I have not posted in the forum for a while but i finally got an occasion as i am hit by a question from our Citrix administrator that i am not sure have been covered in the forum yet.
We are looking in activating an hardware security configuration on our Citrix servers knowed as "NX_bit".
http://en.wikipedia.org/wiki/NX_bit
When this "feature" is turned on in the citrix server the Tm1 client will not load in citrix instances and we are prompted to remove the Tm1 Add In from Excel.The NX bit, which stands for No eXecute, is a technology used in CPUs to segregate areas of memory for use by either storage of processor instructions (or code) or for storage of data, a feature normally only found in Harvard architecture processors. However, the NX bit is being increasingly used in conventional von Neumann architecture processors, for security reasons.
An operating system with support for the NX bit may mark certain areas of memory as non-executable. The processor will then refuse to execute any code residing in these areas of memory. The general technique, known as executable space protection, is used to prevent certain types of malicious software from taking over computers by inserting their code into another program's data storage area and running their own code from within this section; this is known as a buffer overflow attack.
Intel markets the feature as the XD bit, for eXecute Disable. AMD uses the name Enhanced Virus Protection. The ARM architecture refers to the feature as XN for eXecute Never; it was introduced in ARM v6.
I am only starting my review on this but i thought i would throw a bottle in the Tm1 forum sea just in case somebody else has also looked in this subject.
We will also raise the question to IBM as well in the coming days and i ll update this post accordingly to provided answer if any
Any advice, comment, suggestion, appreciated as usual,
Kind Regards,