Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 17 - 32 of 41 white papers, page 2 of 3.
Solution Guide for Sennheiser Headsets, IGEL Endpoints and Skype for Business on Citrix VDI
Topics: IGEL, Citrix, skype, VDI
Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Virtualizing Windows applications and desktops in the data center or cloud has compelling security, mobility and management benefits, but delivering real-time voice and video in a virtual environment is a challenge. A poorly optimized implementation can increase costs and compromise user experience. Server scalability and bandwidth efficiency may be less than optimal, and audio-video quality may be degraded.

Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

IGEL Software Platform Step by Step Getting Started Guide
Welcome to the IGEL Software Platform: Step-by-Step Getting Started Guide. The goal for this project is to provide you with the tools, knowledge, and understanding to download the IGEL Platform trial software and perform basic installation and configuration without being forced to read many manuals and numerous web support articles.

Welcome to the IGEL Software Platform: Step-by-Step Getting Started Guide. My goal for this project is to provide you with the tools, knowledge, and understanding to download the IGEL Platform trial software and perform basic installation and configuration without being forced to read many manuals and numerous web support articles.

This document will walk you, step-by-step, through what is required for you to get up and running in a proof-of-concept or lab scenario. When finished, you will have a fully working IGEL End-Point Management Platform consisting of the IGEL Universal Management Suite (UMS), IGEL Cloud Gateway (ICG) and at least one IGEL OS installed, connected and centrally managed! 

Delivering a CI/CD Pipeline On-Prem - Solution Reference
In this solution reference, we demonstrate the ability to implement web services delivered through CI/CD using the Stratoscale private cloud environment. Specifically, we utilize an open source workplace messaging service, as an example web application along with Jenkins, an open source automation server which includes support for continuous delivery use cases. We provide an overview of our sample scenario, followed by a detailed deployment walk through that enables readers to easily replicate t

Modern enterprise IT teams are increasingly adopting cloud computing technologies as a foundational component of their strategy to deliver business value for internal stakeholders.

While public cloud infrastructures are often an initial launching point for experimenting with these environments, private cloud solutions are an attractive alternative due to their ability to meet specific functional and security requirements while extending comparable benefits. To truly realize the potential of these investments, however, organizations need to be able to instantiate their high value use cases via private cloud capabilities such as those offered by Stratoscale’s solution.

A critical area of responsibility for IT teams is that they identify appropriate solutions for line-of-business (LOB) applications to meet the requirements of the business units that they support. As part of this, they take on the ownership of deploying, managing, and accommodating the customization of these workloads as needed. Many applications capable of meeting LOB requirements today are packaged and delivered as web services due to the fact that these configurations offer multiple operational advantages including scalability and resiliency. In addition, they allow providers to meet demands from users that they be able to access application functionality seamlessly across their various screens including desktops and mobile devices. For IT teams, this translates into the need for deploying internal facing web services using their private cloud infrastructures.

As opposed to traditional desktop software which may be updated on an infrequent basis, web services engender a model where functionality is continuously under development. This implies that IT teams work closely with developers to ensure that application improvements are released to users in a methodical and timely manner. Continuous integration and continuous delivery (CI/CD) pipelines can be built to accommodate this interaction so that value created by developers can be rapidly and safely delivered to users in an iterative manner.

CISO's Investigate: Endpoint Security
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down.
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down.
 
Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. The result is a much larger attack surface, one that is hard to protect with traditional approaches - and one that is growing faster than ever before as users adopt new types of devices, new applications, and new services. Often, companies don't even know all the tools that their employees are using.
 
At the same time, the potential threats that enterprises are facing have grown significantly in variety, capabilities, and size.  Today’s malware, once it gets a foothold, can spread quickly.  As a result, the damage caused by the attacks has also been increasing at a staggering pace, with ransomware alone reportedly crossing the $1 billion revenue threshold in 2016.
In this new age of cyberwar, endpoint devices are the front line.
 
In this valuable and informative report, leading security experts examine the new tools that they have at their disposal, including next generation endpoint protection.
The Next Generation VDI Reference Architecture on Cloudistics Ignite
Desktop and application virtualization is one of the primary ways how businesses reduce CapEx and OpEx, improve time to market, efficiency, increase control, and expand connectivity. VDI enables users to now access their desktops hosted in a data center server as virtual machines, which can be accessed from laptops and thin clients. Although desktop virtualization has existed for many years, many implementers of the technology have discovered that significant hurdles need to be overcome to fully

Desktop and application virtualization is one of the primary ways how businesses reduce CapEx and OpEx, improve time to market, efficiency, increase control, and expand connectivity. VDI enables users to now access their desktops hosted in a data center server as virtual machines, which can be accessed from laptops and thin clients. Although desktop virtualization has existed for many years, many implementers of the technology have discovered that significant hurdles need to be overcome to fully reap its benefits.

This document defines a set of architectural blocks for building a multitenant, Virtual Desktop Infrastructure in and application services on the Cloudistics platform.
This document includes 2 major sections:

  • VDI Solution Architecture
  • Overview of Cloudistics Ignite Platform Components (Appendix A)
The primary goal of this VDI architecture is to enable service providers and IT departments to create secure, scalable, and reliable desktop hosting solution offers for small- and medium-sized organizations ranging from 500 to 1,000 users. The intended audience is hosting providers, and IT departments who want to leverage the Cloudistics infrastructure services to deliver desktop hosting services to multiple tenants.

To deliver a desktop hosting solution, service provider partners can leverage Windows Server and the Windows Desktop Experience feature to deliver Windows users a highly performant application experience that is familiar to business users and consumers.

The Next Generation Clusterless Federation Design in the Cloudistics Cloud Platform
Is there another way to manage your VMs? Yes, the introduction of the Cloudistics Cloud Platform has an innovative approach – non-clustered (or clusterless) federated design.The clusterless federation of the Cloudistics Cloud platform uses categories and tags to characterize computer nodes, migration zones, and storage groups (or blocks). With these benefits: ⦁ Node Limits Are A Thing of the Past. ⦁ Locking limitations are removed. ⦁ Flexibility is Enhanced. ⦁ Ladders of Latency are Removed. ⦁

This paper is written in the context of modern virtualized infrastructures, such as VMware or Nutanix. In such systems, a hypervisor runs on each compute node creating multiple virtual machines (VMs) per compute node. A guest OS runs inside each VM.

Data associated with each VM is stored in one or more virtual disks (vDisks). A virtual disk appears like a local disk, but can be mapped to physical storage in many ways as we will discuss.

Virtualized infrastructures use clustering to provide for non-disruptive VM migration between compute nodes, for load balancing across the nodes, for sharing storage, and for high availability and failover. Clustering is well known and has been used to build
computer systems for a long time. However, in the context of virtualized infrastructures, clustering has a number of significant limitations. Specifically, as we explain below, clusters limit scalability, decrease resource efficiency, hurt performance, reduce flexibility and impair manageability.

In this paper, we will present an innovative alternative architecture that does not have these limitations of clustering. We call our new approach clusterless federation and it is the approach used in the Cloudistics platform.

The rest of this paper is organized as follows. In Section 2, we describe the limitations of clustering and in Section 3, we drive the point home by using the specific example of VMware; other virtualized systems are similar. In Section 4, we present the clusterless federated approach and show how it avoids the limitations of clustering. We summarize in Section 5.

Does Deploying Citrix in the Cloud Make Performance Monitoring Easier?
Organizations now have a variety of cloud-based options for delivering virtualized applications and desktops. Cloud deployments are fast, involve lower hardware footprint and simplify IT operations. A key question to answer in this context is whether Citrix Cloud services make performance monitoring easier than it was for on-premises deployments. Read this white paper and find out how to implement monitoring for Citrix Cloud environments.

The technology of cloud computing has caught up with virtual desktop infrastructures. Tapping into the agility and flexibility of cloud-hosted infrastructures, Citrix Cloud enables organizations to simplify digital workspace delivery. With many of the critical components of the Citrix delivery infrastructure hosted in the cloud and managed by Citrix, organizations can speed up deployment, lower hardware footprint, increase ROI, simplify IT operations. Despite the many benefits of Citrix Cloud, the performance management challenges still persist, just as they do in traditional on-premises Citrix deployments.

Read this eG Innovations white paper, and understand:

  • The two popular Citrix Cloud deployment options
  • Performance monitoring challenges in Citrix Cloud infrastructures
  • Stakeholders involved and their respective domains of responsibility
  • The various monitoring tools and options available
  • Best practices to set up performance monitoring
2018 Citrix Migration Trends - Industry Insights Report
With the end of maintenance of Citrix XenApp 6.5 approaching quickly (June 30, 2018), there is increased adoption of Citrix XenApp and XenDesktop 7.x. eG Innovations and DABCC have conducted a joint survey across 795 Citrix professionals to understand this migration trend, challenges involved, and performance expectations. Read this survey analysis report to learn how organizations are gearing up for XenApp and XenDesktop 7.x migration.

With the end of maintenance of Citrix XenApp 6.5 approaching quickly (June 30, 2018), there is increased adoption of Citrix XenApp and XenDesktop 7.x. eG Innovations and DABCC have conducted a joint survey across 795 Citrix professionals to understand this migration trend, challenges involved, and performance expectations.

Read this survey analysis report and understand how the industry is gearing up for Citrix XenApp and XenDesktop 7.x adoption:

  • The expectations from Citrix admins about the migration to XenApp/XenDesktop 7.x
  • Key factors driving adoption of 7.x
  • Challenges expected before, during and after migration
  • Citrix Cloud adoption trends
  • Performance management needs and concerns
Demystifying Hybrid Solutions and Architecture
Digital transformation projects have accelerated the adoption of new technologies and a multitude of cloud services. Infrastructure and operations (I&O) professionals face exacerbated challenges associated with managing an increasingly diverse environment. In response, vendors have saturated the market with confusing hybrid products and solutions that vary vastly in capabilities. This report provides clarity about and categorization of hybrid architectures to help I&O professionals evolve ope

Digital transformation projects have accelerated the adoption of new technologies and a multitude of cloud services. Infrastructure and operations (I&O) professionals face exacerbated challenges associated with managing an increasingly diverse environment.

In response, vendors have saturated the market with confusing hybrid products and solutions that vary vastly in capabilities.
This report provides clarity about and categorization of hybrid architectures to help I&O professionals evolve operational models and select services based on their unique requirements.

Key Takeaways

More Options Mandate New Technology Roles, Skills, And Responsibilities
Hybrid injects more technologies into an already complex mix of choices. Seek to simplify with automation, supply chain management, and software coding representing some key new demands. Adapt your organization to meet these demands; old-school IT methods crumble in the new hybrid systems.

Consider Processes, Skills, And Applications As Hybrid Models Move Beyond Just Cloud
Forrester classifies four hybrid architecture models. Cloud may seem obvious, but operations, infrastructure, and applications may not. They're just as important — and maybe even more so in your environment.

Formulate A DevOps Philosophy To Permeate Every Corner Of Your Business
Development and operations (DevOps) and Agile methodologies and philosophies are popular because they encourage speed over perfection. Now pervasive in application development and delivery, these principles offer value everywhere — especially in hybrid architectures.

Hyperconverged Infrastructure: A Brief Introduction
The term hyperconverged infrastructure (HCI) has become an industry buzzword that has been applied to a number of different new computing technologies. The misuse of the term has caused confusion for many IT professionals looking at HCI as an infrastructure solution. In this document we will shed some light on what HCI really means and why it might be the right IT solution for you.
The term hyperconverged infrastructure (HCI) has become an industry buzzword that has been applied to a number of different new computing technologies. The misuse of the term has caused confusion for many IT professionals looking at HCI as an infrastructure solution. In this document we will shed some light on what HCI really means and why it might be the right IT solution for you.
Disaster Recovery Strategies with Scale Computing
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT i
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT infrastructure must be both resilient and highly available to keep organizations operational.

In our HC3 architecture, keeping in mind our typical simplicity and ease of use, we have built-in a number of disaster recovery capabilities. These allow our users to recover quickly from a variety of disasters that may affect anywhere from a single file to an entire site. Disaster recovery is often planned for and measured in terms of recovery point objective (RPO) and recovery time objective (RTO). HC3 provides features to achieve both RPO and RTO measured in minutes to minimize both downtime and data loss.
How HC3 Lowers the Total Cost of Ownership
When considering a new IT infrastructure solution, the acquisition cost of the hardware and software to standup the infrastructure is only the starting point for cost analysis. It is important to look into the operational costs of deployment, training, licensing, scale out, downtime, and management. All of these considerations contribute to the total cost of ownership (TCO) of the solution.
When considering a new IT infrastructure solution, the acquisition cost of the hardware and software to standup the infrastructure is only the starting point for cost analysis. It is important to look into the operational costs of deployment, training, licensing, scale out, downtime, and management. All of these considerations contribute to the total cost of ownership (TCO) of the solution.

This document will dive into the TCO of the Scale Computing HC3 infrastructure solution and discuss how it compares to traditional architecture models. The combined considerations of different areas of costs will give a broader and more complete picture of how HC3 affects IT costs. With a focus on serving small and midmarket IT, Scale Computing is committed to making virtualization infrastructure both accessible and affordable for any size organization.
Secure Pull Printing Checklist: 25 Questions You Should Ask When Comparing Pull Printing Vendors
When looking for a pull printing solution, it is important address all your architecture & capability requirements. Download this complete checklist to know what questions to ask when choosing a pull printing vendor.
When looking for a pull-print vendor, it is important to remember that it is unlikely to find one solution that will address all your architecture and capability requirements. To help your search it is important to consider the following questions about solution features, and technical and architectural requirements. This complete checklist acts as a guide to help you know what questions to keep in mind when deciding upon which pull printing vendor is right for you.
Achieve Secure Cloud Printing for Microsoft Office 365 and Azure
The Microsoft Azure platform offers an open and scalable Cloud computing platform as a service, providing a highly available Virtual Machine (VM) Cloud service payable on a monthly fee. For subscribers, critical services and server functions can now be moved with relative ease but what about printing, how realistic is that? This paper explores the topic further and considers what happens when subscribers elect to migrate everything, including print servers, offsite into the Cloud and pitfalls to
The Microsoft Azure platform offers an open and scalable Cloud computing platform as a service, providing a highly available Virtual Machine (VM) Cloud service payable on a monthly fee. For subscribers, critical services and server functions can now be moved with relative ease but what about printing, how realistic is that? Users are struggling with print file sizes and resultant bandwidth issues, not to mention security and compliance concerns. This paper explores the topic further and considers what happens when subscribers elect to migrate everything, including print servers, offsite into the Cloud and pitfalls to avoid.
Time to Refocus IT on Applications
In this Uila sponsored white paper, Nick Howell and James Green talks about application-centric infrastructure management is a must for all Hybrid Cloud environments.
If you think about it, it’s always been about the application. Everything else was just a necessity – a means to an end – to run the application. Setting up, running, and maintaining the entire underlying infrastructure consumed 90% of our staff , resources, and capital expenditure each year... all to run a suite of applications.

Read this white paper to:
•    Gain insights into how Application and Infrastructure Complexity has deepened silos within organizations.
•    Come up to speed with the characteristics of other industry peer IT organizations who have a laser focus on the applications they’re delivering.
•    Arm yourself with insight on the Cloud-Induced Application-Centricity Challenges.
Essential Guide for Application-Centric Workload Migrations to Hybrid Cloud
Essential guide on migrating from the Private to the Hybrid Cloud environment.

IT leaders turn an eye toward the cloud when they’re looking to solve elasticity and scalability issues. One of the key differentiators of the cloud as compared to traditional infrastructure is that it’s inherently flexible.

Migrating workloads, especially complex, multi-tiered applications, can be a harrowing process. Undertaking the migration without a solid understanding of the interdependencies of applications and the exact resource requirements means almost certain failure. In today’s world, it’s understandable that failures can, do, and will happen; what’s not acceptable today is downtime. Cutovers of migrations need to be instant, or an hour at most.

Read this essential guide on Workload Migrations to learn about:

  • Availability Service Level Agreements
  • On-Premises to Public Cloud Migrations
  • Data Center to Data Center Migrations
  • Workload Migration Challenges
  • Migrate Successfully with Application-Centric Workload Visibility