Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 17 - 32 of 50 white papers, page 2 of 4.
5 Keys to Virtualization Zen
So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

Zenoss makes managing virtualized environments and virtualization monitoring easy and less expensive. The Zenoss hybrid IT monitoring platform allows you to comprehensively monitor resource performance and availability across the entire stack, including network, storage, applications and more, regardless of physical or virtual location.

Virtual Machine Migration Checklist
Preparing for a virtualized infrastructure migration can be daunting, use the Zerto checklist to help you plan and execute your migration smoothly!
This checklist provides an overview to help plan a datacenter migration project and ensure accountability through each step including:
  • Communication: Maintain clear, and regular communication with everyone.
  • Scoping: Understand what makes up the application. Get rid of the unknowns to ensure nothing breaks.
  • Ownership and permissions: Who owns the server and application and who will test and validate pre and post migration?
  • Priority: Are there other projects in your way?
  • Organization: Checklists and spreadsheets: How are you tracking all of this?
  • Execution: How is the migration happening? How will the servers and data be moved?
  • Contingency: If something goes wrong, how do I back out and reschedule if necessary?
  • Tracking: Prepare for change. Track what changes need to occur on machines, applications, and infrastructure.
  • Data Hygiene: Cleanup the source environment
Default FTA management for Word 2013 and WordViewer
A complete step-by-step guide for managing the default file type associations for Word 2013 and WordViewer with FSLogix.

Duncan Murdoch, of Amber Reef, uses this white paper to outline the necessary approach to centrally control and manage FTAs for Word 2013 and WordViewer using FSLogix. 

After addressing the reason and symptoms of the issue, Duncan asserts, "If the desire is to 'Control the FTA' centrally and manage the associations with FSLogix, preventing the users from overriding the FTA settings," then "to achieve this you can create 2 separate FTA rules, one for Word 2013 and another for WordViewer."

By applying these rules alongside the FSLogix Hiding rules for the applications, then the Administrator can ensure that the FTA that is applied is the one that they have allocated to the application group.

NOTE: This will also prevent a user from being able to right-click the file and assign their OWN FTA preferences.

App-V and FSLogix File Type Association Management
Duncan Murdoch, of Amber Reef, provides a concise, visual guide in order to show the precise steps for managing file type associations (FTAs) when using App-V with FSLogix.

A concise, visual guide to implementing file type associations when using App-V with FSLogix. Duncan Murdoch, of Amber Reef, uses this white paper to show the precise steps for managing file type associations (FTAs) when using App-V with FSLogix. As an example for managing the file type associations for App-V packages, Duncan Murdoch demonstrates the ease of this process with Adobe DC and FOX-IT Reader as published applications. With a couple quick steps and a single FSLogix rule, the proper FTAs are put in place for the desired default .pdf application.

Ease of Management and Flexibility Lead to Long-Term Relationship for IGEL at Texas Credit Union
Randolph-Brooks Federal Credit Union was looking for a more powerful endpoint computing solution to deliver e-mail and core financial applications through its Citrix-based infrastructure to its end-users, and IGEL’s Universal Desktop thin clients and Universal Management Suite (UMS) software fit the bill.

Randolph-Brooks Federal Credit Union is more than just a bank. It is a financial cooperative intent on helping its members save time, save money and earn money. Over the years, the credit union has grown from providing financial resources to military service members and their families to serving hundreds of thousands of members across Texas and around the world. RBFCU has a presence in three major market areas — Austin, Dallas and San Antonio — and has more than 55 branches dedicated to serving members and the community.

First and foremost, RBFCU is people. It’s the more than 1,800 employees who serve members’ needs each day. It’s the senior team and Board of Directors that guide the credit union’s growth. It’s the members who give their support and loyalty to the credit union each day.

To help its employees provide the credit union’s members with the highest levels of services and support, Randolph-Brooks Federal Credit Union relies on IGEL’s endpoint computing solutions.

The Hybrid Cloud Guide
This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services.

This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

Topics discussed include:
•    Why Cloud?
•    Getting There Safely
•    IT Resilience in the Hybrid Cloud
•    The Power of Microsoft Azure and Zerto

You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business.

The 4th Era of IT Infrastructure: Composable Systems
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th generation of IT infrastructure can transform your business.

Learn the benefits and limitations of  the 3 generations of IT infrastructure  – siloed, converged and hyperconverged – and discover how the 4th generation of IT infrastructure  – composable –  can transform your business. 

The composable infrastructure enables you to:

  • Tightly integrate server, storage, networking, virtualization, VM/container centric management and an application marketplace to create a high-speed infrastructure platform that includes everything needed to run applications out of the box – a single silo platform
  • Easily and independently scale network, storage, and compute resources on-demand, making it possible to run a wide diversity of workloads

Manage your infrastructure from anywhere through a single SaaS management portal

Approaches and Benefits of Network Virtualization
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure — the network. Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.

Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure—the network.

Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.
 
In this whitepaper you will be introduced to Cloudistics Ignite’s Adaptive Overlay Network (AON) technology that provides the following benefits:
◦    Simplifies and automates network provisioning, avoiding manual errors common when dealing with physical networks, VLANs, etc.

  • Enables you to scale your business to multi-site locations without unnecessary costly hardware purchases and lengthy maintenance windows
  • Enables you to fine-tune your application’s performance and security through dedicated virtual networks that can be deployed in minutes

Natively built-into the Ignite platform, lowering costs by eliminating the need for 3rd party software and hardware

Composable Systems – The 4th Infrastructure Era - Executive Summary
Understand the difference between Hyperconverged solutions and Cloudistics Composable platform. This executive summary discusses the evolution of infrastructures and how the emergence of superconverged systems will transform the future of IT.
Learn how Ignite goes beyond hyperconverged platforms by delivering a virtualized network and network switch, along with converged all-flash storage, compute, virtualization, and centralized SaaS management into one plug-and-play platform.

The composable infrastructure enables you to:
  • Deliver 5x faster applications than traditional hyperconverged solutions
  • Scale independent network, storage and compute resources for 4x lower costs
  • Eliminate expensive hypervisor costs with our KVM-based hypervisor built-in
Outlook Performance in Non-Persistent Environments Using FSLogix's Office 365 Containers
An Independent Remote End-User Experience Performance Benchmark. Published on: http://www.rdsgurus.com/outlook-performance-in-non-persistentenvironments-using-fslogixs-office-365-containers
RDS Gurus decided to run performance tests on Outlook in non-persistent environments using FSLogix’s Office 365 Container solution. The purpose was to illustrate the user experience of remote desktop users working in a Remote Desktop Services environment configured to use FSLogix Office 365 Containers relative to the typical user experience when using native RDS User Profile Disk technology. Their primary focus was to measure how performance degrades when multiple users are simultaneously working with Outlook (“noisy neighbor effect”).
OneDrive for Business Performance in Non-Persistent Environments Using FSLogix's Office 365 Containe
An Independent Remote End-User Experience Performance Benchmark. Published on: http://www.rdsgurus.com/onedrive-for-business-performance-in-nonpersistent-environments-using-fslogixs-office-365-containers/
This whitepaper addresses the issue described in Microsoft’s knowledge base article “OneDrive for Business sync app isn’t supported for client sessions that are hosted on Windows 2008 Terminal Services or Windows 2012 Remote Desktop Services (RDS)“, published at https://support.microsoft.com/enus/kb/2965687. This is also true for RDS running on Windows Server 2016. To gain access to OneDrive for Business files, the officially supported solution for Remote Desktop users is to utilize a web browser. But most remote desktop users want to be able to use OneDrive for Business like they do on local Windows desktops.
Support Cloud-Native Apps with Database Services On-Prem
Cloud computing is one of the biggest developments in the IT industry in the last few years. All major cloud providers offer some form of DBaaS (Database-as-a-service), and industry experts expect it to soon become a standard solution for enterprises. In this paper, we will review the different types of standard database tasks and how cloud is changing them, along with the new opportunities the cloud presents for DBAs. This paper also will provide basic guidance on acquiring new skills or impro
Cloud computing is one of the biggest developments in the IT industry in the last few years. All major cloud providers offer some form of DBaaS (Database-as-a-service), and industry experts expect it to soon become a standard solution for enterprises. Gartner recently published Market Guide for Database Platform as a Service, in which they note, “The database platform as a service market continues gaining momentum, driven by maturing products, reports of major resource savings, increased product choice and a general acceptance of the cloud.” So how does this affect DBAs? How can they demonstrate their value and retain their position in enterprise IT despite this shift? In this paper, we will review the different types of standard database tasks and how cloud is changing them, along with the new opportunities the cloud presents for DBAs. This paper also will provide basic guidance on acquiring new skills or improving current ones so that they meet those needed for any DBA to survive this transition to cloud.
Omaha School District Leverages IGEL’s Revolutionary Micro Client
Millard Public Schools is currently leveraging the IGEL UD Pocket, a revolutionary micro client, inside the district’s computer-aided design (CAD) classrooms to securely and cost-effectively deliver Autodesk software to their CAD students via a Citrix virtual desktop.
Millard Public Schools was looking for a secure and cost-effective way to deliver graphics intensive CAD applications to students via Citrix virtual desktops. The school district selected the IGEL UD Pocket and is now leveraging the micro thin client inside its CAD classrooms. Some of the key benefits the district has experienced as a result of the IGEL solution include ease of management and configuration, time and cost savings, support for a robust multimedia experience, and enhanced endpoint security as students are now only able to access their Windows-based, GPU-enabled virtual desktops from a secured Linux-based endpoint.
Solution Guide for Sennheiser Headsets, IGEL Endpoints and Skype for Business on Citrix VDI
Topics: IGEL, Citrix, skype, VDI
Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Virtualizing Windows applications and desktops in the data center or cloud has compelling security, mobility and management benefits, but delivering real-time voice and video in a virtual environment is a challenge. A poorly optimized implementation can increase costs and compromise user experience. Server scalability and bandwidth efficiency may be less than optimal, and audio-video quality may be degraded.

Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Delivering a CI/CD Pipeline On-Prem - Solution Reference
In this solution reference, we demonstrate the ability to implement web services delivered through CI/CD using the Stratoscale private cloud environment. Specifically, we utilize an open source workplace messaging service, as an example web application along with Jenkins, an open source automation server which includes support for continuous delivery use cases. We provide an overview of our sample scenario, followed by a detailed deployment walk through that enables readers to easily replicate t

Modern enterprise IT teams are increasingly adopting cloud computing technologies as a foundational component of their strategy to deliver business value for internal stakeholders.

While public cloud infrastructures are often an initial launching point for experimenting with these environments, private cloud solutions are an attractive alternative due to their ability to meet specific functional and security requirements while extending comparable benefits. To truly realize the potential of these investments, however, organizations need to be able to instantiate their high value use cases via private cloud capabilities such as those offered by Stratoscale’s solution.

A critical area of responsibility for IT teams is that they identify appropriate solutions for line-of-business (LOB) applications to meet the requirements of the business units that they support. As part of this, they take on the ownership of deploying, managing, and accommodating the customization of these workloads as needed. Many applications capable of meeting LOB requirements today are packaged and delivered as web services due to the fact that these configurations offer multiple operational advantages including scalability and resiliency. In addition, they allow providers to meet demands from users that they be able to access application functionality seamlessly across their various screens including desktops and mobile devices. For IT teams, this translates into the need for deploying internal facing web services using their private cloud infrastructures.

As opposed to traditional desktop software which may be updated on an infrequent basis, web services engender a model where functionality is continuously under development. This implies that IT teams work closely with developers to ensure that application improvements are released to users in a methodical and timely manner. Continuous integration and continuous delivery (CI/CD) pipelines can be built to accommodate this interaction so that value created by developers can be rapidly and safely delivered to users in an iterative manner.

CISO's Investigate: Endpoint Security
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down.
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down.
 
Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. The result is a much larger attack surface, one that is hard to protect with traditional approaches - and one that is growing faster than ever before as users adopt new types of devices, new applications, and new services. Often, companies don't even know all the tools that their employees are using.
 
At the same time, the potential threats that enterprises are facing have grown significantly in variety, capabilities, and size.  Today’s malware, once it gets a foothold, can spread quickly.  As a result, the damage caused by the attacks has also been increasing at a staggering pace, with ransomware alone reportedly crossing the $1 billion revenue threshold in 2016.
In this new age of cyberwar, endpoint devices are the front line.
 
In this valuable and informative report, leading security experts examine the new tools that they have at their disposal, including next generation endpoint protection.