Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 54 white papers, page 1 of 4.
Making a Business Case for Unified IT Monitoring
Unified monitoring solutions like Zenoss offer a cost-effective alternative for those seeking to rein-in monitoring inefficiencies. By establishing a central nerve center to collect data from multiple tools and managed resources, IT groups can gain visibility into the end-to-end availability and performance of their infrastructure. This helps simplify operational processes and reduce the risk of service disruption for the enterprise.

In large IT organizations, monitoring tool sprawl has become so commonplace that it is not unusual for administrators to be monitoring 10 to 50 solutions across various departments.

Unified monitoring solutions like Zenoss offer a cost-effective alternative for those seeking to rein-in monitoring inefficiencies. By establishing a central nerve center to collect data from multiple tools and managed resources, IT groups can gain visibility into the end-to-end availability and performance of their infrastructure. This helps simplify operational processes and reduce the risk of service disruption for the enterprise.

This paper can help you make an effective business case for moving to a unified monitoring solution. Key considerations include:

•    The direct costs associated with moving to a unified monitoring tool
•    The savings potential of improved IT operations through productivity and efficiency
•    The business impact of monitoring tools in preventing and reducing both downtime and service degradation

Download the paper now!

Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
Technology Comparison: Disaster Recovery Solutions
Deep-dive comparison of disaster recovery solutions - differences between Zerto's hypervisor-based replication and array-based replication (with VMWare SRM)

Zerto’s innovative, hypervisor-based replication is a technology developed to provide a true enterprise class, yet fully virtual-aware disaster recovery solution, to protect virtualized, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

Compared Technologies

The current and legacy disaster recovery solutions compared in this document include:

• Zerto Hypervisor-based Replication

• Array-based Replication with and without SRM

• Host / Guest-based Replication

• Snapshot-based Replication

• VMware Site Recovery Manager with vSphere Replication

Citrix AppDNA and FlexApp: Application Compatibility Solution Analysis
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.

This whitepaper provides an overview of Citrix AppDNA with Liquidware Labs FlexApp.

FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
A New Approach to Per User Application Management
Our premise is simple: existing methodologies for delivering and deploying Windows applications are based upon outmoded ideas and outdated technology. There remains a need for a product that makes it simple for each user to have their Windows applications individually tailored for their device. When a user logs on they should see only the applications that they are licensed to use regardless of whether they are using cloud, virtual or traditional desktops.
Normal 0 false false false EN-US X-NONE X-NONE

A simple truth: Current application delivery and deployment solutions for Windows®-based desktops are often not fast enough, and the methods employed introduce complexities and limitations that cost enterprises valuable time, money and productivity. There is a strong need for a solution that is faster to deploy, simpler to use, and improves productivity rather than degrades it. In fact, the best solution would seamlessly and instantaneously personalizing the entire desktop, from profiles and printers to applications and extensions, while supporting license compliance and cost optimization. And, of course, it wouldn’t matter if the target desktops were physical, virtual, or cloud-based. FSLogix is delivering that solution today.

UNIQUE, CUTTING EDGE TECHNOLOGY

FSLogix has devised a revolutionary technique called Image Masking to create a single Unified Base Image that hides everything a logged in user shouldn’t see, providing predictable and real-time access to applications and profiles. This approach is driving unprecedented success in image reduction, with a side benefit of license cost optimization. Image masking functions identically across a wide range of Windows-based platforms, greatly simplifying the path from traditional to virtual environments, and dramatically reducing the management overhead required for enterprise desktops. This solution eliminates multiple layers of management infrastructure, creating a single, unified approach to image management, profile access, and application delivery.
User Profile and Environment Management with ProfileUnity
This whitepaper has been authored by experts at Liquidware Labs in order to provide guidance to adopters of desktop virtualization technologies. In this paper, we outline how ProfileUnity was designed to address many of the shortcomings of Roaming Profiles, and basic profile management tools that are just a step away from roaming profiles, in managing user profiles and user-authored data over multiple desktop platforms, including physical upgrades and refreshes, Windows migrations and moves to
User Profile Management on Microsoft Windows desktops continues to provide challenges.  Most Administrators find that Roaming Profiles and even Microsoft UEV generally fall short due to several factors. Profile Corruption, Lack of Customization, and lack of Enterprise Features are just some of the top shortcomings of Microsoft Windows profile management with these options.

Basic tools such as roaming profiles do not support a mixed operating environment, therefore it does not allow users to move among desktops with mixed profile versions, e.g. Windows 7, Windows 10, Server2008, 2012 r2, etc.

The lack of support of mixed OS versions makes Microsoft profile management methods a serious hindrance when upgrading/migrating operating systems. Microsoft profile management tools also only support very limited granular management, so admins do not have the ability to exclude bloated areas of a user profile or to include files and registry keys outside of the profile. Profile bloat is one of the number one reasons for long logon times on Windows desktops.

Most organizations who will upgrade from a previous Windows® OS, such as Windows 7, to Windows 10, will want the flexibility to move at their own pace and upgrade machines on a departmental or ‘as needed’ basis.  As a result, management of Microsoft profiles and migration become a huge challenge for these environments because neither operation is seamlessly supported or functional between the two operating systems.  

A user’s profile consists of nearly everything needed to provide a personalized user experience within Windows.  If one could separate out the user profile from Windows and enable dynamic profiles that can adapt to any Windows OS version, several advantages can be realized:
  • User state can be stored separately and delivered just-in-time to enable workers to roam from workspace to workspace
  • Users’ profiles can co-exist in mixed OS environments or automatically migrate from one OS to the next, making OS upgrades easy and essentially irrelevant during a point-in-time upgrade
  • Integral policies and self-managed settings, such as local and network printer management, as well as security policies, can be readily restored in the event of a PC failure or loss (disaster recovery)
Given the growing complexity and diversity of Windows desktops technologies, today’s desktop administrators are looking for better ways to manage user profiles across the ever-increasing spectrum of desktop platforms available. In this whitepaper, we will cover the issues inherent with Roaming Profiles and how ProfileUnity addresses these issues.
Vembu: The Biggest Little Data Protection Company You Probably Haven't Heard Of (Yet)
Vembu wants to do more to let people know that it exists—it wants its own name to be in the marketplace and attached to its products—especially after hearing from many customers who desire to know whom the products they rely on truly belong to. So, in the past year, Vembu established relationships with more VARs and reached out directly to select enterprise and midmarket segments. It added 400 channel partners, 180 VARs, and 300 customers in 2014 alone.

If it appears that this analyst is impressed with Vembu, he is. Vembu’s feature set surpasses what one might presume to come from a backup company that most folks (in North America at least) haven’t heard of.And although it would be easy to assume that some of Vembu’s capabilities are mere boasts, the hesitations wash away with the recognition that this is a vendor with ten years in the business, and that well over half its workforce are R&D engineers. Said another way, Vembu appears to have been quietly solving its customers’ backup challenges for more than a decade through technology, instead of marketing.

In fact, not only did Vembu not have a marketing team until 2015, but it also didn’t have a sales team to speak of. This is an incredibly engineering-focused company—one whose revenues and customers have accumulated through word of mouth. But now, Vembu is building out a solid U.S.-based sales and marketing engine focused on penetrating awareness among IT decision makers, especially decision makers in the SMB segment.

The product Vembu will push in 2015, BDR 2.0, could be a “game changer” for Vembu’s growth. BDR appears to have the potential to quite effectively address the varied requirements of small and midmarket businesses who run mixed physical and virtual IT environments and who also want to leverage the cloud.

If Vembu continues to invest as much into its North American marketing and channel outreach programs as it historically has invested into engineering its technology, then 2015 could be the year that a lot of SMBs discover the “secret” to solving a lot of their backup problems.

European and APJ businesses may know Vembu, but many U.S. IT organizations will be surprised by the solution set of this ten-year-old company that is launching its first concerted marketing push into North America.

Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about BC/DR planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Therefore thorough security and business continuity strategies are crucial for modern businesses, minimizing data loss and downtime. Especially now, as data centers become more and more software defined, these private, hybrid and public clouds become more vulnerable to these kinds of threats.
The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

Storage Playbook: Essential Enterprise Storage Concepts
Storage can seem like a confusing topic for the uninitiated, but a little bit of knowledge can go a long way. It is important to understand the basic concepts of storage technologies, performance, and configuration before diving into more advanced practices.
Normal 0 false false false EN-US X-NONE X-NONE

Storage can seem like a confusing topic for the uninitiated, but a little bit of knowledge can go a long way. It is important to understand the basic concepts of storage technologies, performance, and configuration before diving into more advanced practices.

In this e-book, we’ll cover storage basics, storage performance and capacity, forecasting and usage and storage best practices.

UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

The Hybrid Cloud Guide
This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services.

This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

Topics discussed include:
•    Why Cloud?
•    Getting There Safely
•    IT Resilience in the Hybrid Cloud
•    The Power of Microsoft Azure and Zerto

You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business.

Approaches and Benefits of Network Virtualization
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure — the network. Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.

Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure—the network.

Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.
 
In this whitepaper you will be introduced to Cloudistics Ignite’s Adaptive Overlay Network (AON) technology that provides the following benefits:
◦    Simplifies and automates network provisioning, avoiding manual errors common when dealing with physical networks, VLANs, etc.

  • Enables you to scale your business to multi-site locations without unnecessary costly hardware purchases and lengthy maintenance windows
  • Enables you to fine-tune your application’s performance and security through dedicated virtual networks that can be deployed in minutes

Natively built-into the Ignite platform, lowering costs by eliminating the need for 3rd party software and hardware

Omaha School District Leverages IGEL’s Revolutionary Micro Client
Millard Public Schools is currently leveraging the IGEL UD Pocket, a revolutionary micro client, inside the district’s computer-aided design (CAD) classrooms to securely and cost-effectively deliver Autodesk software to their CAD students via a Citrix virtual desktop.
Millard Public Schools was looking for a secure and cost-effective way to deliver graphics intensive CAD applications to students via Citrix virtual desktops. The school district selected the IGEL UD Pocket and is now leveraging the micro thin client inside its CAD classrooms. Some of the key benefits the district has experienced as a result of the IGEL solution include ease of management and configuration, time and cost savings, support for a robust multimedia experience, and enhanced endpoint security as students are now only able to access their Windows-based, GPU-enabled virtual desktops from a secured Linux-based endpoint.
Austin Solution Provider Powers DaaS Offering with IGEL and Parallels
In 2014, Austin-based Trinsic Technologies introduced Anytime Cloud. Anytime Cloud is a Desktop-as-a-Service (DaaS) solution designed to help SMB clients improve the end user computing experience and streamline business operations. Through Anytime Cloud, customers gain access to the latest cloud and virtualization technologies using IGEL thin clients with Parallels, a virtual application and desktop delivery software application.

Headquartered in Austin, Texas, Trinsic Technologies is a technology solutions provider focused on delivering managed IT and cloud solutions to SMBs since 2005.

In 2014, Trinsic introduced Anytime Cloud, a Desktop-as-a-Service (DaaS) designed to help SMB clients improve the end user computing experience and streamline business operations. To support Anytime Cloud, the solution provider was looking for a desktop delivery and endpoint management solution that would fulfill a variety of different end user needs and requirements across the multiple industries it serves. Trinsic also wanted a solution that provided ease of management and robust security features for clients operating within regulated industries such as healthcare and financial services.

The solution provider selected the IGEL Universal Desktop (UD) thin clients, the IGEL Universal Desktop Converter (UDC), the IGEL OS and the IGEL Universal Management Suite. As a result, some of the key benefits Trinsic has experienced include ease of management and configuration, security and data protection, improved resource allocation and cost savings.