Archive
Designing a virtual desktop environment? – #XenDesktop, #Citrix
This is a good blog post by Niraj Patel.
Questions: How do you successfully design a virtual desktop solution for 1,000 users? How about 10,000 users? What about 50,000 users? What are the questions you should be asking? Most importantly, where do you start?
Answer: Hire Citrix Consulting for your next virtual desktop project! OK, that is one right answer, but not the only way to do it. The successful way to design a virtual desktop environment is to follow a modular approach using the 5 layers defined within the Citrix Virtual Desktop Handbook. Breaking apart a virtual desktop project into different layers provides a modular approach that reduces risks and increase chances for your project’s success no matter how larger you’re planned deployment is. What are the 5 layers and some examples of the decisions are defined within them?
- User Layer: Recommended end-points and the required user functionality.
- Access Layer: How the user will connect to their desktop hosted in the desktop layer. Decisions for local vs. remote access, firewalls and SSL-VPN communications are addressed within this layer.
- Desktop Layer: The desktop layer contains the user’s virtual desktop and is subdivided into three components; image, applications, and personalization. Decisions related to FlexCast model, application requirements, policy, and profile design are addressed in this layer.
- Control Layer: Within the control layer decisions surrounding the management and maintenance of the overall solution are addressed. The control layer is comprised of access controllers, desktop controllers and infrastructure controllers. Access controllers support the access layer, desktop controllers support the desktop layer, and infrastructure controllers provide the underlying support for each component within the architecture.
- Hardware Layer: The hardware layer contains the physical devices required to support the entire solution, and includes servers, processors, memory and storage devices.
Want to know how to get started? Try the Citrix Project Accelerator. Input criteria around your business requirements, technical expertise, end user requirements, applications, etc. to get started on your architecture based on the 5 layer model.
Lastly, don’t forget to come see SYN318…
Continue reading here!
//Richard
Latest Security Intelligence Report Shows 24 Percent of PCs are Unprotected
Interesting and scary facts from Microsoft… why not just add a simple cloud based solution like Webroot to your PC’s and Mac’s? Read more about Webroot that I think is a great product here from one of my earlier posts: 1st Test of Webroot SecureAnywhere – #Webroot, #SecureAnywhere, #BYOD
Today, Microsoft released new research as part of its Security Intelligence Report, volume 14, which takes a close look at the importance of running up-to-date antivirus software on your computer. The research showed that, on average, computers without antivirus software are 5.5 times more likely to be infected.
Antivirus software from Microsoft, McAfee, Symantec and others helps to guard against viruses, remove infections and protect your privacy. It can help protect your computer from malware trying to steal your credit card information, e-mail address book or even the files you’ve saved to your computer. It is one of the most crucial defenses computer users have to help protect against cybercriminals.
If you have been using computers as long as I have, long before almost every device was constantly connected to the Internet, you’ll recall the days when viruses were typically spread via sneaker-net, through infected floppy disks. Read more…
#Citrix transfers #Xen to the #Linux Foundation – via @scottjcutter
![]() |
In 2007 Citrix acquired XenSource gaining control over the development of the Xen Hypervisor part of the Xen project. Today Citrix announcedthat it will hand over the Xen Project to the Linux Foundation which will continue its development. After both Ian Pratt and Simon Crosby who came from XenSource left Citrix to start their company Bromium, Citrix has clearly been struggling on how to continue its involvement in the development of the Xen project, leading to this decision.
The following companies will contribute to and guide the Xen Project as founding members of the Collaborative Project at The Linux Foundation: Amazon Web Services, AMD, Bromium, Calxeda, CA Technologies, Cisco, Citrix, Google, Intel, Oracle, Samsung and Verizon.
Its interesting to note that the Linux Foundation also supports the Kernel-based Virtual Machine (KVM) development, the hypervisor included in…
Continue reading here!
//Richard
Get Started with #SharePoint Server 2013 Quickly on #Windows #Azure
Another good blog posts by Bill Baer (Microsoft) that shows how easy it is to try out SharePoint Server 2013 on Azure!
In order to remain competitive in today’s business climate you need to be able to respond to change and challenges quickly. Sometimes that means adjusting your SharePoint infrastructure on a moment’s notice to maintain a competitive advantage.
Infrastructure as a Service solves these challenges through a ready-to-use, pay as you go solution which means you can deploy in hours as opposed to days, whether you’re looking to deploy a simple SharePoint-based Internet site or to quickly provision a development environment.
SharePoint 2013 on Windows Azure Virtual Machines enables you to rapidly deploy and host your business websites on a secure, scalable cloud infrastructure.
What are Windows Azure Virtual Machines?
Windows Azure Virtual Machines enable organizations to deploy custom Windows Server images to Windows Azure. Virtual Machines provide developers complete control of the application environment and allow easy migration of existing applications to the cloud. To learn more about Windows Azure Virtual Machines see also http://www.windowsazure.com/en-us/home/scenarios/virtual-machines/.
How can I benefit from Azure IaaS?
Business Mobility
Windows Azure Virtual Machines allow you to easily move your applications and infrastructure back and forth from on-premises to the cloud without requiring any changes to the existing code – if you’ve virtualized SharePoint 2013 in on-premises you can quickly and easily move your virtual hard drives between your datacenter and the cloud.
License Mobility
With License Mobility through Software Assurance, you can deploy certain server application licenses purchased under your Volume Licensing agreement in an Authorized Mobility Partner’s datacenter. To learn more about License Mobility see also http://www.microsoft.com/licensing/software-assurance/license-mobility.aspx . With License Mobility through Software Assurance, you can deploy certain server application licenses purchased under your Volume Licensing agreement in an Authorized Mobility Partner’s datacenter. Read more…
Vulnerability in Remote Desktop Client – #RDS
Microsoft Security Bulletin MS13-029 – Critical
Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223)
Published: Tuesday, April 09, 2013 | Updated: Wednesday, April 10, 2013
Version: 1.1
This security update resolves a privately reported vulnerability in Windows Remote Desktop Client. The vulnerability could allow remote code execution if a user views a specially crafted webpage. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
This security update is rated Critical for Remote Desktop Connection 6.1 Client, Remote Desktop Connection 7.0 Client, and Remote Desktop Connection 7.1 Client where affected on Windows XP, Windows Vista, and Windows 7. It is rated Moderate for Remote Desktop Connection 6.1 Client, Remote Desktop Connection 7.0 Client, and Remote Desktop 7.1 Client where affected on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerability by modifying the way that Remote Desktop Client handles objects in memory. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.
Recommendation. Most customers have automatic updating enabled…
Continue reading here!
//Richard
#Windows #Azure Virtual Machines and Virtual Network now are generally available
As I use to write; THIS IS INTERESTING! I think that Microsoft will take some market share for sure with their cloud service offerings!
Windows Azure Virtual Machines and Virtual Network now are generally available. We have new prices for Virtual Machines, Virtual Network, and Cloud Services.
Today is a major milestone for Windows Azure and all of our customers and partners. We are excited to announce that Windows Azure Virtual Machines and Windows Azure Virtual Network now are generally available. We also want to update you on new prices for Virtual Machines, Virtual Network, and Cloud Services.
Virtual Machines and Virtual Network help you meet changing business needs by providing on-demand, scalable infrastructure. These infrastructure services enable you to extend your data centers and workloads into the cloud while using your existing skills and investments. With these services, you can:
- Provision Microsoft SharePoint farms in minutes without up-front hardware investments. Integrate full-trust code to run rich apps and provide Internet-facing collaboration sites.
- Prototype your newest app or extend data marts into the cloud using Virtual Machines as a robust infrastructure for Microsoft SQL Server software. Scale on demand and connect to your on-premises infrastructure using Virtual Network.
- Embrace rapid innovation using the cloud for development and test scenarios. You can spin up any test lab or sandbox quickly, and be agile in your learning, development, and prototyping.
Let’s take a closer look at the news that we are announcing today with general availability.
New high-memory instances for Virtual Machines
When your apps need more memory, new 28-gigabyte (GB) and 56-GB instances deliver.
Updated SLA
When you deploy multiple instances of Virtual Machines, Microsoft provides a financially backed 99.95 percent monthly service level agreement (SLA).
Customer support
Our customer support team is ready and available to help you troubleshoot 24 hours a day, seven days a week. We have several support plans tailored to meet your needs—from basic developer support to Premier Support. When you work with Microsoft, you have a single vendor to call for cloud and on-premises needs.
Validated workloads
The best of Microsoft server products are validated to run on Virtual Machines, including Microsoft Dynamics NAV 2013, SharePoint Server 2013, BizTalk Server 2013, and more. We also offer prebuilt virtual machine images—such as BizTalk Server and SQL Server—through the Windows Azure Virtual Machines Image Gallery with hourly pricing. Prebuilt Linux images—such as CentOS, Ubuntu, and Suse Linux Enterprise Server (SLES)—are available in the Image Gallery from commercial distributors. In addition, a wide variety of the most popular open source applications are available as prebuilt images in VM Depot, a self-service community portal. Read more…
#Citrix #NetScaler 10 on Amazon Web Services – #AWS
Yes, it’s here! 🙂
Mainstream IT is fast embracing the enterprise cloud transformation and selecting the right cloud networking technologies has thus quickly emerged to be an imperative. As mainstream IT adopts IaaS (Internet as a service) cloud services, they will require a combination of the elasticity and flexibility, expected of cloud offerings and the powerful advanced networking services used within emerging enterprise cloud datacenters.
Citrix® NetScaler® 10 delivers elasticity, simplicity and expandability of the cloud to enterprise cloud datacenters and already powers the largest and most successful public clouds in the world. With NetScaler 10, Citrix delivers a comprehensive cloud network platform that mainstream enterprises can leverage to fully embrace a cloud-first network design.
Citrix and Amazon Web Services (AWS) have come together to deliver industry-leading application delivery controller technology. NetScaler on AWS delivers the same services used to ensure the availability, scalability and security of the largest public and private clouds for AWS environments. Whether the need is to optimize, secure or control delivery of enterprise and cloud services, NetScaler for AWS can help accomplish these initiatives economically, and according to business demands.
The full suite of NetScaler capabilities such as availability, acceleration, offload and security functionality is available in AWS, enabling users to leverage tried-and-true NetScaler functionality such as rewrites and redirects, content caching, Citrix Access Gateway™ Enterprise SSL VPN, and application firewall within their AWS deployments. Additional benefits include usage of Citrix CloudBridge™ and Citrix Branch Repeater™ as a joint solution.
Citrix NetScaler transforms the cloud into an extension of the datacenter by eliminating the barriers to enterprise-class cloud deployments. Together, NetScaler and AWS delivers a broad set of capabilities for the Enterprise IT:
Hybrid Cloud Environment
Hybrid clouds that span enterprise datacenters and extend into AWS can benefit from the same cloud networking platform, significantly easing…
Continue reading here!
//Richard
Demystifying Citrix Excalibur Architecture – via @kbaggerman
A great blog post by Kees Baggerman! 🙂
For all XenApp admins and consultants out there Project Avalon will bring a big change as we are used to having XenApp servers running on the (what seemed to be) everlasting Citrix Independent Management Architecture and we’re heading to Citrix FlexCast Management Architecture (already included in XenDesktop at this moment) and will be included in the Citrix Excalibur Architecture.
IMA
When looking up IMA in the eDocs you’ll find:
Independent Management Architecture (IMA) is the underlying architecture used in XenApp for configuring, monitoring, and operating all XenApp functions. The IMA data store stores all XenApp configurations.
Basically IMA exists to manage the XenApp or Presentation Server farms by enabling the communications between servers. As stated it transfers information about all XenApp functions like licenses, policies, sessions and server loads. All management tooling within these versions of Citrix’s PS/XA rely on this service for information.
According to Communication ports used by Citrix Technologies IMA uses the following ports:
| Ports | Source | Prot. | Comment |
| 2512 | Common Citrix Communication Ports | TCP | Independent Management Architecture (IMA) |
| 2513 | Access Gateway 5.0 Controller administration | TCP | IMA-based Communication |
As we can see IMA uses 2512 (by default) to communicate with other servers and the Access Gateway Controller uses 2513 (by default) for IMA-based communication. The port IMA uses can be changed or queried via the commandline tool IMAPORT.
Brian Madden did a blogpost way back in 2007 but it’s definition of IMA is still current:
Independent Management Architecture is:
- A data store, which is a database for storing MetaFrame XP server configuration information, such as published applications, total licenses, load balancing configuration, MetaFrame XP security rights, and printer configuration.
- A protocol for transferring the ever-changing background information between MetaFrame XP servers, including server load, current users and connections, and licenses in use
FMA
With the introduction of XenDesktop we got a new architecture called Flexcast Management Architecture. This new architecture has got an agent-based setup where we can install the operating system including the basic applications that need to be installed and after that we can install an agent. This agent registers itself to a controller and is offered through StoreFront to the end user.
This will be delivered by two different types of agents, one to support Windows Server OS’s and one for Windows Desktop OS’s.
Andrew Wood did an article on Excalibur and used this diagram to explain the architecture:
Citrix FlexCast Management Architecture
- Receiver provides users with self-service access to published resources.
- StoreFront authenticates users to site(s) hosting resources and manages stores of desktops and applications that users access – Web Interface as a platform is essentially resting, but it will cease to be.
- Studio is a single management console that enables you to configure and manage your deployment, a dramatic reduction over the 23 consoles you could well have today. Studio provides various wizards to guide you through the process of setting up an environment, creating workloads to host applications and desktops, and assigning applications and desktops to users.
- Delivery Controller distributes applications and desktops, manages user access, and optimizes…
Continue reading here!
//Richard
Report: Android malware doubled in 2012, infecting 33M devices
Malware attacks on devices running Google’s (NASDAQ:GOOG) open-source Android mobile operating system more than doubled in 2012, security solutions firm NQ Mobile reports.
![]() |
| NQ Mobile saw a year-over-year increase of malware of 163 percent. |
NQ Mobile discovered 65,227 new pieces of mobile malware in 2012 compared to 24,794 in 2011, a year-over-year increase of 163 percent. Among all new malware discovered last year, 94.8 percent of threats were designed to attack Android, compared to just 4 percent targeting rival open-source platform Symbian. In all, more than 32.8 million Android devices were infected in 2012, up from 10.8 million in 2011, representing an increase of more than 200 percent.
Chinese devices accounted for 25.5 percent of infected Android devices, followed by India (19.4 percent), Russia (17.9 percent), the United States (9.8 percent) and Saudi Arabia (9.6 percent). Fifty-three percent of U.S. Android owners have installed a mobile security app on their device, NQ Mobile adds.
Sixty-five percent of mobile malware discovered in 2012 falls into the category of Potentially Unwanted Programs–e.g., root exploits, spyware, pervasive adware and Trojans (surveillance hacks). Twenty-eight percent was designed to collect and profit from a user’s personal data, and 7 percent was built to prevent the user’s device from functioning properly.
The primary methods for delivering malware in 2012 included App Repackaging (adding lines of malicious code into a legitimate app and reloading it onto a third-party marketplace), Smishing (asking consumers to click on a fraudulent link, triggering a malicious app download or directing their browser to a rogue website) and Malicious URLs (redirecting the browser from genuine websites to clone sites intended to collect personal data).
Critics maintain Google has failed to sufficiently police its Google Play digital storefront, making it easy for attackers to distribute malware via Android applications. Google has made strides to reduce Android threats, however: In early 2012, it unveiled Bouncer, which scans Google Play for malicious apps, and its Android 4.2 OS update, a.k.a. Jelly Bean, bakes in application verification tools.
The NQ Mobile report…
Continue reading here!
//Richard
#Ericsson to acquire #Microsoft #Mediaroom
This is interesting!!! 🙂
-
Underlines Ericsson’s commitment to being partner of choice for Video distribution across multiple networks and devices
-
Places Ericsson in lead for TV Anywhere consumption
-
Ericsson becomes leading player for innovative video distribution with combined market share of more than 25%
Ericsson (NASDAQ:ERIC) has reached an agreement with Microsoft (NASDAQ:MSFT) to acquire its TV solution Mediaroom business. This will make Ericsson the leading provider of IPTV and multi-screen solutions with a market share of over 25%. Closing expected during the second half of 2013. Mediaroom is situated in Mountain View, California and employs more than 400 people worldwide.
Per Borgklint, Senior Vice President and Head of Business Unit Support Solutions at Ericsson said: “Ericsson’s vision of the Networked Society foresees 50 billion devices to be connected via broadband, mobility and cloud. Future video distribution will have a similar impact on consumer behavior and consumption as mobile voice has had. This acquisition contributes to a leading position for Ericsson with more than 40 customers, serving over 11 million subscriber households. In addition, Ericsson will be powered with senior competence and some of the most talented people within the field of IPTV distribution.”
The global IPTV market is estimated to reach 76 million subscribers in 2013 with revenues of 32 BUSD, growing to 105 million subscribers and 45 BUSD in 2015.
“Mediaroom is the leading platform for video distribution deployed with the world’s largest IPTV operators. This strategic acquisition positions Ericsson as an industry leader thanks to the skills and experiences of the talented people of Mediaroom combined with Ericsson’s end to end service capabilities” Borgklint concluded.
The total media solution portfolio of Ericsson in the TV and video space combined with a further increased focus on consumer needs will be the foundation for providing services to end users. The importance of video distribution capabilities for the customers and their consumers will be increasing as more and more LTE networks are deployed and filled with smartphone users.
“We are proud of the number one IPTV market position that we have achieved with Mediaroom. Ericsson’s complementary portfolio of TV and networking services will help drive the future growth and development of Mediaroom,” said Tom Gibbons, Corporate Vice President of Microsoft Corporation. “Ericsson is positioned to be a valuable strategic partner for operators and TV service providers around the world as the IPTV market evolves.”
Microsoft Mediaroom is the TV technology behind many of the world’s leading television service providers like AT&T U-verse®, Entertain of Deutsche Telekom, Telefonica, TELUS Optik TV(TM) and Swisscom. Mediaroom-powered TV services are offered on more than 22 million set top boxes deployed throughout the Americas, EMEA and APAC.
Read more here:
Press release – Ericsson to acquire Microsoft Mediaroom
Q&A: Why Ericsson snagged Microsoft’s Mediaroom
//Richard








