How to Solve User Logon Issues with the FREE Logon Simulator Software for...
One of the most important parts of a successful XenApp and/or XenDesktop implementation, wherever it’s an on-premises or in the Public Cloud implementation, is definitely the testing phase at the end....
View ArticleVMware Unified Access Gateway 3 of 5 – Deploy with vSphere OVF and Admin Console
This video is third in a series of five covering the VMware Unified Access Gateway. It describes and demonstrates how to deploy using the vSphere OVF method. Learn more at...
View ArticleVMware Unified Access Gateway 4 of 5 – Deploy with PowerShell
This video is fourth in a series of five covering the VMware Unified Access Gateway. It describes and demonstrates how to deploy using the PowerShell method. Learn more at...
View ArticleVMware Unified Access Gateway 5 of 5 – Scaling, Upgrades, Authentication,...
This video is fifth in a series of five covering the VMware Unified Access Gateway. This includes details on scaling, upgrading, authentication options, logs and some troubleshooting. Learn more at...
View ArticleVDI Lockdown 1.0: Securing your Deployment – E2EVC Video
Session from @E2EVC 2017 Orlando. For event information please visit www.e2evc.com/home. For slides, additional info etc please contact the presenter directly on Twitter. For best video and sound...
View ArticleCitrix Video: Contextual access to apps and data anywhere, any time, on any...
Business desktops and applications, delivered as a service, are available to users anywhere, anytime, on any device. But what about the security aspects? There may be some instances where users,...
View ArticleOverview of Horizon Cloud and Microsoft Azure Prerequisites
The first video in a series of four is an overview of how Horizon Cloud works on Microsoft Azure, and the prerequisites for deploying a Horizon Cloud Node This video is from the fine folks at VMware EUC.
View ArticleSecurely deliver apps and desktops to any enterprise, from any cloud
Around the globe, people work from just about everywhere. And for organizations, those workers are often a mix of contractors, and employees. For IT, maintaining security with user identity, can be a...
View ArticleCitrix Video: Restore data after ransomware attack
Ransomware attacks are far more than an inconvenience. They can be costly, and literally bring business operations to a halt. That’s something that’s been well documented in the news headlines… big...
View ArticleCisco: The Role of Assessment in an Effective Innovation Maturity Model
In the previous blogs of this series, we discussed the importance of building an Innovation Maturity Model (IMM) that properly addresses each organization’s innovation strategy. In this final blog, we...
View ArticleCitrix: “Unsinkable”: The Myth of Foolproof IT Security
Arguably, though, the word most commonly associated with the storied ship is “unsinkable.” The advertisement and marketing campaign prior to the ship’s launch was focused exclusively on this claim....
View ArticleWhy ransomware is a real threat regardless the industry
What would you do in case of a ransomware attack? This is a question I have heard a lot lately and I wish there was a simpler answer for it. Ransomware attacks have increased in numbers and complexity...
View ArticleHub in Bucharest Exceeds 350 Employees
Provides critical operational support to Veeam’s expanding global business Opened in late 2015, the office provides marketing, finance, sales and technical support, attracting the very best talent from...
View ArticleVDI for $200k in 9 Months, or DaaS in a Day?
In previous blogs we’ve discussed many reasons why customers are looking for alternatives to legacy VDI solutions, those we refer to as VDI 1.0. It comes down to two primary reasons why those outdated...
View ArticleVMware launches vRealize Suite 2017 – how does it fare?
With new evaluation criteria added to our Cloud Management Platform (CMP) comparison at WhatMatrix, it was time to (re)evaluate the latest versions of the different CMP solutions that are included in...
View ArticleNAKIVO Talked VM Data Protection at TECH Meets in Poznan
Recently, several NAKIVO team members headed to the city of Poznan, Poland, to attend TECH meets – a data protection event held by FEN. FEN distributes and provides pre-sale and after-sale support for...
View ArticleDataCore Tech Cranks Wheezing SQL Servers to Ridiculous Speeds
Parallelising IO is like punching hyperspace button DataCore has crafted a driver for SQL Server that runs IO requests simultaneously and increases throughput. The company’s parallel IO technology has...
View ArticleCitrix Project Chrysalis: Transforming Business for Application ISVs
Application developers are being challenged by their customers and competitors to deliver their desktop or workstation applications as cloud-based services, without compromising usability or security....
View ArticleVMware vSphere Integrated Containers – Application Repackaging
Eduardo Meirelles da Rocha created an interesting blog post about Integrated Containers. You can find his blog here, with all comments or simply scroll down. When talking about containers it’s...
View ArticleAmazon AppStream 2.0 Reduces User Fees by 89% for Qualified Educational Users
Starting today, qualified educational customers can reduce their Amazon AppStream 2.0 user fee by 89% from $4.19 per user per month to $0.44. The user fee is required for every AppStream 2.0 user as...
View ArticleVMware Video: How to Create a Multi-Cloud Strategy
A common challenge our customers face is how to manage all the different kinds of cloud activity in their organization. Reg Lo, Director Advisory Services, provides insights in governing, managing and...
View ArticleView DDoS Attack Trends Across AWS
AWS Shield Advanced, a managed Distributed Denial of Service (DDoS) protection service, now provides the global threat environment dashboard that shows DDoS trends and metrics across Amazon CloudFront,...
View ArticleCitrix Video: Maintain control of documents and files you share with others
It’s something we do all the time. Sending a file to someone else, sharing data. But what happens when you press send on that email? The file attachment is gone and out of of your control. You have no...
View ArticleCisco: Introducing the First Benchmark Standard for HCI
Industry standards enable fair competition and provide an objective “truth” to the customers. No one buys a car without first inquiring about its miles per gallon and vehicle safety ratings. Prior to...
View ArticleCitrix XenDesktop Essentials Makes Migrating to Windows 10 Easy and Inexpensive
Now you can deliver a Windows 10 Enterprise desktop powered by Citrix HDX technology for as little as $32.72 per user per month, and that includes the costs for both Citrix software and Azure...
View ArticleCitrix Visibility and Analytics: The Missing Piece to Great Application Delivery
Watch this video to find out how Citrix NetScaler Management and Analytics System (MAS) enables: – Visibility into your on-premises and hybrid/multi-cloud application infrastructure – Real-time...
View ArticleCitrix NetScaler Master Class Video – November 2017
Welcome to the Citrix NetScaler Master Class. Get details on latest features of NetScaler, tips and tricks for easy configuration, and interact with our NetScaler product experts. Learn more at Agenda:...
View ArticleDataCore Announces New Versions of Software-Defined Infrastructure Products
According to a recent press release, “DataCore Software today announced new features and enhancements to advance its software-defined infrastructure product family, which includes SANsymphony™ and...
View ArticleReview of eG Enterprise Express Free Logon Simulator
Christiaan Brinkhoff, Sr. Workspace Consultant at Detron, The Netherlands, has published an independent review of the eG Enterprise Express Free Logon Simulator for Citrix XenApp and XenDesktop. Check...
View ArticleCitrix XenMobile branded for your company
Session from @E2EVC 2017 Orlando. For event information please visit www.e2evc.com/home. For slides, additional info etc please contact the presenter directly on Twitter. For best video and sound...
View ArticleVMware: Leading our Industry into a Software-Defined Future with Strategic M&A
At VMware, we’ve been a pioneer and leading innovator in “software defined” for nearly two decades. To get there, we have championed our own internal innovation, and augmented those efforts with...
View ArticleChasing Bad Versus Ensuring Good
Security is a thing we have to deal with more ever than before. At vEUCTechCon I presented a session about securing the workspace. The intend of that session was to create awareness of threats out...
View ArticleVMware Cloud on AWS – Video
Bring the VMware Software-Defined Data Center to Amazon Web Services with VMware Cloud. In this webinar we will dive into the compute, network and storage architecture of the VMware Cloud on AWS...
View ArticleCitrix XenMobile Education Configuration: Configure XenMobile for Apple...
This is the second of two videos about integrating Apple Education features with XenMobile. View the first video here: This video is from the fine folks at Citrix
View ArticleMicrosoft Video: Surface Pro with LTE Advanced – An engineer’s tour
The new Surface Pro with LTE Advanced, comes with a purpose-built state of the art LTE architecture for a new class of always on connectivity from almost anywhere on the planet. As Tim Golik, Director...
View ArticleNVIDIA Video: Speeding Cell Development with Berkeley Lights
Discover how Berkeley Lights is enabling precise cell by cell selection and manipulation to empower: cell line development, antibody discovery and engineering, and manufacturing of personalized...
View ArticleWhy Your Data Center Needs a Fast Path to Software-Defined Storage (SDS)
As your business goes after new revenue opportunities, an outmoded data storage infrastructure can be a roadblock. It can also inhibit expansion while continually hitting you hard in your operating and...
View ArticleMicrosoft: Detecting in-memory attacks with Sysmon and Azure Security Center
In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts, SentinelOne: In memory attacks loom large, leave little trace, Hunting in memory, and...
View ArticleMicrosoft Video: Sam George: Connect Things, Insights, and Actions with the IoT
See IoT in Action with Microsoft online on 11/14: http://bit.ly/2lBV8oL In this video Sam George, Director of Azure IoT at Microsoft, connects things, insights, and actions to explain the IoT business...
View ArticleVMware vSAN Deduplication and Compression Tips!
I’ve been getting some questions lately and here are a few quick thoughts on getting the most out of this feature.If you do not see deduplication or compression at all: See if the object space...
View ArticleIntroducing Top-Notch PowerShell Automation Tool: SysKit Shell
Our team is thrilled to introduce you to the all-powerful PowerShell automation toolkit: SysKit Shell. With the PowerShell constantly evolving, we thought we could provide an enhanced, more...
View ArticleComparison between Horizon Cloud and Citrix Cloud on Azure
The last couple of weeks I have been working with VMware Horizon Cloud for Microsoft Azure, and tesing the bits and pieces about the platform, and especially I’ve been looking at how it compares...
View ArticleE2EVC Video: Best practices for Sealing and deploying your Master Images
Session from @E2EVC 2017 Orlando. For event information please visit www.e2evc.com/home. For slides, additional info etc please contact the presenter directly on Twitter. For best video and sound...
View ArticleCitrix Video on how to Recover from malware and ransomware
We live in an era where ransomware and malware attacks are constantly making headlines. It seems like the electronic world we know is under constant attack. These attacks can cost millions, even...
View ArticleVMware Celebrates 10,000 vSAN Customers
Learn how 10,000 organizations are now leveraging the revolutionary possibilities and solving traditional IT challenges with a new IT/storage approach delivered by VMware vSAN. This video is from the...
View ArticleNVIDIA: GTC DC – Cyberwarfare Keynote
Hear from Lt. General John “Jack” Shanahan, Director of Defense Intelligence at the Pentagon, on how AI is utilized for defense and cyberwarfare. http://nvda.ws/2lJWazi This video is via NVIDIA.
View ArticleAI and Machine Learning to Revolutionize U.S. Intelligence Community,...
Don’t change the culture. Unleash the culture. That was the message one young officer gave Lt. General John “Jack” Shanahan — the Pentagon’s director for defense for warfighter support — who is...
View ArticleCurrent State of EUC – E2EVC Video
Session from @E2EVC 2017 Orlando. For event information please visit www.e2evc.com/home. For slides, additional info etc please contact the presenter directly on Twitter. For best video and sound...
View ArticleImproved Remote Desktop Manager Feature: Tag Manager
If you have dozens, hundreds or thousands of entries in Remote Desktop Manager (RDM), you probably wish there was a fast and easy way to find the specific entry you need, when you need it. Well guess...
View ArticleHow to host your FSLogix profiles and Office data in Amazon S3 storage
Hosting your data in Amazon Simple Storage Service (S3) can be a very inexpensive way to provide storage for your organisation. This solution is also not necessarily confined to the use case of having...
View Article
More Pages to Explore .....