|
Packet filtering firewalls, 230
Packet latency, 443
Packet priorization, 180, 181–183
PacketShaper (Packeteer), 180–185
in action, 184
analysis report, 185
bandwidth per session, 180–181
partition policy, 181–183
prioritization, 181–182
priority-based packet shaping, 181–183
session-based policies, 180–183
PacketShaper settings
CME Corp private WAN, 576
CME Corp Internet, 572
private WAN, 554
Passthrough authentication, 453–454
Password Manager (MetaFrame), 94, 358
PatBlt() command, 45
Patching known vulnerabilities and exploits, 238
Patterson, Wayne, 6
PC disposition, 199, 200, 292
PC preparation time limit, 323
PC savings estimates, 696
PC survey, 302
PC users, introducing SBC to, 290
PCs (personal computers), 26, 328
administration and TCO, 8
advantages of keeping, 200
converting to full thin client, 196
cost of upgrading, 7
donation or disposal of, 199–200
eliminating as status symbol, 15
eliminating theft of, 17
fat-client, 70
limitations of using, 200
for pilot users, 110
PC-based computing, vs. mainframe hosting, 5
PC-based environment, remote office in, 10
PCs vs. Windows Terminals, cost of, 194–195
PDC emulator, 56
PDC (primary domain controller), 55
PeopleSoft, 14
Performance, in SLA, 243
Performance monitoring, 272
Performance optimization of ICA clients, 442–447
Periodic reporting (system management), 265–266
Persistent cache, enabling, 447
Physical layer (OSI model), 675
Physical security measures, 141, 222
Pilot platform, 308
Pilot program, 109–112, 308–313
application selection, 308
applications, 112
assessing performance, 313
change control, 111
choosing user for, 110–111
controlling, 312–313
documenting performance, 111
expanding to a beta, 313–318
expanding to production, 309–313
testing, 309
Pilot server(s), 111
Pilot test, expanding to a beta, 130
Pilot users
as a representative sample, 109
at headquarters, 110–111
high-quality reliable PCs for, 110
remote office, 110–111
Planning (project), importance of, 294
Plonchak, Patricia E., 9
PN Agent (Program Neighborhood Agent), 201, 432–440
Point to Point serial service, 171–172
Point-to-point connections vs. frame relay, 172
Policies, Citrix, 467–468
Policies and procedures design, 127
Policies (security), 218–219. See also Group policy
common requirements, 222–223
developing, 219–239
Policy scope, 466
Policy setting (Group Policy), 464–465
Policy weaknesses (security), 221
Political assessment of the corporation, 289
Political considerations of SBC, 113–114
Postproduction management of SBC environment, 328–330
POTS (Plain Old Telephone Service), 172
Power requirements for data center, 138–139
Power savings estimates, 698
PowerFuse utility, 6, 239, 263
PowerQuest DeployCenter version 5.5, 348–349
PPTP (Point-to-Point-Tunneling Protocol), 233
PQ (Priority Queuing), 178
Predictive analysis (system management), 266
Presentation layer (OSI model), 44, 674
Presentation Server (MetaFrame XP), 4, 112
load manager, 23
web interface component, 28
Presentation Server farm, 23
Primary Internet connection bandwidth management, 544
Print architecture of MetaFrame XP, 589–590
Print driver installation, 610
Print driver maintenance, 610–613
Print driver mappings, 599–601
Print driver removal, 611
Print Driver replication, 611–613
Print drivers
client-side, 614
Lexmark Z2, 618
server-side, 614–615
Print server architecture design, 124
Print Server Properties dialog, Drivers tab, 611
Print spooler service, 618
Printer bandwidth management, 601–602
Printer default, 607
Printer driver names, 615–616
Printer driver selection, 608
Printer Management Properties window, 595
Printer manufacturer native driver, 608–609
Printer settings (MetaFrame XP), 594
configuration, 613–614
per farm, 595–596
per server, 597
per user, 597
Printer survey, 302
Printers
compatibility lists, 618
important files, 617
local, 608–610
network, 605–607
and third-party Ginas, 617
updating server information for, 616–617
Printing, 320, 327, 587–623, 618
Printing environment, 122
Printing permissions, 615
Printing problems, troubleshooting, 613–618
Printing solutions, third-party, 618–622
Printing system selection, 398
Private key encryption, 232
Private WAN
bandwidth management, 545, 553–555, 573–577
for CME Corp, 573–577
distribution module, 575
Packeteer settings, 554
Private WAN router, 573
for CME-WEST, 565–566
configuration, 552–553
Private WAN site network diagram, 551
Private WAN sites (ATM/DSL), 554–555
Private WAN sites (CORP Sales), 551–555
Procurement team, 326
Production deployment process, 410–413
Production pilot program, 109–110, 309–313
application selection, 309–310
customer care during, 311
selecting participants, 310–311
testing and evaluation of, 310
training techniques, 311–312
Production rollout phase (migration), 644
Profile file size, limiting, 473–475
Profile processing, 462–463
Profiles, 204–205, 458–464
best practices, 468–481
challenges of a mix of, 468
change control, 481
mechanics of, 460–464
Program Neighborhood, 84–85, 375, 440–441
Program Neighborhood Agent, 435–437, 441
Program Neighborhood Agent client, 432–440
Program Neighborhood client, 430, 440–441
Project. See also SBC
announcing to the organization, 301
change control, 121, 295–297
change management, 117–118
conflict resolution, 296–297
constraints on, 297
coordinating tasks, 300
costs and cash flows, 298
criteria for success of, 117
feasibility committee, 112–115
identifying unresolved design issues, 298
implementation strategy, 298
internal marketing plan for, 300
justifying financially, 114–115, 686
maintaining quality and accountability, 305
managing the tasks, 299–300
preparing for implementation, 300–305
starting, 305–306
strategies for overcoming resistance to, 298
technical challenges, 298
upside and downside potentials, 298
work breakdown structure, 299–300
Project budget, 305
Project definition document, 116–118, 293–294
Project design plan, 122–130
Project documentation, 300
Project failure, causes of, 293–294
Project goals, 116
Project implementation plan, 297–300
Project management, 130, 294–307
Project management team, 295
Project manager, identifying, 294
Project milestones, 117, 328
Project plan, defining, 297–298
Project planning steps, importance of, 293–294
Project planning team, 115–118
Project risks, 117
Project roles, 116–117, 298
Project schedule, 299
Project scope, 112, 116
Project success, measuring, 307
Project timing, 297
Project updates, issuing regular, 306
Proof-of-concept pilot program, 109–112, 293, 308–313
Protection of data, 217–218
Protection of resources, 217–218
Protection from viruses, 237–239
Protocol selection, 156–157
Protocol suites vs. OSI model, 677
Proxy server, connecting to a server through, 447–448
PSTN (public switched telephone network), 168
Public key encryption, 232
Published Application Manager, 92–93
Published applications
adding/removing users, 662
limiting users to, 94–95
Publishing the desktop, 202
Publishing full desktop vs. Seamless Windows, 456
Publishing individual applications, 201–202
Publishing results, 329
Push or pull client debate, 425
PVC (permanent virtual circuits), 171
|