Realizing the benefits of End-User computing

End-user computing is changing the way we manage and deploy our desktops, support mobile users, and secure company data by mitigating risk to the datacenter. 
MicroAge has seen clients large and small begin to evaluate, implement, and realize the benefits achieved through EUC solutions like VMware Horizon View and Citrix XenDesktop.
If you're interested in learning more about how EUC can benefit your organization, MicroAge is here to take you from proof of concept to design to implementation.  Let us know have we can help!
 http://bit.ly/1MumwHO
This topic first appeared in the Spiceworks Community

End-user computing is changing the way we manage and deploy our desktops, support mobile users, and secure company data by mitigating risk to the datacenter. 
MicroAge has seen clients large and small begin to evaluate, implement, and realize the benefits achieved through EUC solutions like VMware Horizon View and Citrix XenDesktop.
If you're interested in learning more about how EUC can benefit your organization, MicroAge is here to take you from proof of concept to design to implementation.  Let us know have we can help!
 http://bit.ly/1MumwHO
This topic first appeared in the Spiceworks Community

Similar Messages

  • What are the benefits of 64-bit computing?

    What are the benefits of 64-bit computing?
    From what I understand, the only benefits are the ability of the OS to address memory ranges beyond 2GB. Or is it 4GB? I can't remember.
    Anyway, I have no intention of expanding my Intel MacBook's memory beyond its built-in 2GB RAM.

    I think that the ram advantages of 64 bit computers is just a minor issue with most existing Mac computers. The average user today has between 2 to 8 GB's of ram. This amount of ram is easily handled by existing OS's like Leopard.
    I believe that the actual benefits for most users will be when the code of their applications is re-written to run in 64 bit code.
    From Apples Page on New Technologies: "It can also enable computers to crunch twice the data per clock cycle, which can dramatically speed up numeric calculations and other tasks." And on the same page: "64-bit applications can use more advanced security techniques to fend off malicious code".
    http://www.apple.com/macosx/technology/
    The 'twice the data per clock cycle' will affect all users regardless of how much ram they have or plan to buy for their machines. More data per cycle means more speed. Better security built into the OS is always a plus.
    This is why a MBP with a 3GB limit will still want to run a 64 bit application, and my new iMac with an 8GB limit will still benefit from Snow Leopard.
    I view all this extra memory abilities as something very far off for Mac users today. Ram prices will have to go down even lower, new machines will have to be bought with new ram management chips, etc.
    Meanwhile, most of Apple's applications are currently running in 64 bit even if the Kernal is running at 32 bit, and other companies (like Adobe) should be coming out with 64 bit versions of their applications. Most experts agree that since the Kernal runs very low-level functions, it won't benefit from 64-bit operation near as much as user applications.
    The big delays here, are for hardware drivers to work in 64 bit, and also for helper applications like Flash. Apple knew this going into the SL project. It's going to take a year or so until almost all of our programs are upgraded. Meanwhile, both 32 bit and 64 bit programs will run on Snow Leopard.
    Message was edited by: dechamp

  • Is there Ready Made Configuration Packs available for Lync Client ( Client on end user computer ) and Server

    Hi,
    is there  Ready Made Configuration Packs available for Lync Client ( Client on end user computer ) and Server ... to check the configuration, services,compliance, functionality of all the features etc at end user level
    and server configuration packs
    Regards
    Tanoj
    OSLM ENGINEER - SCCM 2007 & 2012

    No, there is not something available for Lync. What's available can be found here (and it's all not recent):
    https://www.microsoft.com/en-us/search/DownloadsDrillInResults.aspx?q=SCCM+%22configuration+pack%22&cateorder=2_5_1&site=
    My Blog: http://www.petervanderwoude.nl/
    Follow me on twitter: pvanderwoude

  • How do enter the adobe pdf end user liscense agreement?

    i do not know how to look for the adobe pdf end user liscense agreement?
    help?

    Depending on which Adobe application you are using, the EUA will vary somewhat
    and there are several applications that handle PDF products, Adobe Reader is one.
    You could check into the results linked here that show several end-user-agreements
    with Adobe over a few product lines; to see what may apply to whatever you're using.
    •Adobe pdf end user agreement -- google results link:
    https://www.google.com/?gws_rd=ssl#q=Adobe+pdf+end+user+license+agreement
    In the open application, near where the name of the product appears, you should be
    able to check into such places as "about Adobe..." when you click on the Name.
    Since I only have Adobe Reader, not any of their retail application programs, what
    little that tells me may not be anywhere near enough to answer your open question.
    In Adobe Reader, if it were not to work on initial installation, I'd likely have to open the
    application from its location in the Applications folder (in Adobe reader folder) and then
    agree to the terms of the EUA in a small window that would appear at that point... and
    after that any use of the Reader should simply be almost automatic if another application
    sends a PFD request for the Reader to run and let me read content. Mine is set to not
    do anything automatically, for security purposes, though. Hope the search links help.
    Good luck & happy computing!

  • Introducing the Microsoft Intune End User Enrollment Guide

    Help Your Users Get Their Devices Enrolled in Microsoft Intune with the End User Enrolment Guide
    Choosing how you manage mobile devices within your organization is just one of many steps involved in protecting your corporate data while enabling a great end user experience on the devices they choose.
    Now, you need to encourage your users to enroll their devices into Microsoft Intune to be managed. We’ve created the Microsoft Intune End User Enrollment Guide to help get you started. This two-page document helps explain to your users the importance of protecting corporate data, as well as their own, by letting your IT department manage their devices. It explains what may happen on their devices (installation of apps, security policies applied, etc.) and what will NOT happen on their devices (collecting personal information like phone and...
    This topic first appeared in the Spiceworks Community

    Depends which Guide you're looking at in 1.9.
    You can choose the Full Guide (in Standard or Classic) views, Channel Guide, Half Guide or Mini Guide.
    7xxx HD
    Full Guide Standard = 7 channels (hit Guide once)
    Full Guide Classic = 5 channels (available option in Television settings menu)
    Channel Guide = 7 channels horizontally (hit Guide twice)
    Mini Guide = really just one channel at a time (hit the down arrow on live TV)
    Half Guide = 6 channels (hit the up arrow on live TV)
    2500 / 6xxx / 7xxx SD
    Full Guide Standard = 6 channels (hit Guide once)
    Full Guide Classic = 4 channels (available option in Television settings menu)
    Channel Guide = 6 channels horizontally (hit Guide twice)
    Mini Guide = really just one channel at a time (hit the down arrow on live TV)
    Half Guide = 5 channels (hit the up arrow on live TV)

  • Getting the Error : SSLException :End user tried to act as a CA in WAS

    I have a web service application running in WAS 5.1 and client application running in WAS 6.1.
    We use server side authentication and we have configured the trust store keystore on the client side.
    But when we try to invoke the wenservice i get the error "SSLException :End user tried to act as a CA".
    Kindly let me know the possibility of this error.
    Thanks In advance
    Shyam.

    Hello,
    I tested again and with the same code and the same java libraries. There is no problem using Apache with OpenSSL 0.9.6h. The problem only occures with OpenSSL 0.9.7.
    Are there any known incompatibilities between JSSE and OpenSSL 0.9.7?
    TIA,
    Robert Stroetgen. :)

  • Multiple JRE's running on end user computer IE6

    Hi - First time poster...
    I was reading the other topic on the Citrix server and JRE's, so I wanted to ask if it was the same for end user computers.
    We have an upgrade that will be performed that will use JRE 1.4.2_06. Currently, we have 1.4.1_05 on some computers and 1.4.2_05 on others.
    Those are used for other applications that require the JRE. When the 1.4.2_06 is installed, will it trash those applications and not work if 1.4.2_06 is not supported, or will it find the current version it needs (since it's still there) and use that?
    Thanks in advance for your help.
    Gene

    It won't trash the applications (see http://java.sun.com/j2se/1.4.2/compatibility.html to get 100% proof). If you install a new version, this will be used by default (if you just use "java"). Of course you can still use other JREs / SDKs when you explicitely use the version ("c:\Programme\j2sdk1.4.2_04\bin\java").

  • DPM 2012 still requires put end users into local admin groups for the purpose of end user data recovery?

    On client computers that are protected by DPM 2010 and prior versions, you had to put the end users account in the local administrators group. If you did not add the end user account to the local administrators group you would get this error after opening
    the recovery tab in the DPM client: “DPM found no recovery points which you are authorized to restore on the specified DPM server. You can restore only those recovery points for which you were an administrator at the time the
    backup was taken. To restore other recovery points, contact your DPM administrator, or attempt to restore from another DPM.”  This is not ideal on many networks because the end users are not allowed to have local administrator access.
    Ths fix to this was included in hotfix 2465832 found here: http://support.microsoft.com/kb/2465832.
    This hotfix (a hotfix rollup package for DPM 2010) resolves other issues with DPM 2010 as well. You can find the full list of what this hotfix corrects on that link.
    One would think this issue should have been resolved in DPM 2012, however I am encountering the same exact issue, had to include end-users into the workstation local admin group before they can search for recovery points on the DPM server. This is not acceptable
    practice.
    Is there a new hotfix for the same issue on DPM 2012? I am hesitated to apply KB2465832 since it also includes many other fixes for DPM 2010, which may not appicable for version 2012.
    Please help.
    Thanks,

    This is a hands off solution to allow all users that use a machine to be able to restore their own files.
    1) Make these two cmd files and save them in c:\temp
    2) Using windows scheduler – schedule addperms.cmd to run daily – any new users that log onto the machine will automatically be able to restore their own files.
    <addperms.cmd>
    Cmd.exe /v /c c:\temp\addreg.cmd
    <addreg.cmd>
    set users=
    echo Windows Registry Editor Version 5.00>c:\temp\perms.reg
    echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent\ClientProtection]>>c:\temp\perms.reg
    FOR /F "Tokens=*" %%n IN ('dir c:\users\*. /b') do set users=!users!%Userdomain%\\%%n,
    echo "ClientOwners"=^"%users%%Userdomain%\\bogususer^">>c:\temp\perms.reg
    REG IMPORT c:\temp\perms.reg
    Del c:\temp\perms.reg
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT] This
    posting is provided "AS IS" with no warranties, and confers no rights.
    That's a good one! Thanks for that.
    I've been scripting on KIX for some time, so here is mine, hope it helps to someone... (it's probably not the best, but it works)
    ========================================================================
    $RC=setoption("WOW64AlternateRegView","on") 
    $DPMkey = "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent\ClientProtection"
    $uservariable = "%userdomain%\%username%"
    If KeyExist ($DPMkey)
    $Userstring=ReadValue($DPMkey, "ClientOwners")
    If $Userstring == ""
    WriteValue($DPMkey,"ClientOwners", $uservariable, "REG_MULTI_SZ")
    ? "Key created"
    else
    If not instr($Userstring,$uservariable)
    $Userstring = "$Userstring,$uservariable"
    WriteValue($DPMkey,"ClientOwners", $Userstring, "REG_MULTI_SZ")
    EndIf
    Endif
    EndIf
    ==========================================================================
    The problem actually is that you still need to use an admin account to write on the registry, so ensure you configure it properly on the schedule task.
    In case you use a service account on the schedule task... the "$uservariable" will get populated with that account. As a work around to this... I changed it for the following line:
    =========================================================
    $uservariable = ReadValue("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI", "LastLoggedOnSAMUser")
    =========================================================
    The only problem with that, is that key gets created/updated only if user gets logged phisically on that PC, but will not work for anyone connecting through RDP.

  • Detect End User Computer for Incident Request -SCSM 2012 Self Service Portal

    Hi all,
    We want to automatically select user computer name when user submitting a incident request through SCSM 2012 Self Service Portal.  I would like to know is there are OOB feature or workaround without code. 
    Our client does not want to select computer from the list. :) Hence they need Self Service Portal to detect the user computer 
    Thanks in Advance

    Follow the step
    1. Create Request Offering and select "Query Results" for Computer
    2. Select Class : Computer (Advanced)
    3. Configure Criteria Primary User Set Token : Portal User Name
    4. Choose Display Column example: NetBIOS Computer Name
    5. Go to portal, once the form loaded it will auto populate the Primary User Computer
    Hope this help !

  • Utilizing the Workspace for end users

    Trying to see how can I utilize the existing workspace for "end users" who are supposed to access the application, I have two questions:
    1- How to remove the extra regions, logos and etc.
    2- How to add link to the application
    Thanks,
    Mehr

    I'm not clear on your question, but I'm going to take a wild stab in the dark and think you would like to customise the workspace login
    http://www.grassroots-oracle.com/2013/02/modifying-apex-workspace-login-page.html
    Why not provide them the appropriate URL in the first place?

  • End User computer control

    Hi everyone!
    I want to create a group policy in Windows server 2008 R2 to do the following controls on selected groups;
    1. Disable the DELETE key
    2. Disable the CTRL + X
    3. Disable Right key of mouse
    4. Disable Drag & drop operation through mouse.
    5. Disable File & Edit Menu in folder
    The objective is to create Group policy is to restrict the user from Deleting any file from local computer. This objective is not totally fulfilled by windows folder & file rights policy.
    Thanks in advance.
    Chirag

    "Deleting any file from local computer"
    why isn't this fulfilled with NTFS?
    and not sure you will achieve your goals, some maybe through registry but i doubt it!

  • Any End User Benefits Of Exchange 2010 to 2013 Upgrade?

    Most of the benefits I see when I search online for new features of Exchange 2013 seem to be related to administrative functions that users don't see or care about.
    What are the biggest benefits that end users can see for moving from Exchange Server 2010 to Exchange Server 2013 that don't require also upgrading Office 2010 to 2013 to take advantage of?

    If your users do nothing in Outlook but send and receive messages, then there is probably no benefit. That would be true in just about any version of Exchange.
    If however, they are interested in improved connectivity (Outlook Anywhere/ MAPI/HTTP in SP1) and getting a superior experience on mobile devices and tablets as well as access to apps, the 2013 is a must.
    Don't forget the improvements coming Exchange's way in the future:
    http://blogs.technet.com/b/exchange/archive/2014/04/24/mec-2014-recordings-are-here.aspx
    Twitter!: Please Note: My Posts are provided “AS IS” without warranty of any kind, either expressed or implied.

  • How to hide the columns at the end user level thru personalization

    Hi all
    how I can hide the columns that are displayed on the portal. Any personalize option for the end user? Any righ click or some thing?
    I am looking at hiding columns not while developing the iViews / Pages, But in the browsers as the end user.
    i can hide the columns what ever i want while creating the iViews for MDM data. but we cant provide the content administrator role to the end user for hiding the columns what ever they want. they want to hide the columns thru pesonalization option at the end user level.
    Can you please let me know whether we can able to hide the columns at the end user level thru personalization ?? is it posible with standard iViews??
    Regards
    Sunil

    Hi Sunil,
    I understood your requirement properly and seems valid and I tried this at my end but i didnt get the solution. Field list is not visible in Personalize option. I dont think it is possible with MDM standard iViews.
    I was thinking an alternative is if some how we manage to give the permissions to end user only on Result Set iView but if it would be possible it will not be a good design.
    Lets wait for some inputs from others.
    Regards,
    Jitesh Talreja

  • Unable to map the portal user with back end user through web dynpro coding

    Hi All,
    I 've a portal user which is mapped to back end user by  system in the portal.
    i 'm able to get the portal user from web dynpro application.
    But unable to get the mapped back end user
    this is my code
    String systemalias = "SAP_CRM_PROD";
    Map mapattr = new HashMap();
              //     IPrincipal principal = (IPrincipal) request.getUser();
    //   get user user mapping information
    IUserMappingData userMapping =
                   //(IUserMappingData) UMFactory.getUserMapping().getUserMappingData(systemalias, principal, mapattr);
                   (IUserMappingData) UMFactory.getUserMapping().getUserMappingData(systemalias,principal,mapattr );
    //                  For testing purposes only
                   //mappingData = userMapping;
                   HashMap map = new HashMap();
                   userMapping.enrich(map);
                   mappedPassword = map.get(UMAP_KEY_PASSWORD).toString(); //String "user"
                   mappedUserId = map.get(UMAP_KEY_USER).toString(); /
    following is the error reported .
    The project was not built since its classpath is incomplete. Cannot find the class file for javax.xml.soap.SOAPMessage. Fix the classpath then try rebuilding this project.
    please help.

    Hi Sanjay,
       request component need to be initialized before using it. Include these lines before ur code.
    IPortalComponentRequest request = (IPortalComponentRequest) this.getRequest();
    String mappedPassword = null;
    String mappedUserId = null;
    Also check these threads for ur help.
    Accessing Mapped Username / Password
    How to access user id and password via UserMapping ?
    Reward points for helpful answers.
    Regards,
    Harini S

  • End Users cannot log in to the ccmuser web page.

    Greetings,
    I have a Call Manager Business Edition that was synched with a customer's AD directory. However, the end users cannot log in to the ccmuser web page with either their AD password or the Call Manager end user PIN.
    Any suggestions?
    Thanks
    George

    Thanks for your reply, Aaron.
    All users are in the end user group.. I even created a new role/user group that gives users complete read/write access to all end user features. Still no go. I think it is an LDAP issue, but I'm confused because everything else works.

Maybe you are looking for