How to Improve VDI Storage Distribution Speed and Cost with Parallels RAS
An appropriate storage selection is one of the key factors to consider when deploying or optimizing Virtual Desktop Infrastructure (VDI) solutions. Central repositories are often used as VDI storage...
Introduction When troubleshooting situations such as a slow or failing logon or a user failing to perform some task, it can be useful to know what processes were launched, when they were launched and what command line arguments were...
NetScaler vs F5: Comparison between Citrix ADC (Formerly NetScaler) and F5 BIG-IP
An application delivery controller (ADC) optimizes application performance using load balancing and a host of other methods. It’s also used in application security, covering web application...
Citrix Troubleshooting Guide: Diagnosing Common Issues
Citrix Virtual Apps and Desktops must perform optimally to achieve high productivity and provide a seamless user experience. But it’s not uncommon for Citrix users to experience glitches like slow logons. Troubleshooting such...
Everything You Need to Know about Performing a Citrix Receiver Cleanup
Citrix Receiver (now renamed Citrix Workspace app) is an essential component of Citrix’s virtualization infrastructure. Like any software, users can install and uninstall it many times. Citrix Receiver...
Learn about Storage Protocols and the Differences between Them
Network storage effectively solves two major storage problems—making data available to multiple users simultaneously and segregating storage from compute to enhance availability and scalability. Today, organizations...
OAuth vs SAML vs OpenID: Learn the Differences between Them
Authentication allows entry into a system, and authorization allows access to specific features within the same system. Security Assertion Markup Language (SAML) is an open standard that attempts to bridge the divide...
Network Policy Server (NPS) is Microsoft’s implementation of a Remote Authentication Dial-In User Service (RADIUS) server. NPS provides centralized authentication, authorization, and accounting (AAA) capabilities to your network. Under...
Microsoft Virtual Machine Converter: Converting to Hyper-V
Microsoft Virtual Machine Converter (MVMC) converts virtual machines (VMs) and disks in VMware hosts to VMs that can run on Microsoft Hyper-V hosts or Microsoft Azure. The utility is also used for converting server...
What Is a Remote Access Policy, and Why Is It Important for Your Organization?
A remote access policy is a written document containing the guidelines for connecting to an organization’s network from outside the office. It is one way to help secure corporate data and...