About two months ago I released my ultimate XenMobile survival guide. It’s packed with over 80 notes, general tips & tricks, best practices, recommendations and lessons learned from the filed with regards to XenMobile implementations. When people subscribed they would immediately receive their own personal copy (they still do by the way), which was sort of a test for me personally. As far as I am concerned my experiment worked out very well, over 200 people subscribed and it was well received throughout the community, thank you all very much! As of today it is available in my download section as well, of course it is still a 100% free and you won’t need to subsribe. It goes without saying that I’ll keep updating my current, as well as new, subscribers with interesting and useful content every now and again, or at least try :-)
New mobile devices are being developed and hit the market one after the other, as a result the software able to manage all these devices is constantly being updated and or tweaked as well. It’s even though by Citrix that by the time we hit 2015 there will be four times more mobile projects than Windows, 37% of the global workforce will be mobile meaning that a total of around 15 billion mobile devices will be connected and thus need to be managed, at least that’s the assumption.
About four months ago I wrote an article on SSL offloading for the Citrix XenMobile MDM server and talked about how this new feature helps us in placing the MDM server on our more secure corporate LAN as apposed to the DMZ. And although I still feel that this is a valid, robust and decent set up, I must admit that the idea of placing the MDM server in the DMZ doesn’t sound that bad after all, considering all that comes into play. During my last article on XenMobile I gave it a bit more thought and just recently I discussed it with a few community members as well. Let’s just say that, for now, I’m in doubt. Please feel free to share your thoughts on the matter, I might need your help on this one!
Don’t underestimate the power of prerequisites! No really, although this may seem like a straightforward topic, there’s a lot to think about, for example, we have to deal with firewall ports and protocols, IP numbers, DNS, AD, certificates, authentication, hard and software, licensing and more. By pre inspecting the prerequisites section, and thinking things through, not only will it tell you if you got what it takes, so to speak, it will also save you a lot of time once you start building and deploying your XenMobile infrastructure. And since I’ve been on the subject for the past few weeks, I thought I’d summarize some of the more important sections and subjects to focus on during the prerequisites and deployment phase, and ultimately show you how it all fits together (Visio included) from an architectural point of view.
As most of you probably know, one of the main components that makes up Citrix XenMobile App edition is the App Controller. It provides us with our Mobile, Web and SaaS applications including any HTML5 based applications and web links. Applications first need to be signed, than wrapped, adding in the MDX binaries, before being uploaded to App Controller and assigned to your users. A process I’ll describe in more detail in one of my upcoming articles. During this blog I’d like to zoom in on the integration of StoreFront and highlight some of the options we have when it comes to using Worx Home and/or Citrix Receiver in contacting either StoreFront, App Controller or both. I’ll show you how we can launch, not only our Mobile, Web and SaaS apps, but Windows based desktops and applications as well, without using both platforms individually.
As some of you might have noticed, Packt Publishing was randomly requesting (on Linked-In and facebook) IT professionals to review their, relatively, new book on Citrix XenMobile. Since Citrix study material (I really mean books here) can be hard to come by, I thought I’d give it a go as well. It’s my first book review, but that doesn’t stop me from being honest. I’ll try to judge from a professional, as well as a ‘beginners’, point of view. What kind of information am I presented with and does it really teach me something new?
Ever since Citrix acquired Zenprise and officially launched Citrix XenMobile it has been under constant development. Not to long ago Citrix announced version 8.6.1 (adding in PIN based authentication, multi domain and Site support, single join functionality and more) and I’m sure it won’t be long before we’ll see another version increment. BYOD has always been a hard concept to ‘get’ and manage and over the pas few years (it’s still relatively new) we’ve seen multiple vendors offer their ‘solution’ to take on the challenge. Since Citrix XenMobile is still considered as one of the leading parties, and probably will be for years to come, I though it would be a good idea to sum up some of its most important features.
Well over a month ago Citrix released the XenMobile Device Manager SSL Offload Server Patch for NetScaler. And although this has been something we’ve been waiting for, although ‘we’ is probably still a relatively small group, for some reason I haven’t read or heard a thing about it. Perhaps XenMobile isn’t as popular as I thought or people just don’t mind putting their MDM machines in their DMZ’s, I know I would. Whichever the case may be, from now on you can securely place your MDM machine on your internal network without having to worry about potential unsecure connections, SSL only! Although I do highlight the XenMobile MDM server patch, the below is applicable to other sorts of (web) services as well.
Just four months after Citrix released XenMobile 8.5 they’re now on the verge of launching version 8.6, I know, it’s hard to keep up. During this Blog I’d like to point out some of the new features and possibilities that version 8.6 will bring to the table, as announced by Citrix. At the same time I’d like to spend a minute discussing the device enrolment process when using MDM and have a closer look at the Worx enabled apps concept as well, including the MDX technology involved, since this tends to confuse people from time to time.
This week Citrix announced the acquisition of Byte Squared a.k.a. Byte². Another (big?) step forward in their mobile communication strategy. Citrix and Byte Squared, powering mobile productivity, as they stated on their Blog. I decided to check out their website to see if I could find out some more detailed information, which I did.