Balance VDI user experience and security

Balance VDI user experience and security

In the world of VDI, balance is also essential when it comes to user experience and security. Unfortunately for VDI administrators, there is no all-powerful chosen one who can swoop in and deliver the balance they need. One of the measures for securing your VDI is to allocate enough hardware resources to ensure virtual desktops perform at least as well as physical desktops do.

A successful print security plan in 8 steps

A successful print security plan in 8 steps

Printers and multifunction printers (MFPs) are not immune to the security threat and are vulnerable to the same risks as any device on the network. As IoT devices they are susceptible to the growing threat of DDoS attacks – left unsecured they are an open door to the corporate network.

What is new with Docker for AWS public Beta

What is new with Docker for AWS public Beta

Yesterday, Docker announced that Docker for AWS is graduating to public beta. Docker for AWS is a great way for ops to setup and maintain secure and scalable Docker deployments on AWS. With Docker for AWS, IT ops teams can deploy a standard Docker platform, integrate deeply with underlying infrastructure to ensure Docker takes advantage of the host environment’s native capabilities and exposes a familiar interface to administrators, deploy the platform to all the places where you want to run Dockerized vApp and make sure the latest and greatest Docker versions are available for the hardware, OSs, and infrastructure you love.

Isolating systems with Linux Namespaces

Isolating systems with Linux Namespaces

If you’ve used tools like Docker, you already know that these tools are capable of isolating processes in small “containers”. Running processes in Docker containers is like running them in virtual machines, only these containers are significantly lighter than virtual machines.

With the introduction of Linux namespaces, it became possible to have multiple “nested” process trees. Each process tree can have an entirely isolated set of processes. This can ensure that processes belonging to one process tree cannot inspect or kill – in fact cannot even know of the existence of – processes in other sibling or parent process trees. Every time a computer with Linux boots up, it starts with just one process, with process identifier (PID) 1. This process is the root of the process tree, and it initiates the rest of the system by performing the appropriate maintenance work and starting the correct daemons/services.

Skip to content