With the number of mobile devices in use now surpassing that of desktops worldwide, the application virtualization requirements of business mobile users continues to grow exponentially. Whether these users access their business apps from a smartphone, tablet, or—the latest buzzword—“phablet,” their common denominator is their demand for more and better business applications on the go.
With half of the first quarter of 2015 already behind us, many IT organizations are in fast-forward mode, making progress on addressing annual projects and goals, including many that involve virtualization. With the plethora of new products and services available, how many of those virtualization projects are based on shifting gears to new vendors or technologies in order to address business and technical requirements? Continue reading The Circle of Virtualization: Yesterday, Today, and Tomorrow
Among technologists, it’s not unusual to see an acronym or two after a person’s name. In some cases, these acronyms refer to certifications, but sometimes, they reflect participation in one or more elite vendor programs. What are the various elite programs, and how does one become invited to participate?
Citrix shocked many this week with its announcement of 900 job cuts, 700 of which were full-time employees and 200 contractors. Although quota sales positions will be less impacted than other departments, the overall 10% reduction throughout the company will no doubt impact engineering, product management, support, and other technical groups upon which architects, administrators, and engineers rely to produce and support virtualization products.
Our recent Virtualization EUC podcast conversation with Itzik Spitzen, CTO of Reddo Mobility, explained how his company turns Microsoft programs into web apps. Gray dogs like myself will remember how, back in the days of “everything is turning into a web app,” we used XenApp as a temporary solution. Because of this, most of Citrix’s original customers are still using Citrix.
Java is currently the leading exploit vector for Windows machines, and Java vulnerabilities are packaged into many of the “exploit kits” available in the darker corners of the Internet (see http://krebsonsecurity.com/2010/10/java-a-gift-to-exploit-pack-makers/). Internet Explorer, Flash Player, and even the Windows operating system itself have done a good job of either improving the security of their products or improving their patching processes. Java, however, still lags noticeably behind in both user/media awareness and quality of code. According to some statistics, Java vulnerabilities account for up to 70% of successful exploits, making it a veritable nightmare from a security perspective.