Citrix’s much-anticipated XenDesktop Essentials product is now almost ready for release. A few days ago, it released pricing and purchasing options, which are intended to allow those interested in the platform to start planning for adoption. XenDesktop Essentials allows you to deliver Windows 10 desktops from the Azure cloud to a multitude of devices—Linux, Mac, …
The recent Amazon Web Services Simple Storage Service (S3) outage has taught us quite a bit about fragile cloud architectures. While many cloud providers will make hay during the next few weeks, current cloud architectures are fragile. Modern hybrid cloud architectures are fragile. We need to learn from this outage to design better systems: ones …
We are in the midst of an analytics boom. Everywhere I look, I see analytics presented as the answer to everything from sweaty pores to security. They may even improve hair growth. That aside, analytics truly are invading everything we do. There are three types of analytics. Over reliance on any one type leaves businesses …
This year has been the year when fake news became big news. But fake news isn’t really new: it has been going on for years. We see fake IT news all over the IT industry when partial truths and irrelevant benchmarks are used to sell products. The presence of fakes means that we need to …
In February, several of the top virtualization vendor companies released their fourth quarter results and guidance. From this release, we should be able to get an understanding of how the companies are performing. VMware, Citrix, and Red Hat are the companies for whichI have some data to share. The source of the revenue reports is Cleveland Research Company, and the sources of the individual company reports are CRC and FactSet Estimates.
In the last three virtualization and cloud security podcasts, Mike Foley, Sr Technical Marketing Architect for vSphere Security, mentioned security disaster recovery plans. There is a growing need for such plans. The 174th podcast covered this need, as well as the why and the how of putting such plans together. Unlike traditional disaster recovery, security disaster …
This site uses cookies. Some of them are essential, while others help us improve your experience.AcceptRead More
Privacy Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.