Profile cover photo
Profile photo
DABCC.com - IT News
246 followers -
Cloud, Data Center, Desktop, Mobility, Security, Storage, Virtualization News, Support, Podcasts, Videos, Downloads & More
Cloud, Data Center, Desktop, Mobility, Security, Storage, Virtualization News, Support, Podcasts, Videos, Downloads & More

246 followers
About
Posts

Post has attachment
Add a comment...

Post has attachment
Add a comment...

Post has attachment
NEW! Our favorite comic is back with a new strip: Sysadminotaur #68: COBOL
Sysadminotaur #68: COBOL
Sysadminotaur #68: COBOL
blog.devolutions.net
Add a comment...

Post has attachment
Finally a video of me that I like... How easy it was to chat with the guys at VMBlog. If you have a couple minutes, watch and hear me talk about my path through computers, from what does @DABCC stand for to why IGEL #EUC #DisruptEUC #Citrix
Add a comment...

Post has attachment
our favorite techie Comic - Sysadminotaur #67: E-Card - https://blog.devolutions.net/2018/01/sysadminotaur-67-e-card
Sysadminotaur #67: E-Card
Sysadminotaur #67: E-Card
blog.devolutions.net
Add a comment...

Post has attachment

Post has attachment
Nice collection of info on the IGEL UD Pocket USB thin client - IGEL UD Pocket: Secure the Rogue Workforce with Ease - https://www.xentegra.com/igel-pocket-secure-rogue-workforce-ease/
Add a comment...

Post has attachment

Post has attachment
How to configure a Citrix NetScaler VPX instance on AWS by using Citrix CloudFormation template – Video - Watch this video to learn how to configure a Citrix NetScaler VPX standalone instance on Amazon Web Servic (AWS) by using the Citrix CloudFormation template. For more information, see the “Deploying a NetScaler VPX Standalone Instance on AWS” topic on our documentation site: This video is from the fine folks at Citrix
Add a comment...

Post has attachment
CISOs discuss micro-virtualization (VM) for endpoint security protection - New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security C...
Add a comment...
Wait while more posts are being loaded