Databases news and support resources, featuring the hottest solutions, technologies and vendors in the Databases world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Databases

Databases

Configuring Devolutions Web Login with Devolutions Password Server

Devolutions
0
Devolutions Web Login (DWL) helps you easily create, securely store and auto-fill your login credentials and passwords to any website directly from your web browser. This video will show you how to set up DWL with Devolutions Password Server in just a few steps. Devolutions Web Login is free to use but does require either […]

Citrix: XenApp & XenDesktop and Third-Party Software in Harmony!

Citrix Systems
0
Have you ever wondered what Citrix does to ensure the released versions of XenApp and XenDesktop remain compatible with various third-party software updates from vendors like Microsoft, VMWare, or Adobe? As you may know, our technology leverages, relies upon, inter-operates with, and supports software; such as Microsoft Windows operating systems, Microsoft Office, Microsoft SQL, Microsoft […]

Citrix: Everything you love about Workspace Environment Management, now from Citrix Cloud!

Citrix Systems
0
Today, we are excited to announce that everything you love about Workspace Environment Management (WEM) is now available from Citrix Cloud. Leading up to Citrix Synergy, we announced the upcoming availability of the Workspace Environment Management service from Citrix Cloud. WEM adds incredible value to your XenApp and XenDesktop deployments by optimizing the user experience, […]

Citrix Workspace Environment Management Service Setup Demo Video

Citrix Systems
0
The new Workspace Environment Management service from Citrix Cloud delivers the same benefits of the on-premises Workspace Environment Management, without the need to install, configure and manage dedicated WEM infrastructure components and database. WEM adds incredible value to your XenApp and XenDesktop deployments by optimizing the user experience, accelerating user logins, improving manageability of the […]

Microsoft Azure SQL Vulnerability Assessment – now with PowerShell support!

Microsoft
0
You can now manage your SQL Vulnerability Assessments at scale using the new SQL VA PowerShell cmdlets. The cmdlets can be found in the Azure Resource Manager module, AzureRM 6.6.0, within the AzureRM.Sql package. Take a look at the AzureRM PowerShell Gallery for more details. Managing Vulnerability Assessment with cmdlets SQL Vulnerability Assessment (VA) is […]

FSLogix Containers – Search Index Considerations and Troubleshooting

FSLogix
0
Windows Search is a feature that has existed in the Windows OS since Windows Vista, although it did exist as freeware called Windows Desktop Search for XP and Server 2003. It replaced the Indexing Service that first arrived as part of the Windows NT4 Option Pack, which was deprecated in Windows 7 and finally removed […]

Liquidware WhatMatrix Results

Liquidware
0
Liquidware Beats Industry Giants to Take Top Spot in Application Layering in Independent Technical Analysis Liquidware, the leading third-party provider of platform-agnostic end-user computing solutions, today announced that its FlexApp application layering software has nosed out Citrix’s App Layering and VMware’s App Volume products to take top billing in WhatMatrix’s community-curated independent analysis of application […]

Elastic vs. RedShift vs. Chaos Sumo

Chaos Sumo
0
Along with cost and feature set, performance is always a common decision metric among prospective users choosing between log analytics solutions. Those who have used Elasticsearch want to maintain the snappy response times for text search requests. Others using relational databases or data warehouses are concerned with how those relational-type queries perform within a non-relational […]

SQL Server Backup Strategy

Veeam
0
Microsoft SQL Server is often one of the most critical applications in an organization, with too many uses to count. Due to its criticality, your SQL Server and its data should be thoroughly protected. Business operations rely on a core component like Microsoft SQL Server to manage databases and data. The importance of backing up […]

Running Citrix in Public Clouds (Azure, AWS and Google)

IT Blog by Marius Sandbu
0
So this blogpost is a summary of what I presented on the MYCUGC Cloud XL Webinar series, if you don’t want to read the blogpost I have also attached the slidedeck here as well –> https://www.slideshare.net/mariussandbu/citrix-cloud-xl-running-ctirix-in-public-cloud this blogpost is basically a bit more in-depth and summary of the session itself. The session I highlighted how we can […]

Java Code-Level Visibility

eG Innovations
0
The toughest IT performance problems to solve today are the ones where a user complains that their application access is slow. An IT administrator must then figure out the cause of the problem: is it the browser, the network, the server, the storage, the cloud infrastructure on which the application is hosted, or the application […]

17 Backdoored Malicious Images Removed From Docker Hub, But Are You Really Any Safer?

NeuVector
0
Docker Hub recently removed 17 backdoored Docker images. This action came after Fortinet reported some cryptomining activity which linked back to these images. Here are some of the interesting facts: Backdoors were hidden inside the MySQL and Tomcat images, which are some of the most popular application containers on Docker Hub. These backdoored images were […]

How to Use Microsoft SCOM for End-to-End Performance Monitoring

eG Innovations
0
Microsoft System Center Operations Manager (SCOM) deployments have been on the rise in recent years mainly due to its tight integration with other Microsoft servers and applications in the enterprise. While SCOM has native support to monitor Microsoft infrastructures, there is no out-of-the-box support for non-Microsoft technologies, such as VMware, Oracle, Citrix, SAP, and so […]

Visit Our Sponsors

Close