Citrix Virtual Apps and Desktops design considerations

Citrix Virtual Apps and Desktops Deployment and Adoption Resource Center

Table of Contents Introduction to Citrix Virtual Apps and Desktops design considerations Having implemented various on-premises Citrix Virtual Apps and Desktops - VAD (former Citrix XenApp and XenDesktop) infrastructures, i decided to write a, rather long, technical article on Citrix architecture and design best practices. This long guide has it all, from Citrix Virtual Apps ... Read more

Microsoft 365 configuration best practices

microsoft365

Setting the ground for Microsoft 365 configuration best practices It is very common for Microsoft 365 customers to request external consultation on how to properly setup a new Microsoft 365 tenant and subscriptions or re-configure their existing subscription(s) according to Microsoft best practices. This article attempts to put together a Microsoft 365 configuration best practices ... Read more

Protecting your online content

protect online content

If you are a Web content creator, you know that you will have to face various challenges with securing your content from theft and plagiarism. Whether you create e-books, e-courses, scientific research or artistic content, you need to be aware of a few basic techniques to protect your content's security and privacy and allow it ... Read more

Microsoft 365 secure score top 10 improvement actions

security and privacy

Introduction Microsoft 365 security score is a consolidated security score based on Microsoft best practice security configurations for Microsoft 365 tenants. The higher the score the higher theoretically your overall Microsoft 365 tenant security levels. The score comprises a list of improvement actions based on your current security posture. Not all improvement actions may be ... Read more

TLS 1.0 and 1.1 deprecation in Azure services

TLS on Azure services

Overview Some of TLS protocols (TLS 1.0 and TLS 1.1) as well as ciphers suites (3DES -  TLS_RSA_WITH_3DES_EDE_CBC_SHA) are gradually being deprecated from all software systems (client and server). This undoubtably affects Azure services as well. If there is a mismatch in the TLS configuration among the components of your Azure solution, you may encounter ... Read more

Azure migration design considerations

Microsoft Azure

Running an Azure migration can entail many services and parameters which should taken into account. In the case of an Azure migration Proof of Concept (PoC), the Azure PoC subscription is used as an intermediary platform on which to perform an initial migration, test the proof of concept and validate functionality and then switch-over to ... Read more

Microsoft 365 services data protection mechanisms

Exchange Online and SharePoint Online data protection mechanisms

This article provides a high-level analysis of the Exchange Online and SharePoint Online data protection mechanisms. After migrating to Exchange Online and SharePoint Online, you need to consider the available Exchange Online and SharePoint Online data protection mechanisms. All Office365 components are adequately protected from accidental deletion via the usage of various Office365 features. The ... Read more

Internet real-time maps

covid-19 state of the network

Internet real-time maps The COVID-19 pandemic has changed the way the world lives, works, and connects. TeleGeography is curating news and providing analysis on the impact this is having on global networks. Telegeography has put up a blog with live information collected from hundreds of network operators, datacenter operators and ISPs around the globe which ... Read more