XenTegra - The Citrix Session

The Citrix Session: Pure PVS Provisioning for Pacesetting Public Sector Purposes!

XenTegra / Andy Whiteside / Bill Sutton Episode 167

Citrix Provisioning Services (PVS) is one of the two image management technologies available in Citrix Virtual Apps and Desktops and Citrix DaaS.  Historically PVS has been used to deliver Citrix Virtual Apps and Desktop workloads (VDA's) to servers and virtual machines from a single image over the network.  However, it can also be used without CVAD/DaaS as a standalone product, physically streaming the OS disk to an endpoint device. These endpoint devices can be “dummy terminals” with no hard drives at all, zero/thin clients, high-end compute and graphics devices, and everything in between.  This can include additional use cases for Security and locations with devices without hard drives.

 In this episode we discuss the history of PVS and some of its applicable use cases.  We also cover some technical aspects of PVS and the benefits enabled by the roll-forward and roll-back of images. 

 

Host:  Bill Sutton

Co-Host:  Geremy Myers

Co-Host:  Todd Smith

1
00:00:02.730 --> 00:00:21.679
Bill Sutton: Hello, everyone, and welcome to episode 167 of the Citrix session. I'm your host today. Bill Sutton, with Zintegra. Also with me today are 2 folks from Citrix, Jeremy Myers and Todd Smith. They're regulars on this on this podcast Todd, you want to say hello to everyone. And then following that, Jeremy.

2
00:00:22.030 --> 00:00:27.829
Todd Smith: Sure. Hey, there, Bill, hey, Jeremy, it's been a while since I've been able to join this podcast. But

3
00:00:28.390 --> 00:00:32.420
Todd Smith: looking absolutely forward to this topic. As

4
00:00:32.689 --> 00:00:36.397
Todd Smith: as you know, I'm a former ardents se, and

5
00:00:37.150 --> 00:00:40.189
Todd Smith: Pbs is always going to hold a special place in my heart.

6
00:00:40.340 --> 00:00:41.100
Todd Smith: Yep.

7
00:00:41.500 --> 00:00:42.070
Bill Sutton: Understood.

8
00:00:42.460 --> 00:00:49.510
Geremy Meyers: Oh, you know, when we 1st talked about this Todd, it did not occur to me that you were a Pbs. Og.

9
00:00:49.910 --> 00:00:55.080
Geremy Meyers: And now it's all making sense. Is it too late to switch? You know what? It's too late? I guess we're gonna roll with this one.

10
00:00:55.080 --> 00:00:56.779
Bill Sutton: We're stuck with it, Jeremy. So

11
00:00:57.410 --> 00:01:04.032
Bill Sutton: it's all good. It's all good. Yeah. The the title of the blog we're we're going to be discussing is pure Pvs. Provisioning

12
00:01:04.430 --> 00:01:15.770
Bill Sutton: for pace, setting public sector purposes. That's a lot of the letter P, so, nevertheless, pure Pvs. Provisioning for pace, setting public sector purposes by Jill and Shane Smith.

13
00:01:16.130 --> 00:01:28.870
Bill Sutton: So that's the article that we're that we're going to be talking about. It's pretty short, but I'm sure we'll have a good a good conversation among the 3 of us here. What Jeremy Myers was alluding to is the

14
00:01:28.960 --> 00:01:35.640
Bill Sutton: technology provisioning services that is part of the Citrix stack these days. Or has been for a while, was

15
00:01:36.280 --> 00:01:41.920
Bill Sutton: was created or obtained through an acquisition a number of years ago, from a company

16
00:01:41.970 --> 00:02:01.320
Bill Sutton: in Massachusetts called Ardents and Our. The illustrious Todd Smith on this call was a part of that. I I remember this. You know. Remember this from way back because I was flown up. I was with another partner at the time, and I was flown up to Massachusetts to learn this technology. And I think, Todd, you were one of the instructors. Is that.

17
00:02:01.320 --> 00:02:08.771
Todd Smith: I I was. I remember that day, and then and soon afterwards my sales rep, and I went down, and we did a

18
00:02:09.270 --> 00:02:14.129
Todd Smith: tour of Virginia with with Bill and his other.

19
00:02:14.250 --> 00:02:15.720
Todd Smith: his prior employer.

20
00:02:15.720 --> 00:02:16.060
Bill Sutton: Right.

21
00:02:17.020 --> 00:02:20.920
Todd Smith: yeah, I look back at it and think, you know, 18 years ago

22
00:02:21.140 --> 00:02:23.890
Todd Smith: I got a phone call from a former

23
00:02:24.240 --> 00:02:27.719
Todd Smith: manager, mentor, and friend that said, Hey?

24
00:02:28.090 --> 00:02:30.199
Todd Smith: And he said in his best

25
00:02:30.840 --> 00:02:31.960
Todd Smith: Texas

26
00:02:31.980 --> 00:02:34.130
Todd Smith: twang, he said, Hey, Tanny.

27
00:02:34.430 --> 00:02:37.799
Todd Smith: I got a job opportunity for you. Why don't you come over and have dinner with me.

28
00:02:38.210 --> 00:02:42.440
Todd Smith: and he was at. He happened to be up in Massachusetts, and I said, Sure, Ru.

29
00:02:42.570 --> 00:02:43.160
Todd Smith: we'll

30
00:02:44.320 --> 00:02:53.939
Todd Smith: got a chance to see some of the technology and see how it could solve a lot of problems. You remember, back in the day you used to have to ghost machines.

31
00:02:53.940 --> 00:02:54.550
Bill Sutton: Oh, yeah.

32
00:02:54.550 --> 00:03:03.310
Todd Smith: And do manual. CD, ROM. Based installs of operating systems. And in some cases you have to also do like diskette installs

33
00:03:03.450 --> 00:03:04.135
Todd Smith: of

34
00:03:05.520 --> 00:03:10.677
Todd Smith: you know everything from windows 3, 5, 1, and windows 4 all the way up to

35
00:03:11.520 --> 00:03:15.671
Todd Smith: windows. Server, you know, early 2,000 versions.

36
00:03:16.450 --> 00:03:24.129
Todd Smith: but great technology. And you know, I think the this blog and we'll get into it. It's really kind of it's to the

37
00:03:24.510 --> 00:03:36.330
Todd Smith: the root and the foundation of what provisioning services can do. And it's also kind of a mistaken or or under appreciated use case that we can certainly talk about.

38
00:03:36.910 --> 00:03:39.620
Geremy Meyers: Hey? Real quick fun. Fact, Todd. How many floppies

39
00:03:39.750 --> 00:03:42.680
Geremy Meyers: did it take to stand up windows nt. 3.1.

40
00:03:43.880 --> 00:03:47.390
Todd Smith: They sent like a hundred 20 of them in a box, and.

41
00:03:47.390 --> 00:03:48.300
Geremy Meyers: The.

42
00:03:48.300 --> 00:03:50.729
Todd Smith: Ironic thing is is that you had

43
00:03:50.740 --> 00:04:00.049
Todd Smith: there. There was a timeout that occurred, so you have to pretty much have them in order when you're flopping, when you're doing the the the disk shuffle.

44
00:04:00.440 --> 00:04:03.060
Todd Smith: And then they came out with portable

45
00:04:03.540 --> 00:04:06.709
Todd Smith: CD-ROM drives that you could plug in

46
00:04:07.420 --> 00:04:09.659
Todd Smith: it didn't give you any much more

47
00:04:10.160 --> 00:04:13.239
Todd Smith: help. But it eliminated having to do the Diskette Shuffles.

48
00:04:13.800 --> 00:04:21.359
Geremy Meyers: So nt 3 dot one came out in 1,993. I'm gonna date everyone here, and I'm gonna say, that was the year

49
00:04:21.570 --> 00:04:30.449
Geremy Meyers: that I graduated know that I started high school. That was my 10th grade year. There we go, 31 years ago. So there we go. 22 floppies.

50
00:04:30.760 --> 00:04:32.670
Geremy Meyers: 22, 3, and a

51
00:04:32.950 --> 00:04:34.410
Geremy Meyers: what do we call them? Back? Then? 3.

52
00:04:34.410 --> 00:04:37.689
Bill Sutton: Quarter and a quarter 1.4, Meg, the little plastic ones.

53
00:04:37.690 --> 00:04:56.089
Geremy Meyers: The little plastic ones. Yeah, yeah. Hope they all worked. Hope they all work. So listen, you know what's interesting about Ardens? Much like Citrix, and the fact that if you go under the hood you go into the registry, you start looking at files. You can see just remnants of old Citrix technologies that have gone away, but still stick around. Dazzle

54
00:04:56.180 --> 00:04:58.580
Geremy Meyers: is the one that we like to talk about, because

55
00:04:58.810 --> 00:05:00.740
Geremy Meyers: such a fun name and.

56
00:05:00.740 --> 00:05:03.069
Bill Sutton: Wf ica dot sis.

57
00:05:03.330 --> 00:05:08.969
Geremy Meyers: Oh, yeah, yeah. And the boot file Pvs is still to this day. What is it? Todd.

58
00:05:09.400 --> 00:05:12.870
Todd Smith: A, RDBP. 32

59
00:05:13.110 --> 00:05:13.720
Todd Smith: dot Ben.

60
00:05:13.720 --> 00:05:14.560
Bill Sutton: And.

61
00:05:14.560 --> 00:05:19.220
Geremy Meyers: Yeah. And that's right. So it's still that orange. 32 boot file. That's wild.

62
00:05:19.800 --> 00:05:31.200
Bill Sutton: So this trip down Memory Lane is making me smile, of course, but for those on the call who have no reference point to this. Let's talk a little bit about what the what ardent slash provisioning services

63
00:05:31.636 --> 00:05:42.409
Bill Sutton: can do. And I'll start by reading the 1st sentence of the blog that we're covering, which is, did you know you can stream a desktop to an endpoint using Pvs alone?

64
00:05:42.776 --> 00:06:01.450
Bill Sutton: The answer. That's yes. Obviously so well, it may not be. Yes, in the sense that the reader knows that. But it is a true statement that you can do this, Todd. You want to talk a little bit about, like the foundations of Pbs and ardents, what it actually did, and kind of a general general idea of how it worked.

65
00:06:01.660 --> 00:06:09.020
Todd Smith: Sure. So so this all started. This all started with one of our Us. National laboratories.

66
00:06:09.361 --> 00:06:14.029
Todd Smith: had a problem where they needed to get rid of local hard drives on endpoint

67
00:06:14.320 --> 00:06:16.409
Todd Smith: devices right? So

68
00:06:16.889 --> 00:06:28.040
Todd Smith: they did everything from looking at, you know, pluggable drives and having the drives taken out every once in a while. And they, they needed a way to basically boot

69
00:06:28.050 --> 00:06:43.569
Todd Smith: the machine without having the risk of a local hard drive that can be either corrupted, stolen, or whatever but needed to be updated. So provisioning service was really built out of that that specific use case of How do I boot something off of a network.

70
00:06:43.620 --> 00:06:45.150
Todd Smith: right? So

71
00:06:45.190 --> 00:06:55.300
Todd Smith: leveraging a tool that's built into the into every chipset called pxe, which is a pre executed environment. Basically, what you can do

72
00:06:55.470 --> 00:06:56.600
Todd Smith: is

73
00:06:56.830 --> 00:07:02.130
Todd Smith: instead of pointing to a local hard drive, you actually point to a network location.

74
00:07:03.890 --> 00:07:05.870
Todd Smith: that holds the disc

75
00:07:06.090 --> 00:07:07.120
Todd Smith: content

76
00:07:07.620 --> 00:07:10.510
Todd Smith: and then drops it down over the network connection

77
00:07:10.670 --> 00:07:13.609
Todd Smith: as needed. Right? So it long it loads the

78
00:07:13.760 --> 00:07:15.770
Todd Smith: the network driver loads

79
00:07:15.790 --> 00:07:20.769
Todd Smith: the connector out to the boot sequence, and every time the operating system goes to read from the disk.

80
00:07:20.940 --> 00:07:25.509
Todd Smith: instead of reading from a local drive, it actually goes out to this network location.

81
00:07:26.080 --> 00:07:28.869
Todd Smith: Very simple way to to describe it.

82
00:07:28.970 --> 00:07:31.420
Todd Smith: but it's very effective and very efficient

83
00:07:31.590 --> 00:07:34.189
Todd Smith: reason for that is because

84
00:07:34.300 --> 00:07:37.259
Todd Smith: it leverages a lot of

85
00:07:37.410 --> 00:07:42.329
Todd Smith: the way the operating system would normally read from the disk drive

86
00:07:42.800 --> 00:07:45.500
Todd Smith: locally right. It reads a block at a time.

87
00:07:45.500 --> 00:07:46.190
Geremy Meyers: And.

88
00:07:46.190 --> 00:07:47.120
Todd Smith: And

89
00:07:47.290 --> 00:07:53.529
Todd Smith: loads that into memory as needed. And then, when it's not needed anymore, it pulls it out of memory and goes, gets the next

90
00:07:54.606 --> 00:07:56.139
Todd Smith: block. So

91
00:07:56.310 --> 00:08:06.109
Todd Smith: very efficient, very, it really works well over over a local, near local area network, oftentimes works well in a data center environment.

92
00:08:06.840 --> 00:08:21.290
Todd Smith: So it can be used for that. That same technology can be used for both desktop operating systems, such as the windows, 11 windows, Xp windows, vista but it can also be used on server based operating systems.

93
00:08:22.600 --> 00:08:32.030
Bill Sutton: Yeah. And that was one of the key reasons that Citrix acquired it. Right, the the ability, because, historically, if you go back to the to. When what was it? 2,000

94
00:08:32.130 --> 00:08:33.130
Bill Sutton: 6.

95
00:08:33.559 --> 00:08:36.919
Todd Smith: So, so Citrix acquired Ardens in 2,008.

96
00:08:36.919 --> 00:08:37.879
Bill Sutton: Hey? Okay.

97
00:08:38.399 --> 00:08:49.434
Bill Sutton: okay, yeah, it was. Looks like it was announced. The agreement was announced, and according to Wikipedia, was the. It was announced in December of 6, but I think it took a little while for them to get everything done.

98
00:08:50.219 --> 00:09:03.249
Bill Sutton: But back in those in those back in those days in the 2,007, 2,008, if you wanted to. If you had a large PA large what was then called probably what presentation server maybe might have been called Zen. I I don't know.

99
00:09:04.560 --> 00:09:08.109
Todd Smith: Yes, so so a lot of the lot of the reason for this was

100
00:09:08.640 --> 00:09:14.080
Todd Smith: we had a lot of customers Citrix had a lot of customers that were running into

101
00:09:14.986 --> 00:09:20.080
Todd Smith: consistency problems across their server farms. Right? And

102
00:09:20.230 --> 00:09:34.089
Todd Smith: a server, you know, if you had 4 servers in your farm, the likelihood of all 4 servers being identical in terms of drivers, workloads, applications being installed, configuration settings, and things like that.

103
00:09:34.230 --> 00:09:43.870
Todd Smith: they could be all different, and that created a lot of havoc when you started doing things like application load balancing because you expected the servers

104
00:09:44.250 --> 00:09:53.810
Todd Smith: to be at the same level right? And that not only caused problems from an operational perspective, but it also caused a lot of problems from

105
00:09:53.870 --> 00:10:02.710
Todd Smith: a audit perspective, an audit and compliance perspective. And you got to remember that this is right around the same time that Sarbanes Oxley

106
00:10:02.850 --> 00:10:13.509
Todd Smith: and Section 402 came out where you needed to make sure one of your controls was that you have consistency across your application stack and your hardware stack and things like that.

107
00:10:13.570 --> 00:10:32.820
Todd Smith: So it was really kind of the perfect storm being able to say, we need the technology because we've got requirements that are that are forcing us to go this direction. And then we also have a technology that can actually help improve off, improve the operational aspect of it, and make it easier on administrators.

108
00:10:34.090 --> 00:10:51.500
Bill Sutton: Yeah, I mean, I can remember at at this in this time. Time. Frame around 6 or O 7 in particular. We had a couple of large healthcare customers that had pretty significant presentation server farms, I mean hundreds of physical servers. This was before virtualization had started to really take off

109
00:10:51.870 --> 00:11:19.049
Bill Sutton: or right around the time it was gonna take off, and they would use either something like ghost. There was a product called Plate Spin, where you could you could build out a DVD. Or a CD. And just pop it into each one of the servers, turn it on, and it would immediately load an an image you had created, and generalize it and make it available. The problem with with that was once you'd done 100 servers with plate spin and had them already, and and allowed users to get on them.

110
00:11:19.070 --> 00:11:29.800
Bill Sutton: They were immediately going to start drifting like Todd said they wouldn't be consistent and with the ardent slash provisioning server product, you have the ability to create a single image

111
00:11:29.800 --> 00:11:52.760
Bill Sutton: and then stream that over the network to RAM, if you will across the network to these devices. And then, if you needed like, Todd was saying, if you needed to stand up 10 new servers, you literally just added the objects in the provisioning services. Console set the servers to boot off the appropriate bootloader file, turn them on, and they would all boot up, and have the exact same image

112
00:11:52.800 --> 00:12:01.800
Bill Sutton: that the rest of the servers did when they booted. So it was a pretty. It was a pretty significant advance in delivering consistent workloads to your

113
00:12:01.800 --> 00:12:23.140
Bill Sutton: your your Zen app or your presentation servers and app Cbad users, because you could create a single image and deliver it to many servers, and obviously, once virtualization came along, we could do this on something like Zen server or vmware. It obviously made it even better, because you no longer had to worry about the same exact hardware being in all of your physical devices.

114
00:12:23.870 --> 00:12:32.120
Geremy Meyers: Actually, you bring up a really good point, Bill. So when Citrix acquired this technology like we weren't talking about virtual machines, we were talking about

115
00:12:32.150 --> 00:12:33.990
Geremy Meyers: physical servers. In fact.

116
00:12:34.170 --> 00:12:57.205
Geremy Meyers: you know we did a we did a synergy, probably that year of the acquisition. So 2,008, 2,009, maybe, where you know, the used case on stage was, you know, we had an Ardens farm. We had a provisioning server farm, and we were streaming the OS. To some pizza boxes, so some rack Mount Servers running, probably web servers. I can't remember. I don't think it was sequel that wouldn't have made sense. But either way, in the in the

117
00:12:57.560 --> 00:13:05.179
Geremy Meyers: the demo was, Watch this. I'm going to start yanking the hard drives out of these servers just to prove the point that we weren't using the hard drives

118
00:13:05.480 --> 00:13:08.520
Geremy Meyers: right on the servers, which were, which was kind of interesting. But

119
00:13:08.660 --> 00:13:13.130
Geremy Meyers: one of the use cases. I haven't seen this in a while, which is what I love about this blog post is

120
00:13:13.586 --> 00:13:28.090
Geremy Meyers: you know, typically. And we've got some very large deployments. Like thousands of users where we're using Pvs to stream the OS to virtual machines. But this use case that I haven't seen in a while, which is awesome. In fact, you know, I've got a handful of

121
00:13:30.100 --> 00:13:45.400
Geremy Meyers: customers of different types that are spinning and streaming the OS to a physical endpoint. Yeah, going back to what Todd said. You know this is a security play here. The idea that there is no, you know, physical disk on an endpoint that I need to be concerned about. I am just streaming the OS.

122
00:13:45.920 --> 00:13:48.170
Geremy Meyers: And when I turn it off there's nothing left behind.

123
00:13:48.170 --> 00:14:02.520
Bill Sutton: Exactly. Somebody somebody steals that device, or, you know, gets in the gets in the building and starts running off with them. There's no data on them. Yeah, you'd lose the device. But there's no data on them, because it's all stored back on back in the data center, on the master image.

124
00:14:04.490 --> 00:14:10.589
Todd Smith: Yeah. And and I think there's there's a couple of really key use cases for this delivering a

125
00:14:11.240 --> 00:14:20.209
Todd Smith: leveraging Pvs to to deliver to an endpoint. 1st was a secure endpoint where you didn't have to have anything locally installed.

126
00:14:20.520 --> 00:14:22.120
Todd Smith: as far as hardware goes.

127
00:14:23.200 --> 00:14:27.579
Todd Smith: you you literally had a network card that was connected to.

128
00:14:27.970 --> 00:14:29.740
Todd Smith: you know, some type of

129
00:14:29.810 --> 00:14:34.471
Todd Smith: that PC that was rendered a a thin client because of this.

130
00:14:34.870 --> 00:14:39.929
Todd Smith: so we had secure environments. But we also had education and healthcare

131
00:14:40.010 --> 00:14:48.359
Todd Smith: in that mix as well, because education, especially because oftentimes those computers in the labs were constantly being rebooted.

132
00:14:48.420 --> 00:14:53.639
Todd Smith: or you'd have to have a lab specific for a math class or a

133
00:14:53.820 --> 00:14:56.130
Todd Smith: science class. In

134
00:14:56.490 --> 00:15:01.749
Todd Smith: with this you could actually consolidate and basically have different images or different workloads

135
00:15:01.880 --> 00:15:04.669
Todd Smith: that could be streamed down based on a reboot

136
00:15:05.607 --> 00:15:09.059
Todd Smith: and then the other big big use case was around call centers

137
00:15:09.620 --> 00:15:16.510
Todd Smith: where you had to have consistency across all of the different devices, and you needed to be able to have that quick turnover time.

138
00:15:16.850 --> 00:15:20.020
Todd Smith: You didn't have to go and reimage or re ghost a machine

139
00:15:20.080 --> 00:15:23.299
Todd Smith: to be able to do that effectively and efficiently.

140
00:15:24.440 --> 00:15:29.641
Bill Sutton: Yeah, we we had a I won't say what state but a I had a customer

141
00:15:30.170 --> 00:15:43.069
Bill Sutton: many years ago, not long after this technology came out. It was a dmv, a division of motor vehicles, the Motor vehicles department, a place we loved all love to go every once every 10 years, or whatever

142
00:15:43.470 --> 00:16:01.790
Bill Sutton: we had a used case. We know they had the the state we were in had had these spread all over the state, of course. So the customer decided to put a provisioning server in each one of the branches and then make all of the teller or the kiosk, the machines at the front desk, as well as some of the back machines, all

143
00:16:02.030 --> 00:16:30.230
Bill Sutton: all boot off the same image. That way. Everybody had the same thing to access the same way. And and they would update the images across the network off the wide area network. It was a really good use case for it, and they used it for a number of years. I don't think they still are. They might be in some places, but they used it for a great number of years, and it was a huge advantage to them to be able to centralize the management of the images. There was a problem that the user just rebooted and that meant something.

144
00:16:30.519 --> 00:16:46.390
Bill Sutton: Cause. Literally, it would go back to a known good functional state, and then they could manage the delivery of updates overnight or during a maintenance window. You know, if there was a problem, they literally just flip it back from one image to another, and they write back to a known good state very quickly, so definitely

145
00:16:46.900 --> 00:17:09.590
Bill Sutton: a a huge advantage for for the division of motor vehicles. What I think a lot of folks don't realize. And part of why we wanted to do this blog is that if you're a licensed and I'm keep me honest, guys, if you've got licenses for you know the universal license or the universal hybrid multi cloud license. You have licenses for Pvs. You can leverage them

146
00:17:09.589 --> 00:17:23.890
Bill Sutton: for your Zen app environment. And what this blog is essentially saying is that, Kate. They can also be used as a standalone product to stream to a physical OS or a thin client, which is really what we're focusing on here. So, Jeremy, keep me honest. Here. Is that still the case?

147
00:17:24.300 --> 00:17:25.444
Geremy Meyers: So yes, and no

148
00:17:25.730 --> 00:17:26.180
Bill Sutton: Okay.

149
00:17:26.850 --> 00:17:28.190
Geremy Meyers: Every addition

150
00:17:28.210 --> 00:17:37.810
Geremy Meyers: of the Citrix licensing now includes Pbs, so whether it's the private cloud, whether it's the universal hybrid multi-cloud, or whether it's the Citrix platform license. So you're included.

151
00:17:38.321 --> 00:17:51.440
Geremy Meyers: You know, Pbs is included across the board. Now, what is only a part of the platform license is the ability to stream to a physical endpoint or and here's the other thing we haven't talked about yet. So this technology has also been ported

152
00:17:51.480 --> 00:18:07.139
Geremy Meyers: into the cloud. So if you're running in Azure or Gcp, you can also stand up and run Pbs, and either of those infrastructure platforms. So again, those 3 features azure Gcp. Or even the physical endpoints requires the platform license, however.

153
00:18:07.768 --> 00:18:09.909
Geremy Meyers: All 3 versions do include.

154
00:18:10.110 --> 00:18:12.610
Geremy Meyers: you know, Pbs, for your virtual desktops.

155
00:18:13.230 --> 00:18:13.950
Bill Sutton: Okay.

156
00:18:14.520 --> 00:18:36.099
Geremy Meyers: Yep. But but listen, you hit on something. I think. We kind of forget. It's all almost the secret sauce behind. Pbs. It's the versioning the idea that I mean listen, I, who I can't remember if Todd mentioned it earlier. But ghosting holy smokes, how long did that take to like reimage like a laptop in the past. I mean, that was, I build the image. I push it out. I mean, that could take

157
00:18:36.630 --> 00:18:37.970
Geremy Meyers: easily an hour

158
00:18:38.010 --> 00:18:46.349
Geremy Meyers: unless I, you know, had it down to a science right? But the idea here is, you know, I could create a there's a pretty amazing versioning system within Pbs to where.

159
00:18:46.360 --> 00:18:57.320
Geremy Meyers: you know, I've got my production version of a disk that I'm using across all these endpoints at the same time that I have created a snapshot of that guy. And I'm making changes to what I'm considering a version 2, if you will.

160
00:18:57.680 --> 00:19:02.930
Geremy Meyers: And I'm testing that out. Maybe that's my test. Dev. It's really easy for me to flip and say, Hey, start using this new one.

161
00:19:03.530 --> 00:19:21.549
Geremy Meyers: And if, for whatever reason this is just happens, you think Patch, Tuesday. Think crowd strike Tuesday, Tuesday for that, maybe. But you know you got a scenario where you can roll back to either a previous version or known good state like you mentioned, you know, I think that's the that's really the secret sauce cause. It's it's instant, in fact.

162
00:19:21.590 --> 00:19:26.510
Geremy Meyers: one of the other really slick Demos that we used to do outside of the ones we did on stage was.

163
00:19:27.238 --> 00:19:34.040
Geremy Meyers: You know, there would be granted, this is Windows Xp, so this is kind of dates a little bit. But you know we had a room full of what 100 150

164
00:19:34.730 --> 00:19:36.040
Geremy Meyers: windows. Xp.

165
00:19:36.367 --> 00:19:41.759
Geremy Meyers: Of course all you could see was the screens, but you know running windows Xp and we rebooted into. I want to say it was Linux.

166
00:19:42.100 --> 00:19:45.009
Geremy Meyers: and then we rebooted back into windows. Xp, so I think

167
00:19:45.250 --> 00:19:47.779
Geremy Meyers: the video is probably floating around on the interweb somewhere.

168
00:19:47.780 --> 00:19:55.720
Bill Sutton: If you I actually already looked it up while because I was thinking about that. Yeah, it's it's done to the to to the tune of Sweet Georgia Brown. And if you

169
00:19:56.150 --> 00:19:59.090
Bill Sutton: ardents video you will find it on Youtube.

170
00:19:59.480 --> 00:20:12.570
Todd Smith: Yes, so so a little history behind a little quick story on that one that was 255 machines booting simultaneously, because we wanted to be able to show that you could do an entire class C subnet

171
00:20:13.478 --> 00:20:20.170
Todd Smith: booting them up. And you started with basically booting up the machine into a windows, Xp.

172
00:20:20.510 --> 00:20:25.670
Todd Smith: upgrading them to a windows 7 or windows vista at the time.

173
00:20:25.830 --> 00:20:29.120
Todd Smith: and then be able to flip them over to

174
00:20:29.160 --> 00:20:31.730
Todd Smith: a portion of them went over to

175
00:20:31.950 --> 00:20:32.770
Todd Smith: a

176
00:20:32.900 --> 00:20:49.438
Todd Smith: windows, 7 or windows, 8 environment and a portion of them went over to a red hat Linux distribution, and then we also were able to boot up SQL. Servers and exchange server and a couple of Iis servers, just to kind of round out the demo

177
00:20:50.310 --> 00:20:52.959
Todd Smith: and that was done really

178
00:20:53.260 --> 00:20:57.278
Todd Smith: by one of our interns who who took advantage of

179
00:20:57.880 --> 00:21:00.040
Todd Smith: of that video.

180
00:21:00.240 --> 00:21:03.709
Todd Smith: replaced a 50 page paper that he was supposed to write

181
00:21:03.720 --> 00:21:05.590
Todd Smith: to get credit for his internship.

182
00:21:05.590 --> 00:21:07.239
Bill Sutton: So that's true. Huh?

183
00:21:08.690 --> 00:21:14.329
Bill Sutton: That's actually I'd heard that story. I just I I wondered if that was truth or legend. So.

184
00:21:14.330 --> 00:21:16.824
Todd Smith: Truth, we we built that lab

185
00:21:17.350 --> 00:21:18.982
Todd Smith: and it was interesting.

186
00:21:20.010 --> 00:21:21.380
Todd Smith: that was kind of what

187
00:21:21.510 --> 00:21:23.846
Todd Smith: what got us sold the citrix? Yeah.

188
00:21:24.180 --> 00:21:24.500
Bill Sutton: Yeah.

189
00:21:24.500 --> 00:21:29.720
Todd Smith: Because I think Mark Templeton and Chris Fleck and a couple of other folks saw the saw the future

190
00:21:29.810 --> 00:21:35.690
Todd Smith: in some of that technology in like we said earlier, that was originally

191
00:21:36.530 --> 00:21:42.719
Todd Smith: used to do what's what was called the jump program, which was the just upgrade me, please

192
00:21:42.880 --> 00:21:44.830
Todd Smith: program, which was a

193
00:21:45.030 --> 00:21:53.869
Todd Smith: how do we get off of presentation server and up to 4, 5, and eventually, up to what's now referred to as an app

194
00:21:54.110 --> 00:21:54.890
Todd Smith: right.

195
00:21:56.440 --> 00:22:00.549
Geremy Meyers: I love that. You guys did this for a class CI mean, that's so, nerdy. It's fantastic.

196
00:22:00.550 --> 00:22:23.752
Bill Sutton: Yeah. Yeah. Just again, Google, just Google ardents A, RDEN, CE, video, and you'll find the. It'll be the first.st It should be the 1st hit. There ardents 4 dot one demo. Just play that, and that if if nothing, if if the listener gets nothing out of this article other than go look at that video. You will have a good understanding of what you can do with. With pbs,

197
00:22:24.050 --> 00:22:24.790
Todd Smith: So that's.

198
00:22:24.790 --> 00:22:27.029
Bill Sutton: What's in that video can still be done today.

199
00:22:27.210 --> 00:22:32.769
Todd Smith: Yes. So so, Bill, I I think one of the things also in that video that you'll be able to see

200
00:22:32.810 --> 00:22:42.029
Todd Smith: is it breaks up and creates a giant wall that be basically becomes the ardent logo. Yeah. And the way we did that

201
00:22:42.130 --> 00:22:50.490
Todd Smith: is very critical to what sets us apart, what sets provisioning services apart from the other technologies like ghosting.

202
00:22:50.970 --> 00:22:55.199
Todd Smith: Ghosting at. If you remember ghosting required you to do a Cis prep.

203
00:22:55.230 --> 00:22:57.340
Todd Smith: After you've done the ghost

204
00:22:57.350 --> 00:23:10.060
Todd Smith: which then joins the machine into the domain gives it all its unique ids, and it sets the guid it sets all of the parameters that are yet now unique to that machine itself.

205
00:23:10.980 --> 00:23:20.490
Todd Smith: We actually included that in our streaming service, right? So built into the streaming service, was what we refer to as personality which could be machine name.

206
00:23:20.530 --> 00:23:29.829
Todd Smith: It could be any Mac address or client name information that we needed to put in there. So think of it from a from all of those.

207
00:23:30.360 --> 00:23:33.769
Todd Smith: all of the applications that require that information

208
00:23:34.640 --> 00:23:47.960
Todd Smith: to be present for the machine to register properly into the domain, and to get connected, and do all of those those admin type of functions. We were doing that as part of the stream. So we eliminated a major

209
00:23:49.060 --> 00:23:49.960
Todd Smith: time.

210
00:23:50.950 --> 00:23:53.370
Todd Smith: time capture or or

211
00:23:54.100 --> 00:23:59.110
Todd Smith: times time hog that would actually be able to do that. So

212
00:23:59.120 --> 00:24:10.170
Todd Smith: so, having that ability built into it was absolutely critical for us to be successful in streaming the operating systems, whether it be on a desktop OS. Or a server based OS.

213
00:24:11.770 --> 00:24:22.085
Bill Sutton: Yeah, that was, I remember when we were learning the technology, we we all of us were like, Well, how are you gonna how's this gonna work with a domain where you've got all these machines, and they all have this. If you're booting up to say 10,

214
00:24:22.350 --> 00:24:49.800
Bill Sutton: aren't they all? Gonna if they're coming off a single image, aren't they all gonna have the same name and the same Mac address? And and I remember saying, No of you guys saying, No, that's not the way it works. We built the intelligence into it to to name the machine the name that you gave it in the console. And then there's some magic that that happens with the machine account password between the provisioning server and the domain controller. There's lots of back end communication that handled the joining of the domain. And all those things so truly, once you've

215
00:24:49.910 --> 00:24:57.940
Bill Sutton: once you've built out your image and set those parameters in the console, it just goes off and streams them down to the Vm. Or the endpoint.

216
00:24:57.970 --> 00:25:03.550
Bill Sutton: and all the domain challenges that we would expect in doing that without Sysprep are gone

217
00:25:06.760 --> 00:25:20.399
Bill Sutton: alright. So it looks like we've covered the article pretty well. I I just want to give you guys a chance to make any additional comments or any other clarity that we didn't maybe didn't quite cover Todd. Anything you want to. You want to cover here before we

218
00:25:20.490 --> 00:25:22.210
Bill Sutton: round it round this out.

219
00:25:22.840 --> 00:25:31.189
Todd Smith: Yeah. So so one other thing that provisioning services keeps getting compared to is machine creation services which are very similar image management

220
00:25:31.630 --> 00:25:33.750
Todd Smith: capabilities that Citrix has.

221
00:25:33.850 --> 00:25:40.209
Todd Smith: and customers are entitled to use. Either they're entitled to use both Mcs and Pbs.

222
00:25:40.530 --> 00:25:46.649
Todd Smith: One of the big things that we've now released is the ability to manage

223
00:25:47.710 --> 00:25:48.630
Todd Smith: Pvs

224
00:25:49.030 --> 00:25:53.600
Todd Smith: images within the Mcs consoles and the Mcs management.

225
00:25:53.600 --> 00:25:55.499
Bill Sutton: Oh, yeah, that's relatively new, isn't it?

226
00:25:55.500 --> 00:26:04.180
Todd Smith: It. It's very new. It's 1 of the newer releases capabilities. That's out. The and the benefit there is.

227
00:26:04.470 --> 00:26:10.669
Todd Smith: We understand that that Mcs may have a use case and Pvs. As a use case as well.

228
00:26:11.320 --> 00:26:19.180
Todd Smith: It used to be a choice that you would have to make early on in your design, your infrastructure design of your deployment. Now

229
00:26:19.220 --> 00:26:21.620
Todd Smith: you're going to be able to use both in there

230
00:26:21.880 --> 00:26:27.550
Todd Smith: and the other capabilities you'll hear. An awful lot is image portability

231
00:26:27.820 --> 00:26:32.249
Todd Smith: which is being able to take that those images and migrate them up to

232
00:26:32.470 --> 00:26:45.320
Todd Smith: azure or Gcp or other infrastructure components. Right? So there's a there's a huge benefit there. And this is something that has taken a little while to to kind of pull together.

233
00:26:45.350 --> 00:26:47.119
Todd Smith: But thanks to

234
00:26:47.310 --> 00:26:51.730
Todd Smith: our product management team kind of rethinking the way.

235
00:26:52.232 --> 00:26:54.907
Todd Smith: Some of these things can be done.

236
00:26:55.930 --> 00:27:08.739
Todd Smith: you know, in looking at it from an administrator's perspective and an architect's perspective, how to be able to make it more efficient and optimize that experience for not only the user but also for the administrative team.

237
00:27:10.020 --> 00:27:11.060
Bill Sutton: Absolutely

238
00:27:11.520 --> 00:27:13.789
Bill Sutton: Jeremy any other final thoughts.

239
00:27:14.350 --> 00:27:19.679
Geremy Meyers: No, no! Todd stole my thunder. I was thinking through how the integration points in the studio.

240
00:27:20.068 --> 00:27:24.719
Geremy Meyers: You know, starting to happen just to make it easier to manage. Also being able to use

241
00:27:24.870 --> 00:27:30.690
Geremy Meyers: studio as well to create the target devices right? So there's always been a separate console for Pbs, and

242
00:27:30.940 --> 00:27:40.510
Geremy Meyers: a lot of this is making it almost invisible, like there's still a streaming service, and there's those sorts of things. But listen! At the end of the day. It's you know. How easy can you make this to manage?

243
00:27:40.520 --> 00:27:47.699
Geremy Meyers: Yeah. You know. Given that you get 2 different approaches to image management like Todd, said Mcs. And and Pv. Pvs.

244
00:27:48.350 --> 00:28:16.471
Bill Sutton: Exactly. Yeah. So one thing I should point out, the art for the listeners is, if you read this article, you'll see it. It's very heavily mentions public sector workloads which are absolutely critical to use this type of technology, but it it is available to and works perfectly in commercial organizations. We have customers, integra have customers that are using Pds today to stream to stream the the vdas or the the workloads that users connect to. So it's

245
00:28:16.810 --> 00:28:32.490
Bill Sutton: 100% relevant to the commercial sector as well as the public sector, and certainly bears a look if you're not using it, or or you have a large environment that could benefit from it. The blog article does reference a tech brief that goes into more detail. So I encourage listeners to to head to that.

246
00:28:33.880 --> 00:28:40.170
Bill Sutton: Alright. So anything else, folks, Jeremy Todd, you guys have anything fun, any final final thoughts.

247
00:28:41.150 --> 00:28:43.650
Geremy Meyers: Yeah, it's good. It's good to see. Todd haven't seen.

248
00:28:43.650 --> 00:28:44.150
Bill Sutton: It is good.

249
00:28:44.150 --> 00:28:44.780
Geremy Meyers: So.

250
00:28:44.780 --> 00:28:45.270
Bill Sutton: Yeah.

251
00:28:45.270 --> 00:28:46.120
Geremy Meyers: Thanks for hopping on time.

252
00:28:46.120 --> 00:28:56.209
Todd Smith: It has been, and and you know, and I think the I think you brought us up, Bill, is that, you know, instead of saying, it's it's only applicable towards public sector accounts.

253
00:28:56.210 --> 00:28:56.680
Bill Sutton: Right. It's.

254
00:28:56.680 --> 00:29:00.930
Todd Smith: Really anyone who has a higher level of security requirement out there.

255
00:29:00.930 --> 00:29:01.400
Bill Sutton: True.

256
00:29:01.782 --> 00:29:09.819
Todd Smith: Or that we need the speed and efficiency and the protection of not having local hardware. I mean, this fits in

257
00:29:09.860 --> 00:29:19.499
Todd Smith: local hardware devices, such as you know, hard drives and the ability to lock down those endpoints. So really, you know, if you're looking at thin client as a

258
00:29:19.670 --> 00:29:22.380
Todd Smith: as an option. This is a great.

259
00:29:22.380 --> 00:29:22.960
Bill Sutton: Nothing.

260
00:29:22.960 --> 00:29:26.199
Todd Smith: Complementary technology towards a thin client. Approach.

261
00:29:27.540 --> 00:29:30.890
Bill Sutton: Yeah, we had a client at 1 point that streamed

262
00:29:31.240 --> 00:29:37.640
Bill Sutton: the the thin client OS to the endpoint, and also stream the the Pv. Or the actual

263
00:29:37.720 --> 00:29:50.610
Bill Sutton: server workload. So they were using it for both in the same environment that really gave them a solid lockdown environment. They could manage from a single point. So, and security from a security perspective, it certainly enhanced that so definitely a lot of benefits here.

264
00:29:51.780 --> 00:29:56.240
Bill Sutton: Alright, gentlemen, thank you for participating. Today. We'll do it again next week.

265
00:29:56.530 --> 00:29:56.940
Todd Smith: Thank you.

266
00:29:56.940 --> 00:29:58.565
Geremy Meyers: Excellent thanks, Bill. Thanks Todd.

267
00:29:59.100 --> 00:30:00.910
Todd Smith: Thanks, Jeremy. See you, Bill.

268
00:30:00.910 --> 00:30:01.560
Bill Sutton: So, yeah.