Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 52 white papers, page 1 of 4.
5 Fundamentals of Modern Data Protection
Some data protection software vendors will say that they are “agentless” because they can do an agentless backup. However, many of these vendors require agents for file-level restore, proper application backup, or to restore application data. My advice is to make sure that your data protection tool is able to address all backup and recovery scenarios without the need for an agent.
Legacy backup is costly, inefficient, and can force IT administrators to make risky compromises that impact critical business applications, data and resources. Read this NEW white paper to learn how Modern Data Protection capitalizes on the inherent benefits of virtualization to:
  • Increase your ability to meet RPOs and RTOs
  • Eliminate the need for complex and inefficient agents
  • Reduce operating costs and optimize resources
Application Response Time for Virtual Operations
For applications running in virtualized, distributed and shared environments it will no longer work to infer the performance of an application by looking at various resource utilization statistics. Rather it is essential to define application performance by measuring response and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Massive changes are occurring to how applications are built and how they are deployed and run. The benefits of these changes are dramatically increased responsiveness to the business (business agility), increased operational flexibility, and reduced operating costs.

The environments onto which these applications are deployed are also undergoing a fundamental change. Virtualized environments offer increased operational agility which translates into a more responsive IT Operations organization. Cloud Computing offers applications owners a complete out-sourced alternative to internal data center execution environments. IT organizations are in turn responding to public cloud with IT as a Service (IaaS) initiatives.

For applications running in virtualized, distributed and shared environments, it will no longer work to infer the “performance” of an application by looking at various resource utilization statistics. Rather it will become essential to define application performance as response time – and to directly measure the response time and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Making a Business Case for Unified IT Monitoring
Unified monitoring solutions like Zenoss offer a cost-effective alternative for those seeking to rein-in monitoring inefficiencies. By establishing a central nerve center to collect data from multiple tools and managed resources, IT groups can gain visibility into the end-to-end availability and performance of their infrastructure. This helps simplify operational processes and reduce the risk of service disruption for the enterprise.

In large IT organizations, monitoring tool sprawl has become so commonplace that it is not unusual for administrators to be monitoring 10 to 50 solutions across various departments.

Unified monitoring solutions like Zenoss offer a cost-effective alternative for those seeking to rein-in monitoring inefficiencies. By establishing a central nerve center to collect data from multiple tools and managed resources, IT groups can gain visibility into the end-to-end availability and performance of their infrastructure. This helps simplify operational processes and reduce the risk of service disruption for the enterprise.

This paper can help you make an effective business case for moving to a unified monitoring solution. Key considerations include:

•    The direct costs associated with moving to a unified monitoring tool
•    The savings potential of improved IT operations through productivity and efficiency
•    The business impact of monitoring tools in preventing and reducing both downtime and service degradation

Download the paper now!

Citrix AppDNA and FlexApp: Application Compatibility Solution Analysis
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.

This whitepaper provides an overview of Citrix AppDNA with Liquidware Labs FlexApp.

FlexApp: Application Layering Technology
FlexApp Application Layering in ProfileUnity enables applications to be virtualized in such an innate way that they look native to the Windows OS and other applications.
FlexApp Application Layering in ProfileUnity enables applications to be virtualized in such an innate way that they look native to the Windows OS and other applications.

Application Layering leads to much higher rates of compatibility than previous technologies which used Application Isolation to virtualize applications. Once applications have been packaged for layering, they are containerized on virtual hard disks (VHDs) or VMDKs.  They can be centrally assigned to users on a machine-level or “context-aware” basis.

This whitepaper provides an overview of FlexApp concepts and ways in which FlexApp can serve as a cornerstone in an application delivery strategy.
App-V or FSLogix? The good, the bad & “the better together”
The Great Big White Paper on when to use AppV, when to use FSLogix, and when to use them together! The latest release from Duncan Murdoch of Amber Reef, "The purpose of this document is to discuss the strengths and weakness of App-V and FSLogix Apps, and how the two can be used together to form a complete application provisioning and management strategy." The document uses scenario-based considerations to demonstrate the pros and cons of using each solution independently, or when combined.
Normal 0 false false false EN-US X-NONE X-NONE

The Great Big White Paper on when to use AppV, when to use FSLogix, and when to use them together! The latest release from Duncan Murdoch of Amber Reef, "The purpose of this document is to discuss the strengths and weakness of App-V and FSLogix Apps, and how the two can be used together to form a complete application provisioning and management strategy." The document uses scenario-based considerations to demonstrate the pros and cons of using each solution independently, or when combined.

FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
A New Approach to Per User Application Management
Our premise is simple: existing methodologies for delivering and deploying Windows applications are based upon outmoded ideas and outdated technology. There remains a need for a product that makes it simple for each user to have their Windows applications individually tailored for their device. When a user logs on they should see only the applications that they are licensed to use regardless of whether they are using cloud, virtual or traditional desktops.
Normal 0 false false false EN-US X-NONE X-NONE

A simple truth: Current application delivery and deployment solutions for Windows®-based desktops are often not fast enough, and the methods employed introduce complexities and limitations that cost enterprises valuable time, money and productivity. There is a strong need for a solution that is faster to deploy, simpler to use, and improves productivity rather than degrades it. In fact, the best solution would seamlessly and instantaneously personalizing the entire desktop, from profiles and printers to applications and extensions, while supporting license compliance and cost optimization. And, of course, it wouldn’t matter if the target desktops were physical, virtual, or cloud-based. FSLogix is delivering that solution today.

UNIQUE, CUTTING EDGE TECHNOLOGY

FSLogix has devised a revolutionary technique called Image Masking to create a single Unified Base Image that hides everything a logged in user shouldn’t see, providing predictable and real-time access to applications and profiles. This approach is driving unprecedented success in image reduction, with a side benefit of license cost optimization. Image masking functions identically across a wide range of Windows-based platforms, greatly simplifying the path from traditional to virtual environments, and dramatically reducing the management overhead required for enterprise desktops. This solution eliminates multiple layers of management infrastructure, creating a single, unified approach to image management, profile access, and application delivery.
Weighing Your Unified Monitoring Options: When Open Source Makes Sense
There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few. However, not every tool is right for every environment.
Normal 0 false false false EN-US X-NONE X-NONE

There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few.

However, not every tool is right for every environment.

Weighing the strengths and weaknesses of open-source offerings is essential to determining whether they will work to meet your specific goals.

Since Zenoss has both open source and enterprise-scale solutions, we’re very familiar with both the benefits and limitations of these product sets for your organizational needs. This comparison guide helps provide insight into when and where open source tools might be a good fit.

Which solution is the right fit for you?  Download our white paper today to find out!
Does Backup Need a File System of its Own?
VembuHIVETM is an efficient cloud file system designed for large-scale backup and disaster recovery (BDRTM) application with support for advanced use-cases. VembuHIVETM can be thought of as a File System of File Systems with in-built version control, deduplication (elimination of redundant information to enhance storage reduction), encryption, and in-built error correction.

Backup is just not about storage. It’s the intelligence on top of storage. Typically when businesses think of backup, they see it as a simple data copy from one location to another. Traditional file systems would suffice if the need were to just copy the data. But backup is the intelligence applied on top of storage where data can be put to actual use. Imagine the ability to use backup data for staging, testing, development and preproduction deployment. Traditional file systems are not designed to meet such complex requirements.

With the advent of information technology, more and more organizations are relying on IT for running their businesses. They cannot afford to have downtime on their critical applications and need instant access to data in the event of disaster. Hence, a new type of file system is necessary to satisfy this need. 

VembuHIVETM manages the metadata smartly through its patent-pending technology, in a way that is agnostic to the file system of the backup, which is why we call VembuHIVETM, a file system of file systems. This helps the backup application to instantly associate the data in VembuHIVETM to any file system metadata, thereby allowing on-demand file or image restores in many possible file formats. The data and metadata storage, harness cluster file system and computing and storage.

This is a really powerful concept that will address some very interesting use cases not just in the backup and recovery domain but also in other domains, such as big-data analytics.

The key to the design of VembuHIVETM is its novel mechanism to capture and generate appropriate metadata and store it intelligently in a cloud infrastructure. The increment data (the changes with respect to a previous version of the same backup) are treated like versions in a version control system (CVS, GIT). This revolutionary way of data capture and metadata generation provides seamless support to a wide range of complex restore use cases.

5 Keys to Virtualization Zen
So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

Zenoss makes managing virtualized environments and virtualization monitoring easy and less expensive. The Zenoss hybrid IT monitoring platform allows you to comprehensively monitor resource performance and availability across the entire stack, including network, storage, applications and more, regardless of physical or virtual location.

Default FTA management for Word 2013 and WordViewer
A complete step-by-step guide for managing the default file type associations for Word 2013 and WordViewer with FSLogix.

Duncan Murdoch, of Amber Reef, uses this white paper to outline the necessary approach to centrally control and manage FTAs for Word 2013 and WordViewer using FSLogix. 

After addressing the reason and symptoms of the issue, Duncan asserts, "If the desire is to 'Control the FTA' centrally and manage the associations with FSLogix, preventing the users from overriding the FTA settings," then "to achieve this you can create 2 separate FTA rules, one for Word 2013 and another for WordViewer."

By applying these rules alongside the FSLogix Hiding rules for the applications, then the Administrator can ensure that the FTA that is applied is the one that they have allocated to the application group.

NOTE: This will also prevent a user from being able to right-click the file and assign their OWN FTA preferences.

The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

IGEL Powers Rich Multimedia Computing Experience for Fulton Financial Corporation
In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure. With the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies, Fulton selected the IGEL Universal Desktop (UD6) thin clients featuring Intel Celeron J1900 Quad-Core processors and the IGEL Universal Management Suite (UMS).

Fulton Financial Corporation has a long and storied history that began in 1882 in Lancaster, Pennsylvania, where local merchants
and farmers organized Fulton National Bank. The bank’s name was chosen to honor Lancaster County native Robert Fulton, the inventor and artist best known for designing and building the Clermont, the first successful steamboat.

In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure, with the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies.

In selecting a desktop computing solution to support its Citrix application virtualization infrastructure, Fulton had one unique business requirement, they were looking for a solution that would mirror the experience provided by a Windows PC, without actually being a Windows PC.

During the evaluation process, Fulton looked at thin clients from IGEL and another leading manufacturer, conducting a “bake-off” of several models including the IGEL Universal Desktop (UD6). Fulton like the fact that IGEL is forward- thinking in designing its desktop computing solutions, and began its IGEL roll-out by purchasing 2,300 IGEL UD6 thin clients in 2016 for its headquarters and branch offices, and plans to complete the roll out of IGEL thin clients to the remainder of its 3,700 employees in the coming months. The bank is also leveraging the IGEL Universal Management Suite (UMS) to manage its fleet of IGEL thin clients.

The 4th Era of IT Infrastructure: Composable Systems
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th generation of IT infrastructure can transform your business.

Learn the benefits and limitations of  the 3 generations of IT infrastructure  – siloed, converged and hyperconverged – and discover how the 4th generation of IT infrastructure  – composable –  can transform your business. 

The composable infrastructure enables you to:

  • Tightly integrate server, storage, networking, virtualization, VM/container centric management and an application marketplace to create a high-speed infrastructure platform that includes everything needed to run applications out of the box – a single silo platform
  • Easily and independently scale network, storage, and compute resources on-demand, making it possible to run a wide diversity of workloads

Manage your infrastructure from anywhere through a single SaaS management portal

Approaches and Benefits of Network Virtualization
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure — the network. Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.

Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure—the network.

Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.
 
In this whitepaper you will be introduced to Cloudistics Ignite’s Adaptive Overlay Network (AON) technology that provides the following benefits:
◦    Simplifies and automates network provisioning, avoiding manual errors common when dealing with physical networks, VLANs, etc.

  • Enables you to scale your business to multi-site locations without unnecessary costly hardware purchases and lengthy maintenance windows
  • Enables you to fine-tune your application’s performance and security through dedicated virtual networks that can be deployed in minutes

Natively built-into the Ignite platform, lowering costs by eliminating the need for 3rd party software and hardware