473,804 Members | 2,280 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

FE/BE and Citrix

OK guys I am in need of some assistance here. I have a standard FE/BE
database set up here. ABout 10-20 users have the FE installed on
tehir machines all linked to the common BE on the server. All
standard stuff. The network people are setting up some new
restrictions on the LAN and as a result they want to do the
following. I am not sure what the data risks are if any and how to
ensure that what they plan to do is 'safe'. They want to puit the FE
and BE on the server. Then use Citrix for each user to run the common
FE. Can y'all shed some light on this and give me any feedback as to
what concerns you might have if you were presented with this as the
current plan of attack?
Thanks,
DB

Jul 31 '07 #1
6 1754

"DavidB" <je***@yahoo.co mschreef in bericht news:11******** *************@e 16g2000pri.goog legroups.com...
OK guys I am in need of some assistance here. I have a standard FE/BE
database set up here. ABout 10-20 users have the FE installed on
tehir machines all linked to the common BE on the server. All
standard stuff. The network people are setting up some new
restrictions on the LAN and as a result they want to do the
following. I am not sure what the data risks are if any and how to
ensure that what they plan to do is 'safe'. They want to puit the FE
and BE on the server. Then use Citrix for each user to run the common
FE. Can y'all shed some light on this and give me any feedback as to
what concerns you might have if you were presented with this as the
current plan of attack?
Thanks,
DB
Looks like a bad idea, especially the 'use Citrix for each user to run the common FE' part.
Using Citrix is possible, but also with Citrix each user should have his/hers own FE.

The concern is corruption of course, but also if you are using temptables in the FE you will get *very* concerned....

So you will need about 10-20 FE's on that Citrix server (e.g. each in the user homedir).
Most networking guys don't like that. You will need to convince them.
A Google search on the topic will give you lots of information.

Arno R

Arno R
Jul 31 '07 #2
On Jul 31, 12:01 pm, "Arno R" <arracomn_o_s_p _...@planet.nlw rote:
"DavidB" <je...@yahoo.co mschreef in berichtnews:11* *************** *****@e16g2000p ri.googlegroups .com...
OK guys I am in need of some assistance here. I have a standard FE/BE
database set up here. ABout 10-20 users have the FE installed on
tehir machines all linked to the common BE on the server. All
standard stuff. The network people are setting up some new
restrictions on the LAN and as a result they want to do the
following. I am not sure what the data risks are if any and how to
ensure that what they plan to do is 'safe'. They want to puit the FE
and BE on the server. Then use Citrix for each user to run the common
FE. Can y'all shed some light on this and give me any feedback as to
what concerns you might have if you were presented with this as the
current plan of attack?
Thanks,
DB

Looks like a bad idea, especially the 'use Citrix for each user to run the common FE' part.
Using Citrix is possible, but also with Citrix each user should have his/hers own FE.

The concern is corruption of course, but also if you are using temptables in the FE you will get *very* concerned....

So you will need about 10-20 FE's on that Citrix server (e.g. each in the user homedir).
Most networking guys don't like that. You will need to convince them.
A Google search on the topic will give you lots of information.

Arno R

Arno R
So the fact that this is running with the citrix piece in the puzzle
changes nothing about the common concerns of using a shared FE?

Can you give me few sites that discuss the issue of data corruption in
this sort of set up please?

Jul 31 '07 #3

"DavidB" <je***@yahoo.co mschreef in bericht news:11******** *************@e 9g2000prf.googl egroups.com...
On Jul 31, 12:01 pm, "Arno R" <arracomn_o_s_p _...@planet.nlw rote:
>"DavidB" <je...@yahoo.co mschreef in berichtnews:11* *************** *****@e16g2000p ri.googlegroups .com...
OK guys I am in need of some assistance here. I have a standard FE/BE
database set up here. ABout 10-20 users have the FE installed on
tehir machines all linked to the common BE on the server. All
standard stuff. The network people are setting up some new
restrictions on the LAN and as a result they want to do the
following. I am not sure what the data risks are if any and how to
ensure that what they plan to do is 'safe'. They want to puit the FE
and BE on the server. Then use Citrix for each user to run the common
FE. Can y'all shed some light on this and give me any feedback as to
what concerns you might have if you were presented with this as the
current plan of attack?
Thanks,
DB

Looks like a bad idea, especially the 'use Citrix for each user to run the common FE' part.
Using Citrix is possible, but also with Citrix each user should have his/hers own FE.

The concern is corruption of course, but also if you are using temptables in the FE you will get *very* concerned....

So you will need about 10-20 FE's on that Citrix server (e.g. each in the user homedir).
Most networking guys don't like that. You will need to convince them.
A Google search on the topic will give you lots of information.

Arno R

Arno R
So the fact that this is running with the citrix piece in the puzzle
changes nothing about the common concerns of using a shared FE?
Changes nothing indeed. Don't use a shared FE in a multi-user environment
Can you give me few sites that discuss the issue of data corruption in
this sort of set up please?
I don't know of sites about this, but it has been discussed very often here.
Please do the searching yourself...

Arno R
Jul 31 '07 #4

"DavidB" <je***@yahoo.co mwrote in message
news:11******** *************@e 16g2000pri.goog legroups.com...
OK guys I am in need of some assistance here. I have a standard FE/BE
database set up here. ABout 10-20 users have the FE installed on
tehir machines all linked to the common BE on the server. All
standard stuff. The network people are setting up some new
restrictions on the LAN and as a result they want to do the
following. I am not sure what the data risks are if any and how to
ensure that what they plan to do is 'safe'. They want to puit the FE
and BE on the server. Then use Citrix for each user to run the common
FE. Can y'all shed some light on this and give me any feedback as to
what concerns you might have if you were presented with this as the
current plan of attack?
Thanks,
DB
The network people are under the mistaken assumption that the FE is loaded
for each user like a EXE. It does not, Access load each part of the FE as
needed keeping the MDB file open. Any unexpected shutdown of one of the
shared FEs can cause corruption. Temp tables in the FE will be shared by all
users. The issues are the same for Citrix / Terminal server as on a
workstation. They should follow or at least consider Microsoft's
recommendations just like they would when setting up other network
application.
Jul 31 '07 #5
DavidB <je***@yahoo.co mwrote:
>So the fact that this is running with the citrix piece in the puzzle
changes nothing about the common concerns of using a shared FE?
Correct.
>Can you give me few sites that discuss the issue of data corruption in
this sort of set up please?
My random thoughts on Microsoft Access, Terminal Server and/or Citrix
http://www.granite.ab.ca/access/terminalserver.htm

Tony
--
Tony Toews, Microsoft Access MVP
Please respond only in the newsgroups so that others can
read the entire thread of messages.
Microsoft Access Links, Hints, Tips & Accounting Systems at
http://www.granite.ab.ca/accsmstr.htm
Tony's Microsoft Access Blog - http://msmvps.com/blogs/access/
Jul 31 '07 #6
On Jul 31, 6:41 pm, "Tony Toews [MVP]" <tto...@teluspl anet.netwrote:
DavidB <je...@yahoo.co mwrote:
So the fact that this is running with the citrix piece in the puzzle
changes nothing about the common concerns of using a shared FE?

Correct.
Can you give me few sites that discuss the issue of data corruption in
this sort of set up please?

My random thoughts on Microsoft Access, Terminal Server and/or Citrixhttp://www.granite.ab. ca/access/terminalserver. htm

Tony
--
Tony Toews, Microsoft Access MVP
Please respond only in the newsgroups so that others can
read the entire thread of messages.
Microsoft Access Links, Hints, Tips & Accounting Systems athttp://www.granite.ab. ca/accsmstr.htm
Tony's Microsoft Access Blog -http://msmvps.com/blogs/access/
Thank you all for the input. I think this is ammunition enough that I
can now convince the powers that be to not go down the path they are
currently discussing.

Aug 1 '07 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
4757
by: James Ng | last post by:
I have posted this to the Citrix Developers' forum and have not heard anything yet. So I'd like to see if any other Java developers have experience this problem with their Java application in a Citrix Published application environment. We are running Citrix XP enterprise feature release 2 on windows 2000 server sp4. We developed a Java application which can catch the "PrintScreen" key event released event correctly in our PC but could...
12
9912
by: Corey Burnett | last post by:
I have a client that has a split database (front-end/back-end). They are also using Access security - MDW file. The front end MDE file, the back end MDB file, and the MDW file are all located on a shared folder on the file server. They have two populations of users - local and remote. *ALL* users currently get to the system via a Citrix login. They log in to Citrix and get a Citrix desktop. Then they start the application via a...
7
8181
by: Rob | last post by:
I am an Access developer and have done many Access databases in the standard Front-end on the workstations, backend on the server (over a LAN) but have never worked with Access over Citrix, though that situation is coming up for me shortly. Question: When you run the front-end on the Server, does Citrix clone the front end application database file for each user that connects or do they all connect to physically the same front-end...
33
3292
by: DFS | last post by:
An application I wrote has been deployed on Citrix, and the Citrix admin tells me all users run the same .mde file. There aren't a lot of concurrent users, but even 2 could be cause for concern. I think the use of globals is worrisome in this case. Anybody have any experience with Access on Citrix? (Al Kallal already griped me out about globals, but if he has anything new to add I'm all ears).
7
2526
by: SK | last post by:
Hi, Would appreciate if anyone could help me on this. Basically my client having few branches across state. And they used Citrix in which to connect to the server side for accessing application running on ASPNET (C# code behind). Basically, all my form was coded as user control and loaded as component to the IFrame. The problem is when browsing the page, it could not be loaded. and there
5
11295
by: Art | last post by:
Hi, We have some applications that run on a Citrix server. I would like to run one of them, a reporting app, from within a VB.net application. If I log into the Citrix server with remote desktop, I can type a command line that will do what I want. My VB.net application is not on that Citrix server. I'm afraid that if I map a drive to the Citrix box and shell out to the reporting app that I'll take it over -- that is, my use of the...
7
5003
by: Paul | last post by:
I have a VB.NET form with a DataGrid. When I toggle to Excel (for example) and then back to my application the repaint of the DataGrid is really slow. You can see the repainting happening. When I toggle back to Excel, it does not do that. The repaint is quick. I'm running this within a Citrix environment. The scrolling of the DataGrid is slow also. Would anyone know how I can fix or even determine what is going on? Thank you!
0
1888
by: roneon | last post by:
This is the problem that the topic starter posted: "we installed Oracle-Client 8.1.7 on a server with Windows 2000 Terminal-Services and Citrix Metaframe Xp. The Forms-Applications we wrote are on a fileserver.
4
3525
by: Peter | last post by:
I have the following code which works fine in IE6 and IE7 and FireFox, but when I run IE6 on Citrix I get "The page cannot be displayed" in the iframe. We don't have IE7 on Citrix so I can't try it. <span id="ShowReport" disabled="disabled" style="display:inline-block;height:1200px;width:880px;"> <div> <iframe src=../../WsiLogo.gif<frame src=../../WsiLogo.gif> <embed src=../../WsiLogo.gif</iframe> </div>
12
2098
by: =?Utf-8?B?QXJ0?= | last post by:
Hi, I'm putting together an application in vb.net. I will ultimately need people to be able to run it from home (Normally we're in one office). I can store it on a file server, but this raises the problem of a home user needing the .net framework. I seem to have 2 choices, and have no experience in either. First, since we use Citrix here, I could publish it as a Citrix application.
0
9714
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10599
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10346
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10347
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10090
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9173
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
5531
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4308
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
3001
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.