You are here

News

12 Sep 2016

The recent addition of Azure Resource Manager support to Citrix Cloud’s XenApp and XenDesktop service provides a powerful new tool for creating and managing cloud hosted VDAs.

https://www.citrix.com/blogs/2016/09/12/using-xenapp-xendesktop-in-azure...

09 Sep 2016

To push more websites to implement encryption and to better protect users, Google will start flagging plain HTTP connections as insecure in its popular Chrome browser.

The plan will go into effect in January with the release of Chrome 56 and will roll out in stages. Chrome 56 will...

09 Sep 2016

BitTitan has used the Microsoft Australia Partner Conference as the launchpad for local availability of integration with Dropbox.

Available through Ingram Micro, the deal follows the global partnership revealed at Microsoft WPC in July, which saw BitTitan’s cloud services enablement and...

09 Sep 2016

Wi-Fi networks hardware and software company, Xirrus, has launched Wi-Fi Inspector 2.0, a free downloadable app that quickly and easily provides visibility into Wi-Fi networks.

Building on the success of Wi-Fi Inspector 1.0, version 2.0, runs on Windows or Mac OS, supports the latest 802...

09 Sep 2016

iOS 10 zero-day support with XenMobile 10.3.10 delivers business class mobility!

Citrix is pleased to announce the availability of XenMobile client release 10.3.10, which includes platform compatibility for iOS 10. The Worx Apps and MDX Toolkit are currently available to customers from...

09 Sep 2016

You can now monitor and automatically react to changes in your AWS CodeDeploy deployments using Amazon CloudWatch Events. This lets you detect changes in the state of an Amazon EC2 instance or deployment managed by CodeDeploy, and then invoke an action based on rules that you set. This is useful...

08 Sep 2016

You can now use the Oracle Label Security (OLS) option to control access to individual table rows in your Amazon RDS DB instances running Oracle 12c. With the Oracle Label Security option, you can enforce regulatory compliance with a policy-based administration model, and ensure that an access...

08 Sep 2016

You can now view details and information about code changes flowing through your software release pipeline in AWS CodePipeline. This provides you more context about changes that have been committed to your source repository and are running through your pipeline. Viewing this information can be...

08 Sep 2016

You can now connect to all the read replicas on your Amazon Aurora cluster through a single reader end point. Until now, you could use the cluster end point to connect to the primary instance in the cluster or instance end points to direct queries to specific instances on your Aurora cluster...

08 Sep 2016

SophosLabs has just released a research paper on a new way that cybercriminals are distributing malware that makes money by “borrowing” your computer to mine cryptocurrency.

The report by Attila Marosi, Senior Threat Researcher at Sophos, investigates the Mal/Miner-C malware, which...

Pages