Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 14 of 14 white papers, page 1 of 1.
Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
A New Approach to Per User Application Management
Our premise is simple: existing methodologies for delivering and deploying Windows applications are based upon outmoded ideas and outdated technology. There remains a need for a product that makes it simple for each user to have their Windows applications individually tailored for their device. When a user logs on they should see only the applications that they are licensed to use regardless of whether they are using cloud, virtual or traditional desktops.
Normal 0 false false false EN-US X-NONE X-NONE

A simple truth: Current application delivery and deployment solutions for Windows®-based desktops are often not fast enough, and the methods employed introduce complexities and limitations that cost enterprises valuable time, money and productivity. There is a strong need for a solution that is faster to deploy, simpler to use, and improves productivity rather than degrades it. In fact, the best solution would seamlessly and instantaneously personalizing the entire desktop, from profiles and printers to applications and extensions, while supporting license compliance and cost optimization. And, of course, it wouldn’t matter if the target desktops were physical, virtual, or cloud-based. FSLogix is delivering that solution today.

UNIQUE, CUTTING EDGE TECHNOLOGY

FSLogix has devised a revolutionary technique called Image Masking to create a single Unified Base Image that hides everything a logged in user shouldn’t see, providing predictable and real-time access to applications and profiles. This approach is driving unprecedented success in image reduction, with a side benefit of license cost optimization. Image masking functions identically across a wide range of Windows-based platforms, greatly simplifying the path from traditional to virtual environments, and dramatically reducing the management overhead required for enterprise desktops. This solution eliminates multiple layers of management infrastructure, creating a single, unified approach to image management, profile access, and application delivery.
2016 Citrix Performance Management Report
This 2nd-annual research report from DABCC and eG Innovations provides the results of a comprehensive survey of the Citrix user community that explored the current state of Citrix performance management and sought to better understand the current challenges, technology choices and best practices in the Citrix community. The survey results have been compiled into a data rich, easily-digestible report to provide you with benchmarks and new insights into the best practices for Citrix performance m

Over the last decade, the Citrix portfolio of solutions has dramatically expanded to include Citrix XenApp, XenDesktop, XenServer, XenMobile, Sharefile and Workspace Cloud. And, the use cases for Citrix technologies have also expanded with the needs of the market. Flexwork and telework, BYOD, mobile workspaces, PC refresh alternatives and remote partner access are now common user paradigms that are all supported by Citrix technologies.

To deliver the best possible user experience with all these Citrix technologies, Citrix environments need to be well architected but also well monitored and managed to identify and diagnose problems early on and prevent issues from escalating and impacting end users and business processes.

This 2nd-annual research report from DABCC and eG Innovations provides the results of a comprehensive survey of the Citrix user community with a goal of exploring the current state of Citrix performance management and helping Citrix users better understand current challenges, technology choices and best practices in the Citrix community.

The survey results have been compiled into a data-rich, easy-to-digest report to provide you with benchmarks and new insights into the best practices for effective Citrix performance management.

Citrix Ready Whitepaper: Top Eight Best Practices for Deploying Citrix XenApp and XenDesktop 7.7
Citrix XenApp/XenDesktop 7.7 are fast becoming the standard platforms for deploying application and desktop virtualization. The new FMA provides a unified platform that makes application and desktop delivery fast and easy. Discover how to take advantage of all the new Citrix features and enhancements to improve the security, manageability and remote access of your virtual applications and desktops in this Citrix-Ready White Paper
Normal 0 false false false EN-US X-NONE X-NONE

As Citrix XenApp and XenDesktop 7.7 are fast becoming the standard platforms for deploying application and desktop virtualization in today’s expanding enterprise, they provide a unified platform that makes application and desktop delivery fast and easy.

You can utilize the new Flexcast Management Architecture (FMA) as well as several new features and enhancements to improve the security, manageability and remote access of your virtual applications and desktops.

In this Citrix-Ready white paper, Top Eight Best Practices for Deploying Citrix XenApp and XenDesktop 7.7, you will discover real-world experiences as well as the top eight best practices in deploying Citrix XenApp/XenDesktop 7.x, including how to:

  • Be cloud ready by separating the management plane and the workload
  • Enhance scalability and performance for multi-media applications with GPUs
  • Take advantage of new XenApp/XenDesktop 7.x features including Connection Leasing, anonymous user accesses, session pre-launch and lingering, and application folders/grouping support
  • Improve the user experience on broadband wireless connections with the Framehawk technology (available in Feature Pack 2)
  • Benefit from Citrix Provisioning Services enhancements and understand the trade-offs between PVS vs. Machine Creation Services
  • Analyze virtualization platform choices and how to optimize the deployment to get more users per server
  • Leverage built-in Citrix tools for performance visibility
  • Implement end-to-end monitoring, diagnosis and reporting for complete visibility across all Citrix and non-Citrix tiers in a single unified view

Performance Monitoring for Your Citrix Infrastructure - Considerations & Checklist
Citrix environments incorporate numerous components as well as diverse back-end application elements and user-specific items – all complex variables that can affect the user experience. This white paper provides a checklist of monitoring-related criteria that should be considered as part of due diligence by enterprises and service providers to effectively manage the performance of their complex Citrix infrastructures
Normal 0 false false false EN-US X-NONE X-NONE

Numerous components as well as diverse back-end application elements and user-specific items comprise today’s complex Citrix infrastructures and all can affect the user experience. At any given time, one or more of these components may fail or experience an issue and service organizations spend a significant amount of time and effort diving into each of the various components in order to properly address and resolve problems.

Download this white paper to get a comprehensive checklist of monitoring-related criteria that should be considered as part of due diligence by enterprises and service providers to effectively manage performance of their complex Citrix infrastructures. Jo Harder, Application and Desktop Virtualization Analyst, details a checklist for importance level and vendor consideration broken out into the following categories:

  • Monitoring of all Datacenter Components
  • Monitoring of User Experience
  • Monitoring of Citrix Key Performance Indicators
  • Administration and Reporting
  • Monitoring System Functionality
  • Vendor Support and Product Development
User Profile and Environment Management with ProfileUnity
This whitepaper has been authored by experts at Liquidware Labs in order to provide guidance to adopters of desktop virtualization technologies. In this paper, we outline how ProfileUnity was designed to address many of the shortcomings of Roaming Profiles, and basic profile management tools that are just a step away from roaming profiles, in managing user profiles and user-authored data over multiple desktop platforms, including physical upgrades and refreshes, Windows migrations and moves to
User Profile Management on Microsoft Windows desktops continues to provide challenges.  Most Administrators find that Roaming Profiles and even Microsoft UEV generally fall short due to several factors. Profile Corruption, Lack of Customization, and lack of Enterprise Features are just some of the top shortcomings of Microsoft Windows profile management with these options.

Basic tools such as roaming profiles do not support a mixed operating environment, therefore it does not allow users to move among desktops with mixed profile versions, e.g. Windows 7, Windows 10, Server2008, 2012 r2, etc.

The lack of support of mixed OS versions makes Microsoft profile management methods a serious hindrance when upgrading/migrating operating systems. Microsoft profile management tools also only support very limited granular management, so admins do not have the ability to exclude bloated areas of a user profile or to include files and registry keys outside of the profile. Profile bloat is one of the number one reasons for long logon times on Windows desktops.

Most organizations who will upgrade from a previous Windows® OS, such as Windows 7, to Windows 10, will want the flexibility to move at their own pace and upgrade machines on a departmental or ‘as needed’ basis.  As a result, management of Microsoft profiles and migration become a huge challenge for these environments because neither operation is seamlessly supported or functional between the two operating systems.  

A user’s profile consists of nearly everything needed to provide a personalized user experience within Windows.  If one could separate out the user profile from Windows and enable dynamic profiles that can adapt to any Windows OS version, several advantages can be realized:
  • User state can be stored separately and delivered just-in-time to enable workers to roam from workspace to workspace
  • Users’ profiles can co-exist in mixed OS environments or automatically migrate from one OS to the next, making OS upgrades easy and essentially irrelevant during a point-in-time upgrade
  • Integral policies and self-managed settings, such as local and network printer management, as well as security policies, can be readily restored in the event of a PC failure or loss (disaster recovery)
Given the growing complexity and diversity of Windows desktops technologies, today’s desktop administrators are looking for better ways to manage user profiles across the ever-increasing spectrum of desktop platforms available. In this whitepaper, we will cover the issues inherent with Roaming Profiles and how ProfileUnity addresses these issues.
Vembu Changes the Dynamics of Data Protection for  Business Applications in a vSphere Environment
This paper examines how to use Vembu BDR to implement distributed backup and disaster recovery (DR) operations in a centrally managed data protection environment with an ingenious twist. Rather than store image backups of VMs and block-level backups of physical and VM guest host systems as a collection of backup files, Vembu BDR utilizes a document-oriented database as a backup repository, dubbed VembuHIVE, which Vembu virtualizes as a file system.
Normal 0 false false false EN-US X-NONE X-NONE In this analysis, openBench Labs assesses the performance and functionality of the Vembu Backup & Disaster Recovery (BDR) host-level (a.k.a. agentless) data protection solution in a VMware vSphere 5.5 HA Cluster. For this test they utilized a vSphere VM configured with three logical disks located on separate datastores to support an Exchange server with two mailbox databases. Each of the mailbox databases was configured to support 1,000 user accounts.

This paper provides technically savvy IT decision makers with the detailed performance and resource configuration information needed to analyze the trade-offs involved in setting up an optimal data protection and business continuity plan to support a service level agreement (SLA) with line of business (LoB) executives.

To test backup performance, they created 2,000 AD users and utilized LoadGen to generate email traffic. Each user received 120 messages and sent 20 messages over an 8-hour workday. Using this load level, we established performance baselines for a data protection using direct SAN-based agentless VM backups.

In this scenario they were able to :

  • Finish crash-consistent incremental agent-less backups in 18 minutes, while processing our base transaction load of 12 Outlook TPS.
  • Restore a fully functional VM in less than 5 minutes as a Hyper-V VM capable of sustaining an indefinite load of 4 Outlook TPS
  • Recover all user mailboxes as .pst files from a host-level agentless VM backup with no need to schedule a Windows Client backup initiated within the VM’s guest Windows OS.
In a DR scenario, Vembu leverages the ability to restore a VM in any format, to provide an Instant-boot function, When Vembu Backup Server is installed on a server that is concurrently running Hyper-V, Vembu exports the datastores associated with a VM backup as Hyper-V disks and configures a VM to boot from the datastores.
IT Monitoring and Performance Management White Paper
Learn about eG Enterprise's unified monitoring capabilities as they apply to your infrastructure and particular challenges, whether application performance management, Citrix monitoring, Java monitoring or other business environments.

Citrix logon monitoring has been a topic that has been getting a lot of attention. In some domains, users logon multiple times into their Citrix infrastructure. Slow logons affect the user experience and reduce user productivity.

This whitepaper discusses different ways of monitoring Citrix logon times, reviews what is necessary for complete visibility into the Citrix logon process and presents how to diagnose Citrix logon slowness issues quickly to improve the user experience and enhance productivity.

Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about BC/DR planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Therefore thorough security and business continuity strategies are crucial for modern businesses, minimizing data loss and downtime. Especially now, as data centers become more and more software defined, these private, hybrid and public clouds become more vulnerable to these kinds of threats.
Copy Data Management for Pure Storage FlashArray
Catalogic ECX in-place copy data management for Pure Storage simplifies and automates operation of your Pure Storage FlashArray infrastructure through comprehensive management of Pure Storage FlashRecover snapshots, replication and clones. By providing an application- and VM-aware copy management software layer, ECX reduces copy sprawl, simplifies data protection and disaster recovery, and delivers value-adding use cases such as automated infrastructure deployment for Dev-Test or DevOps.
Catalogic ECX in-place copy data management (CDM) for Pure Storage simplifies and automates operation of your Pure Storage FlashArray infrastructure through comprehensive management of Pure Storage FlashRecover snapshots, replication and clones. By providing an application- and VM-aware copy management software layer, ECX reduces copy sprawl, simplifies data protection and disaster recovery, and delivers value-adding use cases such as automated infrastructure deployment for Dev-Test or DevOps.
 
Catalogic’s in-place CDM approach has significant advantages over alternatives in that it requires no additional infrastructure for the user to purchase and manage, and leverages the existing Pure Storage production environment rather than requiring the creation of a fully redundant environment for the copies of the production data.
Default FTA management for Word 2013 and WordViewer
A complete step-by-step guide for managing the default file type associations for Word 2013 and WordViewer with FSLogix.

Duncan Murdoch, of Amber Reef, uses this white paper to outline the necessary approach to centrally control and manage FTAs for Word 2013 and WordViewer using FSLogix. 

After addressing the reason and symptoms of the issue, Duncan asserts, "If the desire is to 'Control the FTA' centrally and manage the associations with FSLogix, preventing the users from overriding the FTA settings," then "to achieve this you can create 2 separate FTA rules, one for Word 2013 and another for WordViewer."

By applying these rules alongside the FSLogix Hiding rules for the applications, then the Administrator can ensure that the FTA that is applied is the one that they have allocated to the application group.

NOTE: This will also prevent a user from being able to right-click the file and assign their OWN FTA preferences.

4 Virtualization Skills to Take Flight In Your IT Career
It's time to take your IT career flight beyond the final frontiers of your virtual universe. Do it with the SOAR Framework.
Normal 0 false false false EN-US X-NONE X-NONE

It's time to take your IT career flight beyond the final frontiers of your virtual universe. Do it with the SOAR Framework.

You'll learn 4 virtualization skills to advance your career: 

  • Secure - Govern, control data and user planes
  • Optimize - Run more efficiently
  • Automate - Scale your IT environment
  • Report - Show & tell to your leadership teams
Each SOAR skill will help you to deal with change management in the era of continuous service integration and service delivery. Time to shatter the shackles and take flight!
Converged Application and Infrastructure Performance Monitoring
Download this white paper to discover how converged application and infrastructure performance monitoring can help you proactively discover, diagnose and resolve performance issues and applications to consistently deliver great user experience.

As detecting and troubleshooting application performance issues increases in complexity in today’s distributed, heterogeneous environments, the siloed monitoring of applications and infrastructure tiers (network, storage, virtualization, database, etc.) is no longer sufficient. eG Enterprise delivers the first converged application and infrastructure performance monitoring solution, providing unified visibility of application performance, end-user experience, and infrastructure health—all from a single pane of glass.

Read this white paper to find out how eG Enterprise’s converged application and infrastructure monitoring capabilities help you:

  • Proactively detect user experience issues before your customers are impacted
  • Trace business transactions and isolate the cause of application slowness
  • Get code-level visibility to identify inefficient application code and slow database queries
  • Automatically map application dependencies within the infrastructure to pinpoint the root cause of the problem