Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 52 white papers, page 1 of 4.
Making a Business Case for Unified IT Monitoring
Unified monitoring solutions like Zenoss offer a cost-effective alternative for those seeking to rein-in monitoring inefficiencies. By establishing a central nerve center to collect data from multiple tools and managed resources, IT groups can gain visibility into the end-to-end availability and performance of their infrastructure. This helps simplify operational processes and reduce the risk of service disruption for the enterprise.

In large IT organizations, monitoring tool sprawl has become so commonplace that it is not unusual for administrators to be monitoring 10 to 50 solutions across various departments.

Unified monitoring solutions like Zenoss offer a cost-effective alternative for those seeking to rein-in monitoring inefficiencies. By establishing a central nerve center to collect data from multiple tools and managed resources, IT groups can gain visibility into the end-to-end availability and performance of their infrastructure. This helps simplify operational processes and reduce the risk of service disruption for the enterprise.

This paper can help you make an effective business case for moving to a unified monitoring solution. Key considerations include:

•    The direct costs associated with moving to a unified monitoring tool
•    The savings potential of improved IT operations through productivity and efficiency
•    The business impact of monitoring tools in preventing and reducing both downtime and service degradation

Download the paper now!

Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
Masergy accelerates VDI and storage performance with Infinio
To support its global users, Masergy needed to accelerate its virtual desktop infrastructure (VDI) and was unconvinced that spending budget on solid-state drive (SSD) solutions would work.
To support its global users, Masergy needed to accelerate its virtual desktop infrastructure (VDI) and was unconvinced that spending budget on solid-state drive (SSD) solutions would work. The team was investigating SSD solutions and options from SanDisk, VMware and Dell, as well as all-flash arrays, when it discovered Infinio at VMworld 2014. Unlike the solutions Masergy considered previously, the simplicity of the Infinio Accelerator and low price point caught the Masergy team’s attention. Fewer than six months later, Masergy’s Infinio installation was under way. Infinio provides an alternative to expensive, hardware-based solutions to address VDI performance, which is what Masergy wanted to improve.
Zerto Offsite Cloud Backup & Data Protection
Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Zerto Offsite Backup in the Cloud

What is Offsite Backup?

Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Why Cloud Backup?

  • Offsite Backup combines replication and long retention in a new way
  • The repository can be located in public cloud storage, a private cloud, or as part of a hybrid cloud solution.
  • Copies are saved on a daily, weekly and monthly schedule.
  • The data volumes and configuration information are included to allow VM backups to be restored on any compatible platform, cloud or otherwise.
A New Approach to Per User Application Management
Our premise is simple: existing methodologies for delivering and deploying Windows applications are based upon outmoded ideas and outdated technology. There remains a need for a product that makes it simple for each user to have their Windows applications individually tailored for their device. When a user logs on they should see only the applications that they are licensed to use regardless of whether they are using cloud, virtual or traditional desktops.
Normal 0 false false false EN-US X-NONE X-NONE

A simple truth: Current application delivery and deployment solutions for Windows®-based desktops are often not fast enough, and the methods employed introduce complexities and limitations that cost enterprises valuable time, money and productivity. There is a strong need for a solution that is faster to deploy, simpler to use, and improves productivity rather than degrades it. In fact, the best solution would seamlessly and instantaneously personalizing the entire desktop, from profiles and printers to applications and extensions, while supporting license compliance and cost optimization. And, of course, it wouldn’t matter if the target desktops were physical, virtual, or cloud-based. FSLogix is delivering that solution today.

UNIQUE, CUTTING EDGE TECHNOLOGY

FSLogix has devised a revolutionary technique called Image Masking to create a single Unified Base Image that hides everything a logged in user shouldn’t see, providing predictable and real-time access to applications and profiles. This approach is driving unprecedented success in image reduction, with a side benefit of license cost optimization. Image masking functions identically across a wide range of Windows-based platforms, greatly simplifying the path from traditional to virtual environments, and dramatically reducing the management overhead required for enterprise desktops. This solution eliminates multiple layers of management infrastructure, creating a single, unified approach to image management, profile access, and application delivery.
The 2015 State of Converged Infrastructure Report
This year, Zenoss conducted its third annual State of Converged Infrastructure survey with 410 global IT leaders to explore how they are using converged infrastructure to respond to business needs for agility and speed. The survey received responses from 410 global IT professionals.
Normal 0 false false false EN-US X-NONE X-NONE

This year, Zenoss conducted its third annual State of Converged Infrastructure survey with 410 global IT leaders to explore how they are using converged infrastructure to respond to business needs for agility and speed. The survey received responses from 410 global IT professionals. A few highlights from the report:

  • What trends are driving adoption of Converged Infrastructure (CI)?
    69% of survey respondents either have or plan to have CI deployed by 2016.
  • What commonalities exist between those companies having the greatest success in deploying CI?
    A whopping 65% reported delivering better customer service with CI.
  • How are companies structuring their IT workforce to best manage CI deployments?
    33% felt it necessary to create a new team solely for the purpose of managing their new CI implementation.
The full report highlights and analyzes the strengths, weaknesses, obstacles, and demographic data of IT organizations using or planning to use Converged Infrastructure across the world.
Weighing Your Unified Monitoring Options: When Open Source Makes Sense
There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few. However, not every tool is right for every environment.
Normal 0 false false false EN-US X-NONE X-NONE

There are many open source monitoring tools available today that provide a cost-effective alternative for tackling baseline infrastructure monitoring challenges – Ganglia, Groundwork, Nagios, Zabbix, and Zenoss Core are just a few.

However, not every tool is right for every environment.

Weighing the strengths and weaknesses of open-source offerings is essential to determining whether they will work to meet your specific goals.

Since Zenoss has both open source and enterprise-scale solutions, we’re very familiar with both the benefits and limitations of these product sets for your organizational needs. This comparison guide helps provide insight into when and where open source tools might be a good fit.

Which solution is the right fit for you?  Download our white paper today to find out!
Growing at 35% per year, Vembu branches out from its backup/recovery roots
Cloud­based backup/recovery is a cutthroat business with shrinking margins, commoditization and a surfeit of contenders trying to get a piece of the pie. The company's decision to push its resellers away from rebranding and into carrying Vembu's name on their services will give it much ­needed name/brand recognition in a crowded arena.

Vembu has grown its revenue 35% annually over the past two years and is on track to meet that mark in 2014. Key product additions this year include a suite of CRM applications and the introduction of on­premises virtual appliances (with physical appliances to come in the near future). The latter move puts Vembu in more direct competition with relatively well ­known players in the hybrid cloud backup battle.

Vembu is celebrating its 10­ year anniversary by exceeding the 60,000 ­customer milestone, sold mainly through its 4,400 channel partners. That compares with 55,000 customers and 4,000 resellers in February 2014. The company has added 400 resellers so far this year, and has begun to emphasize VARs in addition to its traditional target market of MSPs. Notable service­provider partners include Verizon's Terremark subsidiary, mindSHIFT Technologies, HostPapa and Hitachi Data Systems. The profitable Vembu claims to have exceeded 35% revenue growth in each of the past two years, and is on track for similar gains this year.

The company expects to have 200 employees by the end of 2014 (up from 160 in February), and 300 by the end of 2015. Most of its employees are near its headquarters in Chennai, India (with 65% engaged in R&D), but Vembu has been steadily expanding internationally. It opened an office in London this year, and relocated its US headquarters to Addison, Texas, where it expects to grow its workforce from 15 employees this year to 50 next year Vembu's worldwide distribution of partners roughly equates to its worldwide revenue distribution: 70% North America, 20% Europe and 10% AsiaPacific – a distribution that has remained fairly steady over the past year. However, although about 30% of its revenue comes from outside North America today, Vembu hopes to increase that to 50% in 2015. Key target markets for 2015 include the EU­5 countries, Scandinavia, Brazil and China

Does Backup Need a File System of its Own?
VembuHIVETM is an efficient cloud file system designed for large-scale backup and disaster recovery (BDRTM) application with support for advanced use-cases. VembuHIVETM can be thought of as a File System of File Systems with in-built version control, deduplication (elimination of redundant information to enhance storage reduction), encryption, and in-built error correction.

Backup is just not about storage. It’s the intelligence on top of storage. Typically when businesses think of backup, they see it as a simple data copy from one location to another. Traditional file systems would suffice if the need were to just copy the data. But backup is the intelligence applied on top of storage where data can be put to actual use. Imagine the ability to use backup data for staging, testing, development and preproduction deployment. Traditional file systems are not designed to meet such complex requirements.

With the advent of information technology, more and more organizations are relying on IT for running their businesses. They cannot afford to have downtime on their critical applications and need instant access to data in the event of disaster. Hence, a new type of file system is necessary to satisfy this need. 

VembuHIVETM manages the metadata smartly through its patent-pending technology, in a way that is agnostic to the file system of the backup, which is why we call VembuHIVETM, a file system of file systems. This helps the backup application to instantly associate the data in VembuHIVETM to any file system metadata, thereby allowing on-demand file or image restores in many possible file formats. The data and metadata storage, harness cluster file system and computing and storage.

This is a really powerful concept that will address some very interesting use cases not just in the backup and recovery domain but also in other domains, such as big-data analytics.

The key to the design of VembuHIVETM is its novel mechanism to capture and generate appropriate metadata and store it intelligently in a cloud infrastructure. The increment data (the changes with respect to a previous version of the same backup) are treated like versions in a version control system (CVS, GIT). This revolutionary way of data capture and metadata generation provides seamless support to a wide range of complex restore use cases.

5 Keys to Virtualization Zen
So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

Zenoss makes managing virtualized environments and virtualization monitoring easy and less expensive. The Zenoss hybrid IT monitoring platform allows you to comprehensively monitor resource performance and availability across the entire stack, including network, storage, applications and more, regardless of physical or virtual location.

Virtual Machine Migration Checklist
Preparing for a virtualized infrastructure migration can be daunting, use the Zerto checklist to help you plan and execute your migration smoothly!
This checklist provides an overview to help plan a datacenter migration project and ensure accountability through each step including:
  • Communication: Maintain clear, and regular communication with everyone.
  • Scoping: Understand what makes up the application. Get rid of the unknowns to ensure nothing breaks.
  • Ownership and permissions: Who owns the server and application and who will test and validate pre and post migration?
  • Priority: Are there other projects in your way?
  • Organization: Checklists and spreadsheets: How are you tracking all of this?
  • Execution: How is the migration happening? How will the servers and data be moved?
  • Contingency: If something goes wrong, how do I back out and reschedule if necessary?
  • Tracking: Prepare for change. Track what changes need to occur on machines, applications, and infrastructure.
  • Data Hygiene: Cleanup the source environment
Zerto's Cloud Continuity Platform: Enabling the Hybrid Cloud
Download this white paper and learn more about Zerto's Cloud Continuity Platform for Hybrid Cloud IT - empowering you to move, translate, and migrate virtual worklaods between virtualized infrastructures with confidence and ease.
Hybrid Cloud is rapidly becoming the preferred model for IT. A missing piece for enabling true, production grade Hybrid Cloud is the ability to mobilize and protect production workloads between different infrastructure types. Cloud Continuity Platform is a new infrastructure concept which enables application mobility and protection across public, managed and private clouds, and across different hypervisors. With Cloud continuity platform the right infrastructure can be used to optimize for cost, SLA and performance with simple scalability and flexibility, without disruption to the business and while enabling full business continuity. The choice of a Hybrid Cloud is here.
Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about BC/DR planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Therefore thorough security and business continuity strategies are crucial for modern businesses, minimizing data loss and downtime. Especially now, as data centers become more and more software defined, these private, hybrid and public clouds become more vulnerable to these kinds of threats.
The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

IGEL Powers Rich Multimedia Computing Experience for Fulton Financial Corporation
In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure. With the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies, Fulton selected the IGEL Universal Desktop (UD6) thin clients featuring Intel Celeron J1900 Quad-Core processors and the IGEL Universal Management Suite (UMS).

Fulton Financial Corporation has a long and storied history that began in 1882 in Lancaster, Pennsylvania, where local merchants
and farmers organized Fulton National Bank. The bank’s name was chosen to honor Lancaster County native Robert Fulton, the inventor and artist best known for designing and building the Clermont, the first successful steamboat.

In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure, with the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies.

In selecting a desktop computing solution to support its Citrix application virtualization infrastructure, Fulton had one unique business requirement, they were looking for a solution that would mirror the experience provided by a Windows PC, without actually being a Windows PC.

During the evaluation process, Fulton looked at thin clients from IGEL and another leading manufacturer, conducting a “bake-off” of several models including the IGEL Universal Desktop (UD6). Fulton like the fact that IGEL is forward- thinking in designing its desktop computing solutions, and began its IGEL roll-out by purchasing 2,300 IGEL UD6 thin clients in 2016 for its headquarters and branch offices, and plans to complete the roll out of IGEL thin clients to the remainder of its 3,700 employees in the coming months. The bank is also leveraging the IGEL Universal Management Suite (UMS) to manage its fleet of IGEL thin clients.