Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 17 - 29 of 29 white papers, page 2 of 2.
How to Plan for Disaster Recovery
Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.
Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.
 
Although no prevention method is 100% fool proof, risk avoidance and taking proactive measures for preparedness are essential elements of the disaster recovery process. Still despite all the measures you take to avoid a disaster, you must assume that a disaster will happen. Having this mind-set will help shape your decisions when it comes to planning for IT disaster recovery.
UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

DR 101 EBook
Disaster Recovery 101: Everything you wanted to know about DR….but were afraid to ask!
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.

This 101 guide will educate you on topics like:
  • How to evaluate replication technologies
  • Measuring the cost of downtime
  • How to test your Disaster Recovery plan
  • Reasons why backup isn’t Disaster Recovery
  • Tips for leveraging the cloud
  • Mitigating IT threats like ransomware
IBM Spectrum Protect Plus Overview
IBM Spectrum Protect Plus is a new data protection and availability solution that simplifies VM and file recovery and access. It unlocks your data to provide value for emerging use cases, and can either be implemented as a stand-alone solution or integrate with your IBM Spectrum Protect environment to offload copies for long-term storage and governance efficiently at scale.
Organizations need a solution that focuses on virtual environments, deploys quickly without costly service engagements, and is easy to manage. For many large organizations, the solution also needs to be capable of delivering enterprise-proven scale, efficiency and data governance.

IBM Spectrum Protect Plus is a new data protection and availability solution that simplifies VM and file recovery and access. It unlocks your data to provide value for emerging use cases, and can either be implemented as a stand-alone solution or integrate with your IBM Spectrum Protect environment to offload copies for long-term storage and governance efficiently at scale.

Remove complexity in protecting your virtual infrastructure with IBM Spectrum Protect Plus
This white paper focuses on the deployment and basic setup of IBM Spectrum Protect Plus for protecting VMware. Readers will be taken through a step-by-step explanation of what is required to install and configure IBM Spectrum Protect Plus for basic backup and recovery of VMware virtual machines (VMs). Integration with Spectrum Protect for long-term data retention is also discussed.
IBM Spectrum Protect™ Plus is a new data protection and availability solution for virtual environments that can unlock your valuable data for emerging use cases. You can deploy it in minutes and have your environment fully protected within an hour. IBM Spectrum Protect Plus can be implemented as a stand-alone solution or can integrate easily with your IBM Spectrum Protect environment to off-load copies for long-term storage and governance with scale and efficiency.

This white paper focuses on the deployment and basic setup of IBM Spectrum Protect Plus for protecting VMware. Readers will be taken through a step-by-step explanation of what is required to install and configure IBM Spectrum Protect Plus for basic backup and recovery of VMware virtual machines (VMs). Integration with Spectrum Protect for long-term data retention is also discussed.
ESG Lab Review: Protecting Virtual Environments with Spectrum Protect Plus from IBM
This ESG Lab Review documents hands-on validation of the IBM Spectrum Protect Plus solution with a focus on how IBM makes deployment and management easy, while delivering multi-workflow recovery agility.
Even today, the reliable protection and recovery of virtual environments continues to be a daunting task for many IT organizations. That said, backup and recovery software does not always make VM protection and recovery easy. As an example, and perhaps most alarmingly, one in nine VM recoveries fails because the data was never backed up. When looking into why VM recoveries fail, one finds a startling range of causes. With so many challenges—the less-than-perfect track records of IT organizations when it comes to VM protection, coupled with failures to meet modern-day SLAs—it is not surprising that some respondents report they continue to lack complete confidence in their VM protection and recovery solution.

It’s apparent through the introduction of the Spectrum Protect Plus solution that these challenges have not been ignored by IBM. Now IBM customers can quickly and easily deploy a solution specifically designed to meet the challenges of virtual machine data protection and administration.
Ovum: Igel's Security Enhancements for Thin Clients
Thin client vendor Igel is enhancing the security capabilities of its products, both under its own steam and in collaboration with technology partners. Ovum sees these developments as important for the next wave of thin client computing, which will be software-based – particularly if the desktop-as-a-service (DaaS) market is to take off.

With hardware-based thin client shipments in the region of 4–5 million units annually, this market is still a drop in the ocean compared to the 270 million PCs shipping each year, though the latter figure has been declining since 2011. And within the thin client market, Igel is in fourth place behind Dell and HP (each at around 1.2 million units annually) and China’s Centerm, which only sells into its home market.

However, the future for thin clients looks bright, in that the software-based segment of the market  (which some analyst houses refuse to acknowledge) is expanding, particularly for Igel. Virtual desktop infrastructure (VDI) technology has stimulated this growth, but the greatest promise is probably in the embryonic DaaS market, whereby enterprises will have standard images for their workforce hosted by service providers.

Demystifying Hybrid Solutions and Architecture
Digital transformation projects have accelerated the adoption of new technologies and a multitude of cloud services. Infrastructure and operations (I&O) professionals face exacerbated challenges associated with managing an increasingly diverse environment. In response, vendors have saturated the market with confusing hybrid products and solutions that vary vastly in capabilities. This report provides clarity about and categorization of hybrid architectures to help I&O professionals evolve ope

Digital transformation projects have accelerated the adoption of new technologies and a multitude of cloud services. Infrastructure and operations (I&O) professionals face exacerbated challenges associated with managing an increasingly diverse environment.

In response, vendors have saturated the market with confusing hybrid products and solutions that vary vastly in capabilities.
This report provides clarity about and categorization of hybrid architectures to help I&O professionals evolve operational models and select services based on their unique requirements.

Key Takeaways

More Options Mandate New Technology Roles, Skills, And Responsibilities
Hybrid injects more technologies into an already complex mix of choices. Seek to simplify with automation, supply chain management, and software coding representing some key new demands. Adapt your organization to meet these demands; old-school IT methods crumble in the new hybrid systems.

Consider Processes, Skills, And Applications As Hybrid Models Move Beyond Just Cloud
Forrester classifies four hybrid architecture models. Cloud may seem obvious, but operations, infrastructure, and applications may not. They're just as important — and maybe even more so in your environment.

Formulate A DevOps Philosophy To Permeate Every Corner Of Your Business
Development and operations (DevOps) and Agile methodologies and philosophies are popular because they encourage speed over perfection. Now pervasive in application development and delivery, these principles offer value everywhere — especially in hybrid architectures.

IT Infrastructure Risk Management
When implementing new IT infrastructure there are always risks. These risks include under-provisioning or over-provisioning, hardware incompatibility, software incompatibility, network issues and outages, migration issues, downtime, disaster recovery, vendor reliability, and unexpected costs. These risks can be inflated when ripping and replacing an entire infrastructure, but that doesn’t have to be the case. Hyperconverged infrastructure solutions like HC3 from Scale Computing can reduce or eve
When implementing new IT infrastructure there are always risks. These risks include under-provisioning or over-provisioning, hardware incompatibility, software incompatibility, network issues and outages, migration issues, downtime, disaster recovery, vendor reliability, and unexpected costs. These risks can be inflated when ripping and replacing an entire infrastructure, but that doesn’t have to be the case. Hyperconverged infrastructure solutions like HC3 from Scale Computing can reduce or even eliminate risks that have become common with traditional virtualization infrastructure.
Disaster Recovery Strategies with Scale Computing
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT i
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT infrastructure must be both resilient and highly available to keep organizations operational.

In our HC3 architecture, keeping in mind our typical simplicity and ease of use, we have built-in a number of disaster recovery capabilities. These allow our users to recover quickly from a variety of disasters that may affect anywhere from a single file to an entire site. Disaster recovery is often planned for and measured in terms of recovery point objective (RPO) and recovery time objective (RTO). HC3 provides features to achieve both RPO and RTO measured in minutes to minimize both downtime and data loss.
High Availability Clusters in VMware vSphere without Sacrificing Features or Flexibility
This paper explains the challenges of moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Many large enterprises are moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources.

Realizing these benefits with business critical applications, such as SQL Server or SAP can pose several challenges. Because these applications need high availability and disaster recovery protection, the move to a virtual environment can mean adding cost and complexity and limiting the use of important VMware features. This paper explains these challenges and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Data Protection Overview and Best Practices
This white paper works through data protection processes and best practices using the Tintri. Tintri technology is differentiated by its level of abstraction—the ability to take every action on individual virtual machines.
This white paper works through data protection processes and best practices using the Tintri. Tintri technology is differentiated by its level of abstraction—the ability to take every action on individual virtual machines. In this paper, you’ll:

1) Learn how that greatly increases the precision and efficiency of snapshots for data protection
2) Explore the ability to move between recovery points
3) Analyze the behavior of individual virtual machines
4) Predict the need for additional capacity and performance for data protection

If you’re focused on building a successful data protection solution, this document targets key best practices and known challenges. Hypervisor administrators and staff members associated with architecting, deploying and administering a data protection and disaster recovery solution will want to dig into this document to understand how Tintri can save them the majority of their management effort and greatly reduce operating expense.
Application & Desktop Delivery for Dummies
In this book, you learn how solutions, such as Parallels Remote Application Server (RAS), replace traditional application deployment with on-demand application delivery, and why it's right for your organization.
Applications are essential to the businesses and organizations of all sizes and in all industries. End-users need to have continuous and reliable access to their applications whether working in the office or remotely, at any time of the day or night, and from any device. With the advent of cloud computing, office desktops with installed applications (that had to be constantly updated) have become a thing of the past — application streaming, virtual desktop infrastructure (VDI), and hosted applications are the future (and the present, for that matter). Application virtualization is an easy way to manage, distribute, and maintain business applications. Virtualized applications run on a server, while end-users view and interact with their applications over a network via a remote display protocol. Remote applications can be completely integrated with the user’s desktop so that they appear and behave like local applications. Today, you can dynamically publish applications to remote users in several ways. The server-based operating system (OS) instances that run remote applications can be shared with other users (a terminal services desktop), or the application can be running on its own OS instance on the server (a VDI desktop).