Articles Tagged with XenApp

DesktopVirtualization

Winds of Change: What Does Horizon 6 Mean for Microsoft and Citrix?

DesktopVirtualizationAt first glance, it looks like VMware’s recently announced Horizon 6 platform is an admission by VMware that applications, rather than desktops, do matter, and that Citrix has been on the right track all along. Certainly, XenApp has been a thorn in the side of many VMware View implementations through the years, allowing people to deliver applications to solve problems that View could only solve by throwing more desktops at them. XenApp has always, for all its problems, offered a simple way to host and distribute applications to a wide variety of user devices.

Read More

VMworld 2013: ViewSonic’s Android Based Thin Client, a Hidden Treasure

VMworld2013.150pxAmongst all the major infrastructure and cloud announcements at VMworld this year, I was looking for some interesting technology that would stand out from a EUC perspective.  Every which way I turned there were great solutions displayed on the exhibit hall floor, but hidden in the back row of this highly attended event was the piece of technology that I was looking for.  Released back in May, the ViewSonic SD-A225 and SD-A245 (22 and 24 inch respectively) smart display devices peaked my interest.  The devices are loaded with Android Jelly Bean 4.2 operating system and come pre-configured with Citrix’s XenMobile MDM client, so right out of the box you can apply application and device level security using your existing XenMobile infrastructure. The devices are very feature rich, providing a touch screen that puts out 1920×1080 resolution in full HD powered by a NVIDIA Tegra 3 quad core processor, Bluetooth, Gigabit Ethernet, Speakers, USB ports, WiFi and Webcam.

Read More

DesktopVirtualization

Rethinking Thin Clients from a Security Perspective

DesktopVirtualizationCorporate data is floating around on PC’s and laptops, sitting on cloud file-sharing platforms and being transmitted over email.  Laptops and mobile devices are sitting in the trunks of cars at the mall, being left in hotel rooms or lost in the backs of taxis.    Data has become as good as gold.  Credit Card numbers, Social Security numbers, architectural diagrams, marketing plans and source code – each a target for a particular thief.  And just like fine art and jewelry, there is a huge black market of data buyers.  Don’t think your competition wouldn’t want to get their hands on your customer accounts, price lists or intellectual property if they could. There are too many cases in recent history of massive data loss to think that this problem is something that can be easily fixed without changing the way employees get access and use corporate data.

Read More