Hardware

Stay current with the components, peripherals and physical parts that constitute your IT department.

  • Podcasts // Jun 2014

    Citrix Labs Concept Demonstration: XenDesktop & Windows Azure Pack

    Windows Azure Pack allows enterprises and service providers to provide a multi-tenant, self service cloud for their own infrastructure/private cloud. Citrix is testing using Windows Azure Pack Gallery Images to simplify and automate XenDesktop configurations in a Windows Azure Pack environment.

    Provided By Citrix Systems

  • Podcasts // May 2014

    Jump Start your XenDesktop 7.5 Deployment

    In this podcast, the speaker will explain about technical look into XenDesktop 7.5 and how to approach a deployment. They speaker also explain the general architecture, new features and how to best move to the platform.

    Provided By Citrix Systems

  • Podcasts // May 2014

    Configuring and Troubleshooting XenDesktop Sites

    Citrix XenDesktop introduced a number of new concepts and processes for desktop administrators. In this podcast, the speaker is to demystify these concepts and provide a tactical approach to deployment and troubleshooting of a XenDesktop environment.

    Provided By Citrix Systems

  • Podcasts // Mar 2014

    Analyst Insights into VDI Performance Monitoring

    In this podcast, the speaker discusses insights into why some VDI implementations are a runaway success while others get mired in performance issues that are impossible to fix. The speaker will given a clear strategy of why a VDI implementation is undertaken - abstraction, mobility, the convenience of BYOD -...

    Provided By DABCC

  • Podcasts // Jan 2014

    How to Implement, Secure and Manage BYOD with Ericom Software's Remote Access Solutions

    The Bring Your Own Device (BYOD) trend can be intimidating for IT staff, but BYOD will continue growing as mobile devices continue to play a greater role in the people lives. Even if their organization doesn't have a clear BYOD policy, there's probably some underground BYOD going on.

    Provided By DABCC

  • Podcasts // Jan 2014

    Battery Firmware Hacking

    In this podcast, the speaker will demonstrate how the embedded controller works. The speaker will reverse engineer the firmware and the firmware flashing process for a particular smart battery controller. In particular, the speaker will show how to completely reprogram the smart battery by modifying the firmware on it.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Pyrit - WPA Cracking Using Nvidia Cuda Technology

    Pyrit is a WPA, WPA2-PSK cracker tool. But in this tool the user can use their graphic card for more speed. In this podcast, the user can see the difference between CPU & GPU more their graphic card powerful they will get more cracking speed.

    Provided By SecurityTube.net

  • Podcasts // Dec 2013

    Simplify SMB IT with Hosted Desktops

    Securely manage applications, devices and data with hosted services. Desktops-as-a-Service (DaaS) from a Citrix Service Provider gives lesser burdens on SMB IT staff. Business can be more flexible, scale and allow any device, any time access to information.

    Provided By DABCC

  • Podcasts // Nov 2013

    5 Practical Steps to a Successful Persistent VDI Implementation

    In this podcast, the speaker explains about the five steps for successful VDI implementation. The five steps are: develop the business case, understand the user requirements, size, capacity and performance all matter, evaluate storage requirements upfront and plan for the future - architect the vision.

    Provided By DABCC

  • Podcasts // Nov 2013

    How to Use the Built-In HTML5 Receiver in Citrix VDI-in-a-Box

    In this podcast, the speaker will discuss about the HTML5 receiver and showing how user can connect VDI-in-a-Box desktop for more devices. VDI-in-a-Box 5.4 comes with Citrix HTML5 receiver built directly into VDI-in-a-Box virtual appliances.

    Provided By DABCC

  • Podcasts // Nov 2013

    What's New in Citrix VDI-in-a-Box 5.4

    In this podcast, the speaker will give an overview about the VDI-in-a-Box 5.4. VDI-in-a-Box 5.4 offers simple and affordable personal VDI running the latest Windows on the latest hypervisors, with power tools for IT.

    Provided By DABCC

  • Podcasts // Oct 2013

    Hypervisor-Based, Hardware-Assisted System Monitoring

    In the last few years, many different techniques have been introduced to analyses malicious binary executables. Most of these techniques take advantage of Virtual Machine Introspection (VMI), the process of analyzing the state of a virtual machine from the outside.

    Provided By SecurityTube.net

  • Podcasts // Apr 2013

    Video: PC Refresh ROI

    PC Fleet Manager John Mahvi talks financial, security and manageability benefits behind a PC refresh cadence.

    Provided By Intel Corporation

  • Podcasts // Apr 2013

    Inside IT: Deploying Ultrabooks™ in the Enterprise

    Podcast: Intel IT’s John Mahvi talks about the advantages to IT and employees as Intel offers Ultrabook devices widely to its employees for the first time.

    Provided By Intel Corporation

  • Podcasts // Feb 2013

    Skills in Action: learning in talent management

    Vinolia Singh describes Multichoice South Africa's integrated approach to talent management and performance management, with learning tied in. Her organization is primarily using Skillsoft resources as part of their blended approach to leadership development.

    Provided By SkillSoft

  • Podcasts // Feb 2013

    Splunk for Citrix XenDesktop

    In this podcast, the speaker will give an overview about the Splunk for Citrix XenDesktop solution. The new solution combines the power and flexibility of Splunk with a tailored experience for XenDesktop deployments. The solution provides deep visibility into every component of the deployment for proactive monitoring, troubleshooting user experience...

    Provided By DABCC

  • Podcasts // Nov 2012

    Citrix How To: Migrate From VDI-in-a-Box to XenDesktop

    In this podcast, the speaker explains about how to use the built-in \"Migrate to Citrix Studio\" functionality in VDI-in-a-Box to easily migrate all images and settings from VDI-in-a-Box to XenDesktop.

    Provided By DABCC

  • Podcasts // Mar 2012

    Economics of Password Cracking in the GPU Era

    In this podcast, the speakers will explore where the current GPU cracking technologies are, what their costs are to implement, and how to deploy and execute them (with demo). Most importantly, they will demonstrate the "Brute force calculator" which can assist with getting the users monies worth.

    Provided By SecurityTube.net

  • Podcasts // Mar 2012

    Physical Memory Forensics for Files and Cache

    Physical memory forensics has gained a lot of traction over the past five or six years. While it will never eliminate the need for disk forensics, memory analysis has proven its efficacy during incident response and more traditional forensic investigations. Previously, memory forensics, although useful, focused on a process' address...

    Provided By SecurityTube.net

  • Podcasts // Mar 2012

    Chip and PIN Is Definitely Broken: Credit Card Skimming and PIN Harvesting in an EMV World

    The EMV global standard for electronic payments is widely used for inter-operation between chip equipped credit/debit cards, point of sales devices and ATMs. The speakers will analyze in detail EMV flaws in PIN protection and illustrate skimming prototypes that can be covertly used to harvest credit card information as well...

    Provided By SecurityTube.net

  • Podcasts // Jan 2012

    Is Your Cell Phone Secure

    Now-a-days the employees are carrying Android and Apple phones around without making sure they are secure. Today's smart phones are the equivalent of laptops. Are the user sure is this safe? In this Podcast, the speaker going to explain about the secure things that should be handled while the usage...

    Provided By CompuCom Systems

  • Podcasts // Oct 2011

    Railscasts #256: I18n Backends

    Internationalization is easy to add in Rails, but the YAML files can be difficult to manage. In this podcast, the speaker will show how to use Redis for managing the translations through a web interface.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jun 2011

    Redefining Desktop Management: User-Centric Application Deployment With System Center Configuration Manager 2012

    Desktop management is becoming a thing of the past. With the consumerization of IT, corporate workers expect to do their jobs from any location, on a multitude of devices, and people want a consistent, acceptable application experience regardless of these variables.

    Provided By Microsoft

  • Podcasts // Dec 2010

    A Powerful Platform for Virtualization

    So many IT Managers are trying to lower power and cooling cost, simplify administration, and conserve data center floor space which is why many businesses of every size are turning to virtualized infrastructures, and the next generation of HP ProLiant servers powered by the AMD Opteron 6100 series processor. The...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Nov 2010

    How Do I: Tips for Dynamically Loading Assemblies

    This podcast speaks about tips for dynamically loading assemblies. There are examples for dynamically loading assemblies that may work sometimes and not others. In this podcast will demonstrate tips for ensuring success when dynamically loading assemblies.

    Provided By Microsoft

  • Podcasts // Nov 2010

    How Do I: Mouse Wheel Support in Silverlight 3?

    Microsoft Silverlight 3 introduces support for mouse wheel input in the managed API. While capturing the mouse wheel input does have some platform dependencies, it can make working with the mouse easier. In cases where the mouse wheel is not supported, the can fall back to using the DOM integration....

    Provided By Microsoft

  • Podcasts // May 2010

    Desktop Virtualization From Microsoft

    This podcast talks about Desktop Virtualization from Microsoft, where one can learn about Microsoft desktop virtualization technologies and how these solutions can help to deploy and manage a Windows 7 operating system environment. The topics covered include: use-case scenarios for desktop virtualization how Microsoft Virtual Desktop Infrastructure (VDI) compares to...

    Provided By Microsoft

  • Podcasts // May 2010

    IDC Discusses Client Virtualization: Overview, Benefits and Market Trends

    For many organizations, client virtualization technology can be a means of reducing the total cost of ownership of PCs, improving data security, and streamlining the processes associated with desktop management. To achieve these benefits, organizations can implement a number of client virtualization technologies: Application virtualizationCentralized virtual desktop or more commonly...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Monitor Server Hardware Health for Multiple Vendors

    Monitoring hardware from multiple vendors can be a pain with a management console for each hardware vendor. SAM provides multi vendor hardware monitoring in addition to application and operating system monitoring. Highlight the out of the box thresholds, dashboards and multi-vendor support.

    Provided By DABCC

  • Podcasts // Jun 2014

    Citrix Labs Concept Demonstration: XenDesktop & Windows Azure Pack

    Windows Azure Pack allows enterprises and service providers to provide a multi-tenant, self service cloud for their own infrastructure/private cloud. Citrix is testing using Windows Azure Pack Gallery Images to simplify and automate XenDesktop configurations in a Windows Azure Pack environment.

    Provided By Citrix Systems

  • Podcasts // May 2014

    Configuring and Troubleshooting XenDesktop Sites

    Citrix XenDesktop introduced a number of new concepts and processes for desktop administrators. In this podcast, the speaker is to demystify these concepts and provide a tactical approach to deployment and troubleshooting of a XenDesktop environment.

    Provided By Citrix Systems

  • Podcasts // May 2014

    Jump Start your XenDesktop 7.5 Deployment

    In this podcast, the speaker will explain about technical look into XenDesktop 7.5 and how to approach a deployment. They speaker also explain the general architecture, new features and how to best move to the platform.

    Provided By Citrix Systems

  • Podcasts // Mar 2014

    Analyst Insights into VDI Performance Monitoring

    In this podcast, the speaker discusses insights into why some VDI implementations are a runaway success while others get mired in performance issues that are impossible to fix. The speaker will given a clear strategy of why a VDI implementation is undertaken - abstraction, mobility, the convenience of BYOD -...

    Provided By DABCC

  • Podcasts // Jan 2014

    How to Implement, Secure and Manage BYOD with Ericom Software's Remote Access Solutions

    The Bring Your Own Device (BYOD) trend can be intimidating for IT staff, but BYOD will continue growing as mobile devices continue to play a greater role in the people lives. Even if their organization doesn't have a clear BYOD policy, there's probably some underground BYOD going on.

    Provided By DABCC

  • Podcasts // Dec 2013

    Simplify SMB IT with Hosted Desktops

    Securely manage applications, devices and data with hosted services. Desktops-as-a-Service (DaaS) from a Citrix Service Provider gives lesser burdens on SMB IT staff. Business can be more flexible, scale and allow any device, any time access to information.

    Provided By DABCC

  • Podcasts // Oct 2013

    Hypervisor-Based, Hardware-Assisted System Monitoring

    In the last few years, many different techniques have been introduced to analyses malicious binary executables. Most of these techniques take advantage of Virtual Machine Introspection (VMI), the process of analyzing the state of a virtual machine from the outside.

    Provided By SecurityTube.net

  • Podcasts // Mar 2012

    Economics of Password Cracking in the GPU Era

    In this podcast, the speakers will explore where the current GPU cracking technologies are, what their costs are to implement, and how to deploy and execute them (with demo). Most importantly, they will demonstrate the "Brute force calculator" which can assist with getting the users monies worth.

    Provided By SecurityTube.net

  • Podcasts // Mar 2012

    Physical Memory Forensics for Files and Cache

    Physical memory forensics has gained a lot of traction over the past five or six years. While it will never eliminate the need for disk forensics, memory analysis has proven its efficacy during incident response and more traditional forensic investigations. Previously, memory forensics, although useful, focused on a process' address...

    Provided By SecurityTube.net

  • Podcasts // Mar 2012

    Chip and PIN Is Definitely Broken: Credit Card Skimming and PIN Harvesting in an EMV World

    The EMV global standard for electronic payments is widely used for inter-operation between chip equipped credit/debit cards, point of sales devices and ATMs. The speakers will analyze in detail EMV flaws in PIN protection and illustrate skimming prototypes that can be covertly used to harvest credit card information as well...

    Provided By SecurityTube.net

  • Podcasts // Dec 2010

    A Powerful Platform for Virtualization

    So many IT Managers are trying to lower power and cooling cost, simplify administration, and conserve data center floor space which is why many businesses of every size are turning to virtualized infrastructures, and the next generation of HP ProLiant servers powered by the AMD Opteron 6100 series processor. The...

    Provided By Hewlett-Packard (HP)

  • Podcasts // May 2010

    Desktop Virtualization From Microsoft

    This podcast talks about Desktop Virtualization from Microsoft, where one can learn about Microsoft desktop virtualization technologies and how these solutions can help to deploy and manage a Windows 7 operating system environment. The topics covered include: use-case scenarios for desktop virtualization how Microsoft Virtual Desktop Infrastructure (VDI) compares to...

    Provided By Microsoft

  • Podcasts // May 2010

    IDC Discusses Client Virtualization: Overview, Benefits and Market Trends

    For many organizations, client virtualization technology can be a means of reducing the total cost of ownership of PCs, improving data security, and streamlining the processes associated with desktop management. To achieve these benefits, organizations can implement a number of client virtualization technologies: Application virtualizationCentralized virtual desktop or more commonly...

    Provided By Microsoft

  • Podcasts // Nov 2010

    How Do I: Mouse Wheel Support in Silverlight 3?

    Microsoft Silverlight 3 introduces support for mouse wheel input in the managed API. While capturing the mouse wheel input does have some platform dependencies, it can make working with the mouse easier. In cases where the mouse wheel is not supported, the can fall back to using the DOM integration....

    Provided By Microsoft

  • Podcasts // Nov 2010

    How Do I: Tips for Dynamically Loading Assemblies

    This podcast speaks about tips for dynamically loading assemblies. There are examples for dynamically loading assemblies that may work sometimes and not others. In this podcast will demonstrate tips for ensuring success when dynamically loading assemblies.

    Provided By Microsoft

  • Podcasts // Apr 2013

    Video: PC Refresh ROI

    PC Fleet Manager John Mahvi talks financial, security and manageability benefits behind a PC refresh cadence.

    Provided By Intel Corporation

  • Podcasts // Apr 2013

    Inside IT: Deploying Ultrabooks™ in the Enterprise

    Podcast: Intel IT’s John Mahvi talks about the advantages to IT and employees as Intel offers Ultrabook devices widely to its employees for the first time.

    Provided By Intel Corporation

  • Podcasts // Feb 2013

    Skills in Action: learning in talent management

    Vinolia Singh describes Multichoice South Africa's integrated approach to talent management and performance management, with learning tied in. Her organization is primarily using Skillsoft resources as part of their blended approach to leadership development.

    Provided By SkillSoft

  • Podcasts // Oct 2011

    Railscasts #256: I18n Backends

    Internationalization is easy to add in Rails, but the YAML files can be difficult to manage. In this podcast, the speaker will show how to use Redis for managing the translations through a web interface.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jan 2012

    Is Your Cell Phone Secure

    Now-a-days the employees are carrying Android and Apple phones around without making sure they are secure. Today's smart phones are the equivalent of laptops. Are the user sure is this safe? In this Podcast, the speaker going to explain about the secure things that should be handled while the usage...

    Provided By CompuCom Systems

  • Podcasts // Jun 2011

    Redefining Desktop Management: User-Centric Application Deployment With System Center Configuration Manager 2012

    Desktop management is becoming a thing of the past. With the consumerization of IT, corporate workers expect to do their jobs from any location, on a multitude of devices, and people want a consistent, acceptable application experience regardless of these variables.

    Provided By Microsoft

  • Podcasts // Jan 2014

    Battery Firmware Hacking

    In this podcast, the speaker will demonstrate how the embedded controller works. The speaker will reverse engineer the firmware and the firmware flashing process for a particular smart battery controller. In particular, the speaker will show how to completely reprogram the smart battery by modifying the firmware on it.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Pyrit - WPA Cracking Using Nvidia Cuda Technology

    Pyrit is a WPA, WPA2-PSK cracker tool. But in this tool the user can use their graphic card for more speed. In this podcast, the user can see the difference between CPU & GPU more their graphic card powerful they will get more cracking speed.

    Provided By SecurityTube.net

  • Podcasts // Feb 2013

    Splunk for Citrix XenDesktop

    In this podcast, the speaker will give an overview about the Splunk for Citrix XenDesktop solution. The new solution combines the power and flexibility of Splunk with a tailored experience for XenDesktop deployments. The solution provides deep visibility into every component of the deployment for proactive monitoring, troubleshooting user experience...

    Provided By DABCC

  • Podcasts // Nov 2013

    5 Practical Steps to a Successful Persistent VDI Implementation

    In this podcast, the speaker explains about the five steps for successful VDI implementation. The five steps are: develop the business case, understand the user requirements, size, capacity and performance all matter, evaluate storage requirements upfront and plan for the future - architect the vision.

    Provided By DABCC

  • Podcasts // Nov 2012

    Citrix How To: Migrate From VDI-in-a-Box to XenDesktop

    In this podcast, the speaker explains about how to use the built-in \"Migrate to Citrix Studio\" functionality in VDI-in-a-Box to easily migrate all images and settings from VDI-in-a-Box to XenDesktop.

    Provided By DABCC

  • Podcasts // Nov 2013

    How to Use the Built-In HTML5 Receiver in Citrix VDI-in-a-Box

    In this podcast, the speaker will discuss about the HTML5 receiver and showing how user can connect VDI-in-a-Box desktop for more devices. VDI-in-a-Box 5.4 comes with Citrix HTML5 receiver built directly into VDI-in-a-Box virtual appliances.

    Provided By DABCC

  • Podcasts // Nov 2013

    What's New in Citrix VDI-in-a-Box 5.4

    In this podcast, the speaker will give an overview about the VDI-in-a-Box 5.4. VDI-in-a-Box 5.4 offers simple and affordable personal VDI running the latest Windows on the latest hypervisors, with power tools for IT.

    Provided By DABCC

  • Podcasts // Mar 2010

    Monitor Server Hardware Health for Multiple Vendors

    Monitoring hardware from multiple vendors can be a pain with a management console for each hardware vendor. SAM provides multi vendor hardware monitoring in addition to application and operating system monitoring. Highlight the out of the box thresholds, dashboards and multi-vendor support.

    Provided By DABCC