Virtualization Technology News and Information
White Papers
RSS
All White Papers
Showing 49 - 64 of 96 white papers, page 4 of 6.
Infinio Accelerator Product Overview White Paper
This whitepaper is an overview of Infinio Accelerator, a software-based server-side cache that provides high performance to any storage system in a VMware environment.
Normal 0 false false false EN-US X-NONE X-NONE This is an in-depth overview of Infinio Accelerator, a software-based server-side cache that provides high performance to any storage system in a VMware environment. It increases IOPS and decreases latency by caching a copy of the hottest data on server-side resources such as RAM and flash devices. Native inline deduplication ensures that all local storage resources are used as efficiently as possible, reducing the cost of performance. Results can be seen instantly following the non-disruptive, 15-minute installation that doesn’t require any downtime, data migration, or reboots.
Customer Solution Spotlight: Faster Database Reporting
Infinio Accelerator can improve database performance for reporting activities. By leveraging server-side resources for storage operations, Infinio can deliver IOPS at a microsecond response time, improving database reporting performance by minutes or even hours.
Normal 0 false false false EN-US X-NONE X-NONE

Infinio Accelerator can improve database performance for reporting activities. By leveraging server-side resources for storage operations, Infinio can deliver IOPS at a microsecond response time, improving database reporting performance by minutes or even hours.  See how two of Infinio’s customers saw drastic performance benefits in their database reporting activities.

Infinio Accelerator Datasheet
Infinio Accelerator is a server-side cache that delivers 1,000,000 IOPS per VMware and 80 μs latency. This datasheet explains the architecture and benefits.
Normal 0 false false false EN-US X-NONE X-NONE

Infinio Accelerator is a server-side cache that delivers 1,000,000 IOPS per VMware and 80 μs latency.  This datasheet explains the architecture and benefits.

Infinio Case Study: MIC Business Solutions, a subsidiary of Mitsubishi
MIBS was interested in using server-side cache as an innovative approach to improving storage performance. The team loved Infinio’s ease of management and its clear GUI, and was drawn to the solution’s potential for extending the life of the existing storage arrays. They saw significant benefits in their database reporting times as well.
Normal 0 false false false EN-US X-NONE X-NONE

MIBS was interested in using server-side cache as an innovative approach to improving storage performance. The team loved Infinio’s ease of management and its clear GUI, and was drawn to the solution’s potential for extending the life of the existing storage arrays.  They saw significant benefits in their database reporting times as well.

Infinio Case Study: OrthoTennessee
OrthoTennessee replaced a previous storage acceleration solution with Infinio, improving performance and density for VDI, and avoiding a large flash purchase for their arrays.
Normal 0 false false false EN-US X-NONE X-NONE

OrthoTennessee replaced a previous storage acceleration solution with Infinio, improving performance and density for VDI, and avoiding a large flash purchase for their arrays.

FSLogix Lab Installation Guide for Azure
This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps. POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way. We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process. The testing environment is built entirely in Azure and contains an IaaS RDSH deployment incl

This document contains the steps required to install a Proof-of-Concept (POC) environment for RDSH Full Desktop with FSLogix Apps.  POC environments created according to this install guide can be used to test applications controlled by FSLogix Apps in a reproducible way.  We build the environment in the cloud in order to minimize costs associated with required hardware, and to streamline the build process.

The testing environment is built entirely in Azure and contains an IaaS RDSH deployment including the supporting network and domain infrastructure.  A non-Azure based client component accesses the RDSH deployment.

IT Monitoring and Performance Management White Paper
Learn about eG Enterprise's unified monitoring capabilities as they apply to your infrastructure and particular challenges, whether application performance management, Citrix monitoring, Java monitoring or other business environments.

Citrix logon monitoring has been a topic that has been getting a lot of attention. In some domains, users logon multiple times into their Citrix infrastructure. Slow logons affect the user experience and reduce user productivity.

This whitepaper discusses different ways of monitoring Citrix logon times, reviews what is necessary for complete visibility into the Citrix logon process and presents how to diagnose Citrix logon slowness issues quickly to improve the user experience and enhance productivity.

5 Keys to Virtualization Zen
So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

So you’ve invested in virtualization - now what does it take to make that virtual environment hum? Before, during and after deploying, you need a modern monitoring solution to ensure you’re getting the most of your investment. We’ve compiled the 5 keys for conquering downtime and achieving virtualization bliss.

Zenoss makes managing virtualized environments and virtualization monitoring easy and less expensive. The Zenoss hybrid IT monitoring platform allows you to comprehensively monitor resource performance and availability across the entire stack, including network, storage, applications and more, regardless of physical or virtual location.

Virtual Machine Migration Checklist
Preparing for a virtualized infrastructure migration can be daunting, use the Zerto checklist to help you plan and execute your migration smoothly!
This checklist provides an overview to help plan a datacenter migration project and ensure accountability through each step including:
  • Communication: Maintain clear, and regular communication with everyone.
  • Scoping: Understand what makes up the application. Get rid of the unknowns to ensure nothing breaks.
  • Ownership and permissions: Who owns the server and application and who will test and validate pre and post migration?
  • Priority: Are there other projects in your way?
  • Organization: Checklists and spreadsheets: How are you tracking all of this?
  • Execution: How is the migration happening? How will the servers and data be moved?
  • Contingency: If something goes wrong, how do I back out and reschedule if necessary?
  • Tracking: Prepare for change. Track what changes need to occur on machines, applications, and infrastructure.
  • Data Hygiene: Cleanup the source environment
Zerto's Cloud Continuity Platform: Enabling the Hybrid Cloud
Download this white paper and learn more about Zerto's Cloud Continuity Platform for Hybrid Cloud IT - empowering you to move, translate, and migrate virtual worklaods between virtualized infrastructures with confidence and ease.
Hybrid Cloud is rapidly becoming the preferred model for IT. A missing piece for enabling true, production grade Hybrid Cloud is the ability to mobilize and protect production workloads between different infrastructure types. Cloud Continuity Platform is a new infrastructure concept which enables application mobility and protection across public, managed and private clouds, and across different hypervisors. With Cloud continuity platform the right infrastructure can be used to optimize for cost, SLA and performance with simple scalability and flexibility, without disruption to the business and while enabling full business continuity. The choice of a Hybrid Cloud is here.
Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about BC/DR planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Therefore thorough security and business continuity strategies are crucial for modern businesses, minimizing data loss and downtime. Especially now, as data centers become more and more software defined, these private, hybrid and public clouds become more vulnerable to these kinds of threats.
Default FTA management for Word 2013 and WordViewer
A complete step-by-step guide for managing the default file type associations for Word 2013 and WordViewer with FSLogix.

Duncan Murdoch, of Amber Reef, uses this white paper to outline the necessary approach to centrally control and manage FTAs for Word 2013 and WordViewer using FSLogix. 

After addressing the reason and symptoms of the issue, Duncan asserts, "If the desire is to 'Control the FTA' centrally and manage the associations with FSLogix, preventing the users from overriding the FTA settings," then "to achieve this you can create 2 separate FTA rules, one for Word 2013 and another for WordViewer."

By applying these rules alongside the FSLogix Hiding rules for the applications, then the Administrator can ensure that the FTA that is applied is the one that they have allocated to the application group.

NOTE: This will also prevent a user from being able to right-click the file and assign their OWN FTA preferences.

App-V and FSLogix File Type Association Management
Duncan Murdoch, of Amber Reef, provides a concise, visual guide in order to show the precise steps for managing file type associations (FTAs) when using App-V with FSLogix.

A concise, visual guide to implementing file type associations when using App-V with FSLogix. Duncan Murdoch, of Amber Reef, uses this white paper to show the precise steps for managing file type associations (FTAs) when using App-V with FSLogix. As an example for managing the file type associations for App-V packages, Duncan Murdoch demonstrates the ease of this process with Adobe DC and FOX-IT Reader as published applications. With a couple quick steps and a single FSLogix rule, the proper FTAs are put in place for the desired default .pdf application.

The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

Customer Solutions Spotlight: Faster Virtual Desktops
Infinio Accelerator can improve performance for virtual desktops during peak times and steady-state. By leveraging server-side resources for storage operations, Infinio can deliver IOPS at a microsecond response time, improving enduser experience and ensuring successful rollouts of virtual desktops.
Infinio Accelerator can improve performance for virtual desktops during peak times and steady-state. By leveraging server-side resources for storage operations, Infinio can deliver IOPS at a microsecond response time, improving enduser experience and ensuring successful rollouts of virtual desktops.
How to Plan for Disaster Recovery
Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.
Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.
 
Although no prevention method is 100% fool proof, risk avoidance and taking proactive measures for preparedness are essential elements of the disaster recovery process. Still despite all the measures you take to avoid a disaster, you must assume that a disaster will happen. Having this mind-set will help shape your decisions when it comes to planning for IT disaster recovery.