Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 29 white papers, page 1 of 2.
IGEL Powers Rich Multimedia Computing Experience for Fulton Financial Corporation
In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure. With the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies, Fulton selected the IGEL Universal Desktop (UD6) thin clients featuring Intel Celeron J1900 Quad-Core processors and the IGEL Universal Management Suite (UMS).

Fulton Financial Corporation has a long and storied history that began in 1882 in Lancaster, Pennsylvania, where local merchants
and farmers organized Fulton National Bank. The bank’s name was chosen to honor Lancaster County native Robert Fulton, the inventor and artist best known for designing and building the Clermont, the first successful steamboat.

In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure, with the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies.

In selecting a desktop computing solution to support its Citrix application virtualization infrastructure, Fulton had one unique business requirement, they were looking for a solution that would mirror the experience provided by a Windows PC, without actually being a Windows PC.

During the evaluation process, Fulton looked at thin clients from IGEL and another leading manufacturer, conducting a “bake-off” of several models including the IGEL Universal Desktop (UD6). Fulton like the fact that IGEL is forward- thinking in designing its desktop computing solutions, and began its IGEL roll-out by purchasing 2,300 IGEL UD6 thin clients in 2016 for its headquarters and branch offices, and plans to complete the roll out of IGEL thin clients to the remainder of its 3,700 employees in the coming months. The bank is also leveraging the IGEL Universal Management Suite (UMS) to manage its fleet of IGEL thin clients.

Omaha School District Leverages IGEL’s Revolutionary Micro Client
Millard Public Schools is currently leveraging the IGEL UD Pocket, a revolutionary micro client, inside the district’s computer-aided design (CAD) classrooms to securely and cost-effectively deliver Autodesk software to their CAD students via a Citrix virtual desktop.
Millard Public Schools was looking for a secure and cost-effective way to deliver graphics intensive CAD applications to students via Citrix virtual desktops. The school district selected the IGEL UD Pocket and is now leveraging the micro thin client inside its CAD classrooms. Some of the key benefits the district has experienced as a result of the IGEL solution include ease of management and configuration, time and cost savings, support for a robust multimedia experience, and enhanced endpoint security as students are now only able to access their Windows-based, GPU-enabled virtual desktops from a secured Linux-based endpoint.
Austin Solution Provider Powers DaaS Offering with IGEL and Parallels
In 2014, Austin-based Trinsic Technologies introduced Anytime Cloud. Anytime Cloud is a Desktop-as-a-Service (DaaS) solution designed to help SMB clients improve the end user computing experience and streamline business operations. Through Anytime Cloud, customers gain access to the latest cloud and virtualization technologies using IGEL thin clients with Parallels, a virtual application and desktop delivery software application.

Headquartered in Austin, Texas, Trinsic Technologies is a technology solutions provider focused on delivering managed IT and cloud solutions to SMBs since 2005.

In 2014, Trinsic introduced Anytime Cloud, a Desktop-as-a-Service (DaaS) designed to help SMB clients improve the end user computing experience and streamline business operations. To support Anytime Cloud, the solution provider was looking for a desktop delivery and endpoint management solution that would fulfill a variety of different end user needs and requirements across the multiple industries it serves. Trinsic also wanted a solution that provided ease of management and robust security features for clients operating within regulated industries such as healthcare and financial services.

The solution provider selected the IGEL Universal Desktop (UD) thin clients, the IGEL Universal Desktop Converter (UDC), the IGEL OS and the IGEL Universal Management Suite. As a result, some of the key benefits Trinsic has experienced include ease of management and configuration, security and data protection, improved resource allocation and cost savings.

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

Solution Guide for Sennheiser Headsets, IGEL Endpoints and Skype for Business on Citrix VDI
Topics: IGEL, Citrix, skype, VDI
Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Virtualizing Windows applications and desktops in the data center or cloud has compelling security, mobility and management benefits, but delivering real-time voice and video in a virtual environment is a challenge. A poorly optimized implementation can increase costs and compromise user experience. Server scalability and bandwidth efficiency may be less than optimal, and audio-video quality may be degraded.

Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

It's Automation, Not Art
It’s Automation, Not Art Learn how to simplify application monitoring with this free eBook.
We recently reached out to IT professionals to find out what they thought about monitoring and managing their environment.  From the survey, we learned that automation was at the top of everyone's wish list.
 
This guide was written to provide an overview on automation as it relates to monitoring.  It was designed specifically for those familiar with computers and IT, who know what monitoring is capable of, and who may or may not have hands-on experience with monitoring software.
Salem State University Teams with IGEL, Citrix and Nutanix to Deliver Digital Workspaces
Limited IT resources drive need for the IGEL’s robust management features; maturity of Citrix virtual desktop infrastructure, and the simplicity and time-to-value for Nutanix’s hyperconverged infrastructure offering make the combined solution a no-brainer for the university.
When Jake Snyder joined Salem State University’s IT department, the public university located just outside of Boston, Mass. was only using traditional PCs. “95% of the PCs were still on Windows 7 and there was no clear migration path in sight to Windows 10,” recalls Snyder. “Additionally, all updates to these aging desktop computers were being done locally in the university’s computer labs. Management was difficult and time consuming.”

The university realized something had to change, and that was one of the reasons why they brought Snyder on board – to upgrade its end-user computing environment to VDI. Salem State was looking for the security and manageability that a VDI solution could provide. “One of the biggest challenges that the university had been experiencing was managing desktop imaging and applications,” said Snyder. “They wanted to be able to keep their student, faculty and staff end-points up to date and secure, while at the same time easing the troubleshooting process. They weren’t able to do any of this with their current set-up.”

Snyder first saw a demo of the IGEL solution at the final BriForum event in Boston in 2016. “It was great to see IGEL at that event as I had heard a lot of good buzz around their products and solutions, especially from other colleagues in the industry,” said Snyder. “After BriForum, I went back and ordered some evaluation units to test out within our EUC environment.”

What Snyder quickly discovered during the evaluation period was that the IGEL Universal Management Suite (UMS) was not just plug-and-play, like he had expected. “The IGEL UMS was a very customizable solution, and I liked the robust interface,” continued Snyder. “Despite competitive solutions, it was clear from the start that the IGEL devices were going to be easier to use and cheaper in the long run. IGEL really was a ‘no-brainer’ when you consider the management capabilities and five-year warranty they offer on their hardware.”

Salem State University currently has 400 IGEL Universal Desktop software-defined thin clients deployed on its campus including 360 UD3 thin clients, which are the workhorse of the IGEL portfolio, and 40 UD6 thin clients, which support high-end graphics capabilities for multimedia users. Salem State has also purchased IGEL UD Pocket micro thin clients which they are now testing.
Strayer University Improves End User Computing Experience with IGEL
Strayer University is leveraging the IGEL Universal Desktop Converter (UDC) and IGEL UD3 to provide faculty, administrators and student support staff with seamless and reliable access to their digital workspaces.
As IT operations manager for Strayer University, Scott Behrens spent a lot of time looking at and evaluating endpoint computing solutions when it came to identifying a new way to provide the University’s faculty, administrators and student support staff with a seamless and reliable end user computing experience.

“I looked at various options including traditional desktops, but due to the dispersed nature of our business, I really wanted to find a solution that was both easy to manage and reasonably priced,

especially for our remote locations where we have limited or no IT staff on premise,” said Behrens. “IGEL fit perfectly into this scenario. Because of IGEL’s simplicity, we are able to reduce the time it takes to get one of our locations up and running from a week, to a day, with little support and very little effort.”

Strayer University first began its IGEL deployment in 2016, with a small pilot program of 30 users in the IGEL UDC. The university soon expanded its deployment, adding the IGEL UD3 and then Samsung All-in-One thin clients outfitted with the IGEL OS and IGEL Universal Management Suite (UMS). Strayer University’s IGEL deployment now includes more than 2,000 endpoints at 75 locations across the United States. The university plans to extend its deployment of the IGEL UD3s further as it grows and the need arises to replace aging desktop hardware.
Mastering vSphere – Best Practices, Optimizing Configurations & More
Do you regularly work with vSphere? If so, this free eBook is for you. Learn how to leverage best practices for the most popular features contained within the vSphere platform and boost your productivity using tips and tricks learnt direct from an experienced VMware trainer and highly qualified professional. In this eBook, vExpert Ryan Birk shows you how to master: Advanced Deployment Scenarios using Auto-Deploy Shared Storage Performance Monitoring and Troubleshooting Host Network configurati

If you’re here to gather some of the best practices surrounding vSphere, you’ve come to the right place! Mastering vSphere: Best Practices, Optimizing Configurations & More, the free eBook authored by me, Ryan Birk, is the product of many years working with vSphere as well as teaching others in a professional capacity. In my extensive career as a VMware consultant and teacher (I’m a VMware Certified Instructor) I have worked with people of all competence levels and been asked hundreds - if not thousands - of questions on vSphere. I was approached to write this eBook to put that experience to use to help people currently working with vSphere step up their game and reach that next level. As such, this eBook assumes readers already have a basic understanding of vSphere and will cover the best practices for four key aspects of any vSphere environment.

The best practices covered here will focus largely on management and configuration solutions so should remain relevant for quite some time. However, with that said, things are constantly changing in IT, so I would always recommend obtaining the most up-to-date information from VMware KBs and official documentation especially regarding specific versions of tools and software updates. This eBook is divided into several sections, and although I would advise reading the whole eBook as most elements relate to others, you might want to just focus on a certain area you’re having trouble with. If so, jump to the section you want read about.

Before we begin, I want to note that in a VMware environment, it’s always best to try to keep things simple. Far too often I have seen environments be thrown off the tracks by trying to do too much at once. I try to live by the mentality of “keeping your environment boring” – in other words, keeping your host configurations the same, storage configurations the same and network configurations the same. I don’t mean duplicate IP addresses, but the hosts need identical port groups, access to the same storage networks, etc. Consistency is the name of the game and is key to solving unexpected problems down the line. Furthermore, it enables smooth scalability - when you move from a single host configuration to a cluster configuration, having the same configurations will make live migrations and high availability far easier to configure without having to significantly re-work the entire infrastructure. Now the scene has been set, let’s get started!

Futurum Research: Digital Transformation - 9 Key Insights
In this report, Futurum Research Founder and Principal Analyst Daniel Newman and Senior Analyst Fred McClimans discuss how digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes. Discover the nine critical data points that measure the current state of digital transformation in the enterprise to uncover new opportunities, improve business agility, and achieve successful cloud migration.
In this report, Futurum Research Founder and Principal Analyst Daniel Newman and Senior Analyst Fred McClimans discuss how digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes. Discover the nine critical data points that measure the current state of digital transformation in the enterprise to uncover new opportunities, improve business agility, and achieve successful cloud migration.
The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019
Thirteen of the most significant IASM providers identified, researched, analyzed and scored in criteria in the three categories of current offering, market presence, and strategy by Forrester Research. Leaders, strong performers and contenders emerge — and you may be surprised where each provider lands in this Forrester Wave.

In The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019, Forrester identified the 13 most significant IASM providers in the market today, with Zenoss ranked amongst them as a Leader.

“As complexity grows, I&O teams struggle to obtain full visibility into their environments and do troubleshooting. To meet rising customer expectations, operations leaders need new monitoring technologies that can provide a unified view of all components of a service, from application code to infrastructure.”

Who Should Read This

Enterprise organizations looking for a solution to provide:

  • Strong root-cause analysis and remediation
  • Digital customer experience measurement capabilities
  • Ease of deployment across the customer’s whole environment, positioning themselves to successfully deliver intelligent application and service monitoring

Our Takeaways

Trends impacting the infrastructure and operations (I&O) team include:

  • Operations leaders favor a unified view
  • AI/machine learning adoption reaches 72% within the next 12 months
  • Intelligent root-cause analysis soon to become table stakes
  • Monitoring the digital customer experience becomes a priority
  • Ease and speed of deployment are differentiators

How to seamlessly and securely transition to hybrid cloud
Find out how to optimize your hybrid cloud workload through system hardening, incident detection, active defense and mitigation, quarantining and more. Plus, learn how to ensure protection and performance in your environment through an ideal hybrid cloud workload protection solution.

With digital transformation a constantly evolving reality for the modern organization, businesses are called upon to manage complex workloads across multiple public and private clouds—in addition to their on-premises systems.

The upside of the hybrid cloud strategy is that businesses can benefit from both lowered costs and dramatically increased agility and flexibility. The problem, however, is maintaining a secure environment through challenges like data security, regulatory compliance, external threats to the service provider, rogue IT usage and issues related to lack of visibility into the provider’s infrastructure.

Find out how to optimize your hybrid cloud workload through system hardening, incident detection, active defense and mitigation, quarantining and more. Plus, learn how to ensure protection and performance in your environment through an ideal hybrid cloud workload protection solution that:


•    Provides the necessary level of protection for different workloads
•    Delivers an essential set of technologies
•    Is structured as a comprehensive, multi-layered solution
•    Avoids performance degradation for services or users
•    Supports compliance by satisfying a range of regulation requirements
•    Enforces consistent security policies through all parts of hybrid infrastructure
•    Enables ongoing audit by integrating state of security reports
•    Takes account of continuous infrastructure changes

How to Develop a Multi-cloud Management Strategy
Increasingly, organizations are looking to move workloads into the cloud. The goal may be to leverage cloud resources for Dev/Test, or they may want to “lift and shift” an application to the cloud and run it natively. In order to enable these various cloud options, it is critical that organizations develop a multi-cloud data management strategy.

The primary goal of a multi-cloud data management strategy is to supply data, either via copying or moving data to the various multi-cloud use cases. A key enabler of this movement is the data management software applications. In theory, data protection applications can perform both of the copy and move functions. A key consideration is how the multi-cloud data management experience is unified. In most cases, data protection applications ignore the user experience of each cloud and use their proprietary interface as the unifying entity, which increases complexity.

There are a variety of reasons organizations may want to leverage multiple clouds. The first use case is to use public cloud storage as a backup mirror to an on-premises data protection process. Using public cloud storage as a backup mirror enables the organization to automatically off-site data. It also sets up many of the more advanced use cases.

Another use case is using the cloud for disaster recovery.

Another use case is “Lift and Shift,” which means the organization wants to run the application in the cloud natively. Initial steps in the “lift and shift” use case are similar to Dev/Test, but now the workload is storing unique data in the cloud.

Multi-cloud is a reality now for most organizations and managing the movement of data between these clouds is critical.

The SysAdmin Guide to Azure Infrastructure as a Service
If you're used to on-premises infrastructures, cloud platforms can seem daunting. But it doesn't need to be. This eBook written by the veteran IT consultant and trainer Paul Schnackenburg, covers all aspects of setting up and maintaining a high-performing Azure IaaS environment, including: • VM sizing and deployment • Migration • Storage and networking • Security and identity • Infrastructure as code and more!

The cloud computing era is well and truly upon us, and knowing how to take advantage of the benefits of this computing paradigm while maintaining security, manageability, and cost control are vital skills for any IT professional in 2020 and beyond. And its importance is only getting greater.

In this eBook, we’re going to focus on Infrastructure as a Service (IaaS) on Microsoft’s Azure platform - learning how to create VMs, size them correctly, manage storage, networking, and security, along with backup best practices. You’ll also learn how to operate groups of VMs, deploy resources based on templates, managing security and automate your infrastructure. If you currently have VMs in your own datacenter and are looking to migrate to Azure, we’ll also teach you that.

If you’re new to the cloud (or have experience with AWS/GCP but not Azure), this book will cover the basics as well as more advanced skills. Given how fast things change in the cloud, we’ll cover the why (as well as the how) so that as features and interfaces are updated, you’ll have the theoretical knowledge to effectively adapt and know how to proceed.

You’ll benefit most from this book if you actively follow along with the tutorials. We will be going through terms and definitions as we go – learning by doing has always been my preferred way of education. If you don’t have access to an Azure subscription, you can sign up for a free trial with Microsoft. This will give you 30 days 6 to use $200 USD worth of Azure resources, along with 12 months of free resources. Note that most of these “12 months” services aren’t related to IaaS VMs (apart from a few SSD based virtual disks and a small VM that you can run for 750 hours a month) so be sure to get everything covered on the IaaS side before your trial expires. There are also another 25 services that have free tiers “forever”.

Now you know what’s in store, let’s get started!

ESG - DataCore vFilO: Visibility and Control of Unstructured Data for the Modern, Digital Business
Organizations that want to succeed in the digital economy must contend with the cost and complexity introduced by the conventional segregation of multiple file system silos and separate object storage repositories. Fortunately, they can look to DataCore vFilO software for help. DataCore employs innovative techniques to combine diverse unstructured data resources to achieve unprecedented visibility, control, and flexibility.
DataCore’s new vFilO software shares important traits with its existing SANsymphony software-defined block storage platform. Both technologies are certainly enterprise class (highly agile, available, and performant). But each solution exhibits those traits in its own manner, taking the varying requirements for block, file, and object data into account. That’s important at a time when a lot of companies are maintaining hundreds to thousands of terabytes of unstructured data spread across many file servers, other NAS devices, and object storage repositories both onsite and in the cloud. The addition of vFilO to its product portfolio will allow DataCore to position itself in a different, even more compelling way now. DataCore is able to offer a “one-two punch”—namely, one of the best block storage SDS solutions in SANsymphony, and now one of the best next-generation SDS solutions for file and object data in vFilO. Together, vFilO and SANsymphony will put DataCore in a really strong position to support any IT organization looking for better ways to overcome end-users’ file-sharing/access difficulties, keep hardware costs low … and maximize the value of corporate data to achieve success in a digital age.
7 Tips to Safeguard Your Company's Data
Anyone who works in IT will tell you, losing data is no joke. Ransomware and malware attacks are on the rise, but that’s not the only risk. Far too often, a company thinks data is backed up – when it’s really not. The good news? There are simple ways to safeguard your organization. To help you protect your company (and get a good night’s sleep), our experts share seven common reasons companies lose data – often because it was never really protected in the first place – plus tips to help you avoi

Anyone who works in IT will tell you, losing data is no joke. Ransomware and malware attacks are on the rise, but that’s not the only risk. Far too often, a company thinks data is backed up – when it’s really not. The good news? There are simple ways to safeguard your organization. To help you protect your company (and get a good night’s sleep), our experts share seven common reasons companies lose data – often because it was never really protected in the first place – plus tips to help you avoid the same.

Metallic’s our engineers and product team have decades of combined experience protecting customer data. When it comes to backup and recovery, we’ve seen it all – the good, the bad and the ugly.

We understand backup is not something you want to worry about – which is why we’ve designed MetallicTM enterprise- grade backup and recovery with the simplicity of SaaS. Our cloud-based data protection solution comes with underlying technology from industry-leader Commvault and best practices baked in. Metallic offerings help you ensure your backups are running fast and reliably, and your data is there when you need it. Any company can be up and running with simple, powerful backup and recovery in as little as 15 minutes.