[THIN] Re: Ghost Images

  • From: <brock.akister@xxxxxx>
  • To: <thin@xxxxxxxxxxxxx>
  • Date: Thu, 26 Aug 2004 14:25:54 +0100

Image individual 


Brock Akister
 WAN and Network Services

These documents are provided for informational purposes only. The
information contained in this document represents the current view of
myself on the issues discussed as of the date of publication. Because I
must respond to changes in market conditions, it should not be
interpreted to be a commitment on the part of myself and I cannot
guarantee the accuracy of any information presented after the date of

Information provided in this document is provided "as is" without
warranty of any kind, either express or implied, including but not
limited to the implied warranties of merchantability, fitness for a
particular purpose and freedom from infringement

-----Original Message-----
From: thin-bounce@xxxxxxxxxxxxx [mailto:thin-bounce@xxxxxxxxxxxxx] On
Behalf Of Paul Taylor
Sent: 26 August 2004 14:05
To: thin@xxxxxxxxxxxxx
Subject: [THIN] Re: Ghost Images


Hi there


We ghost our Citrix servers.  We have 3 in our farm and whilst,
technically, they are all identical we still ghost them individually.



 -----Original Message-----
From: Christine Easton [mailto:christine.easton@xxxxxxxxx] 
Sent: 25 August 2004 17:32
To: 'thin@xxxxxxxxxxxxx'
Subject: [THIN] Ghost Images



        Just a poll. How many folks use ghost to image their Citrix
boxes?  If you have farms, do you use one image for all your boxes or
image individual servers?  Thanks!

        Christine Easton
        Citrix/Windows 2000 Engineer
        BMC Healthnet Plan
        One Design Center Place
        Boston, MA 02210
        Work:  617-748-6034
        Cell:  617-290-4407



Broomfield & Alexander Professional Advisors

Creating value and prosperity

Offices at:

Cardiff Tel: 029 20549939

Newport Tel: 01633 265828

Newbridge Tel: 01495 245736

Head Office: Pendragon House, Caxton Place, Pentwyn, Cardiff CF23 8XE 

Need free business advice, then visit our website at

Confidentiality: This e-mail and its attachments are intended for the
above named recipient(s) only and may be confidential and/or privileged.
If they have come to you in error you must take no action based on them,
nor must you copy or disclose them or any part of their contents to any
person or organisation; please reply to this e-mail and highlight the
error immediately and delete this e-mail and its attachments from your
computer system. This footnote also confirms that before leaving our
system this e-mail message has been swept for the presence of computer

Other related posts: