Everything is fantastic on the Citrix Summit 2016!

12:31 PM 1 Comment
Everything is fantastic on the Citrix Summit 2016! -

Twitter Pic of the Day
(I mean, really, how big that shot is up there ?!)

Fun with minifigs ! put their own spin on partners custom Citrix Lego minifigure Citrix Summit 2016 kicked with 5,000 of these unique characters, build the participants of the parts on the Citrix booth Experience. (. More on this later)

is

partners and sales teams to build a lot of other things at Summit also including new relations and a plan for success in 2016. So much happens today: Let us take a look at, the highlights.

Talking Tech

As Senior Vice President and Chief Marketing Officer, Tim Minahan, said this Tech Talks Keynote morning "when was to Focus and Grow yesterday, today is about innovation . "

took Citrix executives the stage to their excitement and some demos of the product to share great progress, the partners nail the go-to-market strategy in detail also in 2016 will contribute to alignment with Citrix partners, Microsoft (and the ability to use on Windows 10 Momentum) to the future security browser-based application delivery with the new browser app service. As Tim said, the market for the growth and primed Citrix is ​​well positioned to capitalize on it.

But I think the best part of the keynote today enthusiasm of our partners had happened for everything on stage. They have such a great job that you have to say about the General Assembly yesterday, I thought I would share in their own words their reactions to today's discussions keynote Tech: Search

building a better you: partner resources Summit

How much of a hit, the Citrix Lego minifigures (Totally rhetorical question, dontcha know.) parts collect their own minifigs in the Citrix booth Experience to build has become partners with kind of an obsession and sales teams this week. The #CitrixSummit Twitter feed is blowing on with minifig selfies. Here my favorite hipster Jesse Lipson, corporate vice president and general manager, Cloud Services:

Jesse Lipson.jpg

to collect During their heads, legs and accessories, each is also learning about new Citrix products and applications in the demo stations and get advice on sales, verticals, partner programs and technical problems with the experts ask bar. Believe it or not, minifigs NOT the hottest thing, are on the Citrix Booth Experience! There are so many valuable resources here: the state open Wednesday to 01:30 from 12:00 is, so be sure to stop by if you do not already have

The Certification Center has much to do, too! Remember, partner at Summit (a $ 300 value) will receive a free certification exam, open so some doors or the next step towards Citrix accept progress, specialization. The Certification Center also has a test preparation hall with self-study online courses and prep guide, so that you prepare for your exam at your leisure. Partner seemed most interested in the associate and professional NetScaler tests today; Wednesday hours are 12:00 to 19:00, so you should plan your free exam before you leave the summit

our innovative partners Honor

Do not forget :. Today at 18:00 the deadline for Citrix Innovation Award for Partner winners for the vote, which means there is only left minutes. It is an honor to be nominated only-straight Technology Partners, Gotham and Kelway make work the groundbreaking that our partners have done for our end user customers, but it can be only one winner. Be sure your voice is heard and vote either by the Summit Mobile app or online. The winner will be announced in tomorrow's final keynote, which begins at 11:00 am at the MGM Grand Garden Arena

Looking ahead, .:
Diversity in Technology and Partner Appreciation Party

I'm Headed to the diversity in the technology meeting and cocktail reception in the Premier 313 5:15 to 18:45 There is a large panel discussion of Jennifer Krystofiak, Citrix senior manager of Worldwide channel moderated its development , Then, we have the opportunity to talk about how diversity enormous benefits for organizations and brings network with a global community of partner organizations. I hope to meet you there.

Then there is the party, we have all been waiting for- Goo Goo Dolls are the Partner Appreciation Party headlining at 19.30 starts at the MGM Grand Garden Arena. Come. For some great music, drinks, dinner and some super special #CitrixPartnerLove I'll see you tonight!

And follow me on Twitter Follow @merisummers to stay up-to-date on Summit

Stay connected - you follow the Citrix partner Network on LinkedIn Facebook and @CitrixPartners on Twitter | Join the #CitrixSummit conversation

Citrix NetScaler courses Rock & We have to prove the data!

11:30 AM 2 Comments
Citrix NetScaler courses Rock & We have to prove the data! -

We all know that Citrix NetScaler is an amazing solution for application deployment and offers versatility, whatever your application.

But as with any performance tool, you must have the technical know-how to maximize their potential. Citrix Education is here to help If you look

, NetScaler to implement as a standalone solution, CNS-205: Citrix NetScaler 11.0 Essentials and Networking covers the basic skills necessary to implement and troubleshoot NetScaler

According to a recent survey of our students, CNS 205 real results delivers .:

  • Higher application Availability: believe 96% of the students surveyed that the skills they have learned, they will provide higher application availability NetScaler

NetScaler TechValidate

  • Better at work helping .: 95% of the students surveyed agreed that CNS-205 gave to be more effective in their work

NetScaler 2

  • Increased safety them the skills: , 83% of the surveyed students will be able to make their environment safer by they learned the skills of application in this course.

NetScaler Education 3

If you NetScaler as part of a virtualization environment, CNS-207 .: Implementing Citrix NetScaler 11 for app and desktop solutions of course for you is It covers the NetScaler fundamentals and teaches the skills to configure and includes manage NetScaler in a desktop virtualization environment, Citrix XenDesktop or XenApp requires

CNS-207 students in some of the highest satisfaction scores have .:

  • application Security .: to increase 95% of the students surveyed, the application security were looking , with NetScaler the skills they have learned in CNS-207, it will help achieve this goal
  • [1945010[

    NetScaler Education 4

    • increased NetScaler value: 82% of the students surveyed said they were able as a result to implement more features and functionality of NetScaler, take this route.

    NetScaler Education 5

    • Quick Results 0% students surveyed could apply the skills they learned in this course in 3 months or less

    NetScaler 6

    aligned with content towards beginners and experienced users alike, the most experienced NetScaler administrators themselves are sure to learn something .:

    "CNS-207 gave me a good overview and an excellent basis to work with the NetScaler product. As a person with minimal knowledge of networks, this class was the knowledge with my network I team work together on new initiatives " -. Engineering, large enterprises Hospitality Company

    "as a result of the training I can now proudly say itself as Citrix resource for my organization and its value introduce my company. Thanks to Citrix for . such a simple, yet effective training program I wish others like VMWare and Microsoft could follow " - Server administrator, Global 500 Technology Company

    ". I NetScalers for years the management and left with version 9.6. I did not expect many others to get out of this training as a refresher course. I was pleasantly surprised when our very knowledgeable teacher took us on the journey NetScaler. I told my staff this the best training I was've visited in the last 14 years of my career. "- IT Systems analyst, State government Agency

    in investment education not only increases your knowledge and personal value, but also makes your products more valuable, by making the most of the available features and functions you never existed would have known. In fact, 85% of our students, they agreed on the properties and functions of NetScaler learned that she probably would not have learned on their own.

    NetScaler 10

    Regardless of what your role is with Citrix NetScaler, Citrix has designed education courses, allowing you to make more efficient and achieve your personal and professional goals , Discover our comprehensive NetScaler you course catalog to get on the road #CitrixCertified !

    Are you ready to find out how much #NetScalerROCKS to help? Then click here and start learning today.

Send an SMS Alerts from Citrix products via e-mail (and Octoblu)

10:29 PM Add Comment
Send an SMS Alerts from Citrix products via e-mail (and Octoblu) -

Have you ever been a message from Director, Share File, Podio or NetScaler? wanted send

If so, we have good news! Octoblu you can practically everything (APIs, smart appliances, portable devices, etc.) to automate, with our easy drag-and-drop designer.

Since Octoblu the trigger support both webhook and e-mail addresses, which makes it super easy to e-mail to Octoblu and resolve to send a series of events. a cell phone number in the subject line and a message to the body of an email Adding can Octoblu transform this email in a text message. Here is a screenshot of a sample bluprint automation.

Screen Shot 2016-01-29 at 2.18.43 PM (2)

Once you deploy from above Octoblu bluprint, click the trigger node and copy the e-mail address webhook. Now you can send an email to your triggers.

Screen Shot 2016-01-29 at 2.18.43 PM

When you attach a debug nodes on the trigger, you will see all the parameters that come along with the e-mail triggers in Octoblu.

Screen Shot 2016-01-29 at 2.49.39 PM

to the subject line of the SMS phone number as node {{}} msg.params.subject and the body reference for the SMS message as {{msg.params.body-plain}} .

Imagine what else you could automate Octoblu!

Skype for Business - a paradise 'Cyberpirates

9:28 PM Add Comment
Skype for Business - a paradise 'Cyberpirates -

So you have decided your old PBX system and enter the world of unified communications trench. Good for you. Well, here's what you should know to keep your data safe from Skype cyber pirates and more ... , because it is one to rely on the tablet not only your fingerprints.

Whether you made to go your decision based on UC employee productivity gains, time savings or converging networks, you can still have questions on the UC solution is best for you. This may be an easier decision than you think, as you probably already have the leading solution and do not know

Skype for Business .:
The Unified Communications tool you already

Skype for Business is a leading UCS solution and is offered in the licensed programs from Microsoft bundled in many popular iterations of office, especially office 365. that's right; there is a good chance that you already own one of the leading UCS solutions available today. And you are not alone.

According to Microsoft, more than 75% of surveyed customers have budget Unified Comms. In fact, 3 out of 4 customers of Citrix UCS acceptance have already chosen Skype for Business as a preferred solution. Skype has such a dominant footprint that 0 of the top Fortune 100 companies use Skype for business and get another 79% of the US enterprise customers or schedule Skype for companies to use

In fact, , you have already experience the consumer Skype for instant messaging with family and friends with. But if we look at Skype for business, we need to look beyond the mere text messages. More than 0% of the business with Skype will be the voice - video feature. I myself am a Skype for Business "heavy" user. I start my day with Outlook, this is true. And of course, Skype is integrated into Outlook. But I have also always been a Skype window visible somewhere on my screen.

For me it is like in the virtual lobby or the coffee break lounge. I see people as they start their day, when they change their status from yellow (away) to green (available).

"Good morning, Bill. How was your weekend?" If I say me. In my home office I know it sounds sad. #WompWomp

If I want to ask someone a question, I know immediately if they are available in a meeting or have stepped away. For those who I can stalk Muahahaha-I want to mark them even, so I get notified when it is available (come on, you know you do it too ... right?) I a sense of get intrigue when one of my contacts in it "do not disturb." (Tag ominous music) What is so important that they each block

A typical Skype for Business conversation

My usual Skype interaction something goes:

[1945001I] need my friend, Penny, to ask something or update. I look at Skype as it is always visible. I see Penny is "yellow" and their status is removed for 11 hours. "Okay", I think. "Penny is in Central time, she is still coming online that way." I grab a coffee and check Facebook. I see Penny change to green, but I'm not going to rush immediately. I give her a few minutes, so they do not, I do not know have been waiting for them to get online. Back again waiting for the physical work, it is as I do that they get to her desk and settled in before I stand in her door.

I open with a Penny IM window, "Good morning." We IM back and forth for a bit and when the call is deep and detailed, we decide that the input is not efficient for longer.

:: RING! :: We open a call Skype. I use my headset and Penny uses her Polycom USB desk phone. But, the call will be involved more deeply and more. So we decide to get our integrated desktop forward to a video call cameras.

"Hello, Penny. She straightened her hair. It looks good."

But the problem that we tackle is involved now bigger and more so Penny and I we decide Lynda need to help us.

"G'morning, Lynda!"

and because Lynda always has something good book (she's a smart cookie, that one), I open the Recording Manager and record the session. Well, everything we say and do, is provided for my review notes for later disposal.

Good news! Lynda has the answer we are looking for. She shares her screen as moderator and shows Penny and me a table with all the answers to what we discuss. Brilliant! Lynda file showed drag and drop on the screen in the Skype chat with the data that answers our question. Penny and I both upload the file from Skype. Now that's efficient!

"I think we covered it. Have a great day all."

We end the call. off cameras and I'm going to listen back to Pandora.

And now the downside ...

Well, a fairly standard Skype for Business interaction and it uses a lot of the capabilities of Unified Comm system.

But may all this ease of communication and co-operation at significant risk.

You see, everything we discussed wrote, and said aloud stored locally on my laptop through the recording and logging options of the Skype client. This file, which was full of confidential information, automatically downloaded to my endpoint. All my Skype contacts, including their address, telephone number and e-mail are automatically saved on my computer. That's a lot of highly sensitive information. Kinda scary, is not it?

And when I left my laptop in the back of a taxi in New Orleans during a Microsoft conference, or "out of place" gets at the airport? Yup, all this data is now at risk. , Breached And as you can see, it is not only simple SMS of

I hear what you say, "How your weekend was":

How can I ensure that my staff productivity gains with Skype have for companies, but my intellectual property remains secure? I do not want to be the lead story on the evening news

BREAKING NEWS
(keyword ominous music dun dun dunnnnnnnnn ):

Citrix a dedicated Skype for business page with all things Skype at a central location released See also: w00t. And? Did you pass the warning on T000 malware for Skype?

Learn to see, such as Citrix, in Part 2, "Backup Skype for Business in a Mobile World" addresses these questions (soon on the Citrix blog) ...

Troubleshooting XenDesktop slow logons with HDX data

8:27 PM Add Comment
Troubleshooting XenDesktop slow logons with HDX data -

Guest Post by Niron Koren, ControlUp CTO team

This blog post is a short follow-up to my previous entry on slow logons troubleshooting. These updated script contains new registration phase and now covers the entire registration process Citrix XenDesktop, see below for details.

HDX connection phase

Since my last post about registration duration analysis we have a lot of great feedback, including some interesting inquiries receive and suggestions. One of them, more than any other was repeated the XenDesktop HDX director of compound phase was book (which is a phase which takes place before Windows will play its part) to the script.

The updated script now covers the entire registration process, clicks from the moment the user clicks on the published resource until the desktop is available. The new module works with the XenDesktop Monitor service via OData API query. The Windows session id is translated to a XenDesktop SessionKey used in the OData API query.

Logon phases

The following table lists the updated "Logon phases" table showing a summary of the registration phase that the script includes is. The new phase includes HDX connection and session Init:

complete required [1945016dieAnmeldeskripts] running in the configured relevant GPO, in a case of synchronous logon scripts Windows Explorer does not start until the logon scripts have finished running. [8]
Logon Phase Name Logon Phase Description start event end event
HDX connection , the time steps when setting up the HDX client to VM. taken [1] Based on OData query HdxStartDate column. Based on OData query

HdxEndDate column.

Session Init When a user on the system, the initial Session Manager, a new instance of itself creates the new session to configure. The new Smss.exe process starts a Windows subsystem process and Windows login for the new session [2] Log Name :. Security

Event ID: 4688 (smss.exe Start)

Log Name: Security

Event ID: 4689 (smss.exe end)

operator a network provider is a DLL which notify for a particular type of connection protocol [3] each time you log Winlogon this network operator is responsible, so that they can collect credentials and the user for authenticate their network [4]. Citrix PnSson is a joint on XenApp and XenDesktop VM found network operators Log Name :. Security

Event ID: 4688 (Mpnotify.exe Start)

Name Log: Security

Event ID: 4689

(Mpnotify.exe end)

Citrix Profile management During sign copies Citrix UPM the 'user registry entries and files from the user memory on the local profile folder. If a local profile cache is available, the two sets are synchronized. [5] Log Name: Application

Event ID: 10

(User X Path to user store is ...)

Log Name:

user Profile service event ID: 1

(Received user login notification to meeting X.)

Profile During the application, the system is loading the user's profile, and then configure other system components the user's environment in accordance with the information in the profile [6] log name:

user Profile service event ID: 1

(Received user Login notification session X.)

log name:

user Profile service event ID: 2

(finishing the user registration notification on session X.)

GPO

also

, the domain policy and the settings for the user session, to force in a case of synchronous processing, the user will see their desktop in the application not see until the user is finished editing GP. [7] Log Name: Group Policy

Event ID: 4001

(processing of user login policies vary according to X)

Log Name: Group Policy

event ID: 8001

(user logon policy processing for X Completed)

GP scripts Log Name: Group Policy

Event ID: 4018

(startup script Logon for X)

Log Name: Group Policy

event id : 5018

(Completed Logon script for X)

Pre-Shell (UserInit) Winlogon runs Userinit.exe that running logon scripts, reestablishes network connections and then starts Explorer.exe, the Windows interface. [9] In RDSH meetings Userinit.exe leads the Appsetup [10] entries as Cmstart.exe the calls in-turn wfshell.exe Log Name :. Security

Event ID: 4688

(userinit.exe Start)

Log Name: Security

Desktop Session:

Event ID: 4688

(explorer.exe Start)

Published Apps:

event ID: 4688

(icast.exe Start)

Shell *

* (available only if the script ControlUp runs)

, the interval between the onset of desktop initialization and the time of the desktop was available for the user also includes the Active setup phase. [11] Log Name: Security

Event ID: 4688

(explorer.exe Start)

ControlUp argument - "Desktop Load Time"

script download link

run the script

requirements:

  • Windows PowerShell 3.0 and higher
  • local administrator rights (query required for the local event logs)
  • read -only administrator role in each XenDesktop site (even if full admin rights are present, it is recommended to read-only rights, but also to add)
  • Activate the monitoring of process tracking via GPO or local security policy (secpol.msc) to support all target XenDesktop VDA
  • to "older" user sessions is recommended to increase the security log size to 50 MB or 100 MB.
  • supply target user session ID as a script parameter
  • Updated Citrix Receiver (on the physical endpoint that initiates the target HDX session)

, it is worth noting that it may take a few seconds to fill for XenDesktop HDX connection times in the monitor service database.

Lead the following steps to run the script via PowerShell: Import

  1. the script to the shell to "Import-Module" command. (For example, "Import-Module C: Scripts AnalyzeXDLogonDurationAnalysis.ps1")
  2. You can import After the module call the function from the shell-Get-LogonDurationAnalysis, the function takes 4 parameters:
    1. -UserName:
    2. -UserDomain:
    3. -HDXSessionId:
    4. -CUDesktopLoadTime: [optional]
  3. example - Get-LogonDurationAnalysis -Username MyUser -UserDomain MyDomain -HDXSessionId 3

References

[1] https: // www.citrix.com/blogs/2013/09/20/director-logon-duration-explained/
[2] https://technet.microsoft.com/en-us/magazine/07.03.vistakernel. aspx
[3] https://msdn.microsoft.com/en-us/library/aa378775(VS.85).aspx
[4] https://msdn.microsoft.com/en-us / library /windows/desktop/aa376106(v=vs.85).aspx
[5] http://support.citrix.com/proddocs/topic/user-profile-manager-5-x/upm-how-it-works-den.html
[6] https://msdn.microsoft.com/en-us/library/windows/desktop/bb776892(v=vs.85).aspx
[7] http://blogs.technet.com/b/grouppolicy/archive/2013/05/23/group-policy-and-logon-impact.aspx
[8] https://msdn.microsoft.com/en-us/library/ms811586.aspx
[9] https://technet.microsoft.com/en-us/library/cc939862.aspx
[10] https://support.microsoft.com/en-us/kb/195461
[11] https://en.wikipedia.org/wiki/Active_Setup

Register your Windows 10 device with XenMobile & Azure Active Directory

7:26 PM Add Comment
Register your Windows 10 device with XenMobile & Azure Active Directory -

With the release of XenMobile v 10.3, Citrix supports the enrollment of Windows 10 devices with the Windows Azure Active Directory. see the Azure the steps to set up here Active Directory and Server XenMobile

Step 1 :.

Login Windows 10 device and search for settings and start settings, Trusted Windows Store app

W1

Step 2:.

Search Join Azure with the search option from the search results to click Connect the device to your work or school cloud domain

W2

step 3 .:

suborganization, click Join Azure AD

W3

step 4 :.

you are shown a message saying What happens next When the conditions then Next

W4

step 5 Ok are: ..

under Let us get signed in page, where your administrator set your Azure AD credentials available and click Log .

W5

Step 6:

Once the user is successfully authenticated, then the user is the Terms are shown side (from XenMobile- Server). please check if you agree to the terms, click Accept to continue

W6

Step 7 :.

The end user will be the details displayed as domain that he is about to join, user name and user type. Click Join

W7

Step 8 :.

You will receive a confirmation page showing the connection from your Windows machine to Azure AD shown.

W8

You can do the same

  1. By looking at the organizational details from the Info tab under System Settings.
  2. under [confirm

W9

2. Click Settings> Accounts> Work Access , where you can confirm that the device with the connected device Manager is

W10

. Note:

  1. above steps from a Windows 10 Professional Edition device are recorded.
  2. to begin with, make sure that your device is connected to the Internet and Azure AD is from the Windows 10 accessible device.

Kerberos authentication with NTLM fallback & KCD SSO for backend

6:25 PM Add Comment
Kerberos authentication with NTLM fallback & KCD SSO for backend -

With the release of NetScaler 11 build 64.34, the requirements and the configuration of the NTLM authentication have changed.

Do not In this blog post, I'm going through an example configuration where we will authenticate using Kerberos, if the internal network, but fallback to NTLM when external and users from Active Directory accessible.

We are interesting to do things a bit by single sign-on to the back-end resource with Kerberos Constrained Delegation.

I have this particular configuration found something a lot of people struggle with, so hopefully this breakdown will be useful.

first things first, the requirements can cover this working example, you must ....

  • A load balancer virtual server
  • A back-end resource with "Windows authentication" and the right provider set (Negotiate and NTLM)
  • AAA vServer for authentication
  • an authentication negotiate policy
  • an authentication negotiate Server
  • A NTLM path URL
  • A session policy for single sign-on
  • A kerberos account
  • Some of the SPN

better achieve the full flow of communication to understand that I is of a packet capture the respective packets on.

First, the client for the target resource to a GET request, the responding of LB with a "401 Unauthorized".

Capture

as part of the "401" response that LB client it says "Negotiate" and "NTLM" accepts for authentication.
Capture

Because the client is my network externally, it can obviously not reach my Active Directory / Kerberos Distribution Center to request a ticket, so that it responds to say he wants to authenticate with NTLM ,

Capture

(This is the same answer is on the header level)

Capture

Now for the clever part. The NetScaler is now a GET request to the backend server send the "NTLM Path" defined and give it wants to use NTLM authentication.

Capture

The back-end server with NTLM responses to challenge that forward to the client. The NetScaler The client responds with his credentials, then back to the server, and if successful, a "0 OK" is sent returned, the NetScaler treats this as a successful login.

Untitled

has now authenticated Our client is successful, but in this example (to make things a little more interesting), is the target resource now requested with Kerberos Constrained Delegation (KCD) be

here are the configuration steps .:

#create backend server FQDN and then create service
Server GARY DC gary-dc.garyslab.net ( gary-dc is my target web server)
Add service Add gary-dc gARY DC HTTP 80

#add Negotiate authentication policies and measures
Add authentication negotiateAction administrator -domain garyslab.net -domainUser administrator -domainUserPasswd 8ad14a780a85 .... cut * * -verschlüsselte -encryptmethod ENCMTHD_3 -NTLMPath "http://192.168.0.1/index.html"
authentication negotiatePolicy Kerberos auth-policy ns_true administrator

you #create kerberos account and session policy for SSO Add
Add aaa kcdAccount KCD -realmStr GARYSLAB.NET -delegatedUser kerberos -kcdPassword 4924 ... * cut * -verschlüsselte -encryptmethod ENCMTHD_3 - user realm GARYSLAB.NET ** Please note that in case of multiple domains, we need to set for each customer Reich a kcdAccount customer domain expire. Alternatively ssoDomain use setting the session policy. **
Add tm session action mysso --SSO ON -ssoDomain garyslab -kcdAccount KCD
Add tm session policy sso_session_pol ns_true mysso

#create AAA vserver
Add authentication vserver aaa_vserver SSL 1.1.1.1 443 -AuthenticationDomain aaa.garyslab.net

#bind the auth and SSO policies
bind-identification vserver aaa_vserver -policy Kerberos auth-policy -priority 100
bind-identification vserver aaa_vserver -policy sso_session_pol -priority 100

#create the lB vServer and tie the AAA vserver
Add lb vserver LB_HTTP HTTP 2.2.2.2 80 -persistenceType NONE -lbMethod ROUNDROBIN -cltTimeout 180 -authn401 oN -authnVsName aaa_vserver

to remember some important points

  • Make sure your services FQDN and not IP
  • Imagine the appropriate SPNs, I put in this laboratory for my LB and for my AAA
  • this is done with the AD "setspn -A host lb.garyslab.net garyslab kerberos "and" setspn -A http lb.garyslab.net garyslab kerberos "to do this for both the FQDN and the LB AAA fqdn, failure to do so unknown error in principle lead to a track. (Garyslab kerberos my delegated user is)

Troubleshooting

this in the device, I ran into two issues that I , appeal as here and hopefully a few days of frustration

Pay close attention to the NTLM path ** must complete FQDN and PATH, ie http: // FQDN / PATH .html * * , I was initially with only the http: // FQDN but this was in a " http / 1.1 Internal server error 43550 " an error has occured resulting

[1945003Zweitens], you should have a SPN for the AAA itself, not only the LB FQDN add. I could see a "principal unknown" error in a track following a failed login attempt.

KCD configuration

Add to requirements of the device for the KCD part of this demonstration, I took the following steps.

Set up your target resource with the correct authentication as follows. IIS

In AD create an account is performed for the actual transfer, in my case I have called this account "kerberos", set the delegation Delegation tab "for delegation to trust that user only to the listed services "and" Use any authentication protocol ". Then add the service you are load balancing, in my case it is my IIS server so that the server I GARY-DC.GARYSLAB.NET with the type as HTTP

Capture

[1945003hinzugefügtSet] to the SPNs for the external FQDN of the LB and the AAA as described above.

Now add on the NetScaler to this newly created account to your "KCD accounts", you can keytab but I find it easier just to define the user. This is the account you will specify in your SSO policy.

kcd

Now you should be all set. ...

Monitoring of Citrix in 3D. is a must for supply of large user experience

5:24 PM Add Comment
Monitoring of Citrix in 3D. is a must for supply of large user experience -

XenApp and XenDesktop are among the most performance-critical technologies used in corporate networks today

Just a minor glitch-anywhere in your infrastructure can result in a poor user experience. The growing number of levels in the Citrix stack and the increased use of virtualization technologies and cloud-based services make all Citrix performance management even more difficult

This webinar .:

"monitoring Citrix in 3D: a must for large user experience:" I discuss why technology companies use Citrix needs to look a monitoring strategy to take over, which is focused on three key dimensions: reach, depth and. Speed ​​

you why learn:

  • each layer to be covered by each stage of the Citrix infrastructure to meet performance monitoring to help identify important and rehabilitate slowdowns - regardless of their origin
  • depth of visibility into the Citrix stack and the other levels to ensure matters of
  • , the speed of problem solving really preventive performance management to ensure user satisfaction decisively is and how it achieved by the automatic analysis, baselining and cause diagnosis

I will also be addressed, such as a comprehensive performance monitoring solution with support for more than routine troubleshooting and problem isolation is to optimize and right size the infrastructure and maximum value for the IT investment of the organization deliver

date :. Wind, April 13, 2016
Time: 14:00 to 3:00 pm EDT

Register now

Chromebook Banner 1

Balancing User Privacy Mobile Security is never easy

4:23 PM Add Comment
Balancing User Privacy Mobile Security is never easy -

both privacy and security is a delicate balancing act, which are becoming more demanding, because more users bring their own devices to the workplace. Each company must define the security and privacy policies and enforce suitable for their businesses.

At Citrix, we XenMobile, the most comprehensive Enterprise Mobility Management (EMM) believe solution, there are companies that take flexibility and control to their security and governance requirements, while obtaining the privacy of users and better user experience.

XenMobile IT provides the flexibility, application-level data with Citrix MDX technology for encryption, FIPS 140 provides validated AES 256-bit encryption. , companies are able to manage their own encryption keys. In addition, Citrix MDX provides 60 privacy policies. With Citrix MDX personal and company data are kept separate with our MAM-first approach. In addition, users are not required to register their device.

Many EMM provider take a different approach and just use the machine-wide encryption and guidelines of the operating system. For example, on iOS, Apple requires that a device code of the device encryption can be set to activate. In this case, the companies have need not the ability to encryption keys and users to manage their devices register.

We recognize that users are concerned, in general, that they might be able to use their personal files to see, so we have introduced educational tools that are designed, to users to allay awareness of alternatives to traditional MDM concerns and increase. It is recommended to divide rolling, IT organizations with their users this information before a BYOD program.

while it is impossible to be completely safe and "100 percent of the users to be privacy concerns justice, we believe that an additional level of security for businesses applications and data by providing, with encryption key, manage the IT itself, companies can better closer to achieving balance between security, privacy and compliance.

Chromebook Banner 1

Mamás en el mundo laboral actual: ¿Cómo lograr un buen Balance

3:22 PM Add Comment
Mamás en el mundo laboral actual: ¿Cómo lograr un buen Balance -

Se acerca el día de la mujer y esta fecha lleva me reflexionar sobre cómo equilibramos nuestra vida personal y profesional ?. Combinar estos dos Mundos es un desafío para Todas las personas. Pero cuando las mujeres tenemos una profesión que ya la vez nos amamos embarcamos en la aventura de ser Mamás, el desafío se vuelve aún mayor.

En nuestra vida personal, ES clave contar con una red de personas que nos entiendan, nos ayuden y apoyen a desarrollarnos profesionalmente ya ser madres. Y en la vida laboral, hay ciertos aspectos que se Vuelven invaluables. pulses Una cultura de trabajo que fomente la flexibilidad y la movilidad empresarial, y la implementación de tecnologías que soporten e estos modelos de trabajo flexible

Trabajando en Citrix me toca vivirlo día a día, la movilidad y la tecnología me ayudan a crecer en mi rol y al mismo estar presente tiempo- de una mejor manera de la vida de mi hija. Pero el aporte más grande de estas herramientas lo percibí el año que me Mude con mi hija a Brasil.

Un idioma distinto, colegio nuevo, nueva casa y hacer nuevas amistades, fueron Solo algunos de los ingredientes de este cambio. Entre otras cosas, la movilidad empresarial me permitió participar de muchas actividades deportivas de mi hija y de la escuela que a la asiste, sin dejar de estar involucrada con lo que el negocio pasaba s. Herramientas de conferencia en Línea, email seguro y contar con acceso a toda mi documentación y datos necesarios para trabajar desde cualquier dispositivo, hicieron posible que pudiera acompañar a mi hija de la adaptación enormous que implica vivir en otro país ya la vez poder trabajar , De hecho, me pasó estar en una reunión en la escuela y que me pidan de urgencia enviar una presentación con los resultados del trimestre; poder hacerlo desde el mismo lugar en el que estaba, de forma rápida y ayuda eficiente muchísimo.

Desde mi experiencia creo que la movilidad empresarial, le devuelve a las personas el control sobre su vida. It la mezcla perfecta entre ser y Productivo eficiente en nuestro trabajo y a la vez que tener la vida personal tener queremos. It tener la tranquilidad de que podremos represents lo mejor de nosotras en los dos ámbitos siendo las profesionales que queremos ser y las Mamás en las que soñamos convertirnos. ¿Cómo viven ustedes la maternidad y el trabajo? ¿Logran un equilibrio entre ambos?

Chromebook Banner 1

Citrix Supportability Pack update soon!

2:21 PM Add Comment
Citrix Supportability Pack update soon! -

A few weeks ago my colleague Mayunk Jain, wrote a blog post about the availability of the new supportability Pack. These are still the early days of Supportability Pack and we are encouraged by the community interest. was published Since Mayunk the post, has the supportability Pack has been downloaded thousands of times and have many customers shared valuable feedback.

In the first phase, our goal is awareness has to improve accessibility, and the use of internal support and troubleshooting tools

Here are some of the things that tell our customers and partners. :

love the idea of ​​a consolidated tool repository. After categorized by product makes it easier to find tools.

Great concept! How to download the idea of ​​tools in one package. Create a similar workflow to search for tools that we use for support.citrix.com site.

I use all these tools to support my Citrix Systems

Give me some tools of the environment for debugging analyze or examine how things work. Keep adding to this collection

The feedback overall community can be summarized:

1. The catalog of tools has the search process for relevant tools simplified.

2. Request for further investments in new tools. A recurring theme is request for an update manager or paths to a Citrix Tools repository.

3. Some proposed sync that we make the initiative in an open community effort in which customers and third parties can also content. This is an interesting idea.

So what's next?

The Supportability Pack was updated a few days ago with a few small changes to eliminate such embedded zip files. Another major update, the number of new tools and an automated way to synchronize with a Citrix tools repository is will cover shortly.

In addition, we look at the tools to improve the categorization and integrate similar improvements in the Citrix Support Web site. Technology, technical support and training teams work closely relevant Synergy sessions and training to expand course that should encourage all usage and knowledge of tools.

Thanks to all that feedback on the support package delivered. If you have not had a chance, but it's not too late to check it, and share your opinion. :-) It is very important for us that we align with our customers and partners needs.

This is just a small insight into what happens behind the scenes. Stay tuned for more details as we roll into Phase 2!

¿Qué puede beneficios otorgar Desktop as a Service a las Empresas de la région?

1:20 PM Add Comment
¿Qué puede beneficios otorgar Desktop as a Service a las Empresas de la région? -

Recientemente compartimos la primera parte de nuestra charla con Cable & Wireless dónde John Maduri, presidente y CEO of C & W analizó la tendencia de infraestructura y como servicio ESCRITORIOS a nivel global. Hoy vamos a continuar profundizando este tema junto con Gabriel Marcus, director of networking, security and mobile workforce Solutions de C & W.

Si quieren conocer cómo los ESCRITORIOS y la infraestructura como servicio pueden brindarle grandes beneficios a las empresas en general ya las Pymes en los particular invitamos a hacer click en el siguiente video. Y, por supuesto, déjennos sus comentarios y dudas para debatir juntos, nos interesa mucho saber qué y cómo piensan ven esta tendencia en sus países.

Synergy Banner

Certified & Specialized: As stand out from the crowd

12:19 PM Add Comment
Certified & Specialized: As stand out from the crowd -

you have thought about it but have not made your move

There is not. Secret that the companies all over the world a lack of certified IT professionals are facing and they are willing to pay for the candidates top dollar, they know their stuff.

This could be

investment in yourself and your business by collecting Citrix credentials in networking, mobility or Virtualization is easier than you think -. And the best ROI? Well, the numbers speak for themselves

For the third consecutive year the Global Knowledge has ranked number Citrix Certified Professional -. Virtualization (CCP-V) among the top 15 highest paid IT for 2016 certifications, is entitled to an average salary starting from $ 102,138.

In addition, the path is paved with incentives : partners who get certified, entitled significantly more to Citrix Advisor Rewards (CAR) are earning and Opportunity Registration . Certification also increases your visibility with inclusion in the Citrix Partner Locator

If the money does not talk, you can visit the walk .: certification holders some tout the highest job satisfaction rate in the profession. Why? Citrix certification builds your personal brand and provides you with the demand of the customers' needs.

And the demand continues to rise rapidly.

Eighty percent of medium-sized enterprises have increased their IT budgets and invest in software tools, security and cloud services as well as new equipment and services. The fact is that they want to grow their businesses. need partners on the value to provide that customers need , and that comes to a simple principle: education.

Teach it- and customers

Educated customers consistently spend more on core services and products. As a certified employee, partner professional or expert, you have to provide the practical skills and experience successful Citrix solutions -. And make a better working relationship for the long haul

A whopping 93% of Citrix Education enrollee she said in the creation of solutions have been effective for their clients. That is the foundation for a successful long-term relationships.

How long does it take?

Unlike competing programs Citrix understands that value of expertise is driven by quantity -Which is why we real world experience for hours appreciate test material issued to memorize. The best way for your Citrix certification preparation is six months on-the-job field experience under your belt before the meeting to have for the exam. We also recognize that people learn differently, so as to bring on new employees and develop capabilities look, training is always available.

For those who are already well-versed in creating solutions for customers, it is only a few avail weekends to get ready. Others have successfully achieved at expert level certification in 18 to 24 months employees. But since we have world-class training, including IT professionals without Citrix experience can visit the recommended training and then get hands-on experience in their home laboratories.

Upping the Ante

What if you or your team already certified in the technology at the highest level, perhaps even get? The answer is simple, you're good at what you do.

How can I be the best are known?

The answer: Specialisation

If you facing competition from other partners who have deeper pockets and more resources could-in your , Market Space, you need a way to beckoning customer - and still remain profitable

The Citrix Specialist badge on your website and marketing materials signals to clients that you are. under the Citrix best of breeding and have done to get the project right the first time, the proven capabilities. to be a Citrix specialist, are even skeptical new customers the confidence to speak to you in the first place and keeps old comes back

earn Certified partners more. Specialists earn the most. On the financial incentives for the certification of specialists get additional upfront and impressive back-end discounts-not to mention access to service centers, priority listing on Partner Locator, and a deeper relationship with internal sales teams.

to leave any money on the table. Learn more about the benefits of our visit Citrix Partner Incentives Desk


Once you have selected your target skills, here's what you need to do next .:

  1. Get your certificate of completion to the free online administration e-learning courses .
  1. Any customers who are satisfied with the work, has they have done. Customers can be found a short Customer validation reaffirm your performance.
  1. Run to submit the internship. This laboratory which represents the largest investment in time and training. , the candidates have to demonstrate competency to implement by a real case, cracking and a solution in a virtual environment.

specialization was the right choice for Patty Paustch president of consulting firm Tech Envision , because it is about was more than just a test or test measured with a box to take it their teams ability to solve real world problems:

Everything they can learn through practical real life are applied. It made her better. I hear that Citrix say "we here for the long haul, we are good customers want." They not only want their chest pounds and say, "Our partner has a hundred certified XYZs

The Bottom Line:. If you are considering multiple employees across multiple technologies certification, the cost for certification and specialization is negligible and is ultimately an investment that Al Taylor, founder of UK-based cloud DNA, says, "paid themselves many times from."

cloud DNA specialization name drew a modest, mid-market companies, which in turn opens up a huge pipeline of visibility to new customers. And if you become a client trusted advisor, they do not go to Google when they want to upgrade. "you pick up the phone "says Taylor," and say: "Al, we think beyond platinum, what do you think?" "

Are we there yet

you may be closer than you think any certifications? the need to specialize. Check the nuts and bolts of requirements and benefits by visiting Citrix and check specialist the current certification status by the skilled Progress Manager tool. Remember: must be the person who takes the practicum in the same technology area certified Learn more at Citrix expertise

explore training, certifications and more by typing http: .. // training .citrix.com.

Stay in touch!

consequences @ CitrixSpecial for the latest news on Citrix specializations.

connecting to the Citrix Partner Network on LinkedIn , Facebook and @CitrixPartners on Twitter for insight, you can use !

Synergy Banner

Public schools Citrix & Shelton: A Solid Gold Success Story

11:18 AM Add Comment
Public schools Citrix & Shelton: A Solid Gold Success Story -

Chromebooks and Google Apps for Education have drastically changed the way as experienced students in recent years

I. had it with my own children experienced firsthand, and in the customer stories we help share every day in the corporate communications team here. I sit here (also known as the kitchen counter) in my home office, I ask my 11-year-old daughter, sitting next to me to write on their school issued Chromebook, if they like to use Google Docs. It is an immediate, enthusiastic response (enthusiasm to girl something Tween ration between eye rolling is, I'm learning):

Oh, yes !! It is sooo awesome. I really like to work, to do it. You can always do not lose the paper homework. And if I forget to actually do the homework, I can still get credit, because the teacher looking at Google and see that done I only forget it, to turn it in. It's easier to do group projects. It is easier for study guide, also because the teachers do not have on hand or recycled paper, and I always know where to find them!

If I knew about art and homework would thus elicit an enthusiastic response, I would long ago there have any questions about my squad the family table!

I think it's almost something like this to hear live from one parent here in Silicon Valley, is expected, but really takes this trend nationwide, and for schools with students from a variety of socio-economic backgrounds.

Shelton Public Schools in West Connecticut is to do the same, and is one of my favorite Citrix customer reports Shelton. begin Citrix technology to virtualize nearly 10 years ago, and today it is to give Chromebooks with students for educational access to Google Apps, just like my children in the Diocese of San Jose use (another Citrix customers). Shopping Chromebooks compared to traditional laptops saves the schools a ton of cash; in fact, in the last ten years, Shelton has saved over two million dollars!

Recently Shelton 0 Chromebook devices for around $ 0 buy than regular laptops compared to that 1000 can cost as much $ each and must be refreshed every five years.

Shelton was to make two years part thanks to the Connecticut State Technology Grants before this election. But it was more than that. When Dan DiVito, director of IT in Shelton, the reason why they were so comfortable shopping so many Chromebooks at once was "because we knew teacher said the umbrella of Citrix she had comfortably to make. " awarded The state recently Shelton another $ 108,000 as part of its Common Core / Technology Grant that DiVito use more Chromebooks and Chrome to buy next year.

in this district, the children used from a wide range of social origin, decisions like this, has to take this technology to give the pitch every student prepared the same access. By virtualizing Citrix XenApp on Chromebooks, children to use at all schools able to the same programs as Google Apps for Education and the latest Windows-based applications.

Shelton has also extended this to the classroom. Through the support of Google Chromebox computer, the mount in the classrooms on the back of a monitor and sell for less than $ 0 for a fraction of the almost $ 500 per unit would have to spend on desktop computers in the classroom learning centers-Shelton makes learning easier not get for the younger students who take the Chromebooks home.

and teachers benefit. Teachers are now working together to be able to create the curricula without coordination locally with meetings or expensive laptops are output, resulting in a savings of over $ 150,000 laptop costs. Since teachers are no longer required to stay on site, curricula-a work activity that requires bringing in substitute teachers and, as a consequence, result in substantial cost-circle nearly 50,000 $ savings per year in overheads.

, the list of benefits go on and on to the students who are the main target group, to the teachers, but also for the school district and the public who fund the schools.

save money while better serve students is a win-win, as employees of Citrix, I know our Technical Department, is made possible. And when parents see the smile on the face of my daughter when she talks homework?!?! - Now that is worth its weight in gold

Synergy Banner

XenServer Security & Performance with SMAP and PML on Intel® Xeon®

10:17 PM Add Comment
XenServer Security & Performance with SMAP and PML on Intel® Xeon® -

Intel Xeon processor E5-20 product family v4 has arrived, and are among its many advantages there are two features that I want to highlight; SMAP and PML-support.

I have not previously blogged about this, but with the introduction of the new Xeon E5 processors, this is the ideal time to highlight what the Citrix XenServer team is working on.

So what's SMAP, and why should I be interested?

SMAP or Supervisor Mode Access prevention, a new CPU capability in, life is much more difficult for hackers introduced specifically wannabe looking to take advantage of software bugs. An example where this might help is, with para-virtualized guest VMs running on Xen hypervisor based, like XenServer. Learn about Xen on XenProject.org. Hypothetically, if there is an error in Xen were allowing para-virtualized guest a Xen memory on the guest to change pointer space, then this could lead to a possible situation in which the guest VM could exploit the error and control of Xen.

What makes SMAP does hardware is against this class of attack provide control to ensure that Xen memory can not access controlled by a PV guest, except in cases where such access is required for some functions , In these cases, the logic is for authorized access added SMAP temporarily disable.

Citrix and Intel always have established close cooperative working relationship and for Xen support SMAP, has had, this is no exception. Intel added to the SMAP code for XenProject, now a part of Xen 4.6, XenServer has included in the latest Technical Preview (TP3) release.

Citrix technology and an analysis carried out potentially vulnerable hyper calls to identify their results have to mark such a vulnerability. In this case, not really put exploited a Hypercall proven, but the validity of the use of SMAP support is certainly marked with Xen, and as such, SMAP will be enabled by default in the XenServer. next release, to protect against precisely this type of attack.

in the above example, the vulnerability Hypercall is limited in question in the access to Dom0, so that could be used by an unprivileged guest domain is not, and how it happens, the SMAP breach has been fixed.

PML and its influence on events like XenMotion

During the live migration of a guest VM from one host to another, Xen has to copy all the memory contents of the VM on the source host, while is performed. Of course, while the VM is still running, the use, it will continue to write to memory pages. How XenServer treats this is to track the pages that have been copied, so we can easily determine whether the VM wrote them, and if need be, its flag to be as "dirty". These memory pages would then in the next live migration stage (all the XenMotion implementation obviously for the administrator) are copied to the destination host again.

PML or change a page logging is a new CPU capability that reduces runtime overhead of dirty guest pages to follow. reaches of PML, which, rather than doing the dirty pages in hardware tracking in the software by the Xen hypervisor. The actual time taken in the final phase of the migration, if the VM is stopped for the final copy of memory to ensure that there can be no further dirty side remains unaffected, however, means this function that guest VMs are reaction during to reduce XenMotion memory copy operation and the load on the host.

more on PML To know, check out this Intel whitepaper.

In summary ...

XenServer is the first hypervisor platform SMAP to use integration with Intel Xeon ® processor E5-20 v4 product family, help this vulnerability class to be removed from an area of ​​interest. Likewise PML simplifies our code base, while also improving the overall system performance.

integration of Intel CPU features like these show how Citrix closely with Intel continue to collaborate to solve real world problems, while ensuring XenServer able to use the latest hardware-embedded technology

If you know are more about other activities between the Citrix XenServer team and Intel interested, then please follow links Checkout .:

  • XenServer Tech. Preview features Intel GVT g virtualized graphics
  • Foundational Security with Intel® TXT and Citrix XenServer
  • Citrix and Intel solutions for improved graphics and secure OpenStack Clouds at IDF 2015

Embrace_Win10_Migration_728x0 banner

iOS vulnerability and Siri has not a bad result have

9:16 PM Add Comment
iOS vulnerability and Siri has not a bad result have -

While Siri can be an extremely useful tool, discovered a recent vulnerability in iOS 9.3.1, which can be used by Siri has for users and IT security concerns.

Enter particular by Siri voice commands, an unauthorized user contacts and photos on your iOS 9.3.1 device without a password, access to unlock the phone.

Siri iOS9 XenMobile Security

data loss is reduced and the user's privacy is maintained with XenMobile.

to protect user satisfaction and productivity at balancing corporate data with popular applications such as Siri, is the essence of what XenMobile supplies. XenMobile provides important safety features to corporate data with both MDM and MAM protect policy.

For MDM environments XenMobile supports a policy that there is an opportunity to turn from Siri, which would prevent the vulnerability to be exploited.

For MAM environments XenMobile supports a policy that blocks access to any application-level dictation service. These include Siri and other applications, can use the functions of the speech recognition.

If an exploit occurred, company contacts, photos and all data encrypted with XenMobile MAM and Citrix MDX, would not be affected by an additional layer of application security. It is analogous to the two castles many of us have on our own doorstep.

XenMobile MAM other significant advantages as well. For example, unlike most other Enterprise Mobility Management (EMM) solutions, XenMobile MAM only approach does not require the device in MDM enrollment or a device code use. This is incredibly useful for managing devices BYO.

XenMobile industry leading MAM technology supports over 50 different security policies such as the ability to prevent cutting and by inserting data, including photos and contacts in XenMobile secure container between applications. While other EMM vendors claim they can do the same, many require the use of a device code.

In order to prevent more learn about XenMobile safety and to protect your business against security threats, such as Siri vulnerability, you should read our XenMobile Security Whitepaper.

Embrace_Win10_Migration_728x0 banner

Customer loyalty through meaningful innovation deserve

8:15 PM Add Comment
Customer loyalty through meaningful innovation deserve -
This is the second installment of the new series "Real Talk with Bill Burley."

My last blog post focused on the Citrix approach to innovation, and why it is important, with our Citrix Secure Browser, as an example of a broad-based innovation that can transform as the IT software provides. But that is just the tip of our iceberg Innovations.

looking to customers Listening deeper means, in every industry we serve, and ask, "What are your people try to do"

Then we wonder what we can do to make their workday more productive and meaningful.

Fix a customer problem or to make their life easier, and chances are, you set a problem other face. This value is to attract new customers and repeat lead the company. Which is why #EveryoneUsesCitrix.

For example, the top 10 healthcare companies based in the United States on Citrix. Why? Not surprisingly, doctors, nurses and other healthcare professionals choose their careers to help others to treat sickness, accelerate recovery times and improve the overall quality of life of their patients.

To achieve this, doctors, nurses and other professionals need fast and secure access to electronic medical records, computer peripherals such as scanners and patient monitors and specialized medical applications. However, the more time they deal with the technology, the less time they have to care for the patient.

Therefore Citrix functions specifically designed for hospitals, clinics and other patient care scenarios such as instant notification with anonymous login, session prelaunch / linger and quick-connect APIs. All these features provide doctors, nurses and other caregivers with instant access to the information and tools they need as they move from patient to patient.

With Citrix, they can focus on healing and life-threatening emergencies to deal effectively concern, not about the technology.

Our products also Dictation and support the voice recognition software for the same reason, can support these dedicated people focus on what matters ... their patients is important.

this customer -driven innovation to deliver real value to companies in the healthcare industry that you do not find in any of our competitor's products.

What about other sectors and markets? Let us an example in the public sector have a look.

Exelon Corporation, a leading US utility, needed a way to ensure maintenance and management processes within power generation plants. Citrix XenMobile digitize a platform by Worx Home offered an electronic work package that covers the entire maintenance process to create schematics and maintenance checklists. With this new method, the plant will employee has access to all documentation and applications they need on an iPad, dramatically simplify their work, speed to reduce processes and costs.

Once the system was Exelon implementation and adoption of the IT organization and developers, new applications could create to further safety at work as to improve an app for reader that they homes where aggressive dogs are keep employees safer as they make their rounds.

warned

that is customer-centric innovation, dramatically improve efficiency in the company and make a real difference in the day-to-day lives of workers.

and we get better and faster tight on them, through product development processes and accelerate the frequency of release cycles.

In fact, last summer, a financial services customer due to new regulatory requirements of the Hong Kong Monetary Authority was concerned that prison broken iPhones were to be a security risk. They asked us if we could detect and then automatically blocks access to all sensitive applications or data on prison-broken iPhones -. Without the need for MDM

Within a few weeks after the first application that we developed that the function for detecting and related access restrictions and gave it with our next release. Not only do we. A happy customer, but we are seeing a high demand for this function in the financial services industry, where CIOs and CSOs are looking for better ways to protect sensitive customer and financial information

Some years ago, a request like that would taken months to develop and bring to market. Today Citrix can deliver on this speed, far other technology providers outpacing our industry.

that innovation is what counts.

091715_CTX_Healthcare_Mobility_728x0s-f

Receiver Internals: New Mobile Experience with Receiver for HTML5 2.0

7:14 PM Add Comment
Receiver Internals: New Mobile Experience with Receiver for HTML5 2.0 -

The new receiver for HTML5 2.0 improves support for browser on touch-enabled devices. This makes receiver for HTML5 as a viable option for mobile and tablet.

You can now access the remote desktop app with full touch support that includes gestures, multi-touch access and soft keyboard. It can support on the iPad / iPhone or MS-Edge Windows 10 mobile Chrome browser on Android, Safari be

Here is a quick summary of the various single and multi-finger gestures .:

Gesture Description
Single touch Corresponds left mouse button
touch Match right
Pinch and Zoom a finger Zoom in and out of the session
scroll - to scroll when the session in a normal state

Two fingers is - scroll when the session or normal state in zooming is

Drag Drag any application in the session
Two finger Tap Activate / deactivate the mouse
Three finger Tap to activate / hide the soft keyboard

here you can 'tap two fingers' more about the gesture speak what is used for the mouse pointer on / off.

When the mouse pointer on you seen a mouse cursor. This will help you perform operations such as left click, right click or drag using the aforementioned gestures. This is very convenient, where the gestures with your fingers can not be comfortable. You can refer to the example below in the screenshot.

Example for Mouse pointer

Now talk about multi-touch mode can.

multi-touch mode remote controls all the gestures on the virtual desktop and application will proceed to the gesture is ever supported.

, the image is in multi-touch mode v / s pan mode

[1945003gezoomt] multitouch_panning_example

switch to multi-touch mode : By default, would the meeting in panning mode, where all gestures are created on the desktop. You can choose between multi-touch mode switch and swivel mode button in the toolbar.

to switch multi-touch mode

multitouch_mode_toolbar

to switch to the panning mode

panning_mode_toolbar

Multi-touch of Win 8.1 / Win 2K12R2 is further supported on the Windows operating system. If the function on the host is not available, then the button on the toolbar to switch between multi-touch / mode swing is not displayed.

So far we have seen the various gestures and multi-touch functionality. The next thing that might be on your mind, to give as keyboard input to the virtual app and desktop session.

Here are the options that you bring up soft keyboard, can use at the meeting.

1) Keyboard button in the toolbar: to select a button in toolbar with keyboard icon locate / Hide the soft keyboard. Once the keyboard is displayed, you can move the session and click to send in a drawing area keys. The same button can be used to hide the keyboard

touch_toolbar

2) Three finger tap .: Three finger tap is similar to the keyboard button in the toolbar, as mentioned above, which shows / hides the soft keyboard

keyboard_popup

3) auto-keyboard: popup. A floating keyboard icon appears on knocking at the meeting any box. Clicking on the floating icon shows the soft keyboard.

autokeyboard

admins must enable the policy with Citrix studio on DDC to get the auto-keyboard popup functionality with the following steps.

1) Open Citrix studio on DDC.

2) Click on Policies.

3) Click on Create directive.

4) for the automatic keyboard display search and select the allowed radio option.

studio_policy

Once the Directive on the DDC is activated, the user can select / show car keyboard floating button hide real time the settings option in the toolbar. The selected option is remembered and started at the other sessions of the same browser.

preferences

Now that all mobility functions are covered, let us see how we can work on better equipment of small form factors

display Resolution :. on the market, the different form factors of devices Considering the session. The screen size of the device, the time may not fit all used mainly in equipment of small form factors An option is provided in the toolbar, which can change users, the resolution of the meeting in real time. "Auto Fit Screen" to be the default option and if another option is selected, then it would be remembered and on the other sessions (app / desktop) from the same browser starts.

[1945003HieristeinekurzeErklärungderverschiedenenAuflösungsoptionenzurVerfügunggestellt] .

would be adjusted multiplied [wouldbeset [1945013willbe]
option Description
auto Fit screen session size with the device screen size.
device pixels Use ratio Session size would device screen size with device pixel ratio
1280 * 800 pixels session size to 1280 * 800 pixels
1440 * 00 pixels session size would to 1440 * 00 pixels
10 * 10 adjusted pixels session size would be set to 10 * 10 pixels

so far it looks like a fine experience on mobile / tablet platforms. But what if you hybrid devices such as laptops with touch screen? You can still use the touch features, but use with some restrictions. For example, explains the soft keyboard options previously only work if the device is in tablet mode. Otherwise input given via the keyboard of the device

For more details on other limitations per browser in such a hybrid device .:

Google Chrome

  • in tablet mode, can soft keyboard, accessed from the keyboard button in the toolbar, and the floating car keyboard button.

Mozilla Firefox

  • the touch capability is not supported in Firefox browser of hybrid devices.

MS border

  • Before any application or desktop session on the Edge Browse start, the touch events should be activated. By opening " about: flags' in new tab and change the touch event flag

    enable_touch_events

  • In tablet mode, the soft keyboard. at the hearing on Edge browser popup. the remedy is to any other web page, and call to navigate the soft keyboard. Then go to the meeting and use the button in the toolbar / floating car keyboard button call soft keyboard.
  • When the soft keyboard is on closed " X " follow button and then the previous step display the soft keyboard.

Windows 10 Continuum support

receiver for HTML5 sessions with some recommendations launched with MS Edge Continuum are set. The Continuum device here is a Windows 10-phone and a Dock. When you start the receiver of the mobile, and dock it then you can use connected to extended monitor with keyboard / mouse there. In case the session from extended monitor and you want to change mobile, is proposed to restart the session from the mobile phone.

Continuum_usage

move to the new receiver for HTML5 from your touch devices. Please tell us your opinion.

Citrix Mobilize Windows Banner 1_728x0-061715