If you need to change the time zone on an ADC HA pair, you might not be concerned about difficulty. Whilst indeed it is a fairly simple task to carry out, there are specific steps that need to be carried out on both appliances.
Citrix Virtual Apps and Desktops service
The Virtual Apps and Desktops service is a Citrix Cloud offering that allows an organisation to host all the backend management components needed to run a Virtual Apps and Desktops site, in the cloud. Not only do the management components shift to the cloud; Citrix install, configure, upgrade, and monitor those components; leaving you to manage the applications, desktops, and data.
Review of eG Enterprise v7: End-to-End Monitoring for Citrix Workspace
eG Enterprise from eG Innovations, a Global Technology Partner for Citrix, is an end-to-end monitoring solution that amongst many other technology products, monitors the Citrix Virtual Apps and Desktops stack of components, including the underlying storage, hypervisors and network.
Last year I had a look at the 6.3 version of the product. Now, eG Innovations have release their latest version, eG Enterprise v7.
Citrix ADC nFactor authentication – Google reCAPTCHA first factor LDAP second – Citrix ADC 12.1.50.28 and above
Integrating reCAPTCHA by Google with Citrix ADC is a great move towards protecting internal resources from attackers. If someone or even a bot of computers are trying to brute force an account, or break in to your system, having reCAPTCHA is sure to defer such activies and make it a very difficult task to achieve.
Becoming a Citrix Certified Expert in Networking
Many organisations around the world use Citrix ADC (formerly NetScaler) for load balancing web services, making web services highly available, offering secure VPN or ICA access to staff and so on. If your organisation uses Citrix products such as Virtual Apps and Desktops, you probably also make use of an ADC to provide secure ICA proxy to apps and desktops, and load balance Citrix and non-Citrix services. The ADC can do a lot of things, often known as the swiss army knife of networking.