Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 46 white papers, page 1 of 3.
VDI FIT and VDI UX Key Metrics
As more organizations prepare for and deploy hosted virtual desktops, it has become clear that there is a need to measure compatibility and performance for virtual desktop infrastructure both in the planning process and when measuring user experience after moving to virtual desktops. This whitepaper covers best practices and provides an introduction to composite metrics VDI FIT in Stratusphere FIT and VDI UX in Stratusphere UX to provide a framework to measure Good/Fair/Poor desktops.

As more organizations prepare for and deploy hosted virtual desktops, it has become clear that there is a need to support two related but critical phases. The first is to inventory and assess the physical desktop environment in order to create a baseline for the performance and quality of the user experience for the virtual desktop counterparts. When planning and preparing, organizations would like to know which desktops, users and applications are a good fit for desktop virtualization and which ones are not. The second phase is to track the virtual desktops in production in order to proactively identify when performance and user experience does not meet expectations, as well as to continue to refine and optimize the desktop image and infrastructure as changes are introduced into the environment.

Because virtual desktops live on shared systems, the layers of technology make it more complex to measure and classify fitness and user experience. But with increased industry knowledge and the emergence of best practices, plus new purpose-built products such as Liquidware Labs’ Stratusphere FIT and Stratusphere UX, it is now possible to more accurately measure and classify both fitness and user experience. This white paper covers these best practices and provides an introduction to the VDI FIT and VDI UX classification capabilities in Stratusphere FIT and Stratusphere UX.

Liquidware Labs ProfileUnity and its Role as a Disaster Recovery Solution
As desktop operating systems become more and more complex, the need for a proper disaster recovery methodology on the desktop is increasingly crucial, whether the desktop is physical or virtual. In addition, many enterprise customers are leveraging additional technologies, including local hard drive encryption, persistent virtual images and non‐persistent virtual images. This paper provides an overview of these issues and outlines how disaster recovery (DR) plan, coupled with Liquidware Labs Pro
Many corporations around the globe leverage Virtual Desktop Infrastructure (VDI) as a strategic, cost‐effective methodology to deliver business continuity for user applications and data. Virtualization renders a physical computer made of metal, plastic and silica as a portable file that can be moved through a network from a data center to a disaster recovery (DR) site. Although this may sound easy, transferring virtual machine files can be challenging for corporate networks in a number of ways. Moving large amounts of data is a time consuming process that may take days to complete. Moreover, once archival process is complete, the data is effectively out of date or out of context. As a response various strategies focus on leaving the bulk of the data transferred and only updating and replicating the changes in data. Desktop infrastructure is particularly sensitive to the issue of synchronization so applications run properly. The challenge is keeping desktops in sync because desktops, applications and data change often. This has given birth to a whole new set of strategies and software unique to desktops to accomplish backups safely and effectively. Liquidware Labs’ ProfileUnity™ is a best of breed solution that provides a seamless end user DR experience identical to the one at the home office.
5 Fundamentals of Modern Data Protection
Some data protection software vendors will say that they are “agentless” because they can do an agentless backup. However, many of these vendors require agents for file-level restore, proper application backup, or to restore application data. My advice is to make sure that your data protection tool is able to address all backup and recovery scenarios without the need for an agent.
Legacy backup is costly, inefficient, and can force IT administrators to make risky compromises that impact critical business applications, data and resources. Read this NEW white paper to learn how Modern Data Protection capitalizes on the inherent benefits of virtualization to:
  • Increase your ability to meet RPOs and RTOs
  • Eliminate the need for complex and inefficient agents
  • Reduce operating costs and optimize resources
Application Response Time for Virtual Operations
For applications running in virtualized, distributed and shared environments it will no longer work to infer the performance of an application by looking at various resource utilization statistics. Rather it is essential to define application performance by measuring response and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Massive changes are occurring to how applications are built and how they are deployed and run. The benefits of these changes are dramatically increased responsiveness to the business (business agility), increased operational flexibility, and reduced operating costs.

The environments onto which these applications are deployed are also undergoing a fundamental change. Virtualized environments offer increased operational agility which translates into a more responsive IT Operations organization. Cloud Computing offers applications owners a complete out-sourced alternative to internal data center execution environments. IT organizations are in turn responding to public cloud with IT as a Service (IaaS) initiatives.

For applications running in virtualized, distributed and shared environments, it will no longer work to infer the “performance” of an application by looking at various resource utilization statistics. Rather it will become essential to define application performance as response time – and to directly measure the response time and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

CIO Guide to Virtual Server Data Protection
Server virtualization is changing the face of the modern data center. CIOs are looking for ways to virtualize more applications, and faster across the IT spectrum.
Server virtualization is changing the face of the modern data center. CIOs are looking for ways to virtualize more applications, faster across the IT spectrum. Selecting the right data protection solution that understands the new virtual environment is a critical success factor in the journey to cloud-based infrastructure. This guide looks at the key questions CIOs should be asking to ensure a successful virtual server data protection solution.
Workload Routing & Reservation:  5 Reasons Why It Is Critical To Virtual & Cloud Operation
Topics: cirba
When observing the current generation virtual and internal cloud environments, it appears that the primary planning and management tasks have also made the transition to purpose-built software solutions. But when you dig in a little deeper, there is one area that is still shamefully behind: the mechanism to determine what infrastructure to host workloads on is still in the stone ages. The ability to understand the complete set of deployed infrastructure, quantify and qualify the hosting capabili
When observing the current generation virtual and internal cloud environments, it appears that the primary planning and management tasks have also made the transition to purpose-built software solutions. But when you dig in a little deeper, there is one area that is still shamefully behind: the mechanism to determine what infrastructure to host workloads on is still in the stone ages. The ability to understand the complete set of deployed infrastructure, quantify and qualify the hosting capabilities of each environment, and to make informed decisions regarding where to host new applications and workloads, is still the realm of spreadsheets and best guesses.

This paper identifies five reasons why the entire process of workload routing and capacity reservation must make the transition to become a core, automated component of IT planning and management.

The Path to Hybrid Cloud: Intelligent Bursting To Amazon Web Services & Microsoft Azure
In this whitepaper you will learn: The challenges in implementing an effective hybrid cloud; How key vendors are addressing their challenges; How to answer what, when and where to burst.

The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. However, these benefits don’t come without challenges.

In this whitepaper you will learn:
•    The challenges in implementing an effective hybrid cloud
•    How key vendors are addressing their challenges
•    How to answer what, when and where to burst

PowerShell for newbies: Getting started with PowerShell 4.0
Topics: veeam, powershell
This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms.

This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms. This e-book provides the fundamentals every PowerShell administrator needs to know. The getting started guide will give you a crash course on PowerShell essential terms, concepts and commands and help you quickly understand PowerShell basics.

You will also learn about:

  • What is PowerShell?
  • Using PowerShell Help
  • PowerShell Terminology
  • The PowerShell Paradigm
  • And more!

This white paper focuses on PowerShell 4.0; however, you can be sure that all the basics provided are relevant to earlier versions as well. For those who are ready to take the next steps in learning PowerShell and looking for more information on the topic, this PDF contains a list of helpful resources.

How to avoid VM sprawl and improve resource utilization in VMware and Veeam backup infrastructures
You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

Getting virtual sprawl under control will help you reallocate and better provision your existing storage, CPU and memory resources between critical production workloads and high-performance, virtualized applications. With proper resource management, you can save money on extra hardware.

This white paper examines how you can avoid potential VM sprawl risks and automate proactive monitoring by using Veeam ONE, a part of Veeam Availability Suite. Veeam ONE will arm you with a list of VM sprawl indicators and explain how you can pick up and configure a handy report kit to detect and eliminate VM sprawl threats in your VMware environment.

Read this FREE white paper and learn how to:

  • Identify “zombies”
  • Clean up garbage and orphaned snapshots
  • Establish a transparent system to get sprawl under control
  • And more!
Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
How Software-Defined Storage Enhances Hyper-converged Storage
This paper describes how to conquer the challenges of using SANs in a virtual environment and why organizations are looking into hyper-converged systems that take advantage of Software-Defined Storage as a solution to provide reliable application performance and a highly available infrastructure.
One of thefundamental requirements for virtualizing applications is shared storage.Applications can move around to different servers as long as those servers haveaccess to the storage with the application and its data. Typically, sharedstorage takes place over a storage network known as a SAN. However, SANstypically run into issues in a virtual environment, so organizations arecurrently looking for new options. Hyper-converged infrastructure is a solutionthat seems well-suited to address these issues.
 
By downloading thispaper you will:
 
  • Identify the issues with running SANs in virtualized environments
  • Learn why Hyper-converged systems are ideal for solving performance issues
  • Learn why Hyper-converged systems are ideal for remote offices
  • Discover real world use-cases where DataCore's Hyper-converged Virtual SAN faced these issues
Technology Comparison: Disaster Recovery Solutions
Deep-dive comparison of disaster recovery solutions - differences between Zerto's hypervisor-based replication and array-based replication (with VMWare SRM)

Zerto’s innovative, hypervisor-based replication is a technology developed to provide a true enterprise class, yet fully virtual-aware disaster recovery solution, to protect virtualized, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

Compared Technologies

The current and legacy disaster recovery solutions compared in this document include:

• Zerto Hypervisor-based Replication

• Array-based Replication with and without SRM

• Host / Guest-based Replication

• Snapshot-based Replication

• VMware Site Recovery Manager with vSphere Replication

Boone County Health Center Runs Faster with Infinio
Boone County Health Center’s IT team needed a solution to improve the response times of virtual desktops during their peak times of morning usage when most employees log on for the day.
Boone County Health Center’s IT team needed a solution to improve the response times of virtual desktops during their peak times of morning usage when most employees log on for the day. Employees access electronic medical records (EMR), business reports, financial data, email and other essential applications required to manage daily operations and provide optimum patient care. Some medical staff and administrators occasionally log in from their homes on personal devices such as laptops or iPads. The Health Center initially considered purchasing an add-on all-flash array for the VDI to help eliminate slow response periods during boot storms. However, before making this type of investment, the Center wanted to explore other alternative solutions.
Why Parallel I/O & Moore's Law Enable Virtualization and SDDC to Achieve their Potential
Today’s demanding applications, especially within virtualized environments, require high performance from storage to keep up with the rate of data acquisition and unpredictable demands of enterprise workloads. In a world that requires near instant response times and increasingly faster access to data, the needs of business-critical tier 1 enterprise applications, such as databases including SQL, Oracle and SAP, have been largely unmet.

Today’s demanding applications, especially within virtualized environments, require high performance from storage to keep up with the rate of data acquisition and unpredictable demands of enterprise workloads. In a world that requires near instant response times and increasingly faster access to data, the needs of business-critical tier 1 enterprise applications, such as databases including SQL, Oracle and SAP, have been largely unmet. 

The major bottleneck holding back the industry is I/O performance. This is because current systems still rely on device -level optimizations tied to specific disk and flash technologies since they don’t have software optimizations that can fully harness the latest advances in more powerful server system technologies such as multicore architectures. Therefore, they have not been able to keep up with the pace of Moore’s Law.

FlexApp: Application Layering Technology
FlexApp Application Layering in ProfileUnity enables applications to be virtualized in such an innate way that they look native to the Windows OS and other applications.
FlexApp Application Layering in ProfileUnity enables applications to be virtualized in such an innate way that they look native to the Windows OS and other applications.

Application Layering leads to much higher rates of compatibility than previous technologies which used Application Isolation to virtualize applications. Once applications have been packaged for layering, they are containerized on virtual hard disks (VHDs) or VMDKs.  They can be centrally assigned to users on a machine-level or “context-aware” basis.

This whitepaper provides an overview of FlexApp concepts and ways in which FlexApp can serve as a cornerstone in an application delivery strategy.
Replication Software for the VMware ESXi Hypervisor
Zerto protects virtualized applications with the same robust and effective recovery previously available only with complex and expensive array based replication solutions.

Zerto protects virtualized applications with the same robust and effective recovery previously available only with complex and expensive array based replication solutions. With Zerto you get:

  •         Scalability
  •         Ease of management
  •         A Hardware agnostic solutions