Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 68 white papers, page 1 of 5.
Application Response Time for Virtual Operations
For applications running in virtualized, distributed and shared environments it will no longer work to infer the performance of an application by looking at various resource utilization statistics. Rather it is essential to define application performance by measuring response and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Massive changes are occurring to how applications are built and how they are deployed and run. The benefits of these changes are dramatically increased responsiveness to the business (business agility), increased operational flexibility, and reduced operating costs.

The environments onto which these applications are deployed are also undergoing a fundamental change. Virtualized environments offer increased operational agility which translates into a more responsive IT Operations organization. Cloud Computing offers applications owners a complete out-sourced alternative to internal data center execution environments. IT organizations are in turn responding to public cloud with IT as a Service (IaaS) initiatives.

For applications running in virtualized, distributed and shared environments, it will no longer work to infer the “performance” of an application by looking at various resource utilization statistics. Rather it will become essential to define application performance as response time – and to directly measure the response time and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
Citrix AppDNA and FlexApp: Application Compatibility Solution Analysis
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.

This whitepaper provides an overview of Citrix AppDNA with Liquidware Labs FlexApp.

Zerto Offsite Cloud Backup & Data Protection
Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Zerto Offsite Backup in the Cloud

What is Offsite Backup?

Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Why Cloud Backup?

  • Offsite Backup combines replication and long retention in a new way
  • The repository can be located in public cloud storage, a private cloud, or as part of a hybrid cloud solution.
  • Copies are saved on a daily, weekly and monthly schedule.
  • The data volumes and configuration information are included to allow VM backups to be restored on any compatible platform, cloud or otherwise.
A New Approach to Per User Application Management
Our premise is simple: existing methodologies for delivering and deploying Windows applications are based upon outmoded ideas and outdated technology. There remains a need for a product that makes it simple for each user to have their Windows applications individually tailored for their device. When a user logs on they should see only the applications that they are licensed to use regardless of whether they are using cloud, virtual or traditional desktops.
Normal 0 false false false EN-US X-NONE X-NONE

A simple truth: Current application delivery and deployment solutions for Windows®-based desktops are often not fast enough, and the methods employed introduce complexities and limitations that cost enterprises valuable time, money and productivity. There is a strong need for a solution that is faster to deploy, simpler to use, and improves productivity rather than degrades it. In fact, the best solution would seamlessly and instantaneously personalizing the entire desktop, from profiles and printers to applications and extensions, while supporting license compliance and cost optimization. And, of course, it wouldn’t matter if the target desktops were physical, virtual, or cloud-based. FSLogix is delivering that solution today.

UNIQUE, CUTTING EDGE TECHNOLOGY

FSLogix has devised a revolutionary technique called Image Masking to create a single Unified Base Image that hides everything a logged in user shouldn’t see, providing predictable and real-time access to applications and profiles. This approach is driving unprecedented success in image reduction, with a side benefit of license cost optimization. Image masking functions identically across a wide range of Windows-based platforms, greatly simplifying the path from traditional to virtual environments, and dramatically reducing the management overhead required for enterprise desktops. This solution eliminates multiple layers of management infrastructure, creating a single, unified approach to image management, profile access, and application delivery.
User Profile and Environment Management with ProfileUnity
This whitepaper has been authored by experts at Liquidware Labs in order to provide guidance to adopters of desktop virtualization technologies. In this paper, we outline how ProfileUnity was designed to address many of the shortcomings of Roaming Profiles, and basic profile management tools that are just a step away from roaming profiles, in managing user profiles and user-authored data over multiple desktop platforms, including physical upgrades and refreshes, Windows migrations and moves to
User Profile Management on Microsoft Windows desktops continues to provide challenges.  Most Administrators find that Roaming Profiles and even Microsoft UEV generally fall short due to several factors. Profile Corruption, Lack of Customization, and lack of Enterprise Features are just some of the top shortcomings of Microsoft Windows profile management with these options.

Basic tools such as roaming profiles do not support a mixed operating environment, therefore it does not allow users to move among desktops with mixed profile versions, e.g. Windows 7, Windows 10, Server2008, 2012 r2, etc.

The lack of support of mixed OS versions makes Microsoft profile management methods a serious hindrance when upgrading/migrating operating systems. Microsoft profile management tools also only support very limited granular management, so admins do not have the ability to exclude bloated areas of a user profile or to include files and registry keys outside of the profile. Profile bloat is one of the number one reasons for long logon times on Windows desktops.

Most organizations who will upgrade from a previous Windows® OS, such as Windows 7, to Windows 10, will want the flexibility to move at their own pace and upgrade machines on a departmental or ‘as needed’ basis.  As a result, management of Microsoft profiles and migration become a huge challenge for these environments because neither operation is seamlessly supported or functional between the two operating systems.  

A user’s profile consists of nearly everything needed to provide a personalized user experience within Windows.  If one could separate out the user profile from Windows and enable dynamic profiles that can adapt to any Windows OS version, several advantages can be realized:
  • User state can be stored separately and delivered just-in-time to enable workers to roam from workspace to workspace
  • Users’ profiles can co-exist in mixed OS environments or automatically migrate from one OS to the next, making OS upgrades easy and essentially irrelevant during a point-in-time upgrade
  • Integral policies and self-managed settings, such as local and network printer management, as well as security policies, can be readily restored in the event of a PC failure or loss (disaster recovery)
Given the growing complexity and diversity of Windows desktops technologies, today’s desktop administrators are looking for better ways to manage user profiles across the ever-increasing spectrum of desktop platforms available. In this whitepaper, we will cover the issues inherent with Roaming Profiles and how ProfileUnity addresses these issues.
Growing at 35% per year, Vembu branches out from its backup/recovery roots
Cloud­based backup/recovery is a cutthroat business with shrinking margins, commoditization and a surfeit of contenders trying to get a piece of the pie. The company's decision to push its resellers away from rebranding and into carrying Vembu's name on their services will give it much ­needed name/brand recognition in a crowded arena.

Vembu has grown its revenue 35% annually over the past two years and is on track to meet that mark in 2014. Key product additions this year include a suite of CRM applications and the introduction of on­premises virtual appliances (with physical appliances to come in the near future). The latter move puts Vembu in more direct competition with relatively well ­known players in the hybrid cloud backup battle.

Vembu is celebrating its 10­ year anniversary by exceeding the 60,000 ­customer milestone, sold mainly through its 4,400 channel partners. That compares with 55,000 customers and 4,000 resellers in February 2014. The company has added 400 resellers so far this year, and has begun to emphasize VARs in addition to its traditional target market of MSPs. Notable service­provider partners include Verizon's Terremark subsidiary, mindSHIFT Technologies, HostPapa and Hitachi Data Systems. The profitable Vembu claims to have exceeded 35% revenue growth in each of the past two years, and is on track for similar gains this year.

The company expects to have 200 employees by the end of 2014 (up from 160 in February), and 300 by the end of 2015. Most of its employees are near its headquarters in Chennai, India (with 65% engaged in R&D), but Vembu has been steadily expanding internationally. It opened an office in London this year, and relocated its US headquarters to Addison, Texas, where it expects to grow its workforce from 15 employees this year to 50 next year Vembu's worldwide distribution of partners roughly equates to its worldwide revenue distribution: 70% North America, 20% Europe and 10% AsiaPacific – a distribution that has remained fairly steady over the past year. However, although about 30% of its revenue comes from outside North America today, Vembu hopes to increase that to 50% in 2015. Key target markets for 2015 include the EU­5 countries, Scandinavia, Brazil and China

Does Backup Need a File System of its Own?
VembuHIVETM is an efficient cloud file system designed for large-scale backup and disaster recovery (BDRTM) application with support for advanced use-cases. VembuHIVETM can be thought of as a File System of File Systems with in-built version control, deduplication (elimination of redundant information to enhance storage reduction), encryption, and in-built error correction.

Backup is just not about storage. It’s the intelligence on top of storage. Typically when businesses think of backup, they see it as a simple data copy from one location to another. Traditional file systems would suffice if the need were to just copy the data. But backup is the intelligence applied on top of storage where data can be put to actual use. Imagine the ability to use backup data for staging, testing, development and preproduction deployment. Traditional file systems are not designed to meet such complex requirements.

With the advent of information technology, more and more organizations are relying on IT for running their businesses. They cannot afford to have downtime on their critical applications and need instant access to data in the event of disaster. Hence, a new type of file system is necessary to satisfy this need. 

VembuHIVETM manages the metadata smartly through its patent-pending technology, in a way that is agnostic to the file system of the backup, which is why we call VembuHIVETM, a file system of file systems. This helps the backup application to instantly associate the data in VembuHIVETM to any file system metadata, thereby allowing on-demand file or image restores in many possible file formats. The data and metadata storage, harness cluster file system and computing and storage.

This is a really powerful concept that will address some very interesting use cases not just in the backup and recovery domain but also in other domains, such as big-data analytics.

The key to the design of VembuHIVETM is its novel mechanism to capture and generate appropriate metadata and store it intelligently in a cloud infrastructure. The increment data (the changes with respect to a previous version of the same backup) are treated like versions in a version control system (CVS, GIT). This revolutionary way of data capture and metadata generation provides seamless support to a wide range of complex restore use cases.

FSLogix Lab Installation Guide for Azure
This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps. POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way. We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process. The testing environment is built entirely in Azure and contains an IaaS RDSH deployment incl

This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps.  POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way.  We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process.

The testing environment is built entirely in Azure and contains an IaaS RDSH deployment including the supporting network and domain infrastructure.  A non-Azure based client component accesses the RDSH deployment.

Zerto's Cloud Continuity Platform: Enabling the Hybrid Cloud
Download this white paper and learn more about Zerto's Cloud Continuity Platform for Hybrid Cloud IT - empowering you to move, translate, and migrate virtual worklaods between virtualized infrastructures with confidence and ease.
Hybrid Cloud is rapidly becoming the preferred model for IT. A missing piece for enabling true, production grade Hybrid Cloud is the ability to mobilize and protect production workloads between different infrastructure types. Cloud Continuity Platform is a new infrastructure concept which enables application mobility and protection across public, managed and private clouds, and across different hypervisors. With Cloud continuity platform the right infrastructure can be used to optimize for cost, SLA and performance with simple scalability and flexibility, without disruption to the business and while enabling full business continuity. The choice of a Hybrid Cloud is here.
Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about BC/DR planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Therefore thorough security and business continuity strategies are crucial for modern businesses, minimizing data loss and downtime. Especially now, as data centers become more and more software defined, these private, hybrid and public clouds become more vulnerable to these kinds of threats.
The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

The Hybrid Cloud Guide
This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services.

This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

Topics discussed include:
•    Why Cloud?
•    Getting There Safely
•    IT Resilience in the Hybrid Cloud
•    The Power of Microsoft Azure and Zerto

You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business.

Approaches and Benefits of Network Virtualization
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure — the network. Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.

Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure—the network.

Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.
 
In this whitepaper you will be introduced to Cloudistics Ignite’s Adaptive Overlay Network (AON) technology that provides the following benefits:
◦    Simplifies and automates network provisioning, avoiding manual errors common when dealing with physical networks, VLANs, etc.

  • Enables you to scale your business to multi-site locations without unnecessary costly hardware purchases and lengthy maintenance windows
  • Enables you to fine-tune your application’s performance and security through dedicated virtual networks that can be deployed in minutes

Natively built-into the Ignite platform, lowering costs by eliminating the need for 3rd party software and hardware

The Cloudistics Composable Cloud Platform
Cloudistics delivers the 4th era of IT infrastructures, composable systems, that delivers the agility, scalability and ease of use of the public cloud, with the performance and control of on-premises infrastructure. Learn more from the expert Dr. Jai Menon, IBM Fellow, Dell CTO Emeritus, and Chief Scientist at Cloudistics – on the evolution of infrastructures and how Cloudistics delivers the next generation on-premises cloud.
From hyperconverged infrastructures to the public cloud, IT solutions continue to strive to simplify management and avoid the complexities and headaches of traditional infrastructures. However, infrastructures haven't been able to match the simplicity offered by the public cloud, and the public cloud haven't been able to match the performance of on-premises infrastructures.

Cloudistics delivers the 4th era of IT infrastructures, composable systems, that delivers the agility, scalability and ease of use of the public cloud, with the performance and control of on-premises infrastructure. Learn more from the expert Dr. Jai Menon, IBM Fellow, Dell CTO Emeritus, and Chief Scientist at Cloudistics - on the evolution of infrastructures and how Cloudistics delivers the next generation on-premises cloud.