Blindingly Fast New Server Speeds from Black Caviar IT!

Incredible new performance from Black Caviar IT!

 

At Black Caviar IT we never stand still – with our clients in mind, we always look for ways to constantly improve our services. 

This is why we have recently upgraded ALL of our server hardware to provide incredibly fast performance improvements for ALL of our clients!


This means that we can now offer hosting improvements with nearly 8x increases in speed and the peace of mind of incredible reliability and fall over protection.

 

Find out more about how Black Caviar IT can help your business today

 

Call Black Caviar IT on 020 3307 1200 or contact us using the online form and we can arrange a demonstration for you showing the benefits of Desktop As a Service in your business.

 

Benefits of Citrix Receiver

The Benefits of Citrix Remote Desktop for your Business

With all the hype around Cloud, one eventually starts to wonder “If my data and applications are not in my office, how do I access them?” Meet Citrix Receiver and all of the benefits of Citrix. The Citrix Receiver is a piece of software that allows you to access your data and application in the cloud that are hosted by Citrix products. You can use the Citrix Receiver on just about any computer or device including smartphones, tablets, Windows, Linux, and Macs.

Network Virtualization Benefits of Citrix

An environment like this can be a real headache for IT staff. There are just too many different things that need to be managed in a traditional environment. A benefit of using the Citrix Receiver is that the client device does not matter because all the management is in one centralised location. If an application needs to be updated, administrators only need to update the servers, and not every single client device saving the company time and money. The benefits of desktop virtualisation cannot be underscored.

Another nice feature of the Citrix Receiver is the ability to switch devices without having to reopen everything. You can be working on your new high-end laptop until the battery died because you forgot the power cable. You can then resume right where you left off using your tablet. When you make it to your 4 year old desktop you can resume your work without missing a beat and still get great performance. This is a great time saver and provides a lot of flexibility since the device you’re using doesn’t matter.

Desktop virtualisation benefits everyone. But, what if you are not at your desktop?  So many devices are portable these days and are often away from their desk.

The Benefits of Application Virtualization for BYOD Offices

In this day and age people want access to their data and apps anytime, anywhere, and from any device. If you’re out of the office and need some numbers from an Excel spreadsheet quickly for a meeting you can bring it up using Citrix Receiver on your phone. These benefits plus many others provided by the Citrix Receiver is a real boon for businesses in this day and age.

Corporations and businesses can now embrace BYOD (Bring your own device) which would save them hundreds of thousands of pounds in managing end client devices among other benefits. For those concerned about security, be rest assured. With two factor authentication, ability to lock down a user to device and IP and by hours, Citrix Reciever from Black Caviar IT is perfect for your private cloud strategy.

For more information about how Citrix Remote Desktop can help your business contact Black Caviat IT today.

5 Reasons Why You Should Virtualise Your Business

5 Reasons Why You Should Virtualise Your Business

There are so many reasons why hosting your own server is no longer an effective solution for businesses of any size. Here are my 5 best reasons for you to virtualise.

Increase your uptime

Virtualisation platforms such as those offered by Black Caviar IT offer a number of advanced features that simply are not available on physical servers, helping with your business continuity and increased uptime. Things such as live migration, storage migration, failure tolerance, high availability and distributed resource scheduling. These technologies keep virtual machines running continuously and give them the ability to recover quickly from unplanned outages. The ability to quickly move a virtual machine from one server location to another without a business even noticing the switch is perhaps one of the greatest single benefits of virualisation with far reaching consequences.

Improve disaster recovery

 Virtualisation offers your business three important aspects when it comes to surviving a disaster recovery situation. The first is the hardware abstraction capability. By removing dependence on any particular hardware vendor or server model, a disaster site no longer needs to keep identical hardware on hand to match the product environment and IT can save money by buying less expensive hardware. Second, by consolidating servers to a smaller number of physical machines an organisation can more easily afford an entirely replication site. Third and most importantly, our virtualisation incorporates software that continuously monitors and automates should a disaster scenario strike. This gives your business a fantastic degree of recovery and prevents you worrying about what would happen if the worst should happen.

Isolation of applications

In the physical world data centres typically operate a one app/one server model in order to isolate applications. However, this causes physical server overkill, increased costs and vastly underutilised servers. Virtualisation provides built in application isolation and removes compatibility issues by consolidating many of these virtual machines across fewer physical machines. This cuts down on server waste and fully utilises the physical resources by provisioning exactly the correct amount of CPU and storage resources that are required.

Extending the life of older applications

 You probably have old legacy applications still running in your environment. The applications probably fit into one of the following categorisations: they will not run on a modern operating system, they may not run on newer hardware, your IT team are scared to death to change or touch anything, and chances are that the original installers or company that created the application are no longer around to support you. By virtualising and encapsulating your legacy applications and environment you can extend its life, maintain uptime and finally get rid of that old Pentium machine that you have to keep hidden in a corner. You know – the one with years of dusty prints from ex administrators with names and passwords long gone.

Help to move things to the cloud

 By virualising your servers and abstracting away the underlying hardware, you are preparing yourself for a move into the cloud. With huge advantages from systems like Desktop on Demand and advanced email processing such as Knowledgemill you can be confident that your business IT is ready and secure for the future.

Find out more about how Black Caviar IT can help your business today


Call Black Caviar IT on 020 3307 1200 or contact us using the online form and we can arrange a demonstration for you showing the benefits of Desktop As a Service in your business.

Desktops-as-a-Service (DaaS) and Hosted Desktop Solutions from Black Caviar IT

Hosted cloud desktops with freedom from IT management

Citrix Service Provider-based DaaS solutions provide complete hosted desktops for applications and email securely delivered over the web. Desktops-as-a-Service are simple to buy and easy to manage, with no software for IT to maintain.

 

Desktops-as-a-Service technical support comes directly from Black Caviar IT and we manage the hosted desktop and answer any DaaS questions.

 

Employees simply download a small app to access their cloud desktop. Use any device to log in and access the cloud desktop, complete with applications and data.

Black Caviar IT take care of backups, anti-virus, software updates, disaster recovery and cloud desktop modifications.

 

Instead of expensive hardware and software that may not be fully used, cloud desktops offer the businesses flexibility to add or remove users as needed.

Black Caviar IT provide DaaS from a datacenter for your local or global business needs.

Why use Citrix for Desktops-as-a-Service?

Black Caviar IT enable the end-to-end hosted business services demanded by the mobile workstyles of today’s end users.

Added value to hosted desktops

Citrix offers more than just a cloud desktop, enriching the SMB experience with access to secure mobile device management (MDM), and secure file sync and share.

Enterprise-class DaaS on SMB budgets
DaaS from Black Caviar IT provides an accessible pay-as-you-go model to scale up in busy seasons and reduce expenditures when necessary.

Hosted desktops simplify SMB IT

Extensible, validated reference architecture

Moving to DaaS means Black Caviar IT hosts your IT, so no need for local management of servers, hardware or software updates.

Find out more about how Black Caviar IT can help your business today

Call Black Caviar IT on 020 3307 1200 or contact us using the online form and we can arrange a demonstration for you showing the benefits of Desktop As a Service in your business.

Protect Your Vital Business Data In 10 Simple Ways

Just imagine a scenario where you log onto your computer and find that your files aren’t there, or you receive a message that says you have been hacked and your data is being held to ransomware.

What would you do? Without your data, your business risks coming to standstill.

However, there are a number of things that you can, and should do that will negate the consequences of the above scenarios.

Here are 10 simple things that you should have in place to protect your data:

Backup

Always backup your data, and do it on a regular basis. Also, do your best to store a monthly copy somewhere off site (or in the cloud)

Backing up your data is arguably the most important thing you can do. There are dozens of options out there so do your research and pick the one that suits your business best.

Strong passwords

Do not use 12345, do not use your dog’s name, and do not use Password123. Make it a policy to have passwords that contain uppercase letters, lowercase letters, numbers and symbols. This will go a long way to protecting your data from attacks.

Ensure that your important documents have individual password protections on them and are only known by those who need to know.

The table below gives you an indication of how long it takes a dedicated piece of software to correctly guess passwords based on the characters used.

Install anti-virus software

Again there are dozens of options, but something is better than nothing. Find one of the numerous free options out there, or speak to us and we can help you to invest in the right product.

Keep all software up to date

We know that the ‘remind me later’ button is ever so tempting to press. But, these updates are vital. Without them, you are leaving your system vulnerable to attack

Train your staff

Ensure that your staff know what to look for in terms of suspicious emails, how often they should change passwords (and what format they should be), and what security questions are vital when speaking on the phone.

Learn the common signs of a phishing email

Spotting the common signs of a phishing email will go a long way to protecting your data

  • Spoof email address/display name
  • Attachments with a seemingly random stream of characters
  • URLs that don’t display what you expect
  • Lack of detail in the signature
  • Emails from companies that you have never had contact with before
  • Something just doesn’t look right

Install anti-spam on your email

Installing anti-spam will stop malicious emails from entering your inbox in the first place. This greatly lowers the chance of clicking a malicious link or download a document you shouldn’t have.

Virtualise your data

This is vital in ensuring that your data is secure. If any of your devices end up in the wrong hands, the encryption will stop them being able to read any data that exists on that device.

Learn proper disposal procedures

Make sure that any hardware you throw away is done properly. You need to ensure that all the data has been wiped completely. Either learn the proper way to do it or outsource to a specialist.

Give us a call

If the previous nine points sound like it will be a lot of hard work, you are not wrong. But, doing so will give you peace of mind that your data is safe and your business will continue to run smoothly should you find yourself the victim of a hack.

The alternative is to give us a call on 020 3307 1200. We will look at everything on this list for you; from carrying our regular backups to setting password policies to disposing of any of your old equipment. Allowing you to focus on what you do best, running your business.

Enable work-from-anywhere flexibility

Enable work-from-anywhere flexibility

 

Mobile productivity is no longer a luxury—it’s fundamental to support a happy and effective workforce. As employees increasingly expect to be able to work from any location, on any device, your organization must adapt to these demands. Businesses must move beyond the constraints of physical offices with standard PCs and wired connections, to deliver remote application and desktop access that provides a new level of flexibility for their employees.

Boost productivity with Windows, Linux, SaaS, and web apps on demand

Through app and desktop virtualization, users gain secure remote access to the apps, desktops, and data they need to do their jobs effectively, no matter where they are or which device they use. XenApp and XenDesktop empower employees to work from any location—even over high-latency or low-bandwidth connections—making today’s workforce completely mobile.

With XenApp and XenDesktop, users get the business applications they need, delivered as an on-demand service for use on any device. Citrix app virtualization solutions also cut the transaction time of client/server applications by as much as 300%, further increasing productivity.

Reduced the number of desktops by 80% and increased productivity by enabling remote access for users.

Give employees device freedom with BYOD

The bring your own device (BYOD) movement—once regarded with hesitation or even outright resistance by many businesses—is now a mainstream trend in organizations of all kinds. Consumer devices are flowing into every organization as users seek the freedom to work their way. It is too late to bar executives, salespeople, and other high-value employees from using the devices of their choice, so you must find a way to work with the employee devices that already exist in your environment, without increasing risk.

With XenApp and XenDesktop, your organization can embrace BYOD and enjoy the benefits of added flexibility. Users anywhere can easily and securely access their virtual apps and data from any computing platform or operating system—all with a native-like experience.  Meanwhile, IT maintains control of apps and data through comprehensive access policies and the ability to remotely wipe data from lost or stolen devices.

Citrix has made my life easier by providing the same look and feel no matter where I am. If I’m at home on my couch with my laptop out, or I’m on my mobile device, my iPad, I’m able to connect and do the same thing consistently.

Simplify remote app and desktop access for users

Citrix Receiver is easy-to-install client software that provides users access to the virtual apps and desktops you configure in XenApp and XenDesktop. With this free download, users get remote application, desktop, and data access, easily and securely from any device—including smartphones, tablets, PCs, and Macs. Receiver empowers employees with the freedom to work from anywhere. More than 100 million users access Citrix Receiver daily to access their business apps on iOS, Mac, Android, Windows, and Linux devices

The new Citrix X1 Mouse is big news for iOS users because Apple doesn’t support Bluetooth mice. But Citrix makes remote Windows apps on iOS devices a reality.

Optimize the Windows experience on iPhone and iPad devices

Citrix delivers the only app and desktop virtualization solution that enables using a mouse on Apple mobile devices, as well as Android and Windows devices, for the best possible user experience on any device.

Designed to optimize XenApp and XenDesktop solutions, Citrix X1 Mouse empowers enterprises to truly mobilize their workforce by enabling the complete Windows app and desktop workspace experience on mobile Apple iPad and iPhone devices.

Find more information about our remote desktop solutions by clicking here.

TOP WEB BROWSERS 2018: BEING THE DEFAULT DOES LITTLE GOOD

The browsers bundled with operating systems, notably Microsoft’s Edge and Apple’s Safari, fell to new lows last month as they continued to lose users, showing that being the default no longer provided a significant advantage.

 

According to California-based analytics vendor Net Applications, Edge’s share of all Windows 10 personal computers and Safari’s share of all Macs dropped to record lows in June. Edge, the default for Microsoft’s newest operating system, was the preferred browser on only 11.8% of all Windows 10 systems. Meanwhile, Safari, the browser packaged with macOS (and before that, OS X), ran on 38.4% of all Mac machines.

 

Edge’s popularity among Windows 10 users has been in decline since the OS debuted three years ago. A year ago, for example, Edge was the browser of choice for about 22% of all Windows 10 PC users. Two years ago, that number was about 27%.

 

At first, Edge’s problem was that its user share did not grow at the same pace as Windows 10’s. Even as Edge’s user share of all PCs increased, albeit slowly, its share of all Windows 10 devices fell month after month as the operating system added users in larger numbers than did Edge. The news for Edge got even worse, however, around September 2017, when the browser’s user share (of all PCs) began to fall, reducing its share of all Windows 10 machines even more.

 

There’s no other way to put it: Edge is a flop. In the face of some significant barriers put up by Microsoft — among them a multi step process to change Windows 10’s browser default — users have clearly rejected the browser. If all users of Windows 10 were represented by, say, a baseball team, only one of the nine players would be browsing with Edge.

 

It’s impossible to tell from publicly available data such as Net Applications’ what browser is the most popular on Windows 10 — Edge’s share can be calculated because it runs solely on Windows 10 — but the most likely suspect is Chrome. Google’s browser lost 2.1 percentage points of user share in June, falling to 60.7%. But it remained the No. 1 personal computer browser on the planet by a huge margin: Second-place was held by the effectively obsolete Internet Explorer (IE), with a user share of 15%.

 

Apple’s Safari has traced a track similar to Edge’s over the past two and a half years.

 

At the start of 2016, Safari was the preferred browser for about two-thirds of all Mac owners, a fraction that had been remarkably stable for some time. Within a year, Safari’s hold on Macs had weakened to the point where it barely held on to half of all machines. By January 2018, its share of all Macs had dropped to 43%.

 

June was the first time that Safari’s share of all Macs slipped under 40%, posting just over 38%.

 

As with Edge, it is impossible to know which browser or browsers replaced Safari for those Mac owners who ditched Apple’s. Chrome is the likeliest replacement because of its massive user share, but other possibilities include Mozilla’s Firefox and lower-tier browsers such as Opera Software’s Opera.

 

Safari’s inability to hold on to the Mac based on its default status is also more puzzling than Edge’s.

 

Microsoft’s browsers began their decline when the company forced Windows users to upgrade to the most recent version of IE and terminated some versions’ support early. The mandate kicked in in January 2016.

 

But by opening the door to change, Microsoft triggered a massive user desertion. As millions of users and businesses were told they had to switch browsers, they instead used the opportunity to abandon Microsoft’s and install rivals’, notably Chrome.

 

Although IE lost significant share — about 11 percentage points — in the 12 months before the deadline (Microsoft had first told customers of the new policy in August 2014), IE shed twice as much, around 22 points, in the 12 months after the mandated move.

Apple never demanded anything similar of its Mac users and continued to support Safari for the current version of macOS and the two previous versions.

 

One theory is that as Chrome replaced IE on users’ at-work Windows PCs, people followed suit on their at-home Macs, so they could, for instance, synchronise data such as passwords and bookmarks. In companies that supported both PCs and Macs, the Microsoft order may have sparked a similar shift from IE to Chrome, with Macs also adopting Google’s browser as those firms turned toward browser homogeneity.

 

Elsewhere in Net Applications’ data, the user share numbers reported that Firefox, which slipped under the 10% bar in April, remained stable in June at the same 9.9%.

 

What is Virtualisation in Computing

Virtualisation in Computing

Virtualisation converts a physical Desktop or server computer into a virtual machine.

Effectively the data, apps and hardware profile are all converted into a single data file.

These virtual machines run alongside other virtual machines on a single server.

Previously servers had limited resources for 1 task such as hosting a website.

With faster processors and large memory, a modern server can run many virtual machines all acting as independent servers.

The hardware including memory allocation, processor speed, graphics and other hardware are all run as virtual devices on the server.

This is effectively emulating the hardware profile of the original, none virtual device.

Advantages of virtualisation

Virtual machines are not Operating System dependent.

A Windows physical server can run an Ubuntu (Linux) virtual machine.

The servers running the virtual machines are often privy to superior hardware failure prevention services.

The original physical server could be highly prone to failure if a component was to fail.

These servers tend to be backed up routinely and also run RAID on their hard drives (a mirroring process where both drives contain the same data in case of failure of one of them).

The virtual machine is transferred in the event of a failure.

Desktop on demand

As desktop-on-demand (also known as Desktop as a Service or DaaS) becomes achievable thanks to fast broadband internet connection, all of your computing will effectively be accessing virtual machines remotely via internet connection on a relatively low powered browser PC.