Karen Gondoly

Karen Gondoly

You Don’t Need Cloud Desktops, You Need Cloud-Based VDI. Here’s Why

Cloud Desktops / Cloud-Based VDI Virtual Desktop Infrastructures (VDI) have been around for a while. As an example, VMware started selling their first VDI product in 2008. Every year since then, analysts consistently predicted that this, finally, was to be

Karen Gondoly

Lessons Learned When Moving to the Cloud

Moving to the Cloud Lessons At Leostream, we work with organizations around the globe that are moving workloads to the cloud. These organizations span a wide range of industries, vary in company size, and typically have very different motivations for

Karen Gondoly

How a Connection Broker Manages Complexity and Remote Access

Hyperconverged and Hybrid Environments Consolidating desktop workloads in the datacenter using hyperconverged infrastructure and virtualization optimizes resources, reduces power consumption, and saves money. However, managing the complexity of a consolidated datacenter, along with public cloud resources, presents its own set

Karen Gondoly

Beyond VDI: How the hybrid cloud is forcing us to rethink an industry

Beyond VDI (Virtual Desktop Infrastructure) Before I start this blog, I want to get something off my chest. Here it goes: Leostream is not a VDI company, at least not in your typical sense of the acronym. Forget what you’ve

Karen Gondoly

Why you should add a connection broker to your suite of DevOps tools

DevOps Connection Broker When staring down the DevOps path, you have no lack of tools to help you pave the way. But there’s one you’ve probably never thought of, maybe even never heard of, and it’s time to expand your

Karen Gondoly

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put organizations around the world on high alert. Even those of us lucky enough not to be infected suddenly had a

6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications Although associated with the virtual currency bitcoin, blockchain technology can be applied across multiple industries, and it could be particularly appealing to small business owners who are in need of affordable and secure ways to transfer and

The Evolution of Data Transfer

Data Transfer Whether due to a lack of time, need or simply because email started at such an advanced stage, digital data-transfer systems have not progressed as far as physical delivery system. Centuries ago, Greek soldiers carried messages across great

Improving Endpoint Security Needs To Be A Top Goal In 2020

Improving Endpoint Security Bottom Line:  Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with no signs of slowing down into 2020, making endpoint security a must-have cybersecurity goal for next year. Cyberattacks are growing

Thought Leadership, CxO and Influencers

Senior Writer, Technology Consultant | CloudTweaks
Security and Privacy Leader
CTO, IoT and Analytics | Hitachi Vantara
Founder & CEO | Egnyte
CMO | Cisco, Webex
Director of Product Marketing | MetricStream
Field CTO | Intralinks
President and CEO | Wasabi
CEO | City Network, OpenStack Foundation Board Member
CEO | Leostream Corporation
CEO | ACUMATICA

Are you a CxO or Thought leader working with a reputable company and looking for free profile exposure? If so, get in touch!

Securing Multi-Cloud Manufacturing Systems In A Zero Trust World

By Louis Columbus | December 13, 2019

Securing Multi-Cloud Manufacturing Systems Bottom Line: Private equity firms are snapping up manufacturing companies at a quick pace, setting off a merger and acquisition gold rush, while leaving multi-cloud manufacturing systems unprotected in a Zero Trust world. Securing the Manufacturing

Security is Job 1: Machines vs. Machines

By Mark Barrenechea | December 11, 2019

Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee access. As much as 38% of attacks come from internal breaches. In other instances, hackers

Why the digital infrastructure is a matter of national interest!

By Johan Christenson | December 10, 2019

Digital Infrastructure National Interest When the Internet was born, it promised a form of democracy and guarantee that everybody could be part and setup their company to contribute and make the Internet better. Today – a few giants from one

Profit-Driving Strategies for 2020, Backed by Data

By Kayla Matthews | December 9, 2019

Profit-Driving Strategies Since 2019 is coming to a close, the time has come for businesses to evaluate what they can do to propel profits in 2020. The vast array of possibilities can make an enterprise’s leaders feel overwhelmed about which