Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 11 of 11 white papers, page 1 of 1.
High Availability Clusters in VMware vSphere without Sacrificing Features or Flexibility
This paper explains the challenges of moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Many large enterprises are moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources.

Realizing these benefits with business critical applications, such as SQL Server or SAP can pose several challenges. Because these applications need high availability and disaster recovery protection, the move to a virtual environment can mean adding cost and complexity and limiting the use of important VMware features. This paper explains these challenges and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Unmasking the Top 5 End-User Computing (EUC) Challenges
The work-from-anywhere world is upon us. To support the distributed workforce, organizations have deployed virtual applications and desktops, but still struggle to make the digital employee experience as good or better than the office experience. ControlUp surveyed over 450 end-user computing administrators and asked them about their most challenging problems in supporting remote work.
Today, millions of people across the globe are now working remotely. Though COVID-19 will soon be but a memory, this “work-from-anywhere” trend is here to stay. To support the distributed workforce, organizations have deployed virtual applications and desktops, but still struggle to make the employee experience as good or better than their experience in the office.

ControlUp surveyed over 450 end-user computing administrators and asked them about their most challenging problems in supporting remote work. From slow logons, application performance issues, network latency, unified communications issues, to slow sessions, this paper explains the top five survey findings and explores the ways ControlUp helps mitigate these problems.
Ten Topics to Discuss with your Cloud Provider
Find the “just right” cloud for your business. For this white paper, we will focus on existing applications (vs. new application services) that require high levels of performance and security, but that also enable customers to meet specific cost expectations.
There are hundreds, if not thousands, of cloud services available to organizations. In many cases, the capabilities of the service, adjusted for cost, matter more to decision makers than the infrastructure itself. As an example, the underlying infrastructure that supports common business software such as Salesforce, Microsoft Office 365, is rarely scrutinized, as the products are trusted solely on the brand’s reputation.

Choosing the right cloud service for your organization, or for your target customer if you are a managed service provider, can be time consuming and effort intensive. For this paper, we will focus on existing applications (vs. new application services) that require high levels of performance and security, but that also enable customers to meet specific cost expectations. Topics covered include:
•    Global access and availability
•    Cloud management
•    Application performance
•    Security and compliance

Making M&A Integration Faster, Cheaper and More Successful with Liquit
Download this eBook today for practical insights on how Liquit can free valuable time for IT teams during and after the M&A process. You’ll learn how Liquit makes it easy for IT to deliver anywhere, any device, any group application access with user context. This ensures faster collaboration and productivity while freeing IT to tackle bigger IT integration projects.

You will also discover how you can:

Quickly Create adaptive and customized M&A workspace

IT teams can quickly set up a branded Liquit Workspace integrated with existing workspaces for a single user interface on the front end while enabling fast individual and group user customization via the back end. This enables you to meet changing user application and platform needs during and after M&A.

Quickly adapt to application user needs

Take application provisioning, updating, and versioning from hours to minutes for hundreds of users, along with access to thousands of curated applications to deliver merging workforce productivity. 

Unify application access provisioning

Eliminate the nightmare of access provisioning across varied on-premises and cloud environments for thousands of users in minutes rather than hours without uprooting native SSO and IAM that are constantly in flux during and after M&A.

Dramatically reduce cost and time expenditures

Eliminate collaboration and communication bottlenecks across on-premises, VDI platforms and clouds while freeing IT time for bigger M&A integration projects and lowering licensing and IT costs.

Developing a Comprehensive Windows Application Strategy with Liquidware Essentials
Organizations running today’s modern Windows desktop/workspace environments, face challenges in dynamically delivering applications while minimizing base image management. Liquidware offers a comprehensive approach to help companies navigate each integral phase of a Windows Application Strategy. This whitepaper discusses the challenges of delivering applications in physical or cloud-based Windows workspaces and explores an “Assess, Prepare, Deploy” application strategy methodology.

Organizations running today’s modern Windows desktop/workspace environments, face challenges in dynamically delivering  applications while minimizing base image management.

Liquidware, with its solutions and expertise, offers a comprehensive approach to help companies navigate each integral phase of a Windows Application Strategy. This whitepaper discusses the challenges of delivering applications in physical or cloud-based Windows workspaces and explores an “Assess, Prepare, Deploy” application strategy methodology.

Step-by-Step: Configuring Amazon EC2 for Business-Critical Applications
In this eBook, the author describes in great detail what is needed to prepare the EC2 infrastructure to support business-critical applications clustered with Windows Server Failover Clustering (WSFC).
AWS guarantees that if two or more instances are deployed in different availability zones (AZs), at least one of those instances will have external connectivity. The SLA does not guarantee that the application running inside the instance will be available. To address availability of the application, users will need to take additional steps to monitor the application and recover it should a failure occur.

In this eBook, the author describes in great detail what is needed to prepare the EC2 infrastructure to support business-critical applications clustered with Windows Server Failover Clustering (WSFC). In order to qualify for the 99.99 percent availability, instances must be deployed across multiple AZs. Readers will learn how to design EC2 infrastructure to support cross-AZ failover clustering.
VMware DEM and App Volumes Overview Comparison with ProfileUnity & FlexApp
This guide has been authored by experts at Liquidware in order to provide information and guidance regarding some of the frequently asked questions customers encounter while exploring the FlexApp™ Layering technology.
This guide has been authored by experts at Liquidware in order to provide information and guidance regarding some of the frequently asked questions customers encounter while exploring the FlexApp™ Layering technology. FlexApp Application Layering is an integrated part of ProfileUnity that enables applications to be virtualized in such an innate way that they look native to the Windows operating system (OS) and other applications. FlexApp is a perfect complement to ProfileUnity, which provides full user environment management (UEM) with advanced features such as Application Rights Management and context-aware settings for printer and policy management. Although FlexApp is cost effectively licensed with ProfileUnity™, the solution can be licensed separately if your organization has already standardized on an alternative User Environment Management solution. Application Layering leads to much higher rates of compatibility than previous technologies which used Application Isolation to virtualize applications. Once applications have been packaged for layering, they are containerized on virtual hard disks (VHDXs) or virtual machine disks (VMDKs). They can be centrally assigned to users on a machine-level or context-aware basis. FlexApp applications are compatible with virtual, physical and multi-session Windows® environments such as VMware® Horizon View, Citrix® Virtual Apps and Desktops and Microsoft® AVD. This whitepaper provides an overview of FlexApp concepts and ways in which FlexApp can serve as a cornerstone in an application delivery strategy. FlexApp greatly reduces desktop administration overhead by dramatically reducing the need for traditional software distribution and through a reduction in the number of base images needed to support users. FlexApp is a powerful ally of VDI users and administrators. This paper compares Liquidware solutions to VMware App Volumes version 4 and its current updates through the last revision of this document.
GigaOm Radar for Cloud Observability 2024
Cloud observability is the process of gaining comprehensive insights into the performance, health, and state of cloud-based applications and infrastructure through monitoring, metrics, tracing, logging, and other telemetry data. It enables organizations to proactively detect, understand, and resolve issues to ensure optimal application performance and user experience.
This GigaOm Radar report examines 21 of the top cloud observability solutions and compares offerings against the capabilities (table stakes, key features, and emerging features) and nonfunctional requirements (business criteria) outlined in the companion Key Criteria report. Together, these reports provide an overview of the market, identify leading cloud observability offerings, and help decision-makers evaluate these solutions so they can make a more informed investment decision.
The Guide to Choosing Backup Storage
Considerations, key requirements, and options for modern day IT shops
Most IT organizations put significant thought and research into choosing a backup application. However, most also assume you can simply put any kind of storage behind the backup application, and it will just work.

Backup storage is much more complex. While backup applications are usually top of mind, backup storage can often be overlooked and leads to poor performance, and overpaying for storage in the backup environment. In addition, the importance of utilizing backup storage as a key part of the recovery process especially after a ransomware attack. Being prepared for a recovery from a site disaster is also a big part of the equation.

Learn about the core requirements of backup storage, and review the pros and cons of the different approaches to backup storage.
Hidden Secrets Regarding Backup Storage
A comparison of two backup storage approaches: using primary disk storage versus inline deduplication appliances. Uncover how to get the best of both worlds.
A lot of time goes into picking a backup application such as Veeam, Veritas NetBackup, Commvault, HYCU, Oracle RMAN Direct, and dozens of others. However, rarely does anyone think about or truly understand the impact of the backup storage that sits behind these backup application in regards to cost, performance, scalability, and IT staff time.

Learn when it makes sense to use primary storage disk for backup, what value deduplication appliances offer, and uncover how to find the benefits of both approaches in a single backup storage solution.
Technical Review: ExaGrid Retention Time-Lock for Ransomware Recovery
TechTarget’s Enterprise Strategy Group reviewed ExaGrid’s Retention Time-Lock (RTL) for Ransomware Recovery solution. We focused on the benefits RTL offers to organizations in terms of their readiness for ransomware attacks and security policies for data protection and recovery, including immutability (i.e., prevention of any deletion or alteration of volume, application, or database data).
Ransomware attacks pose a significant threat to organizations, yet in 2023, most organizations were not
adequately prepared to deal with them. Enterprise Strategy Group research has shown a considerable gap between the average organization's preparedness level and that of the best-prepared ones. A closer look at readiness, prevention, detection/response, recovery, and business continuity reveals that organizations excel in prevention and response strategies but still lag in recovery strategies.

ExaGrid Tiered Backup Storage, with its front-end disk-cache Landing Zone and separate Repository
Tier, contains all retention data. All backups are written directly to the network-facing ExaGrid disk-cache Landing Zone, which provides fast backup performance, and the most recent backups are kept in their full undeduplicated form for fast restores. In addition, ExaGrid’s immutability and RTL approach ensures recovery from a ransomware attack.

If your organization is looking to increase its ransomware readiness, prevention, detection/response, and recovery, Enterprise Strategy Group recommends looking closely at the ExaGrid RTL for Ransomware Recovery solution.