Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 17 - 32 of 50 white papers, page 2 of 4.
Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about BC/DR planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Therefore thorough security and business continuity strategies are crucial for modern businesses, minimizing data loss and downtime. Especially now, as data centers become more and more software defined, these private, hybrid and public clouds become more vulnerable to these kinds of threats.
The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

The Hybrid Cloud Guide
This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services.

This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

Topics discussed include:
•    Why Cloud?
•    Getting There Safely
•    IT Resilience in the Hybrid Cloud
•    The Power of Microsoft Azure and Zerto

You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business.

Austin Solution Provider Powers DaaS Offering with IGEL and Parallels
In 2014, Austin-based Trinsic Technologies introduced Anytime Cloud. Anytime Cloud is a Desktop-as-a-Service (DaaS) solution designed to help SMB clients improve the end user computing experience and streamline business operations. Through Anytime Cloud, customers gain access to the latest cloud and virtualization technologies using IGEL thin clients with Parallels, a virtual application and desktop delivery software application.

Headquartered in Austin, Texas, Trinsic Technologies is a technology solutions provider focused on delivering managed IT and cloud solutions to SMBs since 2005.

In 2014, Trinsic introduced Anytime Cloud, a Desktop-as-a-Service (DaaS) designed to help SMB clients improve the end user computing experience and streamline business operations. To support Anytime Cloud, the solution provider was looking for a desktop delivery and endpoint management solution that would fulfill a variety of different end user needs and requirements across the multiple industries it serves. Trinsic also wanted a solution that provided ease of management and robust security features for clients operating within regulated industries such as healthcare and financial services.

The solution provider selected the IGEL Universal Desktop (UD) thin clients, the IGEL Universal Desktop Converter (UDC), the IGEL OS and the IGEL Universal Management Suite. As a result, some of the key benefits Trinsic has experienced include ease of management and configuration, security and data protection, improved resource allocation and cost savings.

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

Solution Guide for Sennheiser Headsets, IGEL Endpoints and Skype for Business on Citrix VDI
Topics: IGEL, Citrix, skype, VDI
Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Virtualizing Windows applications and desktops in the data center or cloud has compelling security, mobility and management benefits, but delivering real-time voice and video in a virtual environment is a challenge. A poorly optimized implementation can increase costs and compromise user experience. Server scalability and bandwidth efficiency may be less than optimal, and audio-video quality may be degraded.

Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

The Next Generation VDI Reference Architecture on Cloudistics Ignite
Desktop and application virtualization is one of the primary ways how businesses reduce CapEx and OpEx, improve time to market, efficiency, increase control, and expand connectivity. VDI enables users to now access their desktops hosted in a data center server as virtual machines, which can be accessed from laptops and thin clients. Although desktop virtualization has existed for many years, many implementers of the technology have discovered that significant hurdles need to be overcome to fully

Desktop and application virtualization is one of the primary ways how businesses reduce CapEx and OpEx, improve time to market, efficiency, increase control, and expand connectivity. VDI enables users to now access their desktops hosted in a data center server as virtual machines, which can be accessed from laptops and thin clients. Although desktop virtualization has existed for many years, many implementers of the technology have discovered that significant hurdles need to be overcome to fully reap its benefits.

This document defines a set of architectural blocks for building a multitenant, Virtual Desktop Infrastructure in and application services on the Cloudistics platform.
This document includes 2 major sections:

  • VDI Solution Architecture
  • Overview of Cloudistics Ignite Platform Components (Appendix A)
The primary goal of this VDI architecture is to enable service providers and IT departments to create secure, scalable, and reliable desktop hosting solution offers for small- and medium-sized organizations ranging from 500 to 1,000 users. The intended audience is hosting providers, and IT departments who want to leverage the Cloudistics infrastructure services to deliver desktop hosting services to multiple tenants.

To deliver a desktop hosting solution, service provider partners can leverage Windows Server and the Windows Desktop Experience feature to deliver Windows users a highly performant application experience that is familiar to business users and consumers.

Citrix UPM and AppDisk Comparison to ProfileUnity and FlexApp
Citrix XenDesktop and XenApp delivers full Windows VDI, hosted session desktops, as well as applications to meet the demands of an expansive variety of use cases, allowing employees to access their apps, desktops and data without the limitations of traditional Windows desktop solutions.
Citrix XenDesktop and XenApp delivers full Windows VDI, hosted session desktops, as well as applications to meet the demands of an expansive variety of use cases, allowing employees to access their apps, desktops and data without the limitations of traditional Windows desktop solutions. Citrix is known all over the world for its leading desktop solutions — for good reason: Citrix expertly solves Windows delivery and desktop challenges for customers. In order to make the Citrix desktop experience seamless for end users and desktop administrators, Citrix currently provides basic solutions that solve some longstanding Windows challenges in two key areas – User Profile Management and Application Layering. Liquidware Labs – a Citrix Ready Premier partner – also offers solutions that address the challenges of User Profile Management and Application Layering in Windows desktop environments. Our ProfileUnity solution offers full-featured User Environment Management (which encompasses User Profile Management). FlexApp, which can be integrated with ProfileUnity or used as a stand-alone solution, addresses the area of application layering. This paper initially covers the topics of profile management and user environment management, and then shifts focus to Application Layering. The purpose of this document is to outline the typical uses cases for the Citrix solutions, and then go on to explain when it is more appropriate to utilize the more sophisticated ProfileUnity with FlexApp solution to more completely address gaps in the desktop environment.
FlexApp Application Layering for Citrix XenApp and XenDesktop
Citrix XenDesktop and XenApp delivers full Windows VDI, hosted session desktops, as well as applications to meet the demands of an expansive variety of use cases, allowing employees to access their apps, desktops and data without the limitations of traditional Windows desktop solutions.
Citrix XenDesktop and XenApp delivers full Windows VDI, hosted session desktops, as well as applications to meet the demands of an expansive variety of use cases, allowing employees to access their apps, desktops and data without the limitations of traditional Windows® desktop solutions. Citrix is known all over the world for its leading desktop solutions — for good reason: Citrix expertly solves Windows delivery and desktop challenges for customers. In order to make the Citrix desktop experience seamless for end users and desktop administrators, Citrix currently provides basic solutions that solve some longstanding Windows challenges in two key areas – User Profile Management and Application Layering. Liquidware Labs – a Citrix Ready Premier partner – also offers solutions that address the challenges of User Profile Management and Application Layering in Windows desktop environments. Our ProfileUnity solution offers full-featured User Environment Management (which encompasses User Profile Management). FlexApp, which can be integrated with ProfileUnity or used as a stand-alone solution, addresses the area of application layering. This paper initially covers the topics of profile management and user environment management, and then shifts focus to Application Layering. The purpose of this document is to outline the typical uses cases for the Citrix solutions, and then go on to explain when it is more appropriate to utilize the more sophisticated ProfileUnity with FlexApp solution to more completely address gaps in the desktop environment.
Optimizing Performance for Office 365 and Large Profiles with ProfileUnity ProfileDisk
Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them.

Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them. Note that additional profile challenges and solutions are covered in a related ProfileUnity whitepaper entitled “User Profile and Environment Management with ProfileUnity.” To efficiently manage the complex challenges of today’s diverse Windows profile environments, Liquidware ProfileUnity exclusively features two user profile technologies that can be used together or separately depending on the use case.

These include:

1. ProfileDisk, a virtual disk based profile that delivers the entire profile as a layer from an attached user VHD or VMDK, and

2. Profile Portability, a file and registry based profile solution that restores files at login, post login, or based on environment triggers.

Disaster Recovery Strategies with Scale Computing
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT i
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT infrastructure must be both resilient and highly available to keep organizations operational.

In our HC3 architecture, keeping in mind our typical simplicity and ease of use, we have built-in a number of disaster recovery capabilities. These allow our users to recover quickly from a variety of disasters that may affect anywhere from a single file to an entire site. Disaster recovery is often planned for and measured in terms of recovery point objective (RPO) and recovery time objective (RTO). HC3 provides features to achieve both RPO and RTO measured in minutes to minimize both downtime and data loss.
High Availability Clusters in VMware vSphere without Sacrificing Features or Flexibility
This paper explains the challenges of moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Many large enterprises are moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources.

Realizing these benefits with business critical applications, such as SQL Server or SAP can pose several challenges. Because these applications need high availability and disaster recovery protection, the move to a virtual environment can mean adding cost and complexity and limiting the use of important VMware features. This paper explains these challenges and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Achieve Secure Cloud Printing for Microsoft Office 365 and Azure
The Microsoft Azure platform offers an open and scalable Cloud computing platform as a service, providing a highly available Virtual Machine (VM) Cloud service payable on a monthly fee. For subscribers, critical services and server functions can now be moved with relative ease but what about printing, how realistic is that? This paper explores the topic further and considers what happens when subscribers elect to migrate everything, including print servers, offsite into the Cloud and pitfalls to
The Microsoft Azure platform offers an open and scalable Cloud computing platform as a service, providing a highly available Virtual Machine (VM) Cloud service payable on a monthly fee. For subscribers, critical services and server functions can now be moved with relative ease but what about printing, how realistic is that? Users are struggling with print file sizes and resultant bandwidth issues, not to mention security and compliance concerns. This paper explores the topic further and considers what happens when subscribers elect to migrate everything, including print servers, offsite into the Cloud and pitfalls to avoid.
The Hidden Costs of Printing - Reducing Your Print costs
Did you know that printing costs regularly account for up to 3% of an organization’s revenue? Reducing the cost of print can be a painless way for enterprises to alleviate their hard-pressed IT budgets, so it is good practice for IT Managers to constantly seek new ways to streamline printing costs. This white paper seeks to highlight a common-sense approach to print cost reductions to positively impact overhead and the bottom line.
Did you know that printing costs regularly account for up to 3% of an organization’s revenue? Reducing the cost of print can be a painless way for enterprises to alleviate their hard-pressed IT budgets, so it is good practice for IT Managers to constantly seek new ways to streamline printing costs. This white paper seeks to highlight a common-sense approach to print cost reductions to positively impact overhead and the bottom line.
Security Analytics and Change Control in the Modern Data Center
In this Uila sponsored white paper, Nick Howell and James Green talks about challenges in security and change control in a modern data center environment.

Security is the No. 1 concern on many IT executives’ minds these days. With the rampant data leaks, breaches, and ransomware attacks in recent years, it’s no wonder that IT leaders walk on eggshells when it comes to changing anything regarding infrastructure, access, or security.

Infrastructure sprawl and complexity has made the challenge of security and managing changes to the environment more difficult to stay on top of than ever.

Read this white paper to get insights into the security and change control issues of the Modern Data Center.

Essential Guide for Application-Centric Workload Migrations to Hybrid Cloud
Essential guide on migrating from the Private to the Hybrid Cloud environment.

IT leaders turn an eye toward the cloud when they’re looking to solve elasticity and scalability issues. One of the key differentiators of the cloud as compared to traditional infrastructure is that it’s inherently flexible.

Migrating workloads, especially complex, multi-tiered applications, can be a harrowing process. Undertaking the migration without a solid understanding of the interdependencies of applications and the exact resource requirements means almost certain failure. In today’s world, it’s understandable that failures can, do, and will happen; what’s not acceptable today is downtime. Cutovers of migrations need to be instant, or an hour at most.

Read this essential guide on Workload Migrations to learn about:

  • Availability Service Level Agreements
  • On-Premises to Public Cloud Migrations
  • Data Center to Data Center Migrations
  • Workload Migration Challenges
  • Migrate Successfully with Application-Centric Workload Visibility