Innovators Program Santa Barbara applications are open!

3:10 PM Add Comment
Innovators Program Santa Barbara applications are open! -

I n 1997 UCSB Professor Klaus Schauser candidates Bernd Christianson and Malte Muenke founded the Startup Expert City that has revolutionized the way that people can have multiple locations and time zones work together. Citrix acquired Expertcity in 03 jump a long relationship between Citrix and the innovative community of Santa Barbara to start. Over the years, the Santa Barbara business community has continued with nearly 0 startups recorded to grow on Angel List today.

It is because of this dynamic community of innovators and entrepreneurs, we look forward to Innovators Program Announce Santa Barbara!

We are looking for fantastic innovation teams (two or more persons) who want to build great new products. Team successful completion of the program is a $ 20k grant .

If you have an idea for a new product for the company, from small to large companies, we are currently accepting applications until May have awarded 28 ..

Our signature 12-week Innovators Program includes core principles of design thinking, lean startup and modern management to both enable early-stage start-ups and test teams in companies quickly and validate their business models on the market.

This is a cohort-driven, Mentor-supported program. It's an intensive program, participants are expected to work hard.

open

applications until 28 May. We are the week of June 8 kickoff. More information can be found here. Apply now.

Localized Share File WebUI available

2:09 PM Add Comment
Localized Share File WebUI available -

we got Many times the request for a localized WebUI for Share File - now it's available :

, the localized version of the web interface for Share File!

All Share File tools (mobile apps Synctool and the Outlook plug-in) are already available in different languages, but the web interface only optains in English language:

the Share File Web interface (WebUI) is a central component of our Share File solution, because this is the place where most of the data exchange and collaboration happens. This is the central place to internal and external users will be working with.

Since the WebUI is THE central administration of Share File, it was not easy to do the localization and or team worked hard to have this done by. It was to make a bit easier that for the others Share File tools. But now the Web interface is coming with a new localized interface, for example, in German language:

The WebUI now supports the following languages:

  • English
  • German
  • French
  • Spanish
  • Japanese
  • Simplified Chinese
  • Korean
  • Dutch
  • Portuguese

Warning Russian:

  • based language of WebUI on the language settings of the web browser you are using. Means: If the browser is set to German, the web interface of Share File also appear as in German language. Different browsers different configuration settings to change the language. information can change these settings en masse to find on the Internet. If the language does not appear directly in your browser, try to clear the browser's cache.
  • To obtain a localized WebUI for your account, an e-mail to our support (support@sharefile.com) send and call for the Location for your account (please send your account details to the technical support - as an example: yourname.sharefile.com) activate.

Go on a journey through the Citrix Booth experience in Synergy

1:08 PM Add Comment
Go on a journey through the Citrix Booth experience in Synergy -

Every trip should yield great rewards, and in this year in the Solutions Expo Citrix has reimagined completely the Citrix booth concept for Citrix Synergy 2015 Orlando, engaging our participants on a journey that engage a whole new way with us as a company.

introduce this new way is to get involved, called The Experience Citrix Booth, took its inspiration from some of Disney, and their magic an immerse experience in building and mixed in style and tone of the worldwide Citrix Executive Briefing Centers to create a veritable showcase of solutions, including live demos that show how mobility, virtualization, networking and cloud services combine to enable new ways of working. We have reformulated the whole experience as a journey, and I hope to have the opportunity to meet you at Synergy on the experience easy to

The Citrix Booth experience includes many parts. two pavilions, questions the experts Bar, Meet the Expert-theater, fireside chat theater and a mini EBC you. But what I want to start with, is the Citrix Mobile workspaces Pavilion, sponsored by Dell and Citrix Real World Pavilion, sponsored by HP. Through some crazy alchemy, combining the two into much greater than the sum of their parts, as they invite participants Citrix solutions through the lens of their own requirements. see

The Citrix Mobile Workspace Pavilion

Rather than customers expect, which fit into their needs to determine our products, we have the concept turned upside down and reformulated it out the perspective of the customers. The Citrix Mobile Workspace Pavilion is a continuum of Citrix products in demo stations displayed by the solution that they represent to the customer.

The participants begin their journey on the Mobile App Delivery. It all starts with applications where data from the user follows and is based on the mobile device and app management, where users have the full freedom to choose their equipment, and it has to protect the full control to enterprise data. They move on endpoints, collaboration, migration and innovation, and finally delivery, answering questions along the way as How do I print and secure devices, especially in a challenging network environment? How to facilitate communication? How to simplify management and compliance to manage? How do I get it all to work together?

, On the way, the participants have the opportunity to touch and feel and experience new innovations that facilitated by a team, the work not only with products, but also in the field, so that they understand Find what customers and the challenges they faced. This exchange of knowledge between the product and sales teams pay big out for participants who can learn about state-of-the-art way to solve their challenges without having to translate their needs.

The journey takes participants through five series of demo stations. It looks like this:

Mobile App Delivery a Windows App Delivery a Workspace DeliveryàInnovationàDelivery Network

But this is not only a new arrangement of the demo stations. It's a whole new way of thinking.

The Citrix Real World Pavilion

visitors continue the journey in the pavilion by the visualization, such as solutions in their own organizations in the work is immersive environment of Citrix Real World Pavilion . Each area in the pavilion creates a realistic environment shows how Citrix and partner technologies are used to transform the results in the health, education, Banks and Financial Services s and the government. Participants can see firsthand how to use healthcare Citrix Mobile Workspaces seamlessly from patient rooms in the hospital corridors to home offices with ongoing access to critical medical applications and data, and how the students win study flexibility, research and access tools to educate move to their choice of device at any location.

of Citrix story is most powerful when it is told by our customers and experienced hands-on by the participants. Check out these solutions in action, in real environments meets a visceral need that goes beyond whitepapers and datasheets.

Take the next step

After exploring Pavilions, determine the participants what they want to do, and design their next steps on the basis of their needs; You make your own trip. The pavilion may be the first stop or the last stop, as the Citrix Booth experience offers even more areas to explore.

Would you like to speak with an expert? Drill down into the technology in a presentation at the Meet the Experts theater work packed with the most disruptive industry thought leaders, for meetings, include:

  • IoT for Dummies: Getting Started with the Octoblu stack
  • Share File integration and implementation tips
  • Insight Services for Citrix environment
  • optimization Next -gen mobile app services and support with concierge

Would you like to hear from a customer? Stop by the fireside chat theater where IT and business leaders from various sectors of their real experience in 20-minute Q & A sessions, including parts:

  • 10 tips for convincing your IT and executives that update at the time of your iT environment
  • Real world testing information security best practices
  • the University of Florida offers new ways learn to and better with Citrix
  • children's hospital of LA Citrix uses solutions for more than 100,000 children uninterrupted supply every year to ensure

Stay as long as you want: the network in one of our lounges, a deeper discussion with a team, you are the VIP, and you are always welcome

If you are traveling to Orlando for Synergy, I encourage you. to leave time to explore it thoroughly. We hope to see you there

for all things Staying Citrix Synergy -. @Citrix follow on Twitter and the conversation with #CitrixSynergy Join

Intel Inside (and everywhere) @Synergy 2015

12:07 PM Add Comment
Intel Inside (and everywhere) @Synergy 2015 -

Intel and Citrix are for years working seamlessly to deliver and secure mobile workstation experience anyone from any device.

With a wide range of initiatives in rich graphics virtualization, mobility, security, networking, cloud, and of course, the provision of virtualized applications and data on any Intel-based terminal optimization of our growing partnership continues a big win to be for customers and partners. Maximizing scalability, security and user performance benefits of existing and future IT investments.

This week at Synergy 2015 Intel is a prominent presence including a breakout session with leading healthcare provider Kaiser Permanente, a number of new technology demos and Intel sponsored Synergy TV. In addition, Intel is a session with Citrix Octoblu on IOT for the company and provide hardware for Synergy IOT Hackathon.

Demos, Demos Demos in Intel booth # 204

run Intel is a series of new technology demos on IOT with, rich graphics, mobile, security, networking, cloud, storage and of course, IA-based endpoints via Chrome and Windows. Intel is a tech Talk Theater to discuss short sessions with host with customers innovative Intel Citrix solutions.

Last year on the Synergy platform, Intel the new Xeon E3 with Iris introduced Pro Graphics offer an order of magnitude density, performance and cost savings for companies deliver rich applications and desktops enterprise users with services such as M710 HP Moonshot -Platform. Stop to see from the Intel booth the latest rich graphics capabilities of Xeon E3 with Citrix XenApp, XenDesktop and XenServer.

SYN245 Breakout Session with Kaiser Permanente

Intel is teaming with Kaiser Permanente as SYN245 the Synergy Healthcare Track part: Scaling XenDesktop and XenApp with solid-state drives healthcare on Wednesday 13 May at 14.30 in room W414B. Learn how Intel with Kaiser did radically improve the delivery of patient care and at the same time radically to bring the memory requirements and the total cost and the speed to streamline virtualized applications for clinicians and administrators.

Intel and Citrix Run with Secure IoT Platform

have with Octoblu on Intel IOT Gateway, Citrix and Intel to jointly create a secure real-time IOT platform which can be used anywhere. Find out more on Thursday 14 May at 02:30 in room W315B when Intel Technical Chris Matthieu, Citrix IOT manager for breakout session SYN0 team. IOT Understanding the Benefits for your organization

In addition, Intel is sponsoring the IOT Hackathon going all week on the synergy by providing Intel Edison and Galileo boards. The joint Intel Citrix IOT panel see immediately after the opening keynote on Tuesday morning.

Citrix satisfied Intel is welcome to Synergy 2015 and encourage all participants to make by Booth # 204 to stop the Intel team, interaction with innovative technology demos and visit one or more of the Intel breakout sessions with Kaiser and Citrix Octoblu. If you can not attend in person, you need to follow the action on SynergyTV -. Sponsored by Intel

How does Share File data loss and compliance requirements fulfill

11:06 AM Add Comment
How does Share File data loss and compliance requirements fulfill -

The data security is to prevent the top of the IT departments and often the main reason for choosing a Citrix solution. Nowhere is this issue more relevant today than are involved in discussions enterprise mobility and data exchange.

Share File, the Citrix sync and share solution for the company, makes it easy, with third parties exchanging information sometimes too easy. Users should not be allowed to share files on the whole if they contain sensitive information such as credit card numbers, personal identification information or intellectual property. For healthcare organizations, the spread is from Protected Health Information (PHI) limiting the core requirement for HIPAA.

For location-based systems such as corporate e-mail and Web proxy server, outbound information can be checked, the network edge and the trailing of sensitive data, accidental or intentional, can be prevented. But if you send a file as a hyperlink instead of a plant, the existing systems are bypassed and your security team lose visibility into what is leaving the network.

introduced

Soon after Citrix Share File Enterprise with Storage Zones, our partner Digital Guardian and Code Green Networks develops solutions the risk of data leakage by the use of Share File APIs to mitigate the access to move files to or revoke the contain confidential information. But if your security team had already standardized on another on-premise security suite, you had to either two sets of DLP policies to manage or reduce the risk of sensitive data accept via Share File nightlife.

So, we are very excited to announce that Share File now integrates with several market-leading DLP offerings to enable Content-Aware-sharing restrictions. be checked

documents stored in your local can Storage zone's third of each party DLP security suite that supports for inline content scanning ICAP, a standard network protocol. Sharing and access rights can then be adjusted based on the results of the DLP scanning and your preferences for how strictly you want to control access.

Which DLP systems are supported?

because we rely on the ICAP standard for interacting with your DLP server same as a web proxy would-Share File DLP integration with any ICAP-compliant solution work and requires no modification in policy or server in your existing security suite. ICAP-compliant solutions include:

  • Symantec Data Loss Prevention
  • McAfee DLP Prevent
  • Websense TRITON AP-DATA
  • RSA Data Loss Prevention

binding Share File security policies means your existing DLP security suite that you get a single point of policy management for data validation and security alerts. If you are already one of the outgoing top for scanning e-mail attachments or web traffic using solutions mentioned, you can refer to the Share File Storage Zones controller on the same server.

How Share File works with market -leading DLP solutions to prevent data loss

We have a flexible develops policy-based system that provides on a new granular access and exchange of checks based classification attribute that is associated with each file. The system uses DLP scan results to each version fit into your storage area of ​​each file . There are three data classifications:

  1. Scanned: OK - files that have been scanned by a DLP system, and passed OK
  2. Scanned: Blocks - files that have been scanned by a DLP system, and sensitive data contained
  3. unscanned were found: files (have not been scanned in the cases where the files in front of the DLP is configured or when the external DLP system is unavailable or slow to respond)

next sets different access and sharing of limitations for each data classification the Share File platform. For each category, select the Share File Administrator to enable the actions:

  • Whether an employee can download the file or share
  • Whether 3rd party customers can use the file download Share
  • Whether anonymous users to download the file

These settings limit the normal permissions and sharing controls available for users as their data Share file interaction and cooperation with other , For example, when to send someone a file, users could choose anonymous access settings when DLP to block it would allow them to anonymously share. But when they try to share a file in a way that prohibit the DLP settings, prevents them from platform.

This flexibility allows you to control the trade-off between security and usability, how your organization fits best. When a document is marked as sensitive, you could still allow to be sent to people outside the organization exchanges between employees, but block. Or you could take a more rigorous approach and all users lock (also the owner of the file) by downloading or sharing the file with anyone. If you block downloads, an employee would not be able to access Share File from an unmanaged device to get the file and share it with other agents.

For all files that are not scanned, you can configure the same sets of restrictions. This means Share File could take a "innocent until proven guilty" or impede the flow of information according to your appetite approach "guilty until proven innocent."

When Storage Controller Zones files sends the DLP system for scanning, it the owner of the file and the folder path contains metadata indicating where the file is located in Share File. This enables the DLP server to log events and create alerts with enough details to be actionable.

Availability

Share File DLP integration requires Storage Zones Controller Release 3.2, which will be generally available in June 2015

Meet the Octoblu IoT OctoBand!

9:04 PM Add Comment
Meet the Octoblu IoT OctoBand! -

Team Octoblu inspired by Citrix Synergy opening iBand performance and decided to open their own IoT (to provide Internet, of Things) driven band OctoBand called! The team has a rapid web application, but each allows not only OctoBand in geekspeak live audience to choose a musical instrument (eg keyboards, drums and thermins) and take it to the live band experience. Here are a few screenshots of the app Octoband:

How has this app? The web app simply creates a UUID for each instance of the loaded app and streamed Meshblu M2M instant messages for each pushbutton represents instruments and sounds. There was on stage another web app also runs on the ToneJS Meshblu client side connected to the Mac in the PA system jacked. While not exactly IoT-related, this was a cool example of the flexibility of Octoblu demonstrate the Meshblu open source messaging platform!

As predicted, sounded the OctoBand (and the audience) so terrible that it :) was incredibly awesome not just take our word, experience OctoBand for yourself!

Receiver for iOS 5.9.5 adds Citrix X1 mouse and more

10:05 AM Add Comment
Receiver for iOS 5.9.5 adds Citrix X1 mouse and more -


Hopefully you hear now that Citrix launched the X1 mouse at Citrix Synergy launched and it is available now. Remember how mouse that roars for companies . Support iPads and iPhones is this a unique Bluetooth Low Energy mouse (BTLE) with custom firmware, the full-function mouse support for specific Citrix Mobile applications including Citrix Receiver, GoToMyPC, ShareConnect and Work Desktop provides. It is now also on the Citrix Store.

for the latest Receiver for iOS 5.9.5 you need it with Citrix HDX to use sessions. Proceed to connect and enable the mouse, receiver settings and switch X1 mouse. And left-handed, you can mouse buttons switch back receiver settings.

But that's not all. With 5.9.5 you can use the receiver to external displays with either iPhone or iPad either airplay or flash Connected AV adapter.
Touch pad and keyboard

And even cooler, the touchpad 5.9.5 / Presentation supported mode that lets you switch iPad in keyboard and touchpad, when using the external display connected as AppleTV (sorry only iPads) , You can use the keyboard and touchpad along with your X1 mouse use (if one is paired). The picture shows how the iPad screen looks when connected to external display. Again, the presentation mode of display options in the settings menu.

Some good reasons not to leave home without receiver ... or X1 mouse.

Enable

Citrix Share File Announces New Features @ Citrix Synergy 2015!

8:03 PM Add Comment
Citrix Share File Announces New Features @ Citrix Synergy 2015! -

Citrix Share File leading Enterprise File Sync & Share With New Security and consumer related functions @ Citrix Synergy 2015!

Although Synergy has come to an end, the sound of our new feature announcements will Headlines! Share File companies unveiled new safety and consumer-style features of the past week, which are really the needs of businesses. Get excited people! As we continue to experience the Share File provides you and your organization to promote.

What these announcements really mean?

I have summarized each new feature and provided some additional information for your reading pleasure:

Share File integrates with popular Data Loss Prevention (DLP) systems

with a consistent focus on security and compliance Share file, announced its unique integration with customer data loss prevention (DLP) systems for document sharing is based on the DLP classification of file restrict. Companies, especially in highly regulated industries such as financial services and healthcare, the file sharing must to control, within the files to themselves based on the content. By integrating with leading Data Loss Prevention (DLP) solutions from Symantec and other files that are uploaded to Share File customers managed Storage Zones, which are classified by the Company's DLP system. Then Share File is restricting what actions can be taken on the based on the classification file.

Share File and Office365 integrations

With Share File and Office 365 together, users can edit all Microsoft Word, Excel or PowerPoint file, without departing Share File; all from the convenience of a web browser or computer. As a result of this collaboration is to make faster and easier all the time, saving time and increase productivity. This new integration also means that users no longer have to rely on their local Microsoft Office applications to edit a file; they can now file automatically saved directly from a web browser with any changes back to Share File.

Share File companion app for the Apple Watch

Edit

This new feature expands our irresistible consumer-like experience. Share File provides a workspace that moves with you, four types of devices (mobile phone, computer / desktop, iPad / tablet and now Apple Watch). Through a single application, Share File can create the customer and outline a PowerPoint on a phone, dictating together on the content with colleagues and suppliers from a laptop, speaker notes on a tablet and present directly from an Apple Watch. The Share File companion app for Apple Watch will be available at the end of Q2.

Share File Platinum Edition

Share File Platinum is a new product offering that is mid-June 2015. It provides a collaborative workspace available where everyone safe to share, track, edit and e-sign content without memory restrictions. This edition extends the customer journey around the data security include driving BYOD, document workflow and collaboration, unlimited storage and company home. With Share File Platinum You can go on with our solution and cover more of the requirements of your business with Share File. Share File Platinum contains Share File Enterprise with unlimited storage plus right signature and Share Connect.

We hope you enjoyed the conference in Orlando last week to participate to hear Mark Templeton keynotes to take a few lessons and Universal Studios last night party. We certainly have!

Thanks again for those who Citrix Synergy could attend and hear these announcements live. The Share File-Team is looking forward to more opportunities to create enabling a mobile friendly workplace and keep safety at the forefront of the mind simultaneously.

Beam Me Up Scotty We Headed HP Discover 2015!

7:02 PM Add Comment
Beam Me Up Scotty We Headed HP Discover 2015! -

Remember Warp Drive?

Today's IT transformation feels like it looked. grew the blurred image of a high-tech ship into hyperspace any enchanted shift (ok, the geeks), the Star Trek. Now we are all experiencing this shift. The way people consume information in daily life is also by the need right now for business information and results.

For companies business applications and data access on mobile, connected devices, accelerated shift that embrace this shift HP and Citrix they can to help the most productive workplace. a workplace, still maintaining a seamless and comprehensive functionality at the people who are traveling. To make this a reality with our joint solutions and services from HP and Citrix.

See it in action

June 2 -4 in Las Vegas, we will present the solutions Citrix HP Mobility Partner of year Award deserves.

If you plan at HP Discover, we invite you to stop by and talk to us at booth 3238th

Check a demo of Citrix and HP Moonshot virtual application deployment from. See visually intensive applications like SAP Manufacturing 3D modeling use the power of Citrix and HP Moonshot with Intel graphics acceleration. Or get an update on XenDesktop, XenMobile or our solutions

Take in a show

You are invited to join us .:

  • Citrix and HP discuss how to take control of the challenges of mobility in your organization Wednesday morning B1429.
  • Catch a 300-level session on Citrix and HP Moonshot for mobile app and desktop delivery, Thursday morning meetings B1935 and B3760 repeat
  • Or accessing Citrix obtained on Citrix - .. as Citrix IT most productive workplace for our employees, Thursday allows morning session B3764

Get ready with the new Wow-to-how video

Whether you goes HP Discover or want only 4 minutes preview, check the latest Citrix and HP Moonshot video.

Advantech Gets Attention 'clients with Citrix Specialist

6:01 PM Add Comment
Advantech Gets Attention 'clients with Citrix Specialist -

Advantec Gets Customers’ Attention with Citrix Specialist Designation

Citrix specializations provides a formal way to recognition of technical competence, sales strength and service delivery in key Citrix solution areas.

I am pleased that over 1,000 partners are amplified a competency designation and several important partners earn already received specialization in core technical areas. Advantech Global Services was the first Citrix Solution Advisor Specialist in to achieve all three categories -. Virtualization, Networking and Mobility

"When longstanding Citrix partner , we have above all others always aligned with the latest technologies, solutions and messaging of the company to understand and deliver," said Keith Heller, Vice President of Sales.

"If Citrix makes an acquisition or start a new solution, we review it to see if it is a good fit for our business, and if so, we are committed to the first partners to get it technically . mastering in addition, most of our people technical roles in the consulting and training. in fact, we were all together specialists. "

More financial rewards

Advantech is already coming out of the technical term benefit. With a few Networking Citrix NetScaler under their belts wins, Bright and his colleagues estimate that extra 5 percent in advance Off Ads about $ 10,000 and a further incremental 50 percent bonus in addition to the standard reward Citrix Advisor.

"Not only the financial rewards are impressive, but the discount enables us to more competition in situations where customers have budget constraints," he said.

These financial benefits particularly important because Advantech made a significant investment, additional time and resources ready to be the strict technical requirements.

Bright commented that "it was worth it" and added that experienced employees were able to pass practicum based on their

existing knowledge and know- how, newer employees have learned a lot of preparation for this challenging exam, and complete online courses in Citrix Consulting project methodology and other issues.

Citrix provides strong ROI for partners , to earn the Specialist status and these partners can benefit from increased customer acquisition and to gain a higher return.

New competitive advantages

The fact that Advantech achieved all three specializations sends a strong message to the customer. Specialist upgraded Advantech on capture the attention of customers , are outfrom generalist competitors presented their unique strengths and confirmed full scope of skills within each category technology, including , Expertise Sales and Service

"the specialist badge shows that we, the diverse skills have needs to deliver a project from end to end - the . to support best solution for identifying the business case of customers with a POC and pilot that offer technologies, implementation and support and staff training "

Heller concludes:" We can provide a complete, integrated Citrix solution with an deliver proven track record . the customers want the simplicity of integration rather than a collection of point products that can not work together, which is the situation with VMware, for example. "

to Specialist Step up

Advantech shows the commitment and investments to several designations earn. As a result, Advantech can exploit benefits to inspire the gamut of financial rewards to customers and win more deals run. Your partnership with Citrix is ​​highly appreciated and I look forward to grow their success.

I encourage other partners, your profession to start travel.

Citrix partner, visit Citrix specialist Citrix Partner Central to get started. If you are not already a member of the Citrix Partner Network, now is a good time to be partners


Stay connected -. Follow @CitrixSpecial for the latest news on Citrix specializations and follow the Citrix Partner Network on LinkedIn and @CitrixPartners on Twitter.

Cloud Economics 101

5:00 PM Add Comment
Cloud Economics 101 -

The elasticity and economics of deployment of XenApp on Microsoft Azure

If you 've around the IT block have been, as I have then you probably remember your first web server, mail server, or even to set up an FTP server. Mine was an on-site MSMail server that we used for internal communication. I have to shake my head and laugh when I think of this young System Engineer in the server room to sit with all the setup disks fiddling and tripping over CMD to obtain a service requesting that we take for granted today.

"Back in my day we did not have cloud services. We had 20 disks, 86 processors and an 8-band disaster recovery plan!"

with the advent of cloud platforms like Microsoft Azure, more and more IT services that we have traditionally used to Prem increasingly attractive in a hosted model. And Microsoft Azure provides a reliable and flexible cloud platform, applications are quickly deployed through Microsoft Managed Data Center allows. Azure provides monthly service level agreements (SLAs) of 99.95% for the services continuously available to satisfy stringent specifications.

Click here to switch to Microsoft read the XenApp Azure Whitepaper.

But it is not just Microsoft to be on the hook for your up-time. I like to see on the elasticity of demand and the economy of scale. Ask the IT manager for a large university are located. Each semester you have thousands of new students, of which any additional requirements put on your desktop and application requirements. But you also lose even thousands of students, hopefully at the end, but we all know the reality.

#DoubleSecretProbation (Can you name this film?)

"Back in my day," would you countless hours reclassification desktops and applications, purchasing new resources and Troubleshooting hardware and software problems to spend. Instead, to save easily provision desktops XenApp and App workloads on Azure cloud services and infrastructure costs today Admin and instead let Microsoft dynamically add or reduce computing power based on demand. The elasticity!

And with the advances in Citrix XenApp® 7.5 Management and scalability, a rich multimedia experience over any network and self-service applications with universal device support on a wide range of mobile devices-including laptops, tablets , smartphones, PCs and Macs. XenApp provides technologies session and application virtualization, which makes it easy for customers to manage centralized applications and the optimum combination of local and hosted delivery models apply to user requirements correspond.

Hosted Desktop sessions can be used by the Citrix XenApp 7.5 or Citrix XenDesktop 7.5 software when pooled virtual desktops are also needed.

desk and apps come with the ease and simplicity of daily power? Software-as-power is delivered, what we preached in 01 and it was just a whole lot easier.

BTW, what was your first on Prem IT Service which now hosted cloud? Write it in the comments.

Click here a session of TechEd EMEA on XenApp on Azure. see

DNA can tell you a lot about your application

3:59 PM Add Comment
DNA can tell you a lot about your application -

I crazy comparisons and statistics love to see, especially when it has nothing to do with science.

Deoxyribonucleic acid (DNA)

  • If end-to-end created, all DNA in your body would from Earth to Pluto and back to earth (too bad Pluto no longer a planet.)
  • people with all the other 99% of their DNA content (makes the 7 degrees of separation game kind of pointless.)
  • If you could tap 60 words per minute, eight hours a day, it would take about 50 years to enter the human genome (Well, I can type 61 words per minute ).
  • people about 40-50% of the same DNA as carbon (I love carbon not, which means that I do not like half of me).
  • Back in 01, it cost $ 100 million to map the genome, while decreased the cost to around $ 6,000 in 2014

the DNA to understand, we can better understand how something works and how it interacts with other things. However, to the DNA are trying to map is not something you would ever think about doing by hand, it would take a lifetime, and prone to many errors to be (to be plus it would be a pretty boring life). By understanding how something works and how it interacts, we can take preventive measures.

Apps (Hello World)

  • There are approximately 0,000 lines of code in a pacemaker
  • the space shuttle containing 400,000 lines of code
  • the Hubble space telescope has 2,000,000 lines of code
  • During Microsoft office 01 25.000.000 had lines of code, office 2013 has grown to 45 million lines
  • Guess what she has the same number of lines of code than Windows Vista? How about the Large Hadron Collider. Each with approximately 50 million lines of
  • And from the things, it is reported that the United States healthcare.gov site has 500,000,000 lines.

As we all know, Windows XP upgrade to 7 to 10, Windows 03, to 08 by 2012 Office 2010 until 2013-2016 is not something we do overnight. Just look at the amount of code that is involved in these things. We often spend months and years discussing if we should upgrade, then how should we update. We do this because it is not easy, because we have a nagging fear that our applications might not work, and for good reason considering Windows 7 had 40 million lines of code. We have bitten too many times by the compatibility bug, so we are willing to forego the added value of the latest versions, because we no longer want to experience that nasty bite.

[1945004Dies] is why your application to understand DNA is so important. For this reason, there are a few sessions at Citrix Synergy were 2015, which focused on AppDNA

  • SYN232. Get the most out AppDNA App migrations and updates
  • SYN320: never let me down: the future of XenApp and XenDesktop upgrades

to get you started, we have set "together demonstrates the following video, what you do with AppDNA

Therefore, for you, my question is, why have not you looked AppDNA to help you with Windows upgrades, XenApp upgrades, application upgrades "

DNA source ?: http://chemistry.about.com/od/lecturenoteslab1/a/10-Interesting-Dna-Facts.htm

Code Source: http://www.informationisbeautiful.net/visualizations/million-lines-of-code/

Genome Mapping: http://en.wikipedia.org/wiki/Whole_genome_sequencing

Off the virtual spirit of virtual Feller
Follow @djfeller

Cloudbridge virtual WAN won the special prize "Best of Show Award" at Interop Tokyo 2015

2:58 PM Add Comment
Cloudbridge virtual WAN won the special prize "Best of Show Award" at Interop Tokyo 2015 -

The Cloudbridge virtual WAN at Interop the special prize in the enterprise networking SMB won Category Tokyo 2015 Best of Show Awards.

The Best of Interop Awards recognize exhibitors for innovation and technological advances in the various categories of technology categories ~~ POS = HEADCOMP. where winners announced Interop Tokyo 2015, the court held 10-12 June at the Messe Makuhari.

About Cloudbridge virtual WAN

The Cloudbridge virtual WAN technology binds logically multiple MPLS and broadband paths a single logical path. With WAN Virtualization, Quality of Service (QoS) rules, path selection and traffic shaping can that high priority applications always perform well to ensure are applied. The virtual WAN can also make sure that all the bandwidth is fully utilized on all paths. In addition, to protect against network outages critical business processes. Even though remains only one way, the most important applications are switched in milliseconds and uninterrupted operation continues. No discernible impact on end-user productivity For more information about Cloudbridge virtual WAN, please Cloudbridge product page.

About Interop

Interop is the leading global business technology event with the most comprehensive IT Conference and Expo available, Business and technology leaders attend Interop to date information available key technologies to obtain, learn about the latest trends and meet with leading venders. More information on this event, see interop.jp

Silent Circle of black is now Citrix Ready

1:57 PM Add Comment
Silent Circle of black is now Citrix Ready -

Designed by Silent Circle, black puts privacy first. PrivatOS, black of the custom Android operating system, comes with no bloatware or hooks to support and puts the control over in your hands your data back.

The black SecurityCenter gives you fine-grained control over app level permissions, so you decide what kind of access to individual applications to get your data. And with Spaces, you receive multiple "virtual" phone during the performance, only one device. Use spaces to house and work life separate, or create a child-friendly environment on the mobile phone - the rooms that you create and maintain up to you are [1945005[

Silent Phone and Silent Text enter integrated access encrypted voice and text communication and file transfer.

feel With the seemingly endless headlines about data loss and theft, your privacy can hurt overwhelming. Therefore, we have black creates a secure base for your professional and proprietary communications to be. It combines a fortified Android operating system is developed with a range of treatments to keep your business and personal information private.

Want to know more? Learn all about black at https://blackphone.ch/phone/ or https://home.silentcircle.com/

What was new just released in 3.0 Storefront

12:56 PM Add Comment
What was new just released in 3.0 Storefront -

Storefront 3.0. Meanwhile, hopefully you have learned that the headline feature for this version to provide a uniform user experience across all receivers available and improving adaptability.

If you want to learn more about it, please call to Richards blog article here.

But back to publication! Today I want to call all the other new features in storefront available 3.0.

Please note that you must import the storefront PowerShell modules before you can run a PowerShell commands in this article. The following code snippet does this for you:

 $ dsInstallProp = Get-ItemProperty -Path HKLM:  SOFTWARE  Citrix  DeliveryServicesManagement -Name InstallDir $ dsInstallDir = $ dsInstallProp.InstallDir & $ dsInstallDir  ..  to support scripts  ImportModules.ps1 

Classic receiver experience

to help you transition to the new Unified receiver experience smooth, storefront 3.0 constitutes existing green bubble UI (as the classic receiver experience called). In this way you can take full advantage of the new features immediately, and update the user experience when users are ready.

If you perform an in-place upgrade from 2.x to 3.0 Storefront, the user interface for the existing Receiver for Web sites is considered the classic green bubble UI remain. When you create new recipient for sites after the upgrade or reinstall will see in the new unified user interface users.

to the new unified user interface for an updated website allow the Storefront management console, by selecting the Disable Classic Recipient Experience Action in the right pane for the selected recipients for the site.

The above action alone is only the uniform user interface for your Web allow users. To the unified experience for the user with the latest native receiver (eg Receiver for Windows 4.3 and Receiver for Mac 12.0), you can also configure the Store.

  1. Select the Stores node in the left panel
  2. Store Select want to configure in the central region
  3. Select the Ask Uniformly as Standard action in the right pane
  4. [1945015Wählen] Set the Unified receiver experience as a standard for this store in the pop-up dialog
  5. Select the receiver for Web -Site for native receivers from the drop-down list to use
  6. Select OK

Google Chrome support without NPAPI

Google Chrome on Windows and Mac is fully supported out of the box without NPAPI in storefront 3.0. To use this service, you need to update both storefront and receiver. Receiver for Windows 4.3 and Receiver for Mac 12.0 support this new technology. You can learn more about the technology and user experience from my previous blog article here.

No More Editing Hosts file

Previously as mentioned herein, Citrix recommends that you change the hosts file on your storefront server, the Receiver for Web to ensure always speaks to the local storefront server instead of the load balancer. In Storefront 3.0 we use a new feature in the .NET Framework 4.5 loopback communication between Receiver for Web and the rest of the storefront services implement. This is configurable using PowerShell cmdlets Set-DSLoopback , the syntax is

Set-DSLoopback [-SiteId] [-VirtualPath] `
[-Loopback] [[-LoopbackPortUsingHttp] ]

the valid values ​​for loopback are:

  • on - This is the Web-sites receiver for new default is , Receiver for Web uses the schema (HTTPS or HTTP) and port number of the base URL, but replace the host part to the loopback IP address to communicate with storefront services. This works for a single server deployment and implementations with a non-SSL conclusion Load Balancer
  • OnUsingHttp -. Receiver for Web uses HTTP and the loopback IP address with storefront to communicate services. If you are using an SSL conclusion Load Balancer, you should choose this value. You must also specify the HTTP port if the default port is not 80
  • Off - This turns used for loopback and Receiver for Web storefront base URL to interact with storefront services. If you perform an in-place upgrade, this is the default value to avoid disrupting your existing deployment.

For example, if you use an SSL conclusion Load Balancer, the IIS configuration uses 81 port for HTTP and the path of the Receiver for Web Site / Citrix / StoreWeb, you can run the following command to configure the receiver for Web Site:

Set-DSLoopback -SiteId 1 -VirtualPath / Citrix / StoreWeb `
-Loopback OnUsingHttp -LoopbackPortUsingHttp 81

Please note that you disable loopback, if you want to use any web proxy tool like Fiddler, the network traffic to detect between receiver for Web and storefront services.

delegating authentication to the back-Provider

Storefront 2.x always communicates with Active Directory to authenticate users. This requires that the domain hosting server storefront has at least one way external trust to the domain that the backend hosting XenApp / XenDesktop farms / sites. This may not be possible in some implementations.

Storefront 3.0 provides the ability to authenticate to XenApp / XenDesktop farms / sites to delegate. This can be enabled by running the following PowerShell commands. Please replace the storage and authentication virtual paths appropriately.

set
 ## some variables relevant for your deployment SITEID $ = 1 $ StoreVirtualPath = "/ Citrix / Store" $ AuthenticationVirtualPath = "/ Citrix / authentication" # change auth service using XML Service auth domain-auth set DSXmlServiceAuthentication -SiteId $ SITEID -VirtualPath $ AuthenticationVirtualPath $ fs = @ (Get-DSFarmSets -IISSiteId $ SITEID -VirtualPath $ StoreVirtualPath) | where {$ _. Name -eq "default"} - Update DSFarmSet -IISSiteId $ SITEID -VirtualPath $ AuthenticationVirtualPath -Farmset $ fs 

are treated as all desktops applications treatment

desktops unlike applications in the storefront / receiver. They are placed in a separate tab desktop and in the case of Receiver for Web, they are not associated with workspace control. In some applications it is desirable to treat desktops applications so that they are put together with applications and get connected within the workspace control. With Storefront 2.x, you must Add TreatAsApp keyword to all published desktops to achieve this effect. This can be error prone if you just want all desktops deemed to be applications. It also lacks flexibility, if you want a memory to deal with desktops applications, and to preserve the other to the desktop behavior. Storefront 3.0 enables you to configure without the need to add the TreatAsApp keyword to all published desktops at store level treatment of all desktops and applications. This is configurable to the PowerShell cmdlets. The syntax is:

Set-EnhancedEnumerationOptions [[-siteId] ] `
[[-storeVirtualPath] ] [[-treatDesktopsAsApps] ]

for example, if all desktops is as applications for a deal at / Citrix / shop for treating want, type the following command, which would configure for you:
Set-EnhancedEnumerationOptions 1 -siteId `
-storeVirtualPath / Citrix / shop -treatDesktopsAsApps true $

service Integrated monitoring for NetScaler

NetScaler load balancer you can see a monitor, the health of the storefront services (see the Setup screen shot of the NetScaler Admin UI below).


For Storefront 2.6 or earlier, you have to install a separate add-on package on the storefront server to support NetScaler monitoring. This will now be integrated into Storefront 3.0. It is installed by default and activated. You can use PowerShell commands to change or disable this service, the settings of that service.

to check the URL for this service, you will use the Get-DSServiceMonitorFeature . By default, this service uses HTTP and listens on port 8000. You can change this scheme to different and / or port of cmdlets with Set-DSServiceMonitorFeature . For example, if you use the service HTTPS and heard to change to port 444, you can run the following command to configure it

Set-DSServiceMonitorFeature -ServiceUrl `
https: /. / Localhost :. 444 / storefront Monitor

to remove if the deployment by the Remove-DSServiceMonitorFeature cmdlets

not use NetScaler Load Balancer You can use this service

Advanced Store Customization SDK

storefront offers a Store customization SDK for advanced business logic adaptation. If you are not familiar with it, you are referred to here for more details. There are a number of enhancements to this SDK in Storefront 3.0.

  • A new adjustment point is during the introduction process added shortly after the broker the VDA address assigns, but is activated before NetScaler Gateway. In this way you can gateway change which are used for the HDX connection to the context data, such as the client IP address or VDA IP address, etc.
  • Several new features, such as to add gateway information and HDX introduction properties data to the adaptation context further information available, the customization to support decisions.
  • The service request matching point pre-XML extended extended multi-site aggregation, such as changing the equivalent farm sets to support the aggregation group and the order of operations may be used for the launch.


offer more flexibility for adaptation is the Storefront web API extended to allow specified custom HTTP headers that are passed on the memory-matching points. For example, you can Receiver user interface to provide user session enhance preference and they happen in the store matching points to change sent to the XML Service or the ICA file requirements. This custom HTTP headers to be passed to the store matching points, you must add the header to the white list in the web.config file under the Receiver for Web site.

  1. Open web.config with your favorite text editor
  2. localize ...
  3. Add a new section named forwardedHeaders the specified custom header, for example,
    [1945019[
    ...





    Replace the values ​​of the header name with your actual custom header name.

@IngmarVerheij - Setting Up a Persistent WAN Emulator

11:55 AM Add Comment
@IngmarVerheij - Setting Up a Persistent WAN Emulator -

Now that FrameHawk released (we get a whoop whoop!?!) We can make all our hands dirty this amazing piece of art exam , FrameHawk help you serve users (or subscribers as we like to call it) of places where the connection is not as reliable as we would like. When we are faced with lossy compounds generally obtained as packet loss, this extension of the HDX ensures users a great experience in a very nice meeting.

To the product works as expected, or to demonstrate the skills you need to test, test and test some more. Since most network are highly reliable (with 0% packet loss) exam is a challenge, so we need a WAN emulator that can introduce certain WAN properties. In the past I have WANem Tata Consulting, which is free available here: http://wanem.sourceforge.net/

In this blog I'll be by installing WANem in a XenServer environment Foot , and the configuration of the machine, the VDA Hosting

This guide is based on the Citrix Demo Center environment (Citrix Workspace Suite - MR1.1).

Virtual Network Topology

Let's start by explaining what we are trying to do, before we dive in fun.

, the goal that we have, the connection between the client is to simulate (with the Citrix Receiver) and the end (with VDA). This is the only way in which we want to change the properties (eg. As introduce latency, packet loss), not the rest of the network. So we do not want to change the way to XenDesktop Delivery Controller or the Internet as the user experience would affect in an unrealistic way (there is usually no packet loss on the LAN).

of ICA traffic is processed by the WAN emulator, the other (eg. Internet) traffic not.

In the example topology client Citrix Receiver running to connect to a Windows desktop running XenDesktop VDA with FrameHawk. All traffic when flowing through the Citrix Receiver on the Citrix NetScaler *) to the VDA. The return traffic from the VDA is represented by the WAN Emulator (WANem) where latency / packet loss is introduced. Or if the client on the same network is the NetScaler is not used.

*) Requires UDP support for NetScaler Gateway (not available at the moment of writing this article)

create WANem Virtual Machine

in this step, we will want to create a new virtual machine for the WANem system in XenServer.

1. Create a new VM
2. Select the Other install media template. Click Next
3. Name the VM WANem . Click Next
4. Select the WANemv2. 3.iso from the ISO library. 5. Click on Next
Select the server where the VM will be placed. Click Next
6. defaults maintained 256MB is sufficient. Click Next
7. In a virtual disk (Name: WANem Size: 20GB ). Click In
8. Check a virtual disk is mounted. Click Next
9. Remove all other networks, so that only the internal remains net. Click Next
10. Make sure that the Start the new VM automatically is checked. Click Create Now

Install WANem

In this step we will install and configure WANem in XenServer VM.
WANem can be used directly from the ISO, but lost the configuration after each restart. In this step we will install the virtual disk to make sure we move a permanent facility will have.

1. Press Enter boot
2. Anser the questions

Have any interface to be configured via DHCP: y
UNIX password ***** (does not matter, is never used)
Enter the following commands:

 exit2shell knx2hd 

3. Press OK
4. Press OK
5. Select . 1 partition and press OK
6. Select hda QEMU HARDDISK (21.4748 GB) . Press Next
TIP: Use SPACE
7. Select 2. Presentation 1 . Press OK
8. Press Yes
9. Press Yes
10. When the installation still complains there no found disk (the disk partitioning), then QUIT to complete the installation and start it again, by issuing the command: knx2hd
11. Select 1. Configure installation . Press OK
12. Select debian . Press Next
13. Select / dev / hda2 . Press Next
14. Select ext3 . Press Next

The accounts created under won 't
15. Enter a name (for example, Citrix ) are used. Press Next
16. Enter a user name (z. B. Citrix ). Press Next
17. Enter a user password (z. B. Passw0rd ). Press Next
18. Enter the password again . Press Next
19. Enter an administrator password (z. B. Passw0rd ). Press Next reenter
20 the administrator password. Press Next
21. Enter the FQDN of the host name (eg. WANem.citrix.lab). Press Next
22. Select mbr . Press Next
23 .Select 2. Start the installation . Press OK
24. Press Next
25. Wait until the installation is complete
26. Press No
27. Press OK
28. Enter the command reboot Wait until the system CD to remove, she asks. Remove the CD. Press Enter
29. Wait until the engine is started. Login with root / password (the password you chose in Step 19)
30. Enter the command: update-rc.d apache2 defaults
31 Enter the command: visudo
32. Add the following line in the sudoers file: www-data ALL = (ALL) NOPASSWD: ALL
TIP : move on the line where you want the text, press , add the text and press save the file by pressing <:> and simply add the command: wq
34. Enter the command ifconfig and note the inet addr. of system.eg. 172.30.0.155

Configure static IP

In this section, we make sure that the WAN emulator always receives the same IP address. This can be achieved in two ways :.

a) A static IP configuration
b) The DHCP lease to a reservation conversion (not really a static IP)

a) Static IP

1. Log on WANem console with the root account. Enter the command: vi / etc / network / interfaces
2nd line Replace ...

 iface eth0 inet dhcp 

... with the following ...

 iface eth0 inet  static  address xxxx netmask xxxx Gateway xxxx 

, by saving the file followed by <:> and entering the command: wq
3. Start to take over the system, the IP change, by issuing the command: reboot

b) DHCP reservation

1. A compound having the machine that DHCP and start the DHCP console
2. Select the client IP address that you wrote earlier in this address provides leases section
3. right-click the address and choose In the reservation

5. wait until the lease is converted to a reservation

route Configuring on Windows computers

In this section, we will configure the route of the Windows machine (the FrameHawk hosting activated VDA) back to the host name, so he WAN emulator is over.
to a static route to NetScaler IP (NSIP) and / or the host machine's IP address by adding we ensure that only ICA traffic through the affected WAN emulator (and not on the road, z. B. Internet traffic).

1. Connect to the Windows machine that installs the FrameHawk VDA
2. Open a command prompt as an administrator
3. Enter the command: [1945003Add] route 255.255 mask .255.255 -p
where
a) the IP address of the SNIP NetScaler Gateway (if NSGW port) and / or
b) the IP address of the host computer (when connecting directly / via VPN)
and , the IP address of WANem system that you configured (z. B. 172.30 .0.155 )

configure WANem

In this section we will configure WAN emulator add latency and introduce packet loss. WANem managed by a web-based management console.

1. Open a browser on a machine that is in the local network connect tohttp: // / WANem /

TIP: Name of uppercase and lowercase letters is
2 Click. on Extended Mode
3. Click Start There is only one NIC (eth0)
4. Change the Delay (latency in ms) and loss (packet loss in%) to a desired configuration click on settings
5. after the test, click settings reset PS to return to a normal situation

: If desired, you can configure the WAN emulator through PowerShell - http: / / www. ingmarverheij.com/configure-wanem-via-powershell/.

Close

By now you know how WANem, a virtual appliance that including packet loss to install the features of a WAN and configure emulated , This guide shows you how to install the WANem in a XenServer VM, so that the configuration is persistent (instead of an ISO-boats and changes after a reboot to lose) and how the movement of the VDA to the Citrix Receiver is on WAN emulator forwarded.

For the record, I am not an expert in WAN emulators even suggesting this is to install the only or best way WANem.

Happy WAN emulation!

@IngmarVerheij

XenDesktop Virtual Delivery Agent Technical Preview for Windows 10

10:54 AM Add Comment
XenDesktop Virtual Delivery Agent Technical Preview for Windows 10 -

Today is an exciting day!

As a product manager on the Windows App Delivery team, I am pleased a XenDesktop Tech Preview Virtual Delivery Agent (VDA) for virtual desktops and remote PC access to Windows 10 Enterprise insider proclaiming preview.

Citrix employees with mobile access to 5 in empowering (soon to be 6) had generations of Windows applications a long-standing partnership with Microsoft. In this early Release Preview, the first steps towards a mobile experience with Windows 10 are only at the beginning.

As new and existing XenDesktop customers on Windows are considering migration 10, the mobilization of the desktop experience HDX is the key to virtual and physical installations. This virtual delivery agent will help you start on this path. The Windows 10 Excitement has been increasing steadily, and our XenDesktop continue with it applications, but also to grow.

In May at Citrix Synergy, Vipin Borkar (Product Manager for Windows receiver) and I co-presented on 10 windows, share the early history of Windows 10 with XenDesktop for embrace. On July 8, we announced that our newest Receiver for Windows 4.3 for Windows 10. is compatible If you missed the announcement, check out our blog here.

Also at Citrix Synergy, I had the pleasure of presenting together with Jason Robinson on remote PC access. A good way to make your mobile experience for your existing physical desktops start now and immediately use the XenDesktop platform.

Download Windows 10 Technical Preview components

We have collected the Tech Preview components here on a single page for download convenience.

Based comes to overwhelming customer feedback, the VDA as a separate download, similar to the standalone VDA published on XenApp and XenDesktop 7.6 earlier this year (for more details on this blog). This separate VDA was the No. 1 request of our customers, in order to give a grainy feeling of control and offline delivery. It is the first step we need to take care of our customers in providing easier delivery system of the VDA.

For new and existing XenApp customer without authorization XenDesktop license, we include a trial license, so experienced Windows 10 HDX today. XenApp customers already recognize the powerful benefits of applications in a virtual model of the migration, the migration seamlessly accelerates to the Windows 10 platform in your enterprise.

One more thing. In addition to the early release 10 Windows Preview we have included additional new / updated features as part of the download as described in the Technical Preview Administrator's Guide: Universal Print Server in Windows Server 2012 R2, improved graphics tablet and signature device support, video evasion prevention strategies and smart card virtual channel improvements.

Feedback and poll

We invite feedback in our Technology Preview forums to post to this early Release Preview and let us know about your organization's plans for Windows 10 know this short survey.

to Windows 10 is an exciting journey for all of us, and we look forward to speed up, to hug and to mobilize to launch Microsoft's latest platform with this preview.

Enjoy the preview!

transfer

Three Steps to Windows 10

9:53 PM Add Comment
Three Steps to Windows 10 -

Who really controls upgrade to Windows 10?

I think we all know that on 29 July Microsoft is its latest upgrade publish -Windows 10 as a free download. This is free for all consumers copies of Windows 7 and 8.1, licensed or not! And there was much rejoicing.

See the production of Windows 10 Hero wallpaper.

And that's just the beginning. In case you missed it, 10 the cadence of future upgrades to Windows will often happen much more.

When I for enterprise customers I talk about the same comment and ignored. "The free upgrade is for the consumer devices, it is not my corporate impact devices."

Ah, yes, but it works.

You see, in the past few years we have to promote the idea of ​​a BYO society. And it worked! Employees are accessing corporate assets from personal devices all the time, at any place.

According to Computerworld, more than 350 million devices on Windows 10 from July 29 to be upgraded, 2016. So if a company's IT is ready 10 or not for Windows, we will staff it have as early as 29 . July, 2015 In the following three simple steps are to help, support and migration strategy create

step 1 -. Business Continuity

could provide 7 virtual desktops and applications to a business as usual to obtain Environment Corporate supports Windows. Provide your employees with a link to the Citrix Receiver and publish Corporate supported desktops and applications via XenApp to download. The employee receives the benefits of Windows 10 on their own device on their timeline, but you have no interruption in maintainability. This is especially helpful if you still have your Windows application to do compatibility testing

Step 2 -. App Compatibility for Windows 10

Speaking of app compatibility testing for Windows 10, if you have not done so already, the time to break the mold of your old testing process. We have to place a group of very expensive engineers in a room and to install them for weeks and months at the end of each and every business application and test. It was an exhausting process complete with batch scripts and command line to automate as much of the testing process as possible. And believe me, that was not a space you wanted to go to hot summer.

Today we can use AppDNA. Just show AppDNA to your application libraries and it is the DNA of any application and create a report of what applications are compatible with Windows immediately and which applications are not read. It will also give you an option, certain applications to shim it to overcome all the hurdles Windows compatibility. Now your app compat projects can take minutes instead of months

Step 3 -. Flip the switch

Who remembers the AB switch box
[?

If you're like me, then you can remember a do Windows deployment and the new operating system ahead of the launch of the device, so that employees could get adapted to the new system. The look, feel and function would all need to be checked by the users and accepted. It used to terminate disturbing. Today I am not so sure we need to do this with the modern employee. I think that to take the majority of our users quite naturally to a new version of Windows.

have said that I "10. Taste of" still the idea of ​​giving employees a support your Windows 10 golden images stand it up on XenDesktop to publish to your test group, and leave it to the new Windows are acclimatised to stay while productive on their existing Windows desktop. Look at it like dating before you get married without the embarrassing end date kiss. It is a time of intimacy.

But I also support the concept are your golden images and applications on Windows 10 and then "flipping the switch". You can through the publication of applications and desktops in a progressive manner to departments to do a rolling deployment, publish, more and more employees as you wish. Or create your desktops and install your applications and a massive publishing Party. Go all out on New Year's Day, for example. Fill with party hats and streamers and inappropriate use of the copying machine.

Depending on what your method, XenApp and XenDesktop make this migration to Windows 10, and thereafter each version, a simple and manageable project.

[1945003dieTage] when migrations in the hands of corporate IT were, are long gone, as are the days when migration was measured in years an insurmountable project, its schedule were

HFG / light reading .:

Windows 10 receivers blog Vipin Borkar

Windows 10 VDA Tech Preview of administration Carrejo

Here's how to XenServer 6.5 SP1 Training Citrix Be the first

8:52 PM 1 Comment
Here's how to XenServer 6.5 SP1 Training Citrix Be the first -

Citrix XenServer 6.5 increases the speed, scalability and performance of enterprise-class desktop, cloud and server virtualization through extensions watched network, storage, graphics and management. The release of SP1, a number of new features and enhancements, including a new 64-bit control domain (dom0), nVIDIA vgpu scalability improvement and a significant network and storage performance improvements when.

looking to learn about XenServer 6.5 SP1, I've got good news for you.

A brand new course of Citrix Education that teach all that! Skills you need XenServer 6.5 SP1 must be configured on the way and manage Topics in the class treated:

  • Creating and Virtual Machines administration
  • Install and configure XenServer
  • managing the XenServer environment
  • configuration of resource pools
  • configuration for high availability / disaster recovery
  • Creating and managing networks
  • memory configuration
  • Configuring Security
  • determination dimensioning and optimization
  • Troubleshooting the XenServer environment

After release, the only five-day course via the Citrix Learning Center. Students can attend a class held in Ft. Lauderdale the week of August 24, or a class held in Chalfont, UK in the week of 14 September. , both classes are practically visited , if you can not make to it Ft. Lauderdale or Chalfont.

added bonus!

will take place at each course Citrix Learning Center a roundtable discussion with course architect Martin Zugec feature. Martin was with Citrix products is working since 06 and comes to formation of Citrix Consulting where he led numerous implementation projects around the world.

Read Martin's biography and your seat for

XenServer 6.5 SP1 Early Access Course

Securing the IoT Gateway

7:51 PM 3 Comments
Securing the IoT Gateway -

Welcome to another in a series of articles from Citrix Labs R & D staff to the subject written Internet of things (IOT). If you have not discovered the previous posts, here you can catch up and read about how we define , the role of the Internet of Things in the Citrix software defined workplace identifies potential security problems , described a simple framework IoT and focused on the device layer security .

to investigate in this issue, we move to the IoT stack and the gateway level.

As you can see illustrated in simplified IoT model below, the gateway layer serves the important role of connectivity and messaging between things, people and cloud services. In most cases today, the primary function of the IoT gateway protocol translation of low-power sensor networks with the Internet or LAN.

But to predict all the big names in the industry, a massive number of IoT devices arriving in the company over the next 5 years.

So in addition to simple protocol translation, intelligent IoT Gateways are needed in the company to handle the sheer volume of IoT devices and the messages communicated between them. The gateway is closer polices the local processing of automation rules at the network edge, device management functionality, and the enforcement of network access control. Connect only by sensors and IoT devices to your network, you can also enable the option information about the physical world of the merger (sensors) and the ability to work with the world to interact (through connected devices) with the mission-critical applications on the you run to your business.

, for example, when fully implemented, will the Internet of Everything each company allow real-time tracking of their vehicle fleet with their shipping and logistics software to integrate or use automated inventory tracking to their asset management solution. Of course, all this functionality must be performed safely, and this article deals with some important security requirements of IoT Gateway.

Gateway Layer Security

Communication in the IoT will usually have a combination of private and public networks, the network protocols is to ensure course important and the first thing you should consider. If for this film to think about security, remember the basic triad CIA Security. The communication between things, the gateway, and the cloud service must cryptographically secured to preserve confidentiality, integrity and authenticity. Securing the network communication in this way with the technology as AES cipher suites and TLS / SSL encryption, is well understood area of ​​IoT security, because we have to do it for years for applications such as e-commerce on the Internet.

Unique Challenges

Even with mature technology for securing network communications, the Internet of things is different from the Internet of servers and PCs and so presents some unique security challenges. Many of these challenges relate to the fact that the Internet of Things have limited computing power equipment and no graphical user interface for easy configuration.

End-to-end encryption

As noted above, a primary role of the gateway layer bridging a lower power sensor networks, usually from a low-power radio standard such as ZigBee or Z -Wave, Wi-Fi or Ethernet. This is a critical function, as we expect many devices from many manufacturers, several different protocols speak in the company to appear. The IoT Gateway serves as a common point of communication and control between the myriad devices.

to maintain a challenge for the IoT Gateway confidentiality while this protocol translation preforms. Although both ZigBee and Z-Wave support encryption protocols, the gateway must generally decrypt and re-encrypt the payload, if a network protocol to translate into another. This protocol translation makes it more difficult to observe confidentiality, since it is not true end-to-end encryption; Communication between agents is protected, but not the intermediary itself. If the attacker IoT gateway to compromise were not only the transfer of data through the gate in danger, but the control over the physical things are at risk associated with it as well.

For example, research from Veracode conducted found 6 common home gateways:

"... widespread problems of communication between connected devices and the manufacturer management server secure in the cloud. Five of the six devices were tested, were prone to so-called "man in the middle" attacks that it will modify an attacker on the same network as listen to a device, and forward traffic between the device and would allow its cloud-based service. Many of the tested device is not properly validate the TLS or SSL certificate that traffic to encrypt, Creighton said. "

One way this issue mitigate is true to implement end -to-end, application-level security. with this strategy, the messages in an encrypted manner that only the unique recipient of the message to decrypt possible and not think anyone in between. In other words, keep only the IoT device and receiving cloud service the cryptographic key and the gateway acts as illiterate messenger, along messages over, it can not decipher. The gateway is still its protocol translation can not perceive, it can only read the news not as they passes from one network to another.

Secure Onboarding

Secure Onboarding is the process of a configuration IoT device for the first time, and it for the management of the application. In security model Resurrecting Duckling for IoT devices, this is the method the duckling for embossing (device) with an encryption key generated by the mother duck (IoT management service). The IoT Gateway plays an important role in the onboarding process, because it is the mediator between the IoT device and administration competent service. If you install a device for the first time, all communications and encryption keys are the gateway to happen and must be protected against eavesdropping and man-in-the-middle attacks.

We know that the encryption effectively IoT communication addressed confidentiality, but the weak link in the chain encryption security is often to key management practices and how key onboarding process to be replaced during the device. A research paper entitled Review of the Safety of Z-Wave wireless protocol shows how, although the underlying Z-Wave protocol has strong 128-bit AES encryption, improper implementation of device manufactures can cause serious security holes.

"with this tool we have an implementation vulnerability in Z-Wave-key exchange protocol shown that only by knowing the Home and node IDs of the target device, the full control over a target Z- could be used to take Wave door lock both, can by observing the Z-Wave network traffic over a short period are identified. "

is the good news from this report

"We have received the details of this vulnerability to the vendor who has a security clearance of the Z-Wave specification and SDK to ensure conducted to cover a correct handling of the discovered vulnerabilities. has finally Sigma designs measures taken to prevent such implementation deficiencies standard to reach the market in the future, by providing additional security test cases for certification test suite. "

The Allseen Allianz AllJoyn IoT is due beautiful has and great documentation as they approach safely onboarding and cryptographic security in the ecosystems.

firmware updates

stressing the need for reference implementation vulnerability Z-Wave in IoT device an example above firmware updates perform on IoT devices in the field. As many devices IoT Gateway in the way UI or internal memory do not have much, an external application and Gateway will often fetch and apply updates firmware required. to update the firmware sure the system should record current version and new version of the firmware, check. for a valid signature on the downloaded firmware to the receipt and check firmware integrity before firmware installation

the OWASP (OWASP) lists insecure firmware in its top 10 list of IoT security concerns and the additional information on the topic.

interface minimization

An important strategy in the implementation of security by design is to minimize attack surface. In other words, an IoT gateway manufacturer should only implement the protocols and interfaces required to provide the intended functionality and nothing more. These include restriction services and interfaces that run for debugging purposes on the device, but not for use by end users. While these interfaces invaluable for the production, development and test purposes, they are often for backdoors information leaks and authentication vectors "hidden". , Moreover, to restrict debugging interfaces are all open interfaces should prevent a legitimate user, running arbitrary code designed on the gateway device are

found in the previously cited studies of Vera Code on 6 common gateway home IoT, that:

"Many of the most serious defects showed a kind of sloppiness in the design and manufacture of equipment ... For example: exposed [two of the] leave debug interfaces and unsecured in their product delivered. this could for attackers a way that access to the same network as the machine had to steal information or bypass other security controls. "

" the point about the debug interfaces that it sounds dark, but it's really not. All you have to do is go to the Android developer site, download a toolkit and within five minutes full access to the [IoT gateway] device, "he said ,

If your Wi-Fi AP are the only gateway you need?

as efficient Wi-Fi implementations, such as the forthcoming 802.11ah default, become more frequent and installed on IoT devices is the IoT gateway function finally merge the Wi-Fi access point, rather than a separate device be. This brings more safety requirements for a network device that already has a history of vulnerabilities in the consumer sector and re-enforces the need for a hardened IoT gateway with enterprise-class security from the beginning built.

  • 300,000 Compromised SOHO Gateways
  • Virgin Media Router Snafu
  • Asus and Linksys Router Vulnerabilities
  • Linksys Router Worm

the Intel IoT Gateway

to fill the need for a safe IoT gateway for the company, Intel is developing the Wind River Intelligent Device platform. This device is positioned to combine both old industrial equipment and new intelligent infrastructure for IoT. It is designed to integrate protocols for networking, embedded control, security and manageability and provides a platform on the 3 rd party applications can run. The Intel IoT Gateway white paper describes the following security features of the device .:

  • Secure Boot - ensure only authorized and trusted software can be run on the device when it is powered up published collection of free software patches under the GNU GPL to secure the Linux kernel -
  • GRSecurity . GRSecurity is a set of configurable role-based access control (RBAC) guidelines, the collection of programs or processes running with least privilege
  • McAfee Embedded Control allows. - By only provides system integrity unauthorized software allows to run system changes validate changes file system and protects important data files from tampering
  • Integrity Management Architecture -. detects if files changed maliciously or accidentally, locally. and from a distance

Intel IoT Gateway focus will be given to security and extensibility as a platform Citrix the experiment with the execution of the entire Octoblu IoT with very good results on the apparatus to read more about it here: / blogs / 08.05.2015 / octoblu-intel-industrial-IOT /.

combine

Conclusion

, the primary role of the IoT gateway low-power sensor networks to private Ethernet LANs and. To the Internet As the number of devices proliferate in the enterprise, the role of the gateway will grow the increased network traffic and include features such as local processing equipment automation, device management and network access policies to deal with. It is not difficult to see that the gateway plays a crucial role in the IoT, however, to be included in the company, it must be safe. In this article, we presented a series of safety requirements for the gateway device. These include:

  • Encryption - cryptography is an important part of communicating via an IoT Gateway to secure, but it needs to be properly effective are implemented. End-to-end application layer encryption is a strategy to prevent the goal that the weak link in the security chain is
  • Secure Onboarding -. Even with state-of-the-art cipher suites available, we have shown that secure device on-boarding and key exchange is an important aspect of security in depth at the gateway layer
  • firmware updates -. When security problems found, you have the devices in the patch panel and it is largely the role of the gateway firmware, especially low-power sensors that lacks a direct connection to the Internet.
  • to provide interface minimizing - since the IoT gateway serves as an aggregation and control point for multiple devices, it is a high value target for malicious attacks. For this reason, manufacturers must take extra care only interfaces required to ensure to be implemented to provide the intended functionality and nothing more
  • Hardened Wi-Fi access points -. Over time, we expect the IoT gateway roles with the Wi-Fi access point, but with the special challenges of securing tiny IoT devices, gateways with enterprise-class security as the Intel Wind River IoT gateway to merge required.

In the next and final article in this series IoT security we consider are how to ensure the privacy of the customers in the Internet of Things cloud services and to receive.