The Citrix and Google collaboration continues to accelerate with new product
releases, including Receiver for Chrome and a strong growth of new joint
customers and channel partners.
Citrix and Google have been working together since 2011 to deliver business
apps to the first Chromebooks. With Gartner now predicting Chromebooks will
triple in sales by 2017, a rapidly growing number of customers will be
looking for a way to leverage the enterprise cloud computing capabilities of
the device and services, while still accessing critical line-of-business apps
that they rely on today.
To offer customers the best end user experience in the industry, Citrix is
announcing a new Citrix Receiver for Chrome, which offers Chromebook users
the most advanced user experience features in the industry. Although
HTML5-based solutions, such as Citrix Receiver for HTML5, will work on Chr... (more)
Couchbase, Inc., provider of the most complete NoSQL database, today
announced the beta release of Couchbase Server 3.0. With this beta release,
Couchbase seeks to get valuable user input on new features that strengthen
its core architecture and greatly improve the developer and administrator
experiences. In addition to making the beta version available, Couchbase has
launched a bug bash with winners to be announced at its annual user
conference in San Francisco, Couchbase Connect.
“In this release, we are extending our core architecture in ways that
further Couchbase Server’s lead as the most scalable and best performing
NoSQL database,” said Ravi Mayuram, Senior Vice President of Products and
Engineering, Couchbase. “In addition to foundational changes, like the
advanced stream based protocol and tunable memory, that improve performance
and enable Couchbase to su... (more)
Jersey City, NJ, November 18, 2009 - Buying or borrowing software on the
Internet carries risks, both for the developer and for the person who plans
to use it. End users who install malicious software in their computers may
lose their purchase price. Worse, they may risk damaging their computers.
Developers risk that someone may intercept their software file and alter it,
adding deleterious code. Such alterations could damage their professional
Developers who sell or exchange software can protect their code and their
reputations by using code-signing certificates. Code-signing certificates
create X.509 data files called “signatures” that developers can attach to
their software files. The signature disappears from the software if anyone
(including the developer) alters the code.
The digital signature functions as tamper-proof packaging for intangible
Not too long ago I wrote about VDI and BYOD, and how their hype cycles were
impacting IT. In that article I was pretty dismissive of the corporate-wide
democratization of IT through BYOD, and I stand by that. Internally, it is
just not a realistic idea unless and until management toolsets converge.
But that’s internally. Externally, we have a totally different world. If
you run a website-heavy business like banking or sales, you’re going to
have to deal with the proliferation of Internet enabled phones and tablets.
Because they will hit your websites, and customers will expect them to work.
Some companies – media companies tend to do a lot of this, for example –
will ask you to download their app to view web pages. That’s ridiculous,
just display the page. But some companies – again, banks are a good example
– have valid reasons to want customers to use an app to acce... (more)
SAN FRANCISCO, March 24, 2014 /PRNewswire/ -- Today Interop previews the
latest innovations and news from more than 100 exhibitors who will make
announcements at Interop Las Vegas, happening next week, March 31-April 4 at
the Mandalay Bay Convention Center. As the leading independent technology
conference and expo series, Interop will highlight the latest advancements in
networking, virtualization, cloud, mobility, data centers and everything in
between. For more information and to register, please visit: interop.com.
"Interop continues to inspire and inform the world's foremost IT decision
makers, serving as a place to find actionable solutions for pain points and
future developments in the enterprise," explained Jennifer Jessup, Interop
General Manager. "Now more than ever it is critical for businesses to have
the opportunity to evaluate products and services side... (more)
Open Source SSL Accelerator solution not as cost effective or well-performing
as you think
o3 Magazine has a write up on building an SSL accelerator out of Open Source
components. It's a compelling piece, to be sure, that was picked up by
Slashdot and discussed extensively.
If o3 had stuck to its original goal - building an SSL accelerator on the
cheap - it might have had better luck making its arguments. But it wanted to
compare an Open Source solution to a commercial solution. That makes sense,
the author was trying to show value in Open Source and that you don't need to
shell out big bucks to achieve similar functionality. The problem is that
there are very few - if any - commercial SSL accelerators on the market
today. SSL acceleration has long been subsumed by load balancers/application
delivery controllers and therefore a direct comparison between o3's Open
Jersey City, NJ, September 29, 2009 - Comodo Group will exhibit its landscape
of products at the SC World Congress, a trade show for information technology
professionals in New York City, October 13 and 14, 2009.
Comodo products being demonstrated include Comodo Endpoint Security Manager,
which now includes Disk Encryption at no extra charge. Comodo Endpoint
Security Manager offers centralized administration of the award-winning
Comodo antivirus, firewall and disk encryption software. Endpoint Security
Manager also offers a new Offline Updater, permitting administrators to
schedule security updates for an entire network.
Other Comodo products being demonstrated include Discovery Scanning, an
automated inventory of all SSL certificates on a corporate network, and the
hardware-free Two-factor Authentication used for regulatory compliance.
Comodo Two Factor now has a f... (more)
It’s that time of year when we gift and re-gift, just like this text. And
the perfect opportunity to re-post, re-purpose and re-use all my 2012 blog
entries. If you missed any of the approximately 130 blogs including 73
videos, here they are wrapped in one simple entry. I read somewhere that
lists in blogs are good.
Have a Safe and Happy New Year.
The Top 10, Top 10 2013 Predictions
Security’s FUD Factor
You’ll Shoot Your Eye Out…
Holiday Shopping SmartPhone Style
SharePoint Conference 2012: The Video Outtakes
SPC12 Special Features ‘Radio Killed the Privacy Star’ Music Video?
SharePoint Conference 2012: That’s a Wrap
SharePoint Conference 2012 Partner Spotlight – The SCE Group
SharePoint Conference 2012: Secure Remote Access & SSO with BIG-IP APM
SharePoint Conference 2012: Configuring SharePoint on BIG-IP
SharePoint Conference 2012: Gimme 90 Seconds with James He... (more)
It sounds like a parlor trick, but one of the benefits of API centric
de-facto standards such as REST and JSON is they allow relatively seamless
communication between software systems.
This makes it possible to combine technologies to instantly bring out new
capabilities. In particular I want to talk about how an API Gateway can
improve the security posture of a Hadoop installation without having to
actually modify Hadoop itself. Sounds too good to be true? Read on.
Hadoop and RESTful APIs
Hadoop is mostly a behind the firewall affair, and APIs are generally used
for exposing data or capabilities for other systems, users or mobile devices.
In the case of Hadoop there are three main RESTful APIs to talk about. This
list isn’t exhaustive but it covers the main APIs.
WebHDFS – Offers complete control over files and directories in HDFS HBase
REST API – Offers access to ... (more)
In 2005, a Preventsys (now McAfee) and Qualys survey found that 52% of
companies rely on a ‘Moat & Castle’ approach to Network Security but also
admitted, at the time, that once the perimeter is penetrated, they are at
risk. I haven’t been able to find a more recent statistic but I’m still
betting that once a network is breached, it’s at risk. Networks are
evolving, expanding and exploding with more data than ever before which means
they also need to be smarter about who and what they allow on. They have
become Application Delivery Networks and soon, truly Identity Aware. At the
same time, many Enterprise networks are making interconnections with other
Corporate networks enabling Federation or trust between the two to create an
The good news/bad news about this is that according to Verizon Business’
“2009 Data Breach Investigations Report (pdf)” 32... (more)
I’m really not one of those vocal Operating System lover/haters. My dad
worked at IBM for 30 years and so I grew up with computers and even took a PC
Jr. with a whopping 128k of RAM and a color (what we called color) monitor
with me to college in the 80’s. My first work computer was a Macintosh and
learned about all that AppleTalk stuff and the cool publishing Quark could
do. I’ve used and administrated Win3.1, NT 4.0 (on laptops), Win95, WinME,
Win2000/Server, and of course a user of XP and Vista along with a few
variants of Linux. I use Windows for home and work and personally I think
each OS has it’s plus’/minus’. Very non-committal, I know. Now I’m
looking to buy a new computer and with that, a new Operating System.
If you’ve been avoiding the news, TV or print ads over the last year,
Windows 7 is the long awaited new OS from Microsoft. Much has been written