Today, we are announcing Azure Stream Analytics (ASA) on edge devices, a new feature of Azure Stream Analytics that enables customers to deploy analytical intelligence closer to the IoT devices and unlock the full value of the device-generated data. Azure Stream Analytics on edge devices extends all the benefits of our unique streaming technology from […]
At last November’s re:Invent, we announced the AWS Service Delivery Program to help AWS customers find partners in the AWS Partner Network (APN) with expertise in specific AWS services and skills. Today we are adding Management Tools as a new Partner Solution to the Service Delivery program, and AWS Service Catalog is the first product […]
PCI DSS is an acronym for Payment Card Industry Data Security Standard. It’s a set of worldwide protection standards developed by major payment card companies, and it’s mandatory for businesses that store, process, or transmit payment card data. Guidance is also provided to software, app and device creators that facilitate payment card transactions. It is […]
Empowering not only your employees, but also you to be more productive is one of the main goals for us. Ability to manage your mobility ecosystem from virtually any device and any browser, managing increasingly larger numbers of devices and apps, a modern micro-services cloud architecture, enterprise-grade APIs, reporting and automation support, unified admins experience […]
Today marks another milestone in the evolution of our flagship virtualization platform, Red Hat Virtualization (RHV), as we announce the release of version 4.1. There are well over 165 new features, and while I don’t have the space to cover all of the new features, I would like to highlight some of them, especially in […]
Learn about the Microsoft Trust Center. Here you have access to comprehensive information about compliance certifications, audit reports, and privacy and security policies in the Microsoft Cloud. For more information visit: www.microsoft.com/secure This video is from the fine folks at Microsoft.
Early this year, we announced an alternative to our previously recommended IPsec Enterprise Connectivity method, Citrix Cloud Connector. This move will not only allow more control over the Mobile Application Management (MAM) settings/timeouts and MicroVPN connections, but also eliminates the need to create and route internal traffic through an IPsec Tunnel. This will result in […]
With the latest Cohesity 4.0 release, we have made significant enhancements to our Distributed File Services and the storage abstractions presentations that are provided by the Cohesity DataPlatform. One of those enhancements is the support for write-once-read-many (WORM) file systems within Cohesity Views. Cohesity Views are logical constructs that are utilized a storage location with […]