Archive | IT/Technology RSS feed for this archive

Exchange 2010 – Online Archiving and Retention Tags/Policies a practical example

November 7, 2011

8 Comments

Ok so I had heard that one of the great new features of Exchange 2010 was its archiving feature but it was something that I had not made use of until coming across one of our clients. The client did not have any management policies in place so what had happened to a number of […]

Continue reading...

Citrix XenApp 6.5 – Overview integration with XenDesktop 5

November 2, 2011

0 Comments

Having implemented XenDesktop 5 in our small environment see here I then set out to complement the xendesktop environment with XenApp the main reasons are why this was required and conveys how XenApp offers a perfect complement to XenDesktop 1) Easier Management of Xendesktop images What I have found that when installing new applications or […]

Continue reading...

IP Expo – VDI/Cloud/Wireless Technology

October 20, 2011

0 Comments

I first was made aware of this event through a colleague at work and since reading and investigating what exactly it was about I was instantly impressed. The sheer amount of IT companies present I thought would give me a great insight into the market of today and the potential picture of tomorrow. I must […]

Continue reading...

Windows Corrupt Profiles – even after creating a new profile? why?

May 9, 2011

0 Comments

In many cases to resolve a corrupt profile problem one simply creates a new profile in either c:\documents and settings (xp) or c:\users (vista/7).  Then copying the old user data from their old profile file to their new one thus fixing the problem, this article will show how to edit the registry in order to […]

Continue reading...

Forgotten your BES administration password? How to reset your BES password

March 29, 2011

3 Comments

> The Blackberrry Administration service (BAS) console plays an integral part of blackberry management in all companies that have implemented BES. The most common usage that one would require BAS is to activate blackberry handsets for users, this then enables users to access company mail, contacts and calenders through their blackberry devices. What happens when […]

Continue reading...

Exchange 2010 Adding Global Signatures

March 28, 2011

1 Comment

> Many companies will often require a global signature or disclaimer for their outgoing emails, this can be done either on the client through Outlook or on the Server. In many cases one would want to implement this on the server, one of the advantages of this is that the signature remains on the server […]

Continue reading...

Citrix Secure Gateway with Citrix XenDesktop 5

January 31, 2011

6 Comments

> Ok I have been working on this for some time having learned and gained certification in XenDesktop 4 along came version 5 which was released last month. Since then I have been working to deploy Xendesktop 5 in a small environment with only 2 virtual machines, first thing was to learn the new concepts […]

Continue reading...

What is SSL and using SSL Certificates

January 24, 2011

0 Comments

> Ok im currently implementing external access for xendesktop environment and have come accross some concepts that require understanding. Back at university I studied a module called ‘Trusted Computing’ within which I had to implement a small java program that implemented simple RSA encryption. The idea was to gain a deeper understanding of how the […]

Continue reading...

Desktop Studio – Managing Log Off Policiy

January 18, 2011

0 Comments

>Another big change in XD 5 is that its all  based on powershell command and thus desktop studio does not have all available options in the GUI. On such option is the ability to set the log off policy, previously in XD4 one was able to set this in the GUI however this has now […]

Continue reading...

The Role of Base Disk in Desktop Groups – XenDesktop 5

January 18, 2011

1 Comment

>You may have set up your Xendesktop 5 environment using machine creation services and then may not understand why the desktop group creates its down base disk in storage and what exactly is the role of this disk. Well here is a nice explanation pulled of citrix forums that explains it very nicely. Base disk […]

Continue reading...