Language Selection

English French German Italian Portuguese Spanish

VirtualBox Seamless Mode: The only way to virtualize

Filed under
Software

I’ve been putting off writing about VirtualBox for a while now (mostly because other topics have come to the front of my mental queue.) But when I finally started poking around at some of the nuances of this tool I realized that I had to bring it up here on Techrepublic. One of those “nuances” (if you can actually call it that) is Seamless Mode. To sum it up, Seamless Mode is amazing. If you’ve not tried it (or VirtualBox) you are missing out on a feature that can help to make the guest operating system seem, well, seamless within the host.

But seamless isn’t something new. VMWare started it with their “Unity” mode (which in turn is a direct copy of the “Coherance” feature in OS X’s Parellels Desktop.) But VirtualBox does all of this under the GPL 2 (If you’re using VirtualBox OSE) and for free.

I have used plenty of virtualization tools. I started using VMWare back when it was first released. I had to do this when working in an environment that required I use a certain template for documents that I had trouble using in Linux. With the help of VMWare I was able to use this template in a guest Windows operating system on a Red Hat host. Back then there was no “Unity”, “Seamless”, or “Coherance” (heck there wasn’t an OS X at that point.) so I was always working in a window within a window within a desktop. When other users would see this it would confuse them…very common reaction to new users trying to work with virtual machines. The very concept of VMs escape them. Imaging having to explain to an new user they are working on a “program in an operating system within an operating system”. For the average user this is too much information. And that’s why the VirtualBox seamless mode is a perfect solution for a problem that could easily plague admins.

rest here




More in Tux Machines

35 Open Source Tools for the Internet of Things

In a nutshell, IoT is about using smart devices to collect data that is transmitted via the Internet to other devices. It's closely related to machine-to-machine (M2M) technology. While the concept had been around for some time, the term "Internet of Things" was first used in 1999 by Kevin Ashton, who was a Procter & Gamble employee at the time. Read more

IoT tinkerers get new Linux hub & open platforms

Cloud Media, the maker of entertainment box Popcorn Hour, launched a project on Kickstarter, Inc. that will add to the growing number of smart hubs for people to connect and control smart devices. Called the STACK Box, it features a Cavium ARM11 core processor, 256MB DDR3 RAM, 512MB flash, SD slot, 802.11n WiFi, Bluetooth LE 4.0, Z-Wave, standard 10/100 Ethernet port, optional X10 wired communication, 5 USB 2.0 ports, RS-232 port, 2 optocoupler I/O, Xbee Bus, Raspberry Pi-compatible 26-pin bus and runs Linus Kernel 3.10. IT also features optional wireless communications for Dust Networks and Insteon with RF433/315, EnOcean, ZigBee, XBee, DCLink, RFID, IR coming soon. Read more

Citrix and Google partner to bring native enterprise features to Chromebooks

Chromebooks are making inroads into the education sector, and a push is coming for the enterprise with new native Chrome capabilities from Citrix. Google and Citrix have announced Citrix Receiver for Chrome, a native app for the Chromebook which has direct access to the system resources, including printing, audio, and video. To provide the security needed for the enterprise, the new Citrix app assigns a unique Receiver ID to each device for monitoring, seamless Clipboard integration across remote and local applications, end user experience monitoring with HDX Insight, and direct SSL connections. Read more

Is Open Source an Open Invitation to Hack Webmail Encryption?

While the open source approach to software development has proven its value over and over again, the idea of opening up the code for security features to anyone with eyeballs still creates anxiety in some circles. Such worries are ill-founded, though. One concern about opening up security code to anyone is that anyone will include the NSA, which has a habit of discovering vulnerabilities and sitting on them so it can exploit them at a later time. Such discoveries shouldn't be a cause of concern, argued Phil Zimmermann, creator of PGP, the encryption scheme Yahoo and Google will be using for their webmail. Read more