MIT tech review

MIT – Facebook paid people to listen to voice recordings, too

It’s the fifth big tech company forced to admit to the practice this year. The news: Facebook paid contractors to listen to, and transcribe, audio clips generated by people using its Messenger app, according to Bloomberg. They were not told where the clips were recorded, or how
/
Reuters news

Exclusive: Google’s jobs search draws antitrust complaints from rivals

BRUSSELS/SAN FRANCISCO (Reuters) - Google’s fast-growing tool for searching job listings has been a boon for employers and job boards starving for candidates, but several rival job-finding services contend anti-competitive behavior has fueled its rise and cost them users and profits. In a letter to
/

How a Connection Broker Manages Complexity and Remote Access

Hyperconverged and Hybrid Environments

Consolidating desktop workloads in the datacenter using hyperconverged infrastructure and virtualization optimizes resources, reduces power consumption, and saves money. However, managing the complexity of a consolidated datacenter, along with public cloud resources, presents its own set of challenges. A connection broker is an essential element of an effective VDI or hosted application deployment to meet the challenges of datacenter or hybrid cloud complexity.

Data centers are a beast. No matter the size of your organization, building, maintaining, and scaling your data center is a never-ending task for your over-worked IT department. If not properly managed, data center complexity increases your costs, reduces your agility, and can even hinder the performance of your mission-critical applications.

What are these mission-critical applications? They could be employee applications, like the CAD application used by your engineers. They could also be corporate applications, such as a Microsoft SQL Server database. Finally, important to a company like Leostream who builds connection broker technology, the “application” may actually be the user’s entire desktop.

Building independent silos for each of these “applications” – using dedicated storage, network, and servers for each use case – typically results in underutilized compute resources, high power consumption, and costly management fees.

Hyperconvergence and Virtualization to the Rescue

Thankfully, two technologies evolved to help battle data center complexity and solve the problems inherent in silos: hyperconverged systems and virtualization.

Hyperconverged systems combine servers, storage, and networking into a single solution. With fewer moving parts, hyperconverged systems are easier to deploy and manage.

The virtualization layer then transforms the single physical server into multiple virtual servers or virtual desktops, optimizing hardware utilization. By implementing these two technologies together, IT can deploy applications and desktops faster, easily scale the data center as demand increases, and even save a little money.

Managing Hybrid Cloud Complexity

While hyperconverged systems evolved to solve data center complexity, the public cloud threatened to add complexity back into IT. With the public cloud, IT could host desktops and applications off premises, usually at a lower cost and as an operating expense, instead of a capital expense.

While the promise of saving money is high, not all desktops and applications are suitable for moving to a cloud environment, leaving IT in a position where they need to manage applications and desktops both on-premises and in the public cloud, in a complex hybrid environment.

What’s the big challenge presented by a complex hyperconverged and hybrid environments?

In two words – remote user access. When introducing technologies to solve data center complexity, or moving to the public cloud to save on capital expenses, you need to ensure that you don’t transfer complexity to the end user. End users need access to the correct desktops and applications, delivered using a display protocol that meets their performance needs, from almost any location. To address these challenges, a connection broker is an essential element in your hosted application and desktop deployment.

How does a connection broker manage datacenter complexity and user remote access?

End users don’t care where or how their desktops and applications are hosted; they just need access. By including a connection broker, such as the Leostream Connection Broker, users access a single portal to request and access any of the resources in your data center or even in a public cloud.

The Leostream Connection Broker integrates with a variety of hyperconverged, virtualization, and cloud platforms, such as VMware vSphere, OpenStack, AWS, Azure, and Google Cloud Platform, as well as different hardware form factors such as HPE Moonshot Systems or workstations that utilize NVIDIA GPUs. Regardless of how you decide to build your data center or what cloud you plan to use, end users always enter through a single Leostream login to gain access to their allocated applications and desktops.

When connecting to their desktop, Leostream uses either an HTML5-based display protocol or one of a variety of supported high-performance display protocols to meet the performance needs of any application – including graphics-rich applications.

Additionally, Leostream provides tools to help manage capacity in your cloud or virtualization platform by automatically launching and deleting desktops and applications as user demand waxes and wanes. Leostream can even be set to release or terminate the user’s desktop if they become idle. These tools, and more, help IT reign in application sprawl both on premises and in the cloud, where unintended sprawl increases compute costs.

A connection broker solves the primary challenge of datacenter-access complexity by connecting users to the applications and desktops they need to get their jobs done. With the connection broker managing end-user connections, IT can focus on managing complexity elsewhere in the data center, knowing that their users always have access to what they need.

By Karen Gondoly

Karen Gondoly

A 15-year veteran of the technology industry, Karen Gondoly brings leadership experience as well as extensive skills in software development, technical writing, GUI design, and usability to her role as CEO of Leostream Corporation.

An active advocate of innovations in the desktops virtualization space, Gondoly writes widely on the topics of hosting resources in the datacenter and is a member of the “Women of OpenStack” community.

A graduate of Massachusetts Institute of Technology, she holds bachelor and master of science degrees in aeronautical/astronautical engineering.

She is a dedicated fitness enthusiast and avid runner, having completed over 40 marathons spanning 38 states and 3 countries.

View Website
Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but ...
Steve Prentice CloudTweaks

Competing Cloud Security Demands Call For Credentialed Professionals

Demand For Credentialed Professionals It is not possible to stare with absolute clarity into the future. None of us has a crystal ball. But there ...
Object Storage for Your Backups

Don’t be held hostage by Ransomware: 7 Prevention Tips

Ransomware Prevention Tips Ransomware can bring your business to its knees. Whether it comes as a system- or network-wide infection, it can do a severe ...
Accenture News

Accenture Report Reveals New Cybercrime Operating Model Among High-Profile Threat Groups

/
Accenture Report Reveals New Cybercrime Operating Model Accenture Security’s 2019 Cyber Threatscape Report identifies top threats influencing the cyber landscape, including emerging disinformation techniques and evolving relationships in the underground ...
Capital One Cyber Staff Raised Concerns Before Hack

Capital One Cyber Staff Raised Concerns Before Hack

/
Cybersecurity employees reported what they saw as staffing issues and other problems to bank’s internal auditors, human-resources department and other senior executives Before a giant data breach at Capital One ...
Wired

Hackers Could Decrypt Your GSM Phone Calls

/
MOST MOBILE CALLS around the world are made over the Global System for Mobile Communications standard; in the US, GSM underpins any call made over AT&T or T-Mobile's network. But at ...