By: Roberto De La Mora, Eric Schoch Henry Ford once said, “Any customer can have a car painted any colour he wants so long as it is black.” Most unified communications (UC) vendors today are applying the same line of thinking that Henry Ford did back in the early days of the Model T. Except […]
By: Frank Ohlhorst dnu Thanks to technologies such as Virtual Desktop Infrastructure, Big Data Analytics and e-Discovery services, data center storage needs are growing fast, with no end in sight. To date, data center operators have relied on traditional SAN (Storage Area Network) technologies to meet storage growth needs. However, the cost associated with provisioning, […]
By: Frank Ohlhorst dnu Businesses have been promised affordable, reliable and easy-to-use video conferencing for years. Most solutions on the market, however, turn out to be more hassle than they are worth. Avistar has been able to deliver where others have not with Avistar C3, a family of products that brings high-definition, multiparty video conferencing […]
By: Frank Ohlhorst dnu F5 networks brings added oomph to VMware Virtual Desktop Infrastructure deployments with its Application Ready Solution for VMware View 4.5, an add-on capability for F5’s BIG-IP Edge Gateway that consists of a set of best practices, guidelines and policies for speeding deployment and optimizing performance. This solution, which is part of […]
By: Frank Ohlhorst dnu Version 1.0 of Unidesk’s self-named VDI management tool enables organizations deploying virtual desktop infrastructure to take advantage of the centralized management perks of VDI without sacrificing the individual desktop flexibility that users have come to expect from traditional, locally installed operating systems. With Unidesk 1.0, administrators can dynamically provision virtual desktops […]
By: Frank Ohlhorst dnu Data breaches have become a common occurrence, especially for organizations that give unfettered access rights to end users. What’s more, data leakage has become a growing problem across enterprises. Although some breaches are intentional, most fall under the realm of mistakes made by end users. However, those breaches all share a […]
By: Frank Ohlhorst dnu Virtual desktop infrastructure products are marketed on the promise that they will eliminate many of the desktop deployment and management headaches administrators struggle with on a daily basis. However, VDI comes with its own set of challenges, often proving to be expensive, complex to deploy and hard to manage-all of which […]
By: Larry Seltzer The next frontier of corporate development may well be Rich Internet Applications. RIAs are Internet applications which do not necessarily run in the browser and are free of user-interface limitations of that environment. Corporate development went head first into conventional Internet application development before the enormous security implications of that platform were […]
Access Control List Authentication Multifactor authentication Biometrics NAC Network Access Control Active Content Data leak Egress Scanning Botnet DDOS Distributed Denial of Service Honeypot Unified Threat Mangement Endpoint security Patch management Virus Penetration testing White Hat hacker Social Engineering Spoofing Proxy Layered security Access Control List An Access Control List (ACL) is a mechanism to […]
By: Frank Ohlhorst dnu Wanova is offering a new paradigm for managing, supporting and protecting Windows desktops in the enterprise. The company’s Mirage product, which entered general availability in March, is designed as an alternative to deploying complex VDI (Virtual Desktop Infrastructure) solutions. During my testing of Mirage, I found that Mirage offers many of […]