Solved

App-V info & documentation

Posted on 2010-11-16
4
538 Views
Last Modified: 2012-05-10
Hello,

I'm looking for App-V information & documentation that explains better what App-V does than the Microsoft website.

Can anyone recommend a book or website?

Thanks in advance
0
Comment
Question by:NR_EIS
  • 2
4 Comments
 
LVL 74

Accepted Solution

by:
Jeffrey Coachman earned 167 total points
ID: 34151548
0
 
LVL 4

Assisted Solution

by:jhindson
jhindson earned 167 total points
ID: 34154922
Here is are a couple of useful links I've found recently for App-V -
http://www.tmurgent.com/
http://www.msigeek.com/3113/application-virtualization-app-v-4-6-video-demonstrations-and-tutorials-from-springboard-series
http://blog.stealthpuppy.com/
http://blogs.technet.com/b/appv/archive/2007/11/13/softgrid-operations-guide-part-1.aspx
http://blogs.technet.com/b/appv/archive/2007/11/14/softgrid-operations-guide-part-2.aspx
http://www.sylvari.org/blog/category/app-v/

Here is a link to an eBook specific to App-V OSD scripting - http://www.lulu.com/product/ebook/app-v-osd-reference-book/13621218

Cerling's book is very useful as well for learning about the entire Microsoft virtualization stack. The App-V section was written by Richard Ruiz a former Softricity consultant.
0
 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 34155491
jhindson,

Thanks, those links were useful to me as well..
;-)

Jeff
0
 
LVL 15

Assisted Solution

by:msmamji
msmamji earned 166 total points
ID: 34166305
Mastering Microsoft Virtualization (as recommended by Jeff) is a very good book.

I would also recommend looking at these videos.
Application Virtualization 4.6 and Office
http://www.msteched.com/2010/NorthAmerica/VIR209

Sequencing Deep Dive: Efficiently Making Your Applications Virtual
http://www.msteched.com/2010/NorthAmerica/VIR320

Effectively Debugging Complex Application Sequencings
http://www.msteched.com/2010/NorthAmerica/VIR321

Regards,
Shahid
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Deploying a Microsoft Access application in a Citrix environment is not difficult but takes a few steps. However, Citrix system people are often of little help, as they typically know next to nothing about Access. The script provided here will take …
OfficeMate Freezes on login or does not load after login credentials are input.
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
The viewer will learn how to use the =DISCRINV command to create a discrete random variable, use this command to model a set of probabilities and outcomes in a Monte Carlo simulation, and learn how to find the standard deviation of a set of probabil…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now