All Posts By

Don Blake

Daas (Desktop as a Service)

The DaaS Revolution: It’s Time

By | Cloud Computing, Daas, Desktop Virtualization, Disaster Recovery, Infrastructure, Networking, Security, Uncategorized, Virtualization | No Comments

When terminal services was first released, it revolutionized the way users accessed their applications and data. Employees could tap into their digital resources from essentially anywhere while businesses could be certain that all data was located in the data center and not on end user devices. But no revolution is perfect and the challenge with terminal services (renamed to RDSH in recent years) was that it did not give users the customization and experience of their local devices.  Read More

Smart Monitoring & Desktop Virtualization Visibility

From Smart Monitoring to Happy End-users

By | Cloud Computing, Data Center, Monitoring, Networking, Reporting, Review, Virtualization | No Comments

Desktop Virtualization Visibility & Peace of Mind

To monitor or not to monitor? That has become the question for many businesses today as they design their virtual desktop environments. How are they answering? In my recent experience, I have noticed many businesses choosing either to implement a badly put together monitoring solution or forego virtual desktop monitoring altogether. Those are two risky options in a virtual environment where end-user experience (EUX) is of utmost importance and monitoring can be essential to its success. Read More

Bring Your Own Device (BYOD)

The Best Next Thing in BYOD: VMI

By | Data Loss Prevention, How To, Personal Data Management, Security, Virtualization | No Comments

BYOD (Bring Your Own Device) is a buzzword we have heard in IT and security circles for years. It speaks to questions that every business leader and IT executive must ask and answer: how do we secure and protect the growing number of mobile technologies (personal or company issued) employees want to use at work? How do we give a mobile, tech-centric workforce what it needs to succeed without putting our data and company at risk? Read More

float(1)