Skip to main content

IGEL Introduces Uniquely Stylized Desktop Appliance Supporting Citrix XenDesktop

Thin Client Leader's Full Product Line Transforms into Citrix
XenDesktop-Tuned Appliances with the Click of a Button

Reading, UK: May 20th 2008- IGEL Technology, the world's third largest
thin client vendor, today announced that it will demonstrate one of the
first prototypes of a Citrix XenDesktop(tm)-tuned Appliance in a
stylized form factor at Citrix Synergy(tm), May 20-23, 2008 in Houston,
TX. A Citrix partner for more than ten years, IGEL is also outfitting
its entire product line with IGEL's One-Click-XenDesktop Appliance
Feature, which means the company will offer the world's largest range of
appliances that support Citrix XenDesktop with 22 models.

At Synergy, Citrix will release its Citrix Ready(tm) desktop appliance
specification with the aim of defining a new class of devices
specifically designed to deliver a full desktop experience when
connecting to Citrix XenDesktop in a VDI environment. These devices are
geared towards those customer scenarios which represent the main target
market for XenDesktop, namely knowledge workers accessing a corporate
desktop from a LAN-connected device. The specifications for a stylized
device make the access of virtual PCs a more aesthetically appealing and
"cool" experience, and include an integrated, widescreen, flat panel
monitor with swivel and height adjustment features and a single cable
connection. Citrix customers will be able to see the world's first
public demonstration of IGEL's exciting new product in the IGEL booth
#102 at Citrix Synergy, where the companies will be demonstrating a
prototype of the IGEL 19" widescreen Elegance unit, which includes an
embedded desktop receiver for XenDesktop.

In addition, IGEL is integrating a software switch into all of its
products that allows customers to transform their thin client into a
XenDesktop-tuned appliance with one simple click. "The integration of
IGEL's One-Click-XenDesktop Appliance Feature into our standard firmware
gives our customers the freedom of choice within every environment,"
said Dirk Doerdelmann, engineering director at IGEL. "Now users will be
able to effortlessly switch any IGEL device into 'XenDesktop' mode and
fully access their Citrix-hosted virtual PC."

The integration of this feature will begin with IGEL's upcoming Linux
firmware release, scheduled for Q2 2008, and continue with the release
of its Microsoft(r) Windows(r) XP Embedded and Microsoft(r) Windows(r)
CE firmware shortly thereafter.

"The pairing of Citrix XenDesktop technology with IGEL's innovative
desktop appliances provides users with a more secure, cost-effective and
environmentally-friendly solution that offers the same performance as
traditional desktop PCs," said Mick Hollison, vice president of product
management, Desktop Delivery Group, Citrix Systems. "IGEL has
collaborated with Citrix through the Citrix Ready desktop appliance
program to develop its stylized appliances that are tuned to XenDesktop.
Together, XenDesktop and IGEL provide the ability to deliver a superior
desktop experience to end users."

"We believe that the Citrix desktop appliance specification will offer
users the easiest and most seamless way for accessing their virtual
desktops," Doerdelmann continued. "We are proud to not only have the
largest range of access appliances that support Citrix, but also be one
of the first to demonstrate and offer customers hardware that fulfills
the new XenDesktop-tuned appliance specification for accessing their
virtual PCs."

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op