How the Shift to Cloud Affects VMware EUC Technologies

posted

Anyone following technology news these days knows that the cloud is everywhere. The shift to cloud technologies and software-as-a-service (SaaS) has been more than a major transition for the industry; it has been a key market disruptor for the entire technology economy. Like most software companies, VMware has made the shift to cloud and SaaS Read more...

Drive Value with Workspace ONE Intelligence in Five Easy Steps

posted

One of the most exciting new tools in the Workspace ONE suite is undoubtedly Workspace ONE Intelligence. This tool allows administrators to gain insights into their entire digital workspace, as well as enforce security and compliance measures across the enterprise. For example: Want weekly reports on non-compliant devices in your environment? Intelligence can do that! Read more...

Building a Modern Management Team

posted

The change from legacy PC lifecycle management (PCLM) tools to Windows 10 Modern Management can be a major one. Most organizations tend to focus on the technology challenges associated with this transition: How will I evolve from GPOs to device or user profiles? How will I get out of the business of imaging devices? How Read more...

Is Retail Dead? Part 2 – Planning Considerations for Mobility in Retail

posted

Planning Considerations for Mobility in Retail   In Part 1 of this series I covered how a Business (Retail or other), could adopt the following four focus areas in data capture and Mobile device usage within their business environment: Mobile devices to improve customer service. Faster look-ups and check-outs via Mobile POS Improve communication and Read more...

Configure Certificate Based Authentication for VMware Identity Manager (Workspace ONE) in a DMZ Deployment

posted

In this blog post we focus on Identity Manager Workspace ONE Certificate Authentication and will walk through the process of setting up certificate based authentication for VMware Identity Manager (Workspace ONE) for DMZ deployments. Certificate based authentication has requirements which for the purposes of this blog we assume already exist in the environment. To take Read more...