What is “LostandFound” object?

An administrator might create or move an object into a container on one domain controller and another administrator might delete that same container on a different domain controller before the object is replicated. In such cases, the object is added to the LostAndFound container for the domain. The LostAndFoundConfig container in the configuration directory partition serves the same purpose for forest-wide objects.

Posted in Citrix XenDesktop | Tagged , , , , , , , | Leave a comment

Top Free Apps for Phones

Top 15 iPhone Apps

1. Apple iBooks 1.1
2. Bing 1.2
3. AT&T myWireless 1.3.2
4. Cube Runner 1.5
5. CNBC Real-Time 1.3
6. Dragon Dictation 1.3.4
7. Dropbox 1.2.2
8. eBuddy Messenger 3.6
9. eBay Mobile 1.7
10.Facebook 3.1.4
11. Evernote 3.3.5
12. ESPN ScoreCenter 1.5.3
13. Kindle 2.1.1
14. Foursquare 1.9
15. Skype 2.0

Top 10 Andriod Apps

1. Advanced Task Killer Free 1.7.9
2. AP Mobile 2.3
3. Astro File Manager 2.4.2
4. Astrid 2.14.3
5. Bonsai Blast 1.5
6. Foursquare
7. Facebook for Android 1.2
8. Google Maps Navigation
9. Dolphin Browser HD 2.0.0
10. Meebo IM 22
11. Listen 1.1.3
12. Photoshop.com Mobile 1.2.0
13. Talk To Me Classic 1.7.8
14. Replica Island 1.3
15. Trap 1.00

Top 5 Symbian Apps

1. Fring 9.4
2. OVI Maps
3. TweetS60 Lite 1.40
4. JoikuSpot Light
5. Qik 1.0.56

Top 5 Windows Mobile Apps

1. Bing 1.0
2. Office Mobile 2010
3. Facebook 1.0
4. Opera 1.0
5.SPB TV 2.0.1

Posted in Citrix XenApp, Citrix XenDesktop | Tagged , , , , , , , , , , , | Leave a comment

Microsoft Zune

Zune 30

Image via Wikipedia

Microsoft surprised everyone in late 2006 by introducing its Zune digital media platform, software, services, and hardware that competes both with market leader Apple and with  its own older Windows Media Player–based PlaysForSure.

Microsoft’s Zune platform is a fairly transparent copy of the Apple playbook.

Microsoft’s failure in the digital media market is that it actually does bundle its excellent Windows Media Player software with Windows, and it’s done so for several years now.

Zune 2 was a revelation, and Microsoft really turned the Zune around by starting over from scratch. Whereas the first-generation Zune was all about the hardware, the secondgeneration platform expanded dramatically in all areas.

The initial release lacked the ability to create smart playlists, though Microsoft fixed that with a Zune 2.5 release in mid-2008. In late 2008, Microsoft offered up its third-generation Zune platform, which was really just an evolution of Zune 2. The devices didn’t change from a hardware perspective at all, though the capacities were upped to 8, 16, and 120GB.

Zune 3 is still the current version of the Zune software, but you can expect Microsoft to keep releasing new hardware, devices, and services and to generally improve the Zune platform.

The Zune PC software is an alternative to Windows Media Player, But still can’t replace because of its various features.

Posted in Citrix XenApp, Citrix XenDesktop | Tagged , , , , , , , , , , , , | Leave a comment

Virtualization Techniques and Basics of Application Virtualization

Virtualization Benefits:
Better resource utilization
Solution to space
Power consumption is less
Better security
Develop and test made easy
Run multiple OS on the same hardware
Manage outages
Easy upgrades to OS and applications
Administration made easy

Types of Virtualization

Hardware Virtualization
Application Virtualization
Memory virtualization
Storage Virtualization

Memory virtualization
It allows networked servers to share a pool of memory to improve software performance.
The memory pool can be accessed at the application level (through API) or operating system level (page cache)

Storage Virtualization
The physical storage resources are aggregated into storage pools, from which the logical storage is created. More storage systems can be added as and when needed at any time any place

Hardware virtualization
Running many OS above a physical hardware using hypervisors which emulates and share the hardware resources.

Application virtualization
Turn physical applications into virtual applications that are never installed but can seamlessly communicate with the local operating system, middleware, plug-ins, and other applications

We need Application Virtualization when two incompatibilities applications installed on the same instance of an OS. This technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. The application never knows that it’s accessing a virtual resource instead of a physical one.

How Application virtualization works?
It works by replacing the some part of the runtime environment provided by the operating system. The layer intercepts all file and Registry operations into a single file and transparently redirects them to a virtualized location.

Since the application is working with one file instead of many files and registry entries spread throughout the system, it becomes easy to run the application on a different computer and previously incompatible applications can be run side-by-side.

The user machine need not have any application installed. Whenever they need to access the file associated with the application, they can connect to the application virtualizing server. The server then will push the application to the client system and the user can access read/edit the file from that application.

Content Redirection

Client-Server: The client application open all the files of the associated type encountered locally with the applications published on the server

Server-Client: Embedded URLs are intercepted on the server and sent to the client using the virtual channel. The locally installed browser will run the URL.

Advantages

Streams applications on demand over the Internet or via the corporate network to all clients.
Automates and simplifies application interoperability testing.
Application upgrades, patching made easy and no end-user involvement required.
No reboots, no waiting for applications to install, and no need to uninstall when retiring applications.
Enables controlled application usage to users.

Posted in Citrix XenApp, Citrix XenDesktop | Tagged , , , , , , | Leave a comment

What is ISA Server?

ISA Server can act as a firewall as it is normally installed at a network perimeter and is used to block all unauthorized access to an internal network, and control access from internal network to the Internet. ISA Server provides packet filtering, stateful filtering, and application-layer filtering. ISA Server enables secure access to the Internet by ensuring that clients can access only the required resources on the Internet, and by ensuring that the connection and data transfer both to and from the Internet is secure.

ISA Server allows secure access from the Internet to internal network resources through the use of Web publishing rules, secure Web publishing rules, and server publishing rules. These publishing rules limit who can access the internal network and what can be viewed once the internal network is accessed.

ISA Server can enable secure access to e-mail servers by blocking attacks against those servers and filtering incoming mail for unwanted spam and attachments. ISA Server can also enable secure client connections to Exchange Server for clients using a variety of client protocols.

ISA Server can enable secure connections to internal network resources by enabled VPN connections for remote clients and sites. Virtual private networking allows secure remote access to resources on an organization’s internal network for users outside the network. The VPN is a virtual network that enables communication between a remote-access client and computers on the internal network or between two remote sites even though the computers might be in different locations and separated by a public network such as the Internet. ISA Server supports two VPN tunneling protocols: Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling Protocol with Internet Protocol security (L2TP/IPSec). PPTP uses Point-to-Point Protocol (PPP) user authentication methods and Microsoft Point-to-Point Encryption (MPPE) to encrypt IP traffic.

Implementing monitoring on ISA Server is a critical component of a successful ISA Server deployment. We can monitor traffic between networks to ensure that our access rules are configured correctly and that only the expected traffic is passing through ISA Server. By monitoring the computer running ISA Server, we can also gather information to use for planning modifications to the current ISA Server infrastructure. We can use the ISA Server Management Console to monitor several components on the ISA Server computer.

Posted in Citrix XenApp, Citrix XenDesktop | Tagged , , , , , , , , | Leave a comment