Data security is one of the issues that most concern companies when deciding about public or private cloud.
Usually, organizations tend to be more skeptical with public cloud, but there are a number of tests that can be run to identify and fix possible security holes in this type of clouds.
In order to perform these tests, first you will have select a fragment of the cloud environment that you want to test and then, you will be ready to define the strategy to be followed.
-Hypervisor Software. The software that is installed on the server infrastructure and that is responsible for assigning memory, processing, network and disk resources to the virtual machines hosted on the platform.
-Virtual image machine or golden image. Virtual machine with the necessary OS and applications installed in order to perform a subsequent deployment of the virtual desktops based on this image.
Protocols Plugfest Europe 2015 will be held next May 12, 13 and 14 at Zaragoza (Spain). This conference will bring together experts from leading technology companies and Open Source projects so that they can share visions, experiences and technical knowledge to help advance the industry in its quest for interoperability.
This event reinforces the collaboration on interoperability and protocols between Open Source and non-Open Source companies and projects. The agenda includes technical and business insights from Microsoft, Red Hat, CENATIC, SerNet, Dell, Collabora, KDE, FSFE, RavenDB, Kolab Systems, LibreOffice, Igalia, BlueMind, Bitergia, Samba, OpenChange, Libelium, Griffin Brown Publishing, id law partners and Hibernating Rhinos.
To implement a desktop virtualization platform some minimum components at hardware level are necessary. The essential requirements are a server infrastructure, a network architecture, storage and client devices:
-Server Infrastructure. It consists of the necessary servers with enough processing and physical memory capacity for hosting the hypervisor layer, which will assign the necessary hardware resources to the virtual desktops.
-Network electronics. This will allow for interconnection between the different platform
components. Network architecture for a VDI platform can be very complex, so it’s crucial that these components are of the highest quality.
The recent news about Java in UDS Enterprise, the possibility of WindowsOpen Source and Cisco Connect 2015 Conference have been the most outstanding topics in our blog for the last two weeks.
Find below the links to the most interesting news according to our followers:
XXII asLAN.2015 Conference is being held today and tomorrow in Madrid, an event focused on the new digital infrastructures available to businesses and Governments to optimize deployment, mobility and safety… of infrastructures and network applications.
Among the different forums in this event, the one related to government deserves special attention, where topics as, for example, mobility in government as one of the keys to improve the efficiency and move towards a “connected society”, more globalized and competitive are discussed.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.