Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Current Status

Current Status Episode 28: The CTO Perspective on Workspace with Ruben Spruijt, CTO Atlantis Computing

Join us this Thursday, October 1, 2015 at 10:15 pm EDT for another episode of Current Status. During this episode, Theresa Miller, Phoummala Schmitt and Melissa Palmer will talk with guest Ruben Spruijt (@rspruijt), CTO of Atlantis Computing and Citrix CTP.  The IT landscape is always evolving and changing. History has shown that the technology trends of the past are not the trends of the future.

Let’s take a time travel trip and go “Back to the Future” to see a CTO’s thoughts on the future of IT. What will be the Hoverboards and spaceships of the organizational workspace in 2020? Get all your questions answered by Ruben during this episode of Current Status.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: