Karen Gondoly

Karen Gondoly

You Don’t Need Cloud Desktops, You Need Cloud-Based VDI. Here’s Why

November 11, 2019

Cloud Desktops / Cloud-Based VDI Virtual Desktop Infrastructures (VDI) have been around for a while. As an example, VMware started selling their first VDI product in 2008. Every year since then, analysts consistently predicted that this, finally, was to be

Read More
Karen Gondoly

Lessons Learned When Moving to the Cloud

April 1, 2019

Moving to the Cloud Lessons At Leostream, we work with organizations around the globe that are moving workloads to the cloud. These organizations span a wide range of industries, vary in company size, and typically have very different motivations for

Read More
Karen Gondoly

How a Connection Broker Manages Complexity and Remote Access

October 16, 2018

Hyperconverged and Hybrid Environments Consolidating desktop workloads in the datacenter using hyperconverged infrastructure and virtualization optimizes resources, reduces power consumption, and saves money. However, managing the complexity of a consolidated datacenter, along with public cloud resources, presents its own set

Read More
Karen Gondoly

Beyond VDI: How the hybrid cloud is forcing us to rethink an industry

August 2, 2018

Beyond VDI (Virtual Desktop Infrastructure) Before I start this blog, I want to get something off my chest. Here it goes: Leostream is not a VDI company, at least not in your typical sense of the acronym. Forget what you’ve

Read More
Karen Gondoly

Why you should add a connection broker to your suite of DevOps tools

May 30, 2018

DevOps Connection Broker When staring down the DevOps path, you have no lack of tools to help you pave the way. But there’s one you’ve probably never thought of, maybe even never heard of, and it’s time to expand your

Read More
Karen Gondoly

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against Ransomware

August 21, 2017

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put organizations around the world on high alert. Even those of us lucky enough not to be infected suddenly had a

Read More
Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...
Gary Bernstein
Most Dangerous Botnets While it’s no secret that the technical sophistication of cyber-attacks grows exponentially, adversaries often need widespread networks to make it happen. One of the ways to do that is to infect legitimate ...
Matrix
When sci-fi films like Tom Cruise’s Oblivion depict humans living in the clouds, we imagine that humanity might one day leave our primitive dwellings attached to the ground and ascend to floating castles in the ...
Stacey Farrar
Document Migrations Require More Diligence Data creation has risen dramatically in recent years and shows no signs of slowing. According to analyst firm IDC, widespread remote work led to a spike of new data in ...
Rajesh Khanna
Implement Hyperautomation to Scale Automation Programs by 3X Most Digital Service Providers (DSPs) struggle to accelerate their path to Hyperautomation due to the complex processes with legacy systems and applications. Although Robotic Process Automation (RPA) plays a ...