Tom Fenton shows how to set up Active Directory services for his newly created WorkSpaces and deploy them.
One of the few bright spots in the enterprise IT space recently has been cloud computing, which has seen increased spending since the advent of the COVID-19 pandemic that, among other things, caused a massive shift to work-from-home schemes across the country.
VMware announced updates to its Virtual Cloud Network, which it said embodies the idea of a "Modern Network framework" for the "new normal" of cloud and datacenter networking.
After previously writing about different options available to use Active Directory services with WorkSpaces, Tom Fenton details how he set up his WorkSpace.
British telco and networking provider BT announced new cloud-optimized managed networking services that leverage software-defined networking (SDN), with the first such offering based on VMware SD-WAN.
After previously stepping through how to create an Active Directory environment, Brien Posey continues the discussion by showing you how to create the actual WorkSpace.
Analyst firm Forrester Research is out with a new report on the software-defined wide-area networking (SD-WAN) movement, which it says has evolved from an early do-it-yourself (DIY) approach to one that enlists industry service providers as partners for businesswide fabric implementations.
Tom Fenton begins a series of how-to articles about the Desktop-as-a-Service solution, Amazon WorkSpaces, which usually requires Active Directory (AD) services delivered to WorkSpaces desktops. Here, he outlines various methods to deliver AD services to WorkSpaces desktops.
Having gone all in on the hybrid cloud, IBM is expanding its new initiative with a partnership push to roll out 5G wireless implementations as part of the new IBM Cloud for Telecommunications.
For organizations looking to maintain data security amid the work-from-home movement, Tom Fenton reviews the 16GB datAshur BT 16GB flash drive, which can be unlocked via Bluetooth from a cell phone, and, more importantly, has remote management functionality for enterprise use.
Whether you call them "Illicit consent grants" or "fake OAuth applications," these threats should be taken seriously, says Paul Schnackenburg, who shows you just how to protect your organization.
- By Paul Schnackenburg
In part 3 of a series, Tom Fenton shows how to add VMware Tools to a Linux Virtual Machine (VM) running on the Pi, use vCenter Server to manage the device, and then create a Fedora VM and add a USB Gigabit ethernet adapter.
Brien Posey shows how to deploy an AWS based Active Directory infrastructure, and how to then create a Desktop-as-a-Service (DaaS) deployment that leverages that cloud-based directory.
After previously writing about installing ESXi on Arm on a Raspberry Pi, Tom Fenton walks through the process of using a USB flash drive as a local datastore on the Pi.
Meanwhile, DevOps pros are in the most sought-after job role.
After previously demonstrating how to create a CSV file that can be used to create a custom classifier for the AWS Comprehend natural language processing service, Brien Posey shows how to use that file to build and train the classifier, along with how to create a document classification job.
Developer-centric research firm SlashData published a new report indicating pricing is the No. 1 factor in choosing or rejecting a cloud computing technology, followed by support/ documentation.
Microsoft announced a new open source tool called Akri for helping Kubernetes find and work with edge devices, such as sensors, controllers and microcontroller units (MCUs).
After earlier discussing VMware's ESXi on Arm Fling, Tom Fenton details an overview of his experience installing it.
Brien Posey shows how to use the Comprehend natural language processing service to classify documents based on their content, building a custom classifier to identify spam.