by Theresa Miller | Jun 4, 2019 | Citrix, Strategy, Theresa Miller
Recently Citrix Synergy was hosted in Atlanta, GA at the conference center in the heart of the city near Olympic park. Normally when I write about this event I cover the keynote or dive into some of the technical depths. This year I decided to take a different...
by Theresa Miller | May 30, 2019 | eG Innovations, Monitoring Tools, Sponsored, Theresa Miller
Does your enterprise have applications that run on Microsoft .NET, but your infrastructure team doesn’t have any real visibility into how its functioning? Whether the application is developed by a third party such as Microsoft SharePoint, or you have a custom...
by Theresa Miller | May 14, 2019 | Adam Fowler, Platforms, Security, Strategy
Cyber Security Essential Eight and Microsoft Part 1 here. Continuing on from Part 1, here’s the second half of the Australian Government’s “Essential Eight” recommendations in mitigating Cyber Security Attacks, and where Microsoft fits into meeting them....
by Theresa Miller | Apr 24, 2019 | Goliath Technologies, Monitoring Tools, Platforms, Theresa Miller
Citrix XenApp Architecture can be complex with a lot of moving parts. What happens when you get a call from a user indicating that their logon is latent causing them a Citrix logon issue? The troubleshooting process can take a lot of time. Let’s take a closer look...
by Theresa Miller | Apr 16, 2019 | Adam Fowler, Security
The Australian Government has promoted its “Essential Eight” recommendations in mitigating Cyber Security Attacks for quite some time. These recommendations are quite solid, and worth reviewing for any organization. Let’s have a look at the first...