Issues to synchronize bookmarks of Google Chrome using Citrix UPM

Under “List of Folders to mirror” UPM policy setting , add

"AppDataLocalGoogleChromeUser DataDefault"

Once the policy is applied, the issue gets resolved.

Additional Considerations

  • As a side effect the size of the UPM store will increase.
  • It is advised to monitor the size of the UPM store for about one week to make sure it doesn’t grow exponentially
  • Increasing the size of the UPM store is expected behavior now that Bookmarks are being synchronized properly; However, In case the UPM store File Share grows too quickly and too big, we advise to consider applying other Citrix UPM policies to exclude specific folders from synchronization which may include these:
    • AppDataLocalGoogleChromeUser DataDefaultFavicons
    • AppDataLocalGoogleChromeUser DataDefaultHistory
    • AppDataLocalGoogleChromeUser DataDefaultPreferences
    • and other files inside of "AppDataLocalGoogleChromeUser DataDefault" that are NOT related to the bookmarks file(s)
  • Also, UPM profile is taking between 7 to 8 seconds to load (and VDI taking approximately 30 seconds to launch completely.
  • We also advise that in such a case the UPM logon component takes much longer than 7 to 8 seconds, customer should consider implementing the UPM Policy called “Profile Streaming”

An alternative solution is to add only the bookmarks path in “File to Synchronize”.

Path : AppDataLocalGoogleChromeUser DataDefaultBookmarks


The Other Half of the 5G Story

5G is not just about building a new telecom network or standard – that’s only half the story. What about the story of how telecom is intersecting with other industries, industrial plants, transport infrastructure companies, oil fields and ships, all of whom are leveraging 5G and LTE technology, to transform their business models? Picture everything from oil rigs in the North Sea reporting their daily yield back to base, search and rescue missions at sea, companies connecting buildings for efficient energy usage, and industrial plants making medicines. Smart factories As a case in point, ABB Power … READ MORE


Blockchain Platform We.Trade Reportedly Slashes Workforce by Half

Owing to ongoing financial difficulties, the IBM Hyperledger-powered trade finance blockchain platform is laying off almost half of its workforce.

According to a Global Trade Review report, “more than a dozen employees” were laid off and most of them belonged to the commercial and product-focused verticals of the company. was jointly owned and funded by 12 influential banks and financial institutions such as Deutsche Bank, HSBC, Rabobank, Santander and Société Générale. Less than a month ago, IBM bought a 7% stake in the company, which, said, would help it scale its business globally. has had quite a few achievements in bringing banks to use blockchain technology, as was reported by Cointelegraph. In August 2019, HSBC became the first bank to settle a transaction via Hyperledger on the platform. Earlier this year, a major Spanish bank CaixaBank also started providing platform’s service to its 15.8 million customers to make transactions more traceable and secure.

Living through the crisis

According to Global Trade Review,’s financial woes began after their last round’s fundings fell short of the expected amount as many shareholder banks withdrew their interest to reinvest in the company. is now looking for alternative investments from other shareholders and licensees as it continues operation with a reduced workforce. The head of commercialization at, David McLoughlin, explained:

“As an early-stage company, it is critical that we remain agile and manage our resource needs as effectively as possible – in order to ensure the continued resilience of the company.”

Highlighting the impact of COVID-19 pandemic on potential investments, McLoughlin said that the pandemic, rather than clogging business activities, has actually catalyzed it. The “digitization of trade and trade finance is now no longer a luxury, but a must,” he added. did not respond to Cointelegraph’s request for comment.


Cisco Webex Meetings and Cisco Webex Meetings Server Token Handling Unauthorized Access Vulnerability

A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to gain unauthorized access to a vulnerable Webex site.

The vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. If successful, the attacker could gain the privileges of another user within the affected Webex site.

Cisco has released software updates that address this vulnerability. Customers on Cisco hosted Webex Meetings sites do not need to take any actions to receive this update. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

Security Impact Rating: High

CVE: CVE-2020-3361


Citrix Probe Agent 2001: Error “Director Not Reachable” While Configuring Probe Agent


Setup an extra Citrix Director instance without SSON or PIVS that has only Forms authentication enabled for configuring Director Probes.

Helpdesk users/admins can continue to use the existing Director intance with SSON/PIV smart cards enabled for regular access and monitoring,