Secure Mail has a new look and feel! Take a look at how our email application interface has changed to help you be more efficient. This video is from the fine folks at Citrix
Archives for May 2018
Best Practices for Cloud Security in the Cloud Adoption Journey – AWS Technical Deep Dive Video
Organizations are migrating their on-premise data center and application environments to public cloud to accelerate digital business. AWS enables agility and elasticity for digital workloads and DevOps teams, but the expanded digital attack surface across the hybrid cloud needs to be protected in order to ensure secure interactions and data. We discuss best practices for […]
Citrix StoreFront and Citrix Gateway GSLB Considerations
It has been a while since I last talked about StoreFront and Citrix Gateway integration (2014, eek!) and the focus at that time was looking at Web Interface Gateway integration and addressing how things were changing with StoreFront — things like the fact that you could bind multiple Gateway definitions to a single Store and […]
A Machine Infrastructure to Get Value from AI
A key to your success with AI is building out an infrastructure that will support today’s apps but also the workloads and data volumes of the future.
VMware: Provision and Manage Kubernetes Clusters as-a-Service using vRealize Automation and Pivotal Container Service
Pivotal Container Service (PKS) aims to simplify how enterprises deploy, run and manage Kubernetes clusters on any cloud. Download the release from PivNet. Every enterprise wants to run containers in production. However, primary questions being asked are: “How do I get Kubernetes to work in my data center? How do I simplify deployment of kubernets clusters? […]
Citrix: How to Easily Host a Multi-Auth Landing Page on NetScaler Gateway
This blog post will show you how to create a NetScaler Gateway that will host a simple landing page that can provide access to Gateways with different authentication options. Below is an example landing page that specifies smartcard as the main authentication method and RADIUS with username/password for users who have an exception. I know […]
Breaking Down the Common SharePoint Governance Myths
Over the years, a certain mystery has developed concerning SharePoint governance. But the whole thing is quite simple if you follow the ground rules and avoid common misconceptions. We broke down the 11 SharePoint governance myths that were circling around the SharePoint communities. So, let’s start! Myth #1: Business executives and managers should write the plan […]
Microsoft Hyper-V Integration Services – Where Are We Today?
Hyper-V Integration Services provide critical functionality to Guests (virtual machines) running on Microsoft’s virtualization platform (Hyper-V). For the most part, virtual machines run in an isolated environment on the Hyper-V host. However, there is a high-speed communications channel between the Guest and the Host that allows the Guest to take advantage of Host-side services. If […]
Empowering Help Desk Professionals to Proactively Solve End User Problems
Help desk technicians form the front line of support in identifying, troubleshooting, and preventing end user performance issues (and costly downtime) for key applications and services. They need to quickly identify the scope of the issue and route the critical details required to fix the issue – fast. Goliath Technologies increases the troubleshooting and remediation […]
How to Make Citrix Logons Faster? Best Practices for Optimizing Citrix Logon Times
Slow logon is one of the most common user complaints faced by Citrix admins. When logon is slow, it affects the end-user experience and business productivity. Because XenApp and XenDesktop logon comprises many steps and depends on various parts of the infrastructure, it is often difficult to know what is causing logon slowness. The biggest […]