Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The User Experience Using Windows Apps on Chrome OS

The User Experience Using Windows Apps on Chrome OS

After a long period, punctuated by no shortness of user demand, Chromebooks can now finally support Windows applications. Well, in a manner of speaking. Let’s examine the process that now allows a user access to the applications once denied to ChromeOS users, to consider if it is worth using after all.

A Few Brief Disclaimers

Before we get into how this is possible, we should mention a few of the prerequisites of this process.

As of right now, the Windows/ChromeOS compatibility is clearly intended for enterprise use, as it is configured for company-wide setups and rings up an annual per-user cost of $70. Furthermore, the method we are covering here is only compatible on higher-end Chromebooks, with at least an i5 or i7 Intel Core processor, 16GB of RAM, and 128GB of onboard storage.

How Does Windows Run on a Chromebook?

By collaborating with a company called Parallels, Google has successfully brought Windows to the Chromebook via the capabilities of a locally installed virtual machine. As a result, any Windows program can be utilized with or without an active Internet connection.

This approach makes the user experience somewhat unique, as the Windows install effectively runs in its own window, almost as if it were simply an application installed in Chrome OS. From within this window, the user can access and utilize the Windows software they need. As a result, it almost feels as though you’re utilizing a remote desktop software, despite the OS being present on your hardware. Starting up the Windows software will take you through the entire boot process you’d typically see in a Windows device, and applying updates will sometimes prompt you to restart the OS environment, rather than your entire device.

How Well Does This All Work?

Besides the unconventional user experience and a few minor oddities, however, hosting Windows on a Chromebook works just the same as using a Windows device. Some of these oddities can even be beneficial—for example, the same system clipboard applies to both environments, allowing you to copy from one OS and paste into the other. The file storage system also works across both platforms, allowing a user to open their Windows files in Chrome, even if the Windows environment is inactive.

According to reports on Parallels’ process, the only thing that doesn’t work as intended is the recording capability within the Windows environment (although there are currently efforts to resolve this issue in the works). You can even include custom business applications along with more common solutions… you just need to make sure that your Windows environment is configured correctly.

Why Would Google Do This?

It would appear that Google has seen the value of providing support for legacy applications—this entire initiative has been framed with that concept at the forefront—so that companies who rely on these applications can continue to operate effectively. So, despite the slight difference in how native these Windows applications seem as compared to those that are web-based or work within the Chrome or Linux operating systems, these changes only foreshadow further improvements to come, and a new perspective into how computing will need to be shaped in the future.

Don’t assume that you can simply take your existing budget Chromebook and install Windows on it off the bat, but it will be nice seeing more options for low-cost hardware that plays nicely with the network environments that most businesses already have.

What do you think? Do you see any utility in the Chrome operating system playing nice with Windows applications? Let us know what you think in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Virtualization Saving Money Tech Term Holiday Social Media Chrome Gadgets Managed Service Automation Managed IT Services Microsoft Office Artificial Intelligence Computers Facebook Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Networking IT Support Health Hacking Internet of Things Office 365 Information Telephone Systems Covid-19 Information Technology Managed Service Provider Remote Spam Alert Bandwidth Recovery Employer-Employee Relationship Router BDR Social Engineering Mobility Mobile Computing Password Money App History Application Encryption Applications Data Breach Human Resources Big Data Law Enforcement Remote Monitoring Managed IT Paperless Office How To Apps Office Tips Training Data Storage Patch Management VPN Government Remote Computing Private Cloud Mobile Office Blockchain Flexibility Marketing Bring Your Own Device Data Management WiFi Work/Life Balance IT solutions Entertainment Website Budget Wireless Infrastructure Voice over Internet Protocol Vulnerability Gmail Google Drive Windows 7 Settings Word Servers Two-factor Authentication Avoiding Downtime Mouse HaaS Data Security Meetings Telephone System Staff Software as a Service Machine Learning Vendor Cleaning Remote Work Connectivity Risk Management Managed Services Display Hacker USB End of Support The Internet of Things Education Physical Security Lithium-ion battery Employee/Employer Relationship Conferencing Safety RMM HIPAA Scam Sports Redundancy Firewall Keyboard Data Protection Vendor Management Virtual Reality Apple Social User Error Save Time Samsung Computer Accessories Data storage Wearable Technology Automobile Hard Drives Retail Value Instant Messaging Managed Services Provider Robot Computing Infrastructure Update Excel Electronic Medical Records Going Green Database Spam Blocking Printer Biometrics Remote Workers Bluetooth Virtual Desktop Google Docs Hiring/Firing Identity Theft Battery Processor DDoS Shadow IT Legal SharePoint Hard Drive Augmented Reality IT Consultant Internet Exlporer Fraud Business Intelligence Computing Remote Worker Humor Customer Service PDF Worker Environment Audit IT Management Cryptocurrency Proactive IT Fax Server Botnet IT Plan Best Practice YouTube Digital Signage SaaS Comparison Black Market Unsupported Software CES Network Congestion Charger Business Technology eWaste Document Management Content Management Procurement Wireless Technology Net Neutrality Access Control Solid State Drive Compliance Workplace Strategy How to Computer Care Virus Downtime OneNote Virtual Assistant Help Desk Current Events Unified Threat Management Printing Telephony Authentication Cables Cost Management Video Conferencing ROI Root Cause Analysis Bitcoin HBO Shortcuts Managing Stress Knowledge Social Networking Colocation Music Sales Uninterrupted Power Supply Point of Sale Personal Skype Project Management Cryptomining Nanotechnology Telecommuting Data loss Cortana Cameras Monitor Supply Chain Management Batteries Outlook Running Cable Leadership Digital Signature Troubleshooting Monitoring Windows 8.1 Memory Digitize Start Menu Warranty Screen Mirroring HVAC Loyalty Google Apps Reputation Streaming Media Windows Server 2008 R2 Frequently Asked Questions Content Analysis Books Customer relationships Tech Support Email Best Practices Laptop IT Assessment Mobile Administrator Manufacturing Windows 10s Devices Techology Cast Enterprise Content Management Printer Server Customers Managed IT Service Tip of the week MSP Security Cameras Audiobook webinar Accountants Emergency Computer Tips Science Employer Employee Relationship Credit Cards Virtual CIO Touchpad OneDrive Professional Services Microchip Biometric Security Public Cloud Thought Leadership Password Management Assessment Password Manager Peripheral Using Data Windows Server 2008 Distributed Denial of Service Politics Customer Relationship Management Advertising Multi-Factor Security Digital Security Cameras Analyitcs Copiers Tools Search Engine 5G Twitter NIST Television Business Mangement Programming Quick Tip Notifications Smartwatch Smart Tech Trending Ergonomics Amazon Development OLED Addiction Antivirus Public Computer Recycling Relocation PCI DSS Virtual Machine Windows 8 Fiber Optics Regulations Wiring Employee Practices Transportation 2FA IT service Video Games Rootkit Amazon Web Services Messaging Cabling Computer Fan Cache Consultant Safe Mode Worker Commute Criminal Analytics Policy Hypervisor Tablet Trend Micro GDPR Experience Workers Hosted Computing Benefits Dark mode Best Available Domains Scalability Online Shopping SMS Default App FENG Wireless Internet File Sharing WIndows 7 Business Owner IBM Procedure Saving Time NarrowBand Shopping Flash Camera Google Search IaaS Inventory Maintenance Smart Technology Specifications dark theme Search Evernote Bloatware AI IT Infrastructure Wire Software Tips Bing Supercomputer iPhone Travel FinTech Tablets Social Network Sync Printers Emails Millennials Wireless Charging Entrepreneur Investment Smart Office User PowerPoint Files Employees Windows Media Player Employee/Employer Relationships Windows 365 Chromecast Virtual Private Network ISP Netflix Shortcut Two Factor Authentication Workforce

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code