Yes, Tom Fenton uses ESXi on a Raspberry Pi, but with an added twist: using an M.2 SATA SSD device for USB storage.
After some previous experiments, Tom Fenton uses a Newest HDMI Video Capture Card and different software to display the output to see if he can get sharper images.
Brien Posey begins a series of tutorials on AWS backups, starting with formulating a plan and establishing rules.
Tom Fenton tries out an inexpensive HDMI video capture device that lets him take screenshots regardless of the OS.
Tom Fenton offers up his personal, time-saving, 94-line bash script, complete with code on GitHub.
Paul Schnackenburg looks at the new public preview of the cloud giant's unified data governance service.
- By Paul Schnackenburg
Brien Posey explains how the default quota for macOS dedicated instances in the AWS cloud caused him problems and how he addressed them.
After covering some of the new features and changes in the connection server and clients with version 2012 of the desktop and app virtualization product, Tom Fenton updates his environment and takes a closer look at changes.
Tom Fenton explains some of the new features and changes in the connection server and clients with version 2012 of the desktop and app virtualization product.
Tom Fenton enables a Windows server to stream applications, configures VMware Horizon to broker these applications to specific users and shows how to monitor streaming applications.
After detailing the need for dedicated hosts, how to handle quotas and creating instances, Brien Posey walks you through the instance connection process.
Tom Fenton walks you through the process of installing PowerToys, explains how to use each, and then gives you his Power Ranking of these PowerToys.
After covering the need for dedicated hosts and how to handle quotas, Brien Posey walks you through the instance creation process.
Brien Posey explains the need for a dedicated host, quotas and more in this first installment.
Brien Posey shows how to set up multi-factor authentication for an AWS user in a way that allows the use of a smartphone as an access key.
Tom Fenton believes that multiple desktops will increase your productivity and decrease the clutter on your desktop as it allows you to group your desktops by different workflows.
Paul Schnackenburg examines the comprehensive guidance Microsoft offers for "how to do security" in Azure and demonstrates how to use the tool that brings it all together: Azure Security Center (ASC).
- By Paul Schnackenburg
After previously explaining how to create a workbook that could be used as the basis for creating a custom application, Brien Posey now shows you what the actual application development process looks like.
The two biggest changes in Horizon 8 are that it now includes instant clones as a standard feature, and the capability to use Horizon 8 in public clouds.
The usual cast of cloud giant characters tops the list of cloud database management systems in a new report from research firm Gartner, which is charting a rapid shift to the cloud.