Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 9 of 9 white papers, page 1 of 1.
FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
Infinio Accelerator Product Overview White Paper
This whitepaper is an overview of Infinio Accelerator, a software-based server-side cache that provides high performance to any storage system in a VMware environment.
Normal 0 false false false EN-US X-NONE X-NONE This is an in-depth overview of Infinio Accelerator, a software-based server-side cache that provides high performance to any storage system in a VMware environment. It increases IOPS and decreases latency by caching a copy of the hottest data on server-side resources such as RAM and flash devices. Native inline deduplication ensures that all local storage resources are used as efficiently as possible, reducing the cost of performance. Results can be seen instantly following the non-disruptive, 15-minute installation that doesn’t require any downtime, data migration, or reboots.
Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

The Next Generation Clusterless Federation Design in the Cloudistics Cloud Platform
Is there another way to manage your VMs? Yes, the introduction of the Cloudistics Cloud Platform has an innovative approach – non-clustered (or clusterless) federated design.The clusterless federation of the Cloudistics Cloud platform uses categories and tags to characterize computer nodes, migration zones, and storage groups (or blocks). With these benefits: ⦁ Node Limits Are A Thing of the Past. ⦁ Locking limitations are removed. ⦁ Flexibility is Enhanced. ⦁ Ladders of Latency are Removed. ⦁

This paper is written in the context of modern virtualized infrastructures, such as VMware or Nutanix. In such systems, a hypervisor runs on each compute node creating multiple virtual machines (VMs) per compute node. A guest OS runs inside each VM.

Data associated with each VM is stored in one or more virtual disks (vDisks). A virtual disk appears like a local disk, but can be mapped to physical storage in many ways as we will discuss.

Virtualized infrastructures use clustering to provide for non-disruptive VM migration between compute nodes, for load balancing across the nodes, for sharing storage, and for high availability and failover. Clustering is well known and has been used to build
computer systems for a long time. However, in the context of virtualized infrastructures, clustering has a number of significant limitations. Specifically, as we explain below, clusters limit scalability, decrease resource efficiency, hurt performance, reduce flexibility and impair manageability.

In this paper, we will present an innovative alternative architecture that does not have these limitations of clustering. We call our new approach clusterless federation and it is the approach used in the Cloudistics platform.

The rest of this paper is organized as follows. In Section 2, we describe the limitations of clustering and in Section 3, we drive the point home by using the specific example of VMware; other virtualized systems are similar. In Section 4, we present the clusterless federated approach and show how it avoids the limitations of clustering. We summarize in Section 5.

High Availability Clusters in VMware vSphere without Sacrificing Features or Flexibility
This paper explains the challenges of moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Many large enterprises are moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources.

Realizing these benefits with business critical applications, such as SQL Server or SAP can pose several challenges. Because these applications need high availability and disaster recovery protection, the move to a virtual environment can mean adding cost and complexity and limiting the use of important VMware features. This paper explains these challenges and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

EMR Best Practices: How to Effectively Adopt and Deploy Epic EMR
Epic revolutionized the healthcare IT industry with the release of their electronic medical record (EMR), and have since swiftly taken over healthcare centers across the world. Epic’s EMR stands above other electronic medical record systems due to the high level of security, reliability and confidentiality that it offers to users. Physicians and other members of the healthcare team must be able to effectively use Epic’s EMR system in order to achieve desired results. This whitepaper will deta

Epic revolutionized the healthcare IT industry with the release of their electronic medical record (EMR), and have since swiftly taken over healthcare centers across the world.

Epic’s EMR stands above other electronic medical record systems due to the high level of security, reliability and confidentiality that it offers to users. Physicians and other members of the healthcare team must be able to effectively use Epic’s EMR system in order to achieve desired results.

This whitepaper will detail several best practices for effectively adopting and operating the Epic EMR while also increasing productivity levels.

Understanding Windows Server Cluster Quorum Options
This white paper discusses the key concepts you need to configure a failover clustering environment to protect SQL Server in the cloud.
This white paper discusses the key concepts you need to configure a failover clustering environment to protect SQL Server in the cloud. Understand the options for configuring the cluster Quorum to meet your specific needs. Learn the benefits and key takeaways for providing high availability for SQL Server in a public cloud (AWS, Azure, Google) environment.
Azure Security Center: A Complete Guide
Protect your cloud from malicious threats with Microsoft Azure Security Center. Download this guide and learn how to easily monitor and take action to ensure compliance with security standards.

Understand threats and take action to protect your hybrid cloud

A 2017 report from Intel Security notes that only 23% of organizations completely trust public clouds to keep their data secure. But with the right resources, it is possible for your organization to achieve both compliance and security in the cloud—without high costs, special expertise or performance setbacks.

Azure Security Center provides unified security management and advanced threat protection across hybrid cloud workloads. Using advanced analytics, it helps you detect potentially malicious activity and apply actions to ensure compliance with various security standards.

This guide will cover:

•    The fundamentals, and top six reasons for building a security solution that works
•    An overview of the main features, including security event collection and threat intelligence
•    A sneak peek of a simple, yet powerful management platform to help you simplify the creation of rules and streamline firewall configuration

Download this guide and learn how you can take advantage of Azure Security Center!

Four Steps to Cloud Migration
Learn how to migrate with confidence and ease using automated capacity assessment and cost forecasting
Migrations of applications and workloads can be complex. Failure rates are high and cost overruns are common. This brief explains how you can:
  • Auto discover existing resources
  • Plan capacity and right-size your workloads,
  • Instantly run TCO analysis across multiple clouds, and
  • Reduce your time to complete migration