Citrix XenDesktop 7 provides a unified framework for virtual desktop and application solutions based on a 5-layer model. The blueprint details architectures for standardized desktops, customizable desktops, and applications. It recommends Machine Creation Services for image delivery and defines policies, personalization settings, and control components to meet requirements for different user groups accessing resources from various locations.
Learn about the IBM SmartCloud Desktop Infrastructure.The SmartCloud Desktop Infrastructure solution with VMware View running on IBM Flex System simplifies IT manageability and control. It delivers high fidelity user experiences across devices and networks. The features of VMware View that are included in the SmartCloud Desktop Infrastructure solution provide enhanced security, high availability, centralized management and control, and scalability. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Learn about the IBM SmartCloud Desktop Infrastructure. The SmartCloud Desktop Infrastructure solution with Citrix XenDesktop running on IBM Flex System offers tailored solutions for every business, from the affordable all-in-one Citrix VDI-in-a-Box for simple IT organizations to the enterprise-wide Citrix XenDesktop. XenDesktop is a comprehensive desktop virtualization solution with multiple delivery models that is optimized for flexibility and cost efficiency. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
On the other hand DeskStream employs client-side desktop virtualization technology to offer an optimized and high performance Dynamic Virtual Desktops (DVDs) by combining the best of centralized IT management and client computing together to deliver truly anywhere, anytime personalized desktop execution on any device resulting in significant cost savings and uncompromised user experience.
Learn about the IBM SmartCloud Desktop Infrastructure.The SmartCloud Desktop Infrastructure solution with VMware View running on IBM Flex System simplifies IT manageability and control. It delivers high fidelity user experiences across devices and networks. The features of VMware View that are included in the SmartCloud Desktop Infrastructure solution provide enhanced security, high availability, centralized management and control, and scalability. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Learn about the IBM SmartCloud Desktop Infrastructure. The SmartCloud Desktop Infrastructure solution with Citrix XenDesktop running on IBM Flex System offers tailored solutions for every business, from the affordable all-in-one Citrix VDI-in-a-Box for simple IT organizations to the enterprise-wide Citrix XenDesktop. XenDesktop is a comprehensive desktop virtualization solution with multiple delivery models that is optimized for flexibility and cost efficiency. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
On the other hand DeskStream employs client-side desktop virtualization technology to offer an optimized and high performance Dynamic Virtual Desktops (DVDs) by combining the best of centralized IT management and client computing together to deliver truly anywhere, anytime personalized desktop execution on any device resulting in significant cost savings and uncompromised user experience.
VMware End-User-Computing Best Practices PosterVMware Academy
The End-User-Computing Best Practices poster gives you up-to-date tips and guidelines for configuring and sizing the wide range of EUC products. Enlarge and print!
Microsoft veröffentlichte vor kurzem das jüngste Update für System Center Configuration Manager - System Center 2012 R2 Configuration Manager. Viele der neuen Updates sind so gut, dass jeder das Upgrade so schnell wie möglich haben möchte. Wally Mead, Microsoft MVP, präsentierte in dieser Preäsentation die neuen Features von Configuration Manager 2012 R2.
The Citrix Virtual Desktop Handbook examines the project lifecycle for a desktop virtualization project.
The Handbook provides the methodology, experience and best practices needed to successfully design your own desktop virtualization solution
https://support.citrix.com/article/CTX136546
VMware End-User-Computing Best Practices PosterVMware Academy
The End-User-Computing Best Practices poster gives you up-to-date tips and guidelines for configuring and sizing the wide range of EUC products. Enlarge and print!
Microsoft veröffentlichte vor kurzem das jüngste Update für System Center Configuration Manager - System Center 2012 R2 Configuration Manager. Viele der neuen Updates sind so gut, dass jeder das Upgrade so schnell wie möglich haben möchte. Wally Mead, Microsoft MVP, präsentierte in dieser Preäsentation die neuen Features von Configuration Manager 2012 R2.
The Citrix Virtual Desktop Handbook examines the project lifecycle for a desktop virtualization project.
The Handbook provides the methodology, experience and best practices needed to successfully design your own desktop virtualization solution
https://support.citrix.com/article/CTX136546
Transforming apps and desktops delivery, XenDesktop 7 allows customers to select, configure and scale more mobile use cases more quickly, easily and economically than ever before. This reviewer's guide is intended to provide analysts and reviewers step-by-step instructions to quickly set up a small test-lab running the latest Flexcast technology from Citrix. It guides first-time users through desktop and app virtualization terminology, and provides new and existing customers with an understanding of architecture, components, key solution scenarios and use cases, whether adopting or transitioning to XenDesktop 7 app and desktop solutions. The guide assumes basic familiarity with XenApp or XenDesktop, and expects the reader to have good knowledge of virtualization and networking.
Synergy 2015 Session Slides: SYN235 Cost-effective XenDesktop and XenApp Desi...Citrix
Get this slide deck from the SYN235 session at Citrix Synergy 2015 to learn about how you can effectively design cost-effective deployments for the SMB.
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
MEDICAL FACILITY ANALYSIS 2
MEDICAL FACILITY ANALYSIS 16
Medical Facility Analysis
Connie Farris
Colorado Technical University
Information Technology Architectures
(IT401-1801B-02)
Jennifer Merritt
Running head: MEDICAL FACILTY ANALYSIS 1
Table of Contents
Project Outline………………………………………………………………………...3
System Requirements …………………………………………………………………3
Architecture Selection………………………………………………………………….6
Resources and Timeline……………………………………………………………….8
Security…………………………………………………………………………………11
Final Analysis and Recommendations………………………………………………….13
References……………………………………………………………………………….15
Project Outline
Health care delivery systems are complex sociotechnical systems, characterized by dynamic interchanges with their environments (e.g., markets, payers, regulators, and consumers) and interactions among internal system components. These components include people, physical settings, technologies, care processes, and organization (e.g., rules, structure, information systems, communication, rewards, work flow, culture). ("Agency for Healthcare Research and Quality,", 2012) A local medical facility has requested an analysis to determine what will be required to update the current system and include video consults for the patients. This company has locations in 7 states of the southeastern part of the US. The process will be implemented at 21 locations. Over the next few weeks I will research the details which will include software, hardware, cost for equipment upgrades, and other extra cost that may be involved according to system requirements listed below. Network configuration will be discussed in the functions of the system. The need for the time frame for the project will also be considered. The main concern is to deliver a quality system. The final product will include a system where patients will be able to have face to face consultations with the doctor or PA through video capability.
System Requirements
. The first step is that the operating systems be updated with Microsoft 64 or 32-bit Windows 10 Pro, Windows 8 Pro, or Windows 7 Professional for best performance. Systems utilizing the architecture will have processors that are Intel Core i5-3470 3.2GHz LGA 1155 77W Quad-Core Desktop Processor equivalent or higher. The architecture requires 6 GB DDR3 RAM for memory and 250 GB of free space or higher for the hard drive. Uninterruptible Power Supply (UPS) is required for the client’s Information Technology (IT) professional to install. The HP LaserJet 3000 or 4000 Series printers are recommended. Broadband internet connections (specifically Cable) are recommended. For the 21 locations Logitech Meetup 4K HD Video Conference Camera with Integrated Audio will be purchased and installed. ("Hardware Specifications - American Medical Software", 2018)
The Functions of the System
The functions of this system will be to perform the basic functions of any medical offices. The system will be able to book appoint ...
IBM SmartCloud Desktop Infrastructure (SDI) is IBM’s answer to end-user virtualization and integration needs. It offers robust virtual desktop solutions, infrastructure, and services designed to make the deployment of virtual desktops easier as is based on a reference architecture approach. As such, IBM SDI supports a wide range of hardware, hypervisors and software platforms from multiple vendors, providing a high degree of flexibility and customization choices. IBM SDI helps offer a more cost-effective, manageable, virtual desktop environment for a wide range of customer sizes, user types and industry segments. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
Faster Computing has contacted Go2Linux and requested a brief propChereCheek752
Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux.
The company is specifically interested in seeing the following information:
(10.1.1: Identify the problem to be solved.)
· Based on your current understanding of Faster Computing's business, what are some potential benefits of Linux?
· The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).
(10.1.2: Gather project requirements to meet stakeholder needs.)
· What steps will be required to migrate the systems from Windows to Linux?
· Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.
(10.1.3: Define the specifications of required technologies.)
· What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).
(1.1.3: Present ideas in a clear, logical order appropriate to the task.)
The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.
· An introductory slide
· A summary slide
· Voice narration on every slide
For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.
(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)
You must cite at least two quality sources.
You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.
Use the Migration Proposal Presentation template to get started.
(2.3.1: State conclusions or solutions clearly and precisely.)
You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.
Migration Proposal Presentation
Linux, like Windows and Mac OS, is a fully accessible software. It is no longer only an operating system;
Linux
Cont’
it is now also a substrate for running workstations, servers, and integrated devices.
Since it is publicly available and portable, it has a wide range of installations and modifications. The kernel is an essential component of the Linux operating system.
Numerous characteristics of the Linux environment show that it is superior than o ...
Good news from the Worldwide Consulting Desktop & Apps (DnA) team! We’ve just finished updating theVirtual Desktop Handbook for XenDesktop 7, StoreFront 2.0 and XenServer 6.2.
The Virtual Desktop Handbook is an architect’s guide to desktop virtualization. It provides you with the methodology, experience and best practices you need to successfully design your own desktop virtualization solution.
Updates in this release include:
Resource requirements for Windows 8 and Server 2012
XD controller sizing
XenDesktop 7 policy guidelines
Database sizing for XenDesktop 7
SQL 2012 chapter
StoreFront 2.0 chapter
32-bit or 64-bit desktop OS guidance
Desktop group & StoreFront integration
In addition, we’ve also included a Citrix policy quick reference spreadsheet so that you can quickly identify default, baseline and template settings from XenDesktop 5 / XenApp 6 all the way up to XenDesktop 7. Thanks go out to Michael Havens, Maria Chang and Uzair Ali for creating this great reference spreadsheet.
I hope you find this handbook useful during your next desktop virtualization project.
And we’re not done yet, future updates will include:
Bandwidth
Hyper-V 2012
PVS 7
User data
And more …
The Virtual Desktop Handbook is not the only resource to guide you through your desktop virtualization journey. Citrix also provides Project Accelerator; an interactive online tool creating customized sizing and design recommendations based on the methodology, best practices and expert advice identified within this handbook.
You can still reach the XenDesktop 5 handbook using the old URL – CTX136546
Andy Baker – Architect
Worldwide Consulting
Desktop & Apps Team
http://blogs.citrix.com/2013/10/10/new-xendesktop-7-handbook-published/
Reference architecture dir and es - finalNuno Alves
Citrix Director with EdgeSight provides a complete troubleshooting window to quickly resolve issues around desktops or applications. Previous versions of XenApp leveraged EdgeSight, while XenDesktop deployments looked to Director for assistance. Starting in XenDesktop 7, these two great technologies have been merged into one central point for troubleshooting.
The purpose of this document will be to provide you an overviewof all the necessary parts required to give your company a holistic view. With this being a new product with new features, this document will provide administrators the tools to feel comfortable moving forward with monitoring of a XenDesktop 7 deployment.
This document will cover the configuration of the Director server, as well as how to interface with the Insight Center provided from our NetScaler product line. For more of an overview of the EdgeSight product, please reference the whitepapersfound at www.citrix.com/xendesktop.
http://support.citrix.com/article/CTX139051
Provisioning server high_availability_considerations2Nuno Alves
The purpose of this document is to give the target audience an overview about the critical components of a Citrix
Provisioning Server infrastructure with regards to a high availability implementation. These considerations focus on the
following areas:
• Virtual Disk (vDisk) Storage
• Write Cache Placement
• SQL Database
• TFTP Service
• DHCP Service
Xd planning guide - storage best practicesNuno Alves
The Citrix Storage planning guide provides a list of best practices, recommendations and
performance related tips that cover the most critical areas of storage integration with Citrix
XenDesktop. It is not intended as a comprehensive guide for planning and configuring storage
infrastructures, nor as a storage training handbook.
Due to scope, this guide provides some device-specific information. For additional device- specific
configuration, Citrix suggests reviewing the storage vendor’s documentation, the storage vendor’s
hardware compatibility list, and contacting the vendor’s technical support if necessary
This document is an introduction to Disk Storage technologies and its terminology. Within this
document basic disk and storage architectures as well as storage protocols and common fault
tolerance technologies will be discussed. It is not intended as a comprehensive guide for planning
and configuring storage infrastructures, nor as a storage training handbook.
Due to scope, this guide provides some device-specific information. For additional device- specific
configuration, Citrix suggests reviewing the storage vendor‘s documentation, the storage vendor‘s
hardware compatibility list, and contacting the vendor‘s technical support if necessary.
For design best practices and planning guidance, Citrix recommends reviewing the Storage Best
Practices and Planning Guide (http://support.citrix.com/article/CTX130632)
This document describes how XenServer provides and keeps track of the storage supplied to its guests. The first section
is a reminder of how Linux looks at storage and the second section builds on that to explain XenServer storage. Basic
knowledge of Linux is required, as some standard tools are used.
XenDesktop relies on the hypervisor for many core functions, including VM creation, power operations, performance and redundancy. Therefore, it is important that you take the time to design an appropriate hypervisor infrastructure (XenServer, Hyper-V or vSphere). Otherwise, you may experience performance, functionality or even reliability issues.
Most information required to design a XenDesktop deployment on your chosen hypervisor platform is available publicly, but it can be hard to find since it’s spread across a multitude of knowledge base articles or white papers. In order to simplify and speed-up the design process, we’re in the process of consolidating the information that you need into a single document and augmenting it with recommendations and best practices. We’ve just finished incorporating the Hyper-V 2008 R2 and SCVMM 2012 planning section into the latest release of the Citrix Virtual Desktop Handbook, which includes important design decisions relating to this hypervisor, for example:
Selecting and sizing the right physical hardware for virtual machines
Knowing what storage options available for Hyper-V 2008 R2
What type of networks to build on the Hyper-V host
How to size the SCVMM servers
Designing a highly available SCVMM solution
Planning an effective failover cluster
The products covered in this current release of the handbook include XenDesktop 5.6, XenApp 6.5, Provisioning Services 6.x and XenClient Enterprise 4.5. A version of the Virtual Desktop Handbook covering XenDesktop 7.x, Provisioning Services 7, Hyper V 2012 R2 and SCVMM 2012 R2 is in the works with an initial release scheduled later in Q4. As always your feedback is welcomed.
http://blogs.citrix.com/2013/09/05/citrix-virtual-desktop-handbook-hyper-v-update/
CTX138217 - IntelliCache Reduction in IOPS: XenDesktop 5.6 FP1 on XenServer 6.1 - Citrix Knowledge Center http://ow.ly/o3Ma4
The purpose of this document is to provide testing results based on MCS-delivered streamed virtual desktops leveraging IntelliCache
NetScaler Deployment Guide for XenDesktop7Nuno Alves
This guide demonstrates how to deploy Citrix NetScaler in conjunction with Citrix XenDesktop 7 with a focus on both simplicity in configuration and advanced features not easily delivered with other products. This guide shows how to provision the XenDesktop 7 infrastructure, the NetScaler appliance and NetScaler Insight Center services to extend Citrix virtual desktop infrastructure and services to remote users in small to medium-size enterprises.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
3. Citrix XenDesktop 7 – Blueprint
Overview
Creating a virtual desktop design is often considered to be a complex activity where hundreds of
decisions must be made that directly and indirectly impact other decisions leading to confusion. However,
when focusing on the common use cases, which typically accounts for the largest percentage of users,
many of the decisions simply follow best practices, which are based on years of real-world
implementations.
The Citrix XenDesktop 7 Blueprint provides a unified framework for developing a virtual desktop and
application solution. The framework provides a foundation to understand the technical architecture for the
most common virtual desktop/application deployment scenarios.
At a high-level, a virtual desktop solution is based on a unified and standardized 5-layer model.
1. User Layer – Defines the unique user groups and overall
requirements
2. Access Layer – Defines how a user group will gain
access to their resources. Focuses on secure access
policies and desktop/application stores.
3. Resource Layer – Defines the virtual desktops and
applications assigned to each user group
4. Control Layer – Defines the underlying infrastructure
required to support the users accessing their resources
5. Hardware Layer – Defines the physical implementation
of the overall solution
The XenDesktop 7 blueprint details the recommended architecture for the three most common scenarios:
1. A standardized desktop environment
2. A fully customizable desktop environment
3. Applications
Even though the blueprint focuses on these three common scenarios, XenDesktop 7 supports additional
models, including:
1. Remote access to a user’s physical desktop, explained in Appendix: Remote PC
2. Improved management of traditional desktops, explained in Appendix: XenClient
User Layer
Hardware Layer
Resource Layer
Control Layer
Access Layer
User Layer
Resource Layer
Access Layer
User Layer
Resource Layer
Access Layer
4. Citrix XenDesktop 7 – Blueprint
Conceptual Architecture
When put into practice, the 5-layer virtual desktop model results in a conceptual architecture like the
following:
Based on the conceptual architecture, the following can be discerned:
Factory Line users utilize thin clients and directly access the desktop and app store where they
receive a shared desktop based on Windows 2012, delivered with Machine Creation Services
having a set of pre-installed applications appropriate for their role.
Engineers, using corporate owned devices, directly access a Windows 7 personal desktop with a
standard set of applications and the ability to install their own applications.
Executives use multi-form factor devices (smartphones, tablets, etc) to access the environment
remotely through NetScaler Gateway, which delivers their resources via the store, which are on-
demand apps.
As can be seen, each user group has a specific set of requirements that XenDesktop 7 delivers, some
that goes beyond the traditional VDI solution, but all integrated into a single architecture.
Note: The three virtual desktop models identified within the conceptual architecture do not constitute the
complete scope of XenDesktop. Additional virtual desktop models are defined within the Appendix.
User Layer Access Layer Resource Layer Hardware Layer
Local
Thin Client
Factory Line
Local
Corporate Device
Engineers
Remote
Personal Device
Executives
Image
OS: Windows 7
Delivery: MCS
Applications Personalization
Installed App Inventory:
Office, CAD, User-installed
Personal vDisk: Yes
User Profile: Citrix PM
FlexCast:
Personal
Image
OS: Windows 2012
Delivery: MCS
Applications Personalization
Installed App Inventory:
Office, Plant Automation
Personal vDisk: No
User Profile: Citrix PM
FlexCast:
Shared
Factory Line
Physical Servers:
Virtual Machines:
Pools:
Storage Type:
Storage Space:
Storage IOPS:
Server-Based OS Pool
Physical Servers:
Virtual Machines:
Pools:
Storage Type:
Storage Space:
Infrastructure Server Pool
Desktop-Based OS Pool
Physical Servers:
Virtual Machines:
Pools:
Storage Type:
Storage Space:
Storage IOPS:
Remote Access
Image
OS: Windows 2012
Delivery: MCS
Applications Personalization
Installed App Inventory:
Office, FinApp, InvestTrack
Personal vDisk: No
User Profile: Citrix PM
Engineers
Desktop & App Store
FlexCast:
On-Demand Apps
Executives
Control Layer
Database Servers: 2
License Servers: 1
Infrastructure Controllers
XenDesktop: 2
Delivery Controllers
StoreFront: 2
NetScaler Gateway: 2
Access Controllers
Load Balancer
Enumeration
Traffic
HDX
Traffic
SSL
HDX
XML
HDX
SSL
SSL
5. Citrix XenDesktop 7 – Blueprint
Detailed Architecture
The high-level design for a standard virtual desktop solution is fairly straightforward by following the 5-
layer model, which guides an organization to define the user groups before determining how they will
access their resources. Once these aspects are defined, the design is finalized by detailing how the
solution is controlled and managed and how the hardware will support the defined solution.
User Layer
Aligning the user requirements with an appropriate virtual desktop is the initial step in creating a virtual
desktop solution.
Most environments typically have more than one type of user group with different requirements that
must be met. However, even though there are many user groups within an organization, a large
majority often fit into one of the three distinct scenarios, which are identified in the following table:
Users need
access to…
Users include… Endpoints include… Common
location(s)
include…
IT Delivers…
A standardized
desktop
environment
Factory line workers
Retail clerks
Bank tellers
Nurses’ station users
Call centers
Thin clients
PCs (new and old)
Kiosks
Local, trusted
network
Hosted Shared
desktops
A fully
customizable
desktop
environment
Office Workers
Consultants
Engineers
Thin clients
PCs (new and old)
Laptops
Local, trusted
network or
Remote, untrusted
network
Personal VDI
desktop
Applications Road Warriors
Executives
Tablets
Smartphones
Laptops
Local, trusted
network or
Remote, untrusted
network
On Demand Apps
Access Layer
Providing access to the environment includes more than simply making a connection to a resource.
Providing the proper level of access is based on where the user is located as well as the security
policies defined by the organization.
In most environments, tougher security policies are put into place when users access the environment
from a remote, untrusted network as compared to a local, trusted network. This often includes tougher
authentication policies (like multi-factor authentication) and greater protocol protection with encryption
and encapsulation.
It is important to note that users might access the environment from different locations, requiring
policies to be intelligent enough to detect and respond appropriately.
Based on the locations defined for each user group, the following are the most common access layer
recommendations.
6. Citrix XenDesktop 7 – Blueprint
Users connecting from… Local, trusted network Remote, untrusted network
Authentication Point StoreFront NetScaler Gateway
Authentication Policy Simple authentication
(username and password)
Multi-factor authentication
(username, password and token)
Session Policy Not applicable Mobile and Non-Mobile
Session Protocol (Profile) ICA ICA Proxy
Note: For “Remote, untrusted network” two different session policies are used to provide the correct
user experience based on being on a mobile device (smartphone or tablet) versus a non-mobile
device (laptop or desktop). The details for the session policies are detailed in Appendix: Session
Policy Details.
Resource Layer
Users need access to their resources, whether those resources are desktops or applications. The
configuration of the resources must align with the overall needs of the user groups. In order to align
each resource with each user group, the resource is defined across three separate but integrated
layers:
Image
The first part of the image definition is selecting the right operating system, which is based on the
type of desktop IT delivers to the user as well as the standards for the organization.
Shared Remote Desktop Services: Windows 2012 or Windows 2008R2
Virtual Desktop Infrastructure: Windows 8 or Windows 7
Apps on Demand: Windows 2012 or Windows 2008R2
The second aspect of the image definition is the delivery fabric, which is independent of the
selected operating system. XenDesktop 7 includes two integrated solutions focused on providing
different benefits to an organization. These options are:
Machine Creation Services (MCS): Utilizes the hypervisor and storage infrastructure (local
or shared storage) to create unique, thin provisioned clones of a master image, which can
either be a desktop-based OS or a server-based OS. Due to the focus on simplicity, MCS
requires no extra hardware and utilizes functions within the hypervisor. Due to the
simplicity of MCS, it is the recommended option for deployments that do not require
desktop delivery to physical targets.
Provisioning Services (PVS): Utilizes the network infrastructure to deliver required portions
of an image, just-in-time, to a physical or virtual machine with either a desktop-based OS
or a server-based OS. Although PVS does require additional virtual servers to host the
PVS technology, it can save on storage costs reducing read IOPS across any hypervisor.
Applications
The most important aspect of the resource layer is the applications, which is what the users are
trying to access. In order to have a successful application delivery solution, the appropriate
applications must be
Installed: The applications are installed in the master image. Even though this option can
result in a greater number of master images if the application sets between user groups
greatly differ, it is the recommended approach due to its simplicity and familiarity.
Streamed: The applications are dynamically delivered to the virtual/physical desktop/server
when requested, with a solution like Microsoft App-V. This solution requires new
7. Citrix XenDesktop 7 – Blueprint
technology and additional infrastructure, but is the most dynamic option resulting in the
fewest number of master images.
User-based: Many applications are not managed or maintained by IT, and are considered
user-based applications. Due to the small percentage of users who use these applications,
it is not justified to make these applications IT-managed applications. Users who require
user-based applications can either
o Receive a personal desktop where they can install and maintain their own set of
applications through XenDesktop Personal vDisk technology.
o Seamlessly access applications installed on their physical endpoint within their
virtualized desktop session with the use of “Local App Access” policy.
Personalization
The first part for defining the levels of personalization allowed for each user group is to define the
need for Personal vDisk, which should only be used for those users who have the requirements of
installing and managing their own set of applications.
Users who are granted use of the Personal vDisk still rely on a standard master image except all
user changes are stored in a dedicated, persistent virtual disk. This technique allows an
administrator to update and maintain the master image while user-level changes persist.
The second part of the personalization definition is deciding on the profile policy for each user
group. Ideally, each user group should have the same policy in order to make management and
troubleshooting easier, but different policies can be used if required. The recommended base
profile policy is as follows:
Profile Management Policy Setting
Basic Settings: Enable Profile Management Enabled
Basic Settings: Path to User Store Select path (organization specific)
Basic Settings: Process logons of local administrators Enabled
File System: Exclusion list – directories See Appendix: Profile Policy Details
File System: Directories to Synchronize See Appendix: Profile Policy Details
File System: Files to Synchronize See Appendix: Profile Policy Details
File System: Folders to Mirror See Appendix: Profile Policy Details
Profile Handling: Local profile conflict handling Delete local profile
Streamed User Profiles: Profile streaming Enabled
Folder Redirection: AppData(Roaming)
Folder Redirection: Contacts
Folder Redirection: Desktop
Folder Redirection: Documents
Folder Redirection: Downloads
Folder Redirection: Favorites
Folder Redirection: Music
Folder Redirection: Pictures
Folder Redirection: Videos
Path
The final portion of the personalization definition is the assignment of user/computer policies. The
user/computer policy helps define how the session is configured based on the user’s end point
device, location or accessed resource. Recommended policies are as follows:
8. Citrix XenDesktop 7 – Blueprint
Unfiltered: The unfiltered policy is the system-created default policy providing a baseline
configuration for an optimal experience. Each user group receives this policy with
additional policies incorporated to customize the experience based on use case or access
scenario.
Remote access policy - Optimized for WAN: The remote access policy includes settings to
better protect the resources as they will be accessed from remote and potentially unsecure
locations. Applied to all sessions coming through NetScaler Gateway.
Local access policy - High Definition User Experience: The local access policy focuses on
a high quality user experience at the expense of bandwidth, which should be plentiful on a
local connection scenario.
Mobile device policy: The mobile device policy helps improve the user experience for any
user who utilizes a tablet, smartphone or other small form factor device.
Once defined, each policy must be properly applied to the right set of objects and scenarios.
These policies are applied as follows:
Policy Name Settings or Template Assigned to…
Unfiltered Not applicable Not applicable
Remote access
policy
Template:
Optimized for WAN
Access Control – With NetScaler
Gateway
Local access
policy
Template:
High Definition User Experience
Access Control – Without NetScaler
Gateway
Mobile device
policy
Mobile Experience
Automatic keyboard display: Allowed
Launch touch-optimized desktop: Allowed
Remote the combo box: Allowed
User group name
Control Layer
Every major design decision made for all user groups in the User, Access and Resource layers are
used as a whole to help design the control components of the overall solution.
The design decisions for each user group are met by incorporating the correct control layer
components, which includes access controllers, delivery controllers and infrastructure controllers.
Access Controllers
Access controllers are responsible for providing the connectivity to the resources as defined by the
Access Layer. In order to provide access to the environment for users who are internal and
external, two components are required:
StoreFront: Internal users access a StoreFront store either directly through Citrix
Receiver or via the StoreFront web page. StoreFront not only provides a complete list of
available resources for each user, but it also allows users to “favorite” certain
applications, which makes them appear prominently. The subscriptions are
synchronized to the other StoreFront servers automatically. Upon successful
authentication, StoreFront contacts the Delivery Controller to receive a list of available
resources (desktops and/or applications) for the user to select. Redundant StoreFront
servers should be deployed to provide N+1 redundancy where in the event of a failure,
the remaining servers have enough spare capacity to fulfill any user access requests.
NetScaler Gateway: Remote users access and authenticate to the NetScaler Gateway,
which is located within the network’s DMZ. Upon successful validation against Active
Directory, NetScaler Gateway forwards the user request onto StoreFront, which
9. Citrix XenDesktop 7 – Blueprint
generates a list of available resources. This information is passed back to the user
through NetScaler Gateway. When a user launches a resource, all traffic between the
user and NetScaler Gateway is encapsulated within SSL en-route to the virtual resource.
Redundant NetScaler Gateway devices should be deployed to provide N+1 redundancy.
Load Balancers: Based on the “N+1” recommendations for many of the control layer
components, it is advisable to have an intelligent load balancing solution in place, which
is capable of not only identifying if the server is available, but also that the respective
services and functioning and responding correctly. Implementing an internal pair of
NetScaler VPX virtual servers can easily accommodate the load balancing requirements
for the solution.
Delivery Controllers
The delivery controllers manage and maintain the virtualized resources for the environment. The
delivery controllers receive the authentication information from the access controllers and
enumerate a list of resources granted to the user. As users make requests to a resource, the
delivery controller brokers the connection between the user and resource. The authentication,
enumeration and launching process is as follows:
The process functions as follows:
Step Local Users Remote Users
1. A user initiates a connection to the StoreFront
URL (443), which can be a virtual address hosted
by a load balancer, and provides logon
credentials. This can either be done by using a
browser or Citrix Receiver.
A user initiates a connection to the NetScaler
Gateway URL (443) and provides logon
credentials. This can either be done by using a
browser or Citrix Receiver.
2. The credentials are validated against Active
Directory (389).
3. NetScaler Gateway forwards the validated user
credentials to StoreFront, which can be a virtual
address hosted by a load balancer (443).
4. StoreFront authenticates the user to Active Directory domain (389) it is a member of. Upon successful
authentication, StoreFront checks the data store for existing user subscriptions and stores them in
memory.
Access LayerUser Layer Resource Layer Hardware Layer
Local
Thin Client
Factory Line
Local
Corporate Device
Engineers
Remote
Personal Device
Executives
Image Applications Personalization
FlexCast:
Personal
Image Applications Personalization
FlexCast:
Shared
Factory Line
Physical Servers:
Virtual Machines:
Pools:
Storage Type:
Storage Space:
Storage IOPS:
Server-Based OS Pool
Physical Servers:
Virtual Machines:
Pools:
Storage Type:
Storage Space:
Infrastructure Server Pool
Desktop-Based OS Pool
Physical Servers:
Virtual Machines:
Pools:
Storage Type:
Storage Space:
Storage IOPS:
Remote Access
Image Applications Personalization
Engineers
Desktop & App Store
FlexCast:
On-Demand Apps
Executives
Control Layer
Database Servers: 2
License Servers: 1
Infrastructure Controllers
XenDesktop: 2
Delivery Controllers
StoreFront: 2
NetScaler Gateway: 2
Access Controllers
Load Balancer
1, 9,
14
1, 9
2
3, 9
4
5, 10
6
7, 11
8, 12
13
14
14
16
15
10. Citrix XenDesktop 7 – Blueprint
5. StoreFront forwards the user credentials to the Delivery Controllers (80 or 443), which could be a virtual
address hosted by a load balancer.
6. The Delivery Controller validates the credentials against Active Directory (389).
7. Once validated, the XenDesktop Delivery Controller identifies a list of available resources by querying
the SQL Database (1433).
8. The list of available resources is sent to
StoreFront (443), which populates the user’s Citrix
Receiver or browser (80 or 443).
The list of available resources is sent to
StoreFront (443), which populates the user’s Citrix
Receiver or browser after passing through
NetScaler Gateway (80 or 443).
9. A resource is selected from the available list
within Citrix Receiver or browser. The request is
sent to StoreFront (443).
A resource is selected from the available list
within Citrix Receiver or browser. The request is
sent to StoreFront through NetScaler Gateway
(443).
10. StoreFront forwards the resource request to the Delivery Controller (80 or 443).
11. The Delivery Controller queries the SQL Database to determine an appropriate host to fulfill the request
(1433).
12. The Delivery controller sends the host and connection information to StoreFront (443).
13. StoreFront creates a launch file, which is sent to
the user (443).
StoreFront requests a ticket by contacting the
Secure Ticket Authority (80 or 443), which is
hosted on the Delivery Controller. The STA
generates a unique ticket for the user, which is
only valid for 100 seconds. The ticket identifies
the requested resource, server address and port
number thereby preventing this sensitive
information from crossing public network links.
StoreFront generates a launch file, including the
ticket information, which is sent to the user
through NetScaler Gateway (443).
14. Citrix Receiver uses the launch file and makes a
connection to the resource (1494 or 2598).
Citrix Receiver uses the launch file and makes a
connection to the NetScaler Gateway (443).
15. NetScaler Gateway validates the ticket with the
STA (80 or 443)
16. NetScaler Gateway initiates a connection to the
resource (1494 or 2598) on the user’s behalf.
In addition to the authentication, enumeration and launching process, the delivery controllers
manage and maintain the state of the XenDesktop site to help control desktop startups, shutdowns
and registrations. The controllers constantly query and update the Microsoft SQL Server database
with site status, allowing controllers to go offline without impacting user activities.
Redundant delivery controllers should be configured to ensure availability of the site should a
single controller fail.
Infrastructure Controllers
In order to have a fully functioning virtual desktop environment, a set of standard infrastructure
components are required. These components include:
Network Services, like DNS and DHCP, for name resolution and IP address assignment.
Active Directory for user authentication
11. Citrix XenDesktop 7 – Blueprint
SQL Server databases for storing all configurations, desktop and current utilization
information. The SQL Server instance should be highly available to ensure continuous
operation.
Citrix licensing server to provide rights to access the environment. A license server is
required for all components within the XenDesktop architecture, except for NetScaler
Gateway, which is manually configured with a local license file. Because of a 30-day grace
period built into the licensing model, a single license server can be implemented as a VM
or virtual appliance configured for VM-level high availability. A failed license server can
easily be rebuilt and restored from backup within the allotted 30-days without impacting
operations of the overall environment.
Hardware Layer
The hardware layer is the physical implementation of the virtual desktop solution. It includes decisions
on the storage fabric and server footprint, which are often decisions made based on relationships
organizations have with different vendors.
The selection of a type of storage directly impacts the recommend type of server just like the type of
server selected directly impacts the recommended storage.
Storage Fabric
Storage is often considered one of the most important and complex decisions in a virtual desktop
solution. In addition to impacting the cost of the solution, the selected storage fabric also impacts
the available options for physical server footprint, which is why selecting a storage solution is the
first step in the hardware layer design.
Storage Type Benefits Concerns Appropriate for…
Local Storage Inexpensive
Simple to deploy
Virtual machines are inaccessible
if physical server is offline
Limited number of disk spindles
(based on server design)
Longer operational processes as
each local store must be updated
Rack servers
Direct
Attached
Storage
Moderate expense
Virtual machine migration when
physical server is offline
Failure on DAS array can impact
multiple physical servers
DAS interconnects consume
valuable space in a blade chassis
Limited number of connections to
a DAS array
Rack servers
Centralized
Storage
Shared master image across
physical servers
Virtual machine migration when
physical server is offline
Simple expansion
Advanced features to help offset
costs
Expensive
Complex
Often requires storage tiers to
control costs
Blade servers
Regardless of the storage fabric selected, an appropriate amount of storage resources (space and
IOPS) must be available in order to provide an acceptable user experience.
Server Footprint
At the hardware layer of the virtual desktop design, organizations must decide on the hardware
footprint, which generally is a decision between blade servers and rack servers.
12. Citrix XenDesktop 7 – Blueprint
Server Type Benefits Concerns Appropriate for…
Blade Servers Higher density within same
amount of rack space
Consolidated network cabling
requiring fewer core switch ports
Upfront costs are generally higher
Limited amount of internal
storage
Large
deployments with
shared storage
Rack Servers Large amount of local storage
Adding network capacity simply
requires new network card
Greater power requirements
Uses more switch ports
Less density within a rack
Large or small
deployments with
local storage
13. Citrix XenDesktop 7 – Blueprint
Next Steps
The XenDesktop 7 blueprint is the first step towards delivering a virtual desktop solution within an
organization. Based on the unified infrastructure of XenDesktop 7, there are few decisions that
fundamentally impact the overall architecture. In fact, the two decisions that are unique for each
organization are contained within the Hardware layer and are based solely on the organization’s
anticipated deployment size and existing relationships with storage and server vendors.
To learn more about the potential a solution like XenDesktop 7 can provide, it is recommended to follow
the prescribed roadmap in order to gain knowledge and firsthand experience.
XenDesktop 7 Blueprint: A layered solution for all successful designs & deployments, focusing on
the common technology framework and core decisions.
Getting Started Guide: Prescriptive guide for getting 5-10 users deployed quickly and easily in a
non-production environment.
Key Project Design Guides: Recommended designs, with hardware layer planning numbers, for
commonly used implementations, which can be combined together to form a more complete
solution.
14. Citrix XenDesktop 7 – Blueprint
Glossary
Hosted Shared Desktop: A type of virtual desktop based on a Windows server operating system. This
type of virtual desktop is sometimes referred to as Remote Desktop Services (RDS) or Hosted Server
Virtual Desktops (HSVD). With Hosted Shared Desktop, multiple users share the same desktop but their
sessions are separated through session virtualization.
Machine Creation Services: An image delivery technology, integrated within XenDesktop that utilizes
hypervisor APIs to create unique, read-only and thin provisioned clone of a master image where all writes
are stored within a differencing disk.
On Demand Apps: A type of virtual desktop based on Windows server operating system. This type of
virtual desktop is sometimes referred to as virtual applications, published applications or seamless
applications. On Demand Apps are similar in approach to Hosted Shared Desktops, except that the
physical desktop interface is hidden from the user. When a user uses an On Demand App, they only see
the application and not the underlying operating system, making On Demand Apps a powerful solution for
mobile devices.
Personal VDI: A type of virtual desktop based on a Windows desktop operating system. This type of
virtual desktop provides a unique Windows desktop to each user either for the duration of the session or
indefinitely.
Personal vDisk: A technology used on conjunction with Personal VDI desktops allowing for complete
personalization while still utilizing a single, read-only master image. Any changes made the master
image are captured and stored within a virtual hard disk attached to the virtual machine. Changes are
cataloged in order to allow an administrator to update the master image without impacting user-level
changes.
Provisioning Services: An image delivery technology, integrated within XenDesktop, which utilizes PXE
booting and network streaming. A target device requests and receives appropriate portions of the master
image from the provisioning server when needed. Any changes made during the duration of the session
are stored in a temporary write cache.
Profile Management: A user profile solution, integrated with XenDesktop, that overcomes many of the
challenges associated with Windows local, mandatory and roaming profiles through proper policy
configuration. Profile Management improves the user experience by capturing user-based changes to the
environment and by improving user logon/logoff speed.
15. Citrix XenDesktop 7 – Blueprint
Appendix: Remote PC
Citrix Remote PC provides the flexibility associated with VDI, where users can work from any location or
on any device, without the upfront hardware, storage and licensing costs. Remote PC utilizes the same
underlying infrastructure required to support XenDesktop 7, except that no additional hardware is required
to support the desktops because the desktop still exists on the user’s physical endpoint, which is depicted
in the following diagram.
Figure 1: Remote PC Conceptual Architecture
Remote PC essentially provides a secure, remote access solution to the user’s physical desktop, whether
that location is a meeting room within the same building, a home office or at a conference halfway around
the world.
Users need access
to…
Users include… Endpoints include… Common
location(s)
include…
IT Delivers…
Their physical
desktop
Office Managers
Office Workers
Tablets
Smartphones
Laptops
Home PC
Local, trusted
network or
Remote, untrusted
network
Remote PC
Remote PC utilizes the following components:
NetScaler Gateway to provide secure, remote access to the user’s physical desktop
StoreFront to provide the users with a list of resources, which includes their physical desktop
Desktop Delivery Controller to enumerate and connect users to the appropriate desktop
Database server to store the configuration and connection information for the user and desktop
License server to provide the necessary access license to the user’s desktop
User Layer Access Layer Resource Layer Hardware Layer
Local
Corporate Device
Engineers
Remote
Personal Device
User
Image
OS: Windows 7 or 8
Delivery: N/A
Applications Personalization
Installed App Inventory:
N/A
Personal vDisk: No
User Profile: Citrix PM
FlexCast:
Remote PC
Physical Servers:
Virtual Machines:
Pools:
Storage Type:
Storage Space:
Infrastructure Server Pool
Remote Access
Desktop & App Store
Control Layer
Database Servers: 2
License Servers: 1
Infrastructure Controllers
XenDesktop: 2
Delivery Controllers
StoreFront: 2
NetScaler Gateway: 2
Access Controllers
Load Balancer
Enumeration
Traffic
HDX
Traffic
SSL
HDX
XML
HDX
SSL
SSL
User
Image
OS: Windows 7 or 8
Delivery: N/A
Applications Personalization
Installed App Inventory:
N/A
Personal vDisk: No
User Profile: Citrix PM
FlexCast:
Remote PC
Engineers
16. Citrix XenDesktop 7 – Blueprint
Appendix: XenClient
Citrix XenClient extends the benefits of desktop virtualization to corporate laptops so users can work from
anywhere and at any time, whether they have slow, intermittent or no network access. In addition, with
Citrix XenClient, IT is better able to manage and secure the distributed desktop environment while
continuing to use a traditional endpoint device, like corporate laptops or desktops.
As XenClient requires a minimal infrastructure, the costs associated with a XenClient solution are
significantly lower than traditional VDI solutions.
XenClient provides a solution for IT to better manage desktops that cannot be centralized due to
connectivity limitations or datacenter server and storage costs. Based on the user requirements and
configuration, a user can either receive a standard desktop with limited personalization or a completely
personal desktop experience utilizing Personal vDisk technology.
Users need access
to…
Users include… Endpoints include… Common
location(s)
include…
IT Delivers…
A personalized local
desktop
Road Warriors Laptops Remote locations
with limited
connectivity
XenClient
A standard local
desktop
Retail clerks
Bank Tellers
Lab students
Desktops Training centers
Distributed offices
XenClient
XenClient utilizes the following components:
NetScaler Gateway to provide secure, remote access to Synchronizer
Synchronizer to deliver and manage the distributed local virtual machines
Database server to store the configuration and delivery information for the user and desktop
License server to provide the necessary license to the user’s desktop
User Layer Access Layer Resource Layer Hardware Layer
Remote
User
Image
OS: Windows 7 or 8
Delivery: Synchronizer
Applications Personalization
Installed App Inventory:
N/A
Personal vDisk: Yes
User Profile: Citrix PM
FlexCast:
XenClient
Physical Servers:
Virtual Machines:
Pools:
Storage Type:
Storage Space:
Infrastructure Server Pool
Remote Access
Control Layer
Database Servers: 2
License Servers: 1
Infrastructure Controllers
Synchronizer: 2
Delivery Controllers
NetScaler Gateway: 2
Access Controllers
Synchronizer
Synchronization
Traffic
SSL
User
Corporate Device
17. Citrix XenDesktop 7 – Blueprint
Appendix: Profile Policy Details
The following outlines the initial inclusion/exclusion configurations recommended for an optimized user
profile policy.
Policy Setting(s)
List of excluded files AppDataLocal
AppDataLocalLow
AppDataRoamingCitrixPNAgentAppCache
AppDataRoamingCitrixPNAgentIcon Cache
AppDataRoamingCitrixPNAgentResourceCache
AppDataRoamingICAClientCache
AppDataRoamingMicrosoftWindowsStart Menu
AppDataRoamingSunJavaDeploymentcache
AppDataRoamingSunJavaDeploymentlog
AppDataRoamingSunJavaDeploymenttmp
Application Data
Citrix
Contacts
Desktop
Documents
Favorites
Java
Links
Local Settings
Music
My Documents
My Pictures
My Videos
Pictures
UserData
Videos
AppDataRoamingMacromediaFlash Playermacromedia.comsupportflashplayersys
AppDataRoamingMacromediaFlash Player#SharedObject
AppDataRoaming
Downloads
Saved Games
Searches
Synchronized
Directories
AppDataRoamingMicrosoftCredentials
AppDataRoamingMicrosoftCrypto
AppDataRoamingMicrosoftProtect
AppDataRoamingMicrosoftSystemCertificates
AppDataLocalMicrosoftCredential
Synchronized Files Microsoft Outlook
AppDataLocalMicrosoftOffice*.qat
AppDataLocalMicrosoftOffice*.officeUI
Google Earth
AppDataLocalLowGoogleGoogleEarth*.kml
19. Citrix XenDesktop 7 – Blueprint
Appendix: Session Policy Details
Devices are commonly grouped as either non-mobile (such as Windows desktop OS based), or mobile
(such as iOS or Android). Therefore, a decision whether to provide support for mobile devices, non-
mobile devices, or both should be made based on user group requirements.
To identify mobile and non-mobile devices, session policies defined on NetScaler Gateway should include
expressions such as:
Mobile Devices: The expression is set to “REQ.HTTP.HEADER User-Agent CONTAINS
CitrixReceiver” which is given a higher priority than the non-Mobile device policy to ensure mobile
devices are matched while non-Mobile devices are not.
Non-Mobile Devices: The expression is set to “ns_true” which signifies that it should apply to all
traffic that is sent to it.