Firewalls of Middle Earth Middle Earth is a kind of medieval place. Swords. Castles. Horses. Have you ever considered some of their high-tech security features. We have. Learn how to become a security expert. Few can bear your horrible gaze while you check traffic for policy violations. As a symbol of your omnipotence, you should also have the lidless-eye symbol emblazoned on your door. Don’t do it. Or do it. You can do whatever you like. I don’t think your procedure involves the Nazgul. It’s probably just shutting down one port. Oder maybe you send them an all-knowing IM. DurinVPN Ah, Durin’s Doors. They reach an encrypted tunnel door when a blizzard forces them to travel under the mountain than up it. They must authenticate using a spoken password to gain access. It’s written on the door! They could have just written their password down on a Postit and stuck it to their monitor. What does this sound like? What is an encrypted tunnel? We thought VPN. Although it’s not an exact analogy. The Great Gates on the eastern side were destroyed during the Battle of Azanulbizar so it’s not encrypted on both sides. It’s not the most secure route to the eastern side, but the travelers took their chances. Even Cisco can be surprised by a Balrog, but maybe not to a Cisco Bane-level. Which brings us to… Gandalf Firewall version 1.0 with YSNP Update. Finally, let’s discuss layering security features. The Mines of Moria offers a few layers of protection (aside from being within a mountain, which you might think would be sufficient). There are the western Doors of Durin which is the once-Great Gate to east. Then there is the Bridge of Khazad-dum. They needed a wizard to defeat the Balrog. You know the rest. Gandalf Firewall 2.0 is coming soon. Although your firewall’s fight against the outside (and within) world may not be as epic as Gandolf with Durin’s Bane’s last stand, it silently says “You shall not pass” to all the network’s Balrogs and goblins, orcs and even hobbits every day. Did we miss any other Middle Earth firewall or security function? Please let us know what you think in the comments. P.S. P.S. Start your free week. Download

FAQs for the New CCNA

Many people have questions about the redesigned CCNA announced by Cisco last week. Here are Jeremy’s answers for some common questions, as well as information about the new topics on the exams.
I am already studying for my CCNA. What are the “old” exams?
September 30, 2013, is the last day for the “old” exams ICND1 v1.1 640-822 and ICND2 v1.1 640-816. CCNA v1 640-802 is also available (composite).
What are the new exam numbers
Learn how to become a security expert with SPOTO’s Cybersecurity Training
Get started training
ICND1 v2 100-101
ICND2 v2 200-101
CCNA v2 200–120 (composite).
What’s changed? How different are the new exams to the old?
There’s more!
ICND1 is the foundation of all technology certification. VLSM has more subnetting. There is more depth (NAT and ACLs, VLANs). There is more modern technology (OSPF, IPv6).
A few things have been cut to make more room for all of this. There is less GUI. There is also less GUI.
Check out my MicroNugget about ICND1 2013 for a video breakdown on new ICND1 topics.
Because there’s so much more to ICND1, the ICND2 can go even deeper. The ICND1 is a “whoosh”, and then the ICDN2 allows you to slow down and take in the beauty around you.
ICND2 now offers a lot more troubleshooting. It also offers a lot of troubleshooting (EIGRP and multi-area OSPF, OSPF3), switching, management (SNMP, NetFlow), scandel prevention (IOS licensing), and routing.
Should I take the older tests before September or wait to take the new ones? Employers will appreciate a “new” CCNA.
If you can, take the old one. It’s simpler. The same logo and credential will still be available. You are a CCNA. An employer won’t ask you if your CCNA is “old” or “new”. A CCNA is a proof that you know what you’re doing.
The new CCNA will allow you to know more. However, it is more difficult and will require more study.
Bottom line: Keep the old one and remember that there is always more to be learned.
Do I need new equipment for my lab?
My lab recommendation still stands. IOS 15 is a new exam, but Cisco now requires that you have a license to use it. You must activate IOS 15. Does this mean you have to buy new equipment? You can still use the old stuff.
Are there any changes to the other Cisco certification tracks
The new ICND1 exam is extremely detailed because it is the introductory certification for all other certifications. It is the foundation for all things. There are no changes to the certification tracks (e.g. CCNP) at this time.
There is a lot of overlap between CCNA/CCNP. There will be a lot more “seen that, been there” conversations. I can see CCNP going though a revision, perhaps in a year.
Is CCNA still the best requisite to enter networking? Would you recommend Network+ (or any other cert) before taking the CCNA exam?
The best prerequisite for entering the networking industry is the CCNA. Network+ is a vendor-neutral certification that requires very little hands-on experience (quite a lot of theory and historical networking). As an employer, I would rather have a CCNA than a Network+ certification. Network+ will give you more knowledge and background about your networking abilities, but (in my view, this isn’t shared by everyone) there are far more valuable, current topics that you can study.
How can I find out more about the CCNA
Check out the Cisco CCNA site for more information:
I’m willing to study for this! Is there any training for SPOTO?
Yes! Yes!

Everything You Need To Know About Microsoft’s 70-412 Examination

Note: Tim Warner just completed our new “Microsoft Windows Server 201270-412” training series. Tim has already written about Microsoft’s 70-417 exam. Here, he gives the details on the 70-412 exam.
Hello, everyone! This blog post is intended to provide all the background information necessary to pass the Microsoft certification exam 70-412, Configuring Advanced Windows Server 2012 Service Services.
As you most likely know, the 70-412 exam counts as credit towards a number of Microsoft IT Pro certifications. Here’s a list of certifications that require passing 70-412:
Microsoft Certified Solutions Associate (MCSA), Windows Server 2012
Microsoft Certified Solutions Expert (MCSE), Desktop Infrastructure
MCSE: Server Infrastructure

Figure 1: Do the new MCSA/MCSE logos appeal to you?
Learn how to become a security expert with SPOTO’s Cybersecurity Training
Start training. I will not give you “braindumps” nor any other proprietary information. This is in accordance with the Microsoft exam policies. However, I will help assess your readiness to take the 412 exam and offer tips and tricks to maximize your study time.
70-412 Exam Metadata
Below is a summary of the key components of Microsoft Exam 70-412.
Number of QuestionsApproximately 60Question Type(s)Single-answer multiple-choice; Multiple-answer multiple choice (no simulations)Time Limit:Approximately 90 minutesPassing Score:700/1000Exam RegistrationPrometricRegistration Fee$150 USDMicrosoft experimented with simulation and “virtual lab”-type exam questions in the past. The technical overhead of deploying and scoring these question types proved too costly. Therefore, Microsoft IT pro exams use the traditional multiple-choice format.
This means that test-takers need to improve their critical reasoning skills and master the subject matter. A SPOTO annual subscription grants you access to a vast library of Transcender(r), practice exams. I was a Transcender(r), and I can attest to its accuracy and ethical foundation.
70-412 Core Content
I recommend that you schedule your 412 exam after you have passed the introductory exams for the MCSA or MCSE series. This is because the 412 exam content assumes that you have mastered core Windows Server 2012 technologies.
Domain Name Service (DNS) is an example. You might be asked questions on the 70-410 exam about creating and managing Active Directory-integrated zones. You might be asked questions on the 412 exam about “special case” DNS situations, such as the following:
DNS Security Extensions (DNSSEC).
Stub zones vs Conditional forwarders
GlobalNames zones

Do you see what my point is? The 412 is the “next level” in your existing Windows Server skills. Exam 70-412 covers the following key areas at a high level (see the official Microsoft exam blueprint to get more details):
Network Load Balancing (NLB)
Failover clustering
Migration of Hyper-V virtual machines
FSRM and File Classification Infrastructure (FCI).
Dynamic Access Control (DAC).
Built-in iSCSI initiator and target
Windows Backup and Restore
Hyper-V replica
DHCP advanced concepts (Superscopes and DHCP failover).
DNS advanced concepts (DNSSEC and Socket Pool)
IP Address Management (IPAM).
AD in a Multisite, Multi-Domain and Multiforest Environment
Trust Relationships
Sites and Replication
Active Directory Certificate Services (AD CS).
Active Directory Rights Management Services (AD RMS).
Active Directory Federation Services (AD FS).

Whew! It’s a lot of content!
Exam Preparation Strategies
First and foremost, I am a ho.

Four Intriguing Things Data Analytics Could Do

IBM’s DB2 certification can be a great way for you to validate your skills. It’s also expanding the possibilities of Data Analytics. Anyone who shops online knows the amazing ability of Facebook and other popular Web pages to track what you’ve been doing.
It’s a little creepy at first. How can they know? Am I being watched? It becomes second nature after a while. Some people are curious enough to take the time to learn how cookies work and how they can be cleared. However, knowing that you have been shopping for boots and specifically Wolverine 100 Mile boots at Zappos is only the tip of the iceberg. These are four fascinating, creepy, and cool examples of modern data analytics:
1. Breaking the news about a recent pregnancy
Target received a complaint from a father who was concerned a few years back. His high school-aged daughter was receiving advertisements in the mail about maternity wear and other items related to pregnancy. This man believed that the company was encouraging his teenage daughter to procreate, even though she was not pregnant. The customer was confused and representatives offered their sincere apologies. They even called back again to apologize for the mistake. The conversation turned and Target was contacted by the father. His daughter was indeed pregnant.
The question is: How did Target know this? Forbes claims that it wasn’t because they were spying on her. A representative explained that the company had linked interest in unscented lotions and certain vitamins supplements to expectant mothers through data analysis. Although it is somewhat creepy, this is quite amazing. These predictive analytics capabilities can be applied elsewhere and the possibilities are endless.
2. You can get rid of the’six degrees’ thing
According to Facebook, you may be connected to anyone in the world by a distance of more than 3.5 degrees. The social media portal is being used by more people than ever before, reducing the distance between people.
Facebook stated in a blog post that it was difficult to calculate this number across billions and hundreds of billions friendship connections. “[W]e use statistical methods…to accurately estimate distance based upon de-identified, aggregated data.”
To be fair, researchers at Cornell and Italy’sUniversitadegli Studi di Milano narrowed the six down to 3.74 in 2011, according to USA Today. However, it is reasonable to assume that the human population has increased since then. This is why it’s telling that the number of people has declined due to social media. It’s also a great example of what data analysis can teach us.
3. Chicago: Kill rats
This actually happened. Fortune and all other publications wrote about it. According to the report, the Windy City spent twelve years collecting data on rodent-related complaints. These data also collected grievances about other issues, such as graffiti or smelly dumpsters. But the rats dominated the data analytics. Data engineers used the vast amounts of information they had accumulated over the years to predict rat breeding areas.
Brenna Berman, Chicago’s chief information officer, stated that they discovered a really interesting relationship that led them to develop an algorithm for rodent prediction. It involved 31 variables that were related to calls about food poisoning in restaurants and overflowing trash bins.
This information was then used by the city’s sanitation department to combat rat infestations 20% more effectively than other tactics. Fortune noted that this isn’t the first time Chicago has used predictive analysis to solve a problem. The city has been using 911 data for the past three years to try and predict crime patterns. One time, it was even able to prevent a shootout.
4. Find a job
Data analytics can be used to help you predict customer pregnancies, fight crime, kill rats, and determine the degree of human interconnectedness. Qualified data scientists will be needed in all industries and verticals, as long as this continues.
Basic computer training can go a long way to this end, but when backed up by formal DB2 training orCognoscertification,new career possibilities can be added to the list of things that data analytics can accomplish. Machine learning, predictive analytics, and business intelligence are some of the most popular technologies. They will continue to be so for many years. There is no better time than now to get into data.
To find out if a DB2 certification might be right for you, check out New Horizon Learning Group’s IBM training today!

More links
IBM Authorized Training New Horizons Learning Group has been authorized to offer IBM software training. New Horizons Learning Group has partnered with LearnQuest to offer authorized training for the design and installation of IBM technology, storage, and hardware. New Horizons Learning Group is now able to use the award-winning IBM technical training content, which is only available to global training providers. The definition of big data is large amounts of data that can easily be analyzed to identify patterns and predict trends. There are few technologies that can be as disruptive as cloud computing. This innovative service offers many benefits to a wide range industries.

4 AirWatch Tricks That Will Impress Your Boss

What are the benefits of VMware AirWatch? VMware AirWatch is a popular platform for mobile device management (also called enterprise mobility management). It has been a reliable source for revenue for VMware, even though the company is reorganizing and de-emphasizing some older products like Fusion and Workstation.
AirWatch’s market share and growth make it an attractive area to study for IT professionals looking to improve their prospects within the MDM/EMM industry.
AirWatch has many hidden and valuable features that you can use to impress your boss and streamline your IT department’s MDM/EMM efforts. These are just four of the many features that you should know:
1. Use QR codes for simple device enrollment
QR codes are ubiquitous and widely used in Asia, but they are still relatively new in the Americas. They are often associated with bulletin boards and Juicero juice packets. They can be powerful shortcuts to adding mobile devices AirWatch.
You can send invite templates with QR codes to admins. These codes can be scanned by end users using their phone or tablet to download the correct AirWatch agent. If enabled, each code contains an enrollment token. After the agent is installed, scan the QR code to again pass the environment and user parameters back to AirWatch.
2. Enable enrollment tokens
These tokens can be used to add security to your device registration process by being passed to users using the QR codes for AirWatch. The token is a unique credential that must only be used once to register a device in AirWatch.
Administrators of AirWatch have the option to create such tokens as part a one-factor or two-factor authentication system.
For one-factor authentication, the token is sufficient to complete the enrollment. For two-factor authentication, the token must be used along with a standard username/password combination for stronger security. Limit enrollment to certain groups
You may need to restrict who can enroll devices in your AirWatch deployment in certain cases, such as when you work with sensitive production environments. This can be done via the AirWatch admin console.
“Restrictions may be applied to specific groups that have been mapped to Active Directory group.”
Restrictions can only be applied to groups that have been mapped to Active Directory Groups. These restrictions can include operating systems as well as the maximum number of devices that can be enrolled and whether they are allowed in AirWatch MDM.
4. Remotely wipe devices and block access to sensitive content
MDM/EMM faces a constant challenge in dealing with devices belonging to former employees or individuals who have exceeded their access privileges. It is possible for sensitive data to be stolen in these situations, which could lead to embarrassment and damages for the organization.
AirWatch can help you avoid or deal with these difficult situations. It also has remote wipe and content blocking capabilities. AirWatch also automatically generates reports about device lifecycles. This allows you to keep track of device inventory, and can see which devices are currently enrolled in your organization.
Learn how to become a VMware AirWatch expert at one of the New Horizons Computer Learning Centers
AirWatch is an important platform to be familiar with, now that bring-your-own-device initiatives are so prevalent in organizations of all kinds.Taking technical courses at a nearby New Horizons Computer Learning Centerscan help you build both basic and advanced skills in VMware products, including AirWatch.
You’ll be able to use the tips and techniques we’ve provided here, along with many others. Find a New Horizons location near to youto get started.

More links

Three Skills to Take Your Azure Game To the Next Level

Microsoft Azure is quickly becoming a standard in modern IT. Many IT professionals now rely on cloud computing services instead of purchasing, implementing, and maintaining their own infrastructures for compute and storage. Azure is one of the most prominent solutions for both infrastructure- and platform-as-a-service, trailing only Amazon Web Services in most surveys of the largest cloud platforms in terms of revenue, market share and total users.
Azure is more than a single product. It is a collection related services. Azure Stack is a system that allows you to run Azure on-premises in the privacy of a company’s data center. Azure IoT Hub is designed for monitoring the many sensors and devices that make up the Internet of Things.
It can be overwhelming to try and master or even specialize within Azure at first. The Azure ecosystem is so vast and varied. AWS is more popular than Azure, so Azure is not the only IaaS/PaaS platform many IT professionals have to learn. There are some areas of Azure that are particularly useful for building skills that will be valuable in the job market. New Horizons Computer Learning Centers offers special Azure courses for AWS specialists.
What Azure skills should I focus on? These three skills are especially useful today:
1. Azure SQL Database
Azure SQL Database is often marketed as a cloud-based database, or database-as-a-service. These terms refer to the fact that the underlying infrastructure of Azure SQL Database is managed by Microsoft at its facilities rather than by the customer. This arrangement is ideal for app developers as it minimizes capital expenditures and allows them to be flexible with expenses and scalability.
SQL Database is adaptive. This means that it adapts to the development patterns of each individual user and optimizes its performance. If you work for a software-as-a-service provider, SQL Database is also a reliable tool for isolating, managing and securing the application instances of every individual customer in a complex multi-tenant environment.
Microsoft recently expanded its Azure database offerings to attract more developers. The company launched the Cosmos Database, a NoSQL database, which is perfect for “planet-scale” apps, programs that need to reach users in multiple places around the globe. It also introduced PostgreSQL and MySQL services, as well as an updated SQL Database called Managed Instances that allows for data migration to the Azure cloud.
2. Azure Bot Services
Chatbots have been a hot topic within consumer-facing tech since years past. Microsoft, Facebook, and other companies are exploring the possibility of having these automated chatbots assist with everything, from customer service requests to online payment processing. TheMicrosoft Bot Framework had 130,000 developers as of May 2017. This is an increase from 45,000 in September 2016.
Bots can be published to apps like Skype for Business, Bing search engine, and Cortana virtual assistant. They can seamlessly integrate with third-party services. These bots can be managed seamlessly from Azure Cloud via Azure Bot Services.
Like applications, bots also benefit from the scalable storage and tight security that comes with a cloud platform like Azure. Azure Bot Services offers pay-as you-go plans, automatic scaling, security patching, and templates that make it easier to create new bots.
3. Azure Active Directory
Integrating the new services with existing infrastructures on-premises, especially those that govern identities, is one of the biggest challenges in Azure deployments. Businesses are increasingly turning to hybrid and public cloud for cost-effective, flexible IT operations. However, many organizations cannot abandon the systems they have in place.
Integration is one of the biggest challenges in Azure deployments.
This is a common problem. Active Directory Domain Services is used to manage all user, computer and application identities within the corporate security perimeter. This Active Directory version is usually hosted on-premises. It is not available for use with the increasing number of applications hosted in the cloud. This can cause latency problems as requests must traverse different infrastructures before they are approved or denied.
Azure Active Directory is the answer to these performance problems. It can be used as a replica of your existing on-prem directory with all the same objects, identities, and permissions. Any changes made locally will be reflected in the cloud, but not vice versa. Azure AD Connect handles integration. Alternative to this system is to create a virtual machine in Azure that runs Active Directory Domain Services. This may include a virtual private network, Azure ExpressRoute service, or a virtual private network.
New Horizons Computer Learning Centers invites you to dive into Azure
We’ve only scratched the surface on what Azure has to offer. There are many other services available in Microsoft’s cloud. New ones (such as those additional databases we mentioned earlier) are constantly being added. Find a New Horizons Computer Learning Center in your area today, whether you are an AWS expert who wants to learn Azure or a complete beginner to IaaS/PaaS.

Three Reasons Hackers Have the Advantage

Hacker’s are not a problem that only a small percentage of the population must deal with. Hackers are a real threat that both countries as well as companies need to combat. It is crucial to recognize why hackers are so successful in order to combat them. Let’s take a look at the reasons hackers have the upper hand.
1. Society hasn’t had the time to adapt
Although technology has been a major driver for cultural change in the past, the internet revolution has changed the face of technology. This development has not only changed the way that almost every part of society functions but it has also exploded onto the international stage at an alarmingly rapid pace.
“The internet revolution has changed the world.”
The internet has evolved from a tool used by a small percentage of the population to one that is widely used by almost every industry and business in the world. It has been around 25 years since its birth. This has brought many great benefits to people, but it also means that companies and nations haven’t had enough time for adequate defense.
Yahoo! published a recent interview. Yahoo! Finance posted a recent interview in which David Petraeus, ex-CIA director, discussed cyberattacks and the development of nuclear weapons. These technologies were only available to Russia and the United States for a long time. This led to a terrifying cold war but it also allowed for gradual policy changes that made the world a better place. The idea of nuclear war was accepted by society, and nations were able create strategies and defenses against it.
Cyberattacks are a different story. They can be directed against entire countries or single businesses. IT professionals can recall a time when the idea of an average person owning a personal computer at their home was absurd. This idea was quickly realized by companies, who were quick to put their services online to make more money. They were also met with hacking attempts that continue to this day.
One hacker can adapt to modern technology faster than an entire society or company.
2. Hackers need to be successful once
Similar to the previous point, modern businesses must always be on guard. Hackers are not like the enemies of yesterday. Hackers can attack anywhere and at any time, for any reason. They can also fail. Hackers can fail, but they can always move on to the next victim.
Hackers don’t have much to lose, unless they get caught, which is rare. The criminal can just shrug off a phishing attack on a company or close a vulnerability before he can exploit it.
Unfortunately, companies don’t have this luxury. A company’s cybersecurity team must be constantly looking for weak points and closing them down before they are discovered. A hacker can easily take over an entire company’s IT infrastructure by making a single mistake. It’s a terrifying thought that modern companies must deal with every day.
3. There aren’t enough good guys
The world needs cybersecurity professionals who are willing to take on criminals who exploit weak defenses for their own gain. These professionals are well-paid because they have to succeed every single time. Despite this, there aren’t enough of them to go around.
Both the government and private sectors are in desperate need of cybersecurity talent. Cybersecurity Ventures conducted a study and predicted that the number of unfilled cybersecurity jobs would reach 1.5 million by 2019. This is a frightening prospect, but it’s also a sign that hackers will be more accessible. However, this shortage shows that anyone who is interested in this field has a bright future.
Although it is not an easy field, cybersecurity can be extremely rewarding both financially and morally. New Horizons Computer Learning Centers offers a variety of courses for IT professionals interested in a career as a digital security professional.

Three Reasons to Improve Your Mobile Device Management Skills

Mobile Device Management (MDM), has become a necessity for organizations over the past decade. It is easy to see why this shift has occurred: smartphones, tablets, wearables, and mobile device management (MDM) have become a part of the work experience and play a greater role than the traditional staples of yesteryear (e.g. personal digital assistants, pagers and BlackBerry phones).
A look at the MDM landscape. Billions of new devices need management
These fundamental changes in the business office culture have seen MDM solutions market size expand rapidly. ResearchandMarkets stated that MDM solutions represented a $2.81 billion market in 2018 and could grow to $7.86 billion by 2023. This would be a more than 22 per cent compound annual growth rate during this time period.
These numbers are realistic considering that the average digital consumer already owns 3.64 connected devices according to Global Web Index. Strategy Analytics also predicted that 33 billion connected devices would be available by 2020, which is an average of 4.3 devices per person. In 2007, PCs accounted for two-thirds of all internet-capable devices. However, they now account to less than 10%. This demonstrates the shift towards mobile and the Internet of Things.
It is the right time to refresh and build your MDM (or EMM, for Enterprise Mobility Management) skills. This term has become more popular in recent years. Here are three reasons you should learn more about the top platforms in this space such as Citrix XenMobile and VMware AirWatch.
1. Protect your network against malware and data exfiltration
Protecting the corporate network against unauthorized devices and apps, which could introduce malware or facilitate data theft, is an essential capability of any MDM/EMM solution. Any tool that is worth its salt must balance data protection and ease-of-use for end users. AirWatch is one example of how this sweet spot can be achieved.
AirWatch allows single sign-on and multifactor authentication for web, cloud and native applications.Conditions such as device compliance, user location and authentication strength can be accounted for when granting or denying conditional access.Access can be easily and automatically revoked by administrators if an employee leaves the organization or a compliance policy is violated.An identity-defined app catalog ensures that the proper applications are delivered to the right people.Platforms such as AirWatch help streamline the complex tasks of MDM/EMM. IT professionals can easily advance their careers by learning the basics of AirWatch and the rest of VMware.
2. Remote offices and workers can be supported
Many companies are now open to remote work and want to take advantage of its potential benefits for employee retention and real property costs. IT administrators face some challenges when trying to support employees from home or at branch offices.
Virtual private networks, remote desktops, and virtualization are all tools that can be used to secure company applications. MDM/EMM is an important addition to this arsenal of security tools. It simplifies and enhances the use mobile devices from any location. Administrators can rest easy knowing that only approved endpoints will be allowed to access the corporate network.
3. The entire organization can simplify IT administration
The ideal MDM/EMM solution is wirelessly implemented. It can then be scaled to accommodate many more devices and services later on. AirWatch’s name, for example, reflects its role as an OTA platform MDM/EEM. It is also part of an open ecosystem because it integrates with other services like Dropbox, Microsoft Office 365, and ServiceNow.
Get your MDM/EMM skills sharpened at a New Horizons Career Development Solutions
A broad knowledge base in relevant technologies from Microsoft, Citrix, and VMware is necessary to master MDM/EMM for today’s mobile device landscape. This knowledge and expertise can be acquired at your local New Horizons Career Development Solutionscampus. We offer a variety of technical courses in MDM/EMM. Find out more today to start a new career path.

Three Reasons IT professionals should embrace Citrix XenApp & XenDesktop

Citrix XenApp, and its cousin Citrix XenDesktop, are both useful platforms for desktop and application virtualization. If done correctly, virtualization can bring significant benefits to an organization. This includes cost reductions in IT operations and greater flexibility in supporting remote employees. It also allows for easier access to desktops and apps in Linux-based environments. Citrix’s Xen team can be a great resource for IT professionals, both current and aspiring. Let’s look at three of the most compelling reasons to embrace XenApp or XenDesktop.
1. Virtual desktop infrastructure can be simplified with a simpler approach
Virtual desktop infrastructure is essential for delivering Linux and Microsoft Windows desktops anywhere users are located. It is however susceptible to many problems, including high hardware requirements and poor performance during “boot storms,” which occur when virtually every remote employee has access to VDI simultaneously.
XenApp makes VDI easier. One XenApp virtual or physical server can host hundreds upon hundreds of VDI sessions. Each user is isolated even though infrastructures are shared among the group. Traditional VDI, on the other hand, requires many more servers because each user has their own resources.
“XenApp makes VDI straightforward.”
2. Synergy with multiple Microsoft services and products
Office 365 and Windows 10 are the core of modern enterprises. They provide the familiar features and integrations that allow employees to be productive. XenApp, XenDesktop and XenDesktop allow organizations to get more out of their Microsoft solutions. Skype for Business (formerly Lync), can be virtualized using XenApp or XenDesktop. This essentially combines it with VDI. This setup makes Skype for Business a viable replacement for traditional PBX phone systems. It also provides a better user experience. Citrix is the only field-proven solution for Skype for Business, co-developed with Microsoft. XenApp, XenDesktop and XenDesktop are also available to accelerate the migration from Windows 10 to Citrix. Virtualizing apps allows you to run them from a central location instead of each endpoint. This helps to minimize compatibility issues that could otherwise slow you down.

3. Linux access is easier
Linux is a popular platform in many industries, including finance. However, securing access from multiple devices is a common problem when using Linux apps and desktops. XenApp/XenDesktop eliminate this problem by allowing Linux and Windows apps to be managed from a single console. These assets are accessible more easily by non-Linux devices, which makes it easier for them to access. It also requires less infrastructure investment.
Master XenApp & XenDesktop in New Horizons Computer Learning Centers
Are you ready for more information about XenApp or XenDesktop New Horizons offers technical courses and Citrix certifications that will help you build a rewarding career in desktop and app virtualization.

3 Reasons Cloud Migrations Failed and What You Can Do About it

Many companies have taken the migration process of cloud computing as a given, with more and more companies using it. Moving multiple apps and services to a cloud environment can be difficult, especially since every cloud is different. Every cloud migration is unique because major vendors like Amazon, Google, and Microsoft all offer their own ecosystems. Companies cannot afford to take a cloud migration as a given. Instead, they must plan carefully and train their staff to deal with any potential challenges.
Cloud migrations can be difficult. According to an InfoWorld report, cloud migration failures are actually on the rise. According to InfoWorld, this rise was apparent in an Innotas report and stems from the fact that many businesses who have just moved an app or data set to cloud computing are still doing it for the first time. It doesn’t matter if you’re starting a cloud migration for the first time or if you’re taking on a challenging project, it is important to understand the main reasons cloud initiatives fail. These are the three most important reasons why cloud initiatives fail.
Problem 1: Rushing into projectsInfoWorld noted that many organizations send IT professionals to rush into cloud migrations, creating unrealistic timelines and excessive pressure. The cloud can be a great tool for IT operations acceleration, but there are still many things to consider and manage, especially when it comes to a first-time migration of an app or system.
Network World also agreed with this sentiment, pointing out that organizations can get ahead of themselves by being too urgent. Sometimes a business may get so excited about the cloud that they rush to migrate the entire business. Projects can stagnate because teams don’t feel comfortable with the cloud or don’t have enough time to fully understand its implications before migrating mission-critical systems.
The solution:Organizations can take a two-pronged approach to avoid rushing in their transition to the cloud. The first step is to train IT professionals about the cloud ecosystem you are moving into. If you need to port a database to a Microsoft cloud, look for Microsoft-certified training programs. Then, develop your staff. Project management training can help leaders understand how to set expectations and manage time effectively.
Problem 2: Neglecting communication. The consumerization of IT has created a situation where non-tech users can roll out cloud services when they need them. Network World reported that shadow IT is a growing problem. Companies need to open communication channels between the business and IT teams. Many times, migration efforts fail due to a lack of clear expectations from executives. IT cannot adequately specify project requirements and IT can’t give clear business goals.
This is the solution: This is a problem that requires strong project management skills. A skilled project manager can act as a mediator between business leaders and IT leaders, helping to understand the needs and challenges of each group and ensure that the cloud migration is focused on the right priorities.
Problem 3: Insufficient support for staff. Working in the cloud presents new and different challenges to businesses than working in traditional IT environments. Network World stated that many companies neglect to invest in the necessary support systems and tools when moving to the cloud. IT training, discussions about business goals, and a clear understanding of the cloud service model stack are crucial to properly support the IT team in moving systems into the cloud.
The solution: ITtraining programs that cover a wide range can be a big help in moving to cloud computing. A holistic staff training strategy, in which employees are given the task of gaining expertise in specific but relevant areas, can help to provide the broad departmental knowledge necessary to manage a move to cloud.
Although investments in professional training won’t guarantee success, they can help improve your staff’s ability to handle any issues that may arise. New Horizons can help you, whether you’re an IT professional looking for a cloud-focused job, or an executive looking to train your staff.