Skip to main content

Wyse joins hands with VMware to enhance VDI

As a key first phase of the collaboration, Wyse has joined the VMware Community Source program and plans to integrate its Wyse infrastructure deployment and management solutions with the VMware virtual infrastructure, across its thin-client platform portfolio: Windows XPe, Windows CE, Wyse Thin OS and Linux.

“We are very excited about working with VMware to deliver the combined benefits of virtualization and thin computing to our enterprise customers,” said Ali Fenn, Vice President Business Development & Alliances at Wyse Technology. “Both companies are committed to providing an end-to-end solution that makes for seamless adoption of this exciting new technology. A virtualized environment is the perfect complement for our thin clients, allowing customers to easily deploy integrated, end-to-end solutions.”

“Over the years many of VMware’s customers have extended their VMware virtual infrastructure, originally deployed for server consolidation, to also consolidate full end-user desktop environments onto centrally managed servers. This approach delivers a unique set of combination of increased security and reduced IT management costs while preserving compatibility with a dedicated end-user desktop model,” said Brian Byun, Vice President of Products and Alliances at VMware. “We are excited to be working with Wyse Technology to combine their leadership in thin computing with our proven capabilities in dynamic, virtualized server infrastructure. We look forward to enhancing our joint virtual desktop solutions through the VMware Community Source program.”


Read the rest.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op