November 6, 2017 Amazon Web Services 0 AWS Shield Advanced, a managed Distributed Denial of Service (DDoS) protection service, now provides the global threat environment dashboard that shows DDoS trends and metrics across Amazon CloudFront, Elastic Load Balancing, and Amazon Route 53. The global threat environment dashboard shows an easy-to-understand sampling of data about DDoS attacks. The dashboard […]
Archives for November 2017
Amazon AppStream 2.0 Reduces User Fees by 89% for Qualified Educational Users
October 19, 2017 Webinar with David Young, Solutions Architect and Product Champion, and Brandon Lee, Solutions Marketer. Video Recording of a live demo of FSLogix and an overview of the latest release of FSLogix Apps featuring Roaming XenApp Email Search and OneDrive App along with Skype for Business Global Address List and Device Based Licensing. […]
VMware vSphere Integrated Containers – Application Repackaging
Eduardo Meirelles da Rocha created an interesting blog post about Integrated Containers. You can find his blog here, with all comments or simply scroll down. When talking about containers it’s inevitable to think about modern application built natively for the cloud, but the reality for most companies is that the majority of, if not all, […]
Citrix Project Chrysalis: Transforming Business for Application ISVs
Application developers are being challenged by their customers and competitors to deliver their desktop or workstation applications as cloud-based services, without compromising usability or security. This leaves developers in a quandary: how do they take their highly valued applications to the cloud — quickly, easily, and securely — and continue to deliver the great customer […]
DataCore Tech Cranks Wheezing SQL Servers to Ridiculous Speeds
November 6, 2017 DataCore 0 Parallelising IO is like punching hyperspace button DataCore has crafted a driver for SQL Server that runs IO requests simultaneously and increases throughput. The company’s parallel IO technology has been shown to be effective in a series of SPC-1 benchmark tests where it is the highest-performing and lowest price-performance shared storage resource […]
NAKIVO Talked VM Data Protection at TECH Meets in Poznan
Recently, several NAKIVO team members headed to the city of Poznan, Poland, to attend TECH meets – a data protection event held by FEN. FEN distributes and provides pre-sale and after-sale support for modern ICT products, including storage, virtualization, security, and other solutions. The educational element is an important part of FEN’s business. The company […]
VDI for $200k in 9 Months, or DaaS in a Day?
In previous blogs we’ve discussed many reasons why customers are looking for alternatives to legacy VDI solutions, those we refer to as VDI 1.0. It comes down to two primary reasons why those outdated solutions don’t work for most organizations: Cost and complexity. As I was thinking about the impact this has had on so […]
Hub in Bucharest Exceeds 350 Employees
Provides critical operational support to Veeam’s expanding global business Opened in late 2015, the office provides marketing, finance, sales and technical support, attracting the very best talent from across the region Veeam aims to continue investment in the country, growing the team to 500 by the end of 2018 Veeam® Software, the innovative provider of solutions […]
Why ransomware is a real threat regardless the industry
November 6, 2017 Veeam 0 What would you do in case of a ransomware attack? This is a question I have heard a lot lately and I wish there was a simpler answer for it. Ransomware attacks have increased in numbers and complexity and spread to organizations of any industry across the globe. As a […]
Citrix Video: Contextual access to apps and data anywhere, any time, on any device
Business desktops and applications, delivered as a service, are available to users anywhere, anytime, on any device. But what about the security aspects? There may be some instances where users, shouldn’t have access to sensitive applications and data. That’s where Citrix provides the power of contextual access which allows IT to set policies for who […]