When deploying Citrix Virtual Apps and Desktops within enterprises and governmental institutions, there are security standards with which you may need to comply. Unauthorized access to confidential data and data breach can happen if proper security measures are not in place.
A post about my approach to learn Citrix Machine Creation Services.
This blog post won't be a real classical Blog HowTo Guide, but more of a report of my journey to help me keep track about what I do. Maybe others suffer the same knowledge gap and are interested in my findings and the path I take.
September 2018's Member of the Month is Madison CUGC leader Greg Tiber. He talks about fun times with the Madison group, the upcoming Great Lakes XL event, and his experience in the Citrix CTA program.
August 2018's Member of the Month is Indianapolis CUGC leader Nick Burton. He talks about planning the Midwest XL event, the rewards of leading, and where you can find him when he's not leading or working (hint: it's pretty much anywhere outdoors!).
A how-to guide about the Citrix Workspace Environment Management (WEM) Upgrade process for version 4.7.