|
by: tom |
last post by:
Hey All,
We are hosting our Access XP application via Citrix and are having
some confusion about memory. The Citrix server has 2GB of RAM, and
what we are perceiving is that only a fraction of this appears to be
utilized by Access/Jet before it starts swapping in and out memory
paging files. Is there any way to change this behavior to have our
application rely more on RAM first?
Thanks,
|
by: Corey Burnett |
last post by:
I have a client that has a split database (front-end/back-end). They
are also using Access security - MDW file. The front end MDE file,
the back end MDB file, and the MDW file are all located on a shared
folder on the file server. They have two populations of users - local
and remote. *ALL* users currently get to the system via a Citrix
login. They log in to Citrix and get a Citrix desktop. Then they
start the application via a...
|
by: Rob |
last post by:
I am an Access developer and have done many Access databases in the
standard Front-end on the workstations, backend on the server
(over a LAN) but have never worked with Access over Citrix, though
that situation is coming up for me shortly.
Question: When you run the front-end on the Server, does Citrix clone
the front
end application database file for each user that connects or do they
all connect
to physically the same front-end...
|
by: DFS |
last post by:
An application I wrote has been deployed on Citrix, and the Citrix admin
tells me all users run the same .mde file. There aren't a lot of concurrent
users, but even 2 could be cause for concern.
I think the use of globals is worrisome in this case. Anybody have any
experience with Access on Citrix?
(Al Kallal already griped me out about globals, but if he has anything new
to add I'm all ears).
|
by: Todd |
last post by:
I have a .Net windows app running over a Citrix enviornment that normally
shows 30 to 50MB of usage according to the server's Task Manager. Our Citrix
admin is concerned that this app will register 150MB+ for certain users at
certain times and then hold onto this memory.
Should we be concerned with this kind of usage? I've read the framework
takes more memory than it needs and deallocates as necessary for single .Net
applications. ...
|
|
by: Alexander Overmann |
last post by:
Hello,
currently we encounter several huge memoryproblems running .NET C#
Applications under Windows Terminal Servers/Citrix. Sometimes the program
claims 100 MB which is not very much at a single PC but a pain in the ass at
a Terminalserver when 20-25 Users start the program (25*100 = 2500 MB).
We made some analysis:
|
by: DavidB |
last post by:
OK guys I am in need of some assistance here. I have a standard FE/BE
database set up here. ABout 10-20 users have the FE installed on
tehir machines all linked to the common BE on the server. All
standard stuff. The network people are setting up some new
restrictions on the LAN and as a result they want to do the
following. I am not sure what the data risks are if any and how to
ensure that what they plan to do is 'safe'. They want...
|
by: Georg Scholz |
last post by:
We are about to design an application, which will used by 10,000
people world-wide, mainly hospitals, doctors and scientists. There
will be multiple language Versions.
The app will be about 1 MB, it will be distributed via download.
Now we are considering to write it in C#, with .Net 1.1.4322
|
by: roneon |
last post by:
This is the problem that the topic starter posted:
"we installed Oracle-Client 8.1.7 on a server with Windows 2000
Terminal-Services and Citrix Metaframe Xp. The Forms-Applications we
wrote are on a fileserver.
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|