(this was originally posted in August, 2011)
Presented by Jo Harder
In this session, we'll dissect data packets that cross the wire from the time the user attempts login up to and including accessing resources. We'll answer such questions as: Is the logon data encrypted, obfuscated, or plain text? What is the typical size of data packets for a user session? How does the quantity of data packets increase with multimedia and other high-bandwidth activities? What are ICA virtual channels and how do you prioritize?
Click to browse all of the BriForum 2011 videos.