vmware blogs and links

Bringing AirWatch and VMware together

http://searchvirtualdesktop.techtarget.com/ebook/Exploring-the-future-of-desktop-virtualization

http://searchcloudapplications.techtarget.com/

http://searchservervirtualization.techtarget.com/definition/virtual-desktop-infrastructure-VDI

server virtualization = ESX

network virtualization = nicira

storage virtualization  = ViPR

The EMC ViPR Controller virtualises the underlying storage infrastructure, allowing different storage arrays to be managed as a single pooled resource. This single view of heterogeneous arrays allows IT ops staff to manage common tasks, such as storage provisioning or migration, without having to use different management interfaces to configure each type of array.

http://www.zdnet.com/emc-targets-the-scale-out-datacentre-with-vipr-7000014948/

http://cto.vmware.com/

http://blogs.vmware.com/vmware/

http://blogs.citrix.com/

http://blog.cloudera.com/

http://www.rackspace.com/blog/

VMware Virtualization & Cloud Management | VMware India

VMware Horizon Mobile Demo at VMworld 2012 (San Francisco) – YouTube

VMware Horizon Mobile for iOS – YouTube

VMware Workforce Mobility | VMware India

Community: VMware Mobile Secure Desktop Bootcamp | VMware Communities

VMware Virtualization Products

Virtualization basics

How Virtualization works

 

Mutual authentication using certificates

Mutual authentication using certificates

Authentication using digital certificates takes place in two stages:

  • The Web server where the plug-in is located identifies itself to SSL clients with its server-side certificate.
  • The Web server uses its database of Certificate Authority (CA) root certificates to validate clients accessing the server with client-side certificates. The following process takes place:
  1. An SSL client requests a connection with a Web server through the plug-in.
  2. In response, the Web server sends its public key using a signed server-side certificate. This certificate has been previously signed by a trusted third-party certificate authority (CA).
  3. The client checks whether the certificate’s issuer is one that it can trust and accept. The client’s browser usually contains a list of root certificates from trusted CAs. If the signature on the Web server’s certificate matches one of these root certificates, then the server can be trusted.
  4. If there is no match for the signature, the browser informs its user that this certificate was issued by an unknown certificate authority. It is then the user’s responsibility to accept or reject the certificate.
  5. If the signature matches an entry in the browser’s root certificate database, session keys are securely negotiated between the client and the Web server.The end result of this process is a secure channel over which the client can authenticate (for example, using a user name and password). After successful authentication, the client and server can continue to communicate securely over this channel.
  6. The client sends its public key certificate through the plug-in to the Web server.
  7. The Web server attempts to match the signature on the client certificate to a known CA using the Web server’s certificate store.
  8. If there is no match for the signature, an SSL error code is generated and sent to the client.
  9. If there is a match for the signature, then the client can be trusted. Authentication of the client takes place, resulting in a Tivoli(R) Access Manager identity.
  10. Session keys are securely negotiated between the client and the Web server. The end result of this process is a secure and trusted communication channel between the mutually authenticated client and server.

CORS – Cross Origin Resource Sharing

  1. CORS – https://developer.mozilla.org/en-US/docs/HTTP/Access_control_CORS
  2. Failed request tracing in IIS – http://www.iis.net/learn/troubleshoot/using-failed-request-tracing/troubleshooting-failed-requests-using-tracing-in-iis
  3. CORS and IE – http://www.html5rocks.com/en/tutorials/cors/ [check the first comment about IE]
  4. CORS and IIS – http://www-jo.se/f.pfleger/cors-and-iis . The configuration on the server is also similar to this, and that is why I feel there is something happening in our application
  5. http://stackoverflow.com/questions/3672701/problems-executing-an-xmlhttprequest-from-file-to-http
  6. CORS troubleshooting, good reference – http://evolpin.wordpress.com/2012/10/12/the-cors/
  7. Example code for CORS – http://arunranga.com/examples/access-control/
  8. https://hacks.mozilla.org/2009/07/cross-site-xmlhttprequest-with-cors/ [check the comments by William Edney]
  9. http://stackoverflow.com/questions/916357/why-is-this-xmlhttprequest-sample-from-mozilla-is-not-working-in-firefox-3

BYOD versus COPE

http://venturebeat.com/2013/05/01/byod-versus-cope-a-look-at-the-future-of-enterprise-mobility/

COPE = Corporate owned, PErsonal enabled

BYOD = Bring your own device

Best Tech Videos – Scribd

http://www.bestechvideos.com/

Neural networks and Deep learning

http://neuralnetworksanddeeplearning.com/chap1.html

Space shuttle names

Video – endeavor retiring

enterprise

challenger

columbia

atlantis (praying mantis)

discovery

endeavour