Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 7 of 7 white papers, page 1 of 1.
A Journey Through Hybrid IT and the Cloud
How to navigate between the trenches. Hybrid IT has moved from buzzword status to reality and organizations are realizing its potential impact. Some aspects of your infrastructure may remain in a traditional setting, while another part runs on cloud infrastructure—causing great complexity. So, what does this mean for you?

How to navigate between the trenches

Hybrid IT has moved from buzzword status to reality and organizations are realizing its potential impact. Some aspects of your infrastructure may remain in a traditional setting, while another part runs on cloud infrastructure—causing great complexity. So, what does this mean for you?
 
“A Journey Through Hybrid IT and the Cloud” provides insight on:

  • What Hybrid IT means for the network, storage, compute, monitoringand your staff
  • Real world examples that can occur along your journey (what did vs. didn’t work)
  • How to educate employees on Hybrid IT and the Cloud
  • Proactively searching out technical solutions to real business challenges
Application Lifecycle Management with Stratusphere UX
This whitepaper defines three major lifecycle stages—analysis, user experience baselining and operationalization―each of which is composed of several crucial steps. The paper also provides practical use examples that will help you create and execute an application-lifecycle methodology using Stratusphere UX from Liquidware.
Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users have come to expect applications to ‘just work’ on whatever device they have on hand. Combined with the notion that for many organizations, workspaces can be a mix of various delivery approaches, it is vital. to better understand application use, as well as information such as versioning, resource consumption and application user experience. This whitepaper defines three major lifecycle stages—analysis, user experience baselining and operationalization―each of which is composed of several crucial steps. The paper also provides practical use examples that will help you create and execute an application-lifecycle methodology using Stratusphere UX from Liquidware.
The Hybrid Future: The changing face of Architecture, Engineering, and Construction
The AEC sector is changing rapidly with technology having a major influence on the way firms design, collaborate and communicate.
Download the paper and learn about:
•    Technology trends in AEC
•    Using the hybrid work model for flexible working and seamless connection with the job site
•    Data centralization in collaborative Building Information Modeling (BIM) workflows and increased demand for high fidelity graphics
•    Teradici CAS and how it can help support distributed, dynamic AEC teams


The OWASP Mobile Top 10 List and Why it Matters for App Developers
It can be challenging to find reliable information on the web. The Open Web Application Security Project (OWASP) is dedicated to publishing reliable content in the web application space. OWASP’s Mobile Security Project provides resources like the “Mobile Top 10” and Mobile Application Security Verification Standard (MASVS). This report covers these resources in depth to help developers access a reliable framework for identifying, and solving mobile application vulnerabilities.

Mobile applications are a rapidly growing attack surface. With a variety of tools and techniques available to threat actors, mobile application developers need to build a reliable security framework to address the most common security vulnerabilities. In this report, Guardsquare analyzed OWASP’s “Top 10” mobile security risks and mapped them to RASP and code hardening best practices.

The report also examines the Mobile Application Security Verification Standard (MASVS), also produced by OWASP, which details additional risks and resilience guidelines that complement the “Top 10.”

Key insights:
●    A developer-centric overview of OWASP’s “Top 10” & MASVS
●    How resilience layer controls can prevent reverse engineering and tampering
●    Security technique that protect against the OWASP’s “Top 10” mobile vulnerabilities
●    How to build a layered security approach

Download the full report to learn how you can leverage RASP and code hardening to defend your Android and iOS apps against the most common mobile app security threats.

!hooked a technical magazine_
It’s often difficult for developers to get hands-on knowledge and experience in code hardening techniques To help bridge the gap, Guardsquare’s engineers have created a set of fun, practical labs around four code hardening techniques. This technical magazine is the perfect way to improve your security knowledge, regardless of the mobile platform you use. Developers will walk away with a greater understanding of compiler and security concepts.

Application hardening is an important part of mobile app security, and yet, it can feel like a difficult concept to grasp.

Developers often struggle to get hand-on knowledge and experience working with hardening techniques. In this technical magazine, Guardquare’s engineers have created a set of four fun, practical labs to help your organization familiarize itself with application hardening techniques and the security vulnerabilities that each technique thwarts. These four labs include:

•    Code Checksumming
•    Control Flow (non-) Integrity in Android Applications
•    Native Library Encryption
•    Encrypting Objective-C Selectors

Developers will walk away from these labs with a greater understanding of the theory behind each technique, as well illustrations and guided examples to help them implement them in their own application security strategy.

Download the technical manual here and begin building a stronger security posture through application hardening.

How to Create Secure, Collaborative and Productive Digital Workspaces
The workplace has fundamentally changed. So have the reasons companies need Digital Workspaces. Workplaces aren’t just in offices anymore—they could be in your home, at an event, at a client’s office, or a combination of all.
How can companies continue to offer employees the best user experience, while ensuring that IT can manage technology and data security demands in hybrid work environments? That's where digital workspaces come in.

Download the whitepaper to learn about:
•    What a digital workspace is
•    Changing work trends
•    Why companies need digital workspaces in a hybrid environment
•    The best ways to enable IT to deploy digital workspaces securely
•    How to implement a digital workspace for your company
•    Common use cases for digital workspaces
•    Real-world examples of businesses that have deployed digital workspaces using HP Anyware

Chaos engineering: Injecting failure to test resilience
Principles of Chaos described chaos engineering as the practice of carrying out experiments like fault injections on a system, for the sake of building confidence in the system’s resilience and ability to withstand turbulent conditions in the production environment. This article will describe the principles of chaos engineering, starting with its history and similar concepts.
Chaos engineering is an emerging practice of resilience testing in IT development. By deliberately injecting failures and errors into a system and monitoring the response, IT development teams can gain confidence in a software system’s ability to withstand real-time chaos (unexpected situations). Chaos engineering helps prevent outages, cut costs, eliminate fault lines, and build confidence in managing any system.

Read this e-book to learn about the principles of chaos engineering, the tools and resources used, and an example involving a Kubernetes application.