Disaster Recovery (DR) refers to the set of policies and procedures in place to ensure the continuity and recovery of mission critical systems in the event of a disruptive event such as a power outage, flood, or cyberattack. In other words, how quickly can you get your computers and systems up and running after a disastrous event?
High Availability (HA) is the concept or goal of ensuring your critical systems are always functioning.
We are almost half way through. Continue on Part 2….
Azure Database Services:
Azure Database Services are fully managed Paas database services. Azure database services are fully managed, freeing up valuable time you’d otherwise spend managing your database so you can focus on new ways to delight your users and unlock opportunities. Enterprise-grade performance with built-in high availability means you can scale quickly and reach global distribution without worrying about costly downtime.
You don’t have to worry about learning azure concepts. Get started here:
Agile: Agility means reacting fast. Cloud agility is the ability to rapidly change an IT infrastructure to adapt to the evolving needs of the business. For example, if your service peaks one month, you can scale to demand and pay a larger bill for the month. If the following month the demand drops, you can reduce the used resources and be charged less.
Iaas, Paas, Saas are the major three major categories of cloud services.
IaaS (Infrastructure as a Service): Using Iaas, you can create your own virtual machines or storage, firewalls, load balancers, IP addresses, network, OS, etc. Iaas is an instant computing infrastructure available for you to use by paying for what you use. It aims to give you complete control over the hardware that runs your application (IT infrastructure servers and virtual machines (VMs), storage, networks, and operating systems).
Cloud computing is renting resources, like storage space or CPU cycles, on another company’s computers. Cloud Computing is delivering various computing services over the internet. You only pay for what you use. The company providing these services is referred to as a cloud provider. Some example providers are Microsoft, Amazon, and Google.
The cloud provider is responsible for the physical hardware required to execute your work, and for keeping it up-to-date.
Note: In PVS 7.x the registry key that controls the stream process is now under HKLM\SOFTWARE\Citrix\ProvisioningServices\StreamProcess.
Browse to the registry key HKLM\SOFTWARE\Citrix\ProvisioningServices\StreamProcess. Modify or create SkipRIMSForPrivate to appear as DWORD 1.
HKLM\SOFTWARE\Citrix\ProvisioningServices\StreamProcess
DWORD: SkipRIMSForPrivate
Value: 1
This change needs to be made on all the PVS servers in the farm, after which the stream service should be restarted on PVS servers. At this point the replication status for the vDisk should only show the PVS servers that locally have the vDisk present on them and not all the PVS servers in the farm.
Citrix came up with a software called BLX using which you can configure netscaler adc features very easily. BLX is software version of ADC that runs on linux machine.
You can download and install this BLX software from citrix and install it in your linux machine and configure it. So far we have seen other editions like MPX, SDX etc.. there the hardware or the virtual machine is dedicated to that particular edition.
With the concept of LTSR, somewhere citrix admins might end up choosing either current release or LTSR versions for their citrix environments. So first of all lets see what is LTSR and CR and decide which one to choose?
Current Release: With Current Release latest and greatest updates are available from citrix on the citrix product that you use. Support and Maintenance for CR are maintained upto the latest mark from citrix.
An effective design of user profiles can make a significant difference in the performance and manageability of a XenApp environment. Many of the issues commonly seen in large or complex XenApp environments (including slow logon, loss of user settings, profile corruption, and excessive administrative effort) are often the result of sub-optimal user profile designs. A solid design and implementation of user profiles can maintain the integrity of user settings, eliminate issues requiring administrator intervention, and ensure high-performance user logon.
Product Name changes: Citrix Workspace
Citrix Workspace will become one unified, contextual, secure offering. Citrix Workspace offers a user-centric experience where everything you need to work is in one unified app, with access and performance made simple based on user context and IT-designed conditions.
Citrix Workspace is composed of the following components depending on your edition and add-ons:
Citrix Workspace app Learn more
New mobile, web, and desktop experience bringing together all the apps and files you need to work.