Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 27 white papers, page 1 of 2.
Application Response Time for Virtual Operations
For applications running in virtualized, distributed and shared environments it will no longer work to infer the performance of an application by looking at various resource utilization statistics. Rather it is essential to define application performance by measuring response and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Massive changes are occurring to how applications are built and how they are deployed and run. The benefits of these changes are dramatically increased responsiveness to the business (business agility), increased operational flexibility, and reduced operating costs.

The environments onto which these applications are deployed are also undergoing a fundamental change. Virtualized environments offer increased operational agility which translates into a more responsive IT Operations organization. Cloud Computing offers applications owners a complete out-sourced alternative to internal data center execution environments. IT organizations are in turn responding to public cloud with IT as a Service (IaaS) initiatives.

For applications running in virtualized, distributed and shared environments, it will no longer work to infer the “performance” of an application by looking at various resource utilization statistics. Rather it will become essential to define application performance as response time – and to directly measure the response time and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Citrix AppDNA and FlexApp: Application Compatibility Solution Analysis
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.
Desktop computing has rapidly evolved over the last 10 years. Once defined as physical PCs, Windows desktop environments now include everything from virtual to shared hosted (RDSH), to cloud based. With these changes, the enterprise application landscape has also changed drastically over the last few years.

This whitepaper provides an overview of Citrix AppDNA with Liquidware Labs FlexApp.

FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
Does Backup Need a File System of its Own?
VembuHIVETM is an efficient cloud file system designed for large-scale backup and disaster recovery (BDRTM) application with support for advanced use-cases. VembuHIVETM can be thought of as a File System of File Systems with in-built version control, deduplication (elimination of redundant information to enhance storage reduction), encryption, and in-built error correction.

Backup is just not about storage. It’s the intelligence on top of storage. Typically when businesses think of backup, they see it as a simple data copy from one location to another. Traditional file systems would suffice if the need were to just copy the data. But backup is the intelligence applied on top of storage where data can be put to actual use. Imagine the ability to use backup data for staging, testing, development and preproduction deployment. Traditional file systems are not designed to meet such complex requirements.

With the advent of information technology, more and more organizations are relying on IT for running their businesses. They cannot afford to have downtime on their critical applications and need instant access to data in the event of disaster. Hence, a new type of file system is necessary to satisfy this need. 

VembuHIVETM manages the metadata smartly through its patent-pending technology, in a way that is agnostic to the file system of the backup, which is why we call VembuHIVETM, a file system of file systems. This helps the backup application to instantly associate the data in VembuHIVETM to any file system metadata, thereby allowing on-demand file or image restores in many possible file formats. The data and metadata storage, harness cluster file system and computing and storage.

This is a really powerful concept that will address some very interesting use cases not just in the backup and recovery domain but also in other domains, such as big-data analytics.

The key to the design of VembuHIVETM is its novel mechanism to capture and generate appropriate metadata and store it intelligently in a cloud infrastructure. The increment data (the changes with respect to a previous version of the same backup) are treated like versions in a version control system (CVS, GIT). This revolutionary way of data capture and metadata generation provides seamless support to a wide range of complex restore use cases.

The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

4 Virtualization Skills to Take Flight In Your IT Career
It's time to take your IT career flight beyond the final frontiers of your virtual universe. Do it with the SOAR Framework.
Normal 0 false false false EN-US X-NONE X-NONE

It's time to take your IT career flight beyond the final frontiers of your virtual universe. Do it with the SOAR Framework.

You'll learn 4 virtualization skills to advance your career: 

  • Secure - Govern, control data and user planes
  • Optimize - Run more efficiently
  • Automate - Scale your IT environment
  • Report - Show & tell to your leadership teams
Each SOAR skill will help you to deal with change management in the era of continuous service integration and service delivery. Time to shatter the shackles and take flight!
IGEL Powers Rich Multimedia Computing Experience for Fulton Financial Corporation
In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure. With the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies, Fulton selected the IGEL Universal Desktop (UD6) thin clients featuring Intel Celeron J1900 Quad-Core processors and the IGEL Universal Management Suite (UMS).

Fulton Financial Corporation has a long and storied history that began in 1882 in Lancaster, Pennsylvania, where local merchants
and farmers organized Fulton National Bank. The bank’s name was chosen to honor Lancaster County native Robert Fulton, the inventor and artist best known for designing and building the Clermont, the first successful steamboat.

In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure, with the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies.

In selecting a desktop computing solution to support its Citrix application virtualization infrastructure, Fulton had one unique business requirement, they were looking for a solution that would mirror the experience provided by a Windows PC, without actually being a Windows PC.

During the evaluation process, Fulton looked at thin clients from IGEL and another leading manufacturer, conducting a “bake-off” of several models including the IGEL Universal Desktop (UD6). Fulton like the fact that IGEL is forward- thinking in designing its desktop computing solutions, and began its IGEL roll-out by purchasing 2,300 IGEL UD6 thin clients in 2016 for its headquarters and branch offices, and plans to complete the roll out of IGEL thin clients to the remainder of its 3,700 employees in the coming months. The bank is also leveraging the IGEL Universal Management Suite (UMS) to manage its fleet of IGEL thin clients.

Ease of Management and Flexibility Lead to Long-Term Relationship for IGEL at Texas Credit Union
Randolph-Brooks Federal Credit Union was looking for a more powerful endpoint computing solution to deliver e-mail and core financial applications through its Citrix-based infrastructure to its end-users, and IGEL’s Universal Desktop thin clients and Universal Management Suite (UMS) software fit the bill.

Randolph-Brooks Federal Credit Union is more than just a bank. It is a financial cooperative intent on helping its members save time, save money and earn money. Over the years, the credit union has grown from providing financial resources to military service members and their families to serving hundreds of thousands of members across Texas and around the world. RBFCU has a presence in three major market areas — Austin, Dallas and San Antonio — and has more than 55 branches dedicated to serving members and the community.

First and foremost, RBFCU is people. It’s the more than 1,800 employees who serve members’ needs each day. It’s the senior team and Board of Directors that guide the credit union’s growth. It’s the members who give their support and loyalty to the credit union each day.

To help its employees provide the credit union’s members with the highest levels of services and support, Randolph-Brooks Federal Credit Union relies on IGEL’s endpoint computing solutions.

The 4th Era of IT Infrastructure: Composable Systems
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th generation of IT infrastructure can transform your business.

Learn the benefits and limitations of  the 3 generations of IT infrastructure  – siloed, converged and hyperconverged – and discover how the 4th generation of IT infrastructure  – composable –  can transform your business. 

The composable infrastructure enables you to:

  • Tightly integrate server, storage, networking, virtualization, VM/container centric management and an application marketplace to create a high-speed infrastructure platform that includes everything needed to run applications out of the box – a single silo platform
  • Easily and independently scale network, storage, and compute resources on-demand, making it possible to run a wide diversity of workloads

Manage your infrastructure from anywhere through a single SaaS management portal

Approaches and Benefits of Network Virtualization
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure — the network. Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.

Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the SDDC solutions available today forgot about the most complex part of your infrastructure—the network.

Network virtualization is critical to simplify application scaling and improve application performance without lengthy maintenance windows and potential security risks.
 
In this whitepaper you will be introduced to Cloudistics Ignite’s Adaptive Overlay Network (AON) technology that provides the following benefits:
◦    Simplifies and automates network provisioning, avoiding manual errors common when dealing with physical networks, VLANs, etc.

  • Enables you to scale your business to multi-site locations without unnecessary costly hardware purchases and lengthy maintenance windows
  • Enables you to fine-tune your application’s performance and security through dedicated virtual networks that can be deployed in minutes

Natively built-into the Ignite platform, lowering costs by eliminating the need for 3rd party software and hardware

Austin Solution Provider Powers DaaS Offering with IGEL and Parallels
In 2014, Austin-based Trinsic Technologies introduced Anytime Cloud. Anytime Cloud is a Desktop-as-a-Service (DaaS) solution designed to help SMB clients improve the end user computing experience and streamline business operations. Through Anytime Cloud, customers gain access to the latest cloud and virtualization technologies using IGEL thin clients with Parallels, a virtual application and desktop delivery software application.

Headquartered in Austin, Texas, Trinsic Technologies is a technology solutions provider focused on delivering managed IT and cloud solutions to SMBs since 2005.

In 2014, Trinsic introduced Anytime Cloud, a Desktop-as-a-Service (DaaS) designed to help SMB clients improve the end user computing experience and streamline business operations. To support Anytime Cloud, the solution provider was looking for a desktop delivery and endpoint management solution that would fulfill a variety of different end user needs and requirements across the multiple industries it serves. Trinsic also wanted a solution that provided ease of management and robust security features for clients operating within regulated industries such as healthcare and financial services.

The solution provider selected the IGEL Universal Desktop (UD) thin clients, the IGEL Universal Desktop Converter (UDC), the IGEL OS and the IGEL Universal Management Suite. As a result, some of the key benefits Trinsic has experienced include ease of management and configuration, security and data protection, improved resource allocation and cost savings.

IBM Spectrum Protect Plus Overview
IBM Spectrum Protect Plus is a new data protection and availability solution that simplifies VM and file recovery and access. It unlocks your data to provide value for emerging use cases, and can either be implemented as a stand-alone solution or integrate with your IBM Spectrum Protect environment to offload copies for long-term storage and governance efficiently at scale.
Organizations need a solution that focuses on virtual environments, deploys quickly without costly service engagements, and is easy to manage. For many large organizations, the solution also needs to be capable of delivering enterprise-proven scale, efficiency and data governance.

IBM Spectrum Protect Plus is a new data protection and availability solution that simplifies VM and file recovery and access. It unlocks your data to provide value for emerging use cases, and can either be implemented as a stand-alone solution or integrate with your IBM Spectrum Protect environment to offload copies for long-term storage and governance efficiently at scale.

Remove complexity in protecting your virtual infrastructure with IBM Spectrum Protect Plus
This white paper focuses on the deployment and basic setup of IBM Spectrum Protect Plus for protecting VMware. Readers will be taken through a step-by-step explanation of what is required to install and configure IBM Spectrum Protect Plus for basic backup and recovery of VMware virtual machines (VMs). Integration with Spectrum Protect for long-term data retention is also discussed.
IBM Spectrum Protect™ Plus is a new data protection and availability solution for virtual environments that can unlock your valuable data for emerging use cases. You can deploy it in minutes and have your environment fully protected within an hour. IBM Spectrum Protect Plus can be implemented as a stand-alone solution or can integrate easily with your IBM Spectrum Protect environment to off-load copies for long-term storage and governance with scale and efficiency.

This white paper focuses on the deployment and basic setup of IBM Spectrum Protect Plus for protecting VMware. Readers will be taken through a step-by-step explanation of what is required to install and configure IBM Spectrum Protect Plus for basic backup and recovery of VMware virtual machines (VMs). Integration with Spectrum Protect for long-term data retention is also discussed.
Ovum: Igel's Security Enhancements for Thin Clients
Thin client vendor Igel is enhancing the security capabilities of its products, both under its own steam and in collaboration with technology partners. Ovum sees these developments as important for the next wave of thin client computing, which will be software-based – particularly if the desktop-as-a-service (DaaS) market is to take off.

With hardware-based thin client shipments in the region of 4–5 million units annually, this market is still a drop in the ocean compared to the 270 million PCs shipping each year, though the latter figure has been declining since 2011. And within the thin client market, Igel is in fourth place behind Dell and HP (each at around 1.2 million units annually) and China’s Centerm, which only sells into its home market.

However, the future for thin clients looks bright, in that the software-based segment of the market  (which some analyst houses refuse to acknowledge) is expanding, particularly for Igel. Virtual desktop infrastructure (VDI) technology has stimulated this growth, but the greatest promise is probably in the embryonic DaaS market, whereby enterprises will have standard images for their workforce hosted by service providers.

CISO's Investigate: Endpoint Security
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down.
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down.
 
Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. The result is a much larger attack surface, one that is hard to protect with traditional approaches - and one that is growing faster than ever before as users adopt new types of devices, new applications, and new services. Often, companies don't even know all the tools that their employees are using.
 
At the same time, the potential threats that enterprises are facing have grown significantly in variety, capabilities, and size.  Today’s malware, once it gets a foothold, can spread quickly.  As a result, the damage caused by the attacks has also been increasing at a staggering pace, with ransomware alone reportedly crossing the $1 billion revenue threshold in 2016.
In this new age of cyberwar, endpoint devices are the front line.
 
In this valuable and informative report, leading security experts examine the new tools that they have at their disposal, including next generation endpoint protection.
Does Deploying Citrix in the Cloud Make Performance Monitoring Easier?
Organizations now have a variety of cloud-based options for delivering virtualized applications and desktops. Cloud deployments are fast, involve lower hardware footprint and simplify IT operations. A key question to answer in this context is whether Citrix Cloud services make performance monitoring easier than it was for on-premises deployments. Read this white paper and find out how to implement monitoring for Citrix Cloud environments.

The technology of cloud computing has caught up with virtual desktop infrastructures. Tapping into the agility and flexibility of cloud-hosted infrastructures, Citrix Cloud enables organizations to simplify digital workspace delivery. With many of the critical components of the Citrix delivery infrastructure hosted in the cloud and managed by Citrix, organizations can speed up deployment, lower hardware footprint, increase ROI, simplify IT operations. Despite the many benefits of Citrix Cloud, the performance management challenges still persist, just as they do in traditional on-premises Citrix deployments.

Read this eG Innovations white paper, and understand:

  • The two popular Citrix Cloud deployment options
  • Performance monitoring challenges in Citrix Cloud infrastructures
  • Stakeholders involved and their respective domains of responsibility
  • The various monitoring tools and options available
  • Best practices to set up performance monitoring