Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 11 of 11 white papers, page 1 of 1.
Five Fundamentals of Virtual Server Protection
The benefits of server virtualization are compelling and are driving the transition to large scale virtual server deployments.
The benefits of server virtualization are compelling and are driving the transition to large scale virtual server deployments. From cost savings recognized through server consolidation or business flexibility and agility inherent in the emergent private and public cloud architectures, virtualization technologies are rapidly becoming a cornerstone of the modern data center. With Commvault's software, you can take full advantage of the developments in virtualization technology and enable private and public cloud data centers while continuing to meet all your data management, protection and retention needs. This whitepaper outlines the to 5 challenges to overcome in order to take advantage of the benefits of virtualization for your organization.
Using VM Archiving to Solve VM Sprawl
Topics: commvault, sprawl
This Commvault whitepaper discusses how archiving virtual machines can mitigate VM sprawl with a comprehensive approach to VM lifecycle management.
This Commvault whitepaper discusses how archiving virtual machines can mitigate VM sprawl with a comprehensive approach to VM lifecycle management.
Citrix AppDNA and FlexApp: Application Compatibility Solution Analysis
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.

This whitepaper provides an overview of Citrix AppDNA with Liquidware Labs FlexApp.

FlexApp: Application Layering Technology
FlexApp Application Layering in ProfileUnity enables applications to be virtualized in such an innate way that they look native to the Windows OS and other applications.
FlexApp Application Layering in ProfileUnity enables applications to be virtualized in such an innate way that they look native to the Windows OS and other applications.

Application Layering leads to much higher rates of compatibility than previous technologies which used Application Isolation to virtualize applications. Once applications have been packaged for layering, they are containerized on virtual hard disks (VHDs) or VMDKs.  They can be centrally assigned to users on a machine-level or “context-aware” basis.

This whitepaper provides an overview of FlexApp concepts and ways in which FlexApp can serve as a cornerstone in an application delivery strategy.
User Profile and Environment Management with ProfileUnity
This whitepaper has been authored by experts at Liquidware Labs in order to provide guidance to adopters of desktop virtualization technologies. In this paper, we outline how ProfileUnity was designed to address many of the shortcomings of Roaming Profiles, and basic profile management tools that are just a step away from roaming profiles, in managing user profiles and user-authored data over multiple desktop platforms, including physical upgrades and refreshes, Windows migrations and moves to
User Profile Management on Microsoft Windows desktops continues to provide challenges.  Most Administrators find that Roaming Profiles and even Microsoft UEV generally fall short due to several factors. Profile Corruption, Lack of Customization, and lack of Enterprise Features are just some of the top shortcomings of Microsoft Windows profile management with these options.

Basic tools such as roaming profiles do not support a mixed operating environment, therefore it does not allow users to move among desktops with mixed profile versions, e.g. Windows 7, Windows 10, Server2008, 2012 r2, etc.

The lack of support of mixed OS versions makes Microsoft profile management methods a serious hindrance when upgrading/migrating operating systems. Microsoft profile management tools also only support very limited granular management, so admins do not have the ability to exclude bloated areas of a user profile or to include files and registry keys outside of the profile. Profile bloat is one of the number one reasons for long logon times on Windows desktops.

Most organizations who will upgrade from a previous Windows® OS, such as Windows 7, to Windows 10, will want the flexibility to move at their own pace and upgrade machines on a departmental or ‘as needed’ basis.  As a result, management of Microsoft profiles and migration become a huge challenge for these environments because neither operation is seamlessly supported or functional between the two operating systems.  

A user’s profile consists of nearly everything needed to provide a personalized user experience within Windows.  If one could separate out the user profile from Windows and enable dynamic profiles that can adapt to any Windows OS version, several advantages can be realized:
  • User state can be stored separately and delivered just-in-time to enable workers to roam from workspace to workspace
  • Users’ profiles can co-exist in mixed OS environments or automatically migrate from one OS to the next, making OS upgrades easy and essentially irrelevant during a point-in-time upgrade
  • Integral policies and self-managed settings, such as local and network printer management, as well as security policies, can be readily restored in the event of a PC failure or loss (disaster recovery)
Given the growing complexity and diversity of Windows desktops technologies, today’s desktop administrators are looking for better ways to manage user profiles across the ever-increasing spectrum of desktop platforms available. In this whitepaper, we will cover the issues inherent with Roaming Profiles and how ProfileUnity addresses these issues.
Infinio Accelerator Product Overview White Paper
This whitepaper is an overview of Infinio Accelerator, a software-based server-side cache that provides high performance to any storage system in a VMware environment.
Normal 0 false false false EN-US X-NONE X-NONE This is an in-depth overview of Infinio Accelerator, a software-based server-side cache that provides high performance to any storage system in a VMware environment. It increases IOPS and decreases latency by caching a copy of the hottest data on server-side resources such as RAM and flash devices. Native inline deduplication ensures that all local storage resources are used as efficiently as possible, reducing the cost of performance. Results can be seen instantly following the non-disruptive, 15-minute installation that doesn’t require any downtime, data migration, or reboots.
Approaches and Benefits of Network Virtualization
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure — the network. Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.

Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure—the network.

Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.
 
In this whitepaper you will be introduced to Cloudistics Ignite’s Adaptive Overlay Network (AON) technology that provides the following benefits:
◦    Simplifies and automates network provisioning, avoiding manual errors common when dealing with physical networks, VLANs, etc.

  • Enables you to scale your business to multi-site locations without unnecessary costly hardware purchases and lengthy maintenance windows
  • Enables you to fine-tune your application’s performance and security through dedicated virtual networks that can be deployed in minutes

Natively built-into the Ignite platform, lowering costs by eliminating the need for 3rd party software and hardware

OneDrive for Business Performance in Non-Persistent Environments Using FSLogix's Office 365 Containe
An Independent Remote End-User Experience Performance Benchmark. Published on: http://www.rdsgurus.com/onedrive-for-business-performance-in-nonpersistent-environments-using-fslogixs-office-365-containers/
This whitepaper addresses the issue described in Microsoft’s knowledge base article “OneDrive for Business sync app isn’t supported for client sessions that are hosted on Windows 2008 Terminal Services or Windows 2012 Remote Desktop Services (RDS)“, published at https://support.microsoft.com/enus/kb/2965687. This is also true for RDS running on Windows Server 2016. To gain access to OneDrive for Business files, the officially supported solution for Remote Desktop users is to utilize a web browser. But most remote desktop users want to be able to use OneDrive for Business like they do on local Windows desktops.
IDC PERSPECTIVE - Validating the Known: A Different Approach to Cybersecurity
Let's face it. The 2017 cybersecurity reality is bleak, and the task of guarding our cyberassets is increasingly difficult. We can attribute this reality to four key trends:

Validating the Known:  A Different Approach to Cybersecurity

Let's face it. The 2017 cybersecurity reality is bleak, and the task of guarding our cyberassets is increasingly difficult. We can attribute this reality to four key trends:

1.        The sophistication of cybermiscreants is growing rapidly.
2.        The perimeter has died.
3.        Security tools are proliferated.
4.        Qualified information security professionals are scarce.
 
Although we have seen some innovative new offerings in the cybersecurity market, the majority of today's technologies take fundamentally the same approach: we are looking to detect the bad or malicious. A new approach is 'validating the known,' looking to validate objects as good or valid as compared with a certified list of known files or objects. Objects that cannot be validated are treated as untrusted. The binary 'good versus bad' classification gives way to validated good and invalidated," according to Frank Dickson, research director, Security Products.
 
Download this informative whitepaper to learn a new approach to cybersecurity: validating the known.

The SANS Maturity Model: Securing the Modern Endpoint
It’s alarmingly and unambiguously clear: detection-based defense in-depth has utterly failed. Evidence of major breaches on a weekly basis continues to demonstrate that detection is a security strategy that has completely run its course and should now rightfully be discarded. This doesn’t have to be the case. Defending the Modern Endpoint with application isolation can turn things around.
It’s alarmingly and unambiguously clear: detection-based defense in-depth has utterly failed. Evidence of major breaches on a weekly basis continues to demonstrate that detection is a security strategy that has completely run its course and should now rightfully be discarded. This doesn’t have to be the case. Defending the Modern Endpoint with application isolation can turn things around.
 
Download this informative whitepaper to learn how.
Application Lifecycle Management with Stratusphere UX
Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments.
Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users have come to expect applications to ‘just work’ on whatever device they have on hand. Combined with the notion that for many organizations, workspaces can be a mix of various delivery approaches, it is vital. to better understand application use, as well as information such as versioning, resource consumption and application user experience. This whitepaper defines three major lifecycle stages—analysis, user experience baselining and operationalization―each of which is composed of several crucial steps. The paper also provides practical use examples that will help you create and execute an application-lifecycle methodology using Stratusphere UX from Liquidware.