Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 17 white papers, page 1 of 2.
The Expert Guide to VMware Data Protection
Virtualization is a very general term for simulating a physical entity by using software. There are many different forms of virtualization that may be found in a data center including server, network and storage virtualization. When talking about server virtualization there are many unique terms and concepts that you may hear that are part of the technology that makes up server virtualization.
Virtualization is the most disruptive technology of the decade. Virtualization-enabled data protection and disaster recovery is especially disruptive because it allows IT to do things dramatically better at a fraction of the cost of what it would be in a physical data center.

Chapter 1: An Introduction to VMware Virtualization

Chapter 2: Backup and Recovery Methodologies

Chapter 3: Data Recovery in Virtual Environments

Chapter 4: Learn how to choose the right backup solution for VMware
The Hands-on Guide: Understanding Hyper-V in Windows Server 2012
Topics: Hyper-V, veeam
This chapter is designed to get you started quickly with Hyper-V 3.0. It starts with a discussion of the hardware requirements for Hyper-V 3.0 and then explains a basic Hyper-V–deployment followed by an upgrade from Hyper-V 2.0 to Hyper-V 3.0. The chapter concludes with a demonstration of migrating virtual machines from Hyper-V 2.0 to Hyper-V 3.0
The Hands-on Guide: Understanding Hyper-V in Windows Server 2012 gives you simple step-by-step instructions to help you perform Hyper-V-related tasks like a seasoned expert. You will learn how to:
  • Build clustered Hyper-V deployment
  • Manage Hyper-V through PowerShell
  • Create virtual machine replicas
  • Transition from a legacy Hyper-V environment
  • and more
CIO Guide to Virtual Server Data Protection
Server virtualization is changing the face of the modern data center. CIOs are looking for ways to virtualize more applications, and faster across the IT spectrum.
Server virtualization is changing the face of the modern data center. CIOs are looking for ways to virtualize more applications, faster across the IT spectrum. Selecting the right data protection solution that understands the new virtual environment is a critical success factor in the journey to cloud-based infrastructure. This guide looks at the key questions CIOs should be asking to ensure a successful virtual server data protection solution.
PowerShell for newbies: Getting started with PowerShell 4.0
Topics: veeam, powershell
This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms.

This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms. This e-book provides the fundamentals every PowerShell administrator needs to know. The getting started guide will give you a crash course on PowerShell essential terms, concepts and commands and help you quickly understand PowerShell basics.

You will also learn about:

  • What is PowerShell?
  • Using PowerShell Help
  • PowerShell Terminology
  • The PowerShell Paradigm
  • And more!

This white paper focuses on PowerShell 4.0; however, you can be sure that all the basics provided are relevant to earlier versions as well. For those who are ready to take the next steps in learning PowerShell and looking for more information on the topic, this PDF contains a list of helpful resources.

Weighing Your Unified Monitoring Options: When Open Source Makes Sense
There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few. However, not every tool is right for every environment.
Normal 0 false false false EN-US X-NONE X-NONE

There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few.

However, not every tool is right for every environment.

Weighing the strengths and weaknesses of open-source offerings is essential to determining whether they will work to meet your specific goals.

Since Zenoss has both open source and enterprise-scale solutions, we’re very familiar with both the benefits and limitations of these product sets for your organizational needs. This comparison guide helps provide insight into when and where open source tools might be a good fit.

Which solution is the right fit for you?  Download our white paper today to find out!
The Guide to Selecting Flash for Virtual Environments
High-performance flash-based storage has dramatically improved the storage infrastructure’s ability to respond to the demands of servers and the applications that count on it. Nowhere does this improvement have more potential than in the virtualized-server environment. The performance benefits of flash are so great that it can be deployed indiscriminately and still performance gains can be seen. But doing so may not allow the environment to take full advantage of flash performance. It may also b
Flash storage allows for a higher number of VMs per host. Increasing VM density reduces the number of physical servers required and thereby reduces one of the largest ongoing costs, buying more physical servers, which often are configured with multiple processors and extra DRAM. At the same time, the high performance and low latency of flash allows more mission critical applications to be virtualized. This report explains how storage and hypervisor vendors are getting smarter about leveraging this faster form of storage by including storage quality of service (QoS) intelligence in their systems or environments.
FSLogix Lab Installation Guide for Azure
This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps. POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way. We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process. The testing environment is built entirely in Azure and contains an IaaS RDSH deployment incl

This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps.  POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way.  We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process.

The testing environment is built entirely in Azure and contains an IaaS RDSH deployment including the supporting network and domain infrastructure.  A non-Azure based client component accesses the RDSH deployment.

Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about BC/DR planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Therefore thorough security and business continuity strategies are crucial for modern businesses, minimizing data loss and downtime. Especially now, as data centers become more and more software defined, these private, hybrid and public clouds become more vulnerable to these kinds of threats.
Default FTA management for Word 2013 and WordViewer
A complete step-by-step guide for managing the default file type associations for Word 2013 and WordViewer with FSLogix.

Duncan Murdoch, of Amber Reef, uses this white paper to outline the necessary approach to centrally control and manage FTAs for Word 2013 and WordViewer using FSLogix. 

After addressing the reason and symptoms of the issue, Duncan asserts, "If the desire is to 'Control the FTA' centrally and manage the associations with FSLogix, preventing the users from overriding the FTA settings," then "to achieve this you can create 2 separate FTA rules, one for Word 2013 and another for WordViewer."

By applying these rules alongside the FSLogix Hiding rules for the applications, then the Administrator can ensure that the FTA that is applied is the one that they have allocated to the application group.

NOTE: This will also prevent a user from being able to right-click the file and assign their OWN FTA preferences.

App-V and FSLogix File Type Association Management
Duncan Murdoch, of Amber Reef, provides a concise, visual guide in order to show the precise steps for managing file type associations (FTAs) when using App-V with FSLogix.

A concise, visual guide to implementing file type associations when using App-V with FSLogix. Duncan Murdoch, of Amber Reef, uses this white paper to show the precise steps for managing file type associations (FTAs) when using App-V with FSLogix. As an example for managing the file type associations for App-V packages, Duncan Murdoch demonstrates the ease of this process with Adobe DC and FOX-IT Reader as published applications. With a couple quick steps and a single FSLogix rule, the proper FTAs are put in place for the desired default .pdf application.

The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

Buyer's Guide for Small/Midsize-Enterprise All-Flash Arrays
DCIG collected data on 24 of the top products from 11 storage vendors, and published the data in standardized data sheets, so IT buyers can do quick comparisons of more than 50 features that are supported or not supported on each model.
DCIG is pleased to present this fresh snapshot of the dynamic all-flash array (AFA) marketplace. The DCIG 2017-18 Small/Midsize Enterprise All-Flash Array Buyer’s Guide helps businesses accelerate the all-flash array selection process. This Buyer’s Guide includes data sheets for twenty-four (24) small/midsize enterprise-class all-flash arrays that achieved rankings of Recommended or Excellent. These products come from eleven (11) vendors including Dell EMC, Fujitsu, iXsystems, Kaminario, NEC, NetApp, Nimble Storage, Pivot3, Pure Storage, Tegile and Tintri.
StarWind Cloud VTL for AWS and Veeam Installation and Configuration Guidance
This technical paper provides information on how to deploy StarWind Cloud VTL and configure the integration with Amazon Simple Storage Service (Amazon S3).
Normal 0 false false false MicrosoftInternetExplorer4

StarWind Virtual Tape Library (VTL) is a feature of StarWind Virtual SAN that eliminates the need for the physical tape by emulating industry-standard tape hardware and keeping all data on inexpensive, fast and high-capacity spinning disks. It is designed for SMB and Enterprise that either look to get rid of physical tapes completely or are willing to accelerate the backup process and add an extra level of protection. Even with explosive data growth, StarWind VTL fits the backup job into reasonable time-frame by accelerating it, so the process does not overlap with production time.

This guide is intended for experienced StarWind users, Windows system administrators and IT professionals who would like to configure StarWind Virtual SAN® solution. It provides step-by-step guidance on how to create the VTL device and configure replication with Amazon Web Services.

Ease of Management and Flexibility Lead to Long-Term Relationship for IGEL at Texas Credit Union
Randolph-Brooks Federal Credit Union was looking for a more powerful endpoint computing solution to deliver e-mail and core financial applications through its Citrix-based infrastructure to its end-users, and IGEL’s Universal Desktop thin clients and Universal Management Suite (UMS) software fit the bill.

Randolph-Brooks Federal Credit Union is more than just a bank. It is a financial cooperative intent on helping its members save time, save money and earn money. Over the years, the credit union has grown from providing financial resources to military service members and their families to serving hundreds of thousands of members across Texas and around the world. RBFCU has a presence in three major market areas — Austin, Dallas and San Antonio — and has more than 55 branches dedicated to serving members and the community.

First and foremost, RBFCU is people. It’s the more than 1,800 employees who serve members’ needs each day. It’s the senior team and Board of Directors that guide the credit union’s growth. It’s the members who give their support and loyalty to the credit union each day.

To help its employees provide the credit union’s members with the highest levels of services and support, Randolph-Brooks Federal Credit Union relies on IGEL’s endpoint computing solutions.

DR 101 EBook
Disaster Recovery 101: Everything you wanted to know about DR….but were afraid to ask!
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.

This 101 guide will educate you on topics like:
  • How to evaluate replication technologies
  • Measuring the cost of downtime
  • How to test your Disaster Recovery plan
  • Reasons why backup isn’t Disaster Recovery
  • Tips for leveraging the cloud
  • Mitigating IT threats like ransomware
The Hybrid Cloud Guide
This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services.

This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

Topics discussed include:
•    Why Cloud?
•    Getting There Safely
•    IT Resilience in the Hybrid Cloud
•    The Power of Microsoft Azure and Zerto

You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business.