Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 33 - 42 of 42 white papers, page 3 of 3.
IBM Spectrum Protect Plus Overview
IBM Spectrum Protect Plus is a new data protection and availability solution that simplifies VM and file recovery and access. It unlocks your data to provide value for emerging use cases, and can either be implemented as a stand-alone solution or integrate with your IBM Spectrum Protect environment to offload copies for long-term storage and governance efficiently at scale.
Organizations need a solution that focuses on virtual environments, deploys quickly without costly service engagements, and is easy to manage. For many large organizations, the solution also needs to be capable of delivering enterprise-proven scale, efficiency and data governance.

IBM Spectrum Protect Plus is a new data protection and availability solution that simplifies VM and file recovery and access. It unlocks your data to provide value for emerging use cases, and can either be implemented as a stand-alone solution or integrate with your IBM Spectrum Protect environment to offload copies for long-term storage and governance efficiently at scale.

Remove complexity in protecting your virtual infrastructure with IBM Spectrum Protect Plus
This white paper focuses on the deployment and basic setup of IBM Spectrum Protect Plus for protecting VMware. Readers will be taken through a step-by-step explanation of what is required to install and configure IBM Spectrum Protect Plus for basic backup and recovery of VMware virtual machines (VMs). Integration with Spectrum Protect for long-term data retention is also discussed.
IBM Spectrum Protect™ Plus is a new data protection and availability solution for virtual environments that can unlock your valuable data for emerging use cases. You can deploy it in minutes and have your environment fully protected within an hour. IBM Spectrum Protect Plus can be implemented as a stand-alone solution or can integrate easily with your IBM Spectrum Protect environment to off-load copies for long-term storage and governance with scale and efficiency.

This white paper focuses on the deployment and basic setup of IBM Spectrum Protect Plus for protecting VMware. Readers will be taken through a step-by-step explanation of what is required to install and configure IBM Spectrum Protect Plus for basic backup and recovery of VMware virtual machines (VMs). Integration with Spectrum Protect for long-term data retention is also discussed.
ESG Lab Review: Protecting Virtual Environments with Spectrum Protect Plus from IBM
This ESG Lab Review documents hands-on validation of the IBM Spectrum Protect Plus solution with a focus on how IBM makes deployment and management easy, while delivering multi-workflow recovery agility.
Even today, the reliable protection and recovery of virtual environments continues to be a daunting task for many IT organizations. That said, backup and recovery software does not always make VM protection and recovery easy. As an example, and perhaps most alarmingly, one in nine VM recoveries fails because the data was never backed up. When looking into why VM recoveries fail, one finds a startling range of causes. With so many challenges—the less-than-perfect track records of IT organizations when it comes to VM protection, coupled with failures to meet modern-day SLAs—it is not surprising that some respondents report they continue to lack complete confidence in their VM protection and recovery solution.

It’s apparent through the introduction of the Spectrum Protect Plus solution that these challenges have not been ignored by IBM. Now IBM customers can quickly and easily deploy a solution specifically designed to meet the challenges of virtual machine data protection and administration.
A Hybrid Approach to Big Data
We consider a scenario where a data science team needs to analyze a dataset that resides within an object storage service on a public cloud. This is a common scenario when an externally exposed service is deployed on a public cloud and telemetry data is stored for future analysis. In this scenario, we make use of a specific set of technologies which are representative of those that are typically adopted as part of big data and cloud computing deployment paradigms. We demonstrate how you can us

All IT managers understand the critical role they play in ensuring that the enterprise computing infrastructure under their control is effective in meeting the business goals of the organization. Indeed, staying competitive in the rapidly evolving world of today requires that businesses take a proactive mindset towards leveraging their IT investments to deliver key insights through big data initiatives.

The adoption of this mentality is often reflected by the inclusion of dedicated data science teams capable of driving these projects. These groups apply advanced analytical algorithms and artificial intelligence to large datasets with a goal of deriving competitive advantages for the organization.

The specific implementations vary and may impact a variety of business processes such as product development, marketing initiatives, sales management, etc. However, as the adoption of these practices continues to increase, IT teams need to be prepared to effectively support them. While on the surface it may seem that big data workloads are simply another application to deploy and manage, in practice they entail multiple challenges.

In this paper, we demonstrate the ability to implement a big data use case in practice using a hybrid cloud deployment strategy. We provide an overview of our sample scenario, followed by a detailed deployment walk through that enables users to easily replicate the scenario in their own environments. By the end of this paper, readers should have a clear understanding of how big data use cases can be implemented using the underlying technologies covered and how the adoption of hybrid cloud computing environments enables IT leaders to successfully meet the needs of these initiatives within their organizations.

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

Solution Guide for Sennheiser Headsets, IGEL Endpoints and Skype for Business on Citrix VDI
Topics: IGEL, Citrix, skype, VDI
Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Virtualizing Windows applications and desktops in the data center or cloud has compelling security, mobility and management benefits, but delivering real-time voice and video in a virtual environment is a challenge. A poorly optimized implementation can increase costs and compromise user experience. Server scalability and bandwidth efficiency may be less than optimal, and audio-video quality may be degraded.

Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

The Next Generation VDI Reference Architecture on Cloudistics Ignite
Desktop and application virtualization is one of the primary ways how businesses reduce CapEx and OpEx, improve time to market, efficiency, increase control, and expand connectivity. VDI enables users to now access their desktops hosted in a data center server as virtual machines, which can be accessed from laptops and thin clients. Although desktop virtualization has existed for many years, many implementers of the technology have discovered that significant hurdles need to be overcome to fully

Desktop and application virtualization is one of the primary ways how businesses reduce CapEx and OpEx, improve time to market, efficiency, increase control, and expand connectivity. VDI enables users to now access their desktops hosted in a data center server as virtual machines, which can be accessed from laptops and thin clients. Although desktop virtualization has existed for many years, many implementers of the technology have discovered that significant hurdles need to be overcome to fully reap its benefits.

This document defines a set of architectural blocks for building a multitenant, Virtual Desktop Infrastructure in and application services on the Cloudistics platform.
This document includes 2 major sections:

  • VDI Solution Architecture
  • Overview of Cloudistics Ignite Platform Components (Appendix A)
The primary goal of this VDI architecture is to enable service providers and IT departments to create secure, scalable, and reliable desktop hosting solution offers for small- and medium-sized organizations ranging from 500 to 1,000 users. The intended audience is hosting providers, and IT departments who want to leverage the Cloudistics infrastructure services to deliver desktop hosting services to multiple tenants.

To deliver a desktop hosting solution, service provider partners can leverage Windows Server and the Windows Desktop Experience feature to deliver Windows users a highly performant application experience that is familiar to business users and consumers.

Citrix UPM and AppDisk Comparison to ProfileUnity and FlexApp
Citrix XenDesktop and XenApp delivers full Windows VDI, hosted session desktops, as well as applications to meet the demands of an expansive variety of use cases, allowing employees to access their apps, desktops and data without the limitations of traditional Windows desktop solutions.
Citrix XenDesktop and XenApp delivers full Windows VDI, hosted session desktops, as well as applications to meet the demands of an expansive variety of use cases, allowing employees to access their apps, desktops and data without the limitations of traditional Windows desktop solutions. Citrix is known all over the world for its leading desktop solutions — for good reason: Citrix expertly solves Windows delivery and desktop challenges for customers. In order to make the Citrix desktop experience seamless for end users and desktop administrators, Citrix currently provides basic solutions that solve some longstanding Windows challenges in two key areas – User Profile Management and Application Layering. Liquidware Labs – a Citrix Ready Premier partner – also offers solutions that address the challenges of User Profile Management and Application Layering in Windows desktop environments. Our ProfileUnity solution offers full-featured User Environment Management (which encompasses User Profile Management). FlexApp, which can be integrated with ProfileUnity or used as a stand-alone solution, addresses the area of application layering. This paper initially covers the topics of profile management and user environment management, and then shifts focus to Application Layering. The purpose of this document is to outline the typical uses cases for the Citrix solutions, and then go on to explain when it is more appropriate to utilize the more sophisticated ProfileUnity with FlexApp solution to more completely address gaps in the desktop environment.
FlexApp Application Layering for Citrix XenApp and XenDesktop
Citrix XenDesktop and XenApp delivers full Windows VDI, hosted session desktops, as well as applications to meet the demands of an expansive variety of use cases, allowing employees to access their apps, desktops and data without the limitations of traditional Windows desktop solutions.
Citrix XenDesktop and XenApp delivers full Windows VDI, hosted session desktops, as well as applications to meet the demands of an expansive variety of use cases, allowing employees to access their apps, desktops and data without the limitations of traditional Windows® desktop solutions. Citrix is known all over the world for its leading desktop solutions — for good reason: Citrix expertly solves Windows delivery and desktop challenges for customers. In order to make the Citrix desktop experience seamless for end users and desktop administrators, Citrix currently provides basic solutions that solve some longstanding Windows challenges in two key areas – User Profile Management and Application Layering. Liquidware Labs – a Citrix Ready Premier partner – also offers solutions that address the challenges of User Profile Management and Application Layering in Windows desktop environments. Our ProfileUnity solution offers full-featured User Environment Management (which encompasses User Profile Management). FlexApp, which can be integrated with ProfileUnity or used as a stand-alone solution, addresses the area of application layering. This paper initially covers the topics of profile management and user environment management, and then shifts focus to Application Layering. The purpose of this document is to outline the typical uses cases for the Citrix solutions, and then go on to explain when it is more appropriate to utilize the more sophisticated ProfileUnity with FlexApp solution to more completely address gaps in the desktop environment.
Optimizing Performance for Office 365 and Large Profiles with ProfileUnity ProfileDisk
Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them.

Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them. Note that additional profile challenges and solutions are covered in a related ProfileUnity whitepaper entitled “User Profile and Environment Management with ProfileUnity.” To efficiently manage the complex challenges of today’s diverse Windows profile environments, Liquidware ProfileUnity exclusively features two user profile technologies that can be used together or separately depending on the use case.

These include:

1. ProfileDisk, a virtual disk based profile that delivers the entire profile as a layer from an attached user VHD or VMDK, and

2. Profile Portability, a file and registry based profile solution that restores files at login, post login, or based on environment triggers.