Impact of cultural & social aspect on remote delivery

posted

VLADISLAV VLADIMIROV Senior Manager, Professional Services Center of Excellence (PS CoE) What are the benefits of remote delivery? The benefits are many, and no reasonable business person would pass on the advantages offered by remote delivery. Nonetheless, to attain all the gains of remote delivery, one must take into account all cultural intelligence that must Read more...

What is Site Reliability Engineering?

posted

JAMES WIRTH Technical Solutions Architect Digital Transformations Begets Software Oriented Operations Because digital transformation requires new and more expeditious ways of delivering software solutions, both internally and externally, companies should become more software oriented within core infrastructure and operations (I&O) teams. Site Reliability Engineering Enables Rapid Innovation and Stable Delivery Companies seeking to increase velocity Read more...

Automated Secure Desktop Solution

posted

TAI RATCLIFF Senior Solutions Architect Many security breaches occur in the desktop environments. In some cases, admins and users make unauthorized changes in order to “get their jobs done”. It is easy enough to lock down a desktop so that end-users only have minimal access rights but the more you lock down the desktop the Read more...

Steps for monitoring App Volumes with Log Insight Manager

posted

  JEREMY WHEELER Consulting Architect End User Computing In this blog post we will walk through the process of setting up vRealize Log Insight Manager to monitor your App Volumes environment. This blog is going to make some assumptions. We’re assuming you have already deployed App Volumes. We also assume you have deployed and configured Read more...

Configuring Identity Manager in a DMZ with Internal Connector

posted

JEFFREY DAVIDSON Consulting Architect In this blog post we will walk through the process of setting up VMware Identity Manager (Workspace One) in a DMZ and use a connector appliance on the internal (trusted) network for secure active directory sync and authentication. This blog is going to make some assumptions. We’re assuming you have already Read more...