A typical deployment would involve several applications that would communicate through shared files and directories, and switch between each other through carefully designed scripts or batch files.
Of course, eventually the threats in both the past and present mount, and you're evading death by the narrowest of margins by using time switch like a dodge button.