Adding custom objects to vRealize Operations…

Adding custom objects to vRealize Operations with the REST API and vRealize Orchestrator workflowsAdding custom objects to vRealize Operations...In my previous blog post “Adding Custom Metrics and Properties to vRealize Operations Objects with the REST API” I have described how to add additional metrics and properties to existing objects in vRealize Operations using the REST... Weiterlesen →

EMPOWER 2019 US Technical Keynote Speakers…

EMPOWER 2019 US Technical Keynote Speakers AnnouncedEMPOWER 2019 US Technical Keynote Speakers...We are pleased to confirm this year’s technical keynote speakers. At Monday’s General Session, EMPOWER attendees will hear from two industry leaders. Chris Wolf, VP & Chief Technology Officer, Global Field & Industry and Craig McLuckie, VP of R&D for VMware’s Cloud Native Applications... Weiterlesen →

SD-WAN Architecture Series: The Continuum for…

SD-WAN Architecture Series: The Continuum for Today's EnterpriseSD-WAN Architecture Series: The Continuum for...SD-WAN is changing the way that organizations run their business. The continuum it offers enables new and enhanced offerings to become available that simplify, expand, and optimize all network activity. In this webinar, we'll explore how SD-WAN architectu...Read MoreVMware Social Media Advocacy

The What and the Why of the Cluster API

The What and the Why of the Cluster APIThe What and the Why of the Cluster APIBy Tim St. Clair, Senior Staff Engineer at VMware Throughout the evolution of software tools there exists a tension between generalization and partial specialization. A tool’s broader adoption is a form of natural selection, where its evolution is predicated... Weiterlesen →

Device Compliance with Identity Manager – The…

Device Compliance with Identity Manager - The less obvious implementation...Device Compliance with Identity Manager - The...Everyone likes the idea of Device Compliance checks. It allows us to differentiate between Company-issues, BYOD-enrolled, private and totally foreign devices, assess their security posture and execute access decisions based on this vital data, expanding our Conditional Access options. It... Weiterlesen →

Onward and Upward: RSA 2019 Recap

Onward and Upward: RSA 2019 RecapOnward and Upward: RSA 2019 RecapThe theme for last week’s RSA Conference 2019 was “BETTER.” The cybersecurity world gathered in San Francisco to talk security and look at how to make information security better. Business leaders and cybersecurity professionals had an opportunity to look at the latest approaches that are... Weiterlesen →

VMware Unified Access Gateway What’s New…

VMware Unified Access Gateway What's New Technical OverviewVMware Unified Access Gateway What's New...This short video provides the highlights of the new features of VMware Unified Access Gateway (UAG) 3.5. It provides the overview and benefits of the key features of the release. VMware End-User Computing (EUC) solutions empower the digital workspace by simplifying app &... Weiterlesen →

Multi-Cloud Networking with VMware NSX! March…

Multi-Cloud Networking with VMware NSX! March 28 WebcastMulti-Cloud Networking with VMware NSX! March...It's time to learn about networking– multi-cloud networking! Stacked with use cases, capabilities, and a technical demo, this VMware NSX webcast is sure to be worth your time. RSVP for March 28!VMware Social Media Advocacy

New VMware Security Advisories VMSA-2019-0002 &…

New VMware Security Advisories VMSA-2019-0002 & VMSA-2019-0003New VMware Security Advisories VMSA-2019-0002 &...VMware has released the following new security advisories: VMSA-2019-0002 – VMware Workstation update addresses elevation of privilege issues. This documents important severity elevation of privilege issues. Issue (a) (CVE-2019-5511). Workstation does not handle paths appropriately. Successful exploitation of this issue may allow the path... Weiterlesen →

WordPress.com.

Nach oben ↑