Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 24 white papers, page 1 of 2.
Liquidware Labs ProfileUnity and its Role as a Disaster Recovery Solution
As desktop operating systems become more and more complex, the need for a proper disaster recovery methodology on the desktop is increasingly crucial, whether the desktop is physical or virtual. In addition, many enterprise customers are leveraging additional technologies, including local hard drive encryption, persistent virtual images and non‐persistent virtual images. This paper provides an overview of these issues and outlines how disaster recovery (DR) plan, coupled with Liquidware Labs Pro
Many corporations around the globe leverage Virtual Desktop Infrastructure (VDI) as a strategic, cost‐effective methodology to deliver business continuity for user applications and data. Virtualization renders a physical computer made of metal, plastic and silica as a portable file that can be moved through a network from a data center to a disaster recovery (DR) site. Although this may sound easy, transferring virtual machine files can be challenging for corporate networks in a number of ways. Moving large amounts of data is a time consuming process that may take days to complete. Moreover, once archival process is complete, the data is effectively out of date or out of context. As a response various strategies focus on leaving the bulk of the data transferred and only updating and replicating the changes in data. Desktop infrastructure is particularly sensitive to the issue of synchronization so applications run properly. The challenge is keeping desktops in sync because desktops, applications and data change often. This has given birth to a whole new set of strategies and software unique to desktops to accomplish backups safely and effectively. Liquidware Labs’ ProfileUnity™ is a best of breed solution that provides a seamless end user DR experience identical to the one at the home office.
5 Fundamentals of Modern Data Protection
Some data protection software vendors will say that they are “agentless” because they can do an agentless backup. However, many of these vendors require agents for file-level restore, proper application backup, or to restore application data. My advice is to make sure that your data protection tool is able to address all backup and recovery scenarios without the need for an agent.
Legacy backup is costly, inefficient, and can force IT administrators to make risky compromises that impact critical business applications, data and resources. Read this NEW white paper to learn how Modern Data Protection capitalizes on the inherent benefits of virtualization to:
  • Increase your ability to meet RPOs and RTOs
  • Eliminate the need for complex and inefficient agents
  • Reduce operating costs and optimize resources
The Expert Guide to VMware Data Protection
Virtualization is a very general term for simulating a physical entity by using software. There are many different forms of virtualization that may be found in a data center including server, network and storage virtualization. When talking about server virtualization there are many unique terms and concepts that you may hear that are part of the technology that makes up server virtualization.
Virtualization is the most disruptive technology of the decade. Virtualization-enabled data protection and disaster recovery is especially disruptive because it allows IT to do things dramatically better at a fraction of the cost of what it would be in a physical data center.

Chapter 1: An Introduction to VMware Virtualization

Chapter 2: Backup and Recovery Methodologies

Chapter 3: Data Recovery in Virtual Environments

Chapter 4: Learn how to choose the right backup solution for VMware
Optimizing Capacity Forecasting Processes with a Capacity Reservations System for IT
Virtually every area of human endeavour that involves the use of shared resources relies on a reservation system to manage the booking of these assets. Hotels, airlines, rental companies and even the smallest of restaurants rely on reservation systems to optimize the use of their assets and balance customer satisfaction with profitability. Or, as economists would say, strike a balance between supply and demand.

Virtually every area of human endeavour that involves the use of shared resources relies on a reservation system to manage the booking of these assets. Hotels, airlines, rental companies and even the smallest of restaurants rely on reservation systems to optimize the use of their assets and balance customer satisfaction with profitability. Or, as economists would say, strike a balance between supply and demand.

So how can a modern IT environment expect to operate effectively without having a functioning capacity reservation system? The simple answer is that it can't. With the rise of cloud computing, where resources are shared on a larger scale and capacity is commoditized, modeling future bookings and proper forecasting of demand is critical to the survival of IT. Not having proper systems in place leaves forecasting to trending and guesswork - a dangerous proposition that usually results in over-provisioning and excessive capacity.

Download this paper to learn how to manage the demand pipeline for new workload placements in order to improve the accuracy of capacity forecasting and increase agility in response to new workload placement requests.

How to avoid VM sprawl and improve resource utilization in VMware and Veeam backup infrastructures
You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

Getting virtual sprawl under control will help you reallocate and better provision your existing storage, CPU and memory resources between critical production workloads and high-performance, virtualized applications. With proper resource management, you can save money on extra hardware.

This white paper examines how you can avoid potential VM sprawl risks and automate proactive monitoring by using Veeam ONE, a part of Veeam Availability Suite. Veeam ONE will arm you with a list of VM sprawl indicators and explain how you can pick up and configure a handy report kit to detect and eliminate VM sprawl threats in your VMware environment.

Read this FREE white paper and learn how to:

  • Identify “zombies”
  • Clean up garbage and orphaned snapshots
  • Establish a transparent system to get sprawl under control
  • And more!
Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
Scale Computing’s hyperconverged system matches the needs of the SMB and mid-market
Scale Computing HC3 is cost effective, scalable and designed for installation and management by the IT generalist
Everyone has heard the buzz about hyper-converged systems – appliances with compute, storage and virtualization infrastructures built in – these days. Hyper-converged infrastructure systems are an extension of infrastructure convergence – the combination of compute, storage and networking resources in one compact box – that promise of simplification by consolidating resources onto a commodity x86 server platform.
Why Parallel I/O & Moore's Law Enable Virtualization and SDDC to Achieve their Potential
Today’s demanding applications, especially within virtualized environments, require high performance from storage to keep up with the rate of data acquisition and unpredictable demands of enterprise workloads. In a world that requires near instant response times and increasingly faster access to data, the needs of business-critical tier 1 enterprise applications, such as databases including SQL, Oracle and SAP, have been largely unmet.

Today’s demanding applications, especially within virtualized environments, require high performance from storage to keep up with the rate of data acquisition and unpredictable demands of enterprise workloads. In a world that requires near instant response times and increasingly faster access to data, the needs of business-critical tier 1 enterprise applications, such as databases including SQL, Oracle and SAP, have been largely unmet. 

The major bottleneck holding back the industry is I/O performance. This is because current systems still rely on device -level optimizations tied to specific disk and flash technologies since they don’t have software optimizations that can fully harness the latest advances in more powerful server system technologies such as multicore architectures. Therefore, they have not been able to keep up with the pace of Moore’s Law.

Zerto Offsite Cloud Backup & Data Protection
Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Zerto Offsite Backup in the Cloud

What is Offsite Backup?

Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Why Cloud Backup?

  • Offsite Backup combines replication and long retention in a new way
  • The repository can be located in public cloud storage, a private cloud, or as part of a hybrid cloud solution.
  • Copies are saved on a daily, weekly and monthly schedule.
  • The data volumes and configuration information are included to allow VM backups to be restored on any compatible platform, cloud or otherwise.
Backup is Not Replication - Backup VMware
Why Rely on Backup Shipping as Your VMware DR Solution? Some people think, if you want to protect data in your virtual VMware environment, your easiest solution is to backup VMware using snapshots or agents.

Why Rely on Backup Shipping as Your VMware DR Solution?

Some people think, if you want to protect data in your virtual VMware environment, your easiest solution is to backup VMware using snapshots or agents.  However, solutions like this, such as Veeam, can slow down your production environment, and they are difficult to scale.

However, many of us understand that backup is not disaster recovery. The right approach to a BC/DR solution is hypervisor-based replication.

With hypervisor-based replication you receive:

  • Continuous data replication
  • Recovery capabilities built specifically for VMware datacenters
  • Full consistency between and among all application components
  • Zerto’s Offsite Backup for VMware
FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
Unlock the Full Performance of Your Servers
Unlock the full performance of your servers with DataCore Adaptive Parallel I/O Software

Unlock the full performance of your servers with DataCore Adaptive Parallel I/O Software.

The Problem:

Current systems don't have software optimizations that can fully harness the latest advances in more powerful server system technologies.

As a result, I/O performance has been the major bottleneck holding back the industry.

Performance Monitoring for Your Citrix Infrastructure - Considerations & Checklist
Citrix environments incorporate numerous components as well as diverse back-end application elements and user-specific items – all complex variables that can affect the user experience. This white paper provides a checklist of monitoring-related criteria that should be considered as part of due diligence by enterprises and service providers to effectively manage the performance of their complex Citrix infrastructures
Normal 0 false false false EN-US X-NONE X-NONE

Numerous components as well as diverse back-end application elements and user-specific items comprise today’s complex Citrix infrastructures and all can affect the user experience. At any given time, one or more of these components may fail or experience an issue and service organizations spend a significant amount of time and effort diving into each of the various components in order to properly address and resolve problems.

Download this white paper to get a comprehensive checklist of monitoring-related criteria that should be considered as part of due diligence by enterprises and service providers to effectively manage performance of their complex Citrix infrastructures. Jo Harder, Application and Desktop Virtualization Analyst, details a checklist for importance level and vendor consideration broken out into the following categories:

  • Monitoring of all Datacenter Components
  • Monitoring of User Experience
  • Monitoring of Citrix Key Performance Indicators
  • Administration and Reporting
  • Monitoring System Functionality
  • Vendor Support and Product Development
Vembu Changes the Dynamics of Data Protection for  Business Applications in a vSphere Environment
This paper examines how to use Vembu BDR to implement distributed backup and disaster recovery (DR) operations in a centrally managed data protection environment with an ingenious twist. Rather than store image backups of VMs and block-level backups of physical and VM guest host systems as a collection of backup files, Vembu BDR utilizes a document-oriented database as a backup repository, dubbed VembuHIVE, which Vembu virtualizes as a file system.
Normal 0 false false false EN-US X-NONE X-NONE In this analysis, openBench Labs assesses the performance and functionality of the Vembu Backup & Disaster Recovery (BDR) host-level (a.k.a. agentless) data protection solution in a VMware vSphere 5.5 HA Cluster. For this test they utilized a vSphere VM configured with three logical disks located on separate datastores to support an Exchange server with two mailbox databases. Each of the mailbox databases was configured to support 1,000 user accounts.

This paper provides technically savvy IT decision makers with the detailed performance and resource configuration information needed to analyze the trade-offs involved in setting up an optimal data protection and business continuity plan to support a service level agreement (SLA) with line of business (LoB) executives.

To test backup performance, they created 2,000 AD users and utilized LoadGen to generate email traffic. Each user received 120 messages and sent 20 messages over an 8-hour workday. Using this load level, we established performance baselines for a data protection using direct SAN-based agentless VM backups.

In this scenario they were able to :

  • Finish crash-consistent incremental agent-less backups in 18 minutes, while processing our base transaction load of 12 Outlook TPS.
  • Restore a fully functional VM in less than 5 minutes as a Hyper-V VM capable of sustaining an indefinite load of 4 Outlook TPS
  • Recover all user mailboxes as .pst files from a host-level agentless VM backup with no need to schedule a Windows Client backup initiated within the VM’s guest Windows OS.
In a DR scenario, Vembu leverages the ability to restore a VM in any format, to provide an Instant-boot function, When Vembu Backup Server is installed on a server that is concurrently running Hyper-V, Vembu exports the datastores associated with a VM backup as Hyper-V disks and configures a VM to boot from the datastores.
True 15-Minute RTO for Mission-Critical VM Systems with Vembu VMBackup Replication
Vembu Backup & Disaster Recovery (BDR) provides IT with a Disaster Recovery Management (DRM) system capable of meeting even more aggressive RTO and RPO goals than the previous release. For highly active database-driven systems, Vembu VMBackup leverages VMtools and VMware Changed Block Tracking (CBT) to perform incremental backups in 15-minute intervals with minimal impact on query processing. As a result, IT can limit data loss to 15 minutes of processing on active mission critical VMs.

The only way to recover a VM with full functionality and full performance without performing an explicit restore operation is through VM replication. Maintaining a replica VM, however, requires frequent and potentially expensive update processes that involve both explicit backup and implicit restore operations. To enable the extensive use of replication by IT, VMBackup adds critical optimizations to both restore and replication operations that dramatically minimize overhead on ESXi hosts and production VMs to just VM snapshot processing. Specifically, a BDR Backup server running on a VM is able to leverage hot-add SCSI transfer mode to write logical disk and logical disk snapshot files directly to a vSphere datastore, without involving the ESXi host for anything more than creating a VM snapshot.

A key a value proposition for Vembu VMBackup is its ability to directly read and write all backup and restore data directly to and from a datastore snapshot. As a result, Vembu VMBackup offloads all I/O overhead from production VMs and ESXi hosts, which is critical for maintaining an aggressive DRM strategy in a highly active virtual environment. What’s more, the performance of Vembu VMBackup in openBench lab's test environment made it possible to enhance support for a mission-critical OLTP application running on a VM using a combination of incremental backups for backup and replication. As a result, they were able to comply with a 30-minute RPO, restore the VM to a production environment in 5 minutes, and return to full-production level processing of business transactions—850 cTPS—in under 15 minutes.

VMBackup adds a new replica management module that enables an IT administrator to fully manage an initial failover and later finalize failover or failback with consolidation. In addition, BDR backup server simplifies all management functions by eliminating the need to run a separate client module on a BDR backup server, which becomes its own client within the BDR reporting hierarchy.

Vembu: The Biggest Little Data Protection Company You Probably Haven't Heard Of (Yet)
Vembu wants to do more to let people know that it exists—it wants its own name to be in the marketplace and attached to its products—especially after hearing from many customers who desire to know whom the products they rely on truly belong to. So, in the past year, Vembu established relationships with more VARs and reached out directly to select enterprise and midmarket segments. It added 400 channel partners, 180 VARs, and 300 customers in 2014 alone.

If it appears that this analyst is impressed with Vembu, he is. Vembu’s feature set surpasses what one might presume to come from a backup company that most folks (in North America at least) haven’t heard of.And although it would be easy to assume that some of Vembu’s capabilities are mere boasts, the hesitations wash away with the recognition that this is a vendor with ten years in the business, and that well over half its workforce are R&D engineers. Said another way, Vembu appears to have been quietly solving its customers’ backup challenges for more than a decade through technology, instead of marketing.

In fact, not only did Vembu not have a marketing team until 2015, but it also didn’t have a sales team to speak of. This is an incredibly engineering-focused company—one whose revenues and customers have accumulated through word of mouth. But now, Vembu is building out a solid U.S.-based sales and marketing engine focused on penetrating awareness among IT decision makers, especially decision makers in the SMB segment.

The product Vembu will push in 2015, BDR 2.0, could be a “game changer” for Vembu’s growth. BDR appears to have the potential to quite effectively address the varied requirements of small and midmarket businesses who run mixed physical and virtual IT environments and who also want to leverage the cloud.

If Vembu continues to invest as much into its North American marketing and channel outreach programs as it historically has invested into engineering its technology, then 2015 could be the year that a lot of SMBs discover the “secret” to solving a lot of their backup problems.

European and APJ businesses may know Vembu, but many U.S. IT organizations will be surprised by the solution set of this ten-year-old company that is launching its first concerted marketing push into North America.