Tag Archives: RES Software

JUL
11
In some scenarios, RES Subscriber is used to lock down a workstation. This is done by simply defining the RES Subscriber as the shell, and then launching a remote desktop. The advantage of this is that the computer then behaves like a thin client with minimal maintenance required. In the past, when using the Citrix Web Interface with the legacy Receiver, it was relatively easy to create the launch command line. It was even possible for administrators to generate custom ICA files. There were many different methods that could be used to launch a Citrix published desktop. However, when using Citrix Receiver 4.x with Citrix StoreFront, it may become a little more complex. The following example may help explain this ... READ MORE>>
FB Share
MAY
22
Bob Janssen portrait A few weeks ago we announced that RES Software was granted United States patent 8,683,018 for our Snapshot Intelligence technology. We are achieving milestones as a company and I want to share this excitement with you, our inspiration. Here is my personal message to you... To learn more about how you can benefit from this great technology, check out the blog The Benefits of Snapshot Intelligence in a Virtual Server or Desktop Environment. Also contact us at www.ressoftware.com for an analysis of your ... READ MORE>>
FB Share
MAY
02
PatrikThis is the final post of my series on IT as a Service. In the previous posts (part 1 and part 2), I explained how to manage services from a ‘data center out’ perspective. In this post, I will shift focus to a ‘user in’ approach centering on the person consuming IT services. Once a service is launched, it becomes very difficult to control and secure. Why? It’s simple - users are no longer tied to a single computer behind a desk while desktops and applications are offered both physically and virtually (yes I know that virtual desktops have been around for ages through terminal services). Users are roaming. They ... READ MORE>>
FB Share
APR
25
Ralph Van RoosmalenWhat is your company’s most important asset? Source code, patents, hardware? At RES Software, we believe that our most important assets are our employees. We value their knowledge and experience, the energy they bring to the office, and their commitment to build great products that enable our customers. A good book the highlights this mindset is Good to Great by Jim Collins. RES Software is expanding its customer base globally and successively growing in size. To keep up with momentum, we need to hire technical experts across various departments and locations. With employees representing our most important asset, you can understand that recruitment is also one of our ... READ MORE>>
FB Share
APR
16
bob You may have read in the media about serious security vulnerability in the OpenSSL libraries nicknamed "Heartbleed". About Heartbleed The following is a snippet from heartbleed.com on the Heartbleed bug. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs). heartbleed The Heartbleed bug allows anyone ... READ MORE>>
FB Share
CATEGORIES:
ARCHIVES: