Visit Our Sponsors
All IT News
To meet the corporate compliance requirements, users are required to access the ‘Business Application’ within Amazon WorkSpaces if the endpoint uses a validated network connection. This video is from the fine folks at deviceTRUST.
To meet the corporate security requirements, users are required to access Amazon WorkSpaces if the endpoint uses a secure WPA2 or WPA3 encrypted Wi-Fi connection. This video is from the fine folks at deviceTRUST.
Pfffftttt – who needs a password management solution? I mean, I can totally remember all my passwords and manage everything myself. And anyway, I will never, ever get hacked! So why use Remote Desktop Manager? I’d just be throwing money away. Instead, I could spend it on more important things this muggy summer, like going […]
Devolutions Web Login (DWL) helps you easily create, securely store and auto-fill your login credentials and passwords to any website directly from your web browser. This video will show you how to set up DWL with Devolutions Password Server in just a few steps. Devolutions Web Login is free to use but does require either […]
To meet the corporate compliance requirements, users are required to access Amazon WorkSpaces if the endpoint uses a validated network connection. This video is from the fine folks at deviceTRUST.
Have you ever wondered what Citrix does to ensure the released versions of XenApp and XenDesktop remain compatible with various third-party software updates from vendors like Microsoft, VMWare, or Adobe? As you may know, our technology leverages, relies upon, inter-operates with, and supports software; such as Microsoft Windows operating systems, Microsoft Office, Microsoft SQL, Microsoft […]
In last week’s installment of my blog series on reliable, cost-effective connectivity with Citrix Workspace, we uncovered a multitude of benefits from using Citrix SD-WAN between office locations and the data center VDA (Virtual Delivery Agent) servers used to deliver Virtual Apps & Desktops. This week, let’s look at how those benefits extend to VDAs […]
The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attacks can happen at any time. While there are probably many factors that led to the attack, it’s worth focusing on […]
dinCloud, a digital transformation platform that offers hosted workspaces and cloud infrastructure, has been announced as the first CSP to join the Citrix Ready Program. dinCloud is a Cloud Services Provider (CSP) that helps organizations rapidly migrate to the cloud through a strong network of Value Added Resellers (VARs) and Managed Service Providers (MSPs). Each customer’s […]
This should delight all of the wordsmiths and Jeopardy! fans out there: the word “hack” dates back to the 12th century, and derives from the Old English word “tohaccian”, which means “to hack to pieces”. Riveting, huh? OK…maybe not. But these days, there is another usage of the word “hack” that is very captivating and attention-grabbing, […]
With the release of Remote Desktop modern infrastructure (RDmi) around the corner and Microsoft Inspire just having finished, there’s a lot of discussion around migrating to RDmi environments. RDmi is a new PaaS offering that’s viewed as a redesign of the familiar RDS. This new offering has many new features and security settings including a […]
The concept of hybrid is very, very misunderstood. Hybrid is not the compromise of “avoiding the cloud” vs. “going all-in on cloud”. Hybrid is not the curse of carrying legacy baggage into modern service delivery architectures. Hybrid is also so much more than just a choice of resource location. Most surprisingly, hybrid is not just for clouds. Whether hybrid […]