Publishing MS Word Viewer through Citrix XenApp 6.5…

2017-07-27T00:01:03+00:00 June 19th, 2013|Uncategorized|

Recently, I moved over to the Coretek virtualization team.  It’s a great opportunity to work with new technologies and implement them as part of our Virtual Clinical Workstation solution.  

Citrix is one of the technologies that plays a major part in the solution.  As part of a virtualization implementation we are working on, I was tasked with publishing the Microsoft Office viewers through Citrix XenApp 6.5.  Now, I have a pretty extensive background in software installation and configuration on Windows desktops; however, publishing them through Citrix was new to me.  

The way a published application’s files and registry keys interact with a desktop operating system are fundamentally different.  Therefore, I was surprised to find when I attempted to open a Word document in the published Word viewer by double clicking on the .doc file — the file itself would not open, but the Word viewer would only open up an “Open” dialog.



So, being pretty new to Citrix — and given that it’s a pretty complex application that is comprised of multiple policies, application configurations, and settings, which can redirect content and drive mappings — troubleshooting issues like this can be challenging (and of course, you must also consider all the AD policies applied as well).  In the end, the solution to this particular issue was pretty simple…

Fortunately, once I was able to rule out that content redirection or drive mappings might be the cause, I found a Citrix KB article that addressed the exact issue I was having.  You can read the article here:

In short, I had to add a special parameter (“%**”) at the end of the Word Viewer’s Command Line in the Citrix AppCenter (where published applications are stored).  The default parameter contains only one asterisk (“%*”). 




Hopefully this tip will help if you experience the same issue!




How to import the HKCU values of a different profile into your registry…

2012-08-01T23:01:31+00:00 August 1st, 2012|Uncategorized|

When troubleshooting an application installation issue — or an issue with the application itself — on the Windows operating system, it’s often necessary to view the registry.  The Windows registry holds a wealth of information and settings that determine just about everything related to how Windows operates; what it looks like, where and what users can access, and how applications behave.  If you know where to look, or what you’re looking for, this can be a pretty easy task; the “Find” function in the Registry Editor works pretty well.  However, if the issue is with registry keys under the HKEY_CURRENT_USER (HKCU) hive, it can be a challenge.  You see, the keys under the HKCU hive are unique to each users profile; thus, when you view the registry keys under HKCU in the Registry Editor, you are viewing the keys of the current logged-in user profile.

In an enterprise environment, applications are typically distributed via a configuration/distribution system such as Novell ZENworks Configuration Mannager (ZCM) or Microsoft System Center Configuration Manager (SCCM).  When software is installed through these systems, the application installers can be configured to run as the logged on user, under the system profile, or even as a “dynamic” administrator.  If the installer writes values to the HKCU profile they are written to the profile that ran the installer.  Thus, there is often need to view the HKCU values of a different user profile.  Adding more complexity to this, you may find yourself in a situation where the user profile under which the HKCU values are located doesn’t have access to the Registry Editor.  In this situation, you need to import the profile’s HKCU hive into your registry so you can view it.

The HKCU values for a profile are stored in a file called ntuser.dat, located in the root of the users’ profile.  On Windows 7 the path is c:users(profile)ntuser.dat.  There are a few ways to import the ntuser.dat into the registry with Registry Editor, but the quickest and easiest way I’ve found to do this is using the following command from an elevated command prompt:

reg.exe load HKLMTempHive c:users(profile)ntuser.dat

Now the HKCU values of the profile you imported can be viewed under a key called “TempHive” in the HKEY_LOCAL_MACHINE hive.

Hopefully, this will help you to resolve that issue you’re looking into!


Coretek Services Receives 101 Best And Brightest Companies To Work For Award, For The Second Year In A Row

2017-07-27T00:01:09+00:00 September 9th, 2010|Uncategorized|






Only companies with the highest quality human resources initiatives can be named “Metropolitan Detroit’s 101 Best and Brightest Companies to Work For.” This honor is highly sought after by competing companies throughout the region. These select companies will be honored by the Michigan Business and Professional Association (MBPA) on Wednesday September 22 at the Marriott Dearborn Inn. For the second year in a row, Coretek Services was selected to be a part of this list of outstanding companies. 

This year’s winners practice innovative strategies and represent best practices in human resources inindustries as diverse as the automotive, insurance, hospitality, communications and nonprofit. (See the attached list of honorees.)  An independent research firm evaluates each company’s entry based on key measures in various categories. They include Communication, Community Initiatives, Compensation and Benefits, Diversity and Multiculturalism, Employee Education and Development, Employee Engagement and Commitment, Recognition and Retention, Recruitment and Selection, Small Business and Work-Life Balance.

The winning 101 companies also vie for 10 elite awards, one granted for each category. Also an overall winner, who has excelled in all categories, will be honored with the “Best of the Best” award. The award winners will be announced during the luncheon.

The annual human resources symposium and awards program will begin with registration, networking and an exhibit gallery at 7:30 a.m. Educational workshops will follow at 8:00 a.m. The topics of this year’s sessions will include “Growing Pains in a Cautious Economy: How Does a Team Transition from a Slow Economy to Cautious Optimism; Leveraging Collaboration and Team Building to Grow your Business and Engage your Team; Looking to the Future: Understanding the New Era of Employee Enrichment and Leveraging a Digital World: The Advantages and Pitfalls of Social Media.” The luncheon and awards ceremony begins at 11:00 a.m.

“The selection, recognition and awarding of this year’s 101 companies allows our organization to showcase their best practices. The honorees have clearly demonstrated why each of them would be an ideal place for employees to work. Companies that capitalize on their greatest resource—their employees—know how to attract and retain top talent,” said Jennifer Kluge, MBPA executive vice president and chief operating officer.

Tickets for the symposium and awards lunch are $165 for MBPA members; $195 for non-members. A member table of 10 is $1,650; non-member tables are $1,950. Sponsorships are also available. Contact the Michigan Business and Professional Association at 586-393-8800 or visit to register or for more information.


Symantec Backup Exec 2010: Reliable Backup and Recovery Designed for Your Growing Business

2017-07-27T00:01:09+00:00 August 25th, 2010|Uncategorized|


Symantec Backup Exec™ 2010 delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage costs and improve backup performance through integrated deduplication and archiving technology. Reduce business downtime with unmatched technology that recovers critical Microsoft applications and VMware or Microsoft Hyper-V virtual environments in seconds. Meet your recovery point objectives with continuous data protection to ensure reliable recovery of an entire application and efficiently restore a granular email or individual file/folder.

Symantec Backup Exec also delivers centralized management to easily extend your backup infrastructure across a distributed environment and remote offices so your server and desktop data protection is easily managed from a central office as your business grows. Efficiently manage both Windows and non-Windows systems through a single console including UNIX, Linux, MAC, and NetWare, including remote media server support for Linux servers. Overall, Backup Exec 2010 is designed to readily optimize any Windows data protection strategy – helping you protect more data while utilizing less storage – overall saving you time and money.

Key Benefits

Delivers market-leading Windows data protection with

more than 1.5 million customers globally

• Reduce storage costs while optimizing network utilization through integrated deduplication and archiving   technology.

• First-to-market granular recovery for Exchange, SQL and Active Directory environments running in a VMware and Microsoft Hyper-V environment.

• Microsoft certified backup and recovery for the latest Windows environment, including Windows 2008 R2, Exchange 2010 SP1, and Windows 7.

• Comprehensive disk and tape storage for the latest physical and virtual server systems though one console  including VMware and Microsoft Hyper-V virtual systems.

• Reduce storage requirements and recovery times with patent-pending granular data recovery of leading Microsoft applications, including Exchange, SharePoint and Active Directory.

• Protect non-Windows servers and maximize performance of supported NDMP filers and SAN environments through scalable remote agents and options.

• Easily update and manage a growing Backup Exec infrastructure throughout a Windows datacenter, distributed throughout the network or at remote offices from one console.

• Eliminate the backup window and ensure recovery point objectives are easily met for Exchange, File Servers and desktop data with Continuous Data Protection.

Comprehensive Backup and Recovery

Symantec Backup Exec 2010 offers a comprehensive backup and recovery solution in one product suite, which reduces the complexity of protecting your company’s most valuable asset—its data. Whether that data resides on a Windows file server; on a desktop; virtual server; or on a critical application server like Exchange, SQL, or SharePoint, Symantec Backup Exec 2010 provides full protection and recovery for both data and systems. Designed to meet the growing needs of today’s businesses, Symantec Backup Exec 2010 delivers comprehensive disk or tape data protection and recovery for Windows environments. Backup Exec provides integrated deduplication and archiving, plus, continuous data protection—eliminating backup windows altogether, speeding up data recovery, and enabling end users to recover their own files without IT intervention. Symantec Backup Exec 2010 also delivers patent-pending Granular Recovery Technology allowing businesses to recover data in seconds, including business-critical information such as individual email messages, folders, and documents, from a single backup. An optional centralized administration console provides scalable management of distributed backup servers. New infrastructure management is also available for simplified inventory, deployment and upgrades of Backup Exec licenses and software patches though a single console.

Overall, sophisticated database and groupware agents and storage options easily expand data protection to protect to critical applications and provide added flexibility for virtually any storage environments.

New Product Highlights


• NEW integrated deduplication option (using Symantec NetBackup PureDisk technology) reduces backup times and storage costs.

• NEW unified archiving (powered by Symantec Enterprise Vault) efficiently consolidates growing Exchange and File server data volumes and automates efficient data lifecycle management practices.

• NEW virtual server application support including with first-to-market Exchange, SQL and Active Directory backup and recovery for virtual environments and enhanced VMware vSphere 4.1 and Microsoft Hyper-V R2.

• Windows 7, Exchange 2010 SP1, SharePoint 2010, SQL 2008 R2, MAC OSX 10.6 and Windows Server 2008 R2 support provides comprehensive protection for the latest Windows and MAC environments.

• Enhanced Agent for Enterprise Vault automates backup and recovery of both Enterprise Vault 8 and 9 with theability to easily recover an Enterprise Vault site or individual indexes.

• NEW Lotus Domino 8.5.x support with simplified backup and recovery of the Domino Attachment and Object Service (DAOS) store and associated NLO files.

• Enhanced Virtual Tape Library (VTL) support and licensing, easily protect a VTL storage environment as a unique device and view valid VTL functions with new licensing per VTL environment.

• Enhanced installation and backup wizards reduce the time and complexity of setting up your backup environment.

• NEW Backup recommendation tool identifies potential gaps in your Windows backup strategy and provides recommendations on the agent(s) required to ensure complete data protection.

Proven and Reliable

Symantec Backup Exec is based on over two decades of proven, Microsoft certified engineering. The innovative architecture fully incorporates Microsoft design standards, helping to ensure 100 percent compatibility with the latest Microsoft Windows Server. Backup Exec also provides added security with flexible 128-bit or 265-bit AES encryption across the network or off to storage devices so critical data is secure whether in transit or at rest. Symantec Backup Exec 2010 delivers an easy to mange interface and calendar view to quickly track and monitor backup and recovery jobs. In addition, Backup Exec simplifies installation and backups with its Pre-Install Environment Checker, which highlights any potential issues before the software is installed. With its Job Test Run, Symantec Backup Exec 2010 will identify potential problems that cause job failures, and then notify the administrator so that corrective action can be taken. Realize further benefits with automatic discovery of new resources, which enables administrators to create a job for detecting new, unprotected resources that are at risk and in need of backup. All of these tools reduce the time and resources needed to install and run Backup Exec, while improving overall backup performance.

Support Services

No matter the size of your company, a service interruption can mean significant loss to your business. Symantec recommends Essential Support Services as the service level of protection for most businesses.

• Reassurance of knowing your Backup Exec products are up to date with the latest updates and version releases

• Cost savings that come with selecting a value-priced service plan

• 24×7 expert problem resolutions through Symantec’s global support and delivery team

Available Products, Agents and Options

Symantec Backup Exec 2010 provides scalable easy-to manage backup and recovery protection for Windows based environments. Symantec Backup Exec agents and options easily expand any Backup Exec environment to support critical applications, databases, and storage configurations:

Core Licenses

• Symantec Backup Exec 2010

• Symantec Backup Exec 2010 for Windows Small Business Server (view Small Business Server data sheet)

Symantec Backup Exec Suites

• NEW Symantec Backup Exec 2010 Deduplication Suite

• NEW Symantec Backup Exec 2010 Deduplication and Archiving Suite

• NEW Symantec Backup Exec 2010 VMware Suite

• NEW Symantec Backup Exec 2010 Hyper-V Suite

Symantec Backup Exec Agents

• Enhanced Agent for VMware Virtual Infrastructures

• Enhanced Agent for Microsoft Hyper-V

• Enhanced Agent for Enterprise Vault™

• Enhanced Agent for Lotus Domino Server

• Enhanced Agent for Microsoft Exchange Server

• Agent for Active Directory

• Agent for DB2 on Windows Servers

• Agent for Microsoft SQL Server

• Agent for Microsoft SharePoint

• Agent for Oracle on Windows and Linux Servers

• Agent for SAP Applications

• Agent for Windows Systems

• Remote Agent for Linux or UNIX Servers

• Remote Media Agent for Linux Servers

• Remote Agent for Macintosh Servers

• Remote Agent for NetWare Servers

Symantec Backup Exec Options

• NEW Deduplication Option

• NEW Exchange Mailbox Archiving Option

• NEW File System Archiving Option

• NEW Virtual Tape Library Unlimited Drive Option

• Advanced Disk-Based Backup Option

• Central Admin Server Option

• Desktop and Laptop Option

• Library Expansion Option

• NDMP Option

• SAN Shared Storage Option

• Open File for Netware Option

Coretek Services is a Michigan based Systems Integration and IT consulting company that works with virtualization infrastructure, and is also a Symantec Gold Partner specializing in Symantec Enterprise Vault (SEV), Symantec Backup Exec (SBE), and Symantec Endpoint Protection (SEP).  Please contact us today for any virtualization requirements, or Symantec Product requirements.


Symantec Enterprise Vault Archiving Framework Overview

2017-07-27T00:01:09+00:00 August 23rd, 2010|Uncategorized|

Over 5,000 global customers use Enterprise Vault as an archiving framework to reduce risk and increase operational efficiency

Business is drowning in data. As part of the normal daily operation large numbers of emails and documents are generated; buyers may negotiate purchasing contracts over email, financial analysts may share data via Microsoft SharePoint Portal Server, and product managers may publish pricing and competitive information via file shares. All of these activities are fundamental to the smooth operation of the business and all generate business records, which, at some point, may be required for regulatory, litigation, or knowledge purposes.

Today’s complex storage and server infrastructures are not designed to cope with the efficient long-term retention of large volumes of data. The backup/recovery process becomes impossible within a reasonable timeframe. Keeping up with and exploiting the latest software capabilities raises the huge challenge of migrating legacy data. With IT budgets and resources stretched to the limit, the temptation to purge historical data is strong. But the increasing legal and regulatory demands mean this is not an option.


Flexibility and adaptability
Delivering value today, meeting your future needs

Without a flexible approach to storage the operational risks are overwhelming.  Without an adaptable platform for information exploitation the risk of non-compliance could be catastrophic. Imposing complex document retention solutions on your users will result in overload. Enterprise Vault is designed to deliver long-term, archival storage of multiple types of data. The information and data lifecycles are managed and relevant content can be found on demand.  A complete solution is delivered without disruption to the user, avoiding the need to change business processes and retrain staff.  The heart of this solution is the Enterprise Vault archiving framework.  Designed to offer secure, scalable information retention that is nonintrusive for the user, the framework is a natural evolution of Symantec’s market-leading archiving solution deployed around the world.

The archiving framework

Every organization is different. You need a solution that meets your business and operational needs, taking into account your current and potential future requirements. The archiving framework delivers the exact solution you require today, giving you the platform to meet current and future information retention requirements and exploit advances in storage and server technology. The framework consists of services grouped into a number of modules. By providing such a modular solution Symantec maximizes the value of your investment.

Components of archiving

The solution of the archiving problem can be broken down into a number of areas; each of these is represented by a layer in the archiving framework.

Enterprise Vault Repository

Central to every organization is the creation and ongoing management of the archive and its contents. This capability is delivered by the Enterprise Vault Repository. This is designed to deliver the capability to securely retain archived data in such a way that it can be fully exploited, and disposed of when it is no longer required. The Repository is designed to:

• Store archived content on the most appropriate platform

 • Compress and single-instance for storage reduction

 • Index content for rapid and targeted retrieval

 • Render an HTML copy of all archived content, thereby

   securing future accessibility

 • Utilize user authentication security controls

 • Define and implement retention and deletion policies


Content sources

Enterprise Vault is designed to store content from multiple data sources. Movement of content from the application to the Repository is carried out transparently via policy control. This ensures that fundamental records can be retained without affecting normal daily operations.

Open storage layer

The Repository provides for retention of the archive on the initial storage platform. Depending on the size of the organization and the nature of the content, there may be a need to use other types of storage, or indeed consolidate and partition archives for maximum efficiency. Your storage infrastructure may contain SAN and NAS technology and increasingly may embrace newer technologies such as EMC Centera and Network Appliance NearStore. The timescale for retention of content may be a few years, or a few decades. Today’s storage media may be regarded as legacy in the future. Storage lifecycle management

therefore is paramount to the long-term usefulness of archived content. To facilitate true lifecycle management the Open Storage Layer allows policy-based migration of archived data across storage media through time. This allows you to take advantage of the storage media best suited to the content’s age and usage profile, and reduce the total cost of storing the archive.

Performance and scalability infrastructure

The Enterprise Vault Repository is architected to provide the optimal performance for single or distributed server solutions. As the deployment environment becomes more complex, so it becomes important to have the ability to deploy components of Enterprise Vault in a distributed manner. Symantec and its partners have tested Enterprise Vault to beyond 100,000 users. A building block approach allows different servers to be used for archiving, indexing, journaling, and many other activities.

Universal access layer

Due to the wide range of data sources that can be archived, and the many ways in which end users work, it is important to provide an adaptable user interface. One of the key premises of Enterprise Vault is that end users should not have to change the way they work as a result of the implementation of archiving. Email clients should still be able to access current and historical email; file system content should still be accessible, and when working offline, archived email should still be available. To this end, Enterprise Vault has available a wide variety of client options:

• Transparent shortcuts in Microsoft Outlook®

• Universal shortcuts for non-Outlook clients

• Full access from Microsoft Outlook Web Access

• Transparent placeholders for archived file system content

• Hierarchical “Explorer” view across all archived sources

• Offline access for mobile and remote users

• Simple and extended full text search capabilities from

Outlook and Web interfaces The implementation of archiving and keeping of business records need not be intrusive for end users. They use familiar tools and continue to work as before.

Archive exploitation

Reducing the overall cost of storage should be only part of the TCO addressed by an archiving solution. Content is being kept because at some point in the future you will need to access it; otherwise, why would you keep it? Typically business records need to be accessed as part of a regulatory action, or as part of a litigation action. In both of these circumstances it is paramount that the information can be found very quickly and that only relevant information is disclosed. The ability to search the archive is only one part of the requirement. Locating the right set of content in response to litigation (perhaps as part of a contractual dispute) will require multiple searches. Search sets will require review by people with different levels of experience. An audit will be required of how decisions were made on what material to disclose. There is a process to this and it requires workflow. Enterprise Vault business accelerators deliver this workflow and drive the discovery or compliance process. Initially there are two business accelerators available within the framework:

• Discovery of content in response to litigation or a similar

   event (Discovery Accelerator)

• Regulatory supervision in line with finance regulations

   (Compliance Accelerator)

Framework benefits

• Built upon proven solutions from the market leader
• Supports many different content sources, not just email
• Nonintrusive for the end user
• Flexible deployment options
• Complete exploitation of archived content
• Addresses operational efficiency and compliance
• Enables information and storage lifecycle management
• Adaptable for future needs
• Reduces cost, reduces risk

Both Accelerators use the inherent search capability of Enterprise Vault to gather records that may be relevant to a case. The records are then assigned to a reviewer who is responsible for deciding whether the records are relevant to the case in hand. If in doubt, the decision can be cascaded to more experienced reviewers. The end result is a set of business records of absolute relevance, which may then be packaged for disclosure. Throughout the process an audit trail is retained.

Archiving for compliance, records management and

operational efficiency

Reducing risk and increasing efficiency

Enterprise Vault provides a framework of solutions that will increase your operational efficiency and decrease your business risk. Compliance is not just about email retention. Reducing cost is not just about storage optimization. Symantec helps you move beyond simply archiving email. We work with you to deliver a solution that allows email and other critical content sources to be archived and exploited on demand. This approach brings operational benefit to the data sources and preserves records for future use. Today your organization is looking for an application to underpin your compliance initiatives and reduce the future TCO of your storage and information infrastructure. Enterprise Vault is the proven solution.

Coretek Services is a Michigan based Systems Integration and IT consulting company that works with virtualization infrastructure, and is also a Symantec Gold Partner specializing in Symantec Enterprise Vault (SEV), Symantec Backup Exec (SBE), and Symantec Endpoint Protection (SEP).  Please contact us today for any virtualization requirements, or Symantec Product requirements.



E-Medical Records: 10 Steps To Take Now

2010-03-11T14:51:52+00:00 March 11th, 2010|Uncategorized|

Don’t wait for the government to finalize meaningful use requirements. Here’s how to jump-start your health IT efforts.

The federal government’s $20 billion-plus healthcare IT stimulus program has more hospitals and doctors than ever planning to implement e-medical record and other health IT systems. But many healthcare providers have put plans on hold as they wait for the government’s final “meaningful use” rules that will determine which types of systems are eligible for reimbursements.

“I’ve been in this industry for 25 years, and I’ve never seen as much anxiety and confusion,” said Dr. Mark Leavitt, chairman of the Certification Commission for Health IT. Leavitt spoke with Informationweek at the Healthcare Information Management Systems Society (HIMSS ) conference in Atlanta Tuesday.

Despite all the uncertainty, there are steps providers can take now that will help them jump-start system deployments once the final rules are issued later this spring. Here are 10 top ones:

1) Get buy-in and sponsorship from your organization’s top leadership, including influential clinicians and the CEO. “Solicit your leadership team and actively communicate with upper management,” said Curt Kwak, CIO of the western region of Providence Health & Services, a provider that serves Washington, Oregon, Montana, California, and Alaska.

Support from the top is critical, especially when convincing users to give up old work habit and processes. Make sure everyone understands your goals, such as how the new systems will improve quality of care.

2) Decide how you’ll fund the project–remember stimulus dollars don’t start flowing until 2011. Some EMR vendors are offering interest-free loans for the upfront costs related to the purchase of these systems. Also consider applying for federal, state, and private grants. And some hospitals are offering free EMR software to doctors under the relaxed federal Stark rules.

3) Start evaluating your workflow and processes. Figure out what steps you’re doing now waste time and money, and can be eliminated with the new system. “Health IT is truly a magnifying glass, you’ll see all your flaws,” said Florence Chang, senior VP and CIO at MultiCare, a Tacoma, Wash., hospital network. “Decide what steps don’t add value.”

4) Find out where key information resides in your organization. For instance, is information on patients’ allergies in paper charts or computerized files? Start collecting information on how many prescription drug orders your doctors put through, and how they do those orders–paper, fax, or phone-in. You’ll need this data later to measure your organization’s meaningful use of electronic ordering, said Mike Wilson, senior IT director of clinical systems at Compuware.

5) Look at EMR and other health IT products for the ones that fit your organization’s needs. Consider products that have a good shot at attaining meaningful use certification, like those already approved by the Certification Commission for Health IT, or software from vendors that are offering meaningful use compliance guarantees.

6) If you’re not ready for a big bang approach to EMRs, consider modular software and components that let you add functionality in increments. “Look at the entire puzzle for what pieces fit now, and what can fit later,” Providence Health & Services’ CIO Kwak said.

7) Determine whether you have the resources and staff to handle an on-site system–both to implement it and keep it running. If not, then maybe a hosted model makes more sense. If you need to recruit talent, figure out the skills you’ll need and get going.

8. Get your infrastructure ready to deal with new systems. For instance, can it handle computerized physician order entry? If not, what foundation can you start laying, said Avery Cloud, VP and CIO of New Hanover Health Network, a health care organization in Wilmington, N.C.

9) If you were already planning or implementing health IT systems prior to the HITECH legislation passing in February 2009, don’t change things now. Don’t divert your original plans because meaningful use deadlines are compressing the timeframe, said Kwak.

10) Finally, don’t jump into poorly thought out health IT plans just to try getting the stimulus rewards. “Don’t do it just for the money,” said Wilson. “It’s like having a baby just for the tax break.”

Source: By Marianne Kolbasuk McGee,  InformationWeek
March 3, 2010

Business PCs Arrive with New Intel® Core™ vPro™ Processor Family

2017-07-27T00:01:12+00:00 February 8th, 2010|Uncategorized|

Intel Corporation unveiled its 2010 Intel® Core™ vPro™ processor family to meet the needs of businesses of all sizes for PCs with greater, more flexible performance, theft prevention and cost savings in a rapidly changing business computing environment. These and several other capabilities are at the heart of many new Intel-based business laptop and desktop computers beginning to roll out from computer manufacturers worldwide.

The Intel Core vPro processors arrive as business computing evolves with the emergence of video, Internet telephony, social networking and other heavyweight applications – in many cases running at the same time – making a computer’s performance an even bigger priority.

“Businesses, particularly those that haven’t purchased PCs for several years, face a computing environment that no longer handles the applications many workers and IT are adopting,” said Rick Echevarria, vice president, Intel Architecture Group, and general manager, Business Client Platform Division. “The integration of intelligent performance along with smart security and cost-saving manageability features in the Intel Core vPro processor family provide IT and SMBs a no-compromise platform. We also are excited about how Intel vPro Technology gives IT the flexibility to look at client virtualization, consumerization and rich cloud applications.”

The platform based on the 2010 Intel Core vPro processor family includes the new Intel® Q57 Express chipset, and new Intel® 82577LM Gigabit Network Connection for notebooks and Intel® 82578DM Network Connection for desktop PCs.

Computer manufacturers worldwide, including Acer*, ASUS*, Dell*, HP*, Lenovo* and Toshiba*, are rolling out business PCs based on the 2010 Intel Core vPro processor family. In addition, developers of software solutions for small- and medium-sized businesses (SMBs) and enterprises such as Aternity*, Bomgar*, Kaseya*, LANDesk*, Level Platforms*, LogMeIn*, Microsoft*, N-Able*, RealVNC*, Spiceworks*, Symantec* and WinZip* will support the new features in their upcoming products. IT service providers, including AT&T Tech Support 360* and PlumChoice*, plan to adopt Intel Core vPro Technology capabilities into their SMB offerings.

Thinking Fast
The processors are based on Intel’s award-winning “Nehalem” microarchitecture and manufactured on Intel’s groundbreaking new 32-nanometer process. Intel has integrated high-definition graphics in its processors for the first time, and incorporated Intel’s second-generation high-k metal gate transistors that help increase computing speed and battery life.

The 2010 Intel® Core™ i7 processors and Core™ i5 processors feature Intel® Turbo Boost Technology and Intel® Hyper-Threading Technology for adaptive, “smarter” computing. Intel® Turbo Boost Technology automatically adjusts the speed of the processor when it senses a workload change – faster when the user, for example, is multitasking or watching a video, and slower, more energy-efficiently when the worker goes for coffee and only background applications are running.

Contributing to the industry-leading speed and energy efficiency of the processors, Intel Hyper-Threading Technology interconnects multiple processor cores with multiple “threads” that enable faster processing of instructions in parallel.

Using standard benchmarks, a notebook with the 2010 Intel Core i5 vPro processor can run business productivity applications up to 80 percent faster1, multiple applications up to twice as fast1, and protect confidential data up to 3.5 times quicker1 compared to a 3-year-old mainstream notebook.

Outsmarting Evil Doers
Intel® Anti-Theft Technology, available with Intel vPro Technology frustrates thieves by locking access to a PC if a central server or built-in intelligence concludes it is lost or stolen. New Intel Anti-Theft Technology version 2.0 (Intel® AT 2.0) enables encryption solutions to disable access to cryptographic keys through hardware to completely block access to data, and also makes it simpler to reactivate a PC once in rightful hands. Also, a custom message can be displayed in a pre-OS screen of the disabled PC for anyone who tries to access the computer. Many computer makers plan to support Intel AT 2.0, such as Fujitsu*, HP, Lenovo and Panasonic*, and such security companies as Absolute Software,* PGP*, Phoenix* and WinMagic*.

Thinking Straight on Management
The new Intel Keyboard-Video-Mouse Remote Control (KVM Remote Control), features available with dual-core Intel Core i5 and i7 vPro processors work in conjunction with Intel® integrated graphics, bringing a stop to IT administrators’ frustration with having to ask users, “What do you see?” Instead, they will see users’ displays just as the users do and have full control of the PC, even if the operating system is inoperative. Previously, KVM functionality required appliances that cost as much as $200 and more per PC.

As encryption becomes more prevalent in business PCs, Intel has added features that avoid productivity slowdowns. First, Intel incorporated new instructions for the Advanced Encryption Standard into the hardware, speeding up encryption and decryption. Second, new Intel® Remote Encryption Management enables distant IT personnel to manage PCs with encrypted hard drives by more securely unlocking those drives, making all of the Intel vPro Technology capabilities available.

Another new feature, PC Alarm Clock, can wake a PC from off at a predetermined time to perform maintenance, security and other tasks on its own.

Boost for Small-, Medium-sized Businesses …
Today, Channel OEMs and system builders, including ASI*, Equus* and Seneca Databegan* introducing notebooks for SMBs based on the 2010 Intel Core processor family and other Intel building blocks. The full-featured line of notebooks, supported by an Intel enablement program called “Spring Peak,” are being developed by original design manufacturers such as Gigabyte* and Pegatron*, and sold through Intel channel distribution. The Spring Peak platform offers distinctive design, docking station, 15.6-inch LED LCD performance notebook and supports Intel Anti-Theft Technology.

… and Enterprises
Intel launched a workstation platform based on the new Intel Core i5 processor and the Intel® 3450 chipset. The platform creates an innovative category of entry-level workstations that delivers workstation efficiency, power and reliability at near-traditional business PC prices. The platform is aimed at SMB and enterprise users who run such applications as digital-media creation or entry-level computer-aided design. The platform takes advantage of new Intel HD graphics and has been certified on applications from ADOBE, Autodesk and others. Workstations based on the platform are being introduced by Intel channel providers, including Fujitsu, HP, Lenovo and NEC.

For wireless performance that complements the speed of the new Intel Core i5 and Core i7 processors, Intel unveiled the Intel® Centrino® Ultimate-N 6300 and Intel® Centrino® Advanced-N 6200 802.11n WLAN adapters. The adapters offer advanced 802.11n multi-stream capabilities, dual-band support, consistent coverage and higher speeds (up to 450 Mbps for the 6300 and 300 Mbps for the 6200). Intel also introduced the Intel® Centrino® Advanced-N + WiMAX 6250 adapter, which offers up to 20-Mbps WiMAX and advanced 802.11abgn (up to 300 Mbps) WiFi for maximum versatile coverage. All three adapters support Intel vPro Technology.


Fatal error: Uncaught exception 'GuzzleHttp\Exception\ClientException' with message 'Client error: `POST` resulted in a `400 Invalid instrumentation key` response: {"itemsReceived":1,"itemsAccepted":0,"errors":[{"index":0,"statusCode":400,"message":"Invalid instrumentation key"}]} ' in /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Exception/RequestException.php:113 Stack trace: #0 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Middleware.php(66): GuzzleHttp\Exception\RequestException::create(Object(GuzzleHttp\Psr7\Request), Object(GuzzleHttp\Psr7\Response)) #1 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/promises/src/Promise.php(203): GuzzleHttp\Middleware::GuzzleHttp\{closure}(Object(GuzzleHttp\Psr7\Response)) #2 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/promises/src/Promise.php(156): GuzzleHttp\Promi in /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Exception/RequestException.php on line 113