Operations | Monitoring | ITSM | DevOps | Cloud

Citrix

Doing more with less in IT, yes this impacts Citrix teams too!

If you work in a technology role, then it won’t be any surprise to you when I say organizations have pivoted from specialist IT job functions, such as Citrix only roles, to making sure the infrastructure team can support many workloads. The adoption of cloud technologies has also created support for this approach because our infrastructure teams are doing less architecting and more application configuration and user work.

Goliath Technologies Launches Intelligent Cloud Monitoring Solution

Philadelphia, PA – February 8, 2023 –Goliath Technologies, a leader in end-user experience monitoring and troubleshooting software, has today announced the launch of Goliath Cloud Monitor – a new cloud monitoring platform that provides centralized monitoring of AWS and Azure cloud environments from a single location. With 75% of organizations worldwide implementing a multi-cloud strategy, the market demand for effective cloud monitoring solutions has never been greater.

Introducing: Monitoring and Troubleshooting for Google ChromeOS

Goliath Technologies’ purpose-built software, with embedded intelligence and automation, is the industry-only solution to help IT professionals monitor ChromeOS devices (Chromebooks, Chromeboxes, etc.) and troubleshoot end-user experience issues.

Automate & Visualize Your Citrix Environment

“Why is everything down?” Nod your head if you’ve had this experience. No changes were made, yet suddenly everything is down. Where do you start looking? If you’ve been in the EUC world long enough, you probably have a good idea. But what about those junior admins you are mentoring so that you can get some time back in your day?

Resolve Citrix Resource Enumeration Issue

Citrix is a popular virtualization and remote access solution that allows users to access their applications and data from anywhere. However, like any technology, it is not without its issues. One common problem that users may encounter is the “resource enumeration” issue. Resource enumeration is a process that occurs when the Citrix server scans the network for available resources, such as printers, scanners, and other peripherals.

SCOM integration with OpenAI Chat GPT

We are happy to announce that we have created a SCOM integration with OpenAI Chat GPT. The solution checks for any alert generated in SCOM and then requests the artificial intelligence service to give you possible root causes and fixes to solve the issue. Moreover, it will take into account any other issues the respective degraded component or service is experiencing and consult you accordingly.

Leveraging Embedded Intelligence and Automation to Augment Your Citrix Expertise

What’s your least favorite thing as an IT professional to hear when you first stroll into the office in the morning? I’m going to go out on a limb and guess that, like me, many of you might say something like this: “Everything is slow….” Ughhhhhhh, if we had a dime for every time we’ve heard end users utter that vague and unhelpful statement over our careers, we’d have a boatload of dimes. Across IT roles, this tiring theme seems to follow us wherever we go.

Citrix Latency: Why it Matters and How to Improve it?

Are Citrix latency causing issues for your end users? Pin-pointing the root-cause of latency can be a challenge because it can occur in any part of the network and in any tier. Knowing where to start troubleshooting can mean the difference between end-users not noticing and a flood of support tickets on the service desk. In this guide I teamed up with eG Innovations to talk about what Citrix latency is, why it matters, and how we can improve it.

Your PKI infrastructure is worthless if ...

A common mistake IT organizations make, is having a well-designed Public Key Infrastructure (PKI), but at the same time having client devices, such as monitoring agents for your Citrix NetScalers, which accept to set up any encrypted connection, to any device, no matter what certificate they are presenting. In this case, you basically allow connections to be made to devices you do not know whether they can be trusted. This makes you vulnerable for 'spoofing'.