Data protection laws in action, Microsoft breaches law with Windows 10
In a couple of months the world will have to deal with the European GDPR law. Many companies have not even started working to comply with that new law. I even heard stories of companies wondering if...
View ArticleSecuring the workspace, part I : chasing bad versus ensuring good
Security is a thing we have to deal with more ever than before. At vEUCTechCon I presented a session about securing the workspace. The intend of that session was to create awareness of threats out...
View ArticleGoliath Technologies Availability Monitor renewed – A first look
As I wrote in previous articles, logon simulators or availability monitors are important assets in any modern infrastructure. Goliath Technologies was one of the vendors with a solution for this, they...
View ArticleFRAME, a quick look at a Cloud-born application delivery platform
Application delivery over the years has changed dramatically. We moved from local execution to a central one and from that central one to a Cloud-based one. The last step however going from central to...
View ArticleSecuring the Workspace Part 2: A few security basics for your Workspace
Security is a chess game, we on one side and the bad guys on the other. In my previous Workspace related article I discussed whether we should chase bad or ensure good. In this blog I’d like to get a...
View ArticleVMware Workspace ONE – howto configure SSO for Amazon Web Services
VMware Workspace ONE is one of the markets most advanced portals. I’m working on some large implementations and I thought it might be handy to post things I ran into. VMware offers a good overview how...
View ArticleTuning Windows 10 Part 4: Deploying the golden image
There has been a popular request for this article, in the series I was writing number four was missing. I thought, and boy was I wrong, that no one would be interested in reading about a deployment of...
View ArticleSecuring the Workspace part 3: How UEM can assist in securing your Workspace
In the previous blogs, I wrote about security and security basics. If you are interested in those blogs you can find them here Part 1 and Part 2. This blog will show you how a User Environment...
View ArticleA recap of 2017 blog posts on robbeekmans.net categorized
Let’s start the year with a recap of the articles I wrote in 2017. In 2017 I wrote a number of articles that ended up in a series and there were a lot of articles about a range of topics. So let’s give...
View ArticleVMware Horizon 7.4 – Blast gets necessary update to support Chroma...
VMware released Horizon 7.4 and besides some interesting features like collaboration, I noticed one other announcement. In a previous article, VMware Horizon 7.2: New kid, Blast (Extreme) is the rising...
View ArticleSponsor article: Vembu Technologies – BDR Suite v3.9.0 New feature
One of the advertisers on my blog is to release an update on their product. Version 3.9.0 of the BDR suite is about to be released. This blog post will show you what is coming with the new release. A...
View ArticleSpectre and Meltdown, what do we know about real-life performance impact so far?
They could be titles of a James Bond movie but they are not. They are bugs in the Intel processors, bugs that have been there for ages. A few weeks ago the world learned that anyone with a coding...
View ArticleRelease update: eG Enterprise version 6.3 from eG Innovations
In January, while Citrix Summit was going on eG Innovations released version 6.3 of their monitoring solution. There are several reasons Citrix and eG Innovations are important to each other. One of...
View ArticleIGEL Distrupt EUC Bremen, a short recap
Last week in Bremen IGEL Disrupt EUC was the conference to visit. Together with a few hundred others I enjoyed the event and participated. I thought I give a short impression of the event and the...
View ArticleDeploying VMware Workspace One 3.x – database setup, mandatory or changeable...
One of the most advanced portals on the market is the one from VMware, VMware Workspace One. Workspace One if you would dissect it is Identity Manager and AirWatch combined. Identity Manager is the...
View ArticleSecurity solution: Howto setup VMware Verify to enable two-factor authentication
VMware Verify is a relatively new player on the two-factor authentication method, one that you can use for VMware Workspace ONE for instance. Today I had a customer where we wanted to test VMware...
View ArticleState of the Citrix market 2018 (migration trends) – A DABCC and eG...
Looking for information about how the other organizations are handling Citrix migrations? Interested in what the bottleneck is market-wide for peers? Look no further, a survey held by DABCC and eG...
View ArticleVMware and Citrix offer long term service releases, who is offering what, a...
We live in a 24/7 environment and if we need to believe marketeers everything else needs to move at that speed as well. You are supposed to upgrade and follow suit when an update is released. Some...
View ArticleFrom the 2nd of April I’ll be joining…..
The times they are a-changing was a song by Bob Dylan in 64, times are changing, this time for me. After nine years, and a bit, working for my current employer, it is time to move on. It’s not so...
View ArticleWindows Server 2019 with no RDSH and Windows 10 Multi-user and even RDmi,...
A good buzzing timeline in the morning is what makes my day, rumors, stories is what I need for breakfast. The newest rumors and stories in my timeline suggested that the RDSH role is depleted in...
View Article