Virtualization Technology News and Information
White Papers
RSS
Featured White Papers
The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

Austin Solution Provider Powers DaaS Offering with IGEL and Parallels
In 2014, Austin-based Trinsic Technologies introduced Anytime Cloud. Anytime Cloud is a Desktop-as-a-Service (DaaS) solution designed to help SMB clients improve the end user computing experience and streamline business operations. Through Anytime Cloud, customers gain access to the latest cloud and virtualization technologies using IGEL thin clients with Parallels, a virtual application and desktop delivery software application.

Headquartered in Austin, Texas, Trinsic Technologies is a technology solutions provider focused on delivering managed IT and cloud solutions to SMBs since 2005.

In 2014, Trinsic introduced Anytime Cloud, a Desktop-as-a-Service (DaaS) designed to help SMB clients improve the end user computing experience and streamline business operations. To support Anytime Cloud, the solution provider was looking for a desktop delivery and endpoint management solution that would fulfill a variety of different end user needs and requirements across the multiple industries it serves. Trinsic also wanted a solution that provided ease of management and robust security features for clients operating within regulated industries such as healthcare and financial services.

The solution provider selected the IGEL Universal Desktop (UD) thin clients, the IGEL Universal Desktop Converter (UDC), the IGEL OS and the IGEL Universal Management Suite. As a result, some of the key benefits Trinsic has experienced include ease of management and configuration, security and data protection, improved resource allocation and cost savings.

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

Solution Guide for Sennheiser Headsets, IGEL Endpoints and Skype for Business on Citrix VDI
Topics: IGEL, Citrix, skype, VDI
Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Virtualizing Windows applications and desktops in the data center or cloud has compelling security, mobility and management benefits, but delivering real-time voice and video in a virtual environment is a challenge. A poorly optimized implementation can increase costs and compromise user experience. Server scalability and bandwidth efficiency may be less than optimal, and audio-video quality may be degraded.

Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

IGEL Software Platform Step by Step Getting Started Guide
Welcome to the IGEL Software Platform: Step-by-Step Getting Started Guide. The goal for this project is to provide you with the tools, knowledge, and understanding to download the IGEL Platform trial software and perform basic installation and configuration without being forced to read many manuals and numerous web support articles.

Welcome to the IGEL Software Platform: Step-by-Step Getting Started Guide. My goal for this project is to provide you with the tools, knowledge, and understanding to download the IGEL Platform trial software and perform basic installation and configuration without being forced to read many manuals and numerous web support articles.

This document will walk you, step-by-step, through what is required for you to get up and running in a proof-of-concept or lab scenario. When finished, you will have a fully working IGEL End-Point Management Platform consisting of the IGEL Universal Management Suite (UMS), IGEL Cloud Gateway (ICG) and at least one IGEL OS installed, connected and centrally managed! 

Ovum: Igel's Security Enhancements for Thin Clients
Thin client vendor Igel is enhancing the security capabilities of its products, both under its own steam and in collaboration with technology partners. Ovum sees these developments as important for the next wave of thin client computing, which will be software-based – particularly if the desktop-as-a-service (DaaS) market is to take off.

With hardware-based thin client shipments in the region of 4–5 million units annually, this market is still a drop in the ocean compared to the 270 million PCs shipping each year, though the latter figure has been declining since 2011. And within the thin client market, Igel is in fourth place behind Dell and HP (each at around 1.2 million units annually) and China’s Centerm, which only sells into its home market.

However, the future for thin clients looks bright, in that the software-based segment of the market  (which some analyst houses refuse to acknowledge) is expanding, particularly for Igel. Virtual desktop infrastructure (VDI) technology has stimulated this growth, but the greatest promise is probably in the embryonic DaaS market, whereby enterprises will have standard images for their workforce hosted by service providers.

High Availability Clusters in VMware vSphere without Sacrificing Features or Flexibility
This paper explains the challenges of moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Many large enterprises are moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources.

Realizing these benefits with business critical applications, such as SQL Server or SAP can pose several challenges. Because these applications need high availability and disaster recovery protection, the move to a virtual environment can mean adding cost and complexity and limiting the use of important VMware features. This paper explains these challenges and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

A Journey Through Hybrid IT and the Cloud
How to navigate between the trenches. Hybrid IT has moved from buzzword status to reality and organizations are realizing its potential impact. Some aspects of your infrastructure may remain in a traditional setting, while another part runs on cloud infrastructure—causing great complexity. So, what does this mean for you?

How to navigate between the trenches

Hybrid IT has moved from buzzword status to reality and organizations are realizing its potential impact. Some aspects of your infrastructure may remain in a traditional setting, while another part runs on cloud infrastructure—causing great complexity. So, what does this mean for you?
 
“A Journey Through Hybrid IT and the Cloud” provides insight on:

  • What Hybrid IT means for the network, storage, compute, monitoringand your staff
  • Real world examples that can occur along your journey (what did vs. didn’t work)
  • How to educate employees on Hybrid IT and the Cloud
  • Proactively searching out technical solutions to real business challenges
Monitoring 201: Moving Beyond Simplistic Monitoring and Alerts to Monitoring Glory
Are you ready to achieve #monitoringglory?

Are you ready to achieve #monitoringglory?

After reading this e-book, "Monitoring 201", you will:

  • Be able to imagine and create meaningful and actionable monitors and alerts
  • Understand how to explain the value of monitoring to non-technical coworkers
  • Focus on productive work because you will not be interrupted by spurious alerts
How to Build a SANless SQL Server Failover Cluster Instance in Google Cloud Platform
This white paper walks through the steps to build a two-node failover cluster between two instances in the same region, but in different Zones, within the Google Cloud Platform (GCP)
If you are going to host SQL Server on the Google Cloud Platform (GCP) you will want to make sure it is highly available with a SQL Failover Cluster. One of the best and most economical ways to do that is to build a SQL Server Failover Cluster Instance (FCI). In this guide, we will walk through the steps to build a two-node failover cluster between two instances in the same region, but in different Zones, within the GCP.
The Gorilla Guide to Moving Beyond Disaster Recovery to IT Resilience
Does your business require you to modernize IT while you’re struggling to manage the day to day? Sound familiar? Use this e-book to help move beyond the day to day challenges of protecting your business and start shifting to an IT resilience strategy. With IT resilience you can focus your efforts where they matter: on successfully completing those projects which mean the most to the progress of the business - the ones that help you increase market share, decrease costs and innovate faster than y
Does your business require you to modernize IT while you’re struggling to manage the day to day. Sound familiar?

Use this e-book to help move beyond the day to day challenges of protecting your business and start shifting to an IT resilience strategy. IT resilience is an emerging term that describes a stated goal for businesses to accelerate transformation and easily adapt to change while protecting the business from disruption.

With IT resilience you can focus your efforts where they matter: on successfully completing those projects which mean the most to the progress of the business – the ones that help you increase market share, decrease costs and innovate faster than your competitors.

With this guide you will learn…
  • How to prepare for both unplanned and planned disruptions to ensure continuous availability
  • Actionable steps to remove the complexity of moving and migrating workloads across disparate infrastructures
  • Guidance on hybrid and multi-cloud IT: gain the flexibility to move applications in and out of the cloud
PrinterLogic and IGEL Enable Healthcare Organizations to Deliver Better Patient Outcomes
Healthcare professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information.

Many organizations have turned to virtualizing user endpoints to help reduce capital and operational expenses while increasing security. This is especially true within healthcare, where hospitals, clinics, and urgent care centers seek to offer the best possible patient outcomes while adhering to a variety of mandated patient security and information privacy requirements.

With the movement of desktops and applications into the secure data center or cloud, the need for reliable printing of documents, some very sensitive in nature, remains a constant that can be challenging when desktops are virtual but the printing process remains physical. Directing print jobs to the correct printer with the correct physical access rights in the correct location while ensuring compliance with key healthcare mandates like the General Data Protection Regulation (GDPR) and the Healthcare Insurance Portability and Accountability Act (HIPAA) is critical.

Healthcare IT needs to keep pace with these requirements and the ongoing printing demands of healthcare. Medical professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information. By combining PrinterLogic’s enterprise print management software with centrally managed direct IP printing and IGEL’s software-defined thin client endpoint management, healthcare organizations can:

  • Reduce capital and operational costs
  • Support virtual desktop infrastructure (VDI) and electronic medical records (EMR) systems effectively
  • Centralize and simplify print management
  • Add an essential layer of security from the target printer all the way to the network edge
Gartner Market Guide for IT Infrastructure Monitoring Tools
With the onset of more modular and cloud-centric architectures, many organizations with disparate monitoring tools are reassessing their monitoring landscape. According to Gartner, hybrid IT (especially with IaaS subscription) enterprises must adopt more holistic IT infrastructure monitoring tools (ITIM) to gain visibility into their IT landscapes.

With the onset of more modular and cloud-centric architectures, many organizations with disparate monitoring tools are reassessing their monitoring landscape. According to Gartner, hybrid IT (especially with IaaS subscription) enterprises must adopt more holistic IT infrastructure monitoring tools (ITIM) to gain visibility into their IT landscapes.

The guide provides insight into the IT infrastructure monitoring tool market and providers as well as key findings and recommendations.

Get the 2018 Gartner Market Guide for IT Infrastructure Monitoring Tools to see:

  • The ITIM market definition, direction and analysis
  • A list of representative ITIM vendors
  • Recommendations for adoption of ITIM platforms

Key Findings Include:

  • ITIM tools are helping organizations simplify and unify monitoring across domains within a single tool, eliminating the problems of multitool integration.
  • ITIM tools are allowing infrastructure and operations (I&O) leaders to scale across hybrid infrastructures and emerging architectures (such as containers and microservices).
  • Metrics and data acquired by ITIM tools are being used to derive context enabling visibility for non-IT teams (for example, line of business [LOB] and app owners) to help achieve optimization targets.
Mastering vSphere – Best Practices, Optimizing Configurations & More
Do you regularly work with vSphere? If so, this free eBook is for you. Learn how to leverage best practices for the most popular features contained within the vSphere platform and boost your productivity using tips and tricks learnt direct from an experienced VMware trainer and highly qualified professional. In this eBook, vExpert Ryan Birk shows you how to master: Advanced Deployment Scenarios using Auto-Deploy Shared Storage Performance Monitoring and Troubleshooting Host Network configurati

If you’re here to gather some of the best practices surrounding vSphere, you’ve come to the right place! Mastering vSphere: Best Practices, Optimizing Configurations & More, the free eBook authored by me, Ryan Birk, is the product of many years working with vSphere as well as teaching others in a professional capacity. In my extensive career as a VMware consultant and teacher (I’m a VMware Certified Instructor) I have worked with people of all competence levels and been asked hundreds - if not thousands - of questions on vSphere. I was approached to write this eBook to put that experience to use to help people currently working with vSphere step up their game and reach that next level. As such, this eBook assumes readers already have a basic understanding of vSphere and will cover the best practices for four key aspects of any vSphere environment.

The best practices covered here will focus largely on management and configuration solutions so should remain relevant for quite some time. However, with that said, things are constantly changing in IT, so I would always recommend obtaining the most up-to-date information from VMware KBs and official documentation especially regarding specific versions of tools and software updates. This eBook is divided into several sections, and although I would advise reading the whole eBook as most elements relate to others, you might want to just focus on a certain area you’re having trouble with. If so, jump to the section you want read about.

Before we begin, I want to note that in a VMware environment, it’s always best to try to keep things simple. Far too often I have seen environments be thrown off the tracks by trying to do too much at once. I try to live by the mentality of “keeping your environment boring” – in other words, keeping your host configurations the same, storage configurations the same and network configurations the same. I don’t mean duplicate IP addresses, but the hosts need identical port groups, access to the same storage networks, etc. Consistency is the name of the game and is key to solving unexpected problems down the line. Furthermore, it enables smooth scalability - when you move from a single host configuration to a cluster configuration, having the same configurations will make live migrations and high availability far easier to configure without having to significantly re-work the entire infrastructure. Now the scene has been set, let’s get started!

vSphere Troubleshooting Guide
Troubleshooting complex virtualization technology is something all VMware users will have to face at some point. It requires an understanding of how various components fit together and finding a place to start is not easy. Thankfully, VMware vExpert Ryan Birk is here to help with this eBook preparing you for any problems you may encounter along the way.

This eBook explains how to identify problems with vSphere and how to solve them. Before we begin, we need to start off with an introduction to a few things that will make life easier. We’ll start with a troubleshooting methodology and how to gather logs. After that, we’ll break this eBook into the following sections: Installation, Virtual Machines, Networking, Storage, vCenter/ESXi and Clustering.

ESXi and vSphere problems arise from many different places, but they generally fall into one of these categories: Hardware issues, Resource contention, Network attacks, Software bugs, and Configuration problems.

A typical troubleshooting process contains several tasks: 1. Define the problem and gather information. 2. Identify what is causing the problem. 3. Fix the problem, implement a fix.

One of the first things you should try to do when experiencing a problem with a host, is try to reproduce the issue. If you can find a way to reproduce it, you have a great way to validate that the issue is resolved when you do fix it. It can be helpful as well to take a benchmark of your systems before they are implemented into a production environment. If you know HOW they should be running, it’s easier to pinpoint a problem.

You should decide if it’s best to work from a “Top Down” or “Bottom Up” approach to determine the root cause. Guest OS Level issues typically cause a large amount of problems. Let’s face it, some of the applications we use are not perfect. They get the job done but they utilize a lot of memory doing it.

In terms of virtual machine level issues, is it possible that you could have a limit or share value that’s misconfigured? At the ESXi Host Level, you could need additional resources. It’s hard to believe sometimes, but you might need another host to help with load!

Once you have identified the root cause, you should assess the impact of the problem on your day to day operations. When and what type of fix should you implement? A short-term one or a long-term solution? Assess the impact of your solution on daily operations. Short-term solution: Implement a quick workaround. Long-term solution: Reconfiguration of a virtual machine or host.

Now that the basics have been covered, download the eBook to discover how to put this theory into practice!

Forrester: Monitoring Containerized Microservices - Elevate Your Metrics
As enterprises continue to rapidly adopt containerized microservices, infrastructure and operations (I&O) teams need to address the growing complexities of monitoring these highly dynamic and distributed applications. The scale of these environments can pose tremendous monitoring challenges. This report will guide I&O leaders in what to consider when developing their technology and metric strategies for monitoring microservices and container-based applications.
As enterprises continue to rapidly adopt containerized microservices, infrastructure and operations (I&O) teams need to address the growing complexities of monitoring these highly dynamic and distributed applications. The scale of these environments can pose tremendous monitoring challenges. This report will guide I&O leaders in what to consider when developing their technology and metric strategies for monitoring microservices and container-based applications.
Futurum Research: Digital Transformation - 9 Key Insights
In this report, Futurum Research Founder and Principal Analyst Daniel Newman and Senior Analyst Fred McClimans discuss how digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes. Discover the nine critical data points that measure the current state of digital transformation in the enterprise to uncover new opportunities, improve business agility, and achieve successful cloud migration.
In this report, Futurum Research Founder and Principal Analyst Daniel Newman and Senior Analyst Fred McClimans discuss how digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes. Discover the nine critical data points that measure the current state of digital transformation in the enterprise to uncover new opportunities, improve business agility, and achieve successful cloud migration.
Implementing High Availability in a Linux Environment
This white paper explores how organizations can lower both CapEx and OpEx running high-availability applications in a Linux environment without sacrificing performance or security.
Using open source solutions can dramatically reduce capital expenditures, especially for software licensing fees. But most organizations also understand that open source software needs more “care and feeding” than commercial software—sometimes substantially more- potentially causing operating expenditures to increase well above any potential savings in CapEx. This white paper explores how organizations can lower both CapEx and OpEx running high-availability applications in a Linux environment without sacrificing performance or security.
Controlling Cloud Costs without Sacrificing Availability or Performance
This white paper is to help prevent cloud services sticker shock from occurring ever again and to help make your cloud investments more effective.
After signing up with a cloud service provider, you receive a bill that causes sticker shock. There are unexpected and seemingly excessive charges, and those responsible seem unable to explain how this could have happened. The situation is critical because the amount threatens to bust the budget unless cost-saving changes are made immediately. The objective of this white paper is to help prevent cloud services sticker shock from occurring ever again.
How to Get the Most Out of Windows Admin Center
Windows Admin Center is the future of Windows and Windows Server management. Are you using it to its full potential? In this free eBook, Microsoft Cloud and Datacenter Management MVP, Eric Siron, has put together a 70+ page guide on what Windows Admin Center brings to the table, how to get started, and how to squeeze as much value out of this incredible free management tool from Microsoft. This eBook covers: - Installation - Getting Started - Full UI Analysis - Security - Managing Extensions

Each version of Windows and Windows Server showcases new technologies. The advent of PowerShell marked a substantial step forward in managing those features. However, the built-in graphical Windows management tools have largely stagnated - the same basic Microsoft Management Console (MMC) interfaces had remained since Windows Server 2000. Microsoft tried out multiple overhauls over the years to the built-in Server Manager console but gained little traction. Until Windows Admin Center.

WHAT IS WINDOWS ADMIN CENTER?
Windows Admin Center (WAC) represents a modern turn in Windows and Windows Server system management. From its home page, you establish a list of the networked Windows and Windows Server computers to manage. From there, you can connect to an individual system to control components such as hardware drivers. You can also use it to manage Windows roles, such as Hyper-V.

On the front-end, Windows Admin Center is presented through a sleek HTML 5 web interface. On the back-end, it leverages PowerShell extensively to control the systems within your network. The entire package runs on a single system, so you don’t need a complicated infrastructure to support it. In fact, you can run it locally on your Windows 10 workstation if you want. If you require more resiliency, you can run Windows Admin Center as a role on a Microsoft Failover Cluster.

WHY WOULD I USE WINDOWS ADMIN CENTER?
In the modern era of Windows management, we have shifted to a greater reliance on industrial-strength tools like PowerShell and Desired State Configuration. However, we still have servers that require individualized attention and infrequently utilized resources. WAC gives you a one-stop hub for dropping in on any system at any time and work with almost any of its facets.

ABOUT THIS EBOOK
This eBook has been written by Microsoft Cloud & Datacenter Management MVP Eric Siron. Eric has worked in IT since 1998, designing, deploying, and maintaining server, desktop, network, and storage systems. He has provided all levels of support for businesses ranging from single-user through enterprises with thousands of seats. He has achieved numerous Microsoft certifications and was a Microsoft Certified Trainer for four years. Eric is also a seasoned technology blogger and has amassed a significant following through his top-class work on the Altaro Hyper-V Dojo.

The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019
Thirteen of the most significant IASM providers identified, researched, analyzed and scored in criteria in the three categories of current offering, market presence, and strategy by Forrester Research. Leaders, strong performers and contenders emerge — and you may be surprised where each provider lands in this Forrester Wave.

In The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019, Forrester identified the 13 most significant IASM providers in the market today, with Zenoss ranked amongst them as a Leader.

“As complexity grows, I&O teams struggle to obtain full visibility into their environments and do troubleshooting. To meet rising customer expectations, operations leaders need new monitoring technologies that can provide a unified view of all components of a service, from application code to infrastructure.”

Who Should Read This

Enterprise organizations looking for a solution to provide:

  • Strong root-cause analysis and remediation
  • Digital customer experience measurement capabilities
  • Ease of deployment across the customer’s whole environment, positioning themselves to successfully deliver intelligent application and service monitoring

Our Takeaways

Trends impacting the infrastructure and operations (I&O) team include:

  • Operations leaders favor a unified view
  • AI/machine learning adoption reaches 72% within the next 12 months
  • Intelligent root-cause analysis soon to become table stakes
  • Monitoring the digital customer experience becomes a priority
  • Ease and speed of deployment are differentiators

PowerCLI - The Aspiring Automator's Guide
Automation is awesome but don't just settle for using other people's scripts. Learn how to create your own scripts and take your vSphere automation game to the next level! Written by VMware vExpert Xavier Avrillier, this free eBook presents a use-case approach to learning how to automate tasks in vSphere environments using PowerCLI. We start by covering the basics of installation, set up, and an overview of PowerCLI terms. From there we move into scripting logic and script building with step-by

Scripting and PowerCLI are words that most people working with VMware products know pretty well and have used once or twice. Everyone knows that scripting and automation are great assests to have in your toolbox. The problem usually is that getting into scripting appears daunting to many people who feel like the learning curve is just too steep, and they usually don't know where to start. The good thing is you don't need to learn everything straight away to start working with PowerShell and PowerCLI. Once you have the basics down and have your curiosity tickled, you’ll learn what you need as you go, a lot faster than you thought you would!

ABOUT POWERCLI

Let's get to know PowerCLI a little better before we start getting our hands dirty in the command prompt. If you are reading this you probably already know what PowerCLI is about or have a vague idea of it, but it’s fine you don’t. After a while working with it, it becomes second nature, and you won't be able to imagine life without it anymore! Thanks to VMware's drive to push automation, the product's integration with all of their components has significantly improved over the years, and it has now become a critical part of their ecosystem.

WHAT IS PowerCLI?

Contrary to what many believe, PowerCLI is not in fact a stand-alone software but rather a command-line and scripting tool built on Windows PowerShell for managing and automating vSphere environments. It used to be distributed as an executable file to install on a workstation. Previously, an icon was generated that would essentially launch PowerShell and load the PowerCLI snap-ins in the session. This behavior changed back in version 6.5.1 when the executable file was removed and replaced by a suite of PowerShell modules to install from within the prompt itself. This new deployment method is preferred because these modules are now part of Microsoft’s Official PowerShell Gallery. 7 These modules provide the means to interact with the components of a VMware environment and offer more than 600 cmdlets! The below command returns a full list of VMware-Associated Cmdlets!

Lift and Shift Backup and Disaster Recovery Scenario for Google Cloud: Step by Step Guide
There are many new challenges, and reasons, to migrate workloads to the cloud. Especially for public cloud, like Google Cloud Platform. Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

There are many new challenges, and reasons, to migrate workloads to the cloud.

For example, here are four of the most popular:

  • Analytics and Machine learning (ML) are everywhere. Once you have your data in a cloud platform like Google Cloud Platform, you can leverage their APIs to run analytics and ML on everything.
  • Kubernetes is powerful and scalable, but transitioning legacy apps to Kubernetes can be daunting.
  • SAP HANA is a secret weapon. With high mem instances in the double digit TeraBytes migrating SAP to a cloud platform is easier than ever.
  • Serverless is the future for application development. With CloudSQL, Big Query, and all the other serverless solutions, cloud platforms like GCP are well positioned to be the easiest platform for app development.

Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

Office 365 / Microsoft 365: The Essential Companion Guide
Office 365 and Microsoft 365 contain truly powerful applications that can significantly boost productivity in the workplace. However, there’s a lot on offer so we’ve put together a comprehensive companion guide to ensure you get the most out of your investment! This free 85-page eBook, written by Microsoft Certified Trainer Paul Schnackenburg, covers everything from basic descriptions, to installation, migration, use-cases, and best practices for all features within the Office/Microsoft 365 sui

Welcome to this free eBook on Office 365 and Microsoft 365 brought to you by Altaro Software. We’re going to show you how to get the most out of these powerful cloud packages and improve your business. This book follows an informal reference format providing an overview of the most powerful applications of each platform’s feature set in addition to links directing to supporting information and further reading if you want to dig further into a specific topic. The intended audience for this book is administrators and IT staff who are either preparing to migrate to Office/Microsoft 365 or who have already migrated and who need to get the lay of the land. If you’re a developer looking to create applications and services on top of the Microsoft 365 platform, this book is not for you. If you’re a business decision-maker, rather than a technical implementer, this book will give you a good introduction to what you can expect when your organization has been migrated to the cloud and ways you can adopt various services in Microsoft 365 to improve the efficiency of your business.

THE BASICS

We’ll cover the differences (and why one might be more appropriate for you than the other) in more detail later but to start off let’s just clarify what each software package encompasses in a nutshell. Office 365 (from now on referred to as O365) 7 is an email collaboration and a host of other services provided as a Software as a Service (SaaS) whereas Microsoft 365 (M365) is Office 365 plus Azure Active Directory Premium, Intune – cloud-based management of devices and security and Windows 10 Enterprise. Both are per user-based subscription services that require no (or very little) infrastructure deployments on-premises.

How to Develop a Multi-cloud Management Strategy
Increasingly, organizations are looking to move workloads into the cloud. The goal may be to leverage cloud resources for Dev/Test, or they may want to “lift and shift” an application to the cloud and run it natively. In order to enable these various cloud options, it is critical that organizations develop a multi-cloud data management strategy.

The primary goal of a multi-cloud data management strategy is to supply data, either via copying or moving data to the various multi-cloud use cases. A key enabler of this movement is the data management software applications. In theory, data protection applications can perform both of the copy and move functions. A key consideration is how the multi-cloud data management experience is unified. In most cases, data protection applications ignore the user experience of each cloud and use their proprietary interface as the unifying entity, which increases complexity.

There are a variety of reasons organizations may want to leverage multiple clouds. The first use case is to use public cloud storage as a backup mirror to an on-premises data protection process. Using public cloud storage as a backup mirror enables the organization to automatically off-site data. It also sets up many of the more advanced use cases.

Another use case is using the cloud for disaster recovery.

Another use case is “Lift and Shift,” which means the organization wants to run the application in the cloud natively. Initial steps in the “lift and shift” use case are similar to Dev/Test, but now the workload is storing unique data in the cloud.

Multi-cloud is a reality now for most organizations and managing the movement of data between these clouds is critical.

Multi-cloud Data Protection-as-a-service: The HYCU Protégé Platform
Multi-cloud environments are here to stay and will keep on growing in diversity, use cases, and, of course, size. Data growth is not stopping anytime soon, only making the problem more acute. HYCU has taken a very different approach from many traditional vendors by selectively delivering deeply integrated solutions to the platforms they protect, and is now moving to the next challenge of unification and simplification with Protégé, calling it a data protection-as-a-service platform.

There are a number of limitations today keeping organizations from not only lifting and shifting from one cloud to another but also migrating across clouds. Organizations need the flexibility to leverage multiple clouds and move applications and workloads around freely, whether for data reuse or for disaster recovery. This is where the HYCU Protégé platform comes in. HYCU Protégé is positioned as a complete multi-cloud data protection and disaster recovery-as-a-service solution. It includes a number of capabilities that make it relevant and notable compared with other approaches in the market:

  • It was designed for multi-cloud environments, with a “built-for-purpose” approach to each workload and environment, leveraging APIs and platform expertise.
  • It is designed as a one-to-many cross-cloud disaster recovery topology rather than a one-to-one cloud or similarly limited topology.
  • It is designed for the IT generalist. It’s easy to use, it includes dynamic provisioning on-premises and in the cloud, and it can be deployed without impacting production systems. In other words, no need to manually install hypervisors or agents.
  • It is application-aware and will automatically discover and configure applications. Additionally, it supports distributed applications with shared storage. 
Normal 0 false false false EN-US X-NONE X-NONE
How iland supports Zero Trust security
This paper explains the background of Zero Trust security and how organizations can achieve this to protect themselves from outside threats.
Recent data from Accenture shows that, over the last five years, the number of security breaches has risen 67 percent, the cost of cybercrime has gone up 72 percent, and the complexity and sophistication of the threats has also increased.

As a result, it should come as no surprise that innovative IT organizations are working to adopt more comprehensive security strategies as the potential damage to business revenue and reputation increases. Zero Trust is one of those strategies that has gained significant traction in recent years.

In this paper we'll discuss:
  • What is Zero Trust?
  • The core tenants of iland’s security capabilities and contribution to supporting Zero Trust.
    • Physical - Still the first line of defense
    • Logical - Security through technology
    • People and process - The critical layer
    • Accreditation - Third-party validation
  • Security and compliance as a core iland value
Mind The Gap: Understanding the threats to your Office 365 data
Download this whitepaper to learn more about how you can prevent, or mitigate, these common Office 365 data threats: External threats like ransomware, Malicious insiders, User-errors and accidental keystrokes.
From corporate contacts to sensitive messages and attachments, email systems at all companies contain some of the most important data needed to keep business running and successful. At the same time, your office productivity suite of documents, notes and spreadsheets created by your employees is equally vital. Unfortunately, in both cases, protecting that data is increasingly challenging. Microsoft provides what some describe as marginal efforts to protect and backup data, however the majority of the burden is placed on the customer.

Download this whitepaper to learn more about how you can prevent, or mitigate, these common Office 365 data threats:
•    External threats like ransomware
•    Malicious insiders
•    User-errors and accidental keystrokes

Data Protection as a Service - Simplify Your Backup and Disaster Recovery
Data protection is a catch-all term that encompasses a number of technologies, business practices and skill sets associated with preventing the loss, corruption or theft of data. The two primary data protection categories are backup and disaster recovery (DR) — each one providing a different type, level and data protection objective. While managing each of these categories occupies a significant percentage of the IT budget and systems administrator’s time, it doesn’t have to. Data protection can
Simplify Your Backup and Disaster Recovery

Today, there are an ever-growing number of threats to businesses and uptime is crucial. Data protection has never been a more important function of IT. As data center complexity and demand for new resources increases, the difficulty of providing effective and cost-efficient data protection increases as well.

Luckily, data protection can now be provided as a service.

Get this white paper to learn:
  • How data protection service providers enable IT teams to focus on business objectives
  • The difference, and importance, of cloud-based backup and disaster recovery
  • Why cloud-based backup and disaster recovery are required for complete protection
DPX: The Backup Alternative You’ve Been Waiting For
Catalogic DPX is a pleasantly affordable backup solution that focuses on the most important aspects of data backup and recovery: Easy administration, world class reliability, fast backup and recovery with minimal system impact and a first-class support team. DPX delivers on key data protection use cases, including rapid recovery and DR, ransomware protection, cloud integration, tape or tape replacement, bare metal recovery and remote office backup.
Catalogic DPX is a pleasantly affordable backup solution that focuses on the most important aspects of data backup and recovery: Easy administration, world class reliability, fast backup and recovery with minimal system impact and a first-class support team. DPX delivers on key data protection use cases, including rapid recovery and DR, ransomware protection, cloud integration, tape or tape replacement, bare metal recovery and remote office backup.
The SysAdmin Guide to Azure Infrastructure as a Service
If you're used to on-premises infrastructures, cloud platforms can seem daunting. But it doesn't need to be. This eBook written by the veteran IT consultant and trainer Paul Schnackenburg, covers all aspects of setting up and maintaining a high-performing Azure IaaS environment, including: • VM sizing and deployment • Migration • Storage and networking • Security and identity • Infrastructure as code and more!

The cloud computing era is well and truly upon us, and knowing how to take advantage of the benefits of this computing paradigm while maintaining security, manageability, and cost control are vital skills for any IT professional in 2020 and beyond. And its importance is only getting greater.

In this eBook, we’re going to focus on Infrastructure as a Service (IaaS) on Microsoft’s Azure platform - learning how to create VMs, size them correctly, manage storage, networking, and security, along with backup best practices. You’ll also learn how to operate groups of VMs, deploy resources based on templates, managing security and automate your infrastructure. If you currently have VMs in your own datacenter and are looking to migrate to Azure, we’ll also teach you that.

If you’re new to the cloud (or have experience with AWS/GCP but not Azure), this book will cover the basics as well as more advanced skills. Given how fast things change in the cloud, we’ll cover the why (as well as the how) so that as features and interfaces are updated, you’ll have the theoretical knowledge to effectively adapt and know how to proceed.

You’ll benefit most from this book if you actively follow along with the tutorials. We will be going through terms and definitions as we go – learning by doing has always been my preferred way of education. If you don’t have access to an Azure subscription, you can sign up for a free trial with Microsoft. This will give you 30 days 6 to use $200 USD worth of Azure resources, along with 12 months of free resources. Note that most of these “12 months” services aren’t related to IaaS VMs (apart from a few SSD based virtual disks and a small VM that you can run for 750 hours a month) so be sure to get everything covered on the IaaS side before your trial expires. There are also another 25 services that have free tiers “forever”.

Now you know what’s in store, let’s get started!

Evaluator Group Report on Liqid Composable Infrastructure
In this report from Eric Slack, Senior Analyst at the Evaluator Group, learn how Liqid’s software-defined platform delivers comprehensive, multi-fabric composable infrastructure for the industry’s widest array of data center resources.
Composable Infrastructures direct-connect compute and storage resources dynamically—using virtualized networking techniques controlled by software. Instead of physically constructing a server with specific internal devices (storage, NICs, GPUs or FPGAs), or cabling the appropriate device chassis to a server, composable enables the virtual connection of these resources at the device level as needed, when needed.

Download this report from Eric Slack, Senior Analyst at the Evaluator Group to learn how Liqid’s software-defined platform delivers comprehensive, multi-fabric composable infrastructure for the industry’s widest array of data center resources.
Why Should Enterprises Move to a True Composable Infrastructure Solution?
IT Infrastructure needs are constantly fluctuating in a world where powerful emerging software applications such as artificial intelligence can create, transform, and remodel markets in a few months or even weeks. While the public cloud is a flexible solution, it doesn’t solve every data center need—especially when businesses need to physically control their data on premises. Download this report to see how composable infrastructure helps you deploy faster, effectively utilize existing hardwar

IT Infrastructure needs are constantly fluctuating in a world where powerful emerging software applications such as artificial intelligence can create, transform, and remodel markets in a few months or even weeks. While the public cloud is a flexible solution, it doesn’t solve every data center need—especially when businesses need to physically control their data on premises. This leads to overspend— purchasing servers and equipment to meet peak demand at all times. The result? Expensive equipment sitting idle during non-peak times.

For years, companies have wrestled with overspend and underutilization of equipment, but now businesses can reduce cap-ex and rein in operational expenditures for underused hardware with software-defined composable infrastructure. With a true composable infrastructure solution, businesses realize optimal performance of IT resources while improving business agility. In addition, composable infrastructure allows organizations to take better advantage of the most data-intensive applications on existing hardware while preparing for future, disaggregated growth.

Download this report to see how composable infrastructure helps you deploy faster, effectively utilize existing hardware, rein in capital expenses, and more.

LQD4500 Gen4x16 NVMe SSD Performance Report
The LQD4500 is the World’s Fastest SSD. The Liqid Element LQD4500 PCIe Add-in-Card (AIC), aka the “Honey Badger" for its fierce, lightning fast data speeds, delivers Gen-4 PCIe performance with up to 4m IOPS, 24 GB/s throughput, ultra-low transactional latency of just 20 µs, in capacities up to 32TB. What does all that mean in real-world testing? Download the full LQD4500 performance report and learn how the ultra-high performance and density Gen-4 AIC can supercharge data for your most demand
The LQD4500 is the World’s Fastest SSD.

The Liqid Element LQD4500 PCIe Add-in-Card (AIC), aka the “Honey Badger" for its fierce, lightning fast data speeds, delivers Gen-4 PCIe performance with up to 4m IOPS, 24 GB/s throughput, ultra-low transactional latency of just 20 µs, in capacities up to 32TB.

The document will contain test results and performance measurements for the Liqid LQD4500 Gen4x16 NVMe SSD. The performance test reports include Sequential, Random, and Latency measurement on the LQD4500 high performance storage device. The following data has been measured in a Linux OS environment and results are taken per the SNIA enterprise performance test specification standards. The below results are steady state after sufficient device preconditioning.

Download the full LQD4500 performance report and learn how the ultra-high performance and density Gen-4 AIC can supercharge data for your most demanding applications.
Exploring AIOps: Cluster Analysis for Events
AIOps, i.e., artificial intelligence for IT operations, has become the latest strategy du jour in the IT operations management space to help address and better manage the growing complexity and extreme scale of modern IT environments. AIOps enables some unique and new capabilities on this front, though it is quite a bit more complicated than the panacea that it is made out to be. However, the underlying AI and machine learning (ML) concepts do help complement, supplement and, in particular cases
AIOps, i.e., artificial intelligence for IT operations, has become the latest strategy du jour in the IT operations management space to help address and better manage the growing complexity and extreme scale of modern IT environments. AIOps enables some unique and new capabilities on this front, though it is quite a bit more complicated than the panacea that it is made out to be. However, the underlying AI and machine learning (ML) concepts do help complement, supplement and, in particular cases, even supplant more traditional approaches to handling typical IT Ops scenarios at scale.

An AIOps platform has to ingest and deal with multiple types of data to develop a comprehensive understanding of the state of the managed domain(s) and to better discern the push and pull of diverse trends in the environment, both overt and subtle, that may destabilize critical business outcomes. In this white paper, we will take a look at an AIOps approach to handling one of the fundamental data types: events.
Jumpstart your Disaster Recovery and Remote Work Strategy: 6 Considerations for your Virtual Desktop
If you have a business continuity strategy or not, this guide will help to understand the unique considerations (and advantages) to remote desktops. Learn how your virtualized environments are suited to good DR and how they can be optimized to protect your organization from that worst-case scenario.
If you have a business continuity strategy or not, this guide will help to understand the unique considerations (and advantages) to remote desktops. Learn how your virtualized environments are suited to good DR and how they can be optimized to protect your organization from that worst-case scenario.
Key Considerations for Configuring Virtual Desktops For Remote Work
At any time, organizations worldwide and individuals can be forced to work from home. Learn about a sustainable solution to enable your remote workforce quickly and easily and gain tips to enhance your business continuity strategy when it comes to employee computing resources.

Assess what you already have

If you have a business continuity plan or a disaster recovery plan in place, that’s a good place to start. This scenario may not fit the definition of disaster that you originally intended, but it can serve to help you test your plan in a more controlled fashion that can benefit both your current situation by giving you a head start, and your overall plan by revealing gaps that would be more problematic in a more urgent or catastrophic environment with less time to prepare and implement.

Does your plan include access to remote desktops in a data center or the cloud? If so, and you already have a service in place ready to transition or expand, you’re well on your way.

Read the guide to learn what it takes for IT teams to set up staff to work effectively from home with virtual desktop deployments. Learn how to get started, if you’re new to VDI or if you already have an existing remote desktop scenario but are looking for alternatives.

Top 5 Reasons to Think Outside the Traditional VDI Box
Finding yourself limited with an on-premises VDI setup? A traditional VDI model may not be the ideal virtualization solution, especially for those looking for a simple, low-cost solution. This guide features 5 reasons to look beyond traditional VDI when deciding how to virtualize an IT environment.

A traditional VDI model can come with high licensing costs, limited opportunity to mix and match components to suit your needs, not to mention the fact that you're locked into a single vendor.

We've compiled a list of 5 reasons to think outside the traditional VDI box, so you can see what is possible by choosing your own key components, not just the ones you're locked into with a full stack solution.

The State of Multicloud: Virtual Desktop Deployments
Download this free 15-page report to understand the key differences and benefits to the many cloud deployment models and the factors that are driving tomorrow’s decisions.

The future of compute is in the cloud

Flexible, efficient, and economical, the cloud is no longer a question - it's the answer.

IT professionals that once considered if or when to migrate to the cloud are now talking about how. Earlier this year, we reached out to thousands of IT professionals to learn more about how.

Private Cloud, On-Prem, Public Cloud, Hybrid, Multicloud - each of these deployment models offers unique advantages and challenges. We asked IT decision-makers how they are currently leveraging the cloud and how they plan to grow.

Survey respondents overwhelmingly believed in the importance of a hybrid or multicloud strategy, regardless of whether they had actually implemented one themselves.

The top reasons for moving workloads between clouds

  • Cost Savings
  • Disaster Recovery
  • Data Center Location
  • Availability of Virtual Machines/GPUs
The Time is Now for File Virtualization
DataCore’s vFilO is a distributed files and object storage virtualization solution that can consume storage from a variety of providers, including NFS or SMB file servers, most NAS systems, and S3 Object Storage systems, including S3-based public cloud providers. Once vFilO integrates these various storage systems into its environment, it presents users with a logical file system and abstracts it from the actual physical location of data.

DataCore vFilO is a top-tier file virtualization solution. Not only can it serve as a global file system, IT can also add new NAS systems or file servers to the environment without having to remap users of the new hardware. vFilO supports live migration of data between the storage systems it has assimilated and leverages the capabilities of the global file system and the software’s policy-driven data management to move older data to less expensive storage automatically; either high capacity NAS or an object storage system. vFilO also transparently moves data from NFS/SMB to object storage. If the user needs access to this data in the future, they access it like they always have. To them, the data has not moved.

The ROI of File virtualization is powerful, but it has struggled to gain adoption in the data center. File Virtualization needs to be explained, and explaining it takes time. vFilO more than meets the requirements to qualify as a top tier file virtualization solution. DataCore has the advantage of over 10,000 customers that are much more likely to be receptive to the concept since they have already embraced block storage virtualization with SANSymphony. Building on its customer base as a beachhead, DataCore can then expand File Virtualization’s reach to new customers, who, because of the changing state of unstructured data, may finally be receptive to the concept. At the same time, these new file virtualization customers may be amenable to virtualizing block storage, and it may open up new doors for SANSymphony.

ESG Showcase - DataCore vFilO: NAS Consolidation Means Freedom from Data Silos
File and object data are valuable tools that help organizations gain market insights, improve operations, and fuel revenue growth. However, success in utilizing all of that data depends on consolidating data silos. Replacing an existing infrastructure is often expensive and impractical, but DataCore vFilO software offers an intelligent, powerful option—an alternative, economically appealing way to consolidate and abstract existing storage into a single, efficient, capable ecosystem of readily-se

Companies have NAS systems all over the place—hardware-centric devices that make data difficult to migrate and leverage to support the business. It’s natural that companies would desire to consolidate those systems, and vFilO is a technology that could prove to be quite useful as an assimilation tool. Best of all, there’s no need to replace everything. A business can modernize its IT environment and finally achieve a unified view, plus gain more control and efficiency via the new “data layer” sitting on top of the hardware. When those old silos finally disappear, employees will discover they can find whatever information they need by examining and searching what appears to be one big catalog for a large pool of resources.

And for IT, the capacity-balancing capability should have especially strong appeal. With it, file and object data can shuffle around and be balanced for efficiency without IT or anyone needing to deal with silos. Today, too many organizations still perform capacity balancing work manually—putting some files on a different NAS system because the first one started running out of room. It’s time for those days to end. DataCore, with its 20-year history offering SANsymphony, is a vendor in a great position to deliver this new type of solution, one that essentially virtualizes NAS and object systems and even includes keyword search capabilities to help companies use their data to become stronger, more competitive, and more profitable.

Ten Topics to Discuss with Your Cloud Provider
Find the “just right” cloud for your business. For this paper, we will focus on existing applications (vs. new application services) that require high levels of performance and security, but that also enable customers to meet specific cost expectations.

Choosing the right cloud service for your organization, or for your target customer if you are a managed service provider, can be time consuming and effort intensive. For this paper, we will focus on existing applications (vs. new application services) that require high levels of performance and security, but that also enable customers to meet specific cost expectations.

Topics covered include:

  • Global access and availability
  • Cloud management
  • Application performance
  • Security and compliance
  • And more!
How to Sell
This white paper gives you strategies for getting on the same page as senior management regarding DR.

Are You Having Trouble Selling DR to Senior Management?

This white paper gives you strategies for getting on the same page as senior management regarding DR. These strategies include:

  • Striking the use of the term “disaster” from your vocabulary making sure management understands the ROI of IT Recovery
  • Speaking about DR the right way—in terms of risk mitigation
  • Pointing management towards a specific solution.

10 Best Practices for VMware vSphere Backups
In 2021, VMware is still the market leader in the virtualization sector and, for many IT pros, VMware vSphere is the virtualization platform of choice. But can you keep up with the everchanging backup demands of your organization, reduce complexity and out‑perform legacy backup?

Read this whitepaper to learn critical best practices for VMware vSphere with Veeam Backup & Replication v11, such as:

  • Choose the right backup mode wisely
  • Plan how to restore
  • Integrate Continuous Data Protection into disaster recovery concept
  • And much more!
GigaOM Key Criteria for Software-Defined Storage – Vendor Profile: DataCore Software
DataCore SANsymphony is one of the most flexible solutions in the software-defined storage (SDS) market, enabling users to build modern storage infrastructures that combine software-defined storage functionality with storage virtualization and hyperconvergence. This results in a very smooth migration path from traditional infrastructures based on physical appliances and familiar data storage approaches, to a new paradigm built on flexibility and agility.
DataCore SANsymphony is a scale-out solution with a rich feature set and extensive functionality to improve resource optimization and overall system efficiency. Data services exposed to the user include snapshots with continuous data protection and remote data replication options, including a synchronous mirroring capability to build metro clusters and respond to demanding, high-availability scenarios. Encryption at rest can be configured as well, providing additional protection for data regardless of the physical device on which it is stored.

On top of the core block storage services provided in its SANsymphony products, DataCore recently released vFiLo to add file and object storage capabilities to its portfolio. VFiLo enables users to consolidate additional applications and workloads on its platform, and to further simplify storage infrastructure and its management. The DataCore platform has been adopted by cloud providers and enterprises of all sizes over the years, both at the core and at the edge.

SANsymphony combines superior flexibility and support for a diverse array of use cases with outstanding ease of use. The solution is mature and provides a very broad feature set. DataCore boasts a global partner network that provides both products and professional services, while its sales model supports perpetual licenses and subscription options typical of competitors in the sector. DataCore excels at providing tools to build balanced storage infrastructures that can serve multiple workloads and scale in different dimensions, while keeping complexity and cost at bay.

TechGenix Product Review: DataCore vFilO Software-Defined Storage
TechGenix gave DataCore’s vFilO 4.7 stars, which is a gold star review, in its product review. The review found that its interface is relatively intuitive so long as you have a basic understanding of file shares and enterprise storage. Its ability to assign objectives to shares, directories, and even individual files, and the seamless blending of block, file, and object storage delivers a new generation of storage system that is flexible and very powerful.
Managing an organization’s many distributed files and file storage systems has always been challenging, but this task has become far more complex in recent years. System admins commonly find themselves trying to manage several different types of cloud and data center storage, each with its own unique performance characteristics and costs. Bringing all of this storage together in a cohesive way while also keeping costs in check can be a monumental challenge. Not to mention how disruptive data migrations tend to be when space runs short. While there are a few products that use an abstraction layer to provide a consolidated view of an organization’s storage, it is important to keep in mind that all storage is not created equally.
Conversational Geek: Azure Backup Best Practices
Topics: Azure, Backup, Veeam
Get 10 Azure backup best practices direct from two Microsoft MVPs!
Get 10 Azure backup best practices direct from two Microsoft MVPs! As the public cloud started to gain mainstream acceptance, people quickly realized that they had to adopt two different ways of doing things. One set of best practices – and tools – applied to resources that were running on premises, and an entirely different set applied to cloud resources. Now the industry is starting to get back to the point where a common set of best practices can be applied regardless of where an organization’s IT resources physically reside.
Conversational Microsoft Teams Backup
In this Conversational Geek e-book you will learn: The different types of data you need to backup up in Microsoft Teams 6 key reasons why it is important to backup Microsoft Teams Why native backup capabilities of Office 365 are not enough
In this Conversational Geek e-book you will learn:
  • The different types of data you need to backup up in Microsoft Teams
  • 6 key reasons why it is important to backup Microsoft Teams
  • Why native backup capabilities of Office 365 are not enough
The Backup Bible – Complete Edition
In the modern workplace, your data is your lifeline. A significant data loss can cause irreparable damage. Every company must ask itself - is our data properly protected? Learn how to create a robust, effective backup and DR strategy and how put that plan into action with the Backup Bible – a free eBook written by backup expert and Microsoft MVP Eric Siron. The Backup Bible Complete Edition features 200+ pages of actionable content divided into 3 core parts, including 11 customizable templates

Part 1 explains the fundamentals of backup and how to determine your unique backup specifications. You'll learn how to:

  • Get started with backup and disaster recovery planning
  • Set recovery objectives and loss tolerances
  • Translate your business plan into a technically oriented outlook
  • Create a customized agenda for obtaining key stakeholder support
  • Set up a critical backup checklist

Part 2 shows you what exceptional backup looks like on a daily basis and the steps you need to get there, including:

  • Choosing the Right Backup and Recovery Software
  • Setting and Achieving Backup Storage Targets
  • Securing and Protecting Backup Data
  • Defining Backup Schedules
  • Monitoring, Testing, and Maintaining Systems

Part 3 guides you through the process of creating a reliable disaster recovery strategy based on your own business continuity requirements, covering:

  • Understanding key disaster recovery considerations
  • Mapping out your organizational composition
  • Replication
  • Cloud solutions
  • Testing the efficacy of your strategy
  • The Backup Bible is the complete guide to protecting your data and an essential reference book for all IT admins and professionals.


Work From Home Workspace Strategies
This whitepaper has been authored by experts at Liquidware in order to provide information and guidance concerning the deployment of Work From Home (WFH) strategies to provide business continuity during times of crisis or unplanned outages. Liquidware Adaptive Workspace Management solutions can speed the launch of virtual workspaces that support WFH options, ensuring that sound data drives decision-making and all migration processes are automated and streamlined.
This whitepaper has been authored by experts at Liquidware in order to provide information and guidance concerning the deployment of Work From Home (WFH) strategies to provide business continuity during times of crisis or unplanned outages. Liquidware Adaptive Workspace Management solutions can speed the launch of virtual workspaces that support WFH options, ensuring that sound data drives decision-making and all migration processes are automated and streamlined. Information in this document is subject to change without notice. No part of this publication may be reproduced in whole or in part, stored in a retrieval system, or transmitted in any form or by any means electronic or mechanical, including photocopying and recording for any external use by any person or entity without the express prior written consent of Liquidware.
Introduction to Microsoft Windows Virtual Desktop
This whitepaper provides an overview of WVD and a historical perspective of the evolution of Windows desktops – especially multi-session Windows. This paper was authored by industry veterans with active involvement in multi-session Windows desktop computing since its inception in the early 1990s. Disclaimer: Professionals at Liquidware, a Microsoft WVD partner, authored this paper based on information available at the time of writing.
Microsoft announced the general availability of Windows Virtual Desktop (WVD) on September 30, 2019. The release came after an initial public-preview-evaluation program that lasted about six months. This whitepaper provides an overview of WVD and a historical perspective of the evolution of Windows desktops – especially multi-session Windows. This paper was authored by industry veterans with active involvement in multi-session Windows desktop computing since its inception in the early 1990s. Disclaimer: Professionals at Liquidware, a Microsoft WVD partner, authored this paper based on information available at the time of writing. Information regarding WVD is evolving quickly; consequently, readers should understand that this whitepaper (v2.0) presents the most up-to-date information available. Any inaccuracies in this paper are unintentional. Research and buying decisions are ultimately the readers’ responsibility.
Unlocking Digital Transformation with Adaptive Workspace Management
Digital transformation can be stalled for organizations that do not start this process of re-architecting their workspace provisioning approaches. In this whitepaper, Liquidware presents a roadmap for delivering modern workspaces for organizations which are undergoing digital transformation. Liquidware’s Adaptive Workspace Management (AWM) suite of products can support the build-out of an agile, state-of-the-art workspace infrastructure that quickly delivers the resources workers need, on demand

The driving force for organizations today is digital transformation, propelled by a need for greater innovation and agility across enterprises. The digital life-blood for this transformation remains computers, although their form-factor has changed dramatically over the past decade.  Smart devices, including phones, tablets and wearables, have joined PCs and laptops in the daily toolsets used by workers to do their jobs.  The data that organizations rely on increasingly comes from direct sources via smart cards, monitors, implants and embedded processors. IoT, machine learning and artificial intelligence will shape the software that workers use to do their jobs. As these “smart” applications change and take on scope, they will increasingly be deployed on cloud infrastructures, bringing computing to the edge and enabling swift and efficient processing with real-time data.

Yet digital transformation for many organizations can remain blocked if they do not start changing how their workspaces are provisioned. Many still rely on outmoded approaches for delivering the technology needed by their workers to make them productive in a highly digital workplace.

In this paper, Liquidware presents a roadmap for providing modern workspaces for organizations that are undergoing digital transformation. We offer insights into how our Adaptive Workspace Management (AWM) suite of products can support the build-out of an agile,  state-of-the-artworkspace infrastructure that quickly delivers the resources workers need, on demand. AWM allows this  infrastructure  to be constructed from a hybrid mix of the best-of-breed workspace delivery platforms spanning physical, virtual and cloud offerings.

Digital Workspace Disasters and How to Beat Them
This paper looks at risk management as it relates to the Windows desktops that are permanently connected to a campus, head office or branch network. In particular, we will look at how ‘digital workspace’ solutions designed to streamline desktop delivery and provide greater user flexibility can also be leveraged to enable a more effective and efficient approach to desktop disaster recovery (DR).
Desktop DR - the recovery of individual desktop systems from a disaster or system failure - has long been a challenge. Part of the problem is that there are so many desktops, storing so much valuable data and - unlike servers - with so many different end user configurations and too little central control. Imaging everyone would be a huge task, generating huge amounts of backup data. And even if those problems could be overcome with the use of software agents, plus de-deduplication to take common files such as the operating system out of the backup window, restoring damaged systems could still mean days of software reinstallation and reconfiguration. Yet at the same time, most organizations have a strategic need to deploy and provision new desktop systems, and to be able to migrate existing ones to new platforms. Again, these are tasks that benefit from reducing both duplication and the need to reconfigure the resulting installation. The parallels with desktop DR should be clear. We often write about the importance of an integrated approach to investing in backup and recovery. By bringing together business needs that have a shared technical foundation, we can, for example, gain incremental benefits from backup, such as improved data visibility and governance, or we can gain DR capabilities from an investment in systems and data management. So it is with desktop DR and user workspace management. Both of these are growing in importance as organizations’ desktop estates grow more complex. Not only are we adding more ways to work online, such as virtual PCs, more applications, and more layers of middleware, but the resulting systems face more risks and threats and are subject to higher regulatory and legal requirements. Increasingly then, both desktop DR and UWM will be not just valuable, but essential. Getting one as an incremental bonus from the other therefore not only strengthens the business case for that investment proposal, it is a win-win scenario in its own right.
Why User Experience is Key to Your Desktop Transformation
This whitepaper has been authored by experts at Liquidware and draws upon its experience with customers as well as the expertise of its Acceler8 channel partners in order to provide guidance to adopters of desktop virtualization technologies. In this paper, we explain the importance of thorough planning— factoring in user experience and resource allocation—in delivering a scalable next-generation workspace that will produce both near- and long-term value.

There’s little doubt we’re in the midst of a change in the way we operationalize and manage our end users’ workspaces. On the one hand, IT leaders are looking to gain the same efficiencies and benefits realized with cloud and next-generation virtual-server workloads. And on the other hand, users are driving the requirements for anytime, anywhere and any device access to the applications needed to do their jobs. To provide the next-generation workspaces that users require, enterprises are adopting a variety of technologies such as virtual-desktop infrastructure (VDI), published applications and layered applications. At the same time, those technologies are creating new and challenging problems for those looking to gain the full benefits of next-generation end-user workspaces. 

Before racing into any particular desktop transformation delivery approach it’s important to define appropriate goals and adopt a methodology for both near- and long-term success. One of the most common planning pitfalls we’ve seen in our history supporting the transformation of more than 6 million desktops is that organizations tend to put too much emphasis on the technical delivery and resource allocation aspects of the platform, and too little time considering the needs of users. How to meet user expectations and deliver a user experience that fosters success is often overlooked. 

To prevent that problem and achieve near-term success as well as sustainable long-term value from a next-generation desktop transformation approach, planning must also include defining a methodology that should include the following three things:

•    Develop a baseline of “normal” performance for current end user computing delivery
•    Set goals for functionality and defined measurements supporting user experience
•    Continually monitor the environment to ensure users are satisfied and the environment is operating efficiently

This white paper will show why the user experience is difficult to predict, why it’s essential to planning, and why factoring in the user experience—along with resource allocation—is key to creating and delivering the promise of a next-generation workspace that is scalable and will produce both near-and long-term value.

A Guide to VDI Change Management
Testing can protect business continuity.
How testing protects business continuity

Leverage testing to ensure your change plan is successful

Read this white paper and learn how to:
  • Ensure uptime while implementing change
  • Maximize the end-user experience in a constantly changing environment
  • Leverage testing to guarantee a successful roll-out of your change management plan in both pre-production and production
VDI Performance: The Importance of Testing
The importance of testing in your virtualized desktop environments.
Normal 0 false false false EN-US X-NONE X-NONE

The importance of testing in your virtualized desktop environments

With VDI gaining greater popularity among many enterprises across multiple industries, and with growing numbers of desktops migrating to the cloud, the importance of testing your virtualized desktop environment has never been higher.

Read this white paper and learn how:

  • End-user expectations for a great desktop experience from any device, at any time, are increasing
  • IT departments must rise to the challenge of delivering outstanding service
  • Requirements to reduce the complexity and costs associated with infrastructure
Create and Maintain Superior VDI Workspaces
Both Login VSI and IGEL bring their own specific strengths to the table, giving you the ability to focus on securing and optimizing endpoints, whilst also optimizing end-user experience.
Both Login VSI and IGEL bring their own specific strengths to the table, giving you the ability to focus on securing and optimizing endpoints, whilst also optimizing end-user experience.

Read this white paper and learn how:

  • IGEL & Login VSI provides better VDI workspaces to any enterprise
  • The roll-out of VDI is only successful when end-users are happy
  • To keep VDI environments healthy via Change Management
How testing your VDI environment can reduce downtime
Downtime is extremely damaging in VDI environments. Revenue and reputation are lost, not to mention opportunity cost.
Normal 0 false false false EN-US X-NONE X-NONE

Downtime is extremely damaging in VDI environments. Revenue and reputation are lost, not to mention opportunity cost.

Download this white paper to learn how to:

  • Eliminate VDI downtime
  • Help IT get ahead of trouble tickets
  • To optimize environments by using realistic user workloads for synthetic testing
  • Safeguard the performance & availability of your VDI environment
The Monitoring ELI5 Guide: Technology Terms Explained Simply
Complex IT ideas described simply. Very simply. The SolarWinds Explain (IT) Like I’m 5 (ELI5) eBook is for people interested in things like networks, servers, applications, the cloud, and how monitoring all that stuff (and more) gets done—all in an easy-to-understand format.
Complex IT ideas described simply. Very simply. The SolarWinds Explain (IT) Like I’m 5 (ELI5) eBook is for people interested in things like networks, servers, applications, the cloud, and how monitoring all that stuff (and more) gets done—all in an easy-to-understand format.
The Importance of Testing in Today's Ever-Changing IT Environment
Software vendors are delivering changes to Operating Systems and Applications faster than ever. Agile development is driving smaller (but still significant), more frequent changes. Digital Workspace managers in the Enterprise are being bombarded with increased demand. With this in mind, Login VSI looks at the issues and solutions to the challenges Digital Workspace management will be presented with – today and tomorrow.
Software vendors are delivering changes to Operating Systems and Applications faster than ever. Agile development is driving smaller (but still significant), more frequent changes. Digital Workspace managers in the Enterprise are being bombarded with increased demand.

With this in mind, Login VSI looks at the issues and solutions to the challenges Digital Workspace management will be presented with – today and tomorrow.
PowerCLI: An Aspiring Automator's Guide
Stop looking at scripts online in envy because you wish you could build your own scripts. PowerCLI: The Aspiring Automator’s Guide Second Edition will get you started on your path to vSphere automation greatness!

Stop looking at scripts online in envy because you wish you could build your own scripts. PowerCLI: The Aspiring Automator’s Guide Second Edition will get you started on your path to vSphere automation greatness!

Written by VMware vExpert Xavier Avrillier, this free eBook adopts a use-case approach to learning how to automate common vSphere tasks using PowerCLI. We start by covering the basics: installation, setup, and an overview of key PowerCLI terminology. From there we move into scripting logic and script building with step-by-step instructions to build truly useful custom scripts, including:

  • How to retrieve data on vSphere objects
  • Display VM performance metrics
  • How to build HTML reports and schedule them
  • Basics on building functions
  • And more!

This second edition has received a complete overhaul from the original release fully updated to the latest version of vSphere and supplemented with extended use-cases and custom scripts comprising an additional 15 pages of brand-new content!

Powering Remote Game Development
The unprecedented growth in consumer demand exacerbated some challenges the gaming industry faced pre-pandemic—challenges largely created by the need to support an increasingly remote workforce. This guide examines some of those challenges and explores how gaming studios are optimizing processes and technologies to address them while enhancing the collaboration, productivity, and security of remote workers.

People around the world turned to the video gaming industry for entertainment, escapism, and social connection during the COVID-19 pandemic.

The unprecedented growth in consumer demand exacerbated some challenges the gaming industry faced pre-pandemic—challenges largely created by the need to support an increasingly remote workforce.

This guide examines some of those challenges and explores how gaming studios are optimizing processes and technologies to address them while enhancing the collaboration, productivity, and security of remote workers.

What you'll learn:

  • Challenges facing development studios today
  • Four ways to enable remote game developers
  • Key considerations for configuring virtual desktops
The State of Remote Work in 2021
We surveyed nearly 700 IT decisions makers across a range of industries about their transition to sending employees home to work. This report discusses our findings. Download this free 15-page report to learn about priorities for IT staff when it comes to remote desktops for employees, and what will continue presently and post pandemic.

Remote work looks vastly different than it did just one year ago.  In March 2020, tens of millions of workers around the world shifted to working from an office to working from home due to the global COVID-19 pandemic. We set off to find out how organizations were adjusting to remote work, specifically how desktop virtualization usage has contributed to or influenced that adjustment.

Download the report and learn:

  • What role remote desktops play in supporting remote workers
  • Tips from your peers to make the remote work transition easier
  • The benefits of adopting a remote workforce
  • Lessons learned from IT decision makers in shifting employees home
Key Considerations for Configuring Virtual Desktops for Remote Work
Teradici is committed to supporting companies through their search for a sustainable solution to enable their remote workforce quickly and easily. We are here as experienced advisors with guidance to help you maintain secure and uninterrupted operations.

With most of the world working from home for the foreseeable future due to COVID-19, we've prepared this guide to help you enable and sustain a remote workforce.

Download this guide and learn:

  • How to assess your current setup
  • How to keep desktops secure in a remote environment
  • Various remote connectivity options (datacenter, public cloud, hybrid environment)
AWS Data Backup for Dummies
Read this ultimate guide to AWS data backup and learn about the threats facing your data and what happens when things go wrong, how to take risk head on and build an AWS data backup and recovery plan, and the 10 cloud data points you must remember for a winning strategy.

So it turns out that data doesn’t protect itself. And despite providing what might be the most secure and reliable compute platform the Universe has ever seen, Amazon Web Services (AWS) can’t guarantee that you’ll never lose data either. To understand why that is, you’ll need to face your worst nightmares while visualizing all the horrifying things that can go wrong, and then boldly adopt some best‑practice solutions as you map out a plan to protect yourself.

Read this ultimate guide to AWS data backup and learn about the threats facing your data and what happens when things go wrong, how to take risk head on and build an AWS data backup and recovery plan, and the 10 cloud data points you must remember for a winning strategy.

Choose Your Own Cloud Adventure with Veeam and AWS E-Book
Get this interactive Choose Your Own Cloud Adventure E-Book to learn how Veeam and AWS can help you fight ransomware, data sprawl, rising cloud costs, unforeseen data loss and make you a hero!

IDC research shows that the top three trigger events leading to a need for cloud services are: growing data, constrained IT budgets and the rise of digital transformation initiatives. The shift to public cloud providers like AWS offers many advantages for organizations but does not come without risks and vulnerabilities when it comes to data.

Get this interactive Choose Your Own Cloud Adventure E-Book to learn how Veeam and AWS can help you fight ransomware, data sprawl, rising cloud costs, unforeseen data loss and make you a hero!

IGEL and LG Team to Improve the Digital Experience for Kaleida Health
Bringing secure, easy to manage, and high-performance access to cloud workspaces for Kaleida Health’s clinical and back office support teams, IGEL OS and LG’s All-in- One Thin Clients standardize and simplify the on-site and remote desktop experience with Citrix VDI.

Kaleida Health was looking to modernize the digital experience for its clinicians and back office support staff. Aging and inconsistent desktop hardware and evolving Windows OS support requirements were taxing the organization’s internal IT resources. Further, the desire to standardize on Citrix VDI  for both on-site and remote workers meant the healthcare organization needed to identify a new software and hardware solution that would support simple and secure access to cloud workspaces.

The healthcare organization began the process by evaluating all of the major thin client OS vendors, and determined IGEL to be the leader for multiple reasons – it is hardware agnostic, stable and has a small footprint based on Linux OS, and it offers a great management platform, the IGEL UMS, for both on-site users and remote access.

Kaleida Health also selected LG thin client monitors early on because the All-in-One form factor supports both back office teams and more importantly, clinical areas including WoW carts, letting medical professionals securely log in and access information and resources from one, protected data center.

Virtualization Monitoring 101
Written to provide you with virtually everything you need to know about monitoring VMs, container, the cloud, and more. It’s designed to discuss virtualization realities from the age-old debate of on-prem vs. cloud vs. hybrid to newer technology like container orchestration. Whether you are a humble sysadmin, network engineer, or even monitoring specialist, this FREE eBook offers context, perspective, and actionable lessons to help you.

Virtualization Monitoring 101 was written to provide you with virtually everything you need to know about monitoring VMs, container, the cloud, and more.

It’s designed to discuss virtualization realities from the age-old debate of on-prem vs. cloud vs. hybrid to newer technology like container orchestration. Whether you are a humble sysadmin, network engineer, or even monitoring specialist attempting to monitor these things for the first time; or you’re more involved in a focused project including one or more of these technologies, this FREE eBook offers context, perspective, and actionable lessons to help you.

Topics covered include:

  • Inventory in the age of orchestration
  • Moving from on-prem to cloud
  • What matters in different environments
  • The most vivid “franken-duck” explanation of how cloud works ever written
Beyond the Bits: Best Practices for Monitoring Systems and Applications in a Modern Data Center
Our two-week email course, Beyond the Bits, provides a closer look into the philosophy, theory, and fundamental concepts involved in monitoring your infrastructure environment.

Our two-week email course, Beyond the Bits, provides a closer look into the philosophy, theory, and fundamental concepts involved in monitoring your infrastructure environment.

The Fundamentals
Gain access to daily foundational building blocks to help you master the challenges associated with infrastructure monitoring.

Management Principles
Monitoring doesn’t have to be complex and time-consuming. Beyond the Bits provides the sound management principles you need to reduce automation intimidation and monitoring alerts.

Food for Thought
At the end of each chapter, answer thought-provoking questions to tie in what you’re learning with your day-to-day roles and responsibilities.

Kubernetes Data Protection Without Tears
Catalogic Software is a modern data protection company providing innovative backup and recovery solutions including its flagship DPX product, enabling IT organizations to protect, secure and leverage their data. Catalogic’s CloudCasa offers cloud data protection, backup, and disaster recovery as a service for Kubernetes applications and cloud data services.
Catalogic Software is a modern data protection company providing innovative backup and recovery solutions including its flagship DPX product, enabling IT organizations to protect, secure and leverage their data. Catalogic’s CloudCasa offers cloud data protection, backup, and disaster recovery as a service for Kubernetes applications and cloud data services.

Download to learn more about

•    The Need to Protect Kubernetes Infrastructure
•    Why Use Container Cloud Services?
•    Holes in Enterprise Kubernetes Management Software
•    Why SaaS Container Data Protection?
•    Data Protection for Cloud-Native Applications and Infrastructure

RANSOMWARE – How to Protect and Recover Your Data From this Growing Threat
Ransomware is a growing threat to every organization on the planet; it seems we cannot go a day without seeing another high-profile ransomware attack being detailed in mainstream media. Cyber-criminals are innovating at a phenomenal pace in this growing ‘industry’ because they have the funds to do so. In fact many cyber-criminal groups have more funds than most enterprises.

Ransomware is a growing threat to every organization on the planet; it seems we cannot go a day without seeing another high-profile ransomware attack being detailed in mainstream media.

Cyber-criminals are innovating at a phenomenal pace in this growing ‘industry’ because they have the funds to do so. In fact many cyber-criminal groups have more funds than most enterprises.

The disruption these attacks are causing to businesses is huge with billions of dollars’ worth of revenue being lost due to system outages caused via ransomware attacks.

Research has shown that a 41% increase in attacks has occurred since the beginning of 2021 with a staggering 93% increase year over year.

Companies are getting hit via ransomware every day, but how does it get in? Some of the most common ways ransomware is getting in is via the following methods:

1. Phishing emails that launch ransomware attacks via inline links, links in attachments, or fake attachments.
2. Browsing unknown links and websites.
3. Downloading and accidentally running infected software.
4. Inserting or connecting an infected disk, disc, or drive.
5. Operating system based vulnerabilities if the OS is not patched to the latest levels.
6. Plugin based vulnerabilities if plugins are not patched to the latest levels.
7. Infrastructure vulnerabilities (network, storage etc.) if not patched to the latest levels.

How to Get the Most Out of Windows Admin Center, 2nd Edition
Windows Admin Center is one of the most important and powerful tools in a system administrator’s toolbox. But are you harnessing its full potential? In this eBook, Microsoft Cloud and Datacenter Management MVP Eric Siron, explains the optimal configurations and applications that will enable you to squeeze as much value out of this incredible free management tool from Microsoft.
Windows Admin Center is one of the most important and powerful tools in a system administrator’s toolbox. But are you harnessing its full potential?

In this eBook, Microsoft Cloud and Datacenter Management MVP Eric Siron, explains the optimal configurations and applications that will enable you to squeeze as much value out of this incredible free management tool from Microsoft. This free 166-page guide covers:

  • Installation & configuration
  • Getting started
  • Hyper-V management
  • Security
  • Azure & PowerShell connections
  • And more!
This eBook is a second edition covering all the latest updates and features Microsoft has added to the tool since the original publication in 2019. These constant updates clearly demonstrates that Microsoft envisions Windows Admin Center as the essential Windows management tool. So make sure you don’t get left behind – learn everything Windows Admin Center has to offer and how to use it best with this comprehensive guide!
Securing the Hybrid Workplace in 2022 and Beyond
New Survey Finds Companies Are Turning Away from VPN in Favor of Zero Trust Architecture as Hybrid Workplaces Become the New Norm.

When organizations abruptly shifted to remote work during the COVID-19 pandemic, they had to scale their network and security capabilities quickly. That meant snap decisions for many companies, deploying more of what they were already using, likely taking some shortcuts that left optimizing security and user experience for another day. 

A new survey targeting IT decision makers polled more than 8,000 respondents across a range of industries about the security challenges that were uncovered as companies moved to remote work. This report discusses those challenges and how companies are planning to increase security as hybrid work models mature and become the norm.

The Hybrid Future: The changing face of Architecture, Engineering, and Construction
The AEC sector is changing rapidly with technology having a major influence on the way firms design, collaborate and communicate.
Download the paper and learn about:
•    Technology trends in AEC
•    Using the hybrid work model for flexible working and seamless connection with the job site
•    Data centralization in collaborative Building Information Modeling (BIM) workflows and increased demand for high fidelity graphics
•    Teradici CAS and how it can help support distributed, dynamic AEC teams


The SysAdmin's Guide to Azure Infrastructure as a Service
With the shift in the computing paradigm to the cloud, the Azure ecosystem is quickly becoming a critical platform for IT pros to grasp and adopt. But how do you make the leap while maintaining security, manageability, and cost-control? Whether you’re making new VMs directly in the cloud, have VMs in your own datacenter and are looking to migrate to Azure, or you’re looking to manage VMs with cloud-based tools regardless of where they live, The SysAdmin Guide to Azure Infrastructure as a Servic

With the shift in the computing paradigm to the cloud, the Azure ecosystem is quickly becoming a critical platform for IT pros to grasp and adopt. But how do you make the leap while maintaining security, manageability, and cost-control?

Whether you’re making new VMs directly in the cloud, have VMs in your own datacenter and are looking to migrate to Azure, or you’re looking to manage VMs with cloud-based tools regardless of where they live, The SysAdmin Guide to Azure Infrastructure as a Service (Iaas) will teach you to set up and maintain a high-performing Azure IaaS environment.

Written, and now updated, by Paul Schnackenburg, veteran IT consultant and trainer, this free 100+ page guide covers:
•    VM sizing and deployment
•    Migration
•    Storage and networking
•    Security and identity
•    Infrastructure as code
•    Back up and replication
•    Azure Active Directory
•    Azure Arc
•    Automanage
•    and more!

Given the speed of change in the cloud, this eBook covers the why (as well as the how) so that as features and interfaces are updated, you’ll know how to proceed. This second edition also has two new chapters, Automanage (Chapter 11) and Azure Arc (Chapter 12), which have been added to bring a lot of automation and cloud-based management to Azure IaaS, all lessening the burden on your time.

Migrating to the cloud no longer seems a question of if, but when. Make the cloud work for you. Download your free copy today!

VMware Backup For Dummies
Your virtual machines are at the heart of all that your business does, hosting practically any workload. So make sure you have the best recovery methods and data protection strategies in place to ensure maximum business continuity with this FREE E‑book.

Your virtual machines are at the heart of all that your business does, hosting practically any workload. So make sure you have the best recovery methods and data protection strategies in place to ensure maximum business continuity with this FREE E‑book. Here’s what’s covered inside:

  • Explore VMware backup tools and components
  • How to implement VMware backup
  • Understand levels of backup consistency
  • Five tips for better virtual machine backup

GET E-BOOK

8 Keys to Achieving Anywhere Operations
Download this whitepaper today for insights on how to achieve an efficient IT operation model that supports end users no matter where they are. You’ll learn about the eight value-added areas and strategic trends that are the keys to achieving anywhere operations.
Learn how you can:
  • Deliver the user experience on any device and make the process simple for users and IT alike.
  • Lighten the load for your IT team by creating a unified workspace for a simple environment that’s easier and faster to manage.
  • Automate cleanup of end users’ workspaces and synchronize applications with the latest versions, all without disrupting end-user productivity.
  • Enable anywhere operations using your preferred cloud — on-premises, public, or hybrid.

Disaster Recovery Guide
In this guide you will learn about BC/DR planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.

In this guide you will learn about Disaster Recovery planning with Zerto and its impact on business continuity.

In today’s always-on, information-driven business environment, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster – whether natural or man-made – is key to avoiding costly downtime and data loss.

  • The cost and business impact of downtime and data loss can be immense
  • See how to greatly mitigate downtime and data loss with proper DR planning, while achieving RTO’s of minutes and RPO’s of seconds
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by man-made disasters such as software problems and cyber security attacks

Zerto’s DR solutions are applicable for both on-premise and cloud (DRaaS) virtual environments

Having a plan and process in place will help you mitigate the impact of an outage on your business

Download this guide to gain insights into the challenges, needs, strategies, and solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud.

Cyber Attack Survival Guide
Experiencing a cyberattack is no longer a matter of if—it’s a matter of when. Developing a clear ransomware recovery strategy is your best defense.
Our free Cyber Attack Survival Kit lays out the plan of attack needed to have a fighting chance against ransomware. This survival guide features essential information, including:
  • The risks of a cyberattack
  • How customers use Zerto to recover in seconds
  • The key to rapid ransomware recovery and effective data backup
The survival kit also includes a datasheet, a ransomware recovery demo video, a recorded webinar, and a ransomware use case. Without a ransomware response plan, your organization remains vulnerable. Download your Cyber Attack Survival Kit now—it’s free!
The Evolution of Data Protection Cloud Strategies
This latest eBook, The Evolution of Data Protection Cloud Strategies give us an understanding of the current state of cloud data management and protection.

In this day and age, IT organizations are still learning about and adapting their cloud infrastructure. Many enterprises are either accelerating their move to the cloud or adopting cloud-native services and next-generation applications. Despite the benefits, there are still concerns around complexity, security, and management.

To help understand these concerns, Zerto sponsored new ESG research, which delves into these areas. Download the latest eBook, The Evolution of Data Protection Cloud Strategies to get an understanding of the following:

  • The current state of cloud data management and protection
  • An overview of critical concerns and challenges IT organizations will face
  • Backup and disaster recovery best practices for applications running in the cloud
  • Why and how to effectively protect your SaaS application data
Blast Radius Identification and Isolation
Security teams need access to actionable information about everything in the network—where devices are located, how they interact, and all relevant details about their configuration and state. With the Forward Networks blast radius feature, they have the ability to not only isolate devices and cut off paths after an attack, but they can also prevent hosts from being vulnerable to attackers in the first place.

When looking to identify and isolate compromised network hosts, the following questions are important to answer promptly and accurately:

  • What are all the possible paths attackers can take from the compromised host?
  • What ports can they access?
  • What objects are along these paths, and what do those devices touch?
  • Is it possible for the attackers to move laterally in the network to reach critical systems or exfiltrate data to the internet?
The Forward Enterprise blast radius feature allows security operations professionals to answer those questions with one click. They can get detailed information about a compromised host, all the other devices reachable by that compromised host, and all possible traffic flows.

Once the exposure is identified, isolating the devices is a much simpler and faster process. Read the use case for more details, including an example of how the blast radius feature can locate the host device and document in seconds every destination, protocol, and L4 port it could possibly reach.

The ROI of a Network Digital Twin
The majority of network outages cost at least $1 million in operation disruption, reputational damage, and data and financial loss. Troubleshooting and path searches are frustratingly manual, time-consuming processes. With Forward Networks’ digital twin software, such processes can be completed in seconds with actionable information in a vendor-agnostic format immediately accessible. With reduced time needed to troubleshoot costly outages, Forward’s network digital twin provides a clear and robu
How have large enterprises benefited from deploying digital twin software for their complex networks?
By reducing:
  • MTTR by 80% using Forward Networks search functionality
  • 90% of P1/P2 outages
  • Time to deploy new applications from 24 hours to one hour
  • Audit time by 80%
  • Fire-fighting by senior network engineers
Which, in turn, increases:
  • Companies’ ability to reach growth and revenue targets
  • Network security by proactively removing thousands of vulnerabilities
  • Time spent by senior network engineers focusing on projects that deliver business value
Explore the eBook for more details on how managing networks with a digital twin makes networks more agile, predictable, and secure.
The Liquit Guide to AVD
In three easy steps to an easy and successful implementation.
In this guide, we describe Liquit’s approach and recommendations to deploying your AVD environment. Just follow the three easy to follow steps.
See It, Fix It, Manage It: Ensuring Hybrid and Multi-cloud Applications Are Reliable and Secure
Most enterprises are moving to hybrid or multi-cloud architectures. Operating these environments requires IT teams to rethink their approach to monitoring and reporting on applications and environments. Cloud services differ in functions which makes achieving and maintaining a consistent configuration difficult but not impossible. A significant portion of companies plan to utilize third-party products, reducing some of the variability in feature capabilities across clouds to simplify management.

The author of this Pathfinder report is Mike Fratto, a Senior Research Analyst on the Applied Infrastructure & DevOps team at 451 Research, a part of S&P Global Market Intelligence. Pathfinder reports navigate decision-makers through the issues surrounding a specific technology or business case, explore the business value of adoption, and recommend the range of considerations and concrete next steps in the decision-making process.

This report explores the following topics:

  • the growth of already commonplace cloud usage for mission-critical applications
  • the importance of cloud governance
  • the top cloud security concerns for enterprises
  • the adoption of third-party tools for cloud management
  • the steps IT teams should take to make their cloud environments more secure and reliable
Solving the BIG problems in cloud computing
The two big challenges in deploying and growing cloud usage are cost and security. Shadow IT has contributed to those challenges by causing overspending and exposing organizations to significant security risks. So, how should enterprises address both hybrid (on-premises and in the cloud) and multi-cloud challenges? This research reviews new technologies and approaches that can improve visibility for IT teams, enable security policies across the entire network, and manage costs more effectively.

Vladimir Galabov, Director, Cloud and Data Center Research, and Rik Turner, Principal Analyst, Emerging Technologies, are the co-authors of this eBook from Omdia, a data, research, and consulting business that offers expert analysis and strategic insight to empower decision-making surrounding new technologies.

This eBook covers the following topics:

  • the current landscape of cloud computing, including the BIG problems
  • the advantages of using a multi-cloud approach
  • the dangers of shadow IT, including billing surprises and security breaches
  • the move of mission-critical applications to the cloud
  • the considerations regarding cloud security, including recommendations for IT teams
Cyber Threat Report 2021/22
Email is still the most popular way of communicating for companies. However, not all emails that land in employee inboxes, are wanted. Our Security Lab’s threat researchers analyzed email traffic and found that 40% of all emails received by Hornetsecurity were classified as unwanted by the internal filtering systems, and therefore contained potential threats to the company. But what threats were in those unwanted emails? What are the risks posed by new types of malware and deceptive approaches
Chapter 1: Cybercrime ranks among the greatest threats globally
Chapter 2: Email Threat Review 2021 from the Security Lab
Chapter 3: The “Threat-Highlights”
Chapter 4: Forecasts and possible evolutions of cybercrime
The Total Economic Impact of ControlUp
ControlUp commissioned Forrester to conduct a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying the ControlUp digital employee experience (DEX) management platform.
The purpose of this study is to provide readers with a framework to evaluate the potential economic impact of ControlUp on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed an organization with experience using ControlUp. Forrester used this experience to project a three-year financial analysis.

The customer did a brief proof of concept with ControlUp. Not only did the customer identify issues while using ControlUp that it hadn’t identified with its previous solution, it learned the benefit of utilizing a software-as-a-service (SaaS) solution that could be quickly installed and used. Learn how a ControlUp customer achieved benefits of more than $3.4 million to:
  • Optimize resources across their EUC environment
  • Save on labor costs for Help Desk and EUC Administrators
  • Eliminate software licensing and services
Unmasking the Top 5 End-User Computing (EUC) Challenges
The work-from-anywhere world is upon us. To support the distributed workforce, organizations have deployed virtual applications and desktops, but still struggle to make the digital employee experience as good or better than the office experience. ControlUp surveyed over 450 end-user computing administrators and asked them about their most challenging problems in supporting remote work.
Today, millions of people across the globe are now working remotely. Though COVID-19 will soon be but a memory, this “work-from-anywhere” trend is here to stay. To support the distributed workforce, organizations have deployed virtual applications and desktops, but still struggle to make the employee experience as good or better than their experience in the office.

ControlUp surveyed over 450 end-user computing administrators and asked them about their most challenging problems in supporting remote work. From slow logons, application performance issues, network latency, unified communications issues, to slow sessions, this paper explains the top five survey findings and explores the ways ControlUp helps mitigate these problems.
Digital Employee Experience Management: Delivering a friction-free experience
Managing a distributed workforce presents challenges for IT. Apps break, endpoint devices freeze, video calls lag, Wi-Fi quits, people get frustrated. IT teams are struggling to keep up with remote-work demands and are held back by outdated, technology-centric tools designed for a time when everyone worked in one place. DEX management tools ensure a digital employee experience with fewer headaches, lower costs, and higher productivity.
Employers have long dictated where and how people get their jobs done. But today, millions of people demand remote work options because they know they are more productive when they can work where, when, and how they want. For businesses, flexible workstyles lead to more opportunities to attract and keep the best talent from around the world. It is for these reasons that the digital employee experience matters.

Managing a distributed workforce presents challenges for IT. Apps break, endpoint devices freeze, video calls lag, Wi-Fi quits, people get frustrated. IT teams are struggling to keep up with demands and are held back by outdated, technology-centric tools designed for a time when everyone worked in the same place. The work-from-anywhere world requires employee-centric tools that are designed to deliver a friction-free remote work experience.

DEX management tools ensure a digital employee experience with fewer headaches, lower costs, higher productivity, and happier people who have the freedom and ability to be their best at work and in life. DEX is now a business imperative that is purpose-driven to fulfill the needs of employees, while also giving the business the tools they need to attract and retain top talent.
Microsoft 365 Security Checklist
It's in the cloud so Microsoft secures your data – right? Well, not exactly. Proper security is tailored to an infrastructure's unique requirements and responds to a constantly evolving attack and threat landscape. You can't just rely on Microsoft default settings. You need to do more than just 'set it and forget'. The Microsoft 365 Security Checklist shows you all the security settings and configurations you need to know for each M365 license to properly secure your environment.

It's in the cloud so Microsoft secures your data – right? Well, not exactly. Proper security is tailored to an infrastructure's unique requirements and responds to a constantly evolving attack and threat landscape. You can't just rely on Microsoft default settings. You need to do more than just 'set it and forget'.

The Microsoft 365 Security Checklist shows you all the security settings and configurations you need to know for each M365 license to properly secure your environment. Written by veteran IT consultant and trainer Paul Schnackenburg, this free 100+ page eBook covers:

•    Identity
•    Email
•    Teams
•    Applications
•    Endpoint Manager
•    Information Protection
•    Secure Score
•    Business Premium and Microsoft 365 E3 / E5
•    And more.

The guide contains full explanations of all the important security parameters, the step-by-step processes of how to access, how to optimally configure them, and a full checklist to ensure you don't miss anything!

Depending on what your business is and what sector you operate, there might a minimum requirement of what should be in place to satisfy insurance policies, global data laws or general compliance. So, make sure you take the time to figure out what your business needs to be compliant and protected.

Secure your data and business, work through the checklist today.

2022 Data Protection Trends
The largest data protection industry report from 3,000+ IT leaders.
3,000+ business and IT leaders were surveyed on their IT and data protection strategies, including their plans for 2022. Learn more.
Network Element Virtualization (NEV)
The Network Element Virtualization (NEV) technology from Algoblu enables carriers to virtualize and fine-grain management of their underlying network resources, providing products and services with end-to-end service quality assurance for the individual needs of users. Carriers can provide multi-tiered application-oriented networking services and create new revenue streams over existing network infrastructures.
The Network Element Virtualization (NEV) technology from Algoblu enables carriers to virtualize and fine-grain management of their underlying network resources, providing products and services with end-to-end service quality assurance for the individual needs of users. Carriers can provide multi-tiered application-oriented networking services and create new revenue streams over existing network infrastructures.

Within this document, we describe NEV, explaining how NEV fits within the OSI network layer and how NEV’s current implementation as a programmable Multi-Processor System-on-Chip (MPSoC) further increases performance and reduces costs over classical software-only SD-WAN white-box systems.

NEV is ideal for IoT, cloud games, VR/AR broadcasting, and metaverse applications, which have higher requirements for low-latency technology. It is a shortcut to enable carriers to provide multi-tier services to meet users’ personalized requirements with guaranteed SLA and without changing the existing network infrastructure.
Recently Added White Papers
The SysAdmin DOJO Podcast
Our goal is simple. We talk with industry experts to provide you with actionable real-world knowledge that will equip you to become the IT black belt within your organization. From virtualization and automation to Microsoft 365 and security and lots more, tune in fortnightly for your dose of the SysAdmin DOJO Podcast.
Our goal is simple. We talk with industry experts to provide you with actionable real-world knowledge that will equip you to become the IT black belt within your organization. From virtualization and automation to Microsoft 365 and security and lots more, tune in fortnightly for your dose of the SysAdmin DOJO Podcast.
Key Criteria for Evaluating Data Protection for Kubernetes
Using the findings from the “Key Criteria for Evaluating Kubernetes Data Protection,” this new GigaOm report evaluates CloudCasa, a Kubernetes backup SaaS offering. CloudCasa is a Kubernetes native service with a friendly licensing model that significantly eases the initial testing and adoption of Kubernetes backup and cloud database backup. The straightforward user interface and integration helps simplify backup, migration and recovery operations while improving the return on investment.

Kubernetes is the de-facto standard for container orchestration, and it’s being used by born-in-the-cloud startups and cloud-native enterprises alike. In 2021, Kubernetes was in production on-premises, in the cloud, and even at the edge for many different types of applications, including those that Kubernetes wasn’t initially built for.

Kubernetes was never really built for stateful applications and, by default, lacks features for data protection. However, we see many organizations building and running their stateful applications on top of Kubernetes, indicating there’s a gap in functionality between what Kubernetes offers and what the (enterprise) market wants.

Unfortunately, existing data protection tools, mostly built for legacy technologies such as virtual machines, do not fit well into the container paradigm. Vendors are adapting existing solutions or creating new products from scratch that are often better aligned with the cloud-native and container paradigms.

The market for cloud-native data protection is growing rapidly, with both incumbent vendors and challengers competing for completeness of features, and differences can be observed between those targeting more traditional infrastructure alignment and those aimed at fully cloud-native environments.

In any case, we see a growing need for flexible, adaptive solutions that can meet the changing requirements of their customers. Multi-platform, multi-cloud, multi-environment (including edge), multi-team, and self-service capabilities are quickly becoming differentiating features that ensure successful adoption, not for just one use case but for continuously changing use cases across the entire enterprise.

CloudCasa is the perfect example of this type of modern solution that can adapt quickly to changing business and technical needs. Designed to be Kubernetes native, it is a SaaS offering with a friendly licensing model that significantly eases the initial testing and adoption of the solution.

Maximizing Monitoring With Automation
Since the 2015 merger, various teams within the now combined Springer Nature IT department—such as the network, SysAdmin, and infrastructure teams—from different countries and with different backgrounds, methodologies, and vendors—had to collaborate and consolidate. Learn how Springer Nature’s embracement of technology and customization allowed them to employ ways to work smarter, not harder—or more costly—to support various IT teams across the organization.

Since the 2015 merger, various teams within the now combined Springer Nature IT department—such as the network, SysAdmin, and infrastructure teams—from different countries and with different backgrounds, methodologies, and vendors—had to collaborate and consolidate.

Springer Nature was already using SolarWinds® solutions upon Senior Systems Monitoring Analyst Dave Morris’s arrival at the company. He recalls, “It was a smaller SolarWinds environment then, and we’ve since grown it. After the merger, many other legacy products were very niche, and we couldn’t justify the cost of maintaining them as they were no longer suitable for the needs of the company and team. We decided to focus on SolarWinds, and because we utilize so many SolarWinds modules and we keep growing it as we go, the environment—and the benefit we receive from SolarWinds—continues to build.”

Though the Springer Nature IT infrastructure is now immense, it’s managed by a team of two: Morris and Software Engineer Consultant Liam Miller. Together, they comprise the global systems monitoring team for the entire Springer Nature business. As proponents for SolarWinds and in introducing SolarWinds products to the internal IT teams, it has been a process of building a team’s confidence in what the solutions could deliver as they get used to newer ways of working and scalability.

Ransomware-Mitigating the Threat of Cyber Security Attacks
Learn how to mitigate the risk of ransomware with Zerto Virtual Replication. Recover to seconds before and attack and never pay ransom for your data!

Recently, we have witnessed the increasing trend of hackers attempting to extort money from both private users, and more recently businesses, via the proliferation of various Ransomware Trojans such as CryptoLocker.

These malicious pieces of software are designed to gain access to and encrypt data and files by generating a private-public pair of keys. The data is impossible to decrypt without the private key which is usually stored on the attacker’s server until the ransom is paid.

Sometimes you just have to accept that prevention isn’t always possible, but mitigating the threat certainly is. With Zerto, systems are protected with Continuous Data Protection in the form of incremental block-level replication, which combined with the journal, Virtual Protection Groups give you the abilities to recover from ransomware attacks.

Download this data sheet for more details about how Zerto helps you remove the fear of ransomware.

Digital Transformation in Education
The digital transformation is going at breakneck speed, including in education. It is very important for educational institutions that IT facilities meet the needs of teachers and students, but innovations must not be at the expense of the IT department’s workload. This whitepaper outlines the most important developments and discusses the possibilities offered by Liquit to meet the needs of education.

In this whitepaper you will discover:

  • The varying technology needs in the education sector and how achieving simplicity in these technologies is the common denominator.
  • The transformation that a modern digital workspace can bring to teaching and learning.
  • How a smart digital workspace can facilitate education by using the best available technology and processes.
  • Automate cleanup of end users’ workspaces and synchronize applications with the latest versions, all without disrupting end-user productivity.
Have It Your Way: Access Your Mac from Anywhere
Learn how Teradici CAS enables secure, remote Mac access from any device, anywhere.

Does your organization leverage applications designed specifically for macOS systems? Do your employees prefer macOS over Windows or Linux desktops? Do you have Macs in the office that are too expensive to ship home for remote work and are you worried about the security of content stored on them?

Learn how Teradici CAS for Mac users enable seamless remote desktops with the best resolution, sound, and color fidelity to create and work from anywhere.

Liqid Launches the Industry’s Fastest, No-Compromise, One-Socket Servers, powered by Dell
Liqid has collaborated with Dell Technologies OEM | Embedded & Edge Solutions to design a solution delivering the fastest single socket storage solution on the market today. Liqid’s composable Gen4 fabric technology deployed with the AMD EPYC 7002 Series, and designed on the Dell EMC PowerEdge R7515 Rack Server delivers the ideal architecture for next-generation, AI-driven, and HPC application environments.
Liqid has collaborated with Dell Technologies OEM | Embedded & Edge Solutions to design a solution delivering the fastest single socket storage solution on the market today. Liqid’s composable Gen4 fabric technology deployed with the AMD EPYC 7002 Series, and designed on the Dell EMC PowerEdge R7515 Rack Server delivers the ideal architecture for next-generation, AI-driven, and HPC application environments.
Survey Report: Remote Media Workflows for Broadcasters
Survey finds widespread adoption of working offsite that looks to continue post COVID-19. TV Tech magazine early this year undertook a survey to examine remote workflow adoption and usage patterns among television broadcasters and other media organizations. The survey was conducted in partnership with Teradici and fielded between Feb. 1 and March 5, 2021—roughly one year after the World Health Organization declared the COVID-19 outbreak to be a worldwide pandemic.
Overall, the survey found prevalent adoption of remote workflows among broadcasters since the pandemic was declared. A total of 88% of all respondents said their organizations had deployed some form of remote workflow in response to COVID-19. That trend was even more pronounced among TV broadcasting and cable TV network respondents (referred to throughout the rest of this report as “broadcast and cable TV respondents,”) with 93% saying the pandemic prompted adoption of remote workflows.

More broadly, the survey revealed COVID-19 had a major disruptive effect on long-established media workflows. While the primary reason to shift from working at the studio or headquarters was to protect staff from potential virus exposure, the survey revealed several other reasons broadcast and cable TV respondents said their organizations adopted a remote work strategy,
including work schedule flexibility and promoting higher productivity and job satisfaction.
How PCoIP Technology Saves Broadcasters Time and Money (While Boosting Cybersecurity)
Bring broadcast production into the 21st century with this whitepaper.Discover how to leverage PCoIP technology to help broadcasters move from physical production facilities to virtualized broadcast production/playout systems.

The traditional KVM model is a thing of the past, especially in these times of COVID-19 and remote work. In this whitepaper, we're introducing a post-KVM model that keeps data ultra-secure, and reduces bandwidth, allowing more remote users to connect to a broadcaster's studio.

Download this whitepaper and learn how PCoIP Technology can:

  • Meet specialized high performance computing needs
  • Enable bandwidth-efficient collaboration without delays of large file transfer
  • Help broadcasters move from physical production facilities to virtualized broadcast
CloudCasa - Kubernetes and Cloud Database Protection as a Service
CloudCasa™ was built to address data protection for Kubernetes and cloud native infrastructure, and to bridge the data management and protection gap between DevOps and IT Operations. CloudCasa is a simple, scalable and cloud-native BaaS solution built using Kubernetes for protecting Kubernetes and cloud databases. CloudCasa removes the complexity of managing traditional backup infrastructure, and it provides the same level of application-consistent data protection and disaster recovery that IT O

CloudCasa supports all major Kubernetes managed cloud services and distributions, provided they are based on Kubernetes 1.13 or above. Supported cloud services include Amazon EKS, DigitalOcean, Google GKE, IBM Cloud Kubernetes Service, and Microsoft AKS. Supported Kubernetes distributions include Kubernetes.io, Red Hat OpenShift, SUSE Rancher, and VMware Tanzu Kubernetes Grid. Multiple worker node architectures are supported, including x86-64, ARM, and S390x.

With CloudCasa, managing data protection in complex hybrid cloud or multi-cloud environments is as easy as managing it for a single cluster. Just add your multiple clusters and cloud databases to CloudCasa, and you can manage backups across them using common policies, schedules, and retention times. And you can see and manage all your backups in a single easy-to-use GUI.

Top 10 Reasons for Using CloudCasa:

  1. Backup as a service
  2. Intuitive UI
  3. Multi-Cluster Management
  4. Cloud database protection
  5. Free Backup Storage
  6. Secure Backups
  7. Account Compromise Protection
  8. Cloud Provider Outage Protection
  9. Centralized Catalog and Reporting
  10. Backups are Monitored

With CloudCasa, we have your back based on Catalogic Software’s many years of experience in enterprise data protection and disaster recovery. Our goal is to do all the hard work for you to backup and protect your multi-cloud, multi-cluster, cloud native databases and applications so you can realize the operational efficiency and speed of development advantages of containers and cloud native applications.

The Accelerated Change of Digital Workspaces
Overcoming Digital Workspace Challenges Software vendors are delivering changes to Operating Systems and Applications faster than ever. Agile development is driving smaller (but still significant), more frequent changes. Digital Workspace managers in the Enterprise are being bombarded with increased demand. With this in mind, Login VSI looks at the issues and solutions to the challenges Digital Workspace management will be presented with – today and tomorrow.
Normal 0 false false false EN-US X-NONE X-NONE

Overcoming Digital Workspace Challenges

Software vendors are delivering changes to Operating Systems and Applications faster than ever. Agile development is driving smaller (but still significant), more frequent changes. Digital Workspace managers in the Enterprise are being bombarded with increased demand.

With this in mind, Login VSI looks at the issues and solutions to the challenges Digital Workspace management will be presented with – today and tomorrow.

The rate of changes for the OS and Applications keeps increasing. It seems like there are updates every day, and keeping up with those updates is a daunting task.

Digital workspace managers need the ways and means to keep up with all the changes AND reduce the risk that all these updates represent for the applications themselves, the infrastructure they live on, and most importantly, for the users that rely on Digital Workspaces to do their job effectively and efficiently.

Application Lifecycle Management with Stratusphere UX
This whitepaper defines three major lifecycle stages—analysis, user experience baselining and operationalization―each of which is composed of several crucial steps. The paper also provides practical use examples that will help you create and execute an application-lifecycle methodology using Stratusphere UX from Liquidware.
Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users have come to expect applications to ‘just work’ on whatever device they have on hand. Combined with the notion that for many organizations, workspaces can be a mix of various delivery approaches, it is vital. to better understand application use, as well as information such as versioning, resource consumption and application user experience. This whitepaper defines three major lifecycle stages—analysis, user experience baselining and operationalization―each of which is composed of several crucial steps. The paper also provides practical use examples that will help you create and execute an application-lifecycle methodology using Stratusphere UX from Liquidware.
Optimising Performance for Office 365 and Large Profiles with ProfileUnity ProfileDisk
This whitepaper has been authored by experts at Liquidware Labs in order to provide guidance to adopters of desktop virtualization technologies. In this paper, two types of profile management with ProfileUnity are outlined: (1) ProfileDisk and (2) Profile Portability. This paper covers best practice recommendations for each technology and when they can be used together. ProfileUnity is the only full featured UEM solution on the market to feature an embedded ProfileDisk technology and the advanta

Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them.

Note that additional profile challenges and solutions are covered in a related ProfileUnity whitepaper entitled “User Profile and Environment Management with ProfileUnity.” To efficiently manage the complex challenges of today’s diverse Windows profile environments, Liquidware ProfileUnity exclusively features two user profile technologies that can be used together or separately depending on the use case. These include:

1. ProfileDisk™, a virtual disk based profile that delivers the entire profile as a layer from an attached user VHD or VMDK, and

2. Profile Portability, a file and registry based profile solution that restores files at login, post login, or based on environment triggers.

Spotcheck Inspection with Stratusphere UX
This whitepaper defines an inspection technique―and the necessary broad-stroke steps to perform a limited health check of an existing platform or architecture. The paper defines and provides a practical-use example that will help you to execute a SpotCheck inspection using Liquidware’s Stratusphere UX.
The ability to meet user expectations and deliver the appropriate user-experience in a shared host and storage infrastructure can be a complex and challenging task. Further, the variability in deployment (settings and overall supportive infrastructure) on platforms such as VMware View and Citrix XenApp and XenDesktop make these architectures complex and difficult to troubleshoot and optimize. This whitepaper defines an inspection technique―and the necessary broad-stroke steps to perform a limited health check of an existing platform or architecture. The paper defines and provides a practical-use example that will help you to execute a SpotCheck inspection using Liquidware’s Stratusphere UX.
Process Optimization with Stratusphere UX
This whitepaper explores the developments of the past decade that have prompted the need for Stratusphere UX Process Optimization. We also cover how this feature works and the advantages it provides, including specific capital and operating cost benefits.

Managing the performance of Windows-based workloads can be a challenge. Whether physical PCs or virtual desktops, the effort required to maintain, tune and optimize workspaces is endless. Operating system and application revisions, user installed applications, security and bug patches, BIOS and driver updates, spyware, multi-user operating systems supply a continual flow of change that can disrupt expected performance. When you add in the complexities introduced by virtual desktops and cloud architectures, you have added another infinite source of performance instability. Keeping up with this churn, as well as meeting users’ zero tolerance for failures, are chief worries for administrators.

To help address the need for uniform performance and optimization in light of constant change, Liquidware introduced the Process Optimization feature in its Stratusphere UX solution. This feature can be set to automatically optimize CPU and Memory, even as system demands fluctuate. Process Optimization can keep “bad actor” applications or runaway processes from crippling the performance of users’ workspaces by prioritizing resources for those being actively used over not used or background processes. The Process Optimization feature requires no additional infrastructure. It is a simple, zero-impact feature that is included with Stratusphere UX. It can be turned on for single machines, or groups, or globally. Launched with the check of a box, you can select from pre-built profiles that operate automatically. Or administrators can manually specify the processes they need to raise, lower or terminate, if that task becomes required. This feature is a major benefit in hybrid multi-platform environments that include physical, pool or image-based virtual and cloud workspaces, which are much more complex than single-delivery systems. The Process Optimization feature was designed with security and reliability in mind. By default, this feature employs a “do no harm” provision affecting normal and lower process priorities, and a relaxed policy. No processes are forced by default when access is denied by the system, ensuring that the system remains stable and in line with requirements.

Return on Investment (ROI) with Liquidware Adaptive Workspace Management
This paper’s purpose is to inform all desktop management stakeholders at your organization of the quick return on investment (ROI) that your organization can realize when spearheading desktop change and ongoing management with Liquidware solutions. This paper should be considered a companion to Liquidware’s Adaptive Workspace Management ROI calculator.

Today’s rapidly evolving desktop environments demand constant updates and changes to keep them secure, users productive, and businesses competitive. Liquidware’s Adaptive Workspace Management suite covers all phases of desktop changes and management to keep desktop transformations seamless.

Ever-changing business climates have seen budgets continually scrutinized to keep businesses competitive. This paper’s purpose is to inform all desktop management stakeholders at your organization of the quick return on investment (ROI) that your organization can realize when spearheading desktop change and ongoing management with Liquidware solutions. This paper should be considered a companion to Liquidware’s Adaptive Workspace Management ROI calculator.

Make the Move: Linux Desktops with Cloud Access Software
Gone are the days where hosting Linux desktops on-premises is the only way to ensure uncompromised customization, choice and control. You can host Linux desktops & applications remotely and visualize them to further security, flexibility and performance. Learn why IT teams are virtualizing Linux.

Make the Move: Linux Remote Desktops Made Easy

Securely run Linux applications and desktops from the cloud or your data center.

Download this guide and learn...

  • Why organizations are virtualizing Linux desktops & applications
  • How different industries are leveraging remote Linux desktops & applications
  • What your organization can do to begin this journey


Composable Infrastructure Checklist
Composable Infrastructure offers an optimal method to generate speed, agility, and efficiency in data centers. But how do you prepare to implement the solution? Here’s a checklist of items you might consider when preparing to install and deploy your composable infrastructure solution.
Composable Infrastructure offers an optimal method to generate speed, agility, and efficiency in data centers. But how do you prepare to implement the solution? This composable Infrastructure checklist will help guide you on your journey toward researching and implementing a composable infrastructure solution as you seek to modernize your data center.

In this checklist, you’ll see how to:
  • Understand Business Goals
  • Take Inventory
  • Research
  • And more!
Download this entire checklist to review items you might consider when preparing to install and deploy your composable infrastructure solution.
UD Pocket Saves the Day After Malware Cripple’s Hospital’s Mission-Critical PCs
IGEL Platinum Partner A2U had endpoints within the healthcare organization’s finance department up and running within a few hours following the potentially crippling cyberattack, thanks to the innovative micro thin client.

A2U, an IGEL Platinum Partner, recently experienced a situation where one of its large, regional healthcare clients was hit by a cyberattack. “Essentially, malware entered the client’s network via a computer and began replicating like wildfire,” recalls A2U Vice President of Sales, Robert Hammond.

During the cyberattack, a few hundred of the hospital’s PCs were affected. Among those were 30 endpoints within the finance department that the healthcare organization deemed mission critical due to the volume of daily transactions between patients, insurance companies, and state and county agencies for services rendered. “It was very painful from a business standpoint not to be able to conduct billing and receiving, not to mention payroll,” said Hammond.

Prior to this particular incident, A2U had received demo units of the IGEL UD Pocket, a revolutionary micro thin client that can transform x86-compatible PCs and laptops into IGEL OS-powered desktops.

“We had been having a discussion with this client about re-imaging their PCs, but their primary concern was maintaining the integrity of the data that was already on the hardware,” continued Hammond. “HIPAA and other regulations meant that they needed to preserve the data and keep it secure, and we thought that the IGEL UD Pocket could be the answer to this problem. We didn’t see why it wouldn’t work, but we needed to test our theory.”

When the malware attack hit, that opportunity came sooner, rather than later for A2U. “We plugged the UD Pocket into one of the affected machines and were able to bypass the local hard drive, installing the Linux-based IGEL OS on the system without impacting existing data,” said Hammond. “It was like we had created a ‘Linux bubble’ that protected the machine, yet created an environment that allowed end users to quickly return to productivity.”

Working with the hospital’s IT team, it only took a few hours for A2U to get the entire finance department back online. “They were able to start billing the very next day,” added Hammond.

Understanding Windows Server Cluster Quorum Options
This white paper discusses the key concepts you need to configure a failover clustering environment to protect SQL Server in the cloud.
This white paper discusses the key concepts you need to configure a failover clustering environment to protect SQL Server in the cloud. Understand the options for configuring the cluster Quorum to meet your specific needs. Learn the benefits and key takeaways for providing high availability for SQL Server in a public cloud (AWS, Azure, Google) environment.