dcsimg

Condusiv’s V-locity Technology Was Recently Certified as Citrix Ready

  We are proud to announce that Condusiv’s V-locity® I/O reduction software has been certified as Citrix Ready®. The Citrix Ready program helps customers identify third-party solutions that enhance virtualization, networking and cloud computing solutions from Citrix Systems, Inc. V-locity, our innovative and dynamic alternative to costly hardware overhauls, has completed a … [Read more...]

Case Study: Non-Profit Eliminates Frustrating Help Desk calls, Boosts Performance and Extends Useful Hardware Lifecycle

When PathPoint was faced with user complaints and productivity issues related to slow performance, the non-profit organization turned to Condusiv’s I/O reduction software to not only optimize their physical and virtual infrastructure but to extend their hardware lifecycles, as well.  As technology became more relevant to PathPoint’s growing organization and mission of providing … [Read more...]

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Those who are familiar with Bluetooth BR/EDR technology (aka Bluetooth Classic, from 1.0 to 5.1) can attest that it is not perfect. Like any other piece of hardware or software technology already on market, its usefulness comes with flaws. Early last week, academics at Singapore University of Technology, the CISPA Helmholtz Center for Information Security, and University of Oxford released … [Read more...]

Introduction To The New Windows Terminal

Recently at the Microsoft Build conference, it was announced that there is a new Windows terminal that can be used as an alternative to cmd of PowerShell, called Windows Terminal. … [Read more...]

Do I Really Need V-locity on All VMs?

V-locity® customers may wonder, “How many VMs do I need to install V-locity on for optimal results? What kind of benefits will I see with V-locity on one or two VMs versus all the VMs on a host?”   The answer is that the I/O Blender Effect takes over and now VM “A” is competing directly with VM “B” and VM “C” and so on.  The … [Read more...]

Improve Performance Without Getting Stuck with Unnecessary and Expensive Hardware

We recently completed a case study with a top construction company who deployed V-locity® I/O reduction software to improve speed on Citrix and SQL applications and avoided unnecessary hardware costs. Performance on Teichert’s Citrix and SQL servers that were running critical applications was beginning to suffer due to the growth of data, increased number of users, and infrastructure … [Read more...]

Detecting and Defending Against Pass the Hash Attacks

A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look. … [Read more...]

Browser push notifications: a feature asking to be abused

“I’m seeing a lot of ads popping up in the corner of my screen, and the Malwarebytes scan does not show there is anything wrong. It says my computer is clean. So what’s happening?” Our support team runs into questions like this regularly, but the volume seems to be increasing lately. In most of these cases, it helps to look at the “Notification permissions” of the browser displaying this … [Read more...]

Is Running A Virtual Machine (VM) Worth The Effort?

In the computing world, virtualization by way of virtual machines is used to describe a method of avoiding the purchase of multiple physical computers or servers, one for each operating system. … [Read more...]

The Future of Remoting in Windows – OpenSSH

With OpenSSH, you can remote into any operating system from any operating system. This is a wonderful thing! … [Read more...]