Articles In Support

By Tom Stanley, Posted in Infrastructure, Support

Part 1: Adding the Timeline Visualization Why a Timeline? One important metric when delivering user desktops is the amount of time the user has to wait for the desktop to launch. It’s hard to ensure user acceptance of the delivered environment if they find it slow before their desktop even becomes available. Various processes run to build up the user environment from many configuration layers, including group policies retrieved from busy domain controllers, policies from desktop delivery software li... read more.

  • January 19, 2018

By Hank Smith, Posted in Infrastructure, Security, Support

Throughout my years of IT consulting, patching servers and desktops has been a sore subject with customers. It’s always been something that is required, but in many cases not performed. The benefits of patching in a timely manner include feature enhancements, bug fixes, and of course security updates. But for many of our customers, patching is time-consuming and resource-intensive, and gets in the way of IT teams focusing on more strategic and tactical matters. As a result, patches aren’t maint... read more.

  • December 21, 2017

By Kaysel Adrover, Posted in Support

Troubleshooting Issue AppDNA 7.13 When attempting to execute a Direct Import of an MST file, the following error messages occurs. After selecting Continue, it will return to the AppDNA console but the import will not proceed.     Solution Changed the path of the Log File location within the AppDNA settings by selecting Configuration > Files. I changed the Log File Location from %CommonAppData%\AppDNA\appTitude\Logs to C:\Temp. This resolved the issue and I was able to import MST... read more.

  • April 18, 2017

By Kaysel Adrover, Posted in Support

While finishing the installation of the XenDesktop controller while building a XenDesktop 7.12 environment, I ran into the message “This implementation is not part of the Windows Platform FIPS validated cryptographic algorithms.” From there, I could not continue the installation. Researching this issue, I came across a Citrix article applicable to Provisioning Services, CTX1388823 - Provisioning Services Database Unable to Configure, with the same error message. The article refers to Provisioni... read more.

  • April 13, 2017

By Kaysel Adrover, Posted in Support

As part of a high availability implementation for a customer project, I needed to duplicate vDisks from one datacenter to another. This customer had vSphere configured where a cluster represented a datacenter. For testing purposes, I first copied a vDisk and the virtual machine template to the second datacenter. After configuring PVS with the new vDisk, in the new cluster, I launched the PVS wizard to create a new virtual machine using the copied template. However, on boot up, the servers blue screened with... read more.

  • April 13, 2017

By Kaysel Adrover, Posted in Support

During a project building a XenDesktop 7.x environment, the customer requested that I use SQL replication between three servers instead of the SQL Always On feature for high availability. For this particular project, the Citrix environment was not a critical component of the business and the customer only had SQL 2016 Standard licenses. In order to use the database of one of the replicated servers during a failure of the main server, a DNS name would be used when creating the Citrix databases. During this... read more.

  • April 13, 2017

By Timothy Karl, Posted in Support

Most disk array controllers on servers include a piece of RAM that can be utilized to temporarily buffer data being written to or read from disk. Since access to RAM is significantly faster than disk access, this cache can enhance overall server performance. With respect to Citrix XenApp servers, improved server performance can lead to much higher user density per server. Unlike writing to disk, writing to RAM is volatile, which means it needs power to maintain the stored information. Array controllers u... read more.

  • January 23, 2015

By Nancy Rand, Posted in Support

April 26, 2014 - Microsoft Security Advisory 2963983 - Vulnerability in Internet Explorer Could Allow Remote Code Execution Version: 1.0. Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory tha... read more.

  • May 05, 2014

By Chaim Landau, Posted in Support

I've seen many people complain about this issue, and so I worked with Apple Care on this and they provided the fix below. Power off iMac (hold down the power button until it shuts off) Power back on When you hear the chime, press Command+S. This will take you to boot the iMac into a command line. Once at the command line, run the commands below. Note: commands are case sensitive, so type them exactly as shown below. Also, you will need to hit Enter after each line. mount -uw / cd /Library/Pre... read more.

  • April 08, 2014

By Erik Kayhart, Posted in Support

The new Java update (7u45) breaks the NetScaler configuration GUI (and probably a lot of other apps. The Java packaging process has been changed recently. The latest JRE release expects the Jar's to have some of the new packaging parameters. JAR's that don't have the new packaging parameters will fail the Java Security test and will be deemed unsafe. The current NetScaler GUI does not have these new packaging parameters hence will not load. To use the latest JRE version, there is a workaround: Go to J... read more.

  • October 17, 2013