Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 65 - 76 of 76 white papers, page 5 of 5.
A Hybrid Approach to Big Data
We consider a scenario where a data science team needs to analyze a dataset that resides within an object storage service on a public cloud. This is a common scenario when an externally exposed service is deployed on a public cloud and telemetry data is stored for future analysis. In this scenario, we make use of a specific set of technologies which are representative of those that are typically adopted as part of big data and cloud computing deployment paradigms. We demonstrate how you can us

All IT managers understand the critical role they play in ensuring that the enterprise computing infrastructure under their control is effective in meeting the business goals of the organization. Indeed, staying competitive in the rapidly evolving world of today requires that businesses take a proactive mindset towards leveraging their IT investments to deliver key insights through big data initiatives.

The adoption of this mentality is often reflected by the inclusion of dedicated data science teams capable of driving these projects. These groups apply advanced analytical algorithms and artificial intelligence to large datasets with a goal of deriving competitive advantages for the organization.

The specific implementations vary and may impact a variety of business processes such as product development, marketing initiatives, sales management, etc. However, as the adoption of these practices continues to increase, IT teams need to be prepared to effectively support them. While on the surface it may seem that big data workloads are simply another application to deploy and manage, in practice they entail multiple challenges.

In this paper, we demonstrate the ability to implement a big data use case in practice using a hybrid cloud deployment strategy. We provide an overview of our sample scenario, followed by a detailed deployment walk through that enables users to easily replicate the scenario in their own environments. By the end of this paper, readers should have a clear understanding of how big data use cases can be implemented using the underlying technologies covered and how the adoption of hybrid cloud computing environments enables IT leaders to successfully meet the needs of these initiatives within their organizations.

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

Solution Guide for Sennheiser Headsets, IGEL Endpoints and Skype for Business on Citrix VDI
Topics: IGEL, Citrix, skype, VDI
Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Virtualizing Windows applications and desktops in the data center or cloud has compelling security, mobility and management benefits, but delivering real-time voice and video in a virtual environment is a challenge. A poorly optimized implementation can increase costs and compromise user experience. Server scalability and bandwidth efficiency may be less than optimal, and audio-video quality may be degraded.

Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Ovum: Igel's Security Enhancements for Thin Clients
Thin client vendor Igel is enhancing the security capabilities of its products, both under its own steam and in collaboration with technology partners. Ovum sees these developments as important for the next wave of thin client computing, which will be software-based – particularly if the desktop-as-a-service (DaaS) market is to take off.

With hardware-based thin client shipments in the region of 4–5 million units annually, this market is still a drop in the ocean compared to the 270 million PCs shipping each year, though the latter figure has been declining since 2011. And within the thin client market, Igel is in fourth place behind Dell and HP (each at around 1.2 million units annually) and China’s Centerm, which only sells into its home market.

However, the future for thin clients looks bright, in that the software-based segment of the market  (which some analyst houses refuse to acknowledge) is expanding, particularly for Igel. Virtual desktop infrastructure (VDI) technology has stimulated this growth, but the greatest promise is probably in the embryonic DaaS market, whereby enterprises will have standard images for their workforce hosted by service providers.

Delivering a CI/CD Pipeline On-Prem - Solution Reference
In this solution reference, we demonstrate the ability to implement web services delivered through CI/CD using the Stratoscale private cloud environment. Specifically, we utilize an open source workplace messaging service, as an example web application along with Jenkins, an open source automation server which includes support for continuous delivery use cases. We provide an overview of our sample scenario, followed by a detailed deployment walk through that enables readers to easily replicate t

Modern enterprise IT teams are increasingly adopting cloud computing technologies as a foundational component of their strategy to deliver business value for internal stakeholders.

While public cloud infrastructures are often an initial launching point for experimenting with these environments, private cloud solutions are an attractive alternative due to their ability to meet specific functional and security requirements while extending comparable benefits. To truly realize the potential of these investments, however, organizations need to be able to instantiate their high value use cases via private cloud capabilities such as those offered by Stratoscale’s solution.

A critical area of responsibility for IT teams is that they identify appropriate solutions for line-of-business (LOB) applications to meet the requirements of the business units that they support. As part of this, they take on the ownership of deploying, managing, and accommodating the customization of these workloads as needed. Many applications capable of meeting LOB requirements today are packaged and delivered as web services due to the fact that these configurations offer multiple operational advantages including scalability and resiliency. In addition, they allow providers to meet demands from users that they be able to access application functionality seamlessly across their various screens including desktops and mobile devices. For IT teams, this translates into the need for deploying internal facing web services using their private cloud infrastructures.

As opposed to traditional desktop software which may be updated on an infrequent basis, web services engender a model where functionality is continuously under development. This implies that IT teams work closely with developers to ensure that application improvements are released to users in a methodical and timely manner. Continuous integration and continuous delivery (CI/CD) pipelines can be built to accommodate this interaction so that value created by developers can be rapidly and safely delivered to users in an iterative manner.

IDC PERSPECTIVE - Validating the Known: A Different Approach to Cybersecurity
Let's face it. The 2017 cybersecurity reality is bleak, and the task of guarding our cyberassets is increasingly difficult. We can attribute this reality to four key trends:

Validating the Known:  A Different Approach to Cybersecurity

Let's face it. The 2017 cybersecurity reality is bleak, and the task of guarding our cyberassets is increasingly difficult. We can attribute this reality to four key trends:

1.        The sophistication of cybermiscreants is growing rapidly.
2.        The perimeter has died.
3.        Security tools are proliferated.
4.        Qualified information security professionals are scarce.
 
Although we have seen some innovative new offerings in the cybersecurity market, the majority of today's technologies take fundamentally the same approach: we are looking to detect the bad or malicious. A new approach is 'validating the known,' looking to validate objects as good or valid as compared with a certified list of known files or objects. Objects that cannot be validated are treated as untrusted. The binary 'good versus bad' classification gives way to validated good and invalidated," according to Frank Dickson, research director, Security Products.
 
Download this informative whitepaper to learn a new approach to cybersecurity: validating the known.

The Next Generation VDI Reference Architecture on Cloudistics Ignite
Desktop and application virtualization is one of the primary ways how businesses reduce CapEx and OpEx, improve time to market, efficiency, increase control, and expand connectivity. VDI enables users to now access their desktops hosted in a data center server as virtual machines, which can be accessed from laptops and thin clients. Although desktop virtualization has existed for many years, many implementers of the technology have discovered that significant hurdles need to be overcome to fully

Desktop and application virtualization is one of the primary ways how businesses reduce CapEx and OpEx, improve time to market, efficiency, increase control, and expand connectivity. VDI enables users to now access their desktops hosted in a data center server as virtual machines, which can be accessed from laptops and thin clients. Although desktop virtualization has existed for many years, many implementers of the technology have discovered that significant hurdles need to be overcome to fully reap its benefits.

This document defines a set of architectural blocks for building a multitenant, Virtual Desktop Infrastructure in and application services on the Cloudistics platform.
This document includes 2 major sections:

  • VDI Solution Architecture
  • Overview of Cloudistics Ignite Platform Components (Appendix A)
The primary goal of this VDI architecture is to enable service providers and IT departments to create secure, scalable, and reliable desktop hosting solution offers for small- and medium-sized organizations ranging from 500 to 1,000 users. The intended audience is hosting providers, and IT departments who want to leverage the Cloudistics infrastructure services to deliver desktop hosting services to multiple tenants.

To deliver a desktop hosting solution, service provider partners can leverage Windows Server and the Windows Desktop Experience feature to deliver Windows users a highly performant application experience that is familiar to business users and consumers.

Overcoming IT Monitoring Too Sprawl with a Single-Pane-of-Glass Solution
For years, IT managers have been seeking a single-pane-of-glass tool that can help them monitor and manage all aspects of their IT infrastructure – from desktops to servers, hardware to application code, and network to storage. Read this white paper to understand how to consolidate IT performance monitoring and implement a single-pane-of-glass monitoring solution.

For years, IT managers have been seeking a single-pane-of-glass tool that can help them monitor and manage all aspects of their IT infrastructure – from desktops to servers, hardware to application code, and network to storage. But, many fail to achieve this as they do not know how to implement a single-pane-of-glass solution.

Read this eG Innovations white paper, and understand:

  • How an organization ends up with more tools than what they need
  • The challenges of dealing with multiple tools
  • Myths and popular misconceptions about a single-pane-of-glass monitoring tool
  • Best practices for achieving unified IT monitoring
  • Benefits of consolidating monitoring into a single-pane-of-glass monitoring solution
Does Deploying Citrix in the Cloud Make Performance Monitoring Easier?
Organizations now have a variety of cloud-based options for delivering virtualized applications and desktops. Cloud deployments are fast, involve lower hardware footprint and simplify IT operations. A key question to answer in this context is whether Citrix Cloud services make performance monitoring easier than it was for on-premises deployments. Read this white paper and find out how to implement monitoring for Citrix Cloud environments.

The technology of cloud computing has caught up with virtual desktop infrastructures. Tapping into the agility and flexibility of cloud-hosted infrastructures, Citrix Cloud enables organizations to simplify digital workspace delivery. With many of the critical components of the Citrix delivery infrastructure hosted in the cloud and managed by Citrix, organizations can speed up deployment, lower hardware footprint, increase ROI, simplify IT operations. Despite the many benefits of Citrix Cloud, the performance management challenges still persist, just as they do in traditional on-premises Citrix deployments.

Read this eG Innovations white paper, and understand:

  • The two popular Citrix Cloud deployment options
  • Performance monitoring challenges in Citrix Cloud infrastructures
  • Stakeholders involved and their respective domains of responsibility
  • The various monitoring tools and options available
  • Best practices to set up performance monitoring
5 Best Practices to Achieve Successful Migration to Citrix XenApp & XenDesktop 7.x
Citrix XenApp 6.5 is nearing its end-of-life and end-of-maintenance period. As organizations look to migrate to Citrix XenApp and XenDesktop 7.x, they will be encountering many architectural, configuration, platform, and functionality changes. Read this eG Innovations white paper to learn five best practices that Citrix administration teams can use to ensure peak performance of the Citrix infrastructure during and after the migration to XenApp and XenDesktop 7.x.
Citrix XenApp 6.5 is nearing its end-of-life and end-of-maintenance period. As organizations look to migrate to Citrix XenApp and XenDesktop 7.x, they will be encountering many architectural, configuration, platform, and functionality changes. While many new features and enhancements have been introduced in 7.x, there are also some capabilities that were available in XenApp 6.5 and are no longer supported in 7.x (such as Citrix EdgeSight for performance monitoring). Despite all these changes, the success of the migration, ultimately, depends on ensuring outstanding performance and end-user experience in the new 7.x environment.

Read this eG Innovations white paper to learn five best practices that Citrix administration teams can use to ensure peak performance of the Citrix infrastructure during and after the migration to XenApp and XenDesktop 7.x.
Converged Application and Infrastructure Performance Monitoring
In today’s distributed, heterogeneous environments, the siloed monitoring of applications and infrastructure tiers (network, storage, virtualization, database, etc.) is no longer sufficient. Read this white paper to find out how eG Innovations provides unified visibility of application performance, end-user experience, and infrastructure health—all from a single pane of glass.

As detecting and troubleshooting application performance issues increases in complexity in today’s distributed, heterogeneous environments, the siloed monitoring of applications and infrastructure tiers (network, storage, virtualization, database, etc.) is no longer sufficient. eG Enterprise delivers the first converged application and infrastructure performance monitoring solution, providing unified visibility of application performance, end-user experience, and infrastructure health—all from a single pane of glass.

Read this white paper to find out how eG Enterprise’s converged application and infrastructure monitoring capabilities help you:

  • Proactively detect user experience issues before your customers are impacted
  • Trace business transactions and isolate the cause of application slowness
  • Get code-level visibility to identify inefficient application code and slow database queries
  • Automatically map application dependencies within the infrastructure to pinpoint the root cause of the problem
Key Considerations for a Performance Monitoring Solution for your Citrix Infrastructure
Citrix environments incorporate numerous components as well as diverse back-end application elements and user-specific items – all complex variables that can affect the user experience. This white paper provides a checklist of monitoring-related criteria that should be considered as part of due diligence by enterprises and service providers to effectively manage the performance of their complex Citrix infrastructures.
Citrix environments incorporate numerous components as well as diverse back-end application elements and user-specific items – all complex variables that can affect the user experience. This white paper provides a checklist of monitoring-related criteria that should be considered as part of due diligence by enterprises and service providers to effectively manage the performance of their complex Citrix infrastructures.