Monday, June 30, 2014

Tinder Suspends Co-Founder In Wake Of Sexual Harassment Lawsuit

Comments



from Hacker News http://bit.ly/1k8XTBw

via IFTTT

Tiedot – Your NoSQL database powered by Golang

Comments



from Hacker News http://bit.ly/V69ATL

via IFTTT

Only five countries escape NSA surveillance: Report

All countries except Australia, Canada, New Zealand, and the UK are of "valid interest" to the NSA, the Washington Post reports.



via Latest Topic for ZDNet in Security http://zd.net/1qdIqWO

For entrepreneurs building companies in the United States and India

Comments



from Hacker News http://bit.ly/1x8WsuN

via IFTTT

The Best Code Documentation ‘Tool’ Ever Made

Comments



from Hacker News http://bit.ly/1qM6O0S

via IFTTT

Learn how to optimize your infrastructure for today, and prepare for tomorrow's...






EMC logo
Learn how to optimize your infrastructure for today, and prepare for tomorrow's challenges.



Join the discussion on July 8th at our Redefine Possible event. http://emc.im/redepo










via EMC Feeds http://bit.ly/1r9PqWr

Discover how we are teaming up with @charitywater to help solve the global water crisis: http://bit.ly/1mDdjy0 http://bit.ly/1mDdkC7






EMC logo
Discover how we are teaming up with @charitywater to help solve the global water crisis: http://bit.ly/1mDdjy0 http://bit.ly/1mDdkC7






via EMC Feeds http://bit.ly/1mDdkSn

Learn how to optimize your infrastructure for today, and prepare for tomorrow's...






EMC logo
Learn how to optimize your infrastructure for today, and prepare for tomorrow's challenges.



Join the discussion on July 8th at our Redefine Possible event. http://emc.im/redepo










via EMC Feeds http://bit.ly/1r9PqWr

Discover how we are teaming up with @charitywater to help solve the global water crisis: http://bit.ly/1mDdjy0 http://bit.ly/1mDdkC7






EMC logo
Discover how we are teaming up with @charitywater to help solve the global water crisis: http://bit.ly/1mDdjy0 http://bit.ly/1mDdkC7






via EMC Feeds http://bit.ly/1mDdkSn

Journey To A Full Scale Hybrid Architecture with vCloud Hybrid Service – Part 3

By:Chris Colotti In the first postI talked about the basic architecture of a large scale hybrid cloud build out, as well as integrating an on premises view environment into the vCHS hybrid cloud. We extended that Horizon View environment into the vCloud Hybrid Service by adding security servers and global load balancing on the top […]]> By:Chris Colotti

In the first postI talked about the basic architecture of a large scale hybrid cloud build out, as well as integrating an on premises view environment into the vCHS hybrid cloud. We extended that Horizon View environment into the vCloud Hybrid Service by adding security servers and global load balancing on the top layer. You may be asking yourself “why” did we do that? Well, the ultimate goal of building this out was to mesh together vCloud Hybrid Service – Disaster Recovery and desktops to access those applications. With the next stage we set out to replicate an internal only application to vCHS-DR and use DaaS on vCHS to give the users access to it once it was failed over.


The Use Case Background


Before we go into the architecture solution we need to understand the problem we are trying to solve. Many times in the past I have shown how you can fail over public facing applications. However, not every application is web-based, public facing, or of a “Next Generation” architecture. In a lot of cases many applications are still internal only and although may be web based, need a desktop on the corporate side to access it. This is also the case for legacy fat client applications. So the goal in this architecture was to show how a user can connect to an application on premises and also connect to that same application once vCHS-DR is invoked to fail it over. The solution will comprise a few components for illustration, refer to the original overview diagram to understand all the connection points.



  • On premises Horizon View Desktops previously configured

  • On premises “Wiki” based application with a local DNS Entry

  • On premises AD/DNS Servers

  • vCloud Hybrid Service – Disaster Recovery running on the Wiki server ONLY

  • VMware Horizon DaaS on vCHS

  • IaaS based AD/DNS with VPN connection to the DR Cloud

  • Cloud to Cloud VPN from Horizon DaaS Cloud to vCHS-DR Cloud

  • Access to External DNS system

  • A Horizon View Desktop Client


For the purposes of continuing we will assume that the VPN’s and networks are already configured and replication is running on the Wiki Server. We will also assume from the previous article that the desktop image used for Horizon View on premises is available and ready to synchronize with the new Horizon DaaS cloud. In order to make this all work we need to first ensure the same desktop image is available in DaaS on vCHS for the customer. We will double click into a few of the virtual data centers above later on.


Synchronizing View and DaaS Images with vCloud Connector


For ease of deployment we created our Horizon View on premises desktop image in vCenter. We set it up the way we wanted and then used vCloud Connector Content Sync to push a copy of that up to our DaaS on vCHS cloud. This way we are able to subscribe the DaaS catalog to the vCenter version of the image. vCloud Connector catalog sync then ensures that the DaaS cloud has the same copy available to use. This is not required and there is other DaaS related things you need to do to utilize the image, but we won’t go into that. The concept is just to build one image and sync to the cloud(s). If you want to learn more about Content Sync with vCloud Connector you can watch this video. Honestly it’s easy to setup and takes care of ensuring the image is always in sync. Once you have the image in cloud you can use the admin tools of Horizon DaaS on vCHS to create and deploy a desktop pool with the exact same image.


The Fail Over Process (Run Book)


In normal running conditions, the user would connect to view.companyname.com with their Horizon View Client, access their corporate desktop and get to the Wiki Application using http://Wiki01/ from a desktop browser. In order to ensure the client can get to the same application during failure we need to invoke a process such as this:



  1. Failover the Wiki Application to the vCHS-DR cloud

  2. Re-IP the application in the new cloud and power on

  3. Update the local DNS Servers in the IaaS cloud for the Wiki Entry

  4. Re-Direct External DNS for view.companyname.com to point to the DaaS Cloud instead on on Premises View

  5. Clients can then log in and access the same application, 100% cloud based on desktop and IaaS.


For illustration purposes the logical diagrams below show the on premises environment along with the disaster recovery, and IaaS environments. Remember that the assumption here is all these have the proper cloud to cloud VPN’s and firewall rules setup for network connectivity per the first image.


Below is the On Premises logical architecture. Notice the desktops are are available behind Horizon View and can connect to “WIKI01″


Below is the Dedicated Las Vegas IaaS cloud that is where the AD/DNS is running for access to directory and name services once fail over occurs. Recall that VPN connections here are in place between the DaaS cloud and the vCHS-DR cloud for access to these services.


Below is the Dedicated Las Vegas DaaS tenant logical architecture. You can see the dtRAM gateways in place on the internet passing connection to the DaaS based desktops in vCloud Hybrid Service. Remember this cloud is connected via VPN to the vCHS-DR cloud so it can access the application below upon fail over.


In the Texas Disaster Recovery Cloud shown below, we can do a full fail over or a test fail over. In each case the WIKI01 server will be connected to one of the two networks. Once it is given a new IP address and DNS is updated the DaaS desktops will be able to connect.


Using External DNS To Manage Connectivity


In order to quickly re-direct a user’s View Client from on premises Horizon View to the DaaS desktop and making it transparent to them you need to get creative. In my case I created the following External DNS records to support this use case.


view.dyn.companyname.org = Public IP of View Secure Gateway (A-Record)

daas.dyn.companyname.org = Public IP of Horizon DaaS dtRAM Gateway(A-Record)

view.companyname.org =view.dyn.companyname.org (CNAME 30 Second TTL)


If you are an avid user of DNS for cases like this you should be able to see why I did this. During normal operations the users always connect to view.companyname.com in their client. However, in a disaster event you FLIP the CNAME to use the daas entry on the back end and when the client connects it’s completely transparent to them they are now on a DaaS cloud based desktop. Pretty simply a clean and easy way to manage this step in the run book.


The Role of SSL Certificates For Clients


Something you want to make sure of in this setup so that all clients, both desktop and tablet based work, is that you need to use proper certificates. You have really two options here to maintain the transparency to the user



  1. Install the SSL certificate for view.comnpanyname.com on all View Security Servers AND all the DaaS gateway servers.

  2. Use a wildcard certificate on all the servers


In either case the client is always connecting to “view.companyname.com” so when you flip between Horizon View Servers and DaaS gateway servers, you need the client to be able to authenticate the cert with the same name. The goal here is to make it easy for the end user by not requiring them to change URL’s for their client.


Example Fail Over Video


COMING SOON!


Summary and Conclusions


My entire goal in life with this very extensive lab setup is simply to prove that you can use vCloud Hybrid Service not only for IaaS, DaaS, and DR…..but most importantly you can pull all the parts together into one enterprise level architecture. Instead of using vCHS-DR on the desktops themselves save yourself time and effort. Focus on the applications for DR along with the infrastructure and just leverage vCHS based desktops in Horizon DaaS to connect to those applications you have failed over.






via VMware Blogs http://bit.ly/1qM4qay

Counterargument to AWS TCO Comparison Calculator

Take a moment to read this post; our public response to the recently launched AWS TCO Comparison Calculator. It points out the inaccurate assumptions used by the calculator and a VMware perspective on the true total costs of ownership when comparing a VMware SDDC offering and AWS.



via VMware Blogs http://bit.ly/1r9Kv7N

The new 501(c)(3) and the future of open source in the United States

Comments



from Hacker News http://bit.ly/1qt9iUf

via IFTTT

Journey To A Full Scale Hybrid Architecture with vCloud Hybrid Service – Part 3

By:Chris Colotti In the first postI talked about the basic architecture of a large scale hybrid cloud build out, as well as integrating an on premises view environment into the vCHS hybrid cloud. We extended that Horizon View environment into the vCloud Hybrid Service by adding security servers and global load balancing on the top […]]> By:Chris Colotti

In the first postI talked about the basic architecture of a large scale hybrid cloud build out, as well as integrating an on premises view environment into the vCHS hybrid cloud. We extended that Horizon View environment into the vCloud Hybrid Service by adding security servers and global load balancing on the top layer. You may be asking yourself “why” did we do that? Well, the ultimate goal of building this out was to mesh together vCloud Hybrid Service – Disaster Recovery and desktops to access those applications. With the next stage we set out to replicate an internal only application to vCHS-DR and use DaaS on vCHS to give the users access to it once it was failed over.


The Use Case Background


Before we go into the architecture solution we need to understand the problem we are trying to solve. Many times in the past I have shown how you can fail over public facing applications. However, not every application is web-based, public facing, or of a “Next Generation” architecture. In a lot of cases many applications are still internal only and although may be web based, need a desktop on the corporate side to access it. This is also the case for legacy fat client applications. So the goal in this architecture was to show how a user can connect to an application on premises and also connect to that same application once vCHS-DR is invoked to fail it over. The solution will comprise a few components for illustration, refer to the original overview diagram to understand all the connection points.




  • On premises Horizon View Desktops previously configured

  • On premises “Wiki” based application with a local DNS Entry

  • On premises AD/DNS Servers

  • vCloud Hybrid Service – Disaster Recovery running on the Wiki server ONLY

  • VMware Horizon DaaS on vCHS

  • IaaS based AD/DNS with VPN connection to the DR Cloud

  • Cloud to Cloud VPN from Horizon DaaS Cloud to vCHS-DR Cloud

  • Access to External DNS system

  • A Horizon View Desktop Client


For the purposes of continuing we will assume that the VPN’s and networks are already configured and replication is running on the Wiki Server. We will also assume from the previous article that the desktop image used for Horizon View on premises is available and ready to synchronize with the new Horizon DaaS cloud. In order to make this all work we need to first ensure the same desktop image is available in DaaS on vCHS for the customer. We will double click into a few of the virtual data centers above later on.


Synchronizing View and DaaS Images with vCloud Connector


For ease of deployment we created our Horizon View on premises desktop image in vCenter. We set it up the way we wanted and then used vCloud Connector Content Sync to push a copy of that up to our DaaS on vCHS cloud. This way we are able to subscribe the DaaS catalog to the vCenter version of the image. vCloud Connector catalog sync then ensures that the DaaS cloud has the same copy available to use. This is not required and there is other DaaS related things you need to do to utilize the image, but we won’t go into that. The concept is just to build one image and sync to the cloud(s). If you want to learn more about Content Sync with vCloud Connector you can watch this video. Honestly it’s easy to setup and takes care of ensuring the image is always in sync. Once you have the image in cloud you can use the admin tools of Horizon DaaS on vCHS to create and deploy a desktop pool with the exact same image.


The Fail Over Process (Run Book)


In normal running conditions, the user would connect to view.companyname.com with their Horizon View Client, access their corporate desktop and get to the Wiki Application using http://Wiki01/ from a desktop browser. In order to ensure the client can get to the same application during failure we need to invoke a process such as this:



  1. Failover the Wiki Application to the vCHS-DR cloud

  2. Re-IP the application in the new cloud and power on

  3. Update the local DNS Servers in the IaaS cloud for the Wiki Entry

  4. Re-Direct External DNS for view.companyname.com to point to the DaaS Cloud instead on on Premises View

  5. Clients can then log in and access the same application, 100% cloud based on desktop and IaaS.


For illustration purposes the logical diagrams below show the on premises environment along with the disaster recovery, and IaaS environments. Remember that the assumption here is all these have the proper cloud to cloud VPN’s and firewall rules setup for network connectivity per the first image.


Below is the On Premises logical architecture. Notice the desktops are are available behind Horizon View and can connect to “WIKI01″



Below is the Dedicated Las Vegas IaaS cloud that is where the AD/DNS is running for access to directory and name services once fail over occurs. Recall that VPN connections here are in place between the DaaS cloud and the vCHS-DR cloud for access to these services.



Below is the Dedicated Las Vegas DaaS tenant logical architecture. You can see the dtRAM gateways in place on the internet passing connection to the DaaS based desktops in vCloud Hybrid Service. Remember this cloud is connected via VPN to the vCHS-DR cloud so it can access the application below upon fail over.



In the Texas Disaster Recovery Cloud shown below, we can do a full fail over or a test fail over. In each case the WIKI01 server will be connected to one of the two networks. Once it is given a new IP address and DNS is updated the DaaS desktops will be able to connect.



Using External DNS To Manage Connectivity


In order to quickly re-direct a user’s View Client from on premises Horizon View to the DaaS desktop and making it transparent to them you need to get creative. In my case I created the following External DNS records to support this use case.


view.dyn.companyname.org = Public IP of View Secure Gateway (A-Record)

daas.dyn.companyname.org = Public IP of Horizon DaaS dtRAM Gateway(A-Record)

view.companyname.org =view.dyn.companyname.org (CNAME 30 Second TTL)


If you are an avid user of DNS for cases like this you should be able to see why I did this. During normal operations the users always connect to view.companyname.com in their client. However, in a disaster event you FLIP the CNAME to use the daas entry on the back end and when the client connects it’s completely transparent to them they are now on a DaaS cloud based desktop. Pretty simply a clean and easy way to manage this step in the run book.


The Role of SSL Certificates For Clients


Something you want to make sure of in this setup so that all clients, both desktop and tablet based work, is that you need to use proper certificates. You have really two options here to maintain the transparency to the user



  1. Install the SSL certificate for view.comnpanyname.com on all View Security Servers AND all the DaaS gateway servers.

  2. Use a wildcard certificate on all the servers


In either case the client is always connecting to “view.companyname.com” so when you flip between Horizon View Servers and DaaS gateway servers, you need the client to be able to authenticate the cert with the same name. The goal here is to make it easy for the end user by not requiring them to change URL’s for their client.


Example Fail Over Video


COMING SOON!


Summary and Conclusions


My entire goal in life with this very extensive lab setup is simply to prove that you can use vCloud Hybrid Service not only for IaaS, DaaS, and DR…..but most importantly you can pull all the parts together into one enterprise level architecture. Instead of using vCHS-DR on the desktops themselves save yourself time and effort. Focus on the applications for DR along with the infrastructure and just leverage vCHS based desktops in Horizon DaaS to connect to those applications you have failed over.






via VMware Blogs http://bit.ly/1qM4qay

Counterargument to AWS TCO Comparison Calculator

Take a moment to read this post; our public response to the recently launched AWS TCO Comparison Calculator. It points out the inaccurate assumptions used by the calculator and a VMware perspective on the true total costs of ownership when comparing a VMware SDDC offering and AWS.






via VMware Blogs http://bit.ly/1r9Kv7N

How to decrypt SSL traffic without access to SSL key


















describes how to decrypt SSL traffic when the SSL key is not accessible by capturing the SSL session keys from the browser.


Views:0

Length:03:11






from CitrixTV RSS Feed http://bit.ly/Tydl3d

via IFTTT

The Apple Enterprise Invasion

By Erik Frieberg, VP of Marketing, End-User Computing, VMware Microsoft Windows has dominated enterprise desktops for close to three decades but it appears its reign is coming to an end. As BYOPC and BYOD continue to transform the enterprise, Macs have become a popular and preferred option compared to Windows PCs. However, complex questions and […]]>

By Erik Frieberg, VP of Marketing, End-User Computing, VMware


Microsoft Windows has dominated enterprise desktops for close to three decades but it appears its reign is coming to an end. As BYOPC and BYOD continue to transform the enterprise, Macs have become a popular and preferred option compared to Windows PCs. However, complex questions and challenges have risen around the support of these two very different platforms.


Since business computing has very unique requirements with legacy Windows desktop infrastructure and application ecosystem, we decided to dig a little deeper to try and understand what IT administrators think about the growing heterogeneous environment.


As a result, VMware commissioned a survey of 376 IT professionals conducted by Dimensional Research to assess the current state of enterprise desktops and created a report titled �The Apple Enterprise Invasion.� We are releasing the results for the first time today and they clearly show that Windows is losing its grip on the enterprise.


End-User Preferences


Perhaps the biggest takeaway from the results is that Windows is no longer the platform of choice in the enterprise with users overwhelmingly preferring Macs. User preference is the top reason given by IT administrators as to why their organization supports Macs with 73 percent of IT administrators identifying it as the main driver.


As a result, it should come as no surprise that the study found that 66 percent of businesses are already using Macs in the workplace today. But as we all know, end-users will work around corporate IT if they don�t get their way but the study found that a large majority of companies – more than 70 percent – officially support Macs as a corporate endpoint.


In addition, Windows PCs clearly have a perception problem with the top three justifications from employees for wanting a Mac being:



  1. Macs are easier to use (73 percent)

  2. Macs are cooler (52 percent)

  3. The Mac display is better than Windows (42 percent)


While employees clearly prefer Macs, there are challenges from an IT perspective that Macs must overcome before they can replace Windows PCs in the enterprise.


IT Perspectives


Although end-users think Macs are easier to use, IT administrators have a different perspective with 75 percent who feel that Macs are not easier to support than Windows PCs. And contrary to popular opinion, 75 percent of IT administrators said that Macs do not offer increased security advantages.


Adding to the challenge, many critical business applications cannot run on Macs today because they were designed for Windows. In fact, 64 percent of IT administrators indicated that none or only some of their enterprise applications run on Macs today.


When considering Macs for use in the enterprise, the top capabilities that are most valuable to IT administrators are all related to productivity and security:



  1. Ability to run Microsoft Office on a Mac (59 percent)

  2. Ability to enable secure access to enterprise applications (59 percent)

  3. Ability to run Windows on a Mac (41 percent)


As you can see, supporting a new OS platform is not as easy as one might think. Application support and compatibility issues are not things that end-users think about but they are critical for IT departments to fully assess and consider.


Bridging the Gap


Fortunately, virtual desktops can serve as a helpful tool to bridge the gap between two disparate operating systems and it�s not just VMware claiming this. The survey found that 89 percent of IT professionals stated that it would be valuable to have a virtual desktop that can run Windows on a Mac and 91 percent of respondents valued the ability to run the same virtual desktop on multiple platforms such as Windows, Mac and Linux.


Virtual desktops allow organizations to standardize on the Windows platform and support legacy business critical applications without any interruption to business while still giving employees the option to select the computer of their choice.


For companies, the choice is very clear – they need to respond to end-user demand for Macs in the enterprise or they will find it difficult to recruit and retain the best talent on the market. They also need to provide IT administrators the tools to support a heterogeneous desktop environment otherwise there will be disruption to the business. Virtual desktops such as Fusion Professional can be a tremendous help for companies in this situation.






via VMware Blogs http://bit.ly/1rRP6Jq

How Colt Technology Services Deployed View Desktops With Ease and Efficiency

By Alexander West, Technical Writer, End-User Computing, VMware, and Matt Coppinger, EUC Architect, End-User Computing, VMware Recently, Colt Technology Services, a leading international IT- and telecoms-services company, confronted two crucial challenges: (1) enabling employees to work remotely and (2) reducing costly desktop and laptop replacements. According to Colt, �We wanted to break the paradigm of […]]> By Alexander West, Technical Writer, End-User Computing, VMware, and Matt Coppinger, EUC Architect, End-User Computing, VMware

Recently, Colt Technology Services, a leading international IT- and telecoms-services company, confronted two crucial challenges: (1) enabling employees to work remotely and (2) reducing costly desktop and laptop replacements.


According to Colt, �We wanted to break the paradigm of a traditional and costly three-year laptop and desktop refresh project. We wanted to release our employees from their reliance on internal IT, and give them the freedom to use any device from any location to access corporate applications.�


Their solution: VMware Horizon with View.


Colt + View


View offers an effective, efficient virtual-desktop solution for enterprises worldwide. At its core, View brings enhanced mobility, security, and productivity to end users everywhere, together with significant financial savings and simplified management to IT organizations of all sizes.


For proof, check out VMware Horizon with View Reference Implementation Case Study for European IT and Network Services Provider, a new technical white paper from VMware. This paper takes a deep dive into the Colt View deployment, with 5,000 end users, multiple data centers, and a network of 62 sites in more than 20 countries. In addition, the paper looks at the considerable business benefits of such a virtual desktop implementation.


But before we get into the details, meet the customer behind our reference implementation case study, Colt Technology Services, and learn exactly what a reference implementation case study is.


Colt Reference Implementation Case Study


Colt Technology Services offers a platform of information-delivery solutions in network, voice, data center, and IT services for major organizations, mid-sized businesses, and network operators. The Colt network spans 22 European countries and 20 data centers, with an expanding presence in the US, Asia, and Africa.


According to a Colt representative:



The Roadmap for development of View, the alignment of VMware as a strategic partner to Colt, and the willingness to provide resources to help adopt the technology, told us that going with VMware was definitely the right decision.



A reference implementation case study gives a detailed description of a real-world project�s approach, architecture, and business benefits, and provides lessons learned during the deployment. The VMware Horizon with View Reference Implementation Case Study for European IT and Network Services Provider is designed to help IT architects, consultants, and administrators who are considering a View deployment or who are involved in the early phases of deploying View.


Profile of the White Paper on Colt and VMware


The newly released VMware Horizon with View Reference Implementation Case Study for European IT and Network Services Provider includes



  • Overviews of the implementation, project, and architecture



  • Details on the technology evaluation, design, and pilot phases



  • A project rollout description


In addition, the paper includes interesting sections on Lessons Learned, Technical Challenges, and Business Drivers.


Figure 1: Project Overview Timeline


The most enlightening section, however, is Business Benefits, which includes the following positive outcomes:



  • Over a four-year period, overall savings have been estimated to be 61 percent for hardware costs and 68 percent for maintenance costs



  • Colt achieved substantial CapEx avoidance, as over 75 percent of contractors are now mandated to use VDI instead of being supplied a Colt desktop or laptop device



  • Colt has achieved a faster time to value by provisioning contractors and new starters with a Colt workspace service



  • Significant workplace-technology-support savings have been accrued by taking advantage of VDI and centralizing services



  • Deploying View has enabled Colt to implement a Bring Your Own Device policy, which allows employees to use any device to access their desktops


According to one happy Colt employee:



It�s better than working over VPN with my old laptop, and I don�t have to carry my Colt laptop bag to and from my home and office each day. I can work on a document in the office, go home, and work on the same session on my Mac seamlessly.



To illustrate just how effective the solution has been for Colt, Colt now uses this same architecture as the basis for their Workspace-as-a-Service offering. This means Colt customers can now realize the business benefits offered by Horizon with View by employing this new service from Colt. To find out more, see the Colt Workspace-as-a-Service solution.


Want More?


For more on VMware Horizon with View, look at the View product page on VMware.com.






via VMware Blogs http://bit.ly/V5CDHb

The Apple Enterprise Invasion

By Dean Flaming, Sr. Technical Marketing Manager – Technical Enablement, End-User Computing, VMware


On behalf of the many folks who helped make this happen, I am proud to announce the release of the Horizon 6 with View Introduction Hands On Lab! This lab is a guided tour of Horizon 6 with View specifically focusing on the new features.


Additional Info


This Horizon 6 with View lab is designed to demonstrate and introduce you to the new Horizon 6 features, starting with the ease of installation and configuration of View, RDS-hosted application setup and configuration, RDS-hosted desktop setup and configuration, and Cloud Pod Architecture configurations, including some scenarios.



Technical Details of This Lab


We designed and built this fully functional, self-contained lab within our VMware Hands On Labs environment, where not only is every lab isolated from other labs, but also all are delivered via our VMware OneCloud enterprise architecture and accessible from around the world. For those readers who have attended VMworld, you will be familiar with this environment because this is the same environment used to deliver Hands On Labs for the VMware major worldwide events.


Attendees are allotted four hours for lab completion, but we expect many will be able to complete the lab in a shorter time span.


This lab contains eight top-level virtual machines; one ControlCenter where you drive the lab; one vPod router; a virtual OpenFiler appliance; a vCenter Server virtual appliance, and four virtual ESXi hosts which host additional nested virtual machines for use in completing the lab exercises.


ControlCenter– ControlCenter is the virtual machine where you drive the lab and run the lab exercises. This system also runs the following services for the lab environment:



  • Microsoft Active Directory Domain Controller

  • DNS

  • Certificate Authority

  • File Sharing


vCenter appliance – The VMware vCenter Server virtual appliance provides the central management and control for the nested vSphere servers.


vCenter Servers – The four VMware vSphere servers work in a clustered configuration and report in to the vCenter Server virtual appliance to run the nested virtual machines needed for this lab to function properly.


OpenFiler appliance – The OpenFiler appliance provides virtual storage to the virtual vSphere servers in order for them to be able to host the nested virtual machines.


vPod Router appliance – The router appliance is a custom-built appliance for our VMware Hands On Labs and other lab environments to route network traffic appropriately, both internal to the vPods as well as externally, when virtually wired for external access.


Nested virtual machines – The virtual machines nested within this vPod architecture are:



  • Horizon View Connection Server-1– The first Connection Server to be set up within the lab.

  • Horizon View Connection Server-2– The second Connection Server to be set up within the lab.

  • RDSH001– The first Remote Desktop Server within the lab. This server already has Microsoft Remote Desktop Services configured.

  • RDSH002– The second Remote Desktop Server to be set up within the lab. This server needs Microsoft Remote Desktop Services installed and configured.

  • Win7-VDI-1– The first Windows 7 virtual machine to be used as a VDI desktop.

  • Win7-VDI-2– The second Windows 7 virtual machine to be used as a VDI desktop.

  • Win8-VDI-1– The first Windows 8 virtual machine to be used as a VDI desktop.

  • Win8-VDI-2– The second Windows 8 virtual machine to be used as a VDI desktop.

  • EndPoint-01– The virtual machine configured to be a simulated endpoint system for accessing the previous VDI desktops and remote applications.


Lab Modules


The lab takes you through three main modules.


View Install and Configure Module– This module is a prerequisite for both of the other two modules. It walks you through the installation and configuration of a connection server, the installation of the agent on a VDI desktop, and the installation and configuration of the client software on the endpoint.


View App Remoting Configuration– The application remoting module walks you through the initial configuration of Remote Desktop Services within a Microsoft Windows server in order to understand exactly what is needed for Horizon 6 with View application remoting. After you have completed the Remote Desktop Services configuration, this module walks you through installation and configuration of the Horizon 6 agent on the RDS hosts and the configuration and validation of RDS application pools and RDS desktop pools.


Cloud Pod Architecture– This module walks you through the installation, configuration, and validation of the global namespace features of View.


Lab Module Navigation


Many of you may not be aware how easy it is to navigate within the Hands On Labs with some of the various tools and functions available for listing lab topics and rearranging the interface.



Arranging the Console – To move the console around on the screen, you can find a control bar on the upper right side of the Web display. This allows you to use a full-screen display, dock the screen to the right or left side of the browser window, refresh the screen in case of latency, or toggle the screen between floating and docked.



Arranging the Lab Manual/Instructions– In addition to moving the console, you can also move, dock, undock, open the Table of Contents to jump to a specific section, or even split-screen the lab manual between your computer screen and your tablet of choice.



Sending Text to Console– You can also send text from your localsystem to the ControlCenter console by use of the Send Text option beneath the Console display. Just click the SEND TEXT button and the “Send text to console” window appears. Type or paste in what you wish to send to the ControlCenter console and click the SEND button.



How to Access This Lab


To access this lab directly, visit the Lab Registration Form to get started!


Wrap-Up


We are excited to bring you this lab—the first lab released in 2014 and the first to be released in conjunction with a VMware product release! Moving forward, this lab will be updated for VMworld to include other modules such as Virtual SAN integration, troubleshooting, and much more!


For more information on VMware Hands On Labs, visit hol.vmware.com and sign up!






via VMware Blogs http://bit.ly/1rRP6Jq

How Colt Technology Services Deployed View Desktops With Ease and Efficiency

By Dean Flaming, Sr. Technical Marketing Manager – Technical Enablement, End-User Computing, VMware


On behalf of the many folks who helped make this happen, I am proud to announce the release of the Horizon 6 with View Introduction Hands On Lab! This lab is a guided tour of Horizon 6 with View specifically focusing on the new features.


Additional Info


This Horizon 6 with View lab is designed to demonstrate and introduce you to the new Horizon 6 features, starting with the ease of installation and configuration of View, RDS-hosted application setup and configuration, RDS-hosted desktop setup and configuration, and Cloud Pod Architecture configurations, including some scenarios.



Technical Details of This Lab


We designed and built this fully functional, self-contained lab within our VMware Hands On Labs environment, where not only is every lab isolated from other labs, but also all are delivered via our VMware OneCloud enterprise architecture and accessible from around the world. For those readers who have attended VMworld, you will be familiar with this environment because this is the same environment used to deliver Hands On Labs for the VMware major worldwide events.


Attendees are allotted four hours for lab completion, but we expect many will be able to complete the lab in a shorter time span.


This lab contains eight top-level virtual machines; one ControlCenter where you drive the lab; one vPod router; a virtual OpenFiler appliance; a vCenter Server virtual appliance, and four virtual ESXi hosts which host additional nested virtual machines for use in completing the lab exercises.


ControlCenter– ControlCenter is the virtual machine where you drive the lab and run the lab exercises. This system also runs the following services for the lab environment:



  • Microsoft Active Directory Domain Controller

  • DNS

  • Certificate Authority

  • File Sharing


vCenter appliance – The VMware vCenter Server virtual appliance provides the central management and control for the nested vSphere servers.


vCenter Servers – The four VMware vSphere servers work in a clustered configuration and report in to the vCenter Server virtual appliance to run the nested virtual machines needed for this lab to function properly.


OpenFiler appliance – The OpenFiler appliance provides virtual storage to the virtual vSphere servers in order for them to be able to host the nested virtual machines.


vPod Router appliance – The router appliance is a custom-built appliance for our VMware Hands On Labs and other lab environments to route network traffic appropriately, both internal to the vPods as well as externally, when virtually wired for external access.


Nested virtual machines – The virtual machines nested within this vPod architecture are:



  • Horizon View Connection Server-1– The first Connection Server to be set up within the lab.

  • Horizon View Connection Server-2– The second Connection Server to be set up within the lab.

  • RDSH001– The first Remote Desktop Server within the lab. This server already has Microsoft Remote Desktop Services configured.

  • RDSH002– The second Remote Desktop Server to be set up within the lab. This server needs Microsoft Remote Desktop Services installed and configured.

  • Win7-VDI-1– The first Windows 7 virtual machine to be used as a VDI desktop.

  • Win7-VDI-2– The second Windows 7 virtual machine to be used as a VDI desktop.

  • Win8-VDI-1– The first Windows 8 virtual machine to be used as a VDI desktop.

  • Win8-VDI-2– The second Windows 8 virtual machine to be used as a VDI desktop.

  • EndPoint-01– The virtual machine configured to be a simulated endpoint system for accessing the previous VDI desktops and remote applications.


Lab Modules


The lab takes you through three main modules.


View Install and Configure Module– This module is a prerequisite for both of the other two modules. It walks you through the installation and configuration of a connection server, the installation of the agent on a VDI desktop, and the installation and configuration of the client software on the endpoint.


View App Remoting Configuration– The application remoting module walks you through the initial configuration of Remote Desktop Services within a Microsoft Windows server in order to understand exactly what is needed for Horizon 6 with View application remoting. After you have completed the Remote Desktop Services configuration, this module walks you through installation and configuration of the Horizon 6 agent on the RDS hosts and the configuration and validation of RDS application pools and RDS desktop pools.


Cloud Pod Architecture– This module walks you through the installation, configuration, and validation of the global namespace features of View.


Lab Module Navigation


Many of you may not be aware how easy it is to navigate within the Hands On Labs with some of the various tools and functions available for listing lab topics and rearranging the interface.



Arranging the Console – To move the console around on the screen, you can find a control bar on the upper right side of the Web display. This allows you to use a full-screen display, dock the screen to the right or left side of the browser window, refresh the screen in case of latency, or toggle the screen between floating and docked.



Arranging the Lab Manual/Instructions– In addition to moving the console, you can also move, dock, undock, open the Table of Contents to jump to a specific section, or even split-screen the lab manual between your computer screen and your tablet of choice.



Sending Text to Console– You can also send text from your localsystem to the ControlCenter console by use of the Send Text option beneath the Console display. Just click the SEND TEXT button and the “Send text to console” window appears. Type or paste in what you wish to send to the ControlCenter console and click the SEND button.



How to Access This Lab


To access this lab directly, visit the Lab Registration Form to get started!


Wrap-Up


We are excited to bring you this lab—the first lab released in 2014 and the first to be released in conjunction with a VMware product release! Moving forward, this lab will be updated for VMworld to include other modules such as Virtual SAN integration, troubleshooting, and much more!


For more information on VMware Hands On Labs, visit hol.vmware.com and sign up!






via VMware Blogs http://bit.ly/V5CDHb

Abacus (YC W14) is hiring iOS engineer in NYC

Comments



from Hacker News http://bit.ly/1mCYdbK

via IFTTT

The Curse of Smart People

Comments



from Hacker News http://bit.ly/1ojtzIB

via IFTTT

Hand-Held Spectroscopy Tool – Examine the Molecular Composition of Your Food

Comments



from Hacker News http://bit.ly/1qd5G7a

via IFTTT

Washboard.co (Quarters for Laundry) shuts down due to payment processor problems

Comments



from Hacker News http://bit.ly/1x8jsKF

via IFTTT

What Every Frontend Developer Should Know About Webpage Rendering

Comments



from Hacker News http://bit.ly/1iPps8a

via IFTTT

UberX is getting even cheaper...

Comments



from Hacker News http://bit.ly/1x88QeE

via IFTTT

A 30-minute Introduction to Rust

Comments



from Hacker News http://bit.ly/1x88PHC

via IFTTT

I/O Thoughts

Comments



from Hacker News http://bit.ly/1jEruTs

via IFTTT

Bundle and Save on VMware Exam Prep Resources

VMware Lab Connect™ is a cloud-based, self-paced technical training lab designed to enhance your learning experience. When bundled with the Official Cert Guide from VMware Press and a VMware Certified Professional (VCP) exam voucher, you have a powerful tool to help you prepare for a VCP certification exam. Choose one of these bundles save 15%: […]]> VMware Lab Connect™ is a cloud-based, self-paced technical training lab designed to enhance your learning experience. When bundled with the Official Cert Guide from VMware Press and a VMware Certified Professional (VCP) exam voucher, you have a powerful tool to help you prepare for a VCP certification exam. Choose one of these bundles save 15%:

VCP5-DCV Practice Bundle:



  • VMware vSphere: Install, Configure, Manage [V5.5] – Lab Connect

  • OfficialVCP5-DCV Cert Guidefrom VMware Press

  • VCP5-DCV Exam Voucher


VCP-Cloud Practice Bundle:



  • VMware vCloud Director: Install, Configure, Manage [V5.5] – Lab Connect

  • OfficialVCP-Cloud Cert Guidefrom VMware Press

  • VCP-Cloud Exam Voucher


VCP5-Desktop Practice Bundle:



  • VMware Horizon View: Install, Configure, Manage [V5.2] – Lab Connect

  • OfficialVCP5-Desktop Cert Guidefrom VMware Press

  • VCP5-Desktop Exam Voucher






via VMware Blogs http://bit.ly/1qLAawz

Bitcoin sorta legal in CA, NSA transparency report, and Internet voting fails in Norway [Government IT Week]

Internet voting fails in Norway (and if it won't work there, it probably won't work anywhere). If you're living on the left coast, you can now, at least semi-legally buy your weed with bitcoin, and the DNI releases a transparency report. No, that's not a joke. We report the news here, bucko.



via Latest Topic for ZDNet in Security http://zd.net/1qsAmTL

Scala 2.12 Roadmap

Comments



from Hacker News http://bit.ly/1x4g82Y

via IFTTT

Movie Review: The Internet’s Own Boy - The story of Aaron Swartz





from The Hacker News http://bit.ly/1x4d3Qp

via IFTTT

Vuln: Oracle Java SE CVE-2011-3553 Remote Java Runtime Environment Vulnerability

Oracle Java SE CVE-2011-3553 Remote Java Runtime Environment Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1x4d4nq

via IFTTT

Vuln: Oracle Java SE CVE-2011-3548 Remote Java Runtime Environment Vulnerability

Oracle Java SE CVE-2011-3548 Remote Java Runtime Environment Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1qqsYrR

via IFTTT

Indian Space workhorse PSLV delivers again

Comments



from Hacker News http://bit.ly/1pDUm6n

via IFTTT

From India, Proof That a Trip to Mars Doesn’t Have to Break the Bank

Comments



from Hacker News http://nyti.ms/1lryCSW

via IFTTT

Luuuk Scam Claims Half-million Euros in 1 Week

The man-in-the-browser campaign is expected to resurface.



via Infosecurity - Latest News http://bit.ly/1qqj09Q

How RocksDB uses thread local storage

Comments



from Hacker News http://bit.ly/1q8BCJY

via IFTTT

Taco, Inc. Innovation Award video 2014(Korean Subtitled)


















본 비디오는 2014년도 이노베이션 어워드 수상작으로 시트릭스의 가상화, 네트워킹 및 협업 솔루션을 사용하여 TACO가 얼마나 기업 혁신을 이루었는지 보여드립니다.


Views:0

Length:03:52






from CitrixTV RSS Feed http://bit.ly/1iM9V9j

via IFTTT

Disqus Wordpress Plugin Flaw Leaves Millions of Blogs Vulnerable to Hackers





from The Hacker News http://bit.ly/1qJ5qMu

via IFTTT

Vuln: Oracle Java Applet Clipboard Injection Remote Code Execution Vulnerability

Oracle Java Applet Clipboard Injection Remote Code Execution Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1mcLBhd

via IFTTT

Vuln: Oracle Java SE and Java for Business CVE-2010-4469 Remote Java Runtime Environment Vulnerability

Oracle Java SE and Java for Business CVE-2010-4469 Remote Java Runtime Environment Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1mcLAtM

via IFTTT

Vuln: Oracle Java SE and Java for Business CVE-2010-4448 Remote Java Runtime Environment Vulnerability

Oracle Java SE and Java for Business CVE-2010-4448 Remote Java Runtime Environment Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1mcLB0C

via IFTTT

Vuln: OpenJDK 'IcedTea' plugin JNLPSecurityManager Remote Code Execution Vulnerability

OpenJDK 'IcedTea' plugin JNLPSecurityManager Remote Code Execution Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1x3E32v

via IFTTT

The Economics of Star Trek (2013)

Comments



from Hacker News http://bit.ly/1m1FZoh

via IFTTT

We are Moving To An Add-On Store Model

Comments



from Hacker News http://bit.ly/1x3DRAm

via IFTTT

Fiona Stanley Hospital IT Project to miss deadline: Audit

The Western Australian Auditor General has found that the Department of Health needs to reassess the Identity Access Management project for the Fiona Stanley Hospital if it intends to complete it.



via Latest Topic for ZDNet in Security http://zd.net/1mM9TgX

Panopticon

Comments



from Hacker News http://bit.ly/1myjWBI

via IFTTT

Why New York Real Estate Is the New Swiss Bank Account

Comments



from Hacker News http://nym.ag/1myjVO1

via IFTTT

Sydney Opal card travel history can be accessed by police

Customer information and travel history on registered Opal cards can be accessed by New South Wales police, the Transport for NSW has confirmed.



via Latest Topic for ZDNet in Security http://zd.net/1qIXXND

Sunday, June 29, 2014

FSF.ORG: EMAIL SELF-DEFENSE

Comments



from Hacker News http://bit.ly/1z1f2qE

via IFTTT

A review of the Blackphone, the Android for the paranoid

Comments



from Hacker News http://bit.ly/1mxW6Gc

via IFTTT

Facebook emotion manipulation study: an explanation

Comments



from Hacker News http://on.fb.me/1r3JfDb

via IFTTT

Panopticon

Comments



from Hacker News http://bit.ly/1mxW6pu

via IFTTT

The Morality Of A/B Testing – Ethics in a Data Driven World

Comments



from Hacker News http://bit.ly/1mxW68Y

via IFTTT

Analysis of Mattermark

Comments



from Hacker News http://bit.ly/1qpIhkt?

via IFTTT

Cocoon Data signs deal for $57m reverse takeover

Australian software security startup, Cocoon Data, has taken a step closer to listing on the Australian Stock Exchange, entering into a binding agreement for a AU$57 million reverse takeover of mining company, Prime Minerals.



via Latest Topic for ZDNet in Security http://zd.net/1rO8nLJ

Security at scale at Google [video]

Comments



from Hacker News http://bit.ly/TvrVIH

via IFTTT

The Art of Nonfiction No. 7, Adam Phillips

Comments



from Hacker News http://bit.ly/1r3y1P8

via IFTTT

My (golang) ui package: lessons learned about threading and plans for the future

Comments



from Hacker News http://bit.ly/1iLlWvq

via IFTTT

RFC 7258 – Pervasive Monitoring Is an Attack

Comments



from Hacker News http://bit.ly/1m1djMe

via IFTTT

How you will not uncover Satoshi

Comments



from Hacker News http://bit.ly/1m1dgzX

via IFTTT

Google Trends: Hacker News vs. Slashdot

Comments



from Hacker News http://bit.ly/1x2ATvY

via IFTTT

The problem behind mobile TOR browsers' ip disclosure

Comments



from Hacker News http://bit.ly/1mc5Mf3

via IFTTT

2014: The Year Extortion Went Mainstream

Comments



from Hacker News http://bit.ly/1x2wKs2

via IFTTT

Optimize latency-sensitive workloads in a hybrid storage array with VMAX Flash PowerPacks! Now up to 55% off: http://bit.ly/1qImvpN






EMC logo
Optimize latency-sensitive workloads in a hybrid storage array with VMAX Flash PowerPacks! Now up to 55% off: http://bit.ly/1qImvpN






via EMC Feeds http://bit.ly/1qplCoz

Optimize latency-sensitive workloads in a hybrid storage array with VMAX Flash PowerPacks! Now up to 55% off: http://bit.ly/1qImvpN






EMC logo
Optimize latency-sensitive workloads in a hybrid storage array with VMAX Flash PowerPacks! Now up to 55% off: http://bit.ly/1qImvpN






via EMC Feeds http://bit.ly/1qplCoz

Do the Privacy Commissioner's teeth have any bite?

Australia's Privacy Commissioner has shown he'll call out businesses that fail to protect personal data, and now he has the legislative teeth to punish them. But will it happen?



via Latest Topic for ZDNet in Security http://zd.net/1vlMMdK

GET /vehicles/{id}/command/honk_horn

Comments



from Hacker News http://bit.ly/1pDfNEF

via IFTTT

Google’s Balloon Internet Experiment, One Year Later

Comments



from Hacker News http://wrd.cm/1pDfNEA

via IFTTT

Antikythera mechanism

Comments



from Hacker News http://bit.ly/1pDfNEu

via IFTTT

The Setup – what people use the get stuff done

Comments



from Hacker News http://usesthis.com/

via IFTTT

White House poised to name patent reform opponent as new head of Patent Office

Comments



from Hacker News http://bit.ly/1pDfNoa

via IFTTT

OpenGL 4.4 and beyond on Android

Comments



from Hacker News http://bit.ly/1lqDhEq

via IFTTT

The Darkpool Iceberg

Comments



from Hacker News http://nyti.ms/1pDfKsm

via IFTTT

Optimize latency-sensitive workloads in a hybrid storage array with VMAX Flash P...






EMC logo
Optimize latency-sensitive workloads in a hybrid storage array with VMAX Flash PowerPacks! Now up to 55% off at the EMC Store: http://emc.im/1qjLqCo










via EMC Feeds http://bit.ly/1qpjkWo

Optimize latency-sensitive workloads in a hybrid storage array with VMAX Flash P...






EMC logo
Optimize latency-sensitive workloads in a hybrid storage array with VMAX Flash PowerPacks! Now up to 55% off at the EMC Store: http://emc.im/1qjLqCo










via EMC Feeds http://bit.ly/1qpjkWo

App Shows You How Addicted You Are To Your iPhone

Comments



from Hacker News http://bit.ly/1z0H1GX

via IFTTT

Show HN: Dollar and Cent Library for Swift

Comments



from Hacker News http://bit.ly/VyITHT

via IFTTT

Live forever... or die trying

Comments



from Hacker News http://bit.ly/VyIPYH

via IFTTT

XKCD Graphs: Create your own XKCD style graphs

Comments



from Hacker News http://bit.ly/1nUqwnl

via IFTTT

This is what tree rings sound like when played like a record

Comments



from Hacker News http://bit.ly/1mK1QBh

via IFTTT

The Supreme Court’s baffling tech illiteracy is becoming a big problem

Comments



from Hacker News http://bit.ly/1mK1Otp

via IFTTT

How to Really Complete a project?

Comments



from Hacker News http://bit.ly/TucmRx

via IFTTT

IBM Security Bulletin: IBM Java Quarterly CPU - Jan 2014 affecting Rational Application Developer (CVE-2014-0411)

Timing differences based on validity of TLS messages can be exploited to decrypt the entire session. CVE(s): CVE-2014-0411 Affected product(s) and affected version(s): Rational Application Developer 9.0.1 and earlier ...



via IBM Product Security Incident Response Team http://ibm.co/1iJ7W5m

DynASM with Lua mode

Comments



from Hacker News http://bit.ly/1ofr7mn

via IFTTT

How Developers use vagrant for integration tests

Comments



from Hacker News http://bit.ly/1qnYvKY

via IFTTT

2600 in limbo

Comments



from Hacker News http://bit.ly/1iGAPPR

via IFTTT

Candy Japan crosses $10000 MRR

Comments



from Hacker News http://bit.ly/1iIZzXv

via IFTTT

Mathematics is full of wonderful but relatively unknown or poorly used theorems

Comments



from Hacker News http://bit.ly/1wZGCCR

via IFTTT

Ev Williams on The Secret Formula of Internet Fortune

Comments



from Hacker News http://wrd.cm/1iIZzH5

via IFTTT

Awesome Python 3 Featuers

Comments



from Hacker News http://bit.ly/1lZI18n

via IFTTT

Defective C++

Comments



from Hacker News http://bit.ly/1q46ivQ

via IFTTT

EasyRPG

Comments



from Hacker News http://bit.ly/1q46fjK

via IFTTT

Why I can't stop using vim

Comments



from Hacker News http://bit.ly/UX3Iwh

via IFTTT

Summing up ...

Comments



from Hacker News http://bit.ly/1vjKThF

via IFTTT

Gwitter: an open source Unix command line client for Twitter written in Go

Comments



from Hacker News http://bit.ly/1vjGrj1

via IFTTT

Ask HN: Some noob co-founder questions

Comments



from Hacker News http://bit.ly/1lEoECp

via IFTTT

Commute Does Not Compute

Comments



from Hacker News http://bit.ly/1ma9wxN

via IFTTT

Ask HN: Who is iamdevloper on Twitter?

Comments



from Hacker News http://bit.ly/1ma9u9a

via IFTTT

Linux Gaming: An Upward Trend

Comments



from Hacker News http://bit.ly/UWMord.

via IFTTT

Vlajipno: Full Text Lojban Dictionary

Comments



from Hacker News http://bit.ly/UWMor0

via IFTTT

Ability to search source code still not implemented in BitBucket after 3 years

Comments



from Hacker News http://bit.ly/UWMoaH

via IFTTT

Ask HN: Weekend project stories

Comments



from Hacker News http://bit.ly/UWMlvB

via IFTTT

What's an idea/creation that you've had success with locally that I can copy?

Comments



from Hacker News http://bit.ly/1wYJPCJ

via IFTTT

Are Containers the Right Answer to the Wrong Question?

Comments



from Hacker News http://bit.ly/1mIYbDS

via IFTTT

Building A Weather Station

Comments



from Hacker News http://bit.ly/1mIYbnt

via IFTTT

Saturday, June 28, 2014

The story of Polaroid inventor Edwin Land

Comments



from Hacker News http://bit.ly/1mtxn5F

via IFTTT

Cost-Efficient Census Online Collection: Privacy Trade-Offs of Geo-Location [pdf]

Comments



from Hacker News http://bit.ly/UWxQrp

via IFTTT

Going Beyond Amazon: A New Model for Authors, Retailers, and Publishers

Comments



from Hacker News http://bit.ly/1mtxm1F

via IFTTT

Dissecting the 128-byte raycaster

Comments



from Hacker News http://bit.ly/1qnivgY

via IFTTT

TinyGL: A Small, Free and Fast Subset of OpenGL

Comments



from Hacker News http://bit.ly/1qYoys9

via IFTTT

Why a War and Shrinking Economy Can’t Stop Syrian Innovation

Comments



from Hacker News http://bit.ly/1jxN8ZF

via IFTTT

The Day We Set the Colorado River Free

Comments



from Hacker News http://bit.ly/1qYovN4

via IFTTT

Don't major in CS: 5 reasons why

Comments



from Hacker News http://ubm.io/1pLs9Gc

via IFTTT

Jekyll turns 21! Err... I mean 2.1.0

Comments



from Hacker News http://bit.ly/1wXQw81

via IFTTT

Mattermark Has Raised $2M in Our Second Seed Round

Comments



from Hacker News http://bit.ly/1wXQvRr

via IFTTT

No more Microsoft advisory email notifications?

Comments



from Hacker News http://bit.ly/1wXQsVN

via IFTTT

Original Content Vultures are Evil, and What You Can Do To Protect Yourself

Comments



from Hacker News http://bit.ly/1qY55rB

via IFTTT

Programmed Visions: how do we analyze, organize, and build with the undead?

Comments



from Hacker News http://bit.ly/1qY55ba

via IFTTT

The Internet's Own Boy: The Story of Aaron Swartz [video]

Comments



from Hacker News http://bit.ly/1rL6cZp

via IFTTT

Facebook's unethical experiment manipulated users' emotions

Comments



from Hacker News http://slate.me/1wXiAZb

via IFTTT

Joker – Poker library written in go (golang)

Comments



from Hacker News http://bit.ly/1lYC6As

via IFTTT

Security Bulletin: IBM System x Integrated Management Module (IMM) is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0076

Security vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project CVE(s): CVE-2014-0224 and CVE-2014-0076 Affected product(s) and affected version(s): IBM System x3550M3 type 7944:...



via IBM Product Security Incident Response Team http://ibm.co/1vix1nR

IBM Security Bulletin: IBM Security Proventia Network Active Bypass is affected by vulnerabilities in OpenSSL (CVE-2014-0224)

Security vulnerabilities have been discovered in OpenSSL. CVE(s): CVE-2014-0224 Affected product(s) and affected version(s): Products: ABYP-0T-0S-4L-P, ABYP-0T-0S-4L-P-M, ABYP-0T-2S-2L-P, ABYP-0T-2S-2L-P-M, ABYP-0T-4S-0L-P,...



via IBM Product Security Incident Response Team http://ibm.co/1iHd9dY

IBM Security Bulletin: Classloader Manipulation Vulnerability in IBM WebSphere Application Server shipped with IBM Content Collector (CVE-2014-0114)

There is a classloader manipulation vulnerability in the Apache Struts 1 used by the Administrative Console in IBM WebSphere Application Server that is shipped with IBM Content Collector. CVE(s): CVE-2014-0114 Affected product(s) and affected...



via IBM Product Security Incident Response Team http://ibm.co/1iHd5uM

IBM Security Bulletin: IBM OpenPages GRC Platform Apache Struts V1 ClassLoader vulnerability(CVE-2014-0114)

IBM OpenPages GRC Platform has a potential security exposure due to a vulnerability in Apache Struts version 1. CVE(s): CVE-2014-0114 Affected product(s) and affected version(s): IBM OpenPages versions 6.0 through 7.0 ...



via IBM Product Security Incident Response Team http://ibm.co/1iHd5el

IBM Security Bulletin: IBM Content Collector affected by vulnerability in IBM SDK Java™ Technology Edition, Version 6 (CVE-2014-0460)

IBM Content Collector ships IBM 32-bit Runtime Environment for Windows® Java™ Technology Edition Version 6, which has a security vulnerability that might be exposed within the use of Content Collector. CVE(s): CVE-2014-0460 Affected...



via IBM Product Security Incident Response Team http://ibm.co/1nS52Zx

IBM Security Bulletin: IBM OpenPages GRC Platform Link Injection (CVE-2014-3011)

IBM OpenPages GRC Platform has a potential security exposure due to a link injection vulnerability. CVE(s): CVE-2014-3011 Affected product(s) and affected version(s): IBM OpenPages versions 6.0 through 7.0 Refer to the...



via IBM Product Security Incident Response Team http://ibm.co/1nS51EU

IBM Security Bulletin: IBM OpenPages GRC Platform Access Control Bypass (CVE-2011-1381)

IBM OpenPages GRC Platform has a potential security exposure due to an access control bypass problem. CVE(s): CVE-2011-1381 Affected product(s) and affected version(s): IBM OpenPages versions 6.0 through 7.0 Refer to...



via IBM Product Security Incident Response Team http://ibm.co/1iHd6PA

MOOC: Functional programming with Clojure

Comments



from Hacker News http://bit.ly/1qV9ICM

via IFTTT

The Man Making Silicon Valley Go Crazy for Hardware

Comments



from Hacker News http://wrd.cm/1wUQrC1

via IFTTT

Scala Async

Comments



from Hacker News http://bit.ly/1wUQrBU

via IFTTT

Felix Salmon explained why Tim Cook's sexuality wasn't common knowledge (2011)

Comments



from Hacker News http://reut.rs/1mGsCKO

via IFTTT

Minecraft in 500 lines of Python

Comments



from Hacker News http://slidesha.re/1qUTud0

via IFTTT

Ask HN: In which projects are you working on?

Comments



from Hacker News http://bit.ly/1qUTs4G

via IFTTT

Raising $200k in 1 month: our full pitch deck and metrics

Comments



from Hacker News http://bit.ly/1qloDX4

via IFTTT

Russian mathematician's decision tree by hand to solve a medical problem

Comments



from Hacker News http://bit.ly/TrJwBa

via IFTTT

Tracy Morgan Dead? Facebook Scam Targeting Users with Malware





from The Hacker News http://bit.ly/UTqjtu

via IFTTT

IntelliJ Idea 14 EAP is available for download

Comments



from Hacker News http://bit.ly/UThAHF

via IFTTT

Transforming Your Business with End-User Computing

By Daryl Bishop In my last blog, I talked about the need for a common definition around what constitutes transformation within the IT organisation. In this follow-up post, I

Transforming Your Business with End-User Computing

By Daryl Bishop In my last blog, I talked about the need for a common definition around what constitutes transformation within the IT organisation. In this follow-up post, I�ll discuss the VMware approach to an end-user computing (EUC) transformation. First a recap, for an initiative to be truly transformational it must satisfy the criteria of […]]> By Daryl Bishop

In my last blog, I talked about the need for a common definition around what constitutes transformation within the IT organisation. In this follow-up post, I�ll discuss the VMware approach to an end-user computing (EUC) transformation.


First a recap, for an initiative to be truly transformational it must satisfy the criteria of change across the elements of people, process, and technology. Additionally, it should be aligned to business objectives and have clear benefits.


If we look at the typical EUC environment today, it�s transitioning from a rigid environment based on a desktop or laptop running a Windows operating system to one that is application and data-centric rather than device-bound. This has some profound transformational impacts for business and IT.


Today�s End-User Computing Environment
Let’s first take a closer look at the EUC environment found in most organisations today.


As shown in the diagram above, staff have historically used either a laptop or desktop as a primary device. This device, running Windows as the operating system, is locked down at the configuration layer with applications installed natively. This stack forms your traditional and very common standard operating environment (SOE) model. Coupled with the SOE, the EUC ecosystem included printers, isolated (not integrated) mobility devices, and finally an identity management authentication and authorisation component.


This model served us well, providing control, standardisation, and management of risk. However, the rise of the consumerization of technology, a modern IT-literate workforce, ubiquitous access to applications, the decreased usage of the Windows operating system, and the always-connected Internet means this model is, at best, inflexible and, at worst, irrevocably broken.


The Transformed End-User Computing Environment
So what does a transformed EUC environment look like? In the diagram below, the focus has been abstracted from the devices to the application and data access layer.


Let�s look at each layer in a bit more detail to better understand the benefits of removing the focus on devices and elevating it to the application and data access layer:



  • Business layer
    Business is typically not just a single entity: It consists of your internal business and external B2B organisations that collectively form your business ecosystem. While your business will provide a core service, in the future it�s likely that smaller, more nimble organisations like start-ups will utilize your core business services and APIs to provide customers with innovative products. Your applications and data will not just be consumed internally, but also by external organisations as business-to-business transactions.



  • Application delivery platform
    The application delivery platform is a standardised access point where your consumers will access applications, data, and desktops. The key features of this abstracted application access layer are:

    • Device independence

    • Centralized management via policy

    • Auditable access and usage

    • Accessed over secure channels

    • Simplified ease of use




Where security and control was traditionally applied at the device and operating system level, it is now abstracted to the application and data access layer.



  • Lightweight device management

    In this context, lightweight management means the minimal IT controls necessary to manage devices, primarily for security reasons. While rigid, locked-down control has historically been the norm, in the transformed environment only lightweight controls are applied. For example, mobility devices use mobile application management (MAM) containerisation to ensure IT can remotely wipe or lock access only to the corporate container. Data, applications, virtual desktop access, and security controls are now applied at the application delivery platform layer via centralized policy controls.


Finally does this constitute a transformation? Let�s review the impact through the lens of people, process, and technology:



  • People
    A modernised EUC environment is a catalyst to elevate staff from traditional, task-based to knowledge creation activities using the productivity platform that best suits their work style. By unleashing staff from the rigid model of yesterday, staff exercise increased creativity, providing a real point of competitive differentiation through innovation.

  • Process
    The traditional EUC environment is awash with layers of process to manage a monolithic computing stack. From processes to deploy applications and patches to service desk support, they add complexity with many moving parts to manage. Shifting the focus to the application delivery platform with lightweight management of devices introduces policy-controlled automation and simplified management controls.

  • Technology

    Businesses today struggle with BYOD, security, and management. By abstracting the management to the access layer, BYOD becomes a moot point. IT is no longer concerned, apart from connectivity, about what device is being used. Security is applied where it should be, at the application and data layer. Finally, management is focused on controlling access to data and applications via policy, rather than managing a desktop and laptop stack.


I�ve really just scratched the surface of what constitutes an EUC transformation. The role of unified communications, changing work practices such as activity based working, the software-defined enterprise, and the changes to the IT organisational structure to support the transformed environment — can and should be significant components of a transformation program.


I�d be interested in your view from the trenches. What EUC initiatives do you have planned and how are they transforming your business?

—-

Daryl Bishop is a business solutions architect with VMware Accelerate Advisory Services and is based in Melbourne, Australia.


Check out the VMworld 2014 Operations Transformation track for opportunities to hear from experienced VMware experts, practitioners, and the real-world experiences of customers transforming their IT infrastructure and operational processes.





via VMware Blogs http://bit.ly/TrCkFe

New Banking Malware with Network Sniffer Spreading Rapidly Worldwide





from The Hacker News http://bit.ly/TrC0X1

via IFTTT

Update! Key Considerations in Choosing a Zero Client Environment for VDI

By Dean Flaming, Sr. Technical Marketing Manager – Technical Enablement, End-User Computing, VMware


On behalf of the many folks who helped make this happen, I am proud to announce the release of the Horizon 6 with View Introduction Hands On Lab! This lab is a guided tour of Horizon 6 with View specifically focusing on the new features.


Additional Info


This Horizon 6 with View lab is designed to demonstrate and introduce you to the new Horizon 6 features, starting with the ease of installation and configuration of View, RDS-hosted application setup and configuration, RDS-hosted desktop setup and configuration, and Cloud Pod Architecture configurations, including some scenarios.



Technical Details of This Lab


We designed and built this fully functional, self-contained lab within our VMware Hands On Labs environment, where not only is every lab isolated from other labs, but also all are delivered via our VMware OneCloud enterprise architecture and accessible from around the world. For those readers who have attended VMworld, you will be familiar with this environment because this is the same environment used to deliver Hands On Labs for the VMware major worldwide events.


Attendees are allotted four hours for lab completion, but we expect many will be able to complete the lab in a shorter time span.


This lab contains eight top-level virtual machines; one ControlCenter where you drive the lab; one vPod router; a virtual OpenFiler appliance; a vCenter Server virtual appliance, and four virtual ESXi hosts which host additional nested virtual machines for use in completing the lab exercises.


ControlCenter– ControlCenter is the virtual machine where you drive the lab and run the lab exercises. This system also runs the following services for the lab environment:



  • Microsoft Active Directory Domain Controller

  • DNS

  • Certificate Authority

  • File Sharing


vCenter appliance – The VMware vCenter Server virtual appliance provides the central management and control for the nested vSphere servers.


vCenter Servers – The four VMware vSphere servers work in a clustered configuration and report in to the vCenter Server virtual appliance to run the nested virtual machines needed for this lab to function properly.


OpenFiler appliance – The OpenFiler appliance provides virtual storage to the virtual vSphere servers in order for them to be able to host the nested virtual machines.


vPod Router appliance – The router appliance is a custom-built appliance for our VMware Hands On Labs and other lab environments to route network traffic appropriately, both internal to the vPods as well as externally, when virtually wired for external access.


Nested virtual machines – The virtual machines nested within this vPod architecture are:



  • Horizon View Connection Server-1– The first Connection Server to be set up within the lab.

  • Horizon View Connection Server-2– The second Connection Server to be set up within the lab.

  • RDSH001– The first Remote Desktop Server within the lab. This server already has Microsoft Remote Desktop Services configured.

  • RDSH002– The second Remote Desktop Server to be set up within the lab. This server needs Microsoft Remote Desktop Services installed and configured.

  • Win7-VDI-1– The first Windows 7 virtual machine to be used as a VDI desktop.

  • Win7-VDI-2– The second Windows 7 virtual machine to be used as a VDI desktop.

  • Win8-VDI-1– The first Windows 8 virtual machine to be used as a VDI desktop.

  • Win8-VDI-2– The second Windows 8 virtual machine to be used as a VDI desktop.

  • EndPoint-01– The virtual machine configured to be a simulated endpoint system for accessing the previous VDI desktops and remote applications.


Lab Modules


The lab takes you through three main modules.


View Install and Configure Module– This module is a prerequisite for both of the other two modules. It walks you through the installation and configuration of a connection server, the installation of the agent on a VDI desktop, and the installation and configuration of the client software on the endpoint.


View App Remoting Configuration– The application remoting module walks you through the initial configuration of Remote Desktop Services within a Microsoft Windows server in order to understand exactly what is needed for Horizon 6 with View application remoting. After you have completed the Remote Desktop Services configuration, this module walks you through installation and configuration of the Horizon 6 agent on the RDS hosts and the configuration and validation of RDS application pools and RDS desktop pools.


Cloud Pod Architecture– This module walks you through the installation, configuration, and validation of the global namespace features of View.


Lab Module Navigation


Many of you may not be aware how easy it is to navigate within the Hands On Labs with some of the various tools and functions available for listing lab topics and rearranging the interface.



Arranging the Console – To move the console around on the screen, you can find a control bar on the upper right side of the Web display. This allows you to use a full-screen display, dock the screen to the right or left side of the browser window, refresh the screen in case of latency, or toggle the screen between floating and docked.



Arranging the Lab Manual/Instructions– In addition to moving the console, you can also move, dock, undock, open the Table of Contents to jump to a specific section, or even split-screen the lab manual between your computer screen and your tablet of choice.



Sending Text to Console– You can also send text from your localsystem to the ControlCenter console by use of the Send Text option beneath the Console display. Just click the SEND TEXT button and the “Send text to console” window appears. Type or paste in what you wish to send to the ControlCenter console and click the SEND button.



How to Access This Lab


To access this lab directly, visit the Lab Registration Form to get started!


Wrap-Up


We are excited to bring you this lab—the first lab released in 2014 and the first to be released in conjunction with a VMware product release! Moving forward, this lab will be updated for VMworld to include other modules such as Virtual SAN integration, troubleshooting, and much more!


For more information on VMware Hands On Labs, visit hol.vmware.com and sign up!






via VMware Blogs http://bit.ly/1jXUzcs