Request a Demo

TheRes Tech Blog

A blog for digital workspace automation & security

Blog Menu



Welcome to the RES Technical Blog

The RES Technical Blog offers strategies and industry insights on today’s and tomorrow’s innovation. The RES blog will provide the latest updates on RES solutions and services and tips on how best to maximize your RES investment.

Tile Management on Windows 10

April 25, 2016

The latest release of RES ONE Workspace 2015 has a lot of great capabilities highlighted in this blog post by my colleague Pete Downing.  We have introduced another exciting capability, tile management for Windows 10. This was a popular capability for our customers running Windows 8.1 because it gave their « Read More

RES Could Solve your QuickTime Nightmare

April 21, 2016

The US Department of Homeland Security recently released a message to Windows users, recommending the immediate removal of Apple’s media player QuickTime. Two major security issues were discovered in the software – leaving systems defenseless against cyber-security dangers such as hackers. Apple’s last QuickTime update for Windows was released in « Read More

Microsoft App-V 5 Package Delivery Mode in Combination with Citrix Published Applications.

March 29, 2016

What this article is about This article will describe the way we handle the choices between starting a published application or instead starting the application local. And what to do when the local application is a Microsoft App-V 5.x application and Just in Time delivery is enabled (Package delivery mode « Read More

Configure Windows 10 User Settings in Only a Few Clicks, with RES ONE Workspace Templates

March 10, 2016

RES ONE Workspace 2015 SR1 has a lot of great capabilities highlighted in the blog by my colleague Pete Downing. I would like to take a moment to go over another great capability, user settings templates for Windows 10. Recently RES released support for Windows 10, and now it also « Read More

Be the Hero and Embrace Windows 10 with Ease

March 8, 2016

Whether we like it or not, Windows 10 is here and your users eventually will come asking: “When are we going to be allowed to run Windows 10?” Two things are probably going through your mind… How the heck am I going to control and create a secured Windows 10 « Read More

Video: Breaking Down Barriers in Deploying Application Whitelisting with RES ONE Service Store

February 24, 2016

Cyber-security threats are on the rise and if you are not seeing the increased awareness, you might be living in a black hole. From breaking news like the latest this week where a  Los Angeles Hospital paid $17,000 to a hacker to regain control of patient records (a new trend « Read More

RES ONE Workspace 2015 SR1 ( Available

January 29, 2016

Guest Blog by: Rob Aarts www.robaarts.nl This blog post first appeared on LinkedIn Pulse. Today RES announced an update for RES ONE Workspace 2015, below I will cover some off the new or enhanced features in this release.   Workspace Agent for Linux and Apple OS X RES ONE Workspace 2015 « Read More

RES ONE Workspace 2015 – Service Release 1 Now Available

January 19, 2016

Today, we’re very proud to announce the availability of RES ONE Workspace 2015, Service Release 1 (SR1) which makes your goal of delivering a premier digital workspace experience regardless of device more achievable than ever. This release,  is exciting because it extends the enhanced application security capabilities for the workspace across Windows, Mac « Read More

A Look at Healthcare, Cloud, and Virtualization for 2016 and Beyond

January 13, 2016

Guest blog by: Bill Kleyman, VP of Strategy and Innovation at MTM Technologies @Quadstack We’ve reached a point within the modern healthcare data center where new forms of content delivery, business strategies, and even user enablement have fundamentally changed the way technology is deployed and utilized. A recent Cisco report really « Read More

The New Hacking Frontier: Medical Device Vulnerabilities

January 6, 2016

Last month I spoke about ransomware in my blog regarding patient data security. Ransomware is a particularly nasty malware variant where malicious code gets launched into a network and encrypts critical data. Then someone, somewhere requests ransom in return for the decryption key. For healthcare IT, this is an increasingly « Read More