Virtualization by Davis: “Sampling four VDI monitoring tools” plus 8 more |
- Sampling four VDI monitoring tools
- Red Hat CTO Brian Stevens on OpenStack
- Is a fully virtualized infrastructure a good idea for your business?
- Explaining Citrix Pass-through Authentication
- Designing your desktop virtualization architecture
- Infrastructure provisioning challenges: Linking physical and virtual
- The VMware vCAT helps plan and deploy a vCloud architecture
- Configuring Email-Based Account Discovery for Citrix Receiver
- A RBAC use case for managing AGEE user accounts
Sampling four VDI monitoring tools Posted: 01 Apr 2013 08:20 AM PDT |
Red Hat CTO Brian Stevens on OpenStack Posted: 31 Mar 2013 09:00 PM PDT |
Is a fully virtualized infrastructure a good idea for your business? Posted: 01 Apr 2013 07:00 AM PDT |
Explaining Citrix Pass-through Authentication Posted: 01 Apr 2013 12:21 PM PDT Introduction Pass-through authentication is a simple concept. User credentials are passed to a Web Interface site and then to the XenApp/XenDesktop servers, preventing users from having to explicitly authenticate at any point during the Citrix application launch process. While this authentication method seems straightforward, there are some moving pieces, and this article aims to break these down to provide a more detailed understanding of how… |
Designing your desktop virtualization architecture Posted: 01 Apr 2013 10:38 AM PDT One of the first questions someone doing desktop virtualization wants answered is usually one of the following questions How many servers do I need? How many IOPS? How many XenDesktop Controllers do I need? I've seen it many times and have been asked these questions many times. The typical answer is "It depends" (I really hate this answer BTW). The wrong answer is any number… |
Infrastructure provisioning challenges: Linking physical and virtual Posted: 27 Mar 2013 09:10 AM PDT |
The VMware vCAT helps plan and deploy a vCloud architecture Posted: 01 Apr 2013 05:30 AM PDT |
Configuring Email-Based Account Discovery for Citrix Receiver Posted: 01 Apr 2013 05:05 AM PDT Configuring Email-Based Account Discovery 1 Add DNS Service Location (SRV) record to enable email based discovery During initial configuration, Citrix Receiver can contact Active Directory Domain Name System (DNS) servers to obtain details of the stores available for users. This means that users do not need to know the access details for their stores when they install and configure Citrix Receiver. Instead,… |
A RBAC use case for managing AGEE user accounts Posted: 01 Apr 2013 03:09 AM PDT SUMMARY: Role Based Access Control(RBAC) plays an important role in separating roles and segregating privileges. Roles are assigned to each user and policies are created to enforce access to the objects (entities) by the subjects (roles). This particular blog describes a use case of managing the AGEE user accounts (asked in Using Role Based Access Control(RBAC) to securely manage the NetScaler configuration). A commandSpec is… |
You are subscribed to email updates from Virtualization by Davis To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
No hay comentarios:
Publicar un comentario