martes, 2 de abril de 2013

Virtualization by Davis: “Sampling four VDI monitoring tools” plus 8 more

Virtualization by Davis: “Sampling four VDI monitoring tools” plus 8 more


Sampling four VDI monitoring tools

Posted: 01 Apr 2013 08:20 AM PDT

There are a lot of options for VDI monitoring tools out there. Learn about a few products that can help you keep virtual desktops in check.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

Red Hat CTO Brian Stevens on OpenStack

Posted: 31 Mar 2013 09:00 PM PDT

by: OpenStack Team

Is a fully virtualized infrastructure a good idea for your business?

Posted: 01 Apr 2013 07:00 AM PDT

Years ago, experts asked whether a fully virtualized infrastructure was even possible. That debate is settled, but is 100% virtualization a good idea?

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

Explaining Citrix Pass-through Authentication

Posted: 01 Apr 2013 12:21 PM PDT

Introduction Pass-through authentication is a simple concept. User credentials are passed to a Web Interface site and then to the XenApp/XenDesktop servers, preventing users from having to explicitly authenticate at any point during the Citrix application launch process. While this authentication method seems straightforward, there are some moving pieces, and this article aims to break these down to provide a more detailed understanding of how…

Read More

Designing your desktop virtualization architecture

Posted: 01 Apr 2013 10:38 AM PDT

One of the first questions someone doing desktop virtualization wants answered is usually one of the following questions How many servers do I need? How many IOPS? How many XenDesktop Controllers do I need? I've seen it many times and have been asked these questions many times. The typical answer is "It depends" (I really hate this answer BTW). The wrong answer is any number…

Read More

Infrastructure provisioning challenges: Linking physical and virtual

Posted: 27 Mar 2013 09:10 AM PDT

Infrastructure provisioning tools often fail to bridge the management gap between physical and virtual. Is vendor standardization the answer?

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

The VMware vCAT helps plan and deploy a vCloud architecture

Posted: 01 Apr 2013 05:30 AM PDT

Curiosity may have killed the cat, but it also spawned the vCAT, VMware's set of documents for helping VMware admins tackle cloud infrastructures.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

Configuring Email-Based Account Discovery for Citrix Receiver

Posted: 01 Apr 2013 05:05 AM PDT

Configuring Email-Based Account Discovery   1     Add DNS Service Location (SRV) record to enable email based discovery During initial configuration, Citrix Receiver can contact Active Directory Domain Name System (DNS) servers to obtain details of the stores available for users. This means that users do not need to know the access details for their stores when they install and configure Citrix Receiver. Instead,…

Read More

A RBAC use case for managing AGEE user accounts

Posted: 01 Apr 2013 03:09 AM PDT

SUMMARY: Role Based Access Control(RBAC) plays an important role in separating roles and segregating privileges. Roles are assigned to each user and policies are created to enforce access to the objects (entities) by the subjects (roles). This particular blog describes a use case of managing the AGEE user accounts (asked in Using Role Based Access Control(RBAC) to securely manage the NetScaler configuration). A commandSpec is…

Read More

No hay comentarios:

Publicar un comentario