I’m currently working on a new Blog in which I will discuss Citrix Project Avalon including the first two releases know as: Excalibur and Merlin. I’m still in the research phase to get my facts straight, give me a week or two, maybe three and I’ll report back.
Cloud computing… A bunch of computing resources delivering some kind of service over the network, typically being the Internet. It includes, or should include, on demand self-service capabilities like: requesting access to certain applications and data, automated account provisioning or perhaps the ability to manage your own VM’s. It’s hot and everybody wants a piece! Services like Google Apps, Amazon cloud drive and Microsoft’s Azure, to name a few, are examples that do just that. These are the cloud solutions often referred to when the Cloud hype gets mentioned. But what about an on-premises solution, building your own private cloud which can be safely accessed from anywhere?!
During the past few weeks I’ve collected a set of tools which assist in troubleshooting XenApp and XenDesktop orientated architectures. Before you continue make sure you have a look at the Citrix Brief Troubleshooting Guide: support.citrix.com/article/CTX106727 and the Citrix Logon Optimization Guide: support.citrix.com/article/CTX128277. Both are a MUST read with lots of tips and tricks, what and when to ask, and dozens of knowledge base articles including explanations on the logon processes etc…
Citrix printing can be, or at least can be made, pretty complex, unfortunately I had to find out the hard way myself. When troubleshooting print issues the path a print job follows throughout your infrastructure is always a good place to start especially when its performance related. However, you do need to understand the differences between the various routes a print job can take, why and where it could impact performance. I remember a few years back all this got me buzzing… Let’s start and see what comes up.
One of those lesser known Terminal Server (Citrix) concepts which is often overlooked.
What is it and what does it do?! I learned about the shadow key in more detail about 6 years ago and since then I noticed that not all, or very few to be honest, system admins know about its existence, or that they do know, but don’t know how to treat it… does that make any sense? First I’ll briefly try and explain the use, advantages and disadvantages. Also, there have been made a few small changes to the overall architecture with the introduction of 64 bit systems and Server 2008R2 which I’ll address later on