Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 27 white papers, page 1 of 2.
Blueprint for Delivering IT-as-a-Service - 9 Steps for Success
You’ve got the materials (your constantly changing IT infrastructure). You’ve got the work order (your boss made that perfectly clear). But now what? Delivering IT-as-a-service has never been more challenging than it is today...virtualization, private, public, and hybrid cloud computing are drastically changing how IT needs to provide service delivery and assurance. You know exactly what you need to do, the big question is HOW to do it. If only there was some kind of blueprint for this…
You’ve got the materials (your constantly changing ITinfrastructure). You’ve got the work order (your boss made that perfectlyclear). But now what? Delivering IT-as-a-service has never been morechallenging than it is today...virtualization, private, public, and hybridcloud computing are drastically changing how IT needs to provide servicedelivery and assurance. You know exactly what you need to do, the big questionis HOW to do it. If only there was some kind of blueprint for this…

Based on our experience working with Zenoss customers whohave built highly virtualized and cloud infrastructures, we know what it takesto operationalize IT-as-a-Service in today’s ever-changing technicalenvironment. We’ve put together a guided list of questions in this eBook around the following topics to help you build your blueprint for getting the job done,and done right: 
  • Unified Operations
  • Maximum Automation
  • Model Driven
  • Service Oriented
  • Multi-Tenant
  • Horizontal Scale
  • Open Extensibility
  • Subscription
  • ExtremeService
Application Response Time for Virtual Operations
For applications running in virtualized, distributed and shared environments it will no longer work to infer the performance of an application by looking at various resource utilization statistics. Rather it is essential to define application performance by measuring response and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

Massive changes are occurring to how applications are built and how they are deployed and run. The benefits of these changes are dramatically increased responsiveness to the business (business agility), increased operational flexibility, and reduced operating costs.

The environments onto which these applications are deployed are also undergoing a fundamental change. Virtualized environments offer increased operational agility which translates into a more responsive IT Operations organization. Cloud Computing offers applications owners a complete out-sourced alternative to internal data center execution environments. IT organizations are in turn responding to public cloud with IT as a Service (IaaS) initiatives.

For applications running in virtualized, distributed and shared environments, it will no longer work to infer the “performance” of an application by looking at various resource utilization statistics. Rather it will become essential to define application performance as response time – and to directly measure the response time and throughput of every application in production. This paper makes the case for how application performance management for virtualized and cloud based environments needs to be modernized to suit these new environments.

How to avoid VM sprawl and improve resource utilization in VMware and Veeam backup infrastructures
You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

Getting virtual sprawl under control will help you reallocate and better provision your existing storage, CPU and memory resources between critical production workloads and high-performance, virtualized applications. With proper resource management, you can save money on extra hardware.

This white paper examines how you can avoid potential VM sprawl risks and automate proactive monitoring by using Veeam ONE, a part of Veeam Availability Suite. Veeam ONE will arm you with a list of VM sprawl indicators and explain how you can pick up and configure a handy report kit to detect and eliminate VM sprawl threats in your VMware environment.

Read this FREE white paper and learn how to:

  • Identify “zombies”
  • Clean up garbage and orphaned snapshots
  • Establish a transparent system to get sprawl under control
  • And more!
Technology Comparison: Disaster Recovery Solutions
Deep-dive comparison of disaster recovery solutions - differences between Zerto's hypervisor-based replication and array-based replication (with VMWare SRM)

Zerto’s innovative, hypervisor-based replication is a technology developed to provide a true enterprise class, yet fully virtual-aware disaster recovery solution, to protect virtualized, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

Compared Technologies

The current and legacy disaster recovery solutions compared in this document include:

• Zerto Hypervisor-based Replication

• Array-based Replication with and without SRM

• Host / Guest-based Replication

• Snapshot-based Replication

• VMware Site Recovery Manager with vSphere Replication

FlexApp: Application Layering Technology
FlexApp Application Layering in ProfileUnity enables applications to be virtualized in such an innate way that they look native to the Windows OS and other applications.
FlexApp Application Layering in ProfileUnity enables applications to be virtualized in such an innate way that they look native to the Windows OS and other applications.

Application Layering leads to much higher rates of compatibility than previous technologies which used Application Isolation to virtualize applications. Once applications have been packaged for layering, they are containerized on virtual hard disks (VHDs) or VMDKs.  They can be centrally assigned to users on a machine-level or “context-aware” basis.

This whitepaper provides an overview of FlexApp concepts and ways in which FlexApp can serve as a cornerstone in an application delivery strategy.
Replication Software for the VMware ESXi Hypervisor
Zerto protects virtualized applications with the same robust and effective recovery previously available only with complex and expensive array based replication solutions.

Zerto protects virtualized applications with the same robust and effective recovery previously available only with complex and expensive array based replication solutions. With Zerto you get:

  •         Scalability
  •         Ease of management
  •         A Hardware agnostic solutions
App-V or FSLogix? The good, the bad & “the better together”
The Great Big White Paper on when to use AppV, when to use FSLogix, and when to use them together! The latest release from Duncan Murdoch of Amber Reef, "The purpose of this document is to discuss the strengths and weakness of App-V and FSLogix Apps, and how the two can be used together to form a complete application provisioning and management strategy." The document uses scenario-based considerations to demonstrate the pros and cons of using each solution independently, or when combined.
Normal 0 false false false EN-US X-NONE X-NONE

The Great Big White Paper on when to use AppV, when to use FSLogix, and when to use them together! The latest release from Duncan Murdoch of Amber Reef, "The purpose of this document is to discuss the strengths and weakness of App-V and FSLogix Apps, and how the two can be used together to form a complete application provisioning and management strategy." The document uses scenario-based considerations to demonstrate the pros and cons of using each solution independently, or when combined.

FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
The Guide to Selecting Flash for Virtual Environments
High-performance flash-based storage has dramatically improved the storage infrastructure’s ability to respond to the demands of servers and the applications that count on it. Nowhere does this improvement have more potential than in the virtualized-server environment. The performance benefits of flash are so great that it can be deployed indiscriminately and still performance gains can be seen. But doing so may not allow the environment to take full advantage of flash performance. It may also b
Flash storage allows for a higher number of VMs per host. Increasing VM density reduces the number of physical servers required and thereby reduces one of the largest ongoing costs, buying more physical servers, which often are configured with multiple processors and extra DRAM. At the same time, the high performance and low latency of flash allows more mission critical applications to be virtualized. This report explains how storage and hypervisor vendors are getting smarter about leveraging this faster form of storage by including storage quality of service (QoS) intelligence in their systems or environments.
3 things you can ONLY do when your all-flash storage is VM-aware
There’s a disconnect in your data center. You’ve virtualized your applications and your teams are thinking and working in virtual machines.

While many storage products wear the VM-aware label, it doesn’t take much to assess its authenticity. If the product’s architecture is still built on a foundation of LUNs and volumes, it can never be fully VM-aware. 

Truly VM-aware storage is built specifically for virtualized applications. It provides you visibility across your infrastructure, control over performance and complete analytics at the VM level. If your data center is experiencing pain—poor performance, complex management and cost over-runs—you can’t solve it with all-flash or hyperconverged alone. Only VAS can help you see storage differently.

Top 5 Reasons Cloud Service Providers Choose Tintri
Tintri storage is specifically designed for virtualized workloads and cloud. If you’re a cloud provider that has built your business on differentiated services, Tintri is built for you.

Tintri storage is specifically designed for virtualized workloads and cloud. If you’re a cloud provider that has built your business on differentiated services, Tintri is built for you.

Leaders across industries trust Tintri. 800+ customers store 500,000+ virtualized workloads with a 50+ PB footprint on Tintri. That includes more than 75 of the world’s fastest growing cloud service providers, who are bolstering their business on a Tintri storage backbone.

Why join their ranks? When it comes to the success of your business, storage is a make or break decision. Read the five reasons how Tintri will make it happen.

FSLogix Lab Installation Guide for Azure
This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps. POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way. We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process. The testing environment is built entirely in Azure and contains an IaaS RDSH deployment incl

This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps.  POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way.  We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process.

The testing environment is built entirely in Azure and contains an IaaS RDSH deployment including the supporting network and domain infrastructure.  A non-Azure based client component accesses the RDSH deployment.

VM-aware storage for Dummies
You’ve heard the buzz about VM-aware storage. Your peers who are using it are over-the-moon happy. It’s time you discovered what’s going on with VAS.

You’ve heard the buzz about VM-aware storage. Your peers who are using it are over-the-moon happy. It’s time you discovered what’s going on with VAS.

Seriously. What if you could adjust quality of service for your virtualized applications? Or see across your entire infrastructure—host, network and storage—to troubleshoot in seconds?

Imagine a world without LUNs and volumes. It’s not a John Lennon line; it’s all in this book.

State of storage 2016 for virtualized enterprises
Read the report now, dig into the results and explore the top storage pain points and priorities of your peers.

In spring, 2016, we conducted the State of Storage for virtualized enterprises study with data center professionals from around the world. Well, the results are in and we’ve identified a surprising new (major) pain point and some tectonic shifts in provider momentum. 

Read the report now, dig into the results and explore the top storage pain points and priorities of your peers. 
5 Keys to Virtualization Zen
So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

Zenoss makes managing virtualized environments and virtualization monitoring easy and less expensive. The Zenoss hybrid IT monitoring platform allows you to comprehensively monitor resource performance and availability across the entire stack, including network, storage, applications and more, regardless of physical or virtual location.

Virtual Machine Migration Checklist
Preparing for a virtualized infrastructure migration can be daunting, use the Zerto checklist to help you plan and execute your migration smoothly!
This checklist provides an overview to help plan a datacenter migration project and ensure accountability through each step including:
  • Communication: Maintain clear, and regular communication with everyone.
  • Scoping: Understand what makes up the application. Get rid of the unknowns to ensure nothing breaks.
  • Ownership and permissions: Who owns the server and application and who will test and validate pre and post migration?
  • Priority: Are there other projects in your way?
  • Organization: Checklists and spreadsheets: How are you tracking all of this?
  • Execution: How is the migration happening? How will the servers and data be moved?
  • Contingency: If something goes wrong, how do I back out and reschedule if necessary?
  • Tracking: Prepare for change. Track what changes need to occur on machines, applications, and infrastructure.
  • Data Hygiene: Cleanup the source environment