Mobile Data Entertainment: Experience Matters

5:37 PM Add Comment
Mobile Data Entertainment: Experience Matters -

The mobile data experience is not only on flows and speeds. It is about what the user really feels - in this case, the ability to access entertainment without undue interruptions. Check out this 30-second ad here VF Italy and (maybe) find True Love.

Improved printing keep in mind!

4:36 PM Add Comment
Improved printing keep in mind! -

Hello and welcome to my blog

I would like to dedicate my first technical post a significant improvement that was recently added to the functionality and session Printers proximity printing Citrix. In short, Citrix Session printers are network printers assigned by an administrator via the policy rule Session printers which is also the basis of proximity printing function that allows the creation of a printer preset workspace depending on where the user's connection is from.

policy rule Citrix session Printers and Proximity Printing feature was introduced with Citrix Presentation Server (CPS) 4.0 platform in 05. Since then, they have been widely adopted and used by many of our customers. Some printing functionality combines with the function / control of Citrix Smooth Roaming space to meet the mobile worker, for example, in hospitals where medical staff frequently move between workstations located in different pieces or parts of the hospital building.

Before the publication of this new enhancement that contains the code change needed to allow the removal of session printers while reconnecting session and a registry fix to control behavior, Session printers designed for a connected user from their first unit were postponed / added to the user's session that subsequently made smooth transferred via the mechanism Roaming / control Citrix space when the user logged in from another device. This is the default behavior. The idea behind that is to preserve the status of the printer for the user if they move to the first client device and want to use printers with the preferred parameters they may have set earlier . Unlike automatically created client printers, network printers assigned by administrators via the policy rule Session printers can not preserve the settings defined by the user after deletion. This could lead to many printer Session articles being accumulated in session for users who are often on the move and reconnect to different locations and client computers.

With the development in place, however, it is now possible to prevent this accumulation. It was first introduced with the hotfix XA650R02W2K8R2X64010 which was recently replaced by Hotfix Rollup Pack 3 for Citrix XenApp 6.5. Once the update is installed must implement the following modification of server-side register according to their needs:

1. Go to HKEY_LOCAL_MACHINE SOFTWARE Citrix Ica PrintingSettings registry key

2. Add REG_DWORD value named DeleteNetworkPrinters

3. Assign the desired value

-If value is 0, session printers will not be removed

-If the value is 1, session printers will be removed

.. - If the value is missing, session printers are deleted

Some background information :.

https://support.citrix.com/servlet/KbServlet/download/8212-102-665018/CPS4%20Feature%20Assessment%20-%20Proximity%20Printing.pdf - proximity printing

http://support.citrix.com/servlet/KbServlet/download/8451-102-67140/PresentationServer4 [1] .0PrintingEnhancementsWhitepaper.pdf - Citrix Presentation Server 4 - printing Enhancements

Thank you for considering my position.

Have a great day Citrix

Marek Dresler

Follow @CtxPrintNinja

XenMobile take advantage to maximize your mobility deployments with XenDesktop and XenApp

3:35 PM Add Comment
XenMobile take advantage to maximize your mobility deployments with XenDesktop and XenApp -

There is a big misconception out there that MDM is equal somehow EMM ... .this could not be further from the truth. In fact, the Citrix Mobility Report for 2013 (which interviewed more than 700 clients) showed that mobility means more than just smartphones and tablets. Mobility means even deliver Windows applications on mobile devices

A comprehensive EMM solution must meet a minimum :.

  • Management Mobile Device
  • Mobile Application Management
  • Enterprise File Share and Sync
  • Mobilizing Windows applications
  • Mobile Secure Email and navigation
  • Device mobile remote support
  • native Experience Device
  • Mobile Collaboration
  • , and much, much more

So how do you secure and support mobile users and their devices still deliver mobile, web, SaaS and windows applications with secure content fully integrated with one single sign-click access all with native device experience?

Well, you do it with an EMM solution the most complete Citrix industry which includes pull XenMobile party with XenDesktop and XenApp. A solution that gives your users the ability to access the application from any device anywhere

  Figure 1 :. XenMobile managed iPad  

Join Citrix mobility experts Chandra Sekar, senior director of product marketing for XenMobile and Kevin Strohmeyer, director of product marketing for XenDesktop, as they discuss how you can maximize your existing infrastructure XenApp and XenDesktop by integrating seamlessly XenMobile.

Look now at the request and learn about:

  • XenApp 7.5 new features that improve mobility
  • How do we mobilize applications and workstations
  • How to take advantage of Windows your existing XenDesktop / XenApp infrastructures for mobility

again, you will learn how XenDesktop or XenApp customer Platinum can get license FREE XenMobile edition MDM * 20% discount on the purchase of XenMobile Enterprise edition licenses. Yes I said FREE . Let me repeat FREE . Did I just say Free Edition licenses XenMobile MDM ? Yes I did it. XenDesktop and XenApp Platinum customers can get FREE licenses XenMobile MDM Edition maintenance software is required and certain restrictions. . See details below

Join us for one of the two practice sessions on the application:

CLICK HERE TO VIEW THE APPLICATION IS the session

CLICK HERE fOR SEE thE dEMAND PST session

Be sure to consult the XenMobile to learn more about our winning solution for mobility in prices.

Citrix WorxMail New video features

Citrix App Worx Gallery Video

Follow @ChrisLCampbell

For the latest Citrix and industry related to mobility and XenMobile follow us at:

Follow @XenMobile

* XenApp and XenDesktop Platinum mobility promotion is a limited promotion time that offers new and existing XenApp or XenDesktop Platinum customers with existing perpetual licenses on Subscription Advantage (SA) the opportunity to receive free XenMobile MDM publishing licenses or obtain a 20% discount on XenMobile Enterprise with buying licenses the first year of Software Maintenance for all licenses obtained through this promotion. To be XenMobile promotion options, the maximum number of licenses reduced customers can purchase is based on the total number of XenApp and XenDesktop Platinum licenses owned.

Best Practice - Assign applications to users

2:34 PM Add Comment
Best Practice - Assign applications to users -

Assignment published applications users can be a very simple task, but if not handled well, it can end up creating more problems. I saw the posting customers individual user accounts to published applications in the Citrix management console and it can become very problematic because there is a danger of inconsistency assignment. Usually, we use Active Directory groups to manage assignments. In the Microsoft world, there are 3 types of groups AD - domain local group, global and universal. I am often asked by customers what is the best practice in the management of applications assignment, and I refer to the best practices of Microsoft (scroll to the last section of the page).

As recommended by Microsoft, use domain local group to manage access to resources, ie published applications. Then use global groups to manage users in a particular area, then grant user access to published applications by global groups from a member of the local group. Finally, there is a universal group that can consolidate global groups from different areas, but so far I have not come for customers who still use universal groups.

To give a specific scenario XenApp for example, say that there are two different areas, area A and area B, and XenApp servers are in the area A. to assign, say users of human resources the two domains published applications, create global groups "G_HR" for each affected areas and HR users worldwide respective field group. In the field of XenApp servers (domain), create a local group for each application and make the "DomainA G_HR" and member "DomainB G_HR" of these local groups if they need to use the applications.

Even if there is only one domain, I recommend using this approach. If there is a need to migrate your users or XA servers to a different area in the future, it can help make the transition smoother.

Need ideas for your business blog? That's 50!

1:33 PM Add Comment
Need ideas for your business blog? That's 50! -

Regarding blogs, Do you suffer from writer's syndrome? Do you find yourself looking for inspiration on a daily basis? Look no further - we have just the thing for you. Download your free copy of "Top 50 Ideas blog for B2B" by Kathryn Rose, author and award-winning East Coast Sales Director at The Channel Company.

Kathryn me recently joined atop Citrix to jointly deliver the marketing session "grow exponentially your pipeline with social and traditional marketing." The feedback we received from this session was fantastic and it really seems our partners are looking for additional resources to add to the mix and feed the marketing strategies of their organizations. So, with the activation marketing such a hot topic right now we designed this eBook to help you with some simple tactics, quick, you can deploy immediately

Here are my top 5 favorite personal advice -. What will be yours? !

  • Favorite tip # 1 Make a list! It is true - people love lists. Just as I did with my blog today, a list is a great way to get your message out there in a catchy way punchy. In a world where we are all scrambling for time and all important mindshare, why not make it easy for your readers to understand what they have to gain from reading your blog (on someone else !).
  • Favorite Council No. 2 Make a list of links to relevant information . Why? As part of your inbound marketing efforts, attract foreign and converting prospects - the provision and exchange of information that is of value to others, not only helps you gain credibility and establish your position as a leader of thought, but it also helps build trust and relationships with your audience.
  • Favorite tip # 3 Write a multi-part series blog. What a great idea for a technical subject or depth. The old adage less is more may be true, however, that if your subject is constantly evolving and requires some real staging to help you get started? Mini "series" gives you the opportunity to tailor your content and build a loyal following. In addition, at the end - you can re-purpose your content for your own eBook
  • Favorite tip # 4 Give Google what it wants When it comes to your current content reading it is !. all to be found and stand out from the crowd - so your title is important. Do not forget to connect all these important keywords your audience and readers are likely to look for.
  • Favorite tip # 5 Share a highlight. If a recent history of success or just reached a milestone? Why not shout about it and share it with your audience! Remember, not every success story has to be a win. Maybe your company is celebrating a special anniversary - .. We at Citrix has done, and are proud to celebrate 25 years of the imagination, innovation and growth See the video

Download your copy of "Top 50 Ideas blog for B2B" today.

you have an idea or suggestion for future marketing material? Contact me directly louise.malinosky@citrix.com - I'd love to hear your comments

Stay connected: Follow us on Twitter @ctxsyndication | @katkrose | @ctxmkgconcierge

.

XenDesktop 7.1 on Pilot Guide Hyper-V!

12:32 PM Add Comment
XenDesktop 7.1 on Pilot Guide Hyper-V! -

Have you heard of XenDesktop 7.1, had a demo and worked through the examiner's Guide. Now, where do you turn when you are ready for a PoC pilot and preparations for a large-scale deployment?

Here, on the preparedness and Citrix Enablement team, we're always looking for ways to enable our customers to succeed in their projects. To this end, we took our hands on lab guides used to train hundreds of the most popular internal and external students and reworked for consumption by the masses. The XenDesktop 7.1 on Hyper-V Driver Guide can be downloaded from https://citrix.sharefile.com/d/scaa256260df4ab3b. In this guide, we cover the following topics with instructions and screenshots step by step:

- Configuration of System Center Virtual Machine Manager and Agent Installation
- SQL Setup Server mirroring for a site XenDesktop
- Implementation Site XenDesktop
- Join a controller to an existing site
- StoreFront Configuration and install certificates
- NetScaler configuration for StoreFront Load Balancing
- Installation of VDA software on virtual machines desktop and server
- Creation of machinery catalogs for desktops and servers
- Creation of delivery groups for desktops and servers
- delivering installed and App-V Applications
- Provisioning services configuration and optimization
- Using the XenDesktop setup Wizard
- Set up remote access and with NetScaler StoreFront
- internal and external connectivity scenarios
- evaluator charge Policies
- Follow up with the director
- Logging Configuration Explorer
- Exploration Delegated! Administration
- Working with PowerShell

and more

Take a look through the document and let us know your thoughts ...

IMPORTANT: This guide is designed to be used as reference for the establishment of PoC and / or pilot environments. Production environments should always be properly assessed and designed before deployment and no document should never be used as primary source material given each situation and needs will differ.

February edition of XenDesktop Technical Bulletin now available

11:31 AM Add Comment
February edition of XenDesktop Technical Bulletin now available -

Using XenDesktop? Then you need to get the technical bulletin XenDesktop! The newsletter includes best technical resources of all Citrix services: consulting, technical assistance, education and technical readiness. In its third year, the newsletter is designed to help customers manage their XenDesktop optimally and get the most out of their investment in Citrix desktop virtualization. And its FREE!

I am pleased to announce that February 2014 edition of the newsletter is now available.

Consult the archive page, where you can access both. current and past issues, and Subscribe to the free monthly newsletter

February edition of the newsletter is packed with great content, including:

  • Cisco Validated design for Citrix XenDesktop 7
  • Creating custom report director for monitoring XenDesktop
  • Windows 8 and Server 2012 optimization Guide
  • myths and tales Image management
  • devices to XenDesktop
  • XenDesktop 7.x Database migration
  • XenDesktop Tools & patches
  • and more.

If you have any comments / suggestions please let us know. Also, do not forget to Sign up now!

David McGeough
Program Manager, WW Marketing Services
Twitter
Facebook
LinkedIn

7 best practices to protect critical information from your business

10:30 AM Add Comment
7 best practices to protect critical information from your business -

Is your organization ready to meet the security challenges of today?

In 2013 ended, the titles of security violations presented no organization, large or small, was safe from data breaches. A data breach is not only detrimental to the public image of a company, but also their bottom line. Attackers today are proving to be more creative than ever when it comes to obtain sensitive business data and it is the IT security team organizations to ensure that data does not fall into the wrong hands. Studies have shown that 89% of IT decision makers say that security technologies are essential or important to the creation of a commercial advantage

Follow these seven best practices to protect critical information from your company.

1) modern mobile approach

Take a modern view, and mobile services- based on your organization's security policies. Make sure you apply the policy consistently in the different models of user and use.

2) Safety Controller Seamlessly

Automate security in the building desired behavior of the organization in the user experience- and monitor your effectiveness continuously.

3) engage with line of business Organizations

close working relationship between IT managers and business sectors managers are the essential ingredient for a safety effective. Meeting regularly with business decision makers empowers security managers to build appropriate safeguards in new business initiatives from the beginning.

4) Building security in enterprise solution

To ensure there are no gaps in security, an architect must of organization and maintain and the foundation of information technology that enhances security directly into the business solution.

5) cover all bases

focus on a comprehensive security plan that protects in various fields, such as applications, data, devices , networks and use.

6) Educate

Educate your employees is essential. A labor safety conscious informed is the first line of defense against security threats of each company, so teach people how to work safely from any location on any device must be a top priority. Be sure to implement policies that are personal and specific to the use that people make.

7) Audit, measure and report

A safety plan can not be effective if it is not properly examined and measured properly. An organization must constantly audit, measure and report on the effectiveness of security in all governance programs, compliance and risk management.

Visit our booth # 3641 at the RSA Conference to hear first industry level security experts on how Citrix helps protect critical business information and citrix visit. com / secure.

Join Citrix and CSC, March 4 to learn about the 5 workstyles that define the new place of work

9:29 PM Add Comment
Join Citrix and CSC, March 4 to learn about the 5 workstyles that define the new place of work -

Have you ever stopped to think about your ' work style "? How users of technology and applications within your organization not only differ in what they do, but also how they do the job? Technology is best when it is personalized - and when it meets the specific needs of its users intuitively. It is time to rethink how you provide the technology through the varied needs of end users within your organization.

In this town, Citrix Speakers, CSC and the research firm IDC will discuss the five main workstyles of the future and how CIOs can help workers make the most of their technology

speakers :.

  • Lionel Lamy, Associate Vice President, European Software and Services, IDC
  • David Moxey, Vice President, Integrated Product Marketing, Citrix
  • Dean Fernandes , Executive Director, global unified Communications and Collaboration Solutions, CSC

Join today to watch live and submit your questions.

CloudPortal Business Manager and integration services CloudPortal Manager

8:28 PM Add Comment
CloudPortal Business Manager and integration services CloudPortal Manager -

In an earlier blog, my colleague, Kailas Jawadekar, spoke of how Citrix advance the IT-as-vision a-Service with CloudPortal business Manager version 2.2. In this blog, we will continue to explore the integration between CloudPortal Business Manager (KSCM) and CloudPortal Services Manager (CPSM) and how, together, they enable service providers to deliver hosted desktops, applications and Exchange services to their customers in addition to IaaS and other cloud services.

Why use two CloudPortals together?

CloudPortal Services Manager is a rich procurement platform for service providers to offer Microsoft and Citrix hosted services. CloudPortal Business Manager provides comprehensive management capabilities of the company, including onboarding customer self-service enablement and service subscription and billing based on utility, billing, pricing (in multiple and specific currencies sales channels), packages of products and price promotions, and integration with 3 rd [systems party for helpdesk, payment gateway and fraud control functions. CloudPortal Business Manager can be used to provide cloud computing services, including IaaS (based on Citrix CloudPlatform or 3 e software part of cloud orchestration), PaaS and SaaS.

CloudPortal Business Manager and CloudPortal Services Manager Integration

How does the integration work?

integration is ensured by a Manager connector CloudPortal Business Manager CloudPortal services. The main features of the connector:

  • Support for hosted applications and desktop and Exchange Hosted Services
  • Provides billing services consumed
  • Active admin self customer -service for account creation and service delivery
  • Active customer admin single sign-on to CloudPortal CloudPortal services Manager sales Manager

integration requires CloudPortal business Manager 2.2 and CloudPortal services Manager 11.0 .1. The connector is installed automatically when installing the CloudPortal Business Manager. The following is a sample diagram showing how service providers can deliver services to their customers leveraging integration. Connector automates the customer's account, creating customer administration and service enablement traditionally performed by the service provider. It also collects information on using CloudPortal Services Manager and provides for return to CloudPortal Business Manager to generate billing.

CloudPortal Business Manager and CloudPortal Services Manager Integration Example Flow

When service providers sell services through resellers, they can create resellers CloudPortal Services Manager, and then map to channels in the CloudPortal Manager business

want more

See the following information:.?

  • Screenshots of integration CloudPortal
  • customer admin on Video for Service Manager services CloudPortal CloudPortal Business Manager

For more information about what is new in CloudPortal business Manager 2.2, see this blog.

Where to start migrating applications

7:27 PM Add Comment
Where to start migrating applications -

LET'S take a walk through a migration process user-centric, tied the XenDesktop deployment and maximize return on investment while minimizing total cost of ownership.

main steps of optimal decision comply with the following guidelines:

  • Purpose of the user experience
  • Organize applications to groups, suites and families
  • applications Fit the user scenario
  • Deciding deployment methods for scenario
  • Prioritizing organizational units
  • Prioritize applications to inside OU
  • use alternative deployment as sanitation action

keeping in mind the above rules of thumb, you should think only of the user and his / her use case. Surprisingly, I'll call as a user script ...

Of course, the technical knowledge is still there in the database, but if you aim for the maximum value, it should be used for entirely different things sanitation. Sanitation should be the last resolution and the reason is simple, it takes time and costs money. It should also be considered if the application should be cleaned at all

We begin with the discovery of information and as applicable, the following information must be collected if applicable / available :.

  • unmanaged applications
  • managed devices and applications
  • using the application
  • application problems
  • Structure organizational
  • users
  • user scenarios
  • consolidation effort
  • sanitation time
  • test time
  • Cost for testing
  • Cost responsible for sanitation

Although some of the above information is not directly available, we can generate later in the process simply putting things in the right context. Usually the seeds of information is readily available on the main computer systems; Active Directory and SCCM, perhaps it can be partially recovered by other tools such as SysTrack Lakeside Software.

Citrix Partner Uproar: "Track and measure your concierge led marketing with Citrix son and rewards"

6:26 PM Add Comment
Citrix Partner Uproar: "Track and measure your concierge led marketing with Citrix son and rewards" -

Do you manage your Citrix prospects assigned to your prospects and rewards account? If so, you can now track and measure the effectiveness of your campaigns in one place. Citrix is ​​pleased to announce the integration of the lead management with your prospects and rewards Citrix account!

Now, when you run a Citrix janitor marketing campaign and attach it to a landing page, the son are not only caught in your MCC account, they are also populated with your prospects and rewards account for you accept and record.

How does it work?
When your customer completes the landing page delivered by Citrix Marketing Concierge and clicks submit, lead data is captured and will appear in your account within 24 hours.

Will Citrix receive my prospects?
No. Citrix will never receive your prospects as leads. Every son are pre-allocated and designated to the partner launching the email campaign via Citrix janitor marketing. In addition, Citrix has no visibility on these tracks. They are yours to accept and register.

How to me?
Previously, the tracks that you have captured by Citrix Concierge marketing not resided in the lead statement from the CMC platform, making it difficult for partners to manage several sites for leads. Now you can get all your Citrix leads to a place where you can accept or return the head register head for a partner reward and follow all the progress of your registrations and incentive payments.

How do I start
First, Citrix Marketing Concierge access to: http :. //www.citrix.com/launch/citrixmarketingconcierge

If you have not used before Citrix marketing concierge, you miss all the benefits of using Citrix related campaign materials, promoting and performance of your live or virtual events, taking advantage of marketing services with certified suppliers Citrix and lots more! What are you waiting for? Generate leads, maximize your marketing efforts and increase your pipeline with Citrix Marketing Concierge

Visit Citrix Marketing Concierge today

Stay connected:
• Join our LinkedIn Group marketing Concierge Citrix
• Follow us on Twitter @ctxmkgconcierge
• Reaching out directly to MarketingConciergeWW@citrix.com

Join the hubbub! as a member of the Citrix WW channel marketing team, I invite you to join the conversation through social media channels. Although the topics I'll cover each month are also presented in Citrix Partner News , a blog format is more interactive than a newsletter. It gives each of you the opportunity to express your opinions, ask questions and pass on information to colleagues or clients.

Follow me on Twitter to @CitrixPartners and add your voice to the "Citrix Partner Uproar" today!

Density reinvented with IBM Flex System x222 ™ and Citrix XenDesktop ™

5:25 PM Add Comment
Density reinvented with IBM Flex System x222 ™ and Citrix XenDesktop ™ -

The team of IBM Labs has been hard at work putting their new IBM Flex System x222 Compute Node ™ to the test with Citrix XenDesktop, and the results are both innovative and impressive. But before entering the numbers, it is important to understand that the x222 is much more than just a new blade server. It is a dual node server high density that is designed for virtualization deployments dense clouds, and hosted customers. The x222 has two independent servers in a single mechanical package; a dual density design that enables up to 28 servers to be housed in a single 10U chassis Flex system. And before you think you've seen this act before, let me assure you that the numbers below show the two x222 servers are capable of independent machines, magically crammed into a single blade. And thanks to some very clever technique by IBM, which enabled a rapid and smooth integration between nodes and fault tolerance and disaster recovery intelligent.

For specific and technical, let's look at the datasheets for the IBM® Flex ™ System x222 Compute Node:

  • Two independent servers in a single mechanical package to maximize capacity calculation
  • Powered by the E5-2400 processor family with Intel Xeon products -CORE eight processors with core speeds up to 2.3 GHz, up to 20 MB of L3 cache
  • There are 12 DIMM sockets in each dual node server, which support low profile (LP) RDIMM and LRDIMM, with total capacity up to 384 GB with 32 GB LRDIMM
  • supports speeds memory up to 10 MHz
  • support for 2.5-inch drives and 1.8-inch solid state (SSD)

More information see here: http://www.redbooks.ibm.com/abstracts/tips1036.html

And now look at why I'm so excited that these new blades can bring to the Desktop Virtualization market. For context, please note 3 things first:

  1. These figures (and many more) are available in a reference architecture published recently written by our friends at IBM Labs: Infrastructure IBM Smart Cloud Desktop
  2. to the bearing test this RA were performed with :. VMware® ESXi ™ 5.1, and Login VSI ™ Medium Worker workload, using Citrix PVS server
  3. reference architecture actually covers both the new x222 and lades as the new and more traditional Flex System x240 IBM is also presented. (Clear guidance is provided as to when and why each type of blade should be used.)

The results: The IBM test shows that when configured with E5-2470 processors x2 2 9 GHz and 192 GB of RAM, a single server in the blade x222 can accommodate 152 concurrent users.

While this is certainly impressive and solid number, and proves my first statement that each twin nodes IBM x222 servers are real and capable servers. It does not really justify the title of my blog ... at least not yet. For this, we have to play a little numbers further and use the power of many.

x222 1 = two blade servers each supporting 152 workers average VDI task .... Or 304 medium task workers to the footprint of a single blade.

But do not we stop there ...

Each Flex Chassis 10U system holds 14 blades X222 ... so that means, drum roll please .. ..

VDI 4256 users in a single blade chassis !!!

OK so maybe I went a little too far now as the IBM reference architecture highlights, you should always anticipate disaster and add space to run recovery mode. And of course, your mileage may vary depending on your applications and user types. However, the power of the platform, and innovation of the solution is clearly demonstrated here. And all the RA includes very clear instructions so you can easily include your disaster recovery for requirements in designing your deployment.

And please do not think I gave away all the reasons to read the Reference Architecture. Here are some more reasons to spend your coffee break in the morning with the IBM Smart Cloud Desktop Infrastructure with Citrix XenDesktop RA in hand.

  • If you move to faster processors? They have an answer ... E5-2680 vs. E5-260 with real numbers and a cost analysis
  • Is there such a thing as too much RAM? They investigate this as well, and include a tid bit interesting about reduced bus speeds with some choice of high density RAM configuration
  • What if you want to assign two virtual processors by users? Read RA ... they did the test and have your answers

Now, it is true this reference architecture is based on XenDesktop 5.6, but I have it on good authority that same team is already working to develop an upgrade to XenDesktop 7 results, and I can not wait to see what the architects more in the IBM labs come with next.

Register now! Citrix and HP technical workshops mobility

4:24 PM Add Comment
Register now! Citrix and HP technical workshops mobility -
Join Citrix and HP for the mobility of exclusive technical business planning workshops in a city near you. The skills necessary to successfully lead BYOD top priority, VDI, and other key initiatives of enterprise mobility organization.

A hands on these events you will consider real life BYOD and the use of enterprise mobility If a technical perspective. You and your peers will examine the decision points you will face when you plan and run your enterprise mobility strategy

The workshops include :.

- Embrace BYOD with desktop virtualization and application

- Stop the madness! Refresh your PC refresh strategy

- mobilize Windows® applications for tablets and smartphones

Do not miss this unique opportunity to develop an action plan to mobilize your workforce -delà VDI

[1945012!] RESERVE yOUR SEAT TODAY at a workshop near you!

Go there

Follow me on twitter @GabriellaFPinto!

LaSource videos for partners

3:23 PM Add Comment
LaSource videos for partners -

LaSource is a series of short videos for partners to stay current on Citrix in just minutes.

If you missed them in August Partner News, visit:

XenMobile NetScaler connector

HDX Insight: an unfair advantage for XenDesktop

What will the workplace of the future look Like

You will need your Partner login Central to see the videos.

Citrix Partner Uproar "Citrix Summit is now a channel and sales combined event"

2:22 PM Add Comment
Citrix Partner Uproar "Citrix Summit is now a channel and sales combined event" -

I am kickoff Citrix Partner Hubbub blog series September with Summit! Find out why you can not miss the Summit event this year where you can see and hear firsthand how Citrix partners and sales teams are better together!

Make plans to attend the conference of the Summit in January 2014, where partners and Citrix sales teams jointly receive a live preview of senior management, take part in an intensive training and enjoy opportunities professional networking and socializing.

Citrix believes in continuous innovation, not only in terms of technology. That's why we've made some significant improvements to the conference of the Summit. Next year Citrix partners will be joined by Citrix sales teams in January to provide a common business, sales and technical experience based mobile WorkStyle solutions.

Citrix Summit
from 12 to 14 January 2014
The Peabody
Orlando, Florida States United
We are laser focused on sales targets in 2014
general objectives to bring together partners and Citrix sales set at the beginning of the year are alignment, collaboration and early preparation for a successful year. The new format, timing and scope of the Summit will help you and your Citrix sales colleagues engage with customers on a deeper level, to provide customized solutions and to compete and win in a rapidly changing business environment .

By attending the Summit, you will gain:

  • seen earlier in our vision and roadmap of new solutions and technologies and value-added resources and tools
  • closer relationship with Citrix sales teams by common learning, training and networking
  • Enhanced business, sales and technical expertise to boost growth and profitability
  • Preparation of the commitment of customers more productive at Citrix Synergy in Los Angeles, May 6 to 8, 2014

We have some activities in store for you, as well - training sessions and labs that Summit is known for, with new additions such as the Expo Solutions products and services, the sandbox demo Solutions. and of course, a partner of lively and interactive recognition at Universal Studios

record date for September 16

Be sure to visit from www.citrixsummit.com September 16 to register and sessions preview showing the contents of the six tracks - Mobility, Cloud, network, virtualization, Citrix Programs and Alliances and service providers. We look forward to seeing you in Orlando.

be part of the bustle!

As a member of the Citrix WW Channel Marketing team, and I invite you to join the conversation through social media channels. Although the topics I'll cover each month are also presented in Citrix Partner News , a blog format is more interactive than a newsletter. It gives each of you the opportunity to express your opinions, ask questions and pass on information to colleagues or clients.

I hope you will add your voice to the "Citrix Partner Uproar!"

Also, be sure to follow us on Twitter @CitrixPartners.

Windows 8 vs 8.1 and Server 2012 vs. Server 2012 R2 Compatibility

1:21 PM Add Comment
Windows 8 vs 8.1 and Server 2012 vs. Server 2012 R2 Compatibility -

In engineering Citrix AppDNA, we evaluate all new Windows versions for application compatibility issues. The various methods we use include traditional testing and validation, as well as work from the Microsoft documentation.

The AppDNA team however as hollow a little deeper to look at the compatibility profile applications for the new operating system to make sure we do not miss something important. It sometimes highlights some interesting areas of research in our hunt for application compatibility issues. Take a view behind the scenes to see how AppDNA engineering built, compatibility algorithms accurate automated applications.

What difference is Windows 8.1 from Windows 8 and the respective server systems?

Some Windows 8 to 8.1 feature additions or operating system upgrades have been well documented in other blogs, for example, Paul Thurrott: "Hands-On with Windows 8.1 " . Apart from these changes noted, the analysis of AppDNA team revealed some minor changes to the footprint of the API and some re-organization filesystem. Windows 8 and Windows 8.1 (and Windows Server 2012 / Windows Server 2012 R2) are essentially the same product "under the hood".

How do we arrive at this conclusion?

  1. Citrix is ​​working closely with Microsoft to understand the changes in the new operating systems
  2. The AppDNA team tested a random sample of applications to ensure that there are no big changes in our expected results (100 testing applications validated to date)
  3. We are "under the hood" to see if there are changes in the file system and APIs

Windows 8 to 8.1 sample data

to make low-level analysis we must produce the difference between the two operating systems, using the products AppDNA technology.

It is as follows:

Differences between Windows 8 vs Windows 8.1
The differences between Windows 8 and Windows 8.1

The data sample above can be summarized as:

like Windows 8.1 Server 2012 R2
Deleting files * 548 548
Deletions API (Import Address table vs. Export Address table) 2394 266

* the number of deleted files may seem large, but it should be noted that some of these are reorganized. For example moving system files in different folders should have no impact since these paths are always in the search path of DLL.

Deleted APIs are more interesting because it seems to have a magnitude of 10 most remote API on the client operating system on the operating system of the server, because we expect them are similar in terms of the API they provide (or removed).

However, a closer inspection of the data, this can be easily explained. It seems that "SystemFolder migwiz wet.dll '(Migration Wizard, which is client side) has a number of changes / deleted API but it seems they are the mangled name. This change is probably irrelevant, in fact, only in this case we have removed 1,088 API. Do a manual check of the operating system reveals that these files exist, it must be non-deterministic nature of API exports mutilated name

This is an excerpt of sample data :.

Windows 8.1 removed APIs
Windows 8.1 API deleted

Crack the Sky, the AppDNA team then evaluated all remaining API line line to verify that we did not miss anything. Then we found something odd ...

We found a bunch of 16 missing layer API WOW bits; However the files were present:

Missing 16 Bit WOW APIs
missing 16 API WOW bits

This is strange since we believe that Windows 8.1 x86 supports load 16 bit executables such as operating systems predecessors did.

So why did we have this disparity?

We comparatively file data and found that these files all had the same hashes that mean they are the heels on the file system. So we installed and ran a 16-bit application to see what would happen and discovered the following prompts:

Command Prompt Error
Command error Prompt
Missing Feature, elevation required
missing element, the necessary elevation

This is not a major problem, it now appears 16 bit support is a " feature Windows "and requires elevation to install. Most users will be standard users, so that if this option is enabled on the construction, they will not be able to run the application. This is very important in a managed secure desktop environment, which is a type of questions AppDNA will focus on updating the product Citrix AppDNA 8.1 for Windows support.

administrative privileges In fairness, you still need Windows 8 to "activate" 16-bit applications. However, on Windows 8, the files were already in place and a setting change was all that was necessary.

Are there other pertinent thing?

Without going into all the changes, we found it interesting to note that there are changes to some basic DLL. For example, 20 kernelbase.dll removed and kernel32.dll API 61 API deleted.

Applications that use these APIs will fail, but since they are all undocumented API, we expect that most applications will probably not be affected. However, some "bad" applications that rely on these undocumented APIs will fail. The only way to be certain of these compatibility issues is by performing an analysis using Citrix AppDNA application compatibility software.

Summary

Windows 8 and Windows 8.1, and their server counterparts for most are the same. As with any new operating system there are changes, but the impact appears to be minimal in light of what we found, so that Windows 8.1 is also compatible with Windows 8 the range of published news features.

See what AppDNA can make for compatibility with Windows 8 application now download it for free AppDNA editing application migration testing.

The blueprint begins with the XenDesktop users

12:20 PM Add Comment
The blueprint begins with the XenDesktop users -

The users are first.

This is why we-have a blueprint for XenDesktop 7 Because We want to Avoid starting wrong. We want to make sour que le first thing we focus on are the users.

Think about it this way, When building a house, one of the first things you-have to figure it out is what kind of a house do you want / need (bungalow, cottage, mansion, split level, etc). Sometimes, you might determine That You do not need a house and end up with a condo or apartment. To make this decision, you-have to look at yourself and Understand Your needs (how much space, size of yard, number of bedrooms, etc.). When Defining your needs, you must not only look at today, goal aussi look at what you Anticipate the future to hold, Because MOST of us do not want to move houses every year.

The exact Sami thing takes up with a virtual desktop solution ... Figuring out what kind of resources you need (That notice I did not say "what kind of desktop you need" Because not everyone requires a desktop just like not everyone needs a house).

with So Many housing options, Many times people get stuck in simply try trying to figure it out what kind of house They need, or They Come up with 3-4 options and can not Make That final decision. Again, the Saami thing happens with desktop virtualization, do I need a non-persistent, persistent or applications.

The thing we tried to Accomplish with the blueprint is to Provide a starting spot based on Numerous successful implementations. For example, what if an organization Was try trying to better protect information through centralization for 3 user groups with The Following characteristics:

Call center users Focused on getting through a wide call volume as Quickly as possible, with as FEW distractions have possible.

Who Engineers need to do a lot of trial and error and are looking for alternatives to Often Their current tools are not optimal That

Who Road warriors are always on the go and sporadically need to enter or review a piece of information contained Within a small number of applications.

based on this scenario, we can start to create our conceptual architecture based on the framework we defined in The Earlier blog.

Simply understanding your user's high-level requirements and the overall goal of the organization helps us to start our Creating conceptual architecture. Based on thesis three user groups, we-have The Following:

  • Because we want to centralize our data, we are looking at a hosted model for our three user groups:
    • Road Warriors -> Apps On-Demand
    • Call Center -> Shared (non-persistent model)
    • Engineers -> Personal (persist model)
  • We also know que la users will need to be presented with Their resources, qui est provided by StoreFront. ALTHOUGH we know we will need StoreFront, we do not know the details of it yet, which is better defined in the Access and Control layers.
  • Because we-have thesis kinds of resources, we know this requires us to delivery infrastructure-have controller and controllers. . Purpose we do not know the details yet of These we reach up to the Control layer of the design

Stay tuned for the Access Layer ...
Daniel - Lead Architect

Follow @djfeller

@XDtipster - Introducing the new XenDesktop XD7 POSH Module

11:19 AM Add Comment
@XDtipster - Introducing the new XenDesktop XD7 POSH Module -

Do you know that with the release of a new high XD7 module administrative POSH was introduced for the first time? As XDS snapins regular POSH, this new module ie XenDesktop aptly titled PowerShell module can be used to configure and administer a site XD

The support files for the new module can be found at the following location :.

C: Program Files Citrix XenDesktopPoshSdk Module Citrix.XenDesktop.Admin.V1 Citrix.XenDesktop.Admin

Note: above location also includes two nice help files that explain the purpose of the new module and how the module can be used to perform initial configuration of a site.

snapins only used before we XD7 to extend the shell but Microsoft now recommends using snapins modules (which are amortized) we must follow suit and the new XenDesktop module is one the first examples of what I have come across.

So how we interact with the new module? Basically, all you have to do is load the module (it is not automatically loaded when launching via Citrix POSH Studio). I personally prefer to use a standalone instance of POSH anyway and manually load the snapins XD so additional manual step does not really bother me. For all the guys crazy script out there, I guess it's a moot point anyway ...

So now that you know about the new POSH module, go ahead and follow the steps below to view and download the new XenDesktop POSH Module:

Step 1: to see the POSH modules available on your system run the following command from a window POSH:

Get-module -ListAvailable

Step 2: to import the XenDesktop module in existing POSH session, use the chain next:

import-module -name Citrix.XenDesktop.Admin -verbose

once loaded check (the verbose switch you applets that are loaded just shows) on some of the cmdlets available that can be used to configure and administer your site XD ...

one of the great advantages to the snapins use of modules is that modules can contain POSH commands as cmdlets, functions and worksflows and may also contain variables, aliases and suppliers so you can return the information stored in different parts of the database by using a single command rather than 2 or 3 separate controls

Example : Running Get-XDSite in XD7 returns information from the database that would normally only retreivable using a couple of cmdlets:

Get-BrokerSite (Site Name, LicenseInformation)

Get-BrokerController (controllers )

Best regards
Mick Glover (aka XD Tipster)
Senior Specialist preparation, worldwide support [EMEA]
Citrix Systems , Inc.
Follow @xdtipster

Citrix Partner Uproar "Upsell your product offerings with XenDesktop 7 training goes"

10:18 AM 1 Comment
Citrix Partner Uproar "Upsell your product offerings with XenDesktop 7 training goes" -

The time has come to encourage your customers to take advantage of training and certification in Citrix XenDesktop 7. Add value by providing training options designed for the specific needs of your customers XenDesktop 7, evaluation and design to deployment and management.

Citrix training Password add the margin of your transaction while giving your clients the skills they need to take comprehensive buying decisions and achieve faster and smoother applications and virtualization implementations posts end to end. Whether your clients require the expertise to evaluate and design a project XenDesktop 7 or deploy and manage the solution, we have the right training for them.

In addition to the training goes, you can help your clients create world-class virtualization teams with our new certifications, solution-focused. They are based on the technical expertise of the real world that your customers need to succeed at every stage of their applications and office projects.

Use our eBook, How To Build A-Star All App & Desktop Virtualization team as a powerful marketing tool to help your customers understand the value of the training.

more and more questions or insight, please reach out to Maria Hart.

Be part of the agitation!

I encourage everyone to be part of the agitation. Join me by adding your voice to Citrix Partner Uproar!

Also, stay connected- be sure to follow us on Twitter @CitrixPartners.

Getting Started with XenApp Connector SCCM? You will find this useful ...

9:17 PM Add Comment
Getting Started with XenApp Connector SCCM? You will find this useful ... -

Now you've probably seen the blog of Alex Balcanquall announcing the availability of Service Pack 1 for XenApp SCCM 2012 connector.

to help you set it up and configured, we wrote Informal Installation and easy to read who guides you through the installation, initial configuration and use connector to deploy and publish XenApp DT base of System Center Configuration Manager console applications.

questions, comments welcome!

Boost your marketing with social media. Learn how October 8

8:16 PM Add Comment
Boost your marketing with social media. Learn how October 8 -

While email marketing is central to many campaigns, partners can not be found the results they seek. They can send follow-up emails and be still waiting for new tracks. Why is this happening and what is going wrong?

To truly engage prospects, you need a plan that integrates social media and traditional strategies. social media messages coupling with the relevant and valuable customer content, as well as the creation of multiple content items such as emails, banners and webcasts that all point to the same call to action, will not only help build a relationship with prospects, but also foster leads that translate into more business

Join us for a free webinar ... using social media to boost your marketing Success

Date :. Tuesday, October 8

time 11:00 EDT

Partners: Citrix Solution Advisors

This is a live one-hour session with the channel marketing expert Heather K. Margolis of IPED, school division of UBM channel. Topics will include the integration of traditional marketing and social elements, and tailor your content amplify your message through social media

You learn :.

  • ways to provide social media content tailored
  • Tips for Improved marketing plans with social media
  • strategies to amplify messages build your audience
  • steps to put together a comprehensive plan

Register now (requires connection to Partner Central) and follow us on Twitter for up @CitrixPartners to the smallest detail.

Use social media to put more power in your marketing campaigns via Citrix Concierge marketing and ramp up your web presence via Citrix Content Syndication.

Scripting mass deployment target devices PVS with the write cache on the local storage

7:15 PM Add Comment
Scripting mass deployment target devices PVS with the write cache on the local storage -

Background

at some commitment of recent clients I faced the problem of creating a large number (100+) of Provisioning services 6.1 XenApp 6.5 based target devices with their write cache placed on the local SSD storage of a VMware vSphere 5.1 host. One might think that this would not be a complicated task, so just make a copy of your master machine of the target device with a second disc placed on SSD storage, converting it into a model and use this model with the assistant Provisioning Services VM configuration StreamD create machines to vSphere. Easy huh? No, because I learned that the PVS wizard does not allow me to use models that include drives hosted on local storage vSphere Hypervisor. This behavior can not be changed easily.

Creating machines by hand via VMware vCenter is not possible to their high number. In addition, they must be evenly distributed on all respective hosts for Dynamic Resource Scheduling (as it is called by VMware) will not work because of local storage. Second step would be to create entries corresponding target devices in the collections of the PVS instrument which would also be time for such a large number of machines.

So when it comes to script a solution. Using three different SDKs (VMware Power CLI, MCLI Provisioning Services and PowerShell module to gain access to Active Directory management) required functionality can be achieved. Scripting the whole process also gave me the opportunity to include a step that should be done manually anyway: move workers XenApp computer objects in two Active Directory groups to monitor the XenApp machine reboot cycle. For reasons of availability, it was always expected that 50% of servers in a PVS site (two sites created for two data centers) will restart every 2 days. So dividing the XenApp machines for this type of restart behavior could also be easily reached by PowerShell scripts

The following process has been implemented :.

1. Interrogate the XenApp vSphere cluster to the host with the smallest number of VMs
2. Determine the free following name for the new virtual machine based on a defined naming convention
3. Create the virtual machine with the drive on the local SSD storage
4. Create the entry of the target device in PVS via MCLI
5. Create the computer object in active Directory common OR
6. Add the computer object for the proper restart group

Sons not complicated, but there were some things to consider that could easily be found in any other client deployment. The vSphere cluster used was a stretched cluster including hosts two data centers in an active / active configuration. To fairly distribute the target devices in the two location data centers host interviewed had to be determined. However, this could not be easily done by a host naming convention, but rather by a custom attribute vSphere client has defined for guests to view the location. So this attribute query is the only opportunity to obtain the correct location for vSphere hosts. Another challenge is to cope with Active Directory response times to create computer objects via MCLI. The following commands to add the computer object often failed to restart groups so I had to implement a short cmdlet that verifies the existence of the newly created object and pause the script as long as the subject does has not yet responded to exist.

Scripting the whole process

prerequisites that must be installed on the machine running the scripts are:

  • VMware PowerCLI
  • Provisioning Console services (to access MCLI commands)
  • Windows Server 08R2 Feature - active Module Directory for Windows PowerShell

script is quite long, so I'll just cover some important excerpts here, you can try to fully adapt script attached below.

Query the XenApp vSphere cluster to the host with the smallest number of VMs

First, we receive all cluster hosts, sort them depending on their location (DC1 and DC2) and calculate the number of currently deployed on each host machine:

 $ hosts = $ bunch |  Get-VMHost  connected -Etat | Select Name, @ {N = "NumVM"; E = {@ (($ _ |  Get-Vm )) Count}}, {L @ = "Location";. e = {$ _. CustomFields | {$ _ Eq Key 'Location'.} | select the value -ExpandProperty}} | Sort Place HostVMsDC1 $ = $ host | or {. $ _ "DC1" -eq $ HostVMsDC2 Location} = $ host | where {$ _. "DC2" -eq Location} 

is an example for the host DC1 with fewer machines on it. Based on what we need to get the name of the local database to create the virtual disk. For the request for local datastores attribute MultipleHostAccess is used which is always set to false for local datastores. $ UsedHost finally designates the host we use to create VMs DC1:

 $ LeastHost = $ HostVMsDC1 | Sort NumVM | -First Select Datastore $ 1 =  Get-VMHost  -Name $ LeastHost.Name |  Get-Datastore  | ? {(. $ _ Eq Type "VMFS") -and ($ _ eq $ ExtensionData.Summary.MultipleHostAccess False.)} | Sort Name | -First Select UsedHost $ 1 =  Get-VMHost  -Name $ LeastHost.Name 

Create the virtual machine

 $ taskTab [( New-VM  -Name $ vm_name -VMHost UsedHost -template $ $ $ Datastore folder template -Datastore $ -Location) .ID] = $ vm_name 

After creation, we increase the counter for the number of virtual machines on that host by (we do not question the number of machines for all guests every time for performance reasons):

 $ HostVMsDC1 | Where {$ _ eq $ LeastHost.Name name.} | {Foreach. $ _} ++ NumVM 

We will also need the MAC address for the creation of the target device in PVS

 $ MAC =  Get-NetworkAdapter  $ -VM vm_name | ForEach-Object {$ _ MacAddress.} | -replace% {$ _ '', "-"} 

Add the target device to its collection of devices and create a computer object

  Add-MCLI  -r deviceName unit = $ vm_name, collectionName = $ collection = $ siteName site_1, deviceMac = $ MAC, $ description = description, copyTemplate = 1  MCLI-Run  AddDeviceToDomain deviceName -p = $ vm_name, organizationUnit OR = $ 

Addition of 50% of each machine a different data center restart groups

the cmdlet custom test XADComputer (see attached) test scripts for the existence of an active computer object Directory. In case the object does not exist sleeps the whole script for an amount of time and continues when the object is created and finally reported to exist:

 do {sleep 5  Write -Host  "." Until} ( Test-XADComputer  $ vm_name) 

The newly created machines to a data center are also distributed to restart groups so that According to the configuration of Citrix restart policies filtered to these two groups only 50% of servers will restart every day. The Get-ADComputer and Add-PrincipalGroupMembership cmdlets are part of the Directory PowerShell module

 if (vm_count $% 2) { Get-ADComputer  $ -identity vm_name |  Add-ADPrincipalGroupMembership  $ -memberof Reboot2  Write-Host  "Restart Computer object added to group $ Reboot2"} else { Get-ADComputer  $ -identity vm_name |  Add-ADPrincipalGroupMembership  $ -memberof Reboot1  Write-Host  "Restart Computer object added to group $ Reboot1"} 

I hope this script can be useful if you encounter similar difficulties when implemented and show what can be achieved by taking advantage of our really powerful SDKs (and other) products 😉

here you can see the whole script, bold settings must be adapted to your environment:

 @ "============ ===================================== ============= ============= ============= Title: CreateTargetDevices with disk on the local SSD storage and imports the devices in Citrix PVS Author: Thomas Fuhrmann version: 1.6 use :.  CreateTargetDevices.ps1 Date: 04/06/2013 ====================================== ============ ====================================== "@

Here is your chance to shine in the spotlight Synergy! The call to his subjects is now open.

6:14 PM Add Comment
Here is your chance to shine in the spotlight Synergy! The call to his subjects is now open. -

Are you raising the bar for innovative IT mobility, virtualization, networking and cloud computing technologies? Do you have a fascinating history of implementation, best practices or creative solution to share? We want to hear! Submit your proposal speakers for Citrix Synergy 2014, May 6-8 in Los Angeles, California, across the subjects of the appeal process. You might be selected as a session presenter escape and enjoy some well-deserved time in the spotlight.

We hear that Synergy participants valuable technical content and dynamic speakers with diverse viewpoints put the conference differs from other events. That's why we invite guest speakers chosen by our group of independent experts to present their stories to the public Synergy

So -. What types of presentations are participants Synergy ask? Although extreme views and pioneering examples are cool, sessions offering practical advice and best practices for planning, design and implementation are in demand. In other words, participants want to hear how to get projects completed on time, within budget and with excellent results

Examples of potential topics in four solution categories :.

  • Mobile: mobile application and device management, application stores, mobile security, collaboration, mobile data access, BYOD and Workshifting
  • virtualization :. Desktop and application virtualization, Windows app migration, VDI, client virtualization and RDS
  • Network: .. network virtualization, networking software defined , disaster recovery, security, application and multi-tenancy in the private and public clouds
  • cloud :. infrastructure cloud and solutions and technology management to use in mobilizing IaaS, PaaS and SaaS

The selection process

All submissions will be judged by a selection committee of analysts, the professional business of IT and other opinion leaders industries. They will be looking for relevant content, innovative and technically rich. sales pitches and marketing hype will not go beyond them. :) The strongest arguments will include demonstrations and real-world examples - and a speaker with a solid presentation of experience

Meet our judges :.

  • Shawn Bass, Solutions Architect, ShawnBass. com
  • Stacy Crook, Program Manager, Mobile Enterprise Research, IDC
  • Rick Dehlinger, Chief Technology Officer, nGenX Corporation
  • Juergen Heinrich, Chief Technology Officer, KIVBF
  • David K. Johnson, Senior analyst, Forrester
  • Suresh Nagarajan, Director, information technology, Centene Corporation
  • Alan Pawlak, head of service to customers, Aetna Inc. .

Dazzle those judges with your memory, you could be part of the agenda of the session Synergy! In addition, the main presenter of your session will receive a free full conference pass.

Submit now!

The appeal due submission Topics is midnight, Monday, December 2, 2013, so do not delay. We will have a microphone, a stage and an attentive audience waiting to hear from you!

and be sure to follow me on Twitter @merisummers for updates to content Synergy.

@XDtipster - Keeping track of changes SDK

5:13 PM Add Comment
@XDtipster - Keeping track of changes SDK -

With each new version of XenDestop comes the inevitable changes to the SDK large enough so would not it be nice if we quickly and easily view the changes ie check what new applets were added and what cmdlets were removed between XD releases?

Of course, the answer is yes and this is something I watched this week as I began to prepare the release of training for XD7 .1.

Through the provision of training, I wanted to be able to inform our support engineers on the changes to the SDK and highlight all that I find particularly useful. With time in short supply, I wanted to do it quickly, but also have fun ...

Example: Tracking Changes to cmdlets available between XD7 and XD7.1 TP

Step 1 .

Export the complete list of cmdlets for each Citrix XD text file version using the following commands :.

get-command -module citrix *> c: xd7cmdlets.txt

get-command -module citrix *> c :. Xd71cmdlets.txt

Step 2.

Use Notepad ++ to remove any unwanted columns so you just left with the NAME column in each text file:

notes : for this you will need to maintain Alt while selecting content the file to delete do ...

Click on screenshot to see the picture

Step 3.

Use a file comparison tool to compare the differences between two files. I prefer to use a tool called WinMerge - It is open source and freely available

Once installed, you can select two files to compare and click OK :.

At first glance, you will notice obvious differences in the listed applets, but the view is pretty crowded and the comparison is not very easy to achieve the cmdlets are not identical ordered:

click screenshot to see the picture

to solve this problem and control applets click correctly on change - options and modify Whitespace settings Ignore all and click OK

Click on screenshot to see the picture

After Whitespace setting was set to Ignore all the cmdlet order will be set correctly and it becomes very easy to compare and see what cmdlets were removed (if any) and what new applets have been added with the 7.1 update to the SDK:

Click for screenshot see picture

now that you know what cmdlets have been added you can now dive in and take a look at the POSH integrated help files to see what these applets are all about.

Why not try to go further and see if you can find all the amendments to the detailed help files for the entire SDK? It will take a little more work and understanding of how to use WinMerge, but it might be worth the effort, especially if find little gems like -Force switch is now available when resetting the DB connection strings.

Note: To export the SDK Inc. complete folders full assistance using the following commands :.

get-command * -module citrix | Get-Help -full | out-file c :. XD7help.txt

get-command * -module citrix | Get-Help -full | out-file c: XD71help.txt

Best regards
Mick Glover (aka Tipster XD)
Senior Specialist of preparation,
Worldwide support [EMEA]
Citrix Systems, Inc.
Follow @xdtipster

Hardening (almost) forgotten RunAs / Run as different user

4:12 PM Add Comment
Hardening (almost) forgotten RunAs / Run as different user -

Curing of a server system is an omnipresent topic. We all tend to provide the most secure environment (hopefully) to reduce the amount of possible attacks on the system. One measure is applicable to the limitation of user access to the system. There are several ways to restrict user access, but in most environments I've seen, Active Directory group policies were used to achieve this. In addition to prohibiting access to prompt and control of Windows registry, there are thousands of other parameters that could be applied because of safety requirements or user.
As probably known all policy settings configured under "User Configuration Policies Administrative Templates" are applied in the registry hive of the user under "HKEY_CURRENT_USER Software Policies" and "HKEY_CURRENT_USER Software Microsoft Policies ". Unlike other paths of the user registry, the user has full control generally, these registry trees are configured with read-only permission for the user. This fact ensures that the user can not modify the settings applied.

But there is a simple function (actually two) that can be used to easily avoid all of your user group policies configured and use all the applications the user has access to unless the appropriate NTFS permission was deleted

runAs and Run as different user

with the command "runas / user :. domain user application " or the use of" Run as different user "from the context menu of applications (shift + right click) can be started with different user credentials. So far so good, but you're wondering what these functions actually do?

RunAs and "Run as different user" allows a user to launch an application with different user credentials. When one of these functions is performed, authentication occurs and a new process will be created with the specified user account. Unless nothing defined, the user profile, or a temporary profile will be loaded. As this procedure does not include a typical user logon process no political groups of users will be applied and there are few other footprints next to the profile and the registry hive user under HKEY_USERS.
You can double -check that by opening the Task Manager. You can find the correct process running with the specified user account, but the user will not be listed in the menu Users Task Manager. In addition, there will be no Group Policy settings listed in the registry hive of the user in HKEY_USERS SID user or temporary profile Software Policies or Software Microsoft Policies.

And that's the point! This circumstance allows a user to work without any user's policy, namely the likelihood of attacks increases. The user account is a normal user on the system and NTFS permissions still apply to the user. These two factors continue to complicate the possibility of harm to the system. Nevertheless, some doors are open now, and a clever user could take advantage of this situation.

Before continuing with the article, I would like to stress that the use cases, as well as additional explanations and recommendations are related to a user session. The purpose of this article is to restrict users while administrators retain access to this feature.

Imagine the following case use. One of your users is to have two accounts to Active Directory users, which is very common that many users have a normal and a test account in the same field. Both accounts are local users on the system and use RunAs or "Run as different user" is not prohibited. The user is connected with the normal account and is now using the second account to start a program with the RunAs or "Run as different user" method. In these circumstances the user would be able to start any program, it has access.

How to prevent access to programs

In my view, the only way to do the right restriction of application is to use the rules AppLocker or other third-party tools. In general, I recommend to my clients to use AppLocker rules, because they are free and offer the flexibility to configure the restriction to suit your needs. All resident AppLocker settings under "Settings Application Control Policies Computer Configuration Policies Windows Settings Security" and therefore all configurations are applied in the registry under "HKEY_LOCAL_MACHINE Software Policies Microsoft Windows SrpV2". Thus, with the AppLocker RunAs and "Run as different user" method will not work because all the settings are applied on the computer and are not related user.

If you are not willing to use AppLocker rules for any reason, you can always limit the RunAs and "Run as different user" function by removing access.
In the early days, it was very simple. Withdrawal of the authorization of the user from runas.exe was enough to completely restrict access to both functions. But since the release of Windows Server 08 R2, the "Run as different user" command has changed and is not based on more Runas.exe. You must perform two steps to completely remove the RunAs and "Run as different user" functions:

1. Restrict access to Runas.exe. There are two ways to achieve this:
a) Configure an AppLocker rule and deny access to C :. Windows System32 runas.exe to the appropriate user groups
b) delete the user authorization from C: Windows System32 runas.exe

2. The second step is to remove the entry "Run as different user" from the context menu. For this you must remove the following registry key
HKEY_CLASSES_ROOT exefile shell RunAsUser
HKEY_CLASSES_ROOT batfile shell RunAsUser
HKEY_CLASSES_ROOT cmdfile shell RunAsUser
HKEY_CLASSES_ROOT mscfile shell RunAsUser
HKEY_CLASSES_ROOT Msi.Package shell RunAsUser
(This change will affect administrators as well)

Even if you have already restricted access to the application using AppLocker rules or another third tool, I still recommend to delete the entry context menu to provide the safest possible solution.

If you are still looking for a simple way to limit access to functions for everyone (administrators and users), and then disable the Secondary Logon service (thank you Martin for Latteier the entrance).

Let's take a last look at risk management. I agree that this is a rare scenario. However, it is essential not to underestimate the internal danger and its possible negative impact on the system. As you can see, there are only a few steps before you to reduce exposure to risk. I recommend you implement the steps outlined above to ensure the safety of high system.

I hope you have enjoyed reading.

Best regards

Saša Petrović

Empathy - using XenServer XenServer Engineering

3:11 PM Add Comment
Empathy - using XenServer XenServer Engineering -

Introduction

I am writing this on a desktop running Windows 7 computer as a virtual machine on a XenServer pool running a pre-release version of XenServer. XenServer in engineering this system is known as Xenia. It is an example of a so-called system "dog-fooding", whereby members of teams of engineers who create a product are also using this product in their daily work.

Citrix has a long history the use of its own products, usually in one of two ways: as an iT company led the deployment shipping versions of products such as Citrix XenApp, NetScaler, CloudBridge or CloudPlatform, or more local deployments within the engineering teams, often pre-releases. Xènia is an example of the latter. It is managed by the QA team XenServer for use by members of the XenServer engineering group.

empathy

the main objective of Xenia is to provide staff with an overview XenServer in XenServer experience of our customers. in other words, to obtain a measure of empathy with our customers. to do this we need the firsthand experience deploying and administering production XenServer running in the pool live workloads that matter to people. We also want to understand the impacts of our product quality, performance, stability, etc. on the experience of the end user.

We run two pools of XenServer, one containing the latest version of XenServer GA updated with all patches, and a current version of pre-release of XenServer. Various workloads that are essential for the XenServer product group are run on these pools, including virtual desktops. Although Xenia not use a full XenDesktop deployment (RDS or VDI), he re-use the office "brokerage" virtual functionality of XenDesktop to provide easy access to the persistent virtual machines. The members of the XenServer product group are encouraged to use these virtual machines as the main office for the day-to-day, whether in the office or outside.

QA tool

As mentioned earlier, a Xenia key objective is to provide the XenServer product group with an overview of what it takes to administer the pools production XenServer. Our QA team possess Xenia and as such gain experience of installing, upgrading, hotfixing and generally maintain a system of production and supply of a service based on it. Their findings are injected into the maps decisions XenServer, bug tracking and product improvement proposals.When new version of XenServer is imminent, we improve one of the pools to use the new version, validating the upgrade path the previous version of XenServer, and expose the newly installed candidate built for live use and therefore, essentially in real time soak test. When a new patch for the latest version of XenServer GA is imminent, the final validation step is to apply it to the appropriate pool to ensure it runs successfully the first.

Basically, although the system is managed by QA XenServer, members of our development teams and product management are often involved in administrative tasks such as upgrades. We want as many members of the group of products as possible to get a better degree of empathy with our customers, not only end users, but system administrators as well.

Of course, an additional advantage of Xenia is that, by its very nature, it is a living system that must operate 24 × 7. This gives us a degree of soak test that complements our existing tests but more static automated soak. Xenia has various capacities for surveillance and control built into it, including the detection of memory leaks, with more planned (including the use of 3rd party integrated tools for XenServer). This makes Xenia A powerful element of our integration (CI) Suite continues. Examples of defects found by Xenia, before liberation is a nasty bug upgrade from XenServer 6.1 and 6.2 caused by the addition of a new piece of VM metadata, permissions various faults and problems of use.

Citrix Interop

Xenia is run by and for the group of XenServer products and focuses on XenServer largely isolated from other Citrix products.

One of the inspirations for Xenia is another "inner dog-fooding" system known RTST ( "Real Time stress test"). This was managed by our colleagues in the XenDesktop product group for a number of years, providing XenDesktop virtual desktops and XenApp running on a variety of different hypervisors.

The engineering team also manages a XenServer deployment Citrix CloudPlatform on XenServer.

Summary

XenServer personal gain empathy with the experience of the administration and use of XenServer through our use of an internal deployment XenServer with live workloads and strategic to our customers.
results are returned as defects and requests for product improvement, or more generally as context to maps decisions.

XenDesktop 7 最佳 实践 手册 (Citrix 全球 Council 出品)

2:09 PM Add Comment
XenDesktop 7 最佳 实践 手册 (Citrix 全球 Council 出品) -

即将 过去 的 2013 年 无疑 将 成为 Citrix 技术 创新 方面 的 大年, 众多 关键 技术 都 将 呼之欲出, 并 在明年 的 市场 上将 形成 欲罢不能 的 局面 究竟 有 什么 看点, 客户 和 合作 伙伴 们 需要 重点 关注 如下.

  • XenDesktop7 于 今年 已经 发布, 明年 将 是 它 的 推广 年, 对 这个 全新 的 虚拟 桌面 交付 平台 架构 Citrix 内部 人员 已经 迫不及待 了
  • XenServer 6.2 + nVidia + K 系列 XenDesktop 7 的 基于 虚拟 显卡 技术 的 虚拟 桌面 3D, 该 技术 的 预览 版 测试, 已经 在 一些 项目 中 轻松 那 下 一堆 竞争对手
  • NetScaler 持续 稳健 发展, 在 国际 持续 每个 季度 从 其它 厂商 那边 拿下 越来越 多 的 市场 份额. Citrix 每 一个 客户 和 合作 伙伴 都 需要 重视 该 技术: 虚拟 桌面 交付 架构 的 安全 接入 门户;高性能 的 负载 均衡;这 两大 功能 将 在 数据 中心 的 基础 架构 中 逐渐 获得 越来越 多 的 地位, 并 成为 下一代 数据 中心 标配

Citrix 的 虚拟 桌面 方案 是 "以 用户体验 为 核心 "这 一点 可以 从 我们 设计 和 实施 一个 项目 的 过程 和 工序 中看 出来.需求 分析 和 架构 设计 过程 中 的 核心 环节 有.用户 调研, 应用 调研 和 FlexCast 发布 模式 匹配 设计;都 清晰 地 体现 出 Citrix 解决 方案 的 优势 和 独特 性 这 和 其它 厂商 宣传 的 "虚拟 桌面 只 需要 一个 稳定 的 后台 足矣" 的 口号 形成 了 鲜明 的 对比, Citrix 同样 注重 稳定 的 后台, Citrix 但 更 注重具有 综合 发布 能力 和 完整 统一 控制力 的 虚拟 桌面 架构 本身, 更 注重 该 基础 架构 核心 中 的 核心, 那 就是 "业务 应用 和 最终 用户"

单一 VDI 方案 的 缺陷 是 显而易见 的.

  • 无法 实现 业务 应 交付 和 OS 交付 的 分离;把 对 业务 应用 的 管理 维护 和 虚拟 操作系统 VDI 的 升级 简单 粗暴 的 划 等号.试想 某个 业务 应用 有 1000 个 用户, 对该 应用 客户 端 的 某 一个 配置 参数 的 变更, VDI 方案 要先 对 操作系统 的 母 镜像 做 更新, 然后 在 同步 / 更新 到 到 这 1000 目标 操作系统 上; .我们 可以 清楚 的 看到 IT 部门 正 遭受 着 不可 承受之重 变更 的 动作 = 母 镜像 OS 变更 1 次 次 目标 10000 + OS (XP, Win7 ... 的 变更 x = 至少 1001 次 变更 动作 / 操作;.从 ITIL 变更 管理 的 角度 分析, 该 变更 成功 率 (ITIL 定义 的 目标 为 100%) 将 轻易 的 受到 每个 VDI 的 更新 成功 率 相关 头脑 清晰 的 数据 中心 虚拟 化 管理员 必须 认识 到 这 和 您 人均 管理50 以内 的 虚拟 服务器 操作系统 完全 不是 一回事. 变更 风险 和 工作 压力 不可小觑.
  • VDI 方案 中 的 存储 买 的 起, 建造 的 起, 但 真的 用 不起 傻瓜 式 的存储 空间 需求 计算 公式 是 这样 的 存储 需求 总量 = 用户 数 数 * VDI * 评价 OS 大小 + 用户 数据 的 空间; .. 但这 里面 每个 数据 都是 变量, 特别 容易 被 忽视 的 两点 是: 1 ) VDI 数 往往 是 变量, 对于 单一 VDI 方案 的 厂商 而言, 每种 业务 需求 都 需要 用 一种 特殊 的 VDI (特定 网络 访问 需求 + 特定 应用 需求 + 特定 操作系统 版本 需求) 来 实现, 但 没 人会 这么 告诉 最终 用户;这些 特定 因素 就 决定 每个 用户 都 需要 多个 不同 的 操作系统 实例;起初 轻易 地 相信 每个 用户 就 需要 一个 虚拟 操作系统 实例 是 多么 滑稽 的 事情 操作系统 OS 本身 使用 存储 空间 大小 是非 恒定 的, 用 我 家里 的 家用 电脑 举例. 1 年前 装机 的 时候 XP 20GB 在 的 系统 盘 里面 占据 了 3 个 GB 的 空间, 到目前为止, 在 我 删除 了 几乎 所有 不必要 应用 的 情况 下, C 盘 已经 没有 可用 空间 了 .Windows 操作系统 的这个 特性 相信 每个 人 都 知道, 随之 使用 时间 的 推移, 可用 磁盘 空间 被 XP 莫名 的 吃掉 了.这里 暂不 分析 原因;.可见 项目 之 处 推测 每个 VDI 占用 的 磁盘 空间 是 有待商榷 的 还有, 由于 VDI 对应 的 操作系统 实例 数量 的 增多, 对 后台 存储 IOPS 资源 的 耗费 也是 与 日 剧增 的 综上所述.简单 的 用 虚拟 机 层面 对 存储 的 瘦 制备 这 一项 技术 打遍 天下 省 存储 空间 的 概念 是 多么 的 不可以 接受
  • 用户 密度 在 单一 物理 机 上 能跑 的 很高 其实 是 一个没有 意义 的 假设.在 一个 真是 的 业务 使用 场景 下, 任何 关键 的 应用 都 被 严密 监控 着, 任何 一种 计算 资源 必须 跑 在 合理 的 范围 内, 例如 很多 金融 用户 默认 的 阀值 是 75%, 简单 的 说 任何 一种物理 服务器 的 计算 资源 的 利用率 都 不得 高于 75%;因此 某个 厂商 说 我 能给 你 单 台 物理 机 上 跑 150 ~ 0 个 VDI 桌面, 这 一点 意义 都 没有;这 和 实际 业务 现场 下 每个 业务 用户 对 资源 的 使用率, 一点 关联 都 没有;.根本 不足以 成为 一个 选择 虚拟 桌面 架构 的 像样 的 指标 假如 你 对 ITSM / ITIL 稍微 有点 概念 的 话, 每个 虚拟 机 都是 一个 CI (被 管理 / 监控 的 对象);每个 虚拟 机 的 CPU, 内存 和 磁盘 都是 一个 CI;单机 VDI 虚拟 机密 度高 意味着 VDI 虚拟 机 总数 高, 意味着 要 管理 和 监控 的 多 CI;而 整个 系统 的 SLA (服务 级别 等级, 这个 数 越高 越好) 是 由 整个 系统 中 性能 最弱 的 那个 CI 决定 的;因此: VDI 架构 中 虚拟 机 OS 数量 高 对 IT 管理者 来说 是 个 灾难 解决 之 道 就是 打破 一个 用户 对应 一个 或 多个 操作系统 实例 的 怪圈;.应该 反过来 应用 虚拟 应用 技术 来 实现 一个 操作系统 实例 服务 多个 用户 的 方式, 并且 在 整个 企业 中 增加 这种 场景 的 使用 比例, 这样 就 提高 了 单一 操作系统 承载 的 用户 数 (VDI 方案 里 一个 操作系统 就 一个 用户) 从而 极具 降低 了 被 管理 OS 实例 的 总数, 降低 了 数量 CI, 极大 的 降低 了 系统 监控 和 运 维 的 压力 纯 VDI 方案 听 着 简单, 但是 绝对 是 运 维 和 管理 不了的, 时间 和 工作量 成本 很高;.还 可能 是 以前 传统 PC 模式 的 一种 倒退, 以前 一个 用户 管理 一个 PC 的 操作系统 实例 就够 了, 现在 待 管理 的 操作系统 不但 没有 减少, 每个 用户 还 增加 了 好 几个 OS.因此 "祛除 数量 VDI / 应用 比例" 是 虚拟 桌面 项目 制胜 的 法宝.

用 其 Citrix FlexCast 综合 发布 技术 可以 自信 地 应对 任何 虚拟 桌面 项目 的 业务 场景, 用户 场景, 发展 场景, 运 维 场景 和 成本 场景.可以 因地制宜 的 成为 企业 用 的 起, 管得住 和 扩展 的 了 的 方案

言归正传: .. 本文 提供 的 干货 是 "XenDesktop 7 最佳 实践 手册" Citrix 全球 顾问 咨询 团队 版 该 宝典 是在 XenDestop 6.x 的 基础 上 发展 来 的.对 即将 推广 的 有 指导 意义 XenDesktop7.请 前往 下载, 阅读 和 领悟 Citrix 的 精髓.

[Show as slideshow]
xendesk7-handbook-fm
xendesk7-handbook-mu1
xendesk7-handbook-mu2
xendesk7-handbook-mu3

此书 的 下载 地址: http: //support.citrix.com/article/CTX139331

XenApp Scalability v2013 - Part 2

1:08 PM Add Comment
XenApp Scalability v2013 - Part 2 -

Overview

The first part of this article (you should read first if you have not already), I found some interesting results from a deep commitment scalability testing we recently completed a major customer. And I'm sure some of the results are you scratching your head a little ... and maybe you had questions like I did, first as:

  • Why 4 vCPUs was chosen as the spec VM? Citrix and VMware does not always recommend 2 vCPUs for XA?!?
  • Why do we have only 130 users on each physical host? Andy The article written a year ago said that we should expect 192 users with this material and a medium workload?!?
  • Why do we only-commit "half" of the total available CPU (ie 24 vCPUs)? If you are not always use all logical vCPUs available in the box (ie 32 vCPUs)?
  • How did NUMA factor in this particular test? Why NUMA same issue at the high sizing VMs these days?
  • Why do users "work" much less than we think? (Kidding ... I stay away from it!)

If you have more questions than that, feel free please leave me a comment below. But let's address the above questions first.

CPU Over-Subscription

Whether or not you use 2 vCPUs, 3vCPUs, 4 vCPUs, 6 vCPUs, 8 vCPUs (or another number) for each VM XA is a more difficult question that really requires testing and understanding of NUMA (and I'll get to next). But a question best addressed first is how much CPU oversubscription should you do? It is easier to explain with an example ... so remember for this particular test we had a box with a CPU configuration "2 × 8" (which is kind of my slang for 2-socket and 8-core per socket). And remember we enable hyper-threading. So we have 16 "physical" processors or cores and 32 "virtual" processors or logic. And most people refer to what pCPUs 16 and 32 vCPUs. So the question is do I deploy enough XA VM to use 16 processors, 32 processors or somewhere in between? The short answer is somewhere in between and most of the time the best "sweet spot" will be a report oversubscription of 1.5: 1 meaning 24 vCPUs in this case . So I could deploy 12 XA VMs on each host if I am using a specification of 2 vCPUs, or 6 XA VM if I'm using a specification 4 vCPUs, or perhaps only 3 XA VM if I'm using a specification 8 vCPUs. You basically want the math to add up to 24 vCPUs in case you did not take it. Now the question ... why use a 1.5: 1 oversubscription ratio or "split the difference" between pCPUs vCPUs and generally the best sweet spot? For that, look at some more detailed results of our test, then we will do our best to interpret the data.

We tested different ratios using oversubscription LoginVSI to find the optimal sweet spot. To keep things simple, I will provide test results with 4 vCPUs VM configuration. So in summary, we tested 4 XA VMs, VMs 6 XA and XA 8 VMs (again, while using 4 vCPUs) to see if the use of 16, 24 or 32 total processors give the best results. The VSI Max score for each test was 119, 130 and 122, respectively. Meaning that the 6 XA VMs with 4 vCPUs test resulted in the optimal density while maintaining a user experience (which is measured by LoginVSI in a ton of different ways in these tests). Now the question becomes WHY made the 1.5 :? 1 oversubscription ratio "win" or give the best results

This sort of sense if you think about it. When using only the 16 physical cores in the box, you really do not enjoy hyper-threading (which should give you a bump in performance of 20-30%). So in this scenario with a 1: 1 oversubscription ratio, you really are not making full use of the box. On the other hand, when we try to use the 32 virtual cores in the zone, we stress the CPU scheduler too, so it has an effect of decreasing returns. Remember, hyper-threading only gives you a 20-30% performance increase ... not 100%. In addition, we save some resources (CPU cycles) for the CPU scheduler in ESX itself - the process of determining which logical CPU to place the workload cycle following comes not "free." So in this scenario with a 2: 1 oversubscription ratio, we are really hammering the box and it is not the optimal configuration to be. That's where split the difference between the amount of pCPUs vCPUs and made a lot of sense and really shines - leaving us some valuable resources for the scheduler itself, but we are also taking advantage of hyper-threading. And do not believe me - believe the data ... the scenario with a 1.5: 1 oversubscription ratio gave the best score VSI Max

Another thing I wanted to share is not the first time. I saw this oversubscription ratio yield the best results. In fact, one of our most important partners in industry (which makes the software EMR / EHR) always recommends 1.5: 1 oversubscription ratio And they did more testing with LoadRunner on a variety of hardware configurations than anyone I know. And this test, we did not really validated these results

Now what that means 1,5 :. 1 oversubscription ratio should always be used? Not necessarily. It depends on the participation rate, the hardware, the version of the hypervisor and programmer, etc. For example, I could find a sweet spot slightly different if my participation rate is 50% compared to 85% ... if my equipment is a 4 × 6 versus a 2 x 8 ... if I am using XS versus VMW. The sweet spot might be 1.7: 1 or 1.25: 1 ... and the only way to find out is through proper testing with a tool like LoginVSI or LoadRunner. But what I say is that if you do not know or do not have time to test, then using 1.5: 1. CPU oversubscription ratio for XA is my recommendation

NUMA

It always amazes me how many people do not know what NUMA is or care to understand how it impacts the design of exercises like the one we do. And that is not specific to the XA workload - this concept applies to all levels and you need to consider when virtualizing all NUMA big workload server such as Exchange, SQL, etc. Now I will not explain what is NUMA detail in this article, as it has been done 100 times before the Interwebs. But, it is synonymous with Non-Uniform Memory Access and I want to consider it as "keep things local". The idea is pretty simple - when you have a box with multiple sockets, each socket has local memory it can access very quickly ... and remote memory (on the other taken through a connection bus or inter-socket) that it can access without a goal so quickly. And if the CPU scheduler of a hypervisor is not "aware NUMA" as some say, then bad things can happen - we could be sending processes and CPU Remote son or memory, as opposed to the local CPU or memory. And when we do that, it introduces some latency and ultimately affects performance (user density in the case of XA). How much of an impact on the performance NUMA can really have? We did a study on this a few years ago when we introduced support for NUMA in Xen and it was a success ~ 25% on the user density! Which means we could get 100 users on a box without NUMA awareness ... and 125 with the consciousness of NUMA. Quite significant. Fortunately for you and me, all major hypervisors these days are NUMA aware. This means that they understand how the hardware is configured in terms of underlying NUMA nodes and scheduling algorithms are optimized with NUMA in mind. So it's fantastic - but what the heck does that mean and how do I dimension XA my VMs? 😉

Notice I said above "underlying NUMA nodes" - what do I mean by this is really important things, believe it or not, all Intel chips?. are not created equal. And not all sockets have just one (1) underlying NUMA node. what i mean is a plug with 8 cores (as in our example), could actually be divided into multiple nodes NUMA underlyings. each outlet with 8 cores could probably 4 NUMA nodes, 2 NUMA nodes or one NUMA node. and if the decision is divided into nodes say 4 NUMA, each node has its own "local" resources CPU and memory that it can access the fastest. - in this case, 2 cores each if it is divided into two nodes, each node would have 4 cores each instance, the concept of NUMA concerns not only with multiple socket boxes .... it also applies within each outlet or die! So the next obvious question is how do you know that the NUMA configuration underlying is for equipment that you bought (or are considering buying hopefully!)? Well, there are tools like Coreinfo you can run on Windows operating systems ... and there are commands like info xl -l 'you can run on Xen or " numactl -Hardware 'you could run on Linux. And those spit all sorts of good information on the CPU in the box, but especially the NUMA configuration to help you understand where the "limits" NUMA lie. If you do not want the CLI, you can simply ask the seller or the manufacturer (Intel ... or HP, Dell, IBM, Cisco, etc.). Sometimes the material data sheets even on there. But I can tell you from experience that some years ago, the catches were almost always divided into multiple NUMA nodes. Today (ie the new Intel chips), they are divided less or perhaps not at all. This is one reason why we have always recommended 2 vCPUs per VM XA back in the day - because most of the boxes we were using at the time was 2 × 2 × 2 or 4 and each box quad-socket has been divided into two nodes, respectively (each with 2 cores each). So 2 vCPUs was really the sweet spot and led to optimal performance on older chips / boxes. But fast forward to today ... and catch the last boxes are not divided as much or they are divided into much larger knots. So you might get a 2 x 8 and each socket has only one node, which makes super-awesome and easy to the size of things. I'll explain why it's great to side

XA VM Spec -. How vCPUs

So now that you know a thing or two? about NUMA (and if you're still fuzzy on this, I highly recommend this and this article - they explain it better than me), can you guess what the NUMA configuration underlying was on our box 2 × 8 used in our tests? Well, since I have already said that you 4 vCPUs gave the best results, you might assume that every shot is actually composed of two NUMA nodes within them (with 4 cores at their disposal each). And when I first heard this, I immediately looked up the specific Intel chip we used in the Dell boxes (because I am under the impression that they were newer Intel processors and they would therefore not be divided into multiple nodes in each socket), and of course, we use Intel chips were about 2 years (to 2011). It was therefore logical. But chances are if you buy hardware today with the latest Intel chips, sockets will probably have a single node. And if you have a box that is a 2 × 8 with a single NUMA node in each take, then chances are you'll get linear scalability with 8 vCPUs assigned to each VM XA. Let's dig in a little bit more ...

To better illustrate the concepts of "thrashing NUMA" and "linear scalability," we will again look at the practical results of our tests. To keep things simple, assume that we use a ratio of oversubscription of 1.5: 1 for all three of these scenarios. We wanted to test 2, 4 and 8 vCPUs (with 12 virtual machines 6 and 3, respectively) to see if the underlying NUMA nodes were really a factor and if things brought to the linear scale or not. We achieved a VSI Max score of 125, 130 and 0, respectively. So how should we interpret these results?

Well, these results tell me the difference between a 2 vCPUs and 4 vCPUs VM spec is almost negligible ... and things linear scale (ie we get about 10 users per VM XA with 2 vCPUs and 12 GB of RAM and 20 XA users per VM with 4 vCPUs and 24GB of RAM). And what is really expected, knowing that all these virtual machines can fit well in each NUMA node and are not cross the border NUMA. But what happens when we have larger virtual machines with 8 vCPUs and they do not fit well in these NUMA nodes each with 4 cores? This is when we have to use local and remote resources between NUMA nodes or even made ... or maybe the planner is moving things too often try to compensate locality ... it could lead to something called " NUMA thrashing ". And what that means thrashing NUMA scalability for XA and what we do? This means that latency increases, the planner hungry more often and it results in the density of users quite poor. In our case, it meant not to scale even close linearly - took about a 30% drop in performance when switching with 8 vCPUs XA specification VM! The moral of the story is to try to the size of your VM as a multiple of the NUMA node size of your physical host.

And another fun fact, I wanted to mention this note ... if you have a box 2 × 6 (still popular) and is composed of NUMA nodes each with 3 cores .. . then using a VM XA specification with an odd number of vCPUs could really give the best results! So while 3 vCPUs XA VMs may sound weird ... NUMA is why some people might recommend that apparently spec particular VM. Go with 2 or 4 vCPUs could actually cause more thrashing NUMA and worst response time and user density (and this has been tried and tested by several of our major health care clients, I might add!).

a word about business and LoginVSI Ratio

I know this article is long but stay with me because there one thing I want to quickly address if I can - and that is why we have "only" get 130 XA users on each physical piece of hardware (compared to the number 192 we get there a year on apparently same piece of hardware). Well, this has to do with the new default value or the average workload Login VSI 4.0 (the latest shipping release). The scalability tests that Andy and his team conducted a year ago (and even guys HRV project made it a few years ago) were performed with LoginVSI 3.x ... and the "normal" or average at the time workload was fairly well ... medium'ish! The script was much shorter and less intense. Fast forward to LoginVSI 4.0 and the script is much longer and more intense. In fact, a colleague and I did a quick test and the average bandwidth used by one user was around 260 kbps with the new script v4! And the script is "active" (inactive against) nearly 0% of the time !!! I do not know about you, but I would not say this as a typical worker XA task or even a medium / normal user ... that, to me, is a heavy user that works way more than the average bear. I really hope LoginVSI take this feedback to heart and change their script - most average users still XA 20 kbps today and most of the users' work 'about 50-60% of the time ... so it' is what really skew the numbers in our test with LoginVSI 4. once we have introduced more time to rest (sleep) and "softened" a little test script, we were magically get nearly 0 users box. Again, it is up to you to ensure that simulate what your users are doing - shame on us for using the average script or default comes with the free version of LoginVSI

UPDATE DAY: LoginVSI handed it to me after the publication of this article and let me know that they have some of that documentation on page 9 of their new v4 Upgrade Guide. But it seems they tested XD (versus XA) and only found that the new script increases the use of 22% CPU. It's still a lot, but I think more like 33% in my tests. LoginVSI also reflected on the change in their average workload by default and I will meet in November to discuss further. Good stuff ... cheers LoginVSI listen to our comments and one for the Community!

Wrap-Up and Key takeways

, which was a long article ... I know. So I'll try to summarize main points

  • If you can not do tests to find the optimal CPU oversubscription ratio, "split the difference" between . the number of vCPUs and pCPUs
  • do not forget to take into account NUMA when sizing your VMs XA - if possible, go with a multiple of the size of the NUMA node of the physical host
  • not. be afraid to go with bigger XA specifications, such as 4 or 8 vCPUs each. on the latest Intel chips, we see a linear scalability or even slightly better scalability with the major characteristics VM! and it also means fewer Windows OS license costs and much less overall to manage virtual machines !!! this is a great advantage that I kind of failed to explicitly mention above. I know a customer that can 800 XA manage VMs with 2 vCPUs each - they are now running 0 virtual machines with 8 vCPUs
  • Do not be afraid to use an odd number of vCPUs for your XA VMs - on a box 2 × 6, 3 vCPUs could be the best bet. About 2 × 10 boxes with newer procs E7, 5 vCPUs could be better if the industry is divided into two NUMA nodes within them. Or maybe you use 10 vCPUs each and set vNUMA if you use VMware (a topic for another day, but see page 42 of the last vSphere 5.5 WhitePaper best performance practices for information on vNUMA and 8 vCPU VM + ).
  • Be careful with the new default / average workload that ships with LoginVSI 4.0 - it is quite heavy and can skew your results by that 22-33%! This means that you could really buy too much equipment -. It is always best to customize your workload or test script to match what your users really are
hope you enjoyed this update on XenApp scalability - the 2013 edition! Please leave me a comment below if you have learned anything or if you have other questions, I have not managed to answer. Who knows ... maybe there is a part 3 on the road.
Cheers, Nick
Nick Rintalan, Lead Architect, Citrix Consulting