Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 28 white papers, page 1 of 2.
5 Fundamentals of Modern Data Protection
Some data protection software vendors will say that they are “agentless” because they can do an agentless backup. However, many of these vendors require agents for file-level restore, proper application backup, or to restore application data. My advice is to make sure that your data protection tool is able to address all backup and recovery scenarios without the need for an agent.
Legacy backup is costly, inefficient, and can force IT administrators to make risky compromises that impact critical business applications, data and resources. Read this NEW white paper to learn how Modern Data Protection capitalizes on the inherent benefits of virtualization to:
  • Increase your ability to meet RPOs and RTOs
  • Eliminate the need for complex and inefficient agents
  • Reduce operating costs and optimize resources
The Expert Guide to VMware Data Protection
Virtualization is a very general term for simulating a physical entity by using software. There are many different forms of virtualization that may be found in a data center including server, network and storage virtualization. When talking about server virtualization there are many unique terms and concepts that you may hear that are part of the technology that makes up server virtualization.
Virtualization is the most disruptive technology of the decade. Virtualization-enabled data protection and disaster recovery is especially disruptive because it allows IT to do things dramatically better at a fraction of the cost of what it would be in a physical data center.

Chapter 1: An Introduction to VMware Virtualization

Chapter 2: Backup and Recovery Methodologies

Chapter 3: Data Recovery in Virtual Environments

Chapter 4: Learn how to choose the right backup solution for VMware
The Hands-on Guide: Understanding Hyper-V in Windows Server 2012
Topics: Hyper-V, veeam
This chapter is designed to get you started quickly with Hyper-V 3.0. It starts with a discussion of the hardware requirements for Hyper-V 3.0 and then explains a basic Hyper-V–deployment followed by an upgrade from Hyper-V 2.0 to Hyper-V 3.0. The chapter concludes with a demonstration of migrating virtual machines from Hyper-V 2.0 to Hyper-V 3.0
The Hands-on Guide: Understanding Hyper-V in Windows Server 2012 gives you simple step-by-step instructions to help you perform Hyper-V-related tasks like a seasoned expert. You will learn how to:
  • Build clustered Hyper-V deployment
  • Manage Hyper-V through PowerShell
  • Create virtual machine replicas
  • Transition from a legacy Hyper-V environment
  • and more
Blueprint for Delivering IT-as-a-Service - 9 Steps for Success
You’ve got the materials (your constantly changing IT infrastructure). You’ve got the work order (your boss made that perfectly clear). But now what? Delivering IT-as-a-service has never been more challenging than it is today...virtualization, private, public, and hybrid cloud computing are drastically changing how IT needs to provide service delivery and assurance. You know exactly what you need to do, the big question is HOW to do it. If only there was some kind of blueprint for this…
You’ve got the materials (your constantly changing ITinfrastructure). You’ve got the work order (your boss made that perfectlyclear). But now what? Delivering IT-as-a-service has never been morechallenging than it is today...virtualization, private, public, and hybridcloud computing are drastically changing how IT needs to provide servicedelivery and assurance. You know exactly what you need to do, the big questionis HOW to do it. If only there was some kind of blueprint for this…

Based on our experience working with Zenoss customers whohave built highly virtualized and cloud infrastructures, we know what it takesto operationalize IT-as-a-Service in today’s ever-changing technicalenvironment. We’ve put together a guided list of questions in this eBook around the following topics to help you build your blueprint for getting the job done,and done right: 
  • Unified Operations
  • Maximum Automation
  • Model Driven
  • Service Oriented
  • Multi-Tenant
  • Horizontal Scale
  • Open Extensibility
  • Subscription
  • ExtremeService
Five Fundamentals of Virtual Server Protection
The benefits of server virtualization are compelling and are driving the transition to large scale virtual server deployments.
The benefits of server virtualization are compelling and are driving the transition to large scale virtual server deployments. From cost savings recognized through server consolidation or business flexibility and agility inherent in the emergent private and public cloud architectures, virtualization technologies are rapidly becoming a cornerstone of the modern data center. With Commvault's software, you can take full advantage of the developments in virtualization technology and enable private and public cloud data centers while continuing to meet all your data management, protection and retention needs. This whitepaper outlines the to 5 challenges to overcome in order to take advantage of the benefits of virtualization for your organization.
PowerShell for newbies: Getting started with PowerShell 4.0
Topics: veeam, powershell
This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms.

This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms. This e-book provides the fundamentals every PowerShell administrator needs to know. The getting started guide will give you a crash course on PowerShell essential terms, concepts and commands and help you quickly understand PowerShell basics.

You will also learn about:

  • What is PowerShell?
  • Using PowerShell Help
  • PowerShell Terminology
  • The PowerShell Paradigm
  • And more!

This white paper focuses on PowerShell 4.0; however, you can be sure that all the basics provided are relevant to earlier versions as well. For those who are ready to take the next steps in learning PowerShell and looking for more information on the topic, this PDF contains a list of helpful resources.

How to avoid VM sprawl and improve resource utilization in VMware and Veeam backup infrastructures
You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

Getting virtual sprawl under control will help you reallocate and better provision your existing storage, CPU and memory resources between critical production workloads and high-performance, virtualized applications. With proper resource management, you can save money on extra hardware.

This white paper examines how you can avoid potential VM sprawl risks and automate proactive monitoring by using Veeam ONE, a part of Veeam Availability Suite. Veeam ONE will arm you with a list of VM sprawl indicators and explain how you can pick up and configure a handy report kit to detect and eliminate VM sprawl threats in your VMware environment.

Read this FREE white paper and learn how to:

  • Identify “zombies”
  • Clean up garbage and orphaned snapshots
  • Establish a transparent system to get sprawl under control
  • And more!
Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
Hyper-V Replica in depth
Topics: veeam, hyper-v
When Windows Server 2012 hit the market in 2012 a new feature called - Hyper-V Replica hit the shelf. In 2013, when Windows Server 2012 R2 was released, the Hyper-V Replica feature was improved. This white paper gives you an in-depth look at Hyper-V Replica: what it is, how it works, what capabilities it offers and specific-use cases.

When Windows Server 2012 hit the market in 2012 a new feature called - Hyper-V Replica hit the shelf. In 2013, when Windows Server 2012 R2 was released, the Hyper-V Replica feature was improved. This white paper gives you an in-depth look at Hyper-V Replica: what it is, how it works, what capabilities it offers and specific-use cases.

By the end of this white paper, you’ll know:

  • If this feature is right for your environment
  • Steps for successful implementation
  • Best practices and much more!
Replication Software for the VMware ESXi Hypervisor
Zerto protects virtualized applications with the same robust and effective recovery previously available only with complex and expensive array based replication solutions.

Zerto protects virtualized applications with the same robust and effective recovery previously available only with complex and expensive array based replication solutions. With Zerto you get:

  •         Scalability
  •         Ease of management
  •         A Hardware agnostic solutions
Weighing Your Unified Monitoring Options: When Open Source Makes Sense
There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few. However, not every tool is right for every environment.
Normal 0 false false false EN-US X-NONE X-NONE

There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few.

However, not every tool is right for every environment.

Weighing the strengths and weaknesses of open-source offerings is essential to determining whether they will work to meet your specific goals.

Since Zenoss has both open source and enterprise-scale solutions, we’re very familiar with both the benefits and limitations of these product sets for your organizational needs. This comparison guide helps provide insight into when and where open source tools might be a good fit.

Which solution is the right fit for you?  Download our white paper today to find out!
SSG-NOW Delta Report: Tegile's New High-Density Flash Array
SSG-NOW Senior Analyst Earl Follis and Founding Analyst Deni Connor give their take on the new product from Sandisk and Tegile. The companies have developed an economical, high-density flash array utilizing SanDisk's InfiniFlash SSDs and Tegile’s IntelliFlash software architecture. The array packs an incredible 512TB of raw data storage capacity in 3U rack space.
SSG-NOW Senior Analyst Earl Follis and Founding Analyst Deni Connor give their take on the new product from Sandisk and Tegile. The companies have developed an economical, high-density flash array utilizing SanDisk's InfiniFlash SSDs and Tegile’s IntelliFlash software architecture. The array packs an incredible 512TB of raw data storage capacity in 3U rack space.
ESG Lab Spotlight: SIOS iQ & FlashSoft: Analytics-driven Server Acceleration
Download this ESG Lab Spotlight and learn how easy accelerating performance in your VMware environment through host-based caching can be. ESG Lab looked at a new approach that uses SIOS iQ machine learning analytics platform to identify candidate VMs that can be accelerated with FlashSoft host-based caching software using SanDisk Fusion ioMemory PCIe application accelerators and SanDisk SAS and SATA SSDs. They validated the benefits of this approach in this detailed Lab Spotlight

ESG Lab Spotlight evaluates the power of SIOS iQ Machine Learning and Flashsoft software to enable companies to improve application performance through easy, cost-efficient host based caching with solid-state storage devices (SSDs).by reducing storage bottlenecks, speeding application performance, and minimizing latency. However, the challenge for many organizations, especially since many SSDs are still more expensive than HDDs, is to know when and where to apply SSDs to both maximize performance and minimize costs. This lab report evaluates the SIOS iQ IT Analytics and SanDisk FlashSoft, ioMemory, and SSDs. SIOS iQ, a machine learning analytics platform for optimizing VMware environments, identifies which virtual machines will benefit most from host-based caching and recommends the configuration that will provide the best results. FlashSoft host-based caching software leverages SanDisk Fusion ioMemory PCIe application accelerators, SanDisk Lightning, Optimus, and CloudSpeed SSDs, or any other solid-state storage device, to reduce latency and improve throughput in read-intensive virtual and physical server workloads.

ESG Lab used a simulated enterprise IT infrastructure to validate how organizations can use the SIOS iQ analytics platform to identify applications that could be accelerated with host-based caching software, recommend an optimal cache configuration, and predict the resulting storage performance if caching were configured as recommended. 

SIOS iQ: A Next Generation Analytics Platform for Optimizing Critical Application Operations
SIOS iQ is the first solution designed from the ground up to automate the intelligence of IT operations and simplify the optimization of critical application operations in VMware environments. SIOS iQ is an advanced analytics platform that applies patented machine learning technology actionable analysis, insights and problem-solving recommendations.

SIOS iQ is the first solution designed from the ground up to automate the intelligence of IT operations and simplify the optimization of critical application operations in VMware environments. SIOS iQ is an advanced analytics platform that applies patented machine learning technology actionable analysis, insights and problem-solving recommendations. Learn how SIOS iQ can help you identify wasted VMware resources (idle VMs, unneeded snapshot); find and resolve root causes of performance issues, and make informed decisions about implementing and configuring storage acceleration (host based caching with SSDs, all-flash arrays, and hybrid storage).

ESG Lab used a simulated enterprise IT infrastructure to validate how organizations can use the SIOS iQ analytics platform to identify applications that could be accelerated with host-based caching software, recommend an optimal cache configuration, and predict the resulting storage performance if caching were configured as recommended. 

Vembu OffsiteDR Server: Optimize RPO & RTO While Enhancing DR Resilience
Vembu BDR’s data protection solution enhances DRM operations by eliminating all potential single points of failure for restore functions. Using Vembu BDR Suite, IT is able to replicate backup data from multiple BDR Backup servers to a system running OffsiteDR Server within their own data center. As a result, IT garners an alternate system from which to recover protected VMs and physical servers using the same procedures that IT administrators employ on a BDR Backup server.

The ability to configure and deploy high-performance VMs within a vSphere virtual environment continues to put CIO’s under increasing pressure to deal with the rampant bête noire of IT: business continuity. What started with Line of Business (LoB) driven Service Level Agreements (SLAs) requiring IT to meet rigorous Recovery Time and Recovery Point Objectives (RTO and RPO) has grown into an auditable ISO standard (ISO22301) and an emerging software niche for Disaster Recovery Management (DRM) systems.

For this analysis, openBench Labs assessed the performance and functionality of the Vembu OffsiteDR Server, a DRM device that increases the resilience of recovery processes. Their initial intent was to examine the ability to restore data in the event of a catastrophic failure in vSphere environment, including:

  • A VM running BDR Backup server,
  • an ESXi host, and
  • a SAN device.

The full capabilities of Vembu OffsiteDR Server, however, quickly revealed that the device had a much broader operational impact. With the installation of OffsiteDR Server on an external physical server, they were free to configure end-to-end backup and restore operations in a way that optimized RTO and RPO for all business-critical application scenarios running in vSphere test environment.

In openBench lab's test environment, the combination of Vembu OffsiteDR Server deployed on a physical server with a Vembu BDR Backup server deployed on a VM provided a value proposition that extended far beyond the enhancement of DRM recovery resilience. With OffsiteDR Server installed on a physical server, they were able to optimally leverage VM and physical server platforms to easily implement all of the data protection functionality provided by Vembu BDR Suite, leverage all of the performance optimizations available to VMs in a vSphere environment, and do so in the most cost-effective system configuration.

Virtual Machine Migration Checklist
Preparing for a virtualized infrastructure migration can be daunting, use the Zerto checklist to help you plan and execute your migration smoothly!
This checklist provides an overview to help plan a datacenter migration project and ensure accountability through each step including:
  • Communication: Maintain clear, and regular communication with everyone.
  • Scoping: Understand what makes up the application. Get rid of the unknowns to ensure nothing breaks.
  • Ownership and permissions: Who owns the server and application and who will test and validate pre and post migration?
  • Priority: Are there other projects in your way?
  • Organization: Checklists and spreadsheets: How are you tracking all of this?
  • Execution: How is the migration happening? How will the servers and data be moved?
  • Contingency: If something goes wrong, how do I back out and reschedule if necessary?
  • Tracking: Prepare for change. Track what changes need to occur on machines, applications, and infrastructure.
  • Data Hygiene: Cleanup the source environment