Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 12 of 12 white papers, page 1 of 1.
Five Fundamentals of Virtual Server Protection
The benefits of server virtualization are compelling and are driving the transition to large scale virtual server deployments.
The benefits of server virtualization are compelling and are driving the transition to large scale virtual server deployments. From cost savings recognized through server consolidation or business flexibility and agility inherent in the emergent private and public cloud architectures, virtualization technologies are rapidly becoming a cornerstone of the modern data center. With Commvault's software, you can take full advantage of the developments in virtualization technology and enable private and public cloud data centers while continuing to meet all your data management, protection and retention needs. This whitepaper outlines the to 5 challenges to overcome in order to take advantage of the benefits of virtualization for your organization.
The Path to Hybrid Cloud: Intelligent Bursting To Amazon Web Services & Microsoft Azure
In this whitepaper you will learn: The challenges in implementing an effective hybrid cloud; How key vendors are addressing their challenges; How to answer what, when and where to burst.

The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. However, these benefits don’t come without challenges.

In this whitepaper you will learn:
•    The challenges in implementing an effective hybrid cloud
•    How key vendors are addressing their challenges
•    How to answer what, when and where to burst

Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
Weighing Your Unified Monitoring Options: When Open Source Makes Sense
There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few. However, not every tool is right for every environment.
Normal 0 false false false EN-US X-NONE X-NONE

There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few.

However, not every tool is right for every environment.

Weighing the strengths and weaknesses of open-source offerings is essential to determining whether they will work to meet your specific goals.

Since Zenoss has both open source and enterprise-scale solutions, we’re very familiar with both the benefits and limitations of these product sets for your organizational needs. This comparison guide helps provide insight into when and where open source tools might be a good fit.

Which solution is the right fit for you?  Download our white paper today to find out!
A Flash Storage Technical and Economic Primer
Topics: tegile, storage, flash
Flash technology is rapidly evolving. Chances are the game has changed since you last checked. With every step forward, flash storage is becoming faster, more reliable, and less expensive. And there’s more than one kind of flash technology out there. Some flash focuses on performance, while others balance performance with capacity. Read this white paper for a technical breakdown of the latest in flash storage. Learn how flash has changed in the last few years, and how the economics have shifted.
Normal 0 false false false EN-US X-NONE X-NONE Although today’s NAND flash storage has its roots in 30-year-old technology, innovation has negated almost all of the challenges that are inherent in the media. Moreover, modern storage companies are taking even more software-based steps to further overcome such challenges. Between these advances, it’s clear that flash media use will continue to grow in the data center.
2016 Citrix Performance Management Report
This 2nd-annual research report from DABCC and eG Innovations provides the results of a comprehensive survey of the Citrix user community that explored the current state of Citrix performance management and sought to better understand the current challenges, technology choices and best practices in the Citrix community. The survey results have been compiled into a data rich, easily-digestible report to provide you with benchmarks and new insights into the best practices for Citrix performance m

Over the last decade, the Citrix portfolio of solutions has dramatically expanded to include Citrix XenApp, XenDesktop, XenServer, XenMobile, Sharefile and Workspace Cloud. And, the use cases for Citrix technologies have also expanded with the needs of the market. Flexwork and telework, BYOD, mobile workspaces, PC refresh alternatives and remote partner access are now common user paradigms that are all supported by Citrix technologies.

To deliver the best possible user experience with all these Citrix technologies, Citrix environments need to be well architected but also well monitored and managed to identify and diagnose problems early on and prevent issues from escalating and impacting end users and business processes.

This 2nd-annual research report from DABCC and eG Innovations provides the results of a comprehensive survey of the Citrix user community with a goal of exploring the current state of Citrix performance management and helping Citrix users better understand current challenges, technology choices and best practices in the Citrix community.

The survey results have been compiled into a data-rich, easy-to-digest report to provide you with benchmarks and new insights into the best practices for effective Citrix performance management.

Vembu: The Biggest Little Data Protection Company You Probably Haven't Heard Of (Yet)
Vembu wants to do more to let people know that it exists—it wants its own name to be in the marketplace and attached to its products—especially after hearing from many customers who desire to know whom the products they rely on truly belong to. So, in the past year, Vembu established relationships with more VARs and reached out directly to select enterprise and midmarket segments. It added 400 channel partners, 180 VARs, and 300 customers in 2014 alone.

If it appears that this analyst is impressed with Vembu, he is. Vembu’s feature set surpasses what one might presume to come from a backup company that most folks (in North America at least) haven’t heard of.And although it would be easy to assume that some of Vembu’s capabilities are mere boasts, the hesitations wash away with the recognition that this is a vendor with ten years in the business, and that well over half its workforce are R&D engineers. Said another way, Vembu appears to have been quietly solving its customers’ backup challenges for more than a decade through technology, instead of marketing.

In fact, not only did Vembu not have a marketing team until 2015, but it also didn’t have a sales team to speak of. This is an incredibly engineering-focused company—one whose revenues and customers have accumulated through word of mouth. But now, Vembu is building out a solid U.S.-based sales and marketing engine focused on penetrating awareness among IT decision makers, especially decision makers in the SMB segment.

The product Vembu will push in 2015, BDR 2.0, could be a “game changer” for Vembu’s growth. BDR appears to have the potential to quite effectively address the varied requirements of small and midmarket businesses who run mixed physical and virtual IT environments and who also want to leverage the cloud.

If Vembu continues to invest as much into its North American marketing and channel outreach programs as it historically has invested into engineering its technology, then 2015 could be the year that a lot of SMBs discover the “secret” to solving a lot of their backup problems.

European and APJ businesses may know Vembu, but many U.S. IT organizations will be surprised by the solution set of this ten-year-old company that is launching its first concerted marketing push into North America.

IT Monitoring and Performance Management White Paper
Learn about eG Enterprise's unified monitoring capabilities as they apply to your infrastructure and particular challenges, whether application performance management, Citrix monitoring, Java monitoring or other business environments.

Citrix logon monitoring has been a topic that has been getting a lot of attention. In some domains, users logon multiple times into their Citrix infrastructure. Slow logons affect the user experience and reduce user productivity.

This whitepaper discusses different ways of monitoring Citrix logon times, reviews what is necessary for complete visibility into the Citrix logon process and presents how to diagnose Citrix logon slowness issues quickly to improve the user experience and enhance productivity.

The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

2017 Strategic Roadmap for Storage
Gartner offers recommendations for IT leaders responsible for infrastructure modernization and agility. Emerging storage hardware and software enable IT leaders to lower acquisition costs per terabyte and improve manageability. In addition to focusing on agility, automation and cost reductions, IT leaders should address the cultural changes and skill set shortages caused by digital business projects.
Key Findings:

•    Vendor consolidation continues in the storage and hyperconverged integrated system market, causing reassessments of vendor relationships, cost impacts and potential solution switches.
•    New storage initiatives focus on the need for agility, automation and cost reduction, as evidenced by the high adoption of solid-state arrays and HCIS, along with increasing interest in software-defined storage and drastically simplified integrated backup appliances.
•    Cloud storage continues to be a polarizing practice, with business more optimistic and IT more cautious, resulting in clashes and conflicts between tactical decisions and strategic movements.
•    Digital business and other new business initiatives often require changes in the culture between business units and IT operations; this highlights the challenges of skill set shortages in such areas as the evaluation and management of IT service providers.
Charity Golf Tournament Sponsorship Results in a Hole-in-One for IGEL and Lockton Companies
Lockton was in the midst of a Citrix VDI roll-out when one of its thin client manufacturers changed some of the key features on the model the insurance broker was using to power its endpoints. This presented a number of challenges that the Lockton team needed to overcome during a critical stage in the VDI roll-out. Lockton was introduced to IGEL by Choice Solutions, an IGEL Platinum Partner, and selected the IGEL Universal Desktop (UD2-LX); IGEL Universal Management Suite (UMS); IGEL Universal D

Although Lockton is the world’s largest privately owned insurance brokerage firm, clients most frequently describe the insurance broker as team members who make their businesses better. Energy, innovation and deep expertise fuel Lockton’s focus on solving its clients’ problems and achieving real results.

It is this spirit of innovation that led Lockton to recently embark on the deployment of Citrix Virtual Desktop Infrastructure (VDI) at its headquarters in the Country Club Plaza area of Kansas City, MO., and local office locations across the United States and around the globe.

Lockton was about a quarter of the way through its Cirrus VDI deployment when one of its thin client manufacturers changed some of the key features on the model the insurance broker was using, without warning. This presented a number of challenges that Lockton’s IT team was unable to overcome during a critical stage in the VDI roll-out.

Around the same time Lockton was experiencing issues with the thin client manufacturer, they participated in a charity golf tournament in Kansas City that was hosted by IGEL Platinum Partner Choice Solutions and sponsored by IGEL. Following the golf tournament, Lockton tested the IGEL Universal Desktop (UD2-LX) and the IGEL Universal Management Suite (UMS) management console. The insurer realized immediately that the superior design and secure infrastructure management capabilities would make it possible for them to easily manage their entire network of thin clients in the U.S. from the company’s headquarters in Kansas City, and this was a key selling point.

To date, with the help of Choice Solutions, Lockton has deployed 1,200 IGEL UD2-LX thin clients and expected that number to increase to 1,800 by the end of 2017. Lockton also has a small number of licenses for the IGEL Universal Desktop Converter software which they are leveraging to turn hardware from other thin client manufacturers into IGEL-powered endpoints. Additionally, the insurer is using the IGEL UD Pocket to deliver the IGEL desktop to employees using legacy thin client hardware.

ESG Lab Review: Protecting Virtual Environments with Spectrum Protect Plus from IBM
This ESG Lab Review documents hands-on validation of the IBM Spectrum Protect Plus solution with a focus on how IBM makes deployment and management easy, while delivering multi-workflow recovery agility.
Even today, the reliable protection and recovery of virtual environments continues to be a daunting task for many IT organizations. That said, backup and recovery software does not always make VM protection and recovery easy. As an example, and perhaps most alarmingly, one in nine VM recoveries fails because the data was never backed up. When looking into why VM recoveries fail, one finds a startling range of causes. With so many challenges—the less-than-perfect track records of IT organizations when it comes to VM protection, coupled with failures to meet modern-day SLAs—it is not surprising that some respondents report they continue to lack complete confidence in their VM protection and recovery solution.

It’s apparent through the introduction of the Spectrum Protect Plus solution that these challenges have not been ignored by IBM. Now IBM customers can quickly and easily deploy a solution specifically designed to meet the challenges of virtual machine data protection and administration.