Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 17 - 32 of 32 white papers, page 2 of 2.
Delivering a CI/CD Pipeline On-Prem - Solution Reference
In this solution reference, we demonstrate the ability to implement web services delivered through CI/CD using the Stratoscale private cloud environment. Specifically, we utilize an open source workplace messaging service, as an example web application along with Jenkins, an open source automation server which includes support for continuous delivery use cases. We provide an overview of our sample scenario, followed by a detailed deployment walk through that enables readers to easily replicate t

Modern enterprise IT teams are increasingly adopting cloud computing technologies as a foundational component of their strategy to deliver business value for internal stakeholders.

While public cloud infrastructures are often an initial launching point for experimenting with these environments, private cloud solutions are an attractive alternative due to their ability to meet specific functional and security requirements while extending comparable benefits. To truly realize the potential of these investments, however, organizations need to be able to instantiate their high value use cases via private cloud capabilities such as those offered by Stratoscale’s solution.

A critical area of responsibility for IT teams is that they identify appropriate solutions for line-of-business (LOB) applications to meet the requirements of the business units that they support. As part of this, they take on the ownership of deploying, managing, and accommodating the customization of these workloads as needed. Many applications capable of meeting LOB requirements today are packaged and delivered as web services due to the fact that these configurations offer multiple operational advantages including scalability and resiliency. In addition, they allow providers to meet demands from users that they be able to access application functionality seamlessly across their various screens including desktops and mobile devices. For IT teams, this translates into the need for deploying internal facing web services using their private cloud infrastructures.

As opposed to traditional desktop software which may be updated on an infrequent basis, web services engender a model where functionality is continuously under development. This implies that IT teams work closely with developers to ensure that application improvements are released to users in a methodical and timely manner. Continuous integration and continuous delivery (CI/CD) pipelines can be built to accommodate this interaction so that value created by developers can be rapidly and safely delivered to users in an iterative manner.

CISO's Investigate: Endpoint Security
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down.
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down.
 
Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. The result is a much larger attack surface, one that is hard to protect with traditional approaches - and one that is growing faster than ever before as users adopt new types of devices, new applications, and new services. Often, companies don't even know all the tools that their employees are using.
 
At the same time, the potential threats that enterprises are facing have grown significantly in variety, capabilities, and size.  Today’s malware, once it gets a foothold, can spread quickly.  As a result, the damage caused by the attacks has also been increasing at a staggering pace, with ransomware alone reportedly crossing the $1 billion revenue threshold in 2016.
In this new age of cyberwar, endpoint devices are the front line.
 
In this valuable and informative report, leading security experts examine the new tools that they have at their disposal, including next generation endpoint protection.
Does Deploying Citrix in the Cloud Make Performance Monitoring Easier?
Organizations now have a variety of cloud-based options for delivering virtualized applications and desktops. Cloud deployments are fast, involve lower hardware footprint and simplify IT operations. A key question to answer in this context is whether Citrix Cloud services make performance monitoring easier than it was for on-premises deployments. Read this white paper and find out how to implement monitoring for Citrix Cloud environments.

The technology of cloud computing has caught up with virtual desktop infrastructures. Tapping into the agility and flexibility of cloud-hosted infrastructures, Citrix Cloud enables organizations to simplify digital workspace delivery. With many of the critical components of the Citrix delivery infrastructure hosted in the cloud and managed by Citrix, organizations can speed up deployment, lower hardware footprint, increase ROI, simplify IT operations. Despite the many benefits of Citrix Cloud, the performance management challenges still persist, just as they do in traditional on-premises Citrix deployments.

Read this eG Innovations white paper, and understand:

  • The two popular Citrix Cloud deployment options
  • Performance monitoring challenges in Citrix Cloud infrastructures
  • Stakeholders involved and their respective domains of responsibility
  • The various monitoring tools and options available
  • Best practices to set up performance monitoring
IT Infrastructure Risk Management
When implementing new IT infrastructure there are always risks. These risks include under-provisioning or over-provisioning, hardware incompatibility, software incompatibility, network issues and outages, migration issues, downtime, disaster recovery, vendor reliability, and unexpected costs. These risks can be inflated when ripping and replacing an entire infrastructure, but that doesn’t have to be the case. Hyperconverged infrastructure solutions like HC3 from Scale Computing can reduce or eve
When implementing new IT infrastructure there are always risks. These risks include under-provisioning or over-provisioning, hardware incompatibility, software incompatibility, network issues and outages, migration issues, downtime, disaster recovery, vendor reliability, and unexpected costs. These risks can be inflated when ripping and replacing an entire infrastructure, but that doesn’t have to be the case. Hyperconverged infrastructure solutions like HC3 from Scale Computing can reduce or even eliminate risks that have become common with traditional virtualization infrastructure.
Hyperconverged Infrastructure: A Brief Introduction
The term hyperconverged infrastructure (HCI) has become an industry buzzword that has been applied to a number of different new computing technologies. The misuse of the term has caused confusion for many IT professionals looking at HCI as an infrastructure solution. In this document we will shed some light on what HCI really means and why it might be the right IT solution for you.
The term hyperconverged infrastructure (HCI) has become an industry buzzword that has been applied to a number of different new computing technologies. The misuse of the term has caused confusion for many IT professionals looking at HCI as an infrastructure solution. In this document we will shed some light on what HCI really means and why it might be the right IT solution for you.
Disaster Recovery Strategies with Scale Computing
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT i
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT infrastructure must be both resilient and highly available to keep organizations operational.

In our HC3 architecture, keeping in mind our typical simplicity and ease of use, we have built-in a number of disaster recovery capabilities. These allow our users to recover quickly from a variety of disasters that may affect anywhere from a single file to an entire site. Disaster recovery is often planned for and measured in terms of recovery point objective (RPO) and recovery time objective (RTO). HC3 provides features to achieve both RPO and RTO measured in minutes to minimize both downtime and data loss.
How HC3 Lowers the Total Cost of Ownership
When considering a new IT infrastructure solution, the acquisition cost of the hardware and software to standup the infrastructure is only the starting point for cost analysis. It is important to look into the operational costs of deployment, training, licensing, scale out, downtime, and management. All of these considerations contribute to the total cost of ownership (TCO) of the solution.
When considering a new IT infrastructure solution, the acquisition cost of the hardware and software to standup the infrastructure is only the starting point for cost analysis. It is important to look into the operational costs of deployment, training, licensing, scale out, downtime, and management. All of these considerations contribute to the total cost of ownership (TCO) of the solution.

This document will dive into the TCO of the Scale Computing HC3 infrastructure solution and discuss how it compares to traditional architecture models. The combined considerations of different areas of costs will give a broader and more complete picture of how HC3 affects IT costs. With a focus on serving small and midmarket IT, Scale Computing is committed to making virtualization infrastructure both accessible and affordable for any size organization.
Achieve Secure Cloud Printing for Microsoft Office 365 and Azure
The Microsoft Azure platform offers an open and scalable Cloud computing platform as a service, providing a highly available Virtual Machine (VM) Cloud service payable on a monthly fee. For subscribers, critical services and server functions can now be moved with relative ease but what about printing, how realistic is that? This paper explores the topic further and considers what happens when subscribers elect to migrate everything, including print servers, offsite into the Cloud and pitfalls to
The Microsoft Azure platform offers an open and scalable Cloud computing platform as a service, providing a highly available Virtual Machine (VM) Cloud service payable on a monthly fee. For subscribers, critical services and server functions can now be moved with relative ease but what about printing, how realistic is that? Users are struggling with print file sizes and resultant bandwidth issues, not to mention security and compliance concerns. This paper explores the topic further and considers what happens when subscribers elect to migrate everything, including print servers, offsite into the Cloud and pitfalls to avoid.
Dummies Guide to Enterprise Cloud
The value proposition for Enterprise Cloud is simple—put all the agility of public cloud in your data center. That means you can spin up and tear down your next project in minutes, scale effortlessly and maintain total control of cost and performance.
The value proposition for Enterprise Cloud is simple—put all the agility of public cloud in your data center. That means you can spin up and tear down your next project in minutes, scale effortlessly and maintain total control of cost and performance.

But building an Enterprise Cloud may seem daunting—that’s why we created this Dummies Guide.

Key Takeaways:
1) The three defining characteristics of an enterprise cloud.
2) The four steps to enterprise cloud creation.
3) The ten business benefits of an enterprise cloud.

3 Potential Risks of an HCI Architecture
The appeal of HCI as a concept is that by bringing compute, network and storage together in a fully-tested, controlled environment, infrastructure administrators would be freed from the challenges of integrating point solutions and would have scalable, guaranteed performance at lower risk. For specific workloads such as VDI and ROBO, the theory is that customers can allocate resources quickly, scale easily, and reduce costs significantly because of the integration and features in its platform. T
The appeal of HCI as a concept is that by bringing compute, network and storage together in a fully-tested, controlled environment, infrastructure administrators would be freed from the challenges of integrating point solutions and would have scalable, guaranteed performance at lower risk. For specific workloads such as VDI and ROBO, the theory is that customers can allocate resources quickly, scale easily, and reduce costs significantly because of the integration and features in its platform. The reality is more complicated—it’s difficult for HCI to deliver scalability, simplicity, and cost advantages without sacrificing performance.
Application & Desktop Delivery for Dummies
In this book, you learn how solutions, such as Parallels Remote Application Server (RAS), replace traditional application deployment with on-demand application delivery, and why it's right for your organization.
Applications are essential to the businesses and organizations of all sizes and in all industries. End-users need to have continuous and reliable access to their applications whether working in the office or remotely, at any time of the day or night, and from any device. With the advent of cloud computing, office desktops with installed applications (that had to be constantly updated) have become a thing of the past — application streaming, virtual desktop infrastructure (VDI), and hosted applications are the future (and the present, for that matter). Application virtualization is an easy way to manage, distribute, and maintain business applications. Virtualized applications run on a server, while end-users view and interact with their applications over a network via a remote display protocol. Remote applications can be completely integrated with the user’s desktop so that they appear and behave like local applications. Today, you can dynamically publish applications to remote users in several ways. The server-based operating system (OS) instances that run remote applications can be shared with other users (a terminal services desktop), or the application can be running on its own OS instance on the server (a VDI desktop).
HyperCore-Direct: NVMe Optimized Hyperconvergence
Scale Computing’s award winning HC3 solution has long been a leader in the hyperconverged infrastructure space. Now targeting even higher performing workloads, Scale Computing is announcing HyperCore-Direct, the first hyperconverged solution to provide software defined block storage utilizing NVMe over fabrics at near bare-metal performance.
Scale Computing’s award winning HC3 solution has long been a leader in the hyperconverged infrastructure space. Now targeting even higher performing workloads, Scale Computing is announcing HyperCore-Direct, the first hyperconverged solution to provide software defined block storage utilizing NVMe over fabrics at near bare-metal performance. In this whitepaper, we will showcase the performance of a Scale HyperCore-Direct cluster which has been equipped with Intel P3700 NVMe drives, as well as a single-node HyperCore-Direct system with Intel Optane P4800X NVMe drives. Various workloads have been tested using off-the-shelf Linux and Windows virtual machine instances. The results show that HyperCore-Direct’s new NVMe optimized version of SCRIBE, the same software-defined- storage powering every HC3 cluster in production today, is able to offer the lowest latency per IO delivered to virtual machines.
HC3, SCRIBE and HyperCore Theory of Operations
This document is intended to describe the technology, concepts and operating theory behind the Scale Computing HC3 System (Hyper-converged Compute Cluster) and the HyperCore OS that powers it, including the SCRIBE (Scale Computing Reliable Independent Block Engine) storage layer.
This document is intended to describe the technology, concepts and operating theory behind the Scale Computing HC3 System (Hyper-converged Compute Cluster) and the HyperCore OS that powers it, including the SCRIBE (Scale Computing Reliable Independent Block Engine) storage layer.
Information Security with HC3
The security of your information and data is paramount to Scale Computing. In order to be agile in the ever-changing security landscape, all technology platforms must adapt quickly. Threat vectors from new avenues are emerging on a daily basis.
The security of your information and data is paramount to Scale Computing. In order to be agile in the ever-changing security landscape, all technology platforms must adapt quickly. Threat vectors from new avenues are emerging on a daily basis.

Our culture has always been about having an exceptionally efficient and focused engineering team. A tight-knit, highly skilled team of engineers and developers cuts back on the red tape and delay that may be present in other organizations and keeps the focus on what matters in this ever-changing and always demanding landscape: innovation, stability, and security for the customer. In keeping with this culture, we have built the HC3 appliance using our own proprietary software in combination with common building blocks of well-tested open source technologies.
Enabling DevSecOps to Secure & Scale DevOps at Large Enterprises
This whitepaper covers key building blocks for DevSecOps including role-based access controls & network isolation and segmentation.
This whitepaper covers key building blocks for DevSecOps including role-based access controls & network isolation and segmentation.

Gartner predicts that over 25 percent of Global 2000 businesses have started using DevOps practices in 2016 and this will soon be the norm in many organizations. With speed, agility, continuous development, fail fast being the themes of DevOps at organizations, security ends up "bolted" in - plugged in at the end of the cycle, so as to not lose momentum. The challenge to create innovative solutions quickly leads many development teams to ignore security compliance, seeing information security as an inhibitor to DevOps agility.

Gartner depicts DevSecOps is depicted graphically as a rapid and agile iteration from development into operations with continuous monitoring and analytics at the core.

HyperGrid HyperCloud, an on premises enterprise cloud-as-a-service with a pay-as-you-go consumption model, enables DevSecOps with a governance framework that provides role-based access controls, entitlements, approval, quota and cost metering policies to enable secure and holistic management of resources, workloads, and operations across any cloud with the cost visibility needed to control spending.
Automated, Self-Service Provisioning of Virtual Machines with HyperCloud
This whitepaper walks through the automated, self-service provisioning of virtual machines to speed up application deployment and simplify ongoing management; all while benefiting from the scale and performance of HyperCloud
This whitepaper walks through the automated, self-service provisioning of virtual machines to speed up application deployment and simplify ongoing management; all while benefiting from the scale and performance of HyperCloud

With the move towards digital transformation, many organizations are looking to achieve business agility by speeding up the delivery of infrastructure and application services. While the move towards automating provisioning workflows may seem like an obvious step that should be adopted by IT teams, many organizations are reluctant to make drastic changes to the existing processes without understanding the impacts first

In the absence of automated workflows, IT organizations find themselves stuck with manual processes that result in long waits experienced by end users, rising operational expenses, inconsistent infrastructure, and overall dissatisfaction by business users.