Visit Our Sponsors
So before we get into the difference between these two IT solutions, how about let’s start off with the definitions, shall we? Software-defined storage (SDS) is the abstracting of the physical storage from the controlling software. In other words, you can use one software to control multiple and often times, disparate hardware vendor storage solutions […]
To meet the corporate security requirements, users are required to access the ‘Business Application’ within Amazon WorkSpaces if the endpoint uses a secure WPA2 or WPA3 encrypted Wi-Fi connection. This video is from the fine folks at deviceTRUST.
To meet the corporate security requirements, users are required to access Amazon WorkSpaces if the endpoint uses a secure WPA2 or WPA3 encrypted Wi-Fi connection. This video is from the fine folks at deviceTRUST.
In last week’s installment of my blog series on reliable, cost-effective connectivity with Citrix Workspace, we uncovered a multitude of benefits from using Citrix SD-WAN between office locations and the data center VDA (Virtual Delivery Agent) servers used to deliver Virtual Apps & Desktops. This week, let’s look at how those benefits extend to VDAs […]
Did you know that with NetScaler Management and Analytics System (MAS) you can manage, monitor and troubleshoot your entire NetScaler infrastructure from a single console? This on demand webinar examines the features of NetScaler including the tips and tricks of configuration. This video is from the fine folks at Citrix
NetScaler natively separates out management vs data communication through two different types of IP address. A NetScaler IP (NSIP) can be considered the management IP of the NetScaler and is used for management access (GUI, SSH, Telnet, etc.). It is also used to source various other management traffic including: LDAP, Radius, TACACS, Kerberos authentication Perl […]
Today, Microsoft is announcing the new Azure Virtual WAN service. Citrix is proud to partner with Microsoft to provide Citrix SD-WAN solution as the on-ramp to Azure. The joint solution is designed for the WAN edge of Azure to help enhance user experience, deliver consistent productivity and automate the branch-office network deployments. Citrix SD-WAN provides […]
Microsoft’s Internet Information Services (IIS) is a web server that has traditionally come bundled with Windows (e.g., versions 5.0, 6.0, and beyond). IIS has numerous extensibility features. Swappable interfaces like ISAPI and FastCGI make it possible to use IIS with a variety of backend technologies, from micro-frameworks like Flask to runtimes like Node.js, along with […]
With the basic concepts of software-defined wide area networking still fresh in mind from my last blog post, it’s time to explore the many ways that Citrix SD-WAN adds value to the Citrix Workspace delivery architecture. If you’re using or planning to deploy virtual desktops or DaaS, Gartner’s informative research report How to Ensure Your Network […]
“Goliath Technologies is the only truly proactive end-to-end monitoring and management solution for Citrix. Goliath provides deep metrics and analysis necessary for organizations to get ahead of issues in the three key areas that often cause pain for end users: logon initiation, logon duration and session performance.” -Chris Chrobocinski, VP Managed Services, MTM Technologies MTM […]
As cloud computing has accelerated, so has the way enterprise customers are using cloud to meet their business needs. Today’s cloud computing includes a variety of services, such as SaaS, PaaS, IaaS and a variety of deployment models to suit their needs such as workloads, security, and infrastructure support. Many cloud adopters use public cloud […]
When troubleshooting Citrix end user experience issues, problems are often rooted in the bandwidth users have available for Citrix connectivity or Citrix connection latency. However, these conditions are not visible from a pure network monitoring perspective, as network monitoring tools can only leverage Netflow, AppFlow Analysis, SNMP, SYSLOG or ICMP monitoring. The key data necessary […]
When you check in to a hotel, you are given a key card that provides you with access to your room and some shared areas. It does not give you access to the entire hotel including all rooms and management areas. Likewise, other guests are given access to their rooms — not yours. At times, […]
The cloud makes it possible for us to have effortless access to our data from any device. Users have adapted quickly to this concept and expect to have the same experience when accessing company-managed data. However, certain industries still need to follow strict compliance and security regulations, which require data to be stored locally. Sharefile‘s […]