Hi [[ session.user.profile.firstName ]]

Desktop Support

  • Date
  • Rating
  • Views
  • Actual Reality: Desktop Virtualization Solutions from Microsoft
    Actual Reality: Desktop Virtualization Solutions from Microsoft
    Mitch Garvis, Virtual Technical Evangelist for Windows Infrastructure, Microsoft Recorded: Jul 17 2013 48 mins
    Hyper-V is no longer just for servers; with Windows 8 Microsoft has brought Layer 1 Virtualization to the desktop. However with Windows Server 2012 they have also done a great job of putting Windows 8 into the virtual desktop infrastructure (VDI).

    In the first part of this session we will discuss VDI and the components necessary to build out a virtual desktop infrastructure and discuss many of the cool new features, such as multi-monitor VMs, touch interface, and pooled versus personal VMs.

    Once that is done we will discuss Remote Applications and publish them to our desktops so that the users can use the full power of the server for their applications!
  • Introducing the Virtual Workspace
    Introducing the Virtual Workspace
    Simon Bramfitt, Founder and Research Director, Entelechy Associates Recorded: Feb 20 2013 29 mins
    About the Presenter:
    Simon Bramfitt is the founder and principal analyst at Entelechy Associates where he covers application delivery, desktop management and virtualization technologies. He has over 25 years of experience in designing high-availability application delivery and virtualization environments in Europe, the Middle East, and the USA. Prior to founding Entelechy Associates, Mr. Bramfitt covered desktop virtualization at Burton Group and Gartner and was a senior architect at Kaiser Permanente. His experience also includes IT administration, consulting, service delivery and IT management. Mr. Bramfitt blogs at simonbramfitt.com.
  • The Journey to the Modern Desktop: 5 Steps of Workspace Virtualization
    The Journey to the Modern Desktop: 5 Steps of Workspace Virtualization
    Karin Kelley, Analyst, Infrastructure Software, 451 Research; Sean Donahue, Sr. Director of Global Alliances, RES Software Recorded: Feb 13 2013 43 mins
    The way people work today has been transformed. Today’s users want access to enterprise IT services 24/7 from any location, and a traditional PC simply does not support this. However, to accommodate the flexible workstyles of mobile workers, IT is forced to come up with solutions for managing this increasingly complex environment. Workspace virtualization helps IT take on the challenges of mobility and security, while maintaining productivity across every line of business. In fact, workspace virtualization enables IT to centrally deliver, manage and secure the key elements of a user’s computing experience, independently of workstyles and devices.

    Join us for your 5 step guide to:

    •Operate much more efficiently
    •Lower the cost of daily operations
    •Improve the user experience dramatically
    •Boost security & compliance with context awareness and automation

    About the Presenters:
    Karin Kelley, Analyst, Infrastructure Software, 451 Research
    Karin is an Analyst with 451 Research's Infrastructure Computing for the Enterprise (ICE) practice. With a key focus on workspace virtualization, Karin also specializes in systems management in distributed desktop environments. Karin's IT industry experience began in 1997 as a research and administrative assistant in Merrill Lynch's Palo Alto technology investment banking office.

    Sean Donahue, Senior Director of Global Alliances, RES Software
    Sean has spent the greater part of the past 20 years evangelizing and working across Citrix and Microsoft technologies. Prior to RES, Sean spent 5 years working at Microsoft in the System Center Alliance group managing the partners in the App-V ecosystem as well as the Citrix alliance. Sean came to Microsoft through the acquisition of Softricity in 2006. In his current role at RES Software Sean owns the strategic alliances programs and manages all ISV relationships including Citrix, Microsoft, VMware as well as Tier 2 ISVs.
  • Make the Service Desk More Relevant Within Your Organization
    Make the Service Desk More Relevant Within Your Organization
    Mark Smiley, ITSM Advisor, Cask, LLC Recorded: Feb 7 2013 35 mins
    This discussion will highlight some key attributes of the Service Desk that often can go unrecognized:

    - Discussion around cross training for your S.D. personnel. How to make that happen, and the positive consequences as a result
    - Keys to marketing the Service Desk within your organization
    - Going on “fishing expeditions” to seek out potential opportunities for the Service Desk
    - Focus on career growth. See the Service Desk as an entry point, not a dead end, to your IT organization.

    Mark Smiley is ITIL® & HDI certified with over a decade of ITSM and Service Desk experience.  He's worked with various clients and industries from around the world, including the government, healthcare, and education sectors, ranging from 5,000 to 400,000 users. Most recently, he has assisted in the establishment and development of three Service Desks, in addition to directly managing teams dedicated to customer support. He currently is working as a senior advisor to the United States Marine Corps as they establish their own Service Desk to support their day to day operations.
  • Securing Mobile Devices – Challenges and Opportunities for IT Security
    Securing Mobile Devices – Challenges and Opportunities for IT Security
    Steve Durbin, Vice President, Information Security Forum Recorded: Feb 6 2013 45 mins
    Recently highlighted as being one of the top 5 threats for 2013 by the ISF, this webinar maps out how you can respond to the ‘consumerisation’ challenge today – whatever stage you are at – based on current efforts to formulate good practice at leading ISF Member organisations around the world. It offers independent guidance on how to plan your security response not only in terms of how your people use mobile devices, but also in terms of protection solutions, provisioning and support, and meeting statutory requirements.

    About the speaker:
    Steve Durbin is Global Vice President of the Information Security Forum (ISF). He is a regular speaker and chair at global events and is quoted in the Financial Times, Wall Street Journal, Forbes, Deutsche Presse, Süddeutsche Zeitlung, CIO Forum, ZD Net, and Information Week.
    Steve has considerable experience working in the technology and telecoms markets and was previously senior vice president at Gartner. He is also currently chairman of the Digiworld Institute senior executive forum in the UK, a think tank comprised of Telecoms, Media and IT leaders and regulators.
  • High Performance Wireless for BYOD: The Task in Hand
    High Performance Wireless for BYOD: The Task in Hand
    Perry Correll, Senior Technologist, Xirrus Recorded: Jan 17 2013 47 mins
    BYOD is no longer a consideration, it’s a reality. Every day over 2 million new wireless devices are being activated and these devices will show up on you network. And while most wireless vendors are talking about the potential security risks, which are considerable, almost no one is discussing the impact the sheer numbers of devices will have on your networks performance.

    A recent Gartner study did and stated that ‘By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning’. Many administrators still designing for coverage, when capacity limits are the true Achilles heel of wireless deployments. This session will discuss the varied client types and their capabilities, best practices to address growing device densities and how both impact overall network performance. IT administrator looking at a BYOD deployment or even just a wireless upgrade will gain valuable insight from this presentation.

    Perry Correll is a Senior Technologist as well as the Director of Product Marketing at Xirrus. His extensive networking background extends from original Ethernet Thicknet technology, through the switching revolution and now is involved in pushing advancements in Wi-Fi technology to displace wired solutions. Previous roles included technologist and management roles at Cabletron, Xylan and Alcatel.
  • Real Life Lessons Learned From Implementing Incident & Problem Management
    Real Life Lessons Learned From Implementing Incident & Problem Management
    Paula Hero, itSMF USA Recorded: Jan 16 2013 49 mins
    You’ve implemented the ITIL Incident and Problem Management processes but have run into one or more roadblocks.


    • Managers don’t see the process value and aren’t supporting the implementation
    • Incident management is increasing “Average Talk Time” in your Call Center
    • Technical SME’s see the Problem process as overhead and “just a paper exercise”.
    • People say “ our environment is just too complex for real Problem Management
    • How Do We Find Root Cause?
    • How Do We Work With Vendors to Get to Root Cause?
    • Governance is Easier Said Than Done

    Join Paula Hero of itSMF USA as she shares the roadblocks she experienced in her organization and the lessons learned and practical suggestions for removing barriers and making the processes produce solid results.
  • Double Dipping: Incident and Problem Management & "Your SLA's"
    Double Dipping: Incident and Problem Management & "Your SLA's"
    Richard Pilgrim, Sr. ITSM Advisor, Cask, LLC Recorded: Jan 16 2013 37 mins
    Often times we experience availability incidents. These incidents hold a different service level than those incidents caused by connectivity incidents. So what next?

    Join Rich Pilgrim, an experienced IT professional with over 20 years in the ITSM field, as he discusses the categorization of incidents and how they affect your SLA's, the link between incidents and problems and who should be looking at your SLA's for better service delivery.
  • Encryption: Is There a Difference Between Cloud and Internal Data?
    Encryption: Is There a Difference Between Cloud and Internal Data?
    Vladimir Jirasek, Director of Research, Cloud Security Alliance Recorded: Jan 16 2013 47 mins
    Data is what underpins many companies' success, yet when it comes to protecting it, companies are underinvesting in security capabilities. With the move to cloud computing, data security issues are not going away, instead are getting bigger visibility. However, should companies only care about data security when their data is in the Cloud? Or should it be irrelevant where it is processed or stored, with data security high on CIOs agenda? This session will look both at strategic options and discuss people, processes and technologies that companies should be considering.

    Speaker bio:
    Vladimir is an expert in cloud computing and a highly qualified independent security professional. He has over 16 years of IT industry experience and over 12 years in information security and security, risk and compliance.
    Vladimir has both led and managed global teams in security, risk and compliance for multinational corporations. Utilising this experience, he has successfully constructed and implemented diverse Security, Risk and Compliance architectures, policies and strategies, by using accepted international standards. Lately he has setup an independent security management consulting practice.
    Vladimir is a major force and influencer in the newly established UK chapter of the Cloud Security Alliance, where he has the role of the Director of Research.
  • Five Pillars of VDI Success
    Five Pillars of VDI Success
    Scott Miller, National Technical Solutions Architect, World Wide Technology, Inc. Recorded: Nov 15 2012 35 mins
    According to industry researchers nearly 75 percent of the organizations who have deployed a virtual desktop environment have stalled their deployment before completion leaving frustrated employees in departments ranging from IT, to the business units, to the executive suite. It isn’t a lack of good intentions causing these deployments to fail, but rather a lack of understanding of the holistic approach needed to successfully deploy a virtual desktop environment. Join WWT’s Dave Kinsman, National Technical Solutions Architect, as he discusses the 5 Pillars to VDI success.

Embed in website or blog