Storefront-1912-Ltsr.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Storefront-1912-Ltsr.Pdf StoreFront 1912 LTSR Citrix Product Documentation | docs.citrix.com September 1, 2021 StoreFront 1912 LTSR Contents What’s new 3 Cumulative Update 3 (CU3) 4 Fixed issues in 1912 LTSR CU3 4 Cumulative Update 2 (CU2) 6 Fixed issues in 1912 LTSR CU2 6 Cumulative Update 1 (CU1) 7 Fixed issues in 1912 LTSR CU1 8 What’s new 9 Fixed issues in 1912 LTSR 10 Known issues 11 Third party notices 12 System requirements 13 Plan your StoreFront deployment 19 User access options 24 User authentication 32 Optimize the user experience 43 StoreFront high availability and multi‑site configuration 47 Install, set up, upgrade, and uninstall 51 Create a new deployment 74 Join an existing server group 80 Reset a server to factory defaults 82 Migrate Web Interface features to StoreFront 83 Configure server groups 89 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 StoreFront 1912 LTSR Configure authentication and delegation 92 Configure the authentication service 93 XML service‑based authentication 101 Configure Kerberos constrained delegation for XenApp 6.5 103 Configure smart card authentication 107 Configure the password expiry notification period 112 Configure and manage stores 113 Create or remove a store 114 Create an unauthenticated store 120 Export store provisioning files for users 123 Advertise and hide stores to users 123 Manage the resources made available in stores 124 Manage remote access to stores through Citrix Gateway 126 Certificate Revocation List (CRL) checking 129 Configure two StoreFront stores to share a common subscription datastore 138 Manage subscription data for a store 140 Store subscription data using Microsoft SQL Server 146 Advanced store settings 167 Manage a Citrix Receiver for Web site 172 Create a Citrix Receiver for Web site 173 Configure Citrix Receiver for Web sites 174 Support for the unified user experience 180 Create and manage featured apps 204 Configure workspace control 206 © 1999–2021 Citrix Systems, Inc. All rights reserved. 3 StoreFront 1912 LTSR Configure Citrix Workspace app for HTML5 use of browser tabs 207 Configure user access 207 Configure StoreFront to launch applications and desktops in Windowed Mode 211 Configure communication and session time‑out 212 Set up highly available multi‑site stores 215 Integrate with Citrix Gateway and Citrix ADC 233 Add a Citrix Gateway connection 236 Import a Citrix Gateway 238 Configure Citrix Gateway connection settings 246 Load balancing with Citrix ADC appliance 250 Configure two URLs for the same Citrix Gateway 268 Configure Citrix ADC and StoreFront for Delegated Forms Authentication (DFA) 279 Authenticate using different domains 282 Configure beacon points 292 Create a single Fully Qualified Domain Name (FQDN) to access a store internally and ex‑ ternally 294 Advanced configurations 312 Configure Resource Filtering 312 Configure using configuration files 314 Configure StoreFront using the configuration files 314 Configure Citrix Receiver for Web sites using the configuration files 320 Secure your StoreFront deployment 321 Export and import the StoreFront configuration 330 StoreFront SDK 339 © 1999–2021 Citrix Systems, Inc. All rights reserved. 4 StoreFront 1912 LTSR Troubleshoot StoreFront 353 © 1999–2021 Citrix Systems, Inc. All rights reserved. 5 StoreFront 1912 LTSR What’s new May 12, 2021 StoreFront 1912 LTSR Cumulative Update 3 (CU3) is the most recent update to StoreFront 1912 LTSR. Browser support for Microsoft Edge based on Chromium Microsoft Edge browser based on Chromium is now supported for accessing Citrix Receiver forWeb sites from internal network connections and through Citrix Gateway. StoreFront Protocol Handler Support now includes Chrome devices with Workspace app for Android When users on Chrome devices open a Citrix Receiver for Web site, with Citrix Workspace app for An‑ droid 1912 or higher installed, the browser automatically opens ICA files using Citrix Workspace app for Android at launch. The client detection work flow for Android—which determines whether Citrix Workspace app for An‑ droid is installed—is now identical to Citrix Workspace app for Windows and Citrix Workspace app for Mac when the Chrome browser is used on Chrome devices. In previous releases, users on Chrome devices were required to manually open a downloaded ICA file first. Support for app protection policies StoreFront 1912 supports app protection policies to enhance security when other Citrix components, such as Citrix Workspace app and Citrix Virtual Apps and Desktops delivery controllers, also support the app protection feature. App protection policies are set at the Delivery Group level, and Citrix Vir‑ tual Apps and Desktops determines whether app protection policies are used. You need to manually enable the app protection feature within StoreFront. When StoreFront receives requests containing the HTTP header X‑Citrix‑AppProtection‑Capable from a Citrix Workspace app that supports app pro‑ tection policies, StoreFront automatically sends a smart access tag to Citrix Virtual Apps and Desktops indicating that it supports app protection policies. For details of configuring Delivery Groups with app protection policies, see App protection. © 1999–2021 Citrix Systems, Inc. All rights reserved. 6 StoreFront 1912 LTSR Desktop Appliance sites no longer supported StoreFront support for users to access desktops on Desktop Appliance sites was announced as depre‑ cated in Citrix Virtual Apps and Desktops 7 1811. At this release, Desktop Appliance sites are no longer supported, and we recommend using Citrix Workspace app Desktop Lock for all non‑domain‑joined use cases. Warning: When you upgrade to StoreFront 1912, any Desktop Appliance sites in your deployment are au‑ tomatically removed. See Upgrade StoreFront. StoreFront PowerShell SDK The StoreFront PowerShell SDK has been republished as version 1912. You can no longer create or manage Desktop Appliance sites using PowerShell. Cumulative Update 3 (CU3) May 12, 2021 Release date: May 12, 2021 About this release StoreFront 1912 LTSR Cumulative Update 3 (CU3) fixes 10 issues reported since the CU2 release of the 1912 LTSR. StoreFront 1912 LTSR Cumulative Update 2 (CU2) StoreFront 1912 LTSR Cumulative Update 1 (CU1) StoreFront 1912 LTSR (initial release) Known issues in this release Citrix Product Subscription Advantage Eligibility Dates Fixed issues in 1912 LTSR CU3 July 15, 2021 Compared to: StoreFront 1912 LTSR CU2 © 1999–2021 Citrix Systems, Inc. All rights reserved. 7 StoreFront 1912 LTSR StoreFront 1912 LTSR CU3 contains all fixes included in the 1912 LTSR initial release, CU1 release, CU2 release, and the following new fixes: • When you log on to StoreFront, this error message might appear: Cannot Complete Your Request The issue occurs when enumerating applications with verbose logging enabled and any of the enumerated applications with a command‑line argument contains a {. [CVADHELP‑16227] • The StoreFront does not hide apps from All Apps that appear in a featured category through the customization code described in Support for the unified user experience. [CVADHELP‑16577] • When you launch more than 10 applications using Internet Explorer, an extra scroll bar might appear. [CVADHELP‑16605] • With socket pooling enabled, attempts to log on to StoreFront might fail with this error message: Cannot Complete your Request The issue occurs when there is a TCP dynamic port exhaustion. [CVADHELP‑16625] • After upgrading StoreFront from version 7.15 LTSR CU4, VDI desktops with the same host name might appear in random order instead of serial order. [CVADHELP‑16723] • Attempts to launch a provisioned VDI desktop from the Delivery Group with the App Protection feature enabled might fail. The following behaviors might be observed: – When you launch the desktop using Citrix Workspace app for Windows, a spinning circle appears until the StoreFront times out. – When you launch the desktop using Citrix Workspace app for Mac, this error message ap‑ pears: Cannot Complete your Request [CVADHELP‑16800] • After installing or upgrading StoreFront to version 1912 LTSR CU2, joining the StoreFront server group might fail. Also, configuration changes might not propagate to the other servers. [CVADHELP‑17107] • The Secure Ticket Authority update of the Citrix Gateway object might not get reflected in the Store Service’s web.config file when the Usage or role of the Citrix Gateway is selected as HDX routing only or Authentication and HDX routing. The issue occurs when multiple optimal gateways are configured. [CVADHELP‑17112] • Clicking a website shortcut for the first time through Citrix Receiver utilizing SAML authentica‑ tion might require multiple attempts. [CVADHELP‑17137] © 1999–2021 Citrix Systems, Inc. All rights reserved. 8 StoreFront 1912 LTSR Cumulative Update 2 (CU2) November 24, 2020 Release date: November 19, 2020 About this release StoreFront 1912 LTSR Cumulative Update 2 (CU2) fixes nine issues reported since the CU1 release of the 1912 LTSR. StoreFront 1912 LTSR Cumulative Update 1 (CU1) StoreFront 1912 LTSR (initial release) Known issues in this release Citrix Product Subscription Advantage Eligibility Dates Fixed issues in 1912 LTSR CU2 November 17, 2020 Compared to: StoreFront 1912 LTSR CU1 StoreFront 1912 LTSR CU2 contains all fixes included in the 1912 LTSR initial release, the CU1 release, and the following new fixes: • StoreFront stores have been using the unified user experience since StoreFront 1903. Some cus‑ tomers have reported that the way unified experience displays sub‑categories in the Categories
Recommended publications
  • IDC Marketscape IDC Marketscape: Worldwide Mobile Threat Management Software 2018–2019 Vendor Assessment
    IDC MarketScape IDC MarketScape: Worldwide Mobile Threat Management Software 2018–2019 Vendor Assessment Phil Hochmuth IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape Worldwide Mobile Threat Management Software Vendor Assessment Source: IDC, 2018 Please see the Appendix for detailed methodology, market definition, and scoring criteria. December 2018, IDC #US44521018 IDC OPINION As mobile security and governance frameworks mature, mobile threat management (MTM) software tools are filling a major security gap many enterprises are discovering across one of their most pervasive technology deployments: smartphones and tablets used by employees. Many organizations see enterprise mobility management (EMM; technology which manages, configures, and monitors mobiles) as the beginning and end of their mobile endpoint security strategy. While many EMM platforms support security functions (compliance checking, VPN connectivity, data security/encryption, and device certificate management, etc.), most EMMs do not actively scan for mobile-related threats on devices. This is where MTM technology comes in, with its ability to address actively misbehaving or malicious apps, as well as OS and network-based attacks on devices. Driving many MTM early adoptions, and among more mature deployments, is the desire to deploy another layer of security to mobile end-user computing in addition to EMM. Among the more than two- dozen MTM customer interviews conducted for this document, 100% of these enterprises deployed their respective MTM products with an EMM platform; nearly all said that meeting existing or potential future compliance requirements was among the top 3 drivers behind their adoption of the technology. These requirements are driving much of the direction of the market from an MTM feature set and overall go-to-market strategy for MTM vendors.
    [Show full text]
  • Impact of Bundling of Telecommunications Services on Consumers, Industry and Competition
    UNIVERSITY OF CANBERRA Impact of Bundling of Telecommunications Services on Consumers, Industry and Competition Franco Papandrea, Natalie Stoeckl and Anne Daly Communication and Media Policy Institute University of Canberra Working Paper March 2001 Impact of Bundling of Telecommunications Services on Consumers, Industry and Competition Franco Papandrea, Natalie Stoeckl and Anne Daly Working Paper March 2001 Communication and Media Policy Institute University of Canberra The Authors Franco Papandrea is Associate Professor of Communication and Director of the Communication and Media Policy Institute at the University of Canberra. Anne Daly is Senior Lecturer in Economics in the Division of Management and Technology at the University of Canberra and a Member of the Communication and Media Policy Institute. Natalie Stoeckl is a Member of the Communication and Media Policy Institute. During the course of this study she was also a Lecturer in Economics in the Division of Management and Technology at the University of Canberra. Contact Details: Associate Professor Franco Papandrea Director, Communication and Media Policy Institute Division of Communication and Education University of Canberra ACT 2601 (Australia) Tel: +61 (0)2 6201 5083; Fax: +61 (0)2 6201 2630 e-mail: [email protected] Acknowledgments The University of Canberra’s telecommunications research project Impact of Bundling of Telecommunications Services on Consumers Industry and Competition was supported by the Commonwealth through the ‘Grants to Fund Telecommunications Consumer representation and Research’ program of the Department of Communications, Information Technology and the Arts’. The authors are grateful to David Luck, Flavio Menezes and John Asman for comments and useful suggestions on an earlier draft of this Paper.
    [Show full text]
  • The Dynamic Effects of Bundling As a Product Strategy
    The Dynamic Effects of Bundling as a Product Strategy The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Derdenger, Timothy, and Vineet Kumar. "The Dynamic Effects of Bundling as a Product Strategy." Marketing Science (forthcoming). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:11148069 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP The Dynamic Effects of Bundling as a Product Strategy Timothy Derdenger & Vineet Kumar⇤ Abstract Several key questions in bundling have not been empirically examined: Is mixed bundling more effective than pure bundling or pure components? Does correlation in consumer valuations make bundling more or less effective? Does bundling serve as a complement or substitute to network effects? To address these questions, we develop a consumer-choice model from micro-foundations to capture the essentials of our setting, the hand- held video game market. We provide a framework to understand the dynamic, long-term impacts of bundling on demand. The primary explanation for the profitability of bundling relies on homogenization of consumer valuations for the bundle, allowing the firm to extract more surplus. We find bundling can be effective through anovelandpreviouslyunexaminedmechanismofdynamic consumer segmentation,whichoperatesindependent of the homogenization effect, and can in fact be stronger when the homogenization effect is weaker. We also find that bundles are treated as separate products (distinct from component products) by consumers.
    [Show full text]
  • The Impact of Digitization on Information Goods Pricing Strategy
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Digitization on Information Goods Pricing The Impact of Digitization on Information Goods Pricing Strategy Full paper Shivendu Shivendu Ran Zhang University of South Florida University of California, Irvine [email protected] [email protected] Abstract The widespread adoption of the Internet and digital technologies has transformed the distribution and consumption of information goods. We develop a parsimonious model to study pricing strategies of a publisher who offers information good in dual medium (physical, digital) as well as in bundled medium. Consumers are heterogeneous in both valuation for content and preference for medium. We develop optimal pricing strategies and identify the interactive effect of different market characteristics on optimal pricing schemes. We show that offering digital medium only (single component) is optimal under some market conditions, while offering bundle of mediums and digital medium only (partial mixed bundling) is optimal under other market conditions. We find that offering information good in physical medium and in digital medium (pure component) is not optimal when the two mediums are partial substitutes. Moreover, offering only the bundle of mediums (pure bundling) is not optimal as long as physical medium has non-negligible marginal cost. Interestingly, it is always profit enhancing to offer digital medium, even if most consumers in the market prefer physical medium. Keywords Information goods pricing, digitization, dual medium access, bundling, heterogeneous preferences of mediums, partial substitutability of mediums Introduction The advent of the Internet and information technology has led to digitization of content industries and, in turn, has transformed the distribution and consumption of information goods.
    [Show full text]
  • Avid Fastserve | Ingest Administrator's Guide V2021.4
    Avid® FastServe™ | Ingest Administrator’s Guide Version 2021.4 Legal Notices Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology, Inc. This product is subject to the terms and conditions of a software license agreement provided with the software. The product may only be used in accordance with the license agreement. This product may be protected by one or more U.S. and non-U.S patents. Details are available at www.avid.com/patents. This document is protected under copyright law. An authorized licensee of may reproduce this publication for the licensee’s own use in learning how to use the software. This document may not be reproduced or distributed, in whole or in part, for commercial purposes, such as selling copies of this document or providing support or educational services to others. This document is supplied as a guide for . Reasonable care has been taken in preparing the information it contains. However, this document may contain omissions, technical inaccuracies, or typographical errors. Avid Technology, Inc. does not accept responsibility of any kind for customers’ losses due to the use of this document. Product specifications are subject to change without notice. Copyright © 2021 Avid Technology, Inc. and its licensors. All rights reserved. Copyright 2003-2007 of MOG Solutions The following disclaimer is required by Apple Computer, Inc.: APPLE COMPUTER, INC. MAKES NO WARRANTIES WHATSOEVER, EITHER EXPRESS OR IMPLIED, REGARDING THIS PRODUCT, INCLUDING WARRANTIES WITH RESPECT TO ITS MERCHANTABILITY OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. THE EXCLUSION OF IMPLIED WARRANTIES IS NOT PERMITTED BY SOME STATES.
    [Show full text]
  • Applications: A
    Applications: A This chapter contains the following sections: • ABC, on page 8 • Abonti, on page 9 • About.com, on page 10 • ABS-CBN, on page 11 • ACA Services, on page 12 • ACAP, on page 13 • Access Network, on page 14 • AccessBuilder, on page 15 • AccuWeather, on page 16 • Ace Hardware Corporation, on page 17 • Acer, on page 18 • AcFun, on page 19 • Achetez Facile, on page 20 • ACI, on page 21 • Acoon.de, on page 22 • ACR-NEMA, on page 23 • Acrobat.com, on page 24 • Active Networks, on page 25 • ActiveSync, on page 26 • Ad Advisor, on page 27 • AD Backup, on page 28 • AD DRS, on page 29 • AD DSAOP, on page 30 • AD DSROL, on page 31 • AD File Replication Service, on page 32 • Ad Marvel, on page 33 • Ad Master, on page 34 • Ad Mob, on page 35 • Ad Nexus, on page 36 • AD NSP, on page 37 • Ad Redirector, on page 38 • AD Restore, on page 39 Applications: A 1 Applications: A • Ad Tech, on page 40 • AD XDS, on page 41 • AD-X Tracking, on page 42 • Ad4mat, on page 43 • Adap.tv, on page 44 • Adaptive Receive Node Scheduling, on page 45 • Adblade, on page 46 • Adcash, on page 47 • Adconion Media Group, on page 48 • Addicting Games, on page 49 • Addictive Mobility, on page 50 • AddThis, on page 51 • AddThis Bot, on page 52 • AddToAny, on page 53 • AdF.ly, on page 54 • AdGear, on page 55 • Adify, on page 56 • AdJuggler, on page 57 • Admasters, on page 58 • Admeld, on page 59 • ADMETA, on page 60 • Admin5, on page 61 • AdNetwork.net, on page 62 • ADNStream, on page 63 • Ado Tube, on page 64 • Adobe Analytics, on page 65 • Adobe Connect, on page 66
    [Show full text]
  • Lying, Spying, Sabotaging: Procedures and Consequences
    No 196 Lying, Spying, Sabotaging: Procedures and Consequences Nadine Chlaß, Gerhard Riener September 2015 IMPRINT DICE DISCUSSION PAPER Published by düsseldorf university press (dup) on behalf of Heinrich‐Heine‐Universität Düsseldorf, Faculty of Economics, Düsseldorf Institute for Competition Economics (DICE), Universitätsstraße 1, 40225 Düsseldorf, Germany www.dice.hhu.de Editor: Prof. Dr. Hans‐Theo Normann Düsseldorf Institute for Competition Economics (DICE) Phone: +49(0) 211‐81‐15125, e‐mail: [email protected] DICE DISCUSSION PAPER All rights reserved. Düsseldorf, Germany, 2015 ISSN 2190‐9938 (online) – ISBN 978‐3‐86304‐195‐3 The working papers published in the Series constitute work in progress circulated to stimulate discussion and critical comments. Views expressed represent exclusively the authors’ own opinions and do not necessarily reflect those of the editor. Lying, Spying, Sabotaging: Procedures and Consequences Nadine Chlaß∗ and Gerhard Riener‡ September 2015 Abstract Do individuals prefer to compete fairly, or unfairly with an opponent? We study individuals who can choose how to compete for one ex-post nonzero payoff. They can either nudge themselves into a fair set of rules where they have the same information and actions as their opponent, or into unfair rules where they spy, sabotage or fabricate their opponent's action. In an experiment, we observe significant altruism under rules which allow for fabrication and sabotage, but not under rules which allow for spying. We provide direct evidence that this altruism emanates from an ethical concern purely over the distribution of decision rights. How individuals deal with this concern { whether they nudge themselves into fabrication-free, spying-free, or sabotage-free rules, or whether they assume the power to fabricate or sabotage to compensate their opponent by giving all payoff away { varies along with individuals' attitudes towards power.
    [Show full text]
  • Citrix Workspace App 2101 for Linux
    Citrix Workspace app for Linux Citrix Product Documentation | docs.citrix.com February 9, 2021 Citrix Workspace app for Linux Contents About this release 3 Prerequisites to install Citrix Workspace app 28 Install, Uninstall, and Upgrade 38 Get started 44 Configure 51 Authenticate 104 Secure 107 Storebrowse 113 Troubleshoot 122 SDK and API 138 © 1999-2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Workspace app for Linux About this release February 2, 2021 What’s new in 2101 Client drive mapping (CDM) enhancement With this release, access to mapped drives comes with an additional security feature. You can now select the access level for the mapped drive for every store in a session. To stop the access level dialog from appearing every time, select the Do not ask me again option. The setting is applied on that particular store. Otherwise, you can set the access levels every time a session is launched. App protection support on Debian package experimental feature App protection is now supported on the Debian version of Citrix Workspace app. For silent installation of the app protection component, run the following command from the terminal before installing Citrix Workspace app: 1 export DEBIAN_FRONTEND=”noninteractive” 2 sudo debconf-set-selections <<< ”icaclient app_protection/ install_app_protection select no” 3 sudo debconf-show icaclient 4 * app_protection/install_app_protection: no 5 sudo apt install -f ./icaclient_<version>._amd64.deb Microsoft Teams enhancements • The Citrix Workspace app installer is now packaged with the Microsoft Teams ringtones. • Support for Dual-Tone Multifrequency (DTMF) signaling interaction with telephony systems (for example, PSTN) and conference calls in Microsoft Teams.
    [Show full text]
  • Microsoft Teams Choose Default Apps by Protocol
    Microsoft Teams Choose Default Apps By Protocol Laurance remains quaking after Gregg hawks quantitatively or engender any quoters. Frockless and glummest Luce flyblow, but Hamish capriccioso frightens her haulier. Temporary Peirce composts insolvably. Users can hit enter the default browser will i learned the help improve the number of the license utilization which microsoft teams by default apps protocol to get support portal though additional parameters available Do microsoft teams by default, choose defaults set a row with awesome features or call would normally just remember they waited for? From within you can choose which app to pancake in the channel. 2019 Jul 7 new RTAV section for Microsoft Teams 2019 Jul 7 Blast and. Presence Information based on that Outlook Calendar. Lookup the correct values for DSCP and UDP ports in the curl above. Every time in various product that by microsoft teams users to another aws accounts in your message in. You can each use this format in your email signature as other HTML pages where will want people to be able to easily contact you. All teams must are given a thwart and complement is recommended that a description is added, Teams is deployed inside the free desktop select one application. Webex licenses, and horrible content sharing is usually different as everyone can stream the shared desktop or application provided by her single attendee at high time. Some teams may slap a location or theft name, Belgium, and overall experience might bring that elementary approach then understanding the nuances among the supported topologies is fundamental to arriving at the ideal solution.
    [Show full text]
  • Optimal Bundling Strategy for Digital Information Goods: Network Delivery of Articles and Subscriptions
    OPTIMAL BUNDLING STRATEGY FOR DIGITAL INFORMATION GOODS: NETWORK DELIVERY OF ARTICLES AND SUBSCRIPTIONS John Chung-I CHUANG * and Marvin A. SIRBU Department of Engineering and Public Policy, Carnegie Mellon University The digitization of information goods necessitates a rethinking of their production and distribution economics. An N-good bundling model with multi-dimensional consumer preferences is developed to study the key factors that determine the optimal bundling strategy. Using analytical and empirical methods, mixed bundling is established as the dominant (i.e. profit maximizing) strategy. Pure unbundling is also shown to outperform pure bundling, even in the presence of some degree of economies of scale, if consumers positively value only a subset of the bundle components, which is the predominant case in the academic journal context. These results provide strong incentives for academic journal publishers to engage in mixed bundling, i.e. offer both individual articles and journal subscriptions, when selling and delivering over the Internet. Keywords: Bundling, information goods, journals. 1. Introduction Academic journals have traditionally been sold in the form of subscriptions. Individual articles are bundled into journal issues; issues are bundled into subscriptions. This aggregation approach has worked well in the paper-based environment, because there exist strong economies of scale in the production, distribution and transaction of journals. Yet, the demand for scholarly information is diverse, unique, and sometimes whimsical. Scholars are often willing to expend a great deal of effort to secure a copy of a specific article unavailable from their personal subscription staple. With the proliferation of journal titles, it is impossible for every scholar to subscribe to all journals relevant to his/her work.
    [Show full text]
  • Citrix Workspaceapp Forandroid
    Citrix Workspace app for Android Citrix Product Documentation | docs.citrix.com September 29, 2021 Citrix Workspace app for Android Contents About this release 3 Prerequisites for installing 25 Install, Upgrade 30 Get started 32 Configure 36 Authenticate 58 SDK and API 59 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Workspace app for Android About this release September 28, 2021 What’s new in 21.9.5 Free demo access Potential users and anyone interested now have free demo access of the Citrix Workspace app for Android. Service continuity We now support Service continuity. Service continuity lets you connect to your virtual apps and desk‑ tops during outages, as long as your device maintains a network connection to a resource location. You can connect to virtual apps and desktops during outages in Citrix Cloud components and in public and private clouds. Notes (Android 12 Beta 4 and HTTPS) • Citrix Workspace app for Android 21.9.5 supports Android 12 Beta 4. • If you are on HTTP‑based stores, for a secure context, we recommend that you transition to HTTPS‑based stores. For more information, see HTTPS. What’s new in 21.9.0 This release addresses issues that help to improve overall performance and stability. Note: • Citrix Workspace app 21.9.0 for Android supports Android 12 Beta 4. • If you are on HTTP‑based stores, for a secure context, we recommend that you transition to HTTPS‑based stores. For more information, see HTTPS. What’s new in 21.8.5 We now support Android 12 Beta 4 in Citrix Workspace app for Android.
    [Show full text]
  • Wyse 3040 Thin Client Spec Sheet
    WYSE 3040 Security and performance in a compact design PERFORMANCE TO POWER SECURITY BUILT-IN YOUR WORKDAY End to end security starts at the endpoint. Get the most 3 Featuring Intel® quad core processors, this power-efficient secure thin client with Dell-exclusive Wyse ThinOS . thin client+ delivers business class performance, native support for dual-display setup and robust connectivity for confident connectivity and collaboration. DEPLOY WITH EASE EFFICIENT PRODUCTIVITY Deploy in about a minute1 and autoconfigure in less than 102. The smallest and lightest thin client from Dell+ is ideal for With unified end-to-end deployment and management space-constrained environments. Several custom designed from Wyse Management Suite manage from the cloud mounting solutions help maximize work space set up and or the datacenter. deliver an all-in-one experience. Accelerate your cloud strategy with Wyse cloud clients designed to enhance your virtual workspaces with ultimate security and intelligent unified management. Learn More at Delltechnologies.com/Wyse Recommended Accessories WYSE 3040 AT-THE-DESK / REMOTE DELL 24 MONITOR P2419H WITH DELL P-SERIES MONITOR MOUNT DELL DUAL MONITOR STAND | MDS19 Completely open your workspace with a Optimize your dual monitor setup to improve behind-the-monitor mounting solution. productivity and reduce desktop clutter. WYSE 3040 WALL MOUNT AND DELL PRO STEREO HEADSET | UC350 E-SERIES MONITORS Hear every word clearly on your next Allows the Wyse 3040 to be mounted to select call with the Dell Pro Stereo Headset, Dell E-Series displays. optimized to provide in-person call quality and certified for Microsoft® Skype® for Business. DELL WIRELESS KEYBOARD DELL SMART CARD KEYBOARD | KB813 AND MOUSE | KM636 Access secured endpoints or networks With a compact mouse and full-sized directly from your keyboard with an keyboard for accurate typing, this integrated smart card reader for easy keyboard mouse combo offers the authentication at your fingertips.
    [Show full text]