-
By Tom Fenton
After covering some of the new features and changes in the connection server and clients with version 2012 of the desktop and app virtualization product, Tom Fenton updates his environment and takes a closer look at changes.
-
By Tom Fenton
Tom Fenton explains some of the new features and changes in the connection server and clients with version 2012 of the desktop and app virtualization product.
-
By Tom Fenton
Tom Fenton enables a Windows server to stream applications, configures VMware Horizon to broker these applications to specific users and shows how to monitor streaming applications.
-
By Tom Fenton
Tom Fenton walks you through the process of installing PowerToys, explains how to use each, and then gives you his Power Ranking of these PowerToys.
-
After covering the need for dedicated hosts and how to handle quotas, Brien Posey walks you through the instance creation process.
-
Brien Posey explains the need for a dedicated host, quotas and more in this first installment.
-
Brien Posey shows how to set up multi-factor authentication for an AWS user in a way that allows the use of a smartphone as an access key.
-
By Tom Fenton
Tom Fenton believes that multiple desktops will increase your productivity and decrease the clutter on your desktop as it allows you to group your desktops by different workflows.
-
Paul Schnackenburg examines the comprehensive guidance Microsoft offers for "how to do security" in Azure and demonstrates how to use the tool that brings it all together: Azure Security Center (ASC).
-
After previously explaining how to create a workbook that could be used as the basis for creating a custom application, Brien Posey now shows you what the actual application development process looks like.
-
By Tom Fenton
The two biggest changes in Horizon 8 are that it now includes instant clones as a standard feature, and the capability to use Horizon 8 in public clouds.
-
Brien Posey shows how to use this AWS service that lets you take a drag-and-drop approach to application development, allowing for the creation of apps without ever writing a single line of code.
-
Brien Posey shows how to access EC2 virtual machine instances through the use of key pairs via the AWS CLI or PowerShell.
-
By Tom Fenton
After previously detailing how to set up WorkSpaces using Simple AD for Active Directory, services, Tom Fenton looks at some available tools to monitor WorkSpaces.
-
By Tom Fenton
Tom Fenton shows how to set up Active Directory services for his newly created WorkSpaces and deploy them.
-
By Tom Fenton
After previously writing about different options available to use Active Directory services with WorkSpaces, Tom Fenton details how he set up his WorkSpace.
-
After previously stepping through how to create an Active Directory environment, Brien Posey continues the discussion by showing you how to create the actual WorkSpace.
-
By Tom Fenton
Tom Fenton begins a series of how-to articles about the Desktop-as-a-Service solution, Amazon WorkSpaces, which usually requires Active Directory (AD) services delivered to WorkSpaces desktops. Here, he outlines various methods to deliver AD services to WorkSpaces desktops.
-
By Tom Fenton
For organizations looking to maintain data security amid the work-from-home movement, Tom Fenton reviews the 16GB datAshur BT 16GB flash drive, which can be unlocked via Bluetooth from a cell phone, and, more importantly, has remote management functionality for enterprise use.
-
Whether you call them "Illicit consent grants" or "fake OAuth applications," these threats should be taken seriously, says Paul Schnackenburg, who shows you just how to protect your organization.
-
By Tom Fenton
In part 3 of a series, Tom Fenton shows how to add VMware Tools to a Linux Virtual Machine (VM) running on the Pi, use vCenter Server to manage the device, and then create a Fedora VM and add a USB Gigabit ethernet adapter.
-
Brien Posey shows how to deploy an AWS based Active Directory infrastructure, and how to then create a Desktop-as-a-Service (DaaS) deployment that leverages that cloud-based directory.
-
By Tom Fenton
After previously writing about installing ESXi on Arm on a Raspberry Pi, Tom Fenton walks through the process of using a USB flash drive as a local datastore on the Pi.
-
After previously demonstrating how to create a CSV file that can be used to create a custom classifier for the AWS Comprehend natural language processing service, Brien Posey shows how to use that file to build and train the classifier, along with how to create a document classification job.
-
By Tom Fenton
After earlier discussing VMware's ESXi on Arm Fling, Tom Fenton details an overview of his experience installing it.