|
IBM NetStation, 207
ICA client environment, 82–85
ICA client for hybrids, 205–206
ICA client for MacOS, 206, 441–442
ICA client options for application access, 422–442
ICA client printer configuration, 603
ICA client settings (Web Interface), 505–510
ICA client 7.00 for Windows, 198
ICA client for UNIX and Linux, 383–384, 441
ICA Client Update Configuration utility, 456
ICA clients
configuring for SSL and TLS, 450–451
distribution of, 205
local drive and COM port mapping, 455
locking down, 455
on a PC vs. a Windows terminal, 209
performance optimization of, 442–447
published to the Desktop, 202
vs. RDP clients, 431–432
security on, 447–456
ICA COM and LPT port redirection, 206
ICA compression, 446
ICA connectivity, 82–83, 442–447
ICA desktop, 82–84
ICA (Independent Computing Architecture), 79–85
ICA Java Client packages, 508
ICA Passthrough client, 202, 375
ICA Presentation Services protocol, 80–81
ICA sessions, managing from the CMC, 661
ICA Win32 clients
ICA Win32 Web client
installing, 427–428
vs. minimal installation, 429
with Secure Gateway, 448–450
silent user installation, 427
ICMP messages, 684
ICMP types and codes, 683
Idle session, 41
Idle session numbers, increasing, 42
IDS (Intrusion Detection System), 158, 236
IETF (Internet Engineering Taskforce), 448
IIS, cache-control HTTP header, 447
IM (Installation Manager), 89, 412–418
IM Packager, 417
IMA (Independent Management Architecture), 87, 665–666
IMA data store, 87
IMA protocol, 87
IMA service, 87
Image display, 45
Imaging (cloning), 345–346
Imaging software, 348–349, 413
Implementation cost vs. risk (graph), 221
Implementation phase (migration), 644
Implementation teams (migration), 325–326
Inactivity timeouts, 50–51
Incremental rules (load evaluator), 91
Industry trends, and On-Demand Enterprise, 18–20
Information security, 18
Infrastructure assessment, 118–122, 294, 315–317
Infrastructure design (network), 159–185
connecting modules, 168–185
media selection, 168–175
Infrastructure upgrades, 303–305
Install Scripts, 403
Intellectual property theft, preventing, 15
Intelligent encoding, 45
Interconnectivity in the enterprise, 148
Internal application support, 120
Internal cost of capital, 689
Internal network addressing scheme, 550
Internal network routing protocols, 549–550
Internal SLAs, 243
Internet, as a redundant network, 143–144
Internet access, remote user, 167–168
Internet access module, CME Corp, 567–573
Internet access security exposures, 227
Internet bandwidth, data center, 166
Internet connection bandwidth management, 544
Internet Connector License, 64
Internet MSAM deployment security requirements, 527–528
Internet Packeteer settings, 572
Internet router configuration, 564–565, 567
Internet services access module (data center), 167
Internetworking basics, 671–684
Inventory of hardware and software, 255–256
IP address allocations, 678
IP address classes, 679
IP address management, 252–254
IP address survey, 302
IP addressing, 678–680
IP addressing mask, 679–680
IP addressing scheme, 253, 320
IP application layer, 676
IP (Internet Protocol), 676–684
IP link layer, 678
IP network layer, 677
IP protocol stack, 676–678
IP protocols and ports, 680–684
IP subnetting, 154
IP transport layer, 677
IPSec (Internet Protocol Security), 164, 233
IPSec overhead of VPN connectivity, 164
ISDN BRI, 173–174
ISDN (Integrated Services Digital Network), 172–173
ISDN PRI, 172, 174
ISP (Internet Service Provider) NOC, 250
ISVs (independent software vendors), 22
IT (information technology) department
budgetary concerns, 292
complexity of, 19
consolidation of, 19
cost of, 6
flexibility of, 17
perception of central, 291–292
IT management, treated as a business entity, 666
IT plan for business continuity, 633–639
IT service quality, SLAs and, 255
IT staff
as part of pilot program, 111
assessment of, 288–289
requirements for SBC, 113–114
salaries of, 114
savings from reductions in, 698
sharing information with users and management, 264
skill levels of, 289
threat of job loss, 290
training, 289
user support from, 666
ITU T.120 protocol, 33
|