All IT News news and support resources, featuring the hottest solutions, technologies and vendors in the All IT News world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home All IT News

All IT News

StorMagic SvSAN: Edge Appliance for Citrix Cloud Services – Podcast Episode 312

DABCC Radio
In episode 312, Douglas Brown interviews Lee Bushen, Partner Enablement Manager at StorMagic and Chris Edwards, Technical Marketing Lead for Citrix Ready. Lee, Chris, and Douglas discuss the StorMagic’s SvSAN edge appliance for Citrix Cloud Services.  Lee dives into how it works, the problems they solve, why we should care and much more. Download the MP3 […]

Single Metric Trigger: Precise Alerts and Notifications In ControlUp – Video

ControlUp
Find out how the advanced trigger or single metric trigger allows you to get super-focused notifications about any event in your IT Infrastructure – now based off a single metric of your choice. This video is from the fine folks at ControlUp.

Amazon WorkSpaces – Double-Hop support Video

deviceTRUST
To meet the corporate regulatory requirements, some business applications are not allowed to be installed on Amazon WorkSpaces, only on the on-premise environment. To access these business applications, users need to connect from within Amazon WorkSpaces back to the on-premise environment. To meet this requirement, the context of the users’ endpoint needs to be available […]

Goliath Technologies Cerner Troubleshooting – Video

Goliath Technologies
Goliath Performance Monitor for hospitals using Cerner is purpose-built to proactively anticipate, troubleshoot and prevent issues with the entire on-premises virtual desktop infrastructure used to deliver mission-critical applications including Cerner. This video is from the fine folks at Goliath Technologies.

Desktop transformation: the end of the monolithic enterprise desktop

Liquidware
In our shiny new digital world there is no place for the old monolithic desktops of the past. To be successful in their digital transformation, organisations should transform their enterprise desktops first. While server workloads are well managed and well architected, however, the same cannot be said for desktops. Instead we more frequently see situations […]

Simplify Troubleshooting your IT Healthcare Virtual Architecture with Goliath Technologies

Goliath Technologies
Virtual architecture is complex to standup and deploy, and when it comes to the ability of your support team to fix an issue it needs to be done fast and when possible – proactively.  This is extremely important from the business user perspective in all organizations, but even more importantly in healthcare where there is […]

Why End-Points Matter – A Deep Conversation with IGEL’s Tech Guru Jeff Kalberg – Podcast Episode 311

IGEL Technology
In episode 311, Douglas Brown interviews Jeff Kalberg, Technology Evangelist at IGEL Technology. Jeff and Douglas dive deep into the world of secure end-points, aka Thin Clients. Jeff does a fantastic job detailing his views on today’s EUC market and how the end-point has changed over the years, why today, more than ever, a secure […]

Elastic vs. RedShift vs. Chaos Sumo

Chaos Sumo
Along with cost and feature set, performance is always a common decision metric among prospective users choosing between log analytics solutions. Those who have used Elasticsearch want to maintain the snappy response times for text search requests. Others using relational databases or data warehouses are concerned with how those relational-type queries perform within a non-relational […]

What the Heck is a Unikernel?

FSLogix
Virtual machines, containers, and unikernels. What are the differences? What is a unikernel anyways? While virtual machines and containers get tossed around a lot in IT circles a new term has started entering the vernacular – unikernels – but what are they? Unikernels are a method of deploying software. They contain a given software application […]

Remote Desktop Manager 32-bit or 64-bit?

Devolutions
Some questions in life are hard to answer, like: would you rather step on a piece of Lego barefoot every day for a week or get a single paper cut between your toes? (Don’t worry, there’s a cure.) Or in a battle between Deadpool and…actually, forget that. Deadpool would always win! But other questions are easy […]

SQL Server Backup Strategy

Veeam
Microsoft SQL Server is often one of the most critical applications in an organization, with too many uses to count. Due to its criticality, your SQL Server and its data should be thoroughly protected. Business operations rely on a core component like Microsoft SQL Server to manage databases and data. The importance of backing up […]

How to configure iSCSI target on vSAN

opvizor
How to configure iSCSI target on vSAN We want to share some important information about configuring an iSCSI target on vSAN. Mayur Parmar wrote in interesting article you can find here. Please scroll down for the single steps and click on the link for the complete article. http://masteringvmware.com/how-to-configure-iscsi-target-on-vsan/ Let’s see how to configure iSCSI Target […]

Goliath Technologies Epic Troubleshooting – Video

Goliath Technologies
Goliath Technologies’ proactive Performance Monitoring for Epic is a performance monitoring and analytics software that correlates Epic-specific performance metrics, end user experience, virtual server data, and Citrix or VMware Horizon performance data. This video is from the fine folks at Goliath Technologies.

deviceTRUST Contextual Security – Use Case (Conditional Access based on Security State) Video

deviceTRUST
We show how the status of the security components on the endpoint (firewall, anti-spyware, anti-virus, Windows updates, etc.) can be used to control access to the virtual session. This video is from the fine folks at deviceTRUST.

Visit Our Sponsors

Close