Application Virtualization

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Last summer my family spent a day visiting LEGOLAND Discovery Center in New York. We all loved it, especially the chance to see miniature recreations of some of the world’s most famous cities, all built from LEGO blocks. My kids exclaimed over each tiny bit of landscape. I did as well, enjoying the minute detail […]

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
As the 2015 survey showed, the Desktops-as-a-Service market continues to grow. Many existing Hosted Service Providers now want to join the DaaS community to add hosted desktops and applications into their portfolio. In doing so, they can combine their existing hosted services like Exchange, Lync, SharePoint, file storage, and so on, to offer businesses the complete cloud hosted […]

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
In episode 140, Douglas Brown interviews Lisa Hammond, CEO and Founder of Centrix Software.  Lisa and Doug discuss Centrix Software virtual, legacy, and web application management solutions, what they are, how they work, what it takes to install and manage, why we should care and how they compete with the competition, plus much more. About […]

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
AppTitude solution. Samit will explain what App-DNA AppTitude is, how it works, what it takes to install, how it compares and contracts to the competition, why you should care, and much more.  App-DNA AppTitude won Best of Show at Citrix Synergy 2010 so you won’t want to miss this podcast to learn more.  About App-DNA AppTitude
 […]

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
In episode 176, Douglas Brown interviews Swarna Podila, Sr. manager with the Enterprise Mobility Group at Symantec. Swarna and Doug talk about what enterprises must keep in mind when designing their mobility strategy and about how the Symantec Mobile Management Suite delivers total mobile protection without compromising on information security or the user experience. Mobility […]

Subcategories

My Tweets

Last Articles

How to access your Android phone's texts and photos in Windows 10

You can view photos and text messages from your Android device directly in Windows 10. Follow...

Microsoft reanimates corpse of maligned Office Assistant "Clippy" to help Teams compete with Slack

The paperclip that everybody loves to hate is back as a sticker for Microsoft Teams, Redmond's...

Vulnerability in SoftNAS Cloud allows attackers to bypass authentication

The vulnerability allows attackers to run arbitrary commands as root, which clearly undermines the...

Java 12: What's new in the latest version of the programming language?

The latest release of the language promises a few notable improvements and is available to...

How to add 'Move to' and 'Copy to' to the context menu in Windows 10

Microsoft does not include "Copy to" and "Move to" by default in the Windows Explorer context...

Trello gets 13 new enterprise features to improve team security, productivity

The biggest Trello Enterprise update since 2015 gives organizations more security controls and...

How to see live captions and subtitles of your conversations in Skype

Get step-by-step instructions on how to view real-time captions and subtitles of your Skype calls...

The 3 least secure programming languages

These coding languages have the most open source vulnerabilities, according to a WhiteSource report.

Troubleshoot Outlook connectivity with these quick tips

When Outlook won't connect to the Exchange server, follow these steps before calling IT for help.

How to manage multiple installations of Office 365

It's easy to juggle all of your Microsoft Office 365 installations if you know where to go. Follow...

  • How to access your Android phone's texts and photos in Windows 10

    Wednesday, 20 March 2019 21:30
  • Microsoft reanimates corpse of maligned Office Assistant "Clippy" to help Teams compete with Slack

    Wednesday, 20 March 2019 17:30
  • Vulnerability in SoftNAS Cloud allows attackers to bypass authentication

    Wednesday, 20 March 2019 15:30
  • Java 12: What's new in the latest version of the programming language?

    Wednesday, 20 March 2019 14:30
  • How to add 'Move to' and 'Copy to' to the context menu in Windows 10

    Tuesday, 19 March 2019 16:30
  • Trello gets 13 new enterprise features to improve team security, productivity

    Tuesday, 19 March 2019 16:30
  • How to see live captions and subtitles of your conversations in Skype

    Tuesday, 19 March 2019 15:30
  • The 3 least secure programming languages

    Tuesday, 19 March 2019 14:30
  • Troubleshoot Outlook connectivity with these quick tips

    Monday, 18 March 2019 21:30
  • How to manage multiple installations of Office 365

    Monday, 18 March 2019 21:30