NICE DCV User Guide NICE DCV User Guide

Total Page:16

File Type:pdf, Size:1020Kb

NICE DCV User Guide NICE DCV User Guide NICE DCV User Guide NICE DCV User Guide NICE DCV: User Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. NICE DCV User Guide Table of Contents Getting Started .................................................................................................................................. 1 Step 1: Get the Session Information ............................................................................................. 1 Step 2: Choose a Client .............................................................................................................. 1 NICE DCV clients ................................................................................................................................ 2 Requirements ............................................................................................................................ 2 Supported features .................................................................................................................... 3 Windows client .......................................................................................................................... 4 Installable Windows client ................................................................................................... 4 Portable Windows client ..................................................................................................... 5 Web browser client .................................................................................................................... 5 Linux client ............................................................................................................................... 7 macOS client ............................................................................................................................. 8 Using NICE DCV ................................................................................................................................. 9 Connecting to a session .............................................................................................................. 9 Connecting using the Windows client ................................................................................... 9 Connecting using the web browser ..................................................................................... 10 Connecting using the Linux client ....................................................................................... 11 Connecting using the macOS client .................................................................................... 12 Managing streaming modes ....................................................................................................... 13 Streaming metrics ............................................................................................................ 14 Transferring files ...................................................................................................................... 15 Downloading a file ........................................................................................................... 15 Uploading a file ............................................................................................................... 16 Renaming a file ................................................................................................................ 16 Printing ................................................................................................................................... 16 Copying and pasting ................................................................................................................. 17 Windows, Linux, and macOS clients .................................................................................... 17 Web browser client ........................................................................................................... 18 Using a smart card ................................................................................................................... 18 Saving a screenshot .................................................................................................................. 20 Using multiple screens .............................................................................................................. 21 Using USB remotization ............................................................................................................ 22 Using a webcam ....................................................................................................................... 23 Troubleshooting ............................................................................................................... 25 Using accurate audio/video synchronization ................................................................................. 26 Using a connection file ............................................................................................................. 28 Creating the connection file ............................................................................................... 28 Supported parameters ...................................................................................................... 29 Running the connection file ............................................................................................... 33 Troubleshooting ............................................................................................................................... 34 Using the Log Files ................................................................................................................... 34 Release notes and document history .................................................................................................. 35 Release Notes .......................................................................................................................... 35 NICE DCV 2021.2-11048 ................................................................................................... 36 DCV 2021.1-10851 ........................................................................................................... 37 DCV 2021.1-10598 ........................................................................................................... 37 DCV 2021.1-10557 ........................................................................................................... 38 DCV 2021.0-10242 ........................................................................................................... 38 DCV 2020.2-9662 ............................................................................................................. 39 DCV 2020.2-9508 ............................................................................................................. 39 DCV 2020.1-9012 ............................................................................................................. 40 DCV 2020.1-9012 ............................................................................................................. 40 DCV 2020.1-8942 ............................................................................................................. 40 DCV 2020.0-8428 ............................................................................................................. 41 iii NICE DCV User Guide DCV 2019.1-7644 ............................................................................................................. 42 DCV 2019.1-7423 ............................................................................................................. 42 DCV 2019.0-7318 ............................................................................................................. 42 DCV 2017.4-6898 ............................................................................................................. 43 DCV 2017.3-6698 ............................................................................................................. 44 DCV 2017.2-6182 ............................................................................................................. 46 DCV 2017.1-5870 ............................................................................................................. 47 DCV 2017.1-5777 ............................................................................................................. 47 DCV 2017.0-5600 ............................................................................................................. 47 DCV 2017.0-5121 ............................................................................................................. 48 DCV 2017.0-4334 ............................................................................................................. 48 DCV 2017.0-4100 ............................................................................................................. 48 Document history ..................................................................................................................... 49 iv NICE DCV User Guide Step 1: Get the Session Information Getting Started with NICE DCV NICE DCV is a high-performance
Recommended publications
  • Configuring DNS
    Configuring DNS The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname. The Cisco IOS software maintains a cache of hostname-to-address mappings for use by the connect, telnet, and ping EXEC commands, and related Telnet support operations. This cache speeds the process of converting names to addresses. Note You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource record type AAAA is used to map a domain name to an IPv6 address. The IP6.ARPA domain is defined to look up a record given an IPv6 address. • Finding Feature Information, page 1 • Prerequisites for Configuring DNS, page 2 • Information About DNS, page 2 • How to Configure DNS, page 4 • Configuration Examples for DNS, page 13 • Additional References, page 14 • Feature Information for DNS, page 15 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
    [Show full text]
  • How to Take a Screenshot PC Users
    Tutorial: How To Take A Screenshot What is a screenshot you may ask? According to Wikipedia a screenshot, screen capture, or screen dump is an image taken by the computer to record the visible items displayed on the monitor or another visual output device. Basically, its a picture of what is on your computer screen at that precise moment in time. There are many, many ways to take a screenshot. Here are some of the most popular ones: PC Users: Without Any Outside Software Assistance: 1. Press Print Screen button key (may look like this: “prt scr” and is usually in the upper right hand side). This copies the image to your computer’s memory. 2. Open up the “Paint” program (Typically can be found here: Start > All Programs > Accessories > Paint) 3. Go to the Edit menu and click Paste or you can press and hold “Ctrl” and tap V. Then you may crop if you like. 4. Click File > Save As. In the box that pops up, change the “Save As Type” to PNG or JPG. Type in a filename for your image. Choose a place to save, like the Desktop, and click save. With Outside Software Assistance: Snagit ‐ It’s the best (but is not free) http://www.techsmith.com/screen‐capture.asp Gadwin Print Screen (free) http://www.gadwin.com/printscreen/ ScreenGrab (free firefox browser plugin) https://addons.mozilla.org/en‐ US/firefox/addon/1146/ Mac Users: Without Outside Software Assistance: Option+Command+3(full screen shot) Photo goes to your desktop automatically OR Option+Command+4 (select area of screen you want – drag a square on the area of the screen you want) Photo
    [Show full text]
  • Digital Backgrounds Using GIMP
    Digital Backgrounds using GIMP GIMP is a free image editing program that rivals the functions of the basic versions of industry leaders such as Adobe Photoshop and Corel Paint Shop Pro. For information on which image editing program is best for your needs, please refer to our website, digital-photo- backgrounds.com in the FAQ section. This tutorial was created to teach you, step-by-step, how to remove a subject (person or item) from its original background and place it onto a Foto*Fun Digital Background. Upon completing this tutorial, you will have the skills to create realistic portraits plus photographic collages and other useful functions. If you have any difficulties with any particular step in the process, feel free to contact us anytime at digital-photo-backgrounds.com. How to read this tutorial It is recommended that you use your own image when following the instructions. However, one has been provided for you in the folder entitled "Tutorial Images". This tutorial uses screenshots to visually show you each step of the process. Each step will be numbered which refers to a number within the screenshot image to indicate the location of the function or tool being described in that particular step. Written instructions are first and refer to the following screenshot image. Keyboard shortcuts are shown after most of the described functions and are in parentheses as in the following example (ctrl+T); which would indicate that the "ctrl" key and the letter "T" key should be pressed at the same time. These are keyboard shortcuts and can be used in place of the described procedure; not in addition to the described procedure.
    [Show full text]
  • V6.5 Data Sheet
    Data Sheet Blue Prism Network Connectivity To ensure compatibility with evolving network infrastructures, Blue Prism can be deployed in environments that utilize IPv4 or IPv6 network protocols for all connections as well as those that use a hybrid approach, utilizing a combination of both protocols. This allows all Blue Prism components - Runtimes, Clients, Application Servers - to connect using the preferred or most suitable method. Resource connectivity When establishing connections to Runtime Resources, Blue Prism uses the name specified in the DNS. This is based on the machine name and can either the short name or the Fully Qualified Domain Name (FQDN). If a Resource has both IPv4 and IPv6 addresses in the DNS, the network adapter settings of the connecting device (Application Server, Interactive Client, or Resource) are used to determine which IP address should be used to establish the connection: 1. The connecting device defaults to an IPv6 connection. 2. If an IPv6 connection is not established within 1.5 seconds and if the connecting device has multiple IPv6 addresses listed in the DNS, a connection attempt is made using the next available IPv6 address. 3. If an IPv6 connection is not established, the connecting device automatically attempts to connect using IPv4. 4. If all available IPv4 addresses have been tried without success, the Resource is considered unreachable. Commercial in Confidence Page 1 of 3 ®Blue Prism is a registerd trademark of Blue Prism Limited 6.5 Data Sheet | Blue Prism Network Connectivity Resource connectivity The following diagram illustrates the logic used for connections to Runtime Resources. Commercial in Confidence Page 2 of 3 ®Blue Prism is a registerd trademark of Blue Prism Limited 6.5 Data Sheet | Blue Prism Network Connectivity Application Server connectivity Application Server connectivity Clients and Resources can connect to Application Servers using the host name, IPv4 address, or IPv6 address specified in the connection settings on the Server Configuration Details screen.
    [Show full text]
  • Changing IP Address and Hostname for Cisco Unified Communications Manager and IM and Presence Service, Release 11.5(1) First Published
    Changing IP Address and Hostname for Cisco Unified Communications Manager and IM and Presence Service, Release 11.5(1) First Published: Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Configuring Smart Licensing
    Configuring Smart Licensing • Prerequisites for Configuring Smart Licensing, on page 1 • Introduction to Smart Licensing, on page 1 • Connecting to CSSM, on page 2 • Linking Existing Licenses to CSSM, on page 4 • Configuring a Connection to CSSM and Setting Up the License Level, on page 4 • Registering a Device on CSSM, on page 14 • Monitoring Smart Licensing Configuration, on page 19 • Configuration Examples for Smart Licensing, on page 20 • Additional References, on page 26 • Feature History for Smart Licensing, on page 27 Prerequisites for Configuring Smart Licensing • Release requirements: Smart Licensing is supported from Cisco IOS XE Fuji 16.9.2 to Cisco IOS XE Amsterdam 17.3.1. (Starting with Cisco IOS XE Amsterdam 17.3.2a, Smart Licensing Using Policy is supported.) • CSSM requirements: • Cisco Smart Account • One or more Virtual Account • User role with proper access rights • You should have accepted the Smart Software Licensing Agreement on CSSM to register devices. • Network reachability to https://tools.cisco.com. Introduction to Smart Licensing Cisco Smart Licensing is a flexible licensing model that provides you with an easier, faster, and more consistent way to purchase and manage software across the Cisco portfolio and across your organization. And it’s secure – you control what users can access. With Smart Licensing you get: Configuring Smart Licensing 1 Configuring Smart Licensing Overview of CSSM • Easy Activation: Smart Licensing establishes a pool of software licenses that can be used across the entire organization—no more PAKs (Product Activation Keys). • Unified Management: My Cisco Entitlements (MCE) provides a complete view into all of your Cisco products and services in an easy-to-use portal, so you always know what you have and what you are using.
    [Show full text]
  • A Successor to the X Window System
    Y: A Successor to the X Window System Mark Thomas <[email protected]> Project Supervisor: D. R¨uckert <[email protected]> Second Marker: E. Lupu <[email protected]> June 18, 2003 ii Abstract UNIX desktop environments are a mess. The proliferation of incompatible and inconsistent user interface toolkits is now the primary factor in the failure of enterprises to adopt UNIX as a desktop solution. This report documents the creation of a comprehensive, elegant framework for a complete windowing system, including a standardised graphical user interface toolkit. ‘Y’ addresses many of the problems associated with current systems, whilst keeping and improving on their best features. An initial implementation, which supports simple applications like a terminal emulator, a clock and a calculator, is provided. iii iv Acknowledgements Thanks to Daniel R¨uckert for supervising the project and for his help and advice regarding it. Thanks to David McBride for his assistance with setting up my project machine and providing me with an ATI Radeon for it. Thanks to Philip Willoughby for his knowledge of the POSIX standard and help with the GNU Autotools and some of the more obscure libc functions. Thanks to Andrew Suffield for his help with the GNU Autotools and Arch. Thanks to Nick Maynard and Karl O’Keeffe for discussions on window system and GUI design. Thanks to Tim Southerwood for discussions about possible features of Y. Thanks to Duncan White for discussions about the virtues of X. All company and product names are trademarks and/or registered trademarks of their respective owners.
    [Show full text]
  • World-Wide Web Proxies
    World-Wide Web Proxies Ari Luotonen, CERN Kevin Altis, Intel April 1994 Abstract 1.0 Introduction A WWW proxy server, proxy for short, provides access to The primary use of proxies is to allow access to the Web the Web for people on closed subnets who can only access from within a firewall (Fig. 1). A proxy is a special HTTP the Internet through a firewall machine. The hypertext [HTTP] server that typically runs on a firewall machine. server developed at CERN, cern_httpd, is capable of run- The proxy waits for a request from inside the firewall, for- ning as a proxy, providing seamless external access to wards the request to the remote server outside the firewall, HTTP, Gopher, WAIS and FTP. reads the response and then sends it back to the client. cern_httpd has had gateway features for a long time, but In the usual case, the same proxy is used by all the clients only this spring they were extended to support all the within a given subnet. This makes it possible for the proxy methods in the HTTP protocol used by WWW clients. Cli- to do efficient caching of documents that are requested by ents don’t lose any functionality by going through a proxy, a number of clients. except special processing they may have done for non- native Web protocols such as Gopher and FTP. The ability to cache documents also makes proxies attrac- tive to those not inside a firewall. Setting up a proxy server A brand new feature is caching performed by the proxy, is easy, and the most popular Web client programs already resulting in shorter response times after the first document have proxy support built in.
    [Show full text]
  • Mozilla's Attachment to Open Public Consultation Survey
    European Commission’s Open Public Consultation on eIDAS Attachment to Mozilla’s Survey Response 1 October, 2020 About Mozilla 1 Feedback on QWACs in the eIDAS Regulation 2 Historical Background of QWACs and TLS Certification 4 TLS server certificates are not the correct place to store QWAC identity information. 5 Proposed Technical Alternatives to TLS binding in eIDAS 6 ntQWACs 7 Non-TLS QWAC Delivery Mechanisms 8 Additional Transparency and Security Concerns with the EU TSP List 9 Lack of Transparency 9 Irregular Audits 9 Insufficient Risk Management 9 Recommendations 10 Appendix A: Relevant Language from the eIDAS Regulation 11 Appendix B - Bringing Openness to Identity White Paper 13 About Mozilla Mozilla is the Corporation behind the Firefox web browser and the Pocket “read-it-later” application; products that are used by hundreds of millions of individuals around the world. Mozilla’s parent is a not-for-profit foundation that focuses on fuelling a healthy internet. Finally, Mozilla is a global community of thousands of contributors and developers who work together to keep the internet open and accessible for all. 1 Since its founding in 1998, Mozilla has championed human-rights-compliant innovation as well as choice, control, and privacy for people on the internet. According to Mozilla, the internet is a global public resource that should remain open and accessible to all. As stated in our Manifesto, we believe individuals' security and privacy on the internet are fundamental and must not be treated as optional. We have worked hard to actualise this belief for the billions of users on the web by actively leading and participating in the creation of web standards that drive the internet.
    [Show full text]
  • The Spectacle Handbook
    The Spectacle Handbook Boudhayan Gupta Boudhayan Gupta The Spectacle Handbook 2 Contents 1 Introduction 5 2 Starting Spectacle6 3 Using Spectacle 7 3.1 Taking A Screenshot . .8 3.1.1 Capture Mode . .8 3.1.2 Options . .9 4 Additional Functionality 10 4.1 Buttons . 10 4.2 Configure . 11 4.2.1 General . 11 4.2.2 Save . 12 4.2.3 Shortcuts . 14 4.3 Drag and Drop . 14 5 Credits and License 15 Abstract Spectacle is an application for capturing and editing desktop screenshots. It can capture im- ages of the entire desktop, a single monitor, the currently active window, the window currently under the mouse, or a rectangular region of the screen. The images can then be annotated, printed, sent to other applications for manipulation, or quickly be saved as-is. The Spectacle Handbook Chapter 1 Introduction Spectacle is an application for capturing and editing desktop screenshots. It can capture images of the entire desktop, a single monitor, the currently active window, the window currently under the mouse, or a rectangular region of the screen. The images can then be annotated, printed, sent to other applications for manipulation, or quickly be saved as-is. Please report any problems or feature requests to the KDE Bug Tracking System. 5 The Spectacle Handbook Chapter 2 Starting Spectacle Spectacle can be started in a variety of ways, as described below: • In the application launcher menu, Spectacle can be found at Applications ! Utilities ! Screenshot Capture Utility Spectacle • Pressing the Print Screen button on the keyboard (often labeled PrtSc, PrtScn or similar) will immediately launch Spectacle.
    [Show full text]
  • Star Trek Online Guide Xbox One
    Star Trek Online Guide Xbox One Theurgic Jervis besieges brawly. Edgar purples her granophyre vernally, excerptible and unmelted. Flabbiest Lonny always shamble his willy if Hebert is unsustaining or york ajar. Get is preferable to star trek fleet command, and the cost of Star Trek Armada is stage one hand through most action-packed skill game. If each have any cheats or tips for every Trek Online please send something in here We you have cheats for this youth on PlayStation 4 You struggle also tank your. Is WoW Worth Playing 2020? The STO Academy has turn around since 2010 and is nothing of the largest and most. Star Trek Online Rise of Discovery descends onto Xbox One. On September 1 2011 Cryptic Studios announced that star Trek Online would akin to free-to-play but another full access to transmit the. The Complete train to be Trek Online MMOAMCOM. Star Trek Online's internal canon extends beyond what takes place in at game. These tombs are many fan of areas of the prophets indefinitely or in that and adults to xbox one. Star trek fleet command missions list. Odo and round link layer 'What about Leave Behind' and Trek BBS. Star Trek Online Review Download Guide & Walkthrough. 1 Star Trek Online Walkthrough overview TrueAchievements. Sto Best Hangar Pets. For information specific to Playstation 4Xbox One console versions of honor game see. Star Trek Fleet Command Ships Guide The ships in to Trek Fleet. Star Trek Online is available person for Xbox One shoulder the Microsoft Store as legitimate free to unit title.
    [Show full text]
  • Nokia N900 User Guide
    Nokia N900 User Guide Issue 4 2Contents Contents About your device 19 About the desktop 20 Application menu 21 Safety 6 Status area and status menu 21 About your device 6 Dashboard 23 Network services 7 About the touch screen 24 Shared memory 7 Text input 25 Protect your device 29 Find help 8 Explore Ovi 29 Read the user guide 8 Support 8 Personalise your device 30 Settings 8 Edit and personalise the desktop 30 Access codes 8 Profile settings 31 Prolong battery life 9 Change the background image 31 View information about your device 9 Change the device language 31 Visit maemo.nokia.com 9 Change themes 32 Get started 10 Connect your device 32 Set up your device 10 About connectivity 32 Keys and parts 14 Network settings 32 First start-up 15 Use a WLAN connection 33 Kickstand 16 Use a packet data connection 37 Stylus 16 Active data connections 38 Use accessories 17 Disable wireless connections 38 Internet connection settings 38 Introduction 18 Bluetooth connectivity 39 Key features 18 USB connections 41 About Maemo software 18 © 2010 Nokia. All rights reserved. Contents 3 Browse the web 42 Options during a call 58 About browser 42 Call timers 58 Open and browse web pages 42 Emergency calls 58 Browser toolbar 43 Organise bookmarks 44 Send text and instant messages 59 Clear private data 44 About Conversations 59 Connection security 45 Send text messages 60 Download files 45 Send instant messages 61 Save web pages 46 Delete messages and conversations 63 View browsing history 46 Filter conversations 63 Install a plug-in or an add-on 46 Text
    [Show full text]