Creating a “drop box” for Collecting Workstation Information…

2017-07-27T00:01:07+00:00 May 23rd, 2012|Uncategorized|

If you manage workstations in an enterprise, you know that administrators occasionally need to create a centralized repository where scripts and programs can write output/results.  Sometimes these scripts utilize a user credential, sometimes not; either way, users mustn’t see the contents.

To create such a hidden “drop box” type of folder (notice the lower-case “d”; I don’t mean to refer to a well-known trademark in any way) on a Windows server — where all users and/or computers in a domain may create folders and/or drop a files in that folder but never see what is in the folder(s) — you typically would create either a hidden folder on an existing share, or create a “hidden” share for the hidden folder.

To do so, create one of the following:

Option 1: Folder, on an existing share
If you intend to create a folder on an existing Windows share for the purpose of creating the “drop box”, do this:
a.) Create the folder (we chose “UserFileArchive” to avoid spaces for scripting)
b.) Right-click the folder, choose Properties, and the Security tab.
c.) Click Advanced, and the Change Permissions button.
d.) Un-check the Include Inheritable permissions box, and click the “Add” button at the prompt
e.) Remove any “Users” permissions, if found.
f.) Click the Add… button, and type in “Authenticated Users”, and click OK.
g1.) If the users must be able to create folders (as well as files) and drop files in them, set the following items:
  Apply onto: This folder, subfolder, and files
  Permissions: Create Files – Allow
  Permissions: Create Folders – Allow
g2.) If the users only need to drop files in the root folder, set the following items:
  Apply to: This folder only
  Permissions: Create Files – Allow
h.) Click OK, OK, OK, and OK.

Option 2: Shared Folder
If you intend to create a Shared Folder on a Windows server for the purpose of creating the “drop box”, do this:
a.) Create the folder (we chose “UserFileArchive” to avoid spaces for scripting)
b.) Right-click the folder, choose Properties, Sharing, and the Advanced Sharing button.
c.) Check the Share this folder box, name the share with a dollar-sign at the end (in our example, UserFileArchive$)
d.) Click the Permissions button, highlight/remove “Everyone”.
e.) Click the Add button, and type in “Authenticated Users”, and click OK.
f.) Set the permissions; typically, there’s nothing wrong with giving “Full Control”, but at least set “Change” and “Read”.
g.) Click OK, and click on the Security tab.
h.) Continue with step “c.” in Option 1 above.

After having created the above folder and settings, you may now copy files (or folders) into the hidden location using the “copy” command (or scripts), specifying the full destination path.  Of course, you can’t browse there to see it with a regular user permission to see the results, but that is as intended. 

If you wish, you can now create an additional permission for a user or group that may need to read the results (other than the Administrators), but you are well on your way to collecting system results across the network.

Go to it!

 

 

 

Application Virtualization – The UAC Panacea?

2017-07-27T00:01:08+00:00 January 18th, 2012|Uncategorized|

…with contributions from Aaron Gierak, Voltaire Toledo, and Jeremy Pavlov.

The User Account Control (UAC) Challenge

It is commonly known that in XP you have to give end users Administrator privileges in order to do even the most simple routine tasks; like changing the system clock, plugging in a USB drive, running a defrag, updating software, or even running security products.  Of course you can use the RunAs command, but that still requires having an Administrator password – which defeats the security purpose of a limited user account.  And just when we thought moving to Windows 7 would eliminate this security privilege nightmare, enter UAC…

User Account Control (UAC) is a technology aimed to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation.  In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system.  In other words, a user account may have Administrator privileges assigned to it, but the applications that the user runs do not inherit those privileges unless they are approved beforehand, or the user explicitly authorizes it.

It is possible to turn off UAC while installing software, and re-enable it at a later time.  However, this is not recommended since File & Registry Virtualization is only active when UAC is turned on – and if UAC is switched off, user settings and configuration files may be installed to an unintended location (i.e. a system directory rather than a user-specific directory).  Also Internet Explorer 7’s “Protected Mode” – whereby the browser runs in a sandbox with lower privileges than the standard user – relies on UAC; and will not function if UAC is disabled.

The Application Virtualization Question

So is application virtualization the solution?  If a virtualized package runs at the kernel level, does it eliminate having to give an XP user Administrator rights?  When you repackage an application that you have been running in XP – in order to port to Win7 – does the app skate by UAC in a way that allows you to keep UAC turned on?

By default, UAC virtualizes requests for protected resources to provide compatibility with applications not developed for UAC.  This is important because many applications written for Windows XP and earlier operating systems assume that the user has administrative privileges and attempt to write to protected resources such as the Program Files or System folders.  The first time an application makes a change to a virtualized resource, Windows copies the folder or registry key to the location within the user’s profile.  Then, the change is made to the user’s copy of that resource.  UAC virtualization is designed to allow already-installed applications to run successfully with standard user privileges, even if they store temporary files or logs in a protected folder.

Installs, Upgrades, and Updates

Many of the problems with UAC come from application installs or upgrades/updates where a new driver or an action that requires UAC acceptance is needed.  With application virtualization – especially a tool like Symantec’s Workspace Streaming where you package from the kernel level – you can bundle the drivers *inside* the virtual app.  As a result, nothing would ever be required of the end-user since nothing is ever “installed”. 

Secondary Executions

However, another issue that bumps against UAC is what we commonly call the “Secondary Execution Event”, where a loaded executable decides to make a call on its own (outside of the one that the app designer intended).  For instance, if a permitted/intended executable launched, and then it calls out to the manufacturer for an updated version, or the latest driver, that is not pre-bundled in the package.  Examples of this are the Juniper VPN agent or the MS Security Center executable.

Panacea or Pariah?

The good news is that application virtualization absolutely does address UAC and elevation features by isolating areas that normally prevent non-elevated users from writing to them by creating a virtual HKLM registry hive, Windows and Program Files.  Virtualizing applications also mitigates potential conflicts in a shared session environment like Remote Desktop Servers or XenApp.

However, is application virtualization the silver bullet to fix all elevation and UAC issues?  The answer is “it depends”.  If the application explicitly requires elevated privileges within its manifest, then it will always present a UAC prompt.  In addition, if the application attempts to make a system change like a driver installation or some kind of self-updating feature, it will force Windows 7 to prompt you for elevation.  These challenges can be further addressed with tools such as AppSense Application Manager, or Viewfinity Privilege Management (which elevate a user’s privilege on a per-executable basis), or SystemGuard (which can elevate privileges to write to the registry).

The bottom line is that application virtualization brings many advantages.  In addition to extending the life of legacy applications, reducing deployment costs, and reducing user downtime caused by install/uninstall issues and application conflicts, many UAC issues can be mitigated with application virtualization, especially when coupled with effective use of user virtualization tools.

 

Next installment – Application Streaming…

 

Citrix XenApp 6 Sets New Standard in On-Demand App Delivery for Physical and Virtual Desktops

2017-07-27T00:01:09+00:00 September 10th, 2010|Uncategorized|

citrix_logoCitrix Systems, Inc. announced Citrix® XenApp™ 6, the de facto standard for centralizing applications in the datacenter and delivering them as an on-demand service to both physical and virtual desktops. XenApp 6 offers major new enhancements that simplify computing for IT, including easier central management, enhanced enterprise scalability and seamless integration with Microsoft technologies like App-V and Windows Server 2008 R2. XenApp 6 also improves productivity for end users with extensive new high-definition HDX™ technology enhancements and simplified self-service access to apps from any device, including PCs, Macs, laptops and smart phones.

The new enhancements to XenApp 6 will also be available as an integrated feature of the company’s comprehensive desktop virtualization solution, Citrix XenDesktop™ 4. Mainstream adoption of desktop virtualization requires a proven, scalable solution with the ability to deliver any type of virtual desktop to any user on any device, and to be able to interchange delivery technologies at any time. With more than half the ROI of virtual desktops coming from centralized app management, this integration provides an unparalleled advantage over any other desktop virtualization solution on the market today. This powerful combination makes it easy for customers to deliver apps as an on-demand service to any user, on any device, across a broad range of both physical and virtual desktops.


Bill Burley, Group Vice President and General Manager, XenApp Product Group at Citrix

“Citrix XenApp 6 delivers an entirely new level of IT simplification and user experience that goes beyond anything we’ve ever done with XenApp. The new simplified management capabilities and increased scalability reduce the cost of application management by up to 50 percent for both physical and virtual desktop environments. Combined with Citrix Dazzle, the self-service enterprise app store, and broad new support for Macs, laptops and smart phones with Citrix Receiver, customers can now deliver apps as an on-demand service to any user in any location at a fraction of the cost of traditional application management.”

Garth Fort, General Manager of System Center Marketing, Server and Tools Business at Microsoft Corp.  

“With support for Windows Server 2008 R2 in XenApp 6 and new integration with Citrix XenApp and Microsoft App-V, we are providing increasing value to our customers and delivering a simplified yet powerful application delivery infrastructure. Customers can leverage their existing investment in Microsoft solutions while continuing to expand their ability to deliver applications on-demand.”

Key Facts and Highlights:

  • Simplified Management – XenApp 6 dramatically simplifies desktop computing with AppCenter™, a powerful new management console that makes it easy for IT to centrally manage all applications enterprise-wide from a single location.
  • Unparalleled Scalability – XenApp 6 has been verified to scale up to more than 100,000 concurrent users in a single farm, giving customers unprecedented levels of cost savings and datacenter efficiency.
  • Expanded Microsoft Integration – Seamless integration between XenApp 6 and Microsoft App-V makes it easy for customers to centrally manage applications using whatever mix of local and hosted solutions best fit their unique requirements. XenApp 6 also includes full support for Microsoft Windows Server 2008 R2, adding a broad range of platform enhancements including simplified provisioning, easier automation, and more efficient power consumption.
  • Self-Service Apps – Through its integration with Citrix Dazzle™, XenApp 6 gives users an entirely new level of flexibility and mobility, allowing them to choose the apps they need on-demand, without costly manual IT support. Apps available to users through the Dazzle “storefront” can include those delivered by XenApp or Microsoft App-V, as well as IT supported SaaS or web applications.
  • Mac and Smart Phone Support – In addition to supporting PCs, thin clients and laptops, XenApp 6 now makes it easy for users to access Windows apps from Macs and popular smart phones such as Apple iPhone, Google Android and Windows Mobile.
  • Enhanced High-Definition HDX™ Technology – XenApp 6 includes broad new HDX technology enhancements that allow customers to deliver real-time media applications like voice and CD-quality audio with a rich, high-definition user experience. New HDX enhancements in XenApp 6 also expand support for a broad range of USB devices, including webcams, microphones, digital cameras and scanners.

Video: Highlights of XenApp 6
Pricing and Availability:

The new XenApp 6 release will be available for download beginning on March 24, 2010, and will be offered as a free upgrade to all XenApp customers with current Subscription Advantage agreements. Suggested list pricing for new licenses of XenApp 6 will begin at $350 per concurrent user. More information on the new features in XenApp 6 can be found at http://www.citrix.com/xenapp6.

XenApp 6 will also be included as an integrated feature of the company’s broader XenDesktop 4 product line, which is available to customers at a suggested list price beginning at $225 per-user or per-device.

Related Announcements:

Follow us online:

About Citrix
Citrix Systems, Inc. (NASDAQ:CTXS) is a leading provider of virtualization, networking and cloud computing solutions for more than 230,000 organizations worldwide. Its Citrix Delivery Center™, Citrix Cloud Center™ (C3) and Citrix Online product families radically simplify computing for millions of users, delivering desktops and applications as an on-demand service to any user, in any location on any device. Citrix customers include the world’s largest Internet companies, 99 percent of Fortune Global 500 enterprises, and hundreds of thousands of small businesses and prosumers worldwide. Citrix partners with over 10,000 companies worldwide in more than 100 countries. Founded in 1989, annual revenue in 2009 was $1.61 billion.

For Citrix Investors
This release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 21E of the Securities Exchange Act of 1934.  The forward-looking statements in this release do not constitute guarantees of future performance.  Those statements involve a number of factors that could cause actual results to differ materially, including risks associated with revenue growth and recognition of revenue, products, their development and distribution, product demand and pipeline, economic and competitive factors, the Company’s key strategic relationships, acquisition and related integration risks as well as other risks detailed in the Company’s filings with the Securities and Exchange Commission. Citrix assumes no obligation to update any forward-looking information contained in this press release or with respect to the announcements described herein.

The development, release and timing of any features or functionality described for our products remains at our sole discretion and is subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.

Source: Citrix

Deliver Desktops as a Managed Service with VMware

2017-07-27T00:01:11+00:00 June 9th, 2010|Uncategorized|

Streamline Desktop Management and Deployment

Instantly provision desktops to local and remote users from the datacenter with VMware View. Standardize desktop deployments by creating images of approved desktops, then automatically provision as many as you need. Easily manage groups of users from a single desktop image. Delivering desktops as a managed service with VMware View typically lets you reduce your overall desktops costs by 50% by centralizing management and resources and removing IT infrastructure from remote offices.

Improve User Satisfaction

Provide a superior end-user desktop experience over any network, with VMware View with PCoIP, a high performance display protocol. Virtual desktop users can instantly access their personalized desktops, including data, applications and settings, from anywhere, without suffering the lag times of earlier technologies. Play rich media content, use multiple monitor configurations and seamlessly access attached peripherals.

Standardize Your Virtualization Platform

Enjoy a unified management experience through VMware View’s integration with VMware vSphere, the only virtualization platform tuned and optimized for desktops. Dynamically load balance virtual desktop machines to optimize computing resources. Power on thousands of desktops at once, without any performance degradation. Bring the power of the datacenter to the desktop and use a common platform to manage both servers and desktops from the datacenter to the cloud.

Easily Deliver Desktops to Remote Users

Deliver cost-effective virtual desktops and applications securely to call centers, government agencies, healthcare providers, branch campuses or offshore facilities. Give partner organizations and independent service providers temporary access to corporate desktops through a secure network connection. Perform maintenance and troubleshoot user issues without engaging in expensive on-site visits or maintaining remote IT staff and infrastructure. Deliver a high performance desktop experience to users—wherever they are.

Deliver Built-in Business Continuity for the Desktop

Meet work-from-home mandates in the event of quarantine or natural disaster with an emergency preparedness policy and VMware View 4, the only desktop virtualization solution that provides built-in business continuity and disaster recovery for the desktop at no additional cost.

Provide high availability for your desktops within your virtualized environment without the cost or complexity of traditional clustering solutions and back them up nightly in the datacenter as a business process. VMware View with VMware vSphere for Desktops lets you extend enterprise features such as VMotion, High Availability and Distributed Resources Scheduler to the desktop, ensuring an “always on” desktop. With VMware View you can:

  • Let your desktops take advantage of key features in the vSphere platform such as VMotion, High Availability, Dynamic Resource Scheduler and Consolidated Backup.
  • Access virtual desktop from a wide variety of devices over any network connection to ensure business continuity.
  • Quickly provision virtual desktops to remote users or groups of users in the event of a pandemic or catastrophic event when it is difficult for workers to access the office.
  • Keep desktops running even when server hardware goes down with automated failover and recovery.
  • Shift desktop computing resources automatically as user needs and application loads change with dynamic load balancing.
  • Give remote users a high performance desktop experience with VMware View with PCoIP while protecting access to sensitive data.

Ensure Security with Centralized Control and Management

Protect your organization’s information assets and ensure compliance with industry and government regulations such as HIPAA, SOX, government mandates on settings for PCs and more with desktop virtualization. VMware desktop virtualization solutions enable enterprises to secure data, centralize control of desktops and software access and maintain compliance without sacrificing end user needs.

Ensure Corporate Security Compliance with End User Restricted Entitlements

Ensure appropriate access for end users with specified credentials by restricting access to desktops based on the authentication method. For some business environments, this may mean, for example, you can allow access only to users who have authenticated with a smart card. VMware desktop virtualization solutions are modular by design, enabling integration with 3rd party software to allow for further extension of security requirements.

Maintain Locked-down Desktops without Restricting Application Access

VMware virtualized applications run entirely in user mode and can be deployed to fully locked down desktops. No administrative rights are needed to execute these virtualized applications. Additionally, applications can be encapsulated in a fully encrypted file for deployment. IT staff can be assured security compliance needs are met while enabling end users to easily and safely access business critical applications.

Manage and Track Software Application Usage & Deployment

Monitor software license usage and ensure compliance with vendors without imposing new process or enforcement tools. VMware desktop virtualization solutions provide out-of-the-box integrations with existing policy-based usage mechanisms such as Active Directory and LDAP. VMware View seamlessly plugs into existing management frameworks for discovery of software assets and systems, so you can use your existing monitoring and distribution tools to maintain single-pane-of-glass control of software license compliance.

Decouple hardware, applications and operating systems to eliminate compatibility issues during OS migrations and upgrades. Get the benefits of newer platforms without paying heavy support costs to test and troubleshoot integration issues. Run a single image of a new operating system across a variety of hardware types. Encapsulate older applications and even run multiple versions of the same application side by side.

Source: VMware

Cloud Computing with Wyse

2017-07-27T00:01:11+00:00 June 8th, 2010|Uncategorized|

Cloud Computing involves using information technology as a service over the network.

  • Services with an API accessible over the Internet
  • Using compute and storage resources as a service
  • Built on the notion of efficiency above all
  • Using your own datacenter servers, or renting someone else’s in granular increments, or a combination

We at Wyse believe cloud computing has the potential to change how we invent, develop, deploy, scale, update, maintain, and pay for applications and the infrastructure on which they run.

Cloud Computing Benefits

Efficiency

Drives cost out of the delivery of services, eliminating capital expense in favor of more easily managed operating expense

Agility

Increases speed and agility in deploying services, adapting to seasonal or cyclical computing needs

Speed

Shortens implementation cycle time

Flexibility

With application deployment decoupled from server deployment, applications can be deployed and scaled rapidly, without having to procure physical servers

Ubiquity

Applications can be made available anywhere, any time

Cost avoidance

Minimizes the risk of deploying physical infrastructure, lowering the cost of entry, thin devices enable Green IT

Accelerated innovation

Reduces run time and response time, increasing the pace of innovation

Users

Task Workers

Call Centers addressing the trend to move employees off campus and into home
Challenge: PCs are virus prone, difficult to manage, and at risk of data being exposed or devices being stolen. Tried terminal services and dissatisfied with user experience
Require flexible seating, reduction in energy, and simplified management and deployment

Financial Services

Branch systems with varying classes of users across broad geographies attracted to client vitalization for security and compliance.
Challenges: VDI pilots proving difficult to scale, user experience across branch system is inconsistent, require higher levels of user functionality for banking peripherals.

Healthcare

Hospitals addressing the need for EMR and access to common databases and information
Challenge: Healthcare environment, ease of secure access to up to date EMR, access for field professionals. Risk of theft of traditional PC devices, and the liability of data loss and exposure, universal access throughout the primary and satellite facilities

Education

Schools need to provide common IT functionality to faculty, staff and students
Challenge: shrinking budgets, limited IT administrative support, ageing computing devices, providing lesson and status access to parents, teachers and students from home

Engineering

Technology companies needing to provide secure, access devices to on shore, off shore, and outsourced engineers and developers.
Challenge: Requirements to deliver productivity applications while addressing performance demands of engineers and developers

Simple EndPoint Benefits

Security/Privacy

No HDD prevents data from being stored on the client, improving data security. All data stays on the server / cloud, enhancing privacy enforcement. Devices can be virus proof, removing a security concern for the endpoint component of the environment.

Compliance

HIPPA in Healthcare, Basil-II in banking, and Sarbanes Oxley regulations all require data to be protected and centralized. Thin endpoints enforce this requirement, easing compliance.

Manageability

Lowest TCO is accomplished when all endpoints appear similarly to the server. TCs, TPCs, and Thin mobile devices (handheld and notebook size) are all centrally managed, and look the same to servers. Like the Southwest Airlines strategy – all 737-300s – easier to manage.

Reliability

Thin clients are far simpler in design than traditional PCs, and deliver far greater reliability. Measured in terms of MTBF (Mean time between failure), PCs offer 30 – 40K hours, but TCs deliver far better ratings at 80 – 375K hours.

Rapid Deployment

No imaging requirements on most thin devices make TCs deployable in minutes, not hours as with most PCs. TCs go from carton to desktop to productivity in minutes. No software to load, little configuration needed.

Power, Noise, Cooling

TCs use a fraction (less than 10 percent) of the energy needed by traditional PCs. No fans or moving parts in TCs eliminate noise, and reduce AC requirements in the work areas.

Pano Express Combines VMware vSphere™ Essentials, Windows 7 Operating System, Server and Storage Pre-Configured with Pano Logic’s Zero Client Platform

2017-07-27T00:01:11+00:00 June 8th, 2010|Uncategorized|

Pano Logic, the leader in zero client desktop virtualization, today announced Pano Express, the only all-in-one zero client, hypervisor, operating system, server and storage solution available. Pano Express drastically reduces the capital costs (CAPEX) and complexity of implementing a complete desktop virtualization solution by providing a pre-loaded, pre-configured 50-user suite combining VMware vSphere™ Essentials, Microsoft Windows 7 licenses, and server and storage hardware with Pano Logic’s award-winning zero client platform for just $489 per seat. That is the lowest cost available for a complete, all-in desktop virtualization solution.  Pano Express

The pre-configured, pre-loaded all-in suite is designed for small and midsized businesses (SMBs) and eliminates the complexity and resources required to cobble together the right infrastructure, storage and software for these organizations. With an all-in price of $489 per seat, CAPEX spending for Pano Express is approximately half of what virtual desktop deployments from other vendors cost. The reduced complexity of Pano Express strips the decision-making process to one simple question: “How much does it cost to get started?” More importantly, because Pano Logic is a true zero client solution, with no processors, software or storage on the client device, lifecycle savings from reduced management, energy, repair and replacement costs are dramatic. Pano Express provides annual total cost of ownership (TCO) savings of as much as 80 percent over a typical PC infrastructure.

“Pano Express is the lowest cost desktop computing solution on the planet when you factor in the huge long-term savings in reduced support, maintenance and energy costs from zero client computing,” said John Kish, CEO of Pano Logic. “We’ve dramatically lowered the cost and made the entire transition process – the decision, the purchase, and roll out – simple for any organization to undertake regardless of training or expertise. Having already deepened our technical integration with VMware View™, we are continuing to expand our affiliation with VMware. Our low-cost, zero-complexity desktop virtualization solution will transform the implementation path for organizations embracing 100% centralization.”

Pano Express includes 50 zero client Pano Systems, VMware vSphere Essentials, 50 Windows XP or Windows 7 virtual desktop licenses, and a custom configured dual-quad core server with high-performance RAID5 internal storage. Pano Systems are comprised of the zero client Pano Device, Pano Direct service and Pano Manager. Pano Express ships pre-loaded and pre-configured, and will be available for purchase through an approved Pano Logic reseller in North America. 

“We’re pleased with the release of Pano Express, a pre-packaged solution that will enable SMBs to tap the extreme value and simplicity of desktop virtualization,” said Patrick Harr, vice president, desktop virtualization at VMware. “This suite is a powerful tool for expanding and speeding the adoption of desktop virtualization so that customers of all sizes can realize the dramatic savings and simplicity of centralized computing.”

Available in early June, Pano Express has already achieved success in the marketplace.

“I was sold on Pano Logic based on the ongoing support, maintenance and energy savings I would realize over time but when I learned of the additional price benefits and the convenience of having all of the software fully loaded and ready to go, I jumped at Pano Express,” said Mike Stewart, Assistant to the Director of Information Systems of the Blue Ridge High School District. “My department is stretched thin trying to maintain a computing infrastructure with limited resources. Having the computing equipment arrive, the software fully loaded and the components ready brought tremendous peace of mind and immediate savings in deployment costs.” 

About Pano Logic
Pano Logic is the leader in Zero Client Desktop Computing. Pano Logic’s all-in-one hardware and software solution redefines the delivery and management of end user computing by radically centralizing desktop management. Pano Logic is a complete end-to-end solution purpose-built for desktop virtualization that deploys in under an hour and dramatically simplifies the complexity and management of virtual desktops and slashes computing TCO by as much as 80 percent. The Pano Device, a zero client, contains NO processor, NO operating system, NO storage, NOR any moving parts, completely eliminating endpoint management and security breaches. The Pano Device uses less than 5 watts of energy or 97% less than a PC, drastically reducing energy costs. To learn more, visit http://www.panologic.com

Source” Pano Logic

Wyse Xenith™ – The zero client built for Citrix

2017-07-27T00:01:11+00:00 May 17th, 2010|Uncategorized|

Meet Wyse Xenith

Zero delays, Zero management, Zero security issues – Citrix HDX.

Outfit your cloud with the fastest, easiest to manage, and most secure Citrix client we’ve ever built – and that’s saying something.

From the company that invented the category and built more zero clients than anyone.

Yes, anyone.


 

Zero Delays

 

Go from 0 to productivity faster than a Ferrari.

Wyse Xenith is ready to work in six seconds because its dynamically delivered firmware is smaller than a single digital photograph. Its efficient design is three times faster than competing devices and sports gigabit LAN and wireless-n, so it’s ready for serious tasks whether you’re wired in or not. With an industry first media decoder in hardware, Wyse Xenith will be able to deliver HD video without taxing your server, network or patience.


 

Zero Management

 

That’s right, no management. It’s a zero configuration client.

Most thin clients require you to add software, tweak settings, or configure them in some way before you can use them. Not Wyse Xenith. Just take it out of the box and connect it to your network – your Citrix XenDesktop server configures it to your preferences.

Wyse Xenith is completely configurable, yet no management software is needed. So unlike some clients, when a hot new feature is released, you won’t need to buy new ones to get it.


 

Zero Security Issues

 

It’s one less thing to worry about.

Wyse Xenith is the only dynamically configurable zero client that is virus and malware immune.

Yes, immune.

There are no Windows or Linux APIs for viruses to latch on to, so even network and memory-borne viruses can’t attack. Unlike other HDX compatible clients, Wyse Xenith needs absolutely no local firewall or anti-virus protection.


 

Zero Energy Use (Almost)

 

Save $70 a year in energy versus a PC*

Wyse Xenith draws less than 7 watts of power – in full operation.

That’s less than every PC on the planet. And no multimedia rich client on the market today uses less energy.

When you hug a tree – it might hug back.


 

Zero Compromise User Experience

 

Wyse Xenith is built for Citrix environments.

XenApp, XenDesktop, it’s what Wyse Xenith lives for.
It’s quite simply the best Citrix HDX client this side of Win32.
With HDX support that goes beyond any non-windows device on the market today.

The desktop just got a lot easier.

Specs

Processor: VIA 1GHz
Chipset: VIA VX855
Memory: 128MB Flash / 512MB RAM DDR2
I/O peripheral support: One DVI-I port, DVI to VGA (DB-15) adapter included
Dual-video Support with optional DVI-I to DVI-D plus VGA-monitor splitter cable (sold separately)
Four USB 2.0 ports (2 on front, 2 on back)
Two PS/2 ports
One Mic In
One Line Out
Enhanced PS/2 Keyboard with Windows Keys (104 keys)
PS/2 Optical mouse included
Networking: 10/100/1000 Base-T Gigabit Ethernet
Internal 802.11 b/g/n (optional) eliminates theft of external wireless adapters
Display: VESA monitor support with Display Data Control (DDC) for automatic setting of resolution and refresh rate
Dual monitor supported
Single: 1920×1200@60Hz, Color depth: 8, 15, 16, 24 or 32bpp,
Two independent full resolution frame buffers
Dual: 1920×1200@60Hz, Color Depth: 8, 15, 16, 24 or 32bpp
Audio: Output: 1/8-inch mini jack, full 16 bit stereo, 48KHz sample rate
Input: 1/8-inch mini jack, 8 bit stereo microphone
Physical characteristics: Height: 1.38 inches (34mm)
Width: 6.94 inches (177mm)
Depth: 4.75 inches (121mm)
Shipping Weight: 6 lbs. (2.7kg)
Mountings: Horizontal feet (optional vertical stand)
Optional VESA mounting bracket
Device Security: Built-in Kensington security slot (cable sold separately)
Power: Worldwide auto-sensing 100-240 VAC, 50/60 Hz. Energy Star V.5.0 compliant power supply
Average power usage with device connected to 1 keyboard with 1 PS/2 mouse and 1 monitor: Under 7 Watts
Temperature Range: Horizontal and Vertical positions: 50° to 104° F (10° to 40° C)
Humidity: 20% to 80% condensing
10% to 95% non-condensing
Safety Certifications: German EKI-ITB 2000, ISO 9241-3/-8
cULus 60950, TÜV-GS, EN 60950
FCC Class B, CE, VCCI, C-Tick
WEEE, RoHS Compliant
Warranty: Three-year hardware warranty

Microsoft’s System Center Essentials 2010

2017-07-27T00:01:11+00:00 May 12th, 2010|Uncategorized|

Microsoft System Center Essentials 2010 will be Microsoft’s second release of an IT systems management product specifically designed for the midsized business. Based heavily on customer feedback, Essentials 2010 will offer integration of physical and virtual server management and monitoring into one product and one console. Essentials 2010:

  • Provide a unified solution with a single console for managing a broad range of tasks across your servers (virtual and physical), clients, hardware, software and IT services for a unified experience.
  • Enables you to proactively manage your IT environment, helping keep your system up-to-date with a solution that accelerates problem resolution and enables automation of system updates and data collection.
  • Is easier to deploy and maintain helping simplify complex management tasks for increased IT efficiency.

The following screen shows the Essentials 2010 console.

New Investments for Essentials 2010

Unified Experience

  • Integration of virtualization management, including live migration
  • Automated computer grouping
  • Server management limit increased to 50

Proactive Management

  • Automated management of updates and installation deadlines
  • Improved software distribution targeting
  • Dynamic importation of monitoring management packs

Increased Efficiency

  • Quick provisioning of new virtual machines
  • Easy server conversions from physical to virtual
  • Intelligent placement of virtual workloads

Wyse – What is Thin Computing and Zero Client Computing?

2017-07-27T00:01:11+00:00 May 7th, 2010|Uncategorized|

Thin Computing delivers the productivity people need, at a lower cost than traditional methods, all without compromising security or manageability. Thin Computing replaces the PC with a Thin or Zero Client, making it easier for IT to manage user desktops by moving their complexity to the datacenter. Analysts agree that this approach improves the reliability and security of information, dramatically lowers IT costs, reduces energy consumption, and is far better for the environment. Yet Thin Computing still provides the access to applications and data that people need in order to move the business forward. All while improving on the security, reliability, and availability of PCs.
People often make the mistake of thinking that Thin Computing is just another name for thin-client computing. Actually, Thin Computing includes hardware services and software that work with Thin Clients, Zero Clients, and PCs, as well as wireless devices and other systems. It gives everybody in the organization secure access to the information and the applications they need, without requiring the desktop systems to store them.


Why Thin Computing and Why Now?

Today, as much as 80 percent of IT’s budget is allocated to maintenance, making it very hard for any IT organization to add value to the business. Chief Information Officers have seen their titles evolve to Chief Infrastructure Officer, as they are totally consumed by the need to avoid regulatory problems and keep things running at the same time. Thin Computing not only reduces the cost to deliver desktop computing by as much as 40 percent or more, it also frees IT staff time to focus on more strategic initiatives.

Additionally, the increased availability of high-bandwidth network connections and the sophistication of datacenter architectures based on Microsoft Windows Terminal Services, Citrix Application Delivery, or VMware Virtual Desktop Infrastructure, allow Thin Computing solutions to run at desktop speeds, and display rich multimedia like never before. This makes it easier and more acceptable for business professionals to use Thin Clients in mission-critical applications.

Click to view diagram

What is Zero Client Computing?

The majority of today’s thin clients have a small OS in them that provides the functionality to securely connect to servers and display applications for workers. The small amount of software in these devices is why they’re called “thin” clients. Enterprises have successfully adopted this technology in the millions of units, and for some, there is an opportunity to make the desktop or mobile device even thinner – called a Zero Client. A Zero Client has no local OS pre-installed on the unit. This information is provisioned to the desktop (like a cell phone is provisioned when purchased) when it is powered up, based on the worker’s role in the organization. Zero Clients cost less, and don’t need to be managed, but require more network bandwidth than Thin Clients.

Why Wyse Thin Computing?

Wyse is the worldwide leader in Thin Computing, offering Thin and Zero Clients before anyone else. Wyse software makes it easy to provision, manage, update, and even service any Thin or Zero Client from one central location. After all, it’s much easier and more cost-effective to manage several servers than thousands of individual desktop PCs. And with no moving parts thanks to solid-state technology, Wyse Thin and Zero Clients deliver greater reliability, availability, and lower cost of ownership than other solutions.

Wyse Thin Computing solution includes:

Thin-Computing Hardware
Thin-Computing Software
Thin-Computing Services

This total solution allows Wyse to deliver improved:

Going forward, the world is only going to get thinner. And Wyse is already moving in that direction. Check back soon to see exactly how we’re getting thinner. Thin Computing delivers the productivity people need, at a lower cost than traditional methods, all without compromising security or manageability. Thin Computing replaces the PC with a Thin or Zero Client, making it easier for IT to manage user desktops by moving their complexity to the datacenter. Analysts agree that this approach improves the reliability and security of information, dramatically lowers IT costs, reduces energy consumption, and is far better for the environment. Yet Thin Computing still provides the access to applications and data that people need in order to move the business forward. All while improving on the security, reliability, and availability of PCs.
People often make the mistake of thinking that Thin Computing is just another name for thin-client computing. Actually, Thin Computing includes hardware services and software that work with Thin Clients, Zero Clients, and PCs, as well as wireless devices and other systems. It gives everybody in the organization secure access to the information and the applications they need, without requiring the desktop systems to store them.

Windows 7 Migration – Using Dell’s KACE Appliance

2017-07-27T00:01:11+00:00 April 30th, 2010|Uncategorized|

Helping Provide Comprehensive Capabilities for Rapid and Reliable Migration

With the Windows 7 release now a reality, for many organizations the question is no longer whether to migrate, but how. As XP reaches end of life and Vista became merely a skipped step for most, the prospect of a full scale Windows 7 migration looms. Beyond the necessary tasks of actual Windows 7 rollout and preservation of user data, other migration challenges include identifying which machines can be upgraded, which applications are supported on Windows 7 and assuring that license tracking is not disrupted throughout the process. In addition, 83% of respondents in a recent Dell KACE survey stated that they plan to skip Vista and go directly to Windows 7. This strategy poses significant complications since Microsoft does not support in-place upgrades from Windows XP to Windows 7, and requires a fresh installation.

The Solution

Dell KACE Appliances help optimize the process of migrating to the Windows 7 operating system through easy to deploy and use appliances. The KACE appliance-based approach saves you time and money through a solution that helps facilitate tasks such as user state migration, operating system deployment and application distribution, helping speed the move to Windows 7 and minimizing end-user downtime. Upon successfully completing a Windows 7 migration, KACE appliances can assist to provide PC lifecycle management including patch and configuration management, providing even more potential savings.

Features of KACE Appliances helping support a successful Windows 7 migration include:

Windows 7 Migration
  • Windows user state migration can permit you to retain user-specific files and settings when installing Windows 7. You can migrate user states when installing an operating system and applications, helping minimize end-user downtime and reducing the risk of losing critical information.
  • Inventory assessment helps you check machines for Windows 7 readiness. The KACE Appliance discovers machines on your network and collects detailed hardware and software inventory. The appliance can then help assess which machines in a network are ready for a Windows 7 deployment. An innovative client to server communication protocol gathers inventory multiple times per day, helping ensure that your data is up to date.
  • K-imaging is a flexible file-based imaging format. You can more easily add files and folders to a Windows 7 K-image. Through K-imaging, the KACE Appliance helps eliminate redundant transfers in the capture, storage, and deployment of Windows 7 images.
  • Network OS install allows you to automate the build out of Gold Master reference machines used for Windows 7 image capture. The KACE Appliance slipstreams drivers along with a network OS install, helping to provide a hardware independent option to deploy Windows 7.
  • Asset management helps track Windows 7 operating system and software license compliance. KACE asset history monitors assets as they undergo hardware and software changes through a Windows 7 Migration. Software metering shows you the Windows 7 software in your network that is actually being used versus simply installed. Unused software licenses can then be reassigned or retired, helping save your company money.
  • Patch management allows you to deploy relevant Windows 7 patches and updates to machines on local and remote networks as they become available. Rely on the KACE Appliance to distribute Windows 7 updates so that you do not have to wait for the full service packs from Microsoft.
  • Pre and post deployment configuration helps make it easy to bundle relevant Windows 7 applications while utilizing thin images, a systems deployment best practice. Since thin images contain only the operating system and applications that everyone in your organization needs, they help you to maintain fewer images. And because thin images are simpler, deployments can be more reliable and users can experience less downtime.
  • Remote site management allows you to migrate machines outside your headquarter network to Windows 7. The KACE Appliance remote site management technology requires virtually no dedicated hardware. You can retain the convenience of a centralized administrative console while utilizing the remote network to serve as the engine for the deployment.
  • KACE Virtual Kontainer technology lets you keep your Windows 7 deployment fresh and free from potential application conflicts. Deploy key applications with less worry of impacting your new Windows 7 deployment.

Source: Dell

Load More Posts

Fatal error: Uncaught exception 'GuzzleHttp\Exception\ClientException' with message 'Client error: `POST https://dc.services.visualstudio.com/v2/track` resulted in a `400 Invalid instrumentation key` response: {"itemsReceived":1,"itemsAccepted":0,"errors":[{"index":0,"statusCode":400,"message":"Invalid instrumentation key"}]} ' in /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Exception/RequestException.php:113 Stack trace: #0 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Middleware.php(66): GuzzleHttp\Exception\RequestException::create(Object(GuzzleHttp\Psr7\Request), Object(GuzzleHttp\Psr7\Response)) #1 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/promises/src/Promise.php(203): GuzzleHttp\Middleware::GuzzleHttp\{closure}(Object(GuzzleHttp\Psr7\Response)) #2 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/promises/src/Promise.php(156): GuzzleHttp\Promi in /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Exception/RequestException.php on line 113