Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 50 white papers, page 1 of 4.
Application Response Time for Virtual Operations
For applications running in virtualized, distributed and shared environments it will no longer work to infer the performance of an application by looking at various resource utilization statistics. Rather it is essential to define application performance by measuring response and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Massive changes are occurring to how applications are built and how they are deployed and run. The benefits of these changes are dramatically increased responsiveness to the business (business agility), increased operational flexibility, and reduced operating costs.

The environments onto which these applications are deployed are also undergoing a fundamental change. Virtualized environments offer increased operational agility which translates into a more responsive IT Operations organization. Cloud Computing offers applications owners a complete out-sourced alternative to internal data center execution environments. IT organizations are in turn responding to public cloud with IT as a Service (IaaS) initiatives.

For applications running in virtualized, distributed and shared environments, it will no longer work to infer the “performance” of an application by looking at various resource utilization statistics. Rather it will become essential to define application performance as response time – and to directly measure the response time and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Making a Business Case for Unified IT Monitoring
Unified monitoring solutions like Zenoss offer a cost-effective alternative for those seeking to rein-in monitoring inefficiencies. By establishing a central nerve center to collect data from multiple tools and managed resources, IT groups can gain visibility into the end-to-end availability and performance of their infrastructure. This helps simplify operational processes and reduce the risk of service disruption for the enterprise.

In large IT organizations, monitoring tool sprawl has become so commonplace that it is not unusual for administrators to be monitoring 10 to 50 solutions across various departments.

Unified monitoring solutions like Zenoss offer a cost-effective alternative for those seeking to rein-in monitoring inefficiencies. By establishing a central nerve center to collect data from multiple tools and managed resources, IT groups can gain visibility into the end-to-end availability and performance of their infrastructure. This helps simplify operational processes and reduce the risk of service disruption for the enterprise.

This paper can help you make an effective business case for moving to a unified monitoring solution. Key considerations include:

•    The direct costs associated with moving to a unified monitoring tool
•    The savings potential of improved IT operations through productivity and efficiency
•    The business impact of monitoring tools in preventing and reducing both downtime and service degradation

Download the paper now!

Citrix AppDNA and FlexApp: Application Compatibility Solution Analysis
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.

This whitepaper provides an overview of Citrix AppDNA with Liquidware Labs FlexApp.

Zerto Offsite Cloud Backup & Data Protection
Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Zerto Offsite Backup in the Cloud

What is Offsite Backup?

Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Why Cloud Backup?

  • Offsite Backup combines replication and long retention in a new way
  • The repository can be located in public cloud storage, a private cloud, or as part of a hybrid cloud solution.
  • Copies are saved on a daily, weekly and monthly schedule.
  • The data volumes and configuration information are included to allow VM backups to be restored on any compatible platform, cloud or otherwise.
FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
A New Approach to Per User Application Management
Our premise is simple: existing methodologies for delivering and deploying Windows applications are based upon outmoded ideas and outdated technology. There remains a need for a product that makes it simple for each user to have their Windows applications individually tailored for their device. When a user logs on they should see only the applications that they are licensed to use regardless of whether they are using cloud, virtual or traditional desktops.
Normal 0 false false false EN-US X-NONE X-NONE

A simple truth: Current application delivery and deployment solutions for Windows®-based desktops are often not fast enough, and the methods employed introduce complexities and limitations that cost enterprises valuable time, money and productivity. There is a strong need for a solution that is faster to deploy, simpler to use, and improves productivity rather than degrades it. In fact, the best solution would seamlessly and instantaneously personalizing the entire desktop, from profiles and printers to applications and extensions, while supporting license compliance and cost optimization. And, of course, it wouldn’t matter if the target desktops were physical, virtual, or cloud-based. FSLogix is delivering that solution today.

UNIQUE, CUTTING EDGE TECHNOLOGY

FSLogix has devised a revolutionary technique called Image Masking to create a single Unified Base Image that hides everything a logged in user shouldn’t see, providing predictable and real-time access to applications and profiles. This approach is driving unprecedented success in image reduction, with a side benefit of license cost optimization. Image masking functions identically across a wide range of Windows-based platforms, greatly simplifying the path from traditional to virtual environments, and dramatically reducing the management overhead required for enterprise desktops. This solution eliminates multiple layers of management infrastructure, creating a single, unified approach to image management, profile access, and application delivery.
Vembu Changes the Dynamics of Data Protection for  Business Applications in a vSphere Environment
This paper examines how to use Vembu BDR to implement distributed backup and disaster recovery (DR) operations in a centrally managed data protection environment with an ingenious twist. Rather than store image backups of VMs and block-level backups of physical and VM guest host systems as a collection of backup files, Vembu BDR utilizes a document-oriented database as a backup repository, dubbed VembuHIVE, which Vembu virtualizes as a file system.
Normal 0 false false false EN-US X-NONE X-NONE In this analysis, openBench Labs assesses the performance and functionality of the Vembu Backup & Disaster Recovery (BDR) host-level (a.k.a. agentless) data protection solution in a VMware vSphere 5.5 HA Cluster. For this test they utilized a vSphere VM configured with three logical disks located on separate datastores to support an Exchange server with two mailbox databases. Each of the mailbox databases was configured to support 1,000 user accounts.

This paper provides technically savvy IT decision makers with the detailed performance and resource configuration information needed to analyze the trade-offs involved in setting up an optimal data protection and business continuity plan to support a service level agreement (SLA) with line of business (LoB) executives.

To test backup performance, they created 2,000 AD users and utilized LoadGen to generate email traffic. Each user received 120 messages and sent 20 messages over an 8-hour workday. Using this load level, we established performance baselines for a data protection using direct SAN-based agentless VM backups.

In this scenario they were able to :

  • Finish crash-consistent incremental agent-less backups in 18 minutes, while processing our base transaction load of 12 Outlook TPS.
  • Restore a fully functional VM in less than 5 minutes as a Hyper-V VM capable of sustaining an indefinite load of 4 Outlook TPS
  • Recover all user mailboxes as .pst files from a host-level agentless VM backup with no need to schedule a Windows Client backup initiated within the VM’s guest Windows OS.
In a DR scenario, Vembu leverages the ability to restore a VM in any format, to provide an Instant-boot function, When Vembu Backup Server is installed on a server that is concurrently running Hyper-V, Vembu exports the datastores associated with a VM backup as Hyper-V disks and configures a VM to boot from the datastores.
Growing at 35% per year, Vembu branches out from its backup/recovery roots
Cloud­based backup/recovery is a cutthroat business with shrinking margins, commoditization and a surfeit of contenders trying to get a piece of the pie. The company's decision to push its resellers away from rebranding and into carrying Vembu's name on their services will give it much ­needed name/brand recognition in a crowded arena.

Vembu has grown its revenue 35% annually over the past two years and is on track to meet that mark in 2014. Key product additions this year include a suite of CRM applications and the introduction of on­premises virtual appliances (with physical appliances to come in the near future). The latter move puts Vembu in more direct competition with relatively well ­known players in the hybrid cloud backup battle.

Vembu is celebrating its 10­ year anniversary by exceeding the 60,000 ­customer milestone, sold mainly through its 4,400 channel partners. That compares with 55,000 customers and 4,000 resellers in February 2014. The company has added 400 resellers so far this year, and has begun to emphasize VARs in addition to its traditional target market of MSPs. Notable service­provider partners include Verizon's Terremark subsidiary, mindSHIFT Technologies, HostPapa and Hitachi Data Systems. The profitable Vembu claims to have exceeded 35% revenue growth in each of the past two years, and is on track for similar gains this year.

The company expects to have 200 employees by the end of 2014 (up from 160 in February), and 300 by the end of 2015. Most of its employees are near its headquarters in Chennai, India (with 65% engaged in R&D), but Vembu has been steadily expanding internationally. It opened an office in London this year, and relocated its US headquarters to Addison, Texas, where it expects to grow its workforce from 15 employees this year to 50 next year Vembu's worldwide distribution of partners roughly equates to its worldwide revenue distribution: 70% North America, 20% Europe and 10% AsiaPacific – a distribution that has remained fairly steady over the past year. However, although about 30% of its revenue comes from outside North America today, Vembu hopes to increase that to 50% in 2015. Key target markets for 2015 include the EU­5 countries, Scandinavia, Brazil and China

Does Backup Need a File System of its Own?
VembuHIVETM is an efficient cloud file system designed for large-scale backup and disaster recovery (BDRTM) application with support for advanced use-cases. VembuHIVETM can be thought of as a File System of File Systems with in-built version control, deduplication (elimination of redundant information to enhance storage reduction), encryption, and in-built error correction.

Backup is just not about storage. It’s the intelligence on top of storage. Typically when businesses think of backup, they see it as a simple data copy from one location to another. Traditional file systems would suffice if the need were to just copy the data. But backup is the intelligence applied on top of storage where data can be put to actual use. Imagine the ability to use backup data for staging, testing, development and preproduction deployment. Traditional file systems are not designed to meet such complex requirements.

With the advent of information technology, more and more organizations are relying on IT for running their businesses. They cannot afford to have downtime on their critical applications and need instant access to data in the event of disaster. Hence, a new type of file system is necessary to satisfy this need. 

VembuHIVETM manages the metadata smartly through its patent-pending technology, in a way that is agnostic to the file system of the backup, which is why we call VembuHIVETM, a file system of file systems. This helps the backup application to instantly associate the data in VembuHIVETM to any file system metadata, thereby allowing on-demand file or image restores in many possible file formats. The data and metadata storage, harness cluster file system and computing and storage.

This is a really powerful concept that will address some very interesting use cases not just in the backup and recovery domain but also in other domains, such as big-data analytics.

The key to the design of VembuHIVETM is its novel mechanism to capture and generate appropriate metadata and store it intelligently in a cloud infrastructure. The increment data (the changes with respect to a previous version of the same backup) are treated like versions in a version control system (CVS, GIT). This revolutionary way of data capture and metadata generation provides seamless support to a wide range of complex restore use cases.

FSLogix Lab Installation Guide for Azure
This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps. POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way. We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process. The testing environment is built entirely in Azure and contains an IaaS RDSH deployment incl

This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps.  POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way.  We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process.

The testing environment is built entirely in Azure and contains an IaaS RDSH deployment including the supporting network and domain infrastructure.  A non-Azure based client component accesses the RDSH deployment.

Zerto's Cloud Continuity Platform: Enabling the Hybrid Cloud
Download this white paper and learn more about Zerto's Cloud Continuity Platform for Hybrid Cloud IT - empowering you to move, translate, and migrate virtual worklaods between virtualized infrastructures with confidence and ease.
Hybrid Cloud is rapidly becoming the preferred model for IT. A missing piece for enabling true, production grade Hybrid Cloud is the ability to mobilize and protect production workloads between different infrastructure types. Cloud Continuity Platform is a new infrastructure concept which enables application mobility and protection across public, managed and private clouds, and across different hypervisors. With Cloud continuity platform the right infrastructure can be used to optimize for cost, SLA and performance with simple scalability and flexibility, without disruption to the business and while enabling full business continuity. The choice of a Hybrid Cloud is here.
The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

The Hybrid Cloud Guide
This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services.

This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

Topics discussed include:
•    Why Cloud?
•    Getting There Safely
•    IT Resilience in the Hybrid Cloud
•    The Power of Microsoft Azure and Zerto

You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business.

The Cloudistics Composable Cloud Platform
Cloudistics delivers the 4th era of IT infrastructures, composable systems, that delivers the agility, scalability and ease of use of the public cloud, with the performance and control of on-premises infrastructure. Learn more from the expert Dr. Jai Menon, IBM Fellow, Dell CTO Emeritus, and Chief Scientist at Cloudistics – on the evolution of infrastructures and how Cloudistics delivers the next generation on-premises cloud.
From hyperconverged infrastructures to the public cloud, IT solutions continue to strive to simplify management and avoid the complexities and headaches of traditional infrastructures. However, infrastructures haven't been able to match the simplicity offered by the public cloud, and the public cloud haven't been able to match the performance of on-premises infrastructures.

Cloudistics delivers the 4th era of IT infrastructures, composable systems, that delivers the agility, scalability and ease of use of the public cloud, with the performance and control of on-premises infrastructure. Learn more from the expert Dr. Jai Menon, IBM Fellow, Dell CTO Emeritus, and Chief Scientist at Cloudistics - on the evolution of infrastructures and how Cloudistics delivers the next generation on-premises cloud.
Austin Solution Provider Powers DaaS Offering with IGEL and Parallels
In 2014, Austin-based Trinsic Technologies introduced Anytime Cloud. Anytime Cloud is a Desktop-as-a-Service (DaaS) solution designed to help SMB clients improve the end user computing experience and streamline business operations. Through Anytime Cloud, customers gain access to the latest cloud and virtualization technologies using IGEL thin clients with Parallels, a virtual application and desktop delivery software application.

Headquartered in Austin, Texas, Trinsic Technologies is a technology solutions provider focused on delivering managed IT and cloud solutions to SMBs since 2005.

In 2014, Trinsic introduced Anytime Cloud, a Desktop-as-a-Service (DaaS) designed to help SMB clients improve the end user computing experience and streamline business operations. To support Anytime Cloud, the solution provider was looking for a desktop delivery and endpoint management solution that would fulfill a variety of different end user needs and requirements across the multiple industries it serves. Trinsic also wanted a solution that provided ease of management and robust security features for clients operating within regulated industries such as healthcare and financial services.

The solution provider selected the IGEL Universal Desktop (UD) thin clients, the IGEL Universal Desktop Converter (UDC), the IGEL OS and the IGEL Universal Management Suite. As a result, some of the key benefits Trinsic has experienced include ease of management and configuration, security and data protection, improved resource allocation and cost savings.

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.