skip to Main Content

Simplify Custom App Creation and Deployment

Originally launched in September 2024, The IGEL App Creator Portal was the fastest, most secure way to bring your custom third-party applications to IGEL OS 12— until now, the latest IGEL App Portal is even better and is set to…

How Do We Provide A Poor User Experience?

“Instead of focussing on Success, we need to avoid stupidity”. Innovation in user experience often focuses on achieving success; however, an equally valuable approach is learning how to avoid failure. James Clear brought the Mental Model of Inversion to my…

Ransomware Endpoint Threats: How to Fight Back

As 2022 rolls on, the latest threat intelligence data from WatchGuard makes it clear that endpoint devices are a ripe target for cyberattacks. “In this new normal of hybrid workforces, endpoints can no longer rely on a strong perimeter to identify and catch the bulk of…

Repurposing Thin Clients

Whether you’re just beginning to delve into the world of virtual desktops and digital workspaces or are evaluating alternatives or enhancements for your organization’s current end-user computing (EUC) architecture, investment and operational costs will be primary factors in determining the…

What is Endpoint Security?

Organizations today rely on a wide range of endpoint devices to ensure that access to their business processes run uninterrupted. This includes modern gadgets that allow employees to work remotely and conveniently, such as laptops, tablets, and smartphones, among others.…

Back To Top