• IBM Consulting

    DBA Consulting can help you with IBM BI and Web related work. Also IBM Linux is our portfolio.

  • Oracle Consulting

    For Oracle related consulting and Database work and support and Migration call DBA Consulting.

  • Novell/RedHat Consulting

    For all Novell Suse Linux and SAP on Suse Linux questions releated to OS and BI solutions. And offcourse also for the great RedHat products like RedHat Enterprise Server and JBoss middelware and BI on RedHat.

  • Microsoft Consulting

    For Microsoft Server 2012 onwards, Microsoft Client Windows 7 and higher, Microsoft Cloud Services (Azure,Office 365, etc.) related consulting services.

  • Citrix Consulting

    Citrix VDI in a box, Desktop Vertualizations and Citrix Netscaler security.

  • Web Development

    Web Development (Static Websites, CMS Websites (Drupal 7/8, WordPress, Joomla, Responsive Websites and Adaptive Websites).

20 January 2014

Novell Zenworks 11 SP2

Novell Zenworks 11 SP2

Automate and accelerate your Windows 7 migration:

Microsoft estimates that it can take more than 20 hours to migrate a single machine to Windows 7. Novell ZENworks Configuration Management is ready to dramatically accelerate and automate every aspect of your Windows 7 migration efforts.



Simplify deployment with virtual appliances:

Slash deployment times with a convenient virtual appliance deployment option.

Enjoy a truly unified solution:

Centralize the management of all your devices into a single, unified and easy-to-use web-based ZENworks console—called ZENworks Control Center.

Eliminate IT effort:

Automatically enforce policies and dynamically manage resources with identity-based management of users as well as devices.

Boost user productivity:

Use Novell ZENworks Configuration Management to make sure users always have access to the resources they need regardless of where they work or what devices they use.

BYOD - Bring Your Own Device Security in Zenworks 11 SP@ Mobile Mangement.

Today's employee knows which devices they like to work with, and they are
bringing them to work with or without consent. Learn how ZENworks Mobile
Management can help you leverage this trend so your employees are more
productive, satisfied, and reduce your mobile device related expenses.

Avoid getting locked into a single platform or vendor.

Novell ZENworks Configuration Management gives you total freedom to decide which platforms and devices are the most suitable for your organization. This offers you ultimate flexibility in endpoint management.
Unlike other solutions that lock you into a Microsoft-only back end, ZENworks Configuration Management runs on both Windows and Linux, supports Microsoft Active Directory and Novell eDirectory™, and works with your database of choice (Oracle, Microsoft SQL Server or Sybase).
This flexibility keeps costs low and does not force you to abandon your current IT investments. ZENworks Configuration Management also offers you a wide range of deployment options. For example, you can choose to deploy the product as a virtual appliance, which uses your existing virtualization investments. This provides a simple out-of-the-box solution that decreases deployment time and effort without restricting your hardware choices.



Managed Devices

You can use Novell ZENworks 11 to manage the following servers, workstations and thin-client sessions:

Linux Servers:
SUSE® Linux Enterprise Server 11
SUSE Linux Enterprise Server 10
Novell Open Enterprise Server 2 (Linux)
Red Hat Enterprise Linux 4.6+
Red Hat Enterprise Linux 5.3+

Linux Workstations:
SUSE Linux Enterprise Desktop 10
SUSE Linux Enterprise Desktop 11

Windows Servers:
Windows Server 2003 SP1 / SP2 x86, x86-64 (Enterprise and Standard editions)
Windows Server 2008 SP1 / SP2 x86, x86-64 (Enterprise and Standard editions)
Windows 2008R2 (Enterprise and Standard editions)

Windows Workstations:
Embedded XP SP2 / SP3
Windows Vista SP1 / SP2 x86, x86-64 (Business, Ultimate, and Enterprise versions only; Home versions are not supported)
Embedded Vista SP1 / SP2
Windows Embedded Standard 2009
Windows Embedded Point of Service
Windows XP Professional SP2 / SP3 x86
Windows XP Tablet PC Edition SP3 x86
Windows 7 x86, x86-64 (Professional, Ultimate, and Enterprise editions)

Thin-client Sessions:
Windows Server 2003 SP1 / SP2 x86, x86-64 (Enterprise and Standard editions)
Windows Server 2008 SP1 / SP2 x86, x86-64 (Enterprise and Standard editions)
Citrix XenApp MetaFrame XP
Citrix XenApp Presentation Server 4.0
Citrix XenApp 4.5

Mac OS X 10.2.4 or later

Novell Zenworks 11 SP2 Upgrade Documentation

Novell Zenworks 11 SP2 Documentation

Novell Zenworks 11 SP2 End Point Management Customer information

Top 10 Reasons to upgrade to Novell Zenworks 11 SP2

For more information please contact me at:

Drs. Albert Spijkers
DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook

email:          info@dbaconsulting.nl 

06 January 2014

Get enterprise information under control with Citrix solutions

Get enterprise information under control with Citrix solutions:

- Empower workshifting and mobility by delivering the right level of secure access and collaboration anytime, anywhere to leverage a highly mobile and geographically dispersed workforce.
- Embrace consumerization by enabling application portability and control of user profiles and settings in the datacenter and delivering encrypted information to any device.
- Enforce compliance, data privacy and data protection by taking a more efficient, comprehensive, yet granular approach to controlling and auditing application and data access.
- Reduce costs by centralizing desktop and application maintenance, updates and patches.
- Move to the cloud by extending enterprise infrastructure to take advantage of cloud based applications and services.

Why DBA Consulting chooses Citrix:

Citrix is recognized by the Information Systems Security Association (ISSA) as the Outstanding Organization of the Year in 2011 for its contributions to the advancement of information security, helps your organization regain control and manage risk more effectively while providing optimal flexibility to allow the business to do what it needs to do, the way it needs to.

Regain control over enterprise information

Providing strict yet flexible control over access, reliable endpoint security and built-in compliance auditing, the secure-by-design approach for delivering desktops, applications or entire workloads addresses key security prioritiesówhile reducing costs through simplified management.

Centralize information resources, and manage and secure them in the datacenter

- Enterprise applications, data and business information are accessed securely from anywhere, rather than residing on the endpoint devices of every worker in the extended enterprise.
- IT can easily define and enforce policies over which resources specific users or groups can access, including whether or not they can install and configure applications themselves.
- Desktop and application access can be turned on and off instantly as needed in the event of new or departing workers, transfers and business continuity scenarios.

Control access through pre-configured granular based policies

 - IT can determine the appropriate level of user access to applications and data wherever they reside: in the datacenter, in a public or private cloudóeven when downloaded to a local device for offline use.
- IT can deliver the right level of access based on the userís current profile, device, network and location.

Deliver enterprise information securely to any device

- IT can enable secure access and collaboration for every employee, contractor or partner from any personal device or corporate-owned device workers choose to use.
- Rather than making distinctions between enterprise-owned and outside devices, IT evaluates every device and user as they attempt to connect to the enterprise network, then grants the appropriate levels of access to each resource through access control policies

Achieve compliance through built-in monitoring, tracking and auditing of information access

- Full activity logging, reporting and auditing make it easier to meet compliance and privacy standards.
- IT can define and implement policies to ensure conformance with  requirements - both internal and external - while maintaining the flexibility to respond to new mandates as they emerge.

Virtual Desktop and Security: Part1 Enable Secure Access

Virtual Desktop and Security: Part2 Managing Security Policies

Are you bothered by too many Passwords? Checkout this solution from LogMeOnce:



For more information please contact me at:

Drs. Albert Spijkers
DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook

email:          info@dbaconsulting.nl