Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Remote App - what happens if it "calls" for Excell or Word

Posted on 2010-11-27
1
714 Views
Last Modified: 2012-06-27
I have an application I would like to run as a remote app on users machines.

In some parts of the application, it performs a mail merge with Word.

What will happen if it is coverted to a Remote App under Windows 2008 R2 Terminal Services?

Will it "call" for the local Word on the users machine, or will it "call" for the WOrd installed on the Terminal server? Are there any complications I need to be aware of? As it is over a VPN, if it calls for the local version I imagine that things will be slowed down quite  a bit!

If the remote app does this
0
Comment
Question by:Mawallace
1 Comment
 
LVL 6

Accepted Solution

by:
mahrens007 earned 500 total points
ID: 34223917
It sounds like you have the Remote Apps published to the user desktop.  If the application is being access through the TS, it will want to access Word on the terminal server.  Think of it this way, if you remote desktop into a server, open an application that calls for Notepad, the program is looking for the notepad application on the server.  
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Remote Desktop Connections allow you to control remote host machines via the magic of the Internet and RDP (Remote Desktop Protocol). For the purposes of this article we will assume you are connecting from your home PC or laptop to a remote offic…
Like many organizations, your foray into cloud computing may have started with an ancillary or security service, like email spam and virus protection. For some, the first or second step into the cloud was moving email off-premise. For others, a clou…
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question