Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
VMware Horizon Workspace Essentials

Buy

Manage and deliver a secure, unified workspace to embrace any time, any place, anywhere access to corporate apps, data, and virtual desktops securely from any device

Overview

  • Design, install, and configure a Horizon Workspace infrastructure
  • Deliver a user's workspace to mobile devices such as Android and iOS
  • Easy to follow, step-by-step guide on how to deploy and work with Horizon Workspace

In Detail

The Horizon suite is VMWare's end user solution suite. VMware Horizon Workspace allows administrators to virtualize operations systems, applications, and user data, and also delivers modern desktops to end users. VMware Horizon Workspace is a new type of solution that is commonly referred to as a "Workspace Aggregator” or “Universal Services Broker”. It delivers a solution that provides end-users with a single point of access to their corporate data, applications, and other IT-resources as well as providing IT administrators with a single point of administration and management.

This guide will show you how to deliver a complete user environment based on their entitlement, their location, and the end point device they are connecting with. It will also show you how, from an IT administrator’s perspective, everything can be managed from a single console.

This book starts by introducing the concepts behind Horizon Workspace, how they work, and how they map onto the everyday tasks faced by an IT administrator. It also covers the challenges a user faces in accessing the technology. It will then look in detail at the different features and functionality offered by Horizon Workspace in delivering against application brokering, data collaboration, and mobility. The book will take you through each one in detail, using illustrations and screenshots with the option to follow in real time to build out your own lab/pilot environment. You will also be guided through the product capabilities using step-by-step instructions and screenshots of each feature and how to implement it.

What you will learn from this book

  • Design, install, and configure a Horizon Workspace infrastructure
  • Deploy a data collaboration platform and apply a policy on how data is shared internally and externally
  • Deliver a user’s workspace to mobile devices such as Android and iOS
  • Manage the entire solution from a single management console
  • Integrate with existing systems and policies
  • Set up your Horizon instance
  • Generate reports on application usage
  • Configure Horizon Workspace for desktop brokering
  • Understand broker software as a service securely, using SAML and single sign-on

Approach

This book uses a step-by-step approach to teach you how to design, deploy, and manage a Horizon Workspace based on real world experience. Written in an easy-to-follow style, this book explains the terminology in a clear and concise manner. Each feature is explained starting at a high level and then drilling down into the technical detail, using diagrams and screenshots

Who this book is written for

This book is perfect for IT administrators who want to deploy a solution to centrally manage access to corporate applications, data, and virtual desktops using Horizon Workspace. You need to have some experience in delivering BYOD initiatives and delivering applications from the Cloud (SaaS).

(HTML tags aren't allowed.)

Love: A New Understanding of an Ancient Emotion
Love: A New Understanding of an Ancient Emotion
What is love's real aim? Why is it so ruthlessly selective in its choice of loved ones? Why do we love at all?

In addressing these questions, Simon May develops a radically new understanding of love as the emotion we feel towards whomever or whatever we experience as grounding our life--as offering us a possibility of
...
Non-Binary Error Control Coding for Wireless Communication and Data Storage
Non-Binary Error Control Coding for Wireless Communication and Data Storage

Comprehensive introduction to non-binary error-correction coding techniques

Non-Binary Error Control Coding for Wireless Communication and Data Storage explores non-binary coding schemes that have been developed to provide an alternative to the Reed – Solomon codes, which are expected to become unsuitable for...

Ham Radio for Arduino and Picaxe
Ham Radio for Arduino and Picaxe

Microcontroller technology has exploded in popularity among ham radio operators. The new generation of single-board microcontrollers is easier than ever to use, bringing together hardware and software for project-building most radio amateurs can easily dive into. With inexpensive microcontroller platforms-such as the popular open-source...


Granular Computing: Analysis and Design of Intelligent Systems (Industrial Electronics)
Granular Computing: Analysis and Design of Intelligent Systems (Industrial Electronics)

Information granules, as encountered in natural language, are implicit in nature. To make them fully operational so they can be effectively used to analyze and design intelligent systems, information granules need to be made explicit. An emerging discipline, granular computing focuses on formalizing information granules and unifying them to...

Professional ASP.NET 3.5 SP1 Edition: In C# and VB (Wrox Programmer to Programmer)
Professional ASP.NET 3.5 SP1 Edition: In C# and VB (Wrox Programmer to Programmer)
Professional ASP.NET 3.5 SP1 In C# and VB

ASP.NET 3.5 brings the power of Visual Studio® 2008 along with the multitude of language improvements in C# 2008 and Visual Basic® 2008 as well as powerful new technology called LINQ, together with the ASP.NET 2.0 Framework you already know and love. Packed with valuable coverage of ASP.NET 3.5...

Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy