphones, and drawing tablets. Output devices include video displays, speakers, inkjet printers, laser printers, and dye-sublimation printers. The I/O devices may be controlled by an I/O controller 120 as shown in
Referring again to
Furthermore, the computing device 100 may include a network interface 140 to interface to the network 104 through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., 802.11, T1, T3, 56 kb, X.25, SNA, DECNET), broadband connections (e.g., ISDN, Frame Relay, ATM, Gigabit Ethernet, Ethernet-over-SONET), wireless connections, or some combination of any or all of the above. Connections can be established using a variety of communication protocols (e.g., TCP/IP, IPX, SPX, NetBIOS, Ethernet, ARCNET, SONET, SDH, Fiber Distributed Data Interface (FDDI), RS232, IEEE 802.11, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, CDMA, GSM, WiMax and direct asynchronous connections). In one embodiment, the computing device 100 communicates with other computing devices 100′ via any type and/or form of gateway or tunneling protocol such as Secure Socket Layer (SSL) or Transport Layer Security (TLS), or the Citrix Gateway Protocol manufactured by Citrix Systems, Inc. of Ft. Lauderdale, Fla. The network interface 140 may comprise a built-in network adapter, network interface card, PCMCIA network card, card bus network adapter, wireless network adapter, USB network adapter, modem or any other device suitable for interfacing the computing device 100 to any type of network capable of communication and performing the operations described herein.
In some embodiments, the computing device 100 may comprise or be connected to multiple display devices 122a-122n, which each may be of the same or different type and/or form. As such, any of the I/O devices 134a-134n and/or the I/O controller 120 may comprise any type and/or form of suitable hardware, software, or combination of hardware and software to support, enable or provide for the connection and use of multiple display devices 122a-122n by the computing device 100. For example, the computing device 100 may include any type and/or form of video adapter, video card, driver, and/or library to interface, communicate, connect or otherwise use the display devices 122a-122n. In one embodiment, a video adapter may comprise multiple connectors to interface to multiple display devices 122a-122n. In other embodiments, the computing device 100 may include multiple video adapters, with each video adapter connected to one or more of the display devices 122a-122n. In some embodiments, any portion of the operating system of the computing device 100 may be configured for using multiple displays 122a-122n. In other embodiments, one or more of the display devices 122a-122n may be provided by one or more other computing devices, such as computing devices 100a and 100b connected to the computing device 100, for example, via a network. These embodiments may include any type of software designed and constructed to use another computer's display device as a second display device 122a for the computing device 100. One ordinarily skilled in the art will recognize and appreciate the various ways and embodiments that a computing device 100 may be configured to have multiple display devices 122a-122n.
In further embodiments, an I/O device 134 may be a bridge between the system bus 138 and an external communication bus, such as a USB bus, an Apple Desktop Bus, an RS-232 serial connection, a SCSI bus, a FireWire bus, a FireWire 800 bus, an Ethernet bus, an AppleTalk bus, a Gigabit Ethernet bus, an Asynchronous Transfer Mode bus, a HIPPI bus, a Super HIPPI bus, a SerialPlus bus, a SCI/LAMP bus, a FibreChannel bus, or a Serial Attached small computer system interface bus.
A computing device 100 of the sort depicted in
The computer system 100 can be any workstation, desktop computer, laptop or notebook computer, server, handheld computer, mobile telephone or other portable telecommunication device, media playing device, a gaming system, mobile computing device, or any other type and/or form of computing, telecommunications or media device that is capable of communication and that has sufficient processor power and memory capacity to perform the operations described herein. For example, the computer system 100 may comprise a device of the IPOD family of devices manufactured by Apple Computer of Cupertino, Calif., a PLAYSTATION 2, PLAYSTATION 3, or PERSONAL PLAYSTATION PORTABLE (PSP) device manufactured by the Sony Corporation of Tokyo, Japan, a NINTENDO DS, NINTENDO GAMEBOY, NINTENDO GAMEBOY ADVANCED or NINTENDO REVOLUTION device manufactured by Nintendo Co., Ltd., of Kyoto, Japan, or an XBOX or XBOX 360 device manufactured by the Microsoft Corporation of Redmond, Wash.
In some embodiments, the computing device 100 may have different processors, operating systems, and input devices consistent with the device. For example, in one embodiment, the computing device 100 is a TREO 180, 270, 600, 650, 680, 700p, 700w/wx, 750, 755p, 800w, Centro, or Pro smart phone manufactured by Palm, Inc. In some of these embodiments, the TREO smart phone is operated under the control of the PalmOS operating system and includes a stylus input device as well as a five-way navigator device.
In other embodiments the computing device 100 is a mobile device, such as a JAVA-enabled cellular telephone or personal digital assistant (PDA), such as the i55sr, i58sr, i85s, i88s, i90c, i95cl, i335, i365, i570, I576, i580, i615, i760, i836, i850, i870, i880, i920, i930, ic502, ic602, ic902, i776 or the im1100, all of which are manufactured by Motorola Corp. of Schaumburg, Ill., the 6035 or the 7135, manufactured by Kyocera of Kyoto, Japan, or the i300 or i330, manufactured by Samsung Electronics Co., Ltd., of Seoul, Korea. In some embodiments, the computing device 100 is a mobile device manufactured by Nokia of Finland, or by Sony Ericsson Mobile Communications AB of Lund, Sweden.
In still other embodiments, the computing device 100 is a Blackberry handheld or smart phone, such as the devices manufactured by Research In Motion Limited, including the Blackberry 7100 series, 8700 series, 7700 series, 7204 series, the Blackberry 7520, the Blackberry PEARL 8100, the 8700 series, the 8800 series, the Blackberry Storm, Blackberry Bold, Blackberry Curve 8900, and the Blackberry Pearl Flip. In yet other embodiments, the computing device 100 is a smart phone, Pocket PC, Pocket PC Phone, or other handheld mobile device supporting Microsoft Windows Mobile Software. Moreover, the computing device 100 can be any workstation, desktop computer, laptop or notebook computer, server, handheld computer, mobile telephone, any other computer, or other form of computing or telecommunications device that is capable of communication and that has sufficient processor power and memory capacity to perform the operations described herein.
In some embodiments, the computing device 100 is a digital audio player. In one of these embodiments, the computing device 100 is a digital audio player such as the Apple IPOD, IPOD Touch, IPOD NANO, and IPOD SHUFFLE lines of devices, manufactured by Apple Computer of Cupertino, Calif. In another of these embodiments, the digital audio player may function as both a portable media player and as a mass storage device. In other embodiments, the computing device 100 is a digital audio player such as the DigitalAudioPlayer Select MP3 players, manufactured by Samsung Electronics America, of Ridgefield Park, N.J., or the Motorola m500 or m25 Digital Audio Players, manufactured by Motorola Inc. of Schaumburg, Ill. In still other embodiments, the computing device 100 is a portable media player, such as the Zen Vision W, the Zen Vision series, the Zen Portable Media Center devices, or the Digital MP3 line of MP3 players, manufactured by Creative Technologies Ltd. In yet other embodiments, the computing device 100 is a portable media player or digital audio player supporting file formats including, but not limited to, MP3, WAV, M4A/AAC, WMA Protected AAC, RIFF, Audible audiobook, Apple Lossless audio file formats and .mov, .m4v, and .mp4MPEG-4 (H.264/MPEG-4 AVC) video file formats.
In some embodiments, the computing device 100 comprises a combination of devices, such as a mobile phone combined with a digital audio player or portable media player. In one of these embodiments, the computing device 100 is a Motorola RAZR or Motorola ROKR line of combination digital audio players and mobile phones. In another of these embodiments, the computing device 100 is an iPhone smartphone, manufactured by Apple Computer of Cupertino, Calif.
In one embodiment, the server 106 includes a policy engine for controlling and managing the access to a resource, selection of an execution method for accessing the resource, and the delivery of resources. In another embodiment, the server 106 communicates with a policy engine. In some embodiments, the policy engine identifies the one or more resources a user or client 102 may access. In other embodiments, the policy engine determines how the resource should be delivered to the user or client 102, e.g., the method of execution. In still other embodiments, the server 106 provides, responsive to a determination made by the policy engine, a plurality of delivery techniques from which to select a method of execution, such as a server-based computing, application streaming, or delivering the application locally to the client 102 for local execution. In yet other embodiments, an enumeration of a plurality of resources available to the client 102 is provided responsive to a determination by a policy engine regarding whether and how a local machine may access a resource. The policy engine may collect information about the client 102 prior to making the determination.
For embodiments in which the resource is a computing environment, a policy may allow installation of the computing environment on the client 102. In another of these embodiments, a policy may enable the client 102 to access a copy of the computing environment executing in a virtual machine on a server 106. In still another of these embodiments, a policy may enable the client 102 to access a copy of the computing environment executing in a virtual machine on the client 102. In some embodiments, the server 106 identifies an execution machine on which to provision a virtual machine providing access to the requested computing environment. In one of these embodiments, the execution machine is the client 102. In another of these embodiments, the execution machine is the server 106. In still another of these embodiments, the execution machine is a second server 106b. In yet another of these embodiments, where the execution machine is a server 106, the execution machine may provide to a client 102 output data generated by an execution of the computing environment and transmitted to the client 102 according to a presentation layer protocol.
In some embodiments, a server 106 may select a method of providing access to the requested resource that requires the resource to execute within an isolation environment on the execution machine. An isolation environment may consist of a core system able to provide file system virtualization, registry system virtualization, and named object virtualization. The isolation environment may redirect resource requests using a registry filter driver for registry and named object virtualization, and using a file system filter driver for file system virtualization.
In some embodiments, a user isolation environment provides an isolation scope for each individual user accessing an execution machine. In other embodiments, the user isolation environment provides an isolation scope for a group of users, which may be defined by roles within the organization or may be predetermined by an administrator. In still other embodiments, a user isolation environment may be used in multi-user computers supporting concurrent execution of application programs by various users. In still even other embodiments, the user isolation environment may also be used on single-user computers. In yet other embodiments, a virtual machine executes within an isolation environment on an execution machine. In further embodiments, a virtual machine executes outside of an isolation environment on an execution machine and all other resources provided by the execution machine executed within the isolation environment.
In one particular embodiment of the presently disclosed method and system, a system is described for automatically configuring the desktop appliance in accordance with any changes made to a remote desktop. In particular, a system is described for controlling configuration data associated with a property of a desktop appliance by means of a user interface generated by a remote desktop. More in particular, a desktop appliance is provided displaying a user interface generated by a resource executing on a remote desktop. A user interaction component is executed on the desktop appliance. This user interaction component receives an intercepted request by a user to modify a property of the desktop appliance by means of the user interface. It then redirects the intercepted modification to an operating system executing on the desktop appliance. The operating system executing on the desktop appliance then applies the intercepted modification.
With reference to
In one embodiment, base disk 206 stores a virtual machine images, where the virtual machine images are stored on a storage area network (SAN) or, alternatively, in a network-attached storage (NAS). A file server in communication with the SAN makes the virtual machine image accessible as if they were located on the NAS. The execution machine 204 may retrieve the virtual machine image for execution. Alternatively, the execution machine 204 may retrieve the base disk 206 storing the virtual machine image. In one particular embodiment, the execution machine 204 may retrieve additional configuration and data files containing a customized computing environment associated with a user. In another embodiment, the user delta disk 208 stores the additional configuration and data files and is retrieved by the execution machine 204.
In another embodiment, base disk 206 is a physical disk on an execution machine 204. Alternatively, base disk 206 provides access to an operating system. In particular, the base disk 206 is a file having a system disk image, which contains, inter alia, the operating system, applications, data and settings created by an administrator. In accordance with the present disclosure, the administrator may update and add to the content of base disk 206 independently from a plurality of user delta disks. A physical machine (such as, for example, execution machine 204) or a virtual machine (such as, for example, a virtual machine provided by the execution machine 204) can mount the system disk image, and load and execute the operating system on it.
The user delta disk 208 contains any changes to the contents of the base disk 206 requested by a resource accessed by a user. In accordance with one embodiment of the present disclosure, the methods and systems described herein implement a copy-on-write strategy such that if a request to modify a file on the base disk 206 is identified, the file is first copied to the delta disk 208 where the modification is made. If a resource accessed by a user creates new files or makes changes to a registry provided by the base disk 206, these changes are also saved to the user delta disk 208. In addition, when user installs new applications, drivers, or other resources (such as resources 304 (FIG. 3A)), these changes are captured as file and registry changes and are also stored to the user delta disk 208.
The user delta disk 208 may include customizations to the operating system provided by the base disk 206. Alternatively, the user delta disk 208 includes application configuration files allowing a user to customize an application, or it may include a temporarily stored Internet file. In one particular embodiment, the user delta disk 208 identifies items stored in personal folders associated with a user including, but not limited to, folders storing cookies, URLs for favorite sites on the Internet, resources with shortcuts visible on the desktop, resources with shortcuts accessible via a particular menu (such as the Start Menu or a menu of recently accessed applications), folders storing templates, or “My Documents” folders. In yet another embodiment, the user delta disk 208 includes a data file generated by the user during interaction with a resource provided by the execution machine 204.
In one particular embodiment, the use of a plurality of user delta disks 208 is supported by system 200, where system 200 stores a number of previous user delta disks 208, or checkpoints or timestamps within a particular delta disk. Each time a user shuts down a machine, a copy of the user delta disk 208 can be stored. Therefore, the user is permitted to go “back in time” to use the machine in the state it was in a number of sessions in the past (for example, 5 reboots in the past). In addition, the user is provided with additional functionalities (for example, the ability to unwind any changes the user wants to reverse).
As described hereinabove, the user delta disk 208 stores a plurality of settings associated with a user. In one embodiment, the user delta disk 208 stores a registry key associated with the user. In another embodiment, the user delta disk 208 includes a configuration file (e.g. a data file associated with the user for processing by an application). In yet another embodiment, the user delta disk 208 includes an executable file, i.e., the user delta disk 208 may store an application program installed by the user. In this particular embodiment, the user delta disk 208 may include a registry setting (such as, for example, a desktop setting, a resource configuration, an application setting or a security configuration file) associated with the installed application program.
Thus, a user profile is associated with a user or with a group of users is also envisioned. When a user specifies a preference—for example, by resetting a default font, identifying a process for execution upon initiation of an operating system on the local machine, or changing a graphical display element, such as a theme, color, or background graphic a setting in the user profile is updated to reflect the preference. Moreover, when a user specifies a preference, a setting in the user profile is generated. For example, a resource may generate a registry key, data file or configuration file to store an identification of the user-specified preference. Thus, these preferences and settings provide the user with a customized, user-specific environment from session to session.
The user delta disk 208 may include a plurality of settings and files that together define a personalized environment associated with a user. The user delta disk 208 may also include a collection of settings that contain user preferences and configuration settings including, but not limited to, screen color, application-specific configuration preferences, preferences associated with network connections, preferences associated with printer connections, input/output device settings, and window size and position preferences. Moreover, in another embodiment, the user delta disk 208 may include a MICROSOFT WINDOWS user profile.
In one embodiment, the user delta disk 208 includes a registry database storing settings for the user and the computer. Portions of the registry database may be stored in files referred to as hive files. In another embodiment, the user delta disk 208 includes a plurality of profile folders stored in a file system. The profile folders store data and configuration files, identifications of user-specified shortcuts, desktop images, documents, and other user-specific data.
The user delta disk 208 includes files and registry keys specific to an operating system on the execution machine 204. In one of particular embodiment, the user delta disk 208 includes a profile for a user of a local machine executing a WINDOWS operating system. In another particular embodiment, the user delta disk 208 includes configuration settings, applications and data files for a user of a local machine executing a MAC OS operating system. In yet another of embodiment, the user delta disk 208 includes configuration settings, applications and data files for a user of a local machine executing a UNIX or LINUX operating system. In yet another embodiment, the user delta disk 208 includes a profile generated in one environment, which may be accessed and applied to resources executing in a second environment. In this particular embodiment, the profile may be generated on a local machine executing a WINDOWS XP SP1 operating system and accessed by an application executing on a WINDOWS XP SP3 operating system. In yet other embodiment, the user delta disk 208 includes files and registry keys specific to an operating system provided by a virtual machine accessed via the execution machine 204.
With reference to
As illustrated in
In one embodiment, the isolation environment 302 includes a cache memory element (not shown). In another embodiment, the isolation environment 302 has access to a cache memory element. In yet another embodiment, the isolation environment 302 stores a copy of a modified setting reflecting a user customization to a file system or registry on the execution machine 204.
An agent (not shown) on the execution machine 204 creates an isolation environment 302 on the execution machine 204. The agent uses an isolation environment application programming interface to create the isolation environment 302. In addition the agent stores a plurality of application files in the isolation environment 302. The agent may also modify an operating system provided by a virtual machine executing outside the isolation environment 302 by providing access to files, applications and other resources within the isolation environment.
With continued reference to
In one embodiment, the registry filter driver 306 intercepts the registry operations of kernel components and operating system components like csrss.exe, and other processes that do not allow injection of hook dynamic-link libraries. In another embodiment, the registry data is recorded to the user delta disk 208, but not to the base disk 206, such that upon restoration of the environment, the registry filter driver 306 recreates the user registry changes. In yet another embodiment, the registry filter driver 306 recreates the changes by incrementally modifying the data in the base disk 206 to include data from the registry data stored by the user delta disk 208.
System 300 provides whole-machine virtualization, in which all resources executing within or provided by an operating system provided by the base disk 206 execute within an isolation environment. At least one running process may be isolated, or, alternatively, all running processes may be isolated. In addition, a plurality of file requests—such as file open or file write requests—made by a resource may be captured and redirected to the user delta disk 208. Each file access request is redirected to the user delta disk 208, instead of to the base disk 206. If a file is opened for read-only access, no redirection occurs. From the perspective of applications and of the operating system, the files reside on the system disk because the file system isolation driver handles the redirection and merging of files in a way that is transparent to the calling process.
In one particular embodiment, the registry filter driver 306 uses a MICROSOFT WINDOWS registry filter driver model. By using this model, registry filter driver 306 is informed of every registry modification a user requests, allowing the modification to be persisted to the user delta disk. Alternatively, the registry filter driver 306 is informed of at least one registry modification a user requests, allowing the modification to be persisted to the user delta disk. In other embodiments, however, read-only registry requests are not persisted to the user delta disk 208. A registry filter model allows modification of a registry call, allowing the registry operations to occur at runtime.
As well known in the art, the model of operation for the registry is different from that of the file system. For example, a registry filter driver model provides different capabilities on different MICROSOFT WINDOWS operating system versions. For example, on WINDOWS XP, the registry filter driver 306 records a registry modification operation to another portion of the registry, and writes out the results of the recording periodically to the user delta disk 208. On WINDOWS VISTA platforms, the registry filter model does allow redirection of registry operations and the registry filter driver 306 redirects the operation to the user delta disk 208.
Once data is captured to the user delta disk 208, it is possible, on subsequent reboots of the base disk 206, to merge in all of the user data with the operating system provided by the execution of the base disk 206. The computing environment presented to the user, which is a combination of the operating system provided by the base machine (i.e. base disk 206) and the customizations stored in the user delta disk 208, appears to a user to be the same environment as in previous sessions in which the changes were made.
Thus, in accordance with the present disclosure, user delta data is stored in a persistent storage element so that the user delta data is available after a reboot of the execution machine 204. In one particular embodiment, the user delta data is stored in a second hard drive associated with a virtual machine, which may be mapped to a network location. In another embodiment, the user delta data is stored in a virtual hard drive file that resides on a server message block (SMB) share that is mounted to appear as a hard drive on a virtual or physical machine. In yet another embodiment, the user delta data is stored in an SMB share on the execution machine 204. In some embodiments, the execution machine 204 is configured so that the destination for all registry operation request redirection is the user delta disk 208. By redirecting captured registry operation requests to the user delta disk 208, the user's registry data becomes persistent.
With reference to
The registry filter driver 306 is a registry filter driver as described hereinabove in connection with
Following a user log-on event, including, for example, a user-initiated execution of a process, the execution machine 204 generates a combined computing environment. In one particular embodiment, the user executes a “ctxhvminit” process. In another embodiment, the user executes a process that replaces a “userinit.exe” process, which ensures that the user's personalized environment is restored. In accordance with the present disclosure, the user's personalized environment is restored prior to the completion of other log-on events. In addition, restoring a user's personalized environment results in execution of shell functionality (such as start menu, shortcuts, and other functionality provided by a shell) and other customized startup code executed upon user logon.
In one embodiment, the service launches a process to generate an isolation environment 302 in which other resources will execute. Moreover, the service executes the registry filter driver 306, prompting the registry filter driver 306 to begin recording registry operations. In one particular embodiment, the registry filter driver modifies a registry on the execution machine 204 to include customizations identified by data in the user delta disk 208. In another embodiment, registry filter driver 306 accesses a recording store 310 within the user delta disk 208.
In a second embodiment, the service executes a file system filter driver 308. The file system filter driver 308 accesses a definition of the isolation environment to configure a file system on the execution machine 204 for file system API call interception. In one particular embodiment, the execution machine 204 is configured so that the destination for all file system request redirection is the user delta disk 208. By redirecting file requests and intercepted file system API calls to the user delta disk 208, the user's data becomes persistent.
File system 312 is a combination of the base disk 206 and the user delta disk 208. File system 312 may also be a merged version of both the base disk 206 and the user delta disk 208, which are seen by the lower levels of the operating system as two separate drives, either physical or virtual. The file system filter driver utilizes both the base and user delta disks. In one particular embodiment, the data in the user delta disk 208 is merged with the data in the base disk 206 to present a combined computing environment. If a file exists on both the base disk 206 and the user delta disk 208, the newer file is presented. In one embodiment, the registry filter driver 306 merges base disk 206 and the user delta disk 208. In yet another embodiments, the file system filter driver 308 merges base disk 206 and the user delta disk 208.
The service accesses the registry and executes personalized services associated with the user. Data associated with the personalized services is taken from the registry and provided to a service control manager component (not shown) provided by the operating system on the execution machine 102 (
In one embodiment, calls to file system lifecycle and enumeration APIs (like open, close, delete, directory, etc.) are issued by either user mode processes, or other kernel components, and at least one of these calls are intercepted by the file system filter driver. In one of these embodiments, every process in the system has its open and close operations intercepted and redirected, if the file cannot be found on the base disk 206, or if the file is to be modified. When a file on the base disk 206 is modified, it is copied to the user delta disk 208, and then opened and returned to the calling process. Copying a modified file to the user delta disk 208 ensures that changes made during the lifetime of the machine are persisted on the user delta disk 208. A transient modification is made to the base disk 206. Alternatively, the transient modification does not persist and the base disk 206 is not impacted by user changes to the disk.
Calls to registry APIs are issued either by user mode processes, or by kernel components. In one embodiment, at least one of the calls is intercepted by the registry filter driver 306. In one of these embodiments, when a registry key or value is changed, the operation is recorded to another portion of the registry. Unlike in the handling of calls to the file system, the actual key used by the calling process is not redirected. The intercepted registry call is stored to another portion of the registry, which can be considered the root of the difference data for the registry, and, at periodic intervals, the stored registry delta is written out as a file to the user delta disk 208. When the machine starts up and the user delta data is merged with the base disk 206 data, the registry filter driver 306 reads the stored registry delta from the user delta disk 208, and populates the registry of the running VM with the data contained in the registry delta file. In still another of these embodiments, the key used by the calling process is redirected.
With reference to
In one embodiment, a file system filter driver 308 intercepts the request for access to or modification of a file. In another embodiment, the registry filter driver 306 captures the modification to the setting and stores the modification to the user delta disk image 208. In yet another embodiment, at least one of the file system filter driver 308 and the registry filter driver 306 respond to the request with the data retrieved from the user delta disk 208. Registry filter driver 306 may retrieve the data from a merged registry. The file system filter driver 308 will retrieve the file data from either the base disk 208 or the user delta disk 208, whichever has the latest file. In one particular embodiment, at least one of the base disk 206 and delta disk 208 accessed by filter drivers 306 and 308 is hosted on a NAS or SAN on a network 104 (
The intercepted request may be redirected to a second machine 106b, where an agent on the second machine 106b receives the request and transmits data to the execution machine 204 in response to the request. Alternatively, at least one of the file system filter driver 308 and the registry filter driver 306 respond to the request with data retrieved from the base disk 206. In some embodiments, the request is a read-only request.
The methods and systems described by the present disclosure implement a registry filter driver, rather than a hooking component, to intercept registry changes. A method and system providing an environment in which all of the user resources on a machine execute within an isolation environment, is also envisioned. In one particular embodiment, rather than segregate applications from each other, the methods and systems herein result in an environment in which all resources—including services, drivers, data, and other non-application program components—execute in a single isolation environment. Any user changes to a data provided by a base disk 206 and accessed by a resource 304 within the isolation environment 302 are saved to a user delta disk 208. In accordance with the present disclosure, a method for executing all processes within an isolation environment 302 and merging a read-only base with data retrieved from a user delta disk 208, rather than segregating application in separate isolation environments, is referred to as whole-machine virtualization.
In another embodiment, the method for providing a modifiable machine base image with a personalized desktop environment in a combined computing environment includes executing an operating system provided by a base disk; replacing a first setting stored in at least one of a file system and a registry associated with the operating system with a modified copy of the first setting located on a delta disk 208; intercepting, by a registry filter driver 306, an instruction from a resource in a plurality of resources 304 to modify a second setting stored in at least one of the file system and the registry, the plurality of resources 304 executing inside of an isolation environment 320; and storing, in the delta disk 208, a copy of the modified second setting. In one embodiment the method includes providing, to a user associated with the user delta disk 208, access to the modified operating system. In one particular embodiment, the method includes intercepting, by a file system filter driver 308, an instruction from a resource in a plurality of resources to modify a second setting stored in at least one of the file system and the registry, the plurality of resources executing inside of an isolation environment 320, and includes storing, in the delta disk 208, a copy of the modified second setting.
The method further includes restarting the operating system, such as, for example, execution machine 204, a virtual machine executing the operating system, or at least one background process.
The method further includes replacing the second setting with the stored copy of the modified second setting. In one particular embodiment, a filter driver—such as the file system filter driver 308 or the registry filter driver 306—modifies at least one of the file system and the registry to incorporate the modified second setting.
The method further includes restarting at least one background process incorporating the modified second setting. The at least one background process may be a service, a daemon or a device driver. The background process accesses the modified second setting during execution. In addition, the background process started executing at substantially the same time as the operating system restarted. Alternatively, the background process began executing prior to the incorporation of a modified setting into the file system or registry. Restarting the background process allows the background process to access the updated, modified setting rather than the version of the setting on the system at the time of the restarting of the operating system.
The methods and systems described herein provide functionality for overcoming the limitations of systems that do not allow a user to modify his or her computing environment, while preserving the administrative benefits of only having to maintain a small number of images. Thus, the methods and systems described herein provide functionality for decoupling a base disk managed by administrators from the user's environment. Because of the separation of the base and user delta disks, it is possible for an administrator to update the base image as needed without also having to modify the user delta disk.
With reference to
Desktop host 510 may be a remote machine or server 106, as described herein above in connection with
In one embodiment, the desktop appliance 502 is a client machine 102 as described herein above in connection with
In one particular embodiment, the desktop appliance 502 is a Devon IT SAFEBOOK manufactured by Devon IT, Inc., of King of Prussia, Pa. In another embodiment, the desktop appliance is a Chip PC Plug PC manufactured by Chip PC Technologies of Tirat Carmel, Israel and Irving, Tex., USA. In still another embodiment, the desktop appliance 502 is an HP Compaq 2533t or 6720 Mobile Thin Client, or an HP Compaq t5135 or t5730, or an HP Compaq t5530 or t5735 Thin Client, manufactured by Hewlett-Packard Company of Palo Alto, Calif. In yet another embodiment, the desktop appliance 505 is an IGEL Compact series appliance manufactured by IGEL Technology, Inc., of Fort Lauderdale, Fla. In some embodiments, the desktop appliance 502 is a client machine 102 in which the user has limited or no access to functionality provided by a local operating system.
In some embodiments, the desktop appliance 502 executes a plurality of software components that are part of or registered with the desktop appliance operating system. In one of these embodiments, the software components are able to communicate with a broker service and the remote desktop host. In another of these embodiments, the software components are able to support direct uncorrupted interaction with the user by means of locally generated user interface screens and protected user input focus. In some embodiments, the plurality of software components used depends on an operating system executed by the desktop appliance 502.
In one embodiment, the user interaction component 506 controls information displayed to the user and receives input from the user. In another embodiment, the user interaction component 506 is part of an operating system 508 executing on the desktop appliance 502. In another embodiment, the user interaction component 506 is part of, or in communication with, a presentation layer protocol client agent.
With continued reference to
In accordance with the present disclosure, the user will be permitted to make changes to the remote desktop 510, using the standard tools provided by the remote desktop 510 (e.g. the display properties in WINDOWS). When changes are made, the changes are applied to the remote desktop 510 and are also reflected in desktop appliance 502. Desktop appliance 502 then changes its local display settings to match, and, optionally, store these settings so that next time it connects to remote desktop 510, it will retain these settings. Accordingly, the display settings of desktop appliance 502 can be configured, thus relieving the user from having to mange two separate sets of configurations and from having to understand the configuration tools on the desktop appliance 502.
In one particular embodiment, when desktop appliance 502 is unable/unwilling to store configuration, remote desktop 510 will send a unique identifier for desktop appliance 502 during initial connection, together with a timestamp indicating when the display settings were last set locally. Remote desktop 510 then maintains a database mapping the identification of desktop appliance 502 to a display setting, etc. If the display settings are changed, they are reflected to desktop appliance 502 and stored in the database. On subsequent connections, if the database stores more timely information for connecting desktop appliance 502, then desktop appliance 502 is configured to match the same.
In yet another embodiment, remote desktop 510 can be used to make other changes in configuration to be reflected back to desktop appliance 502. For example, in one particular embodiment, if a new device is attached to desktop appliance 502, it may be necessary to configure desktop appliance 502 to recognize and configure the new device. In another embodiment, changes to input devices, such as, for example, keyboard can also be made in remote desktop 510 and be reflected back to desktop appliance 502. For example, if the keyboard is changed, of if the user wishes the current keyboard to behave differently. In yet another example, the screen savers on both remote desktop 510 and desktop appliance 502 can be configured to work in unison, for example with either being used to blank the display and/or display an animation. Moreover, the screensaver of desktop appliance 502 may be used to initiate power saving modes on the display devices.
In operation, the desktop appliance 502 displays a user interface generated by a resource 512. Resource 512 is executed in remote desktop 510 and may be selected from various configurations such as, for example, display management for configuring display devices, keyboard configuration, driver synchronization and screensavers, where changes in the desktop appliance 502 can be made in the context of remote desktop 510. The user interaction component 506 executing in desktop appliance 502 receives an intercepted request by a user to modify a property of desktop appliance 502 via the user interface 504. User interaction component 506 then redirects the intercepted request to operating system 508 of the desktop appliance 502. Operating system 508 then applies the intercepted modification to the property of desktop appliance 502.
In one embodiment, the user interaction component 506 is adapted for storing an identification of the intercepted modification in operating system 508. In another embodiment, remote desktop 510 stores the identification of the intercepted modification. Moreover remote desktop 510 may also apply the modification request to a property of desktop 510.
In yet another embodiment, system 500 may include a second desktop appliance for a request for establishment of a session to the remote desktop 510. In this embodiment, the second desktop appliance will terminate access to the previous resource 512.
Thus, the present disclosure allows a user to configure a desktop appliance 502 without any understanding of the local configuration interfaces for that desktop appliance. In addition, it allows automatic optimization of the best combination of local and remote features, to ensure they work in concert, for example ensuring display resolutions are in sync, or the best choice of local/remote drivers is used. Moreover, the present disclosure allows configuration and plug-and-play capabilities of desktop appliance 502 to effectively be upgraded to those of the remote desktop 510.
With reference to
In one embodiment, desktop appliance terminates the display of the user interface 504 generated by the resource 512. The desktop appliance 502 then receives from the user a request for establishment of access to the resource 512. Then the user interaction component 506 retrieves, from the remote desktop 510, a stored identification of the modification to the property of the desktop appliance 502. Finally, the user interaction component 506 applies the identified modification to the property of the desktop appliance 502.
In another embodiment, the desktop appliance 502 terminates access to the resource 512. A second desktop appliance then receives from the user a request for establishment of a session to the remote desktop 510. The user interaction component 506 then determines, from the remote machine 510, whether to apply a stored identification of the modification to the property of the desktop appliance 502. Finally, the user interaction component 506 applies a second identified modification to the property of the desktop appliance.
In yet another embodiment, an agent executing on the remote desktop 510 receives, from the user interaction component 506, operating system information associated with a property of the desktop appliance 502. The agent then intercepts a request by the resource 512 executing on the remote desktop 510 for operating system information associated with a property of the remote desktop 510. Finally, the agent provides to the resource 512 the received operating system information, in response to the intercepted request. The agent may also intercept the request by the user to modify the property of the desktop appliance 502 by means of the user interface 504. Alternatively, the agent may intercept the request by the user to modify the property of a keyboard connected to desktop appliance 502 by means of the user interface 504. In addition, the agent may intercept the request by the user to modify the property of a screensaver display by the desktop appliance by means of the user interface 504. In addition, the agent may intercept the request by the user to modify the property of an output device connected to the desktop appliance 502 by means of the user interface 504. Finally, agent may intercept the request by the user to modify the property of a display device connected to the desktop appliance 502 by means of the user interface 504.
The systems and methods described hereinabove may be provided as one or more computer-readable programs embodied on or in one or more articles of manufacture. The article of manufacture may be a floppy disk, a hard disk, a CD-ROM, a flash memory card, a PROM, a RAM, a ROM, or a magnetic tape. In general, the computer-readable programs may be implemented in any programming language, LISP, PERL, C, C++, C#, PROLOG, or any byte code language such as JAVA. The software programs may be stored on or in one or more articles of manufacture as object code.
It should be understood that the systems described herein may provide multiple ones of any or each of the components and these components may be provided on either a standalone machine or, in some embodiments, on multiple machines in a distributed system. In addition, the system and methods described above may be provided as one or more computer readable programs embodied on or in one or more articles of manufacture.
Having described certain embodiments of methods and systems for providing a modifiable machine base disk with a personalized desktop environment in a combined computing environment, it will now become apparent to one of skill in the art that other embodiments incorporating the concepts of the disclosure may be used.
The present application claims priority to U.S. Provisional Patent Application No. 61/108,166 filed on Oct. 24, 2008, which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61108166 | Oct 2008 | US |