Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 25 white papers, page 1 of 2.
The Expert Guide to VMware Data Protection
Virtualization is a very general term for simulating a physical entity by using software. There are many different forms of virtualization that may be found in a data center including server, network and storage virtualization. When talking about server virtualization there are many unique terms and concepts that you may hear that are part of the technology that makes up server virtualization.
Virtualization is the most disruptive technology of the decade. Virtualization-enabled data protection and disaster recovery is especially disruptive because it allows IT to do things dramatically better at a fraction of the cost of what it would be in a physical data center.

Chapter 1: An Introduction to VMware Virtualization

Chapter 2: Backup and Recovery Methodologies

Chapter 3: Data Recovery in Virtual Environments

Chapter 4: Learn how to choose the right backup solution for VMware
The Hands-on Guide: Understanding Hyper-V in Windows Server 2012
Topics: Hyper-V, veeam
This chapter is designed to get you started quickly with Hyper-V 3.0. It starts with a discussion of the hardware requirements for Hyper-V 3.0 and then explains a basic Hyper-V–deployment followed by an upgrade from Hyper-V 2.0 to Hyper-V 3.0. The chapter concludes with a demonstration of migrating virtual machines from Hyper-V 2.0 to Hyper-V 3.0
The Hands-on Guide: Understanding Hyper-V in Windows Server 2012 gives you simple step-by-step instructions to help you perform Hyper-V-related tasks like a seasoned expert. You will learn how to:
  • Build clustered Hyper-V deployment
  • Manage Hyper-V through PowerShell
  • Create virtual machine replicas
  • Transition from a legacy Hyper-V environment
  • and more
PowerShell for newbies: Getting started with PowerShell 4.0
Topics: veeam, powershell
This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms.

This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms. This e-book provides the fundamentals every PowerShell administrator needs to know. The getting started guide will give you a crash course on PowerShell essential terms, concepts and commands and help you quickly understand PowerShell basics.

You will also learn about:

  • What is PowerShell?
  • Using PowerShell Help
  • PowerShell Terminology
  • The PowerShell Paradigm
  • And more!

This white paper focuses on PowerShell 4.0; however, you can be sure that all the basics provided are relevant to earlier versions as well. For those who are ready to take the next steps in learning PowerShell and looking for more information on the topic, this PDF contains a list of helpful resources.

Hyper-V Replica in depth
Topics: veeam, hyper-v
When Windows Server 2012 hit the market in 2012 a new feature called - Hyper-V Replica hit the shelf. In 2013, when Windows Server 2012 R2 was released, the Hyper-V Replica feature was improved. This white paper gives you an in-depth look at Hyper-V Replica: what it is, how it works, what capabilities it offers and specific-use cases.

When Windows Server 2012 hit the market in 2012 a new feature called - Hyper-V Replica hit the shelf. In 2013, when Windows Server 2012 R2 was released, the Hyper-V Replica feature was improved. This white paper gives you an in-depth look at Hyper-V Replica: what it is, how it works, what capabilities it offers and specific-use cases.

By the end of this white paper, you’ll know:

  • If this feature is right for your environment
  • Steps for successful implementation
  • Best practices and much more!
Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about Business Continuity and Disaster Recovery planning with Zerto's Disaster Recovery Solutions for Virtualized Environments. In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

In this guide you will learn about Business Continuity and Disaster Recovery planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immenseUtilizing Zerto’s Disaster Recovery solutions can greatly mitigate downtime and data loss with RTO’s of minutes and RPO’s of seconds
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Zerto’s DR solutions are applicable for both on-premise and cloud (DRaaS) virtual environments
  • Having a plan and process in place will help you mitigate the impact of an outage on your business

In this booklet we provide insights into the challenges, needs, strategies, and solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud.

Download this white paper and learn more about Business Continuity and Disaster Recovery preparedness and how Zerto can help!

The Definitive Guide to Monitoring Virtual Environments
The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual env

OVERVIEW

The virtualization of physical computers has become the backbone of public and private cloud computing from desktops to data centers, enabling organizations to optimize hardware utilization, enhance security, support multi-tenancy and more. These environments are complex and ephemeral, creating requirements and challenges beyond the capability of traditional monitoring tools that were originally designed for static physical environments. But modern solutions exist, and can bring your virtual environment to new levels of efficiency, performance and scale.

This guide explains the pervasiveness of virtualized environments in modern data centers, the demand these environments create for more robust monitoring and analytics solutions, and the keys to getting the most out of virtualization deployments.

TABLE OF CONTENTS

·        History and Expansion of Virtualized Environments

·        Monitoring Virtual Environments

·        Approaches to Monitoring

·        Why Effective Virtualization Monitoring Matters

·        A Unified Approach to Monitoring Virtualized Environments

·        5 Key Capabilities for Virtualization Monitoring

o   Real-Time Awareness

o   Rapid Root-Cause Analytics

o   End-to-End Visibility

o   Complete Flexibility

o   Hypervisor Agnosticism

·        Evaluating a Monitoring Solution

o   Unified View

o   Scalability

o   CMDB Support

o   Converged Infrastructure

o   Licensing

·        Zenoss for Virtualization Monitoring

Ease of Management and Flexibility Lead to Long-Term Relationship for IGEL at Texas Credit Union
Randolph-Brooks Federal Credit Union was looking for a more powerful endpoint computing solution to deliver e-mail and core financial applications through its Citrix-based infrastructure to its end-users, and IGEL’s Universal Desktop thin clients and Universal Management Suite (UMS) software fit the bill.

Randolph-Brooks Federal Credit Union is more than just a bank. It is a financial cooperative intent on helping its members save time, save money and earn money. Over the years, the credit union has grown from providing financial resources to military service members and their families to serving hundreds of thousands of members across Texas and around the world. RBFCU has a presence in three major market areas — Austin, Dallas and San Antonio — and has more than 55 branches dedicated to serving members and the community.

First and foremost, RBFCU is people. It’s the more than 1,800 employees who serve members’ needs each day. It’s the senior team and Board of Directors that guide the credit union’s growth. It’s the members who give their support and loyalty to the credit union each day.

To help its employees provide the credit union’s members with the highest levels of services and support, Randolph-Brooks Federal Credit Union relies on IGEL’s endpoint computing solutions.

DR 101 EBook
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 eBook will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.

This 101 guide will educate you on topics like:
  • How to evaluate replication technologies
  • Measuring the cost of downtime
  • How to test your Disaster Recovery plan
  • Reasons why backup isn’t Disaster Recovery
  • Tips for leveraging the cloud
  • Mitigating IT threats like ransomware
Get your business prepared for any interruption, download the Disaster Recovery 101 eBook now!
The Hybrid Cloud Guide
With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services. This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services.

This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy.

Topics discussed include:
•    Why Cloud?
•    Getting There Safely
•    IT Resilience in the Hybrid Cloud
•    The Power of Microsoft Azure and Zerto

You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business.

Download the guide today to begin your journey to the cloud!

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

Solution Guide for Sennheiser Headsets, IGEL Endpoints and Skype for Business on Citrix VDI
Topics: IGEL, Citrix, skype, VDI
Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

Virtualizing Windows applications and desktops in the data center or cloud has compelling security, mobility and management benefits, but delivering real-time voice and video in a virtual environment is a challenge. A poorly optimized implementation can increase costs and compromise user experience. Server scalability and bandwidth efficiency may be less than optimal, and audio-video quality may be degraded.

Enabling voice and video with a bundled solution in an existing Citrix environment delivers clearer and crisper voice and video than legacy phone systems. This solution guide describes how Sennheiser headsets combine with Citrix infrastructure and IGEL endpoints to provide a better, more secure user experience. It also describes how to deploy the bundled Citrix-Sennheiser-IGEL solution.

IGEL Software Platform Step by Step Getting Started Guide
Welcome to the IGEL Software Platform: Step-by-Step Getting Started Guide. The goal for this project is to provide you with the tools, knowledge, and understanding to download the IGEL Platform trial software and perform basic installation and configuration without being forced to read many manuals and numerous web support articles.

Welcome to the IGEL Software Platform: Step-by-Step Getting Started Guide. My goal for this project is to provide you with the tools, knowledge, and understanding to download the IGEL Platform trial software and perform basic installation and configuration without being forced to read many manuals and numerous web support articles.

This document will walk you, step-by-step, through what is required for you to get up and running in a proof-of-concept or lab scenario. When finished, you will have a fully working IGEL End-Point Management Platform consisting of the IGEL Universal Management Suite (UMS), IGEL Cloud Gateway (ICG) and at least one IGEL OS installed, connected and centrally managed! 

Ovum: Igel's Security Enhancements for Thin Clients
Thin client vendor Igel is enhancing the security capabilities of its products, both under its own steam and in collaboration with technology partners. Ovum sees these developments as important for the next wave of thin client computing, which will be software-based – particularly if the desktop-as-a-service (DaaS) market is to take off.

With hardware-based thin client shipments in the region of 4–5 million units annually, this market is still a drop in the ocean compared to the 270 million PCs shipping each year, though the latter figure has been declining since 2011. And within the thin client market, Igel is in fourth place behind Dell and HP (each at around 1.2 million units annually) and China’s Centerm, which only sells into its home market.

However, the future for thin clients looks bright, in that the software-based segment of the market  (which some analyst houses refuse to acknowledge) is expanding, particularly for Igel. Virtual desktop infrastructure (VDI) technology has stimulated this growth, but the greatest promise is probably in the embryonic DaaS market, whereby enterprises will have standard images for their workforce hosted by service providers.

It's Automation, Not Art
It’s Automation, Not Art Learn how to simplify application monitoring with this free eBook.
We recently reached out to IT professionals to find out what they thought about monitoring and managing their environment.  From the survey, we learned that automation was at the top of everyone's wish list.
 
This guide was written to provide an overview on automation as it relates to monitoring.  It was designed specifically for those familiar with computers and IT, who know what monitoring is capable of, and who may or may not have hands-on experience with monitoring software.
ESG webcast: Multi-cloud Data Protection Trends and Best Practices
Is the multi-cloud here to stay and are enterprises really adopting this strategy? ESG’s IT Spending Intentions survey shows that 81% of current public cloud infrastructure customers use multiple CSPs and 53% expect the number of unique CSPs they use to increase over the next three years.
Is the multi-cloud here to stay and are enterprises really adopting this strategy? ESG’s IT Spending Intentions survey shows that 81% of current public cloud infrastructure customers use multiple CSPs and 53% expect the number of unique CSPs they use to increase over the next three years.

The proliferation of multiple cloud providers is far from being a point-in-time statistic and it is manly driven by companies’ desire to identify the cloud provider that best fits each application and workload.

Join Edwin Yuen, ESG Senior Analyst for Data Protection and Yesica Schaaf, Senior Director, Veeam® Cloud Marketing in the discussion of Availability in multi-cloud environments to learn more about:
  • Current and upcoming trends in multi-cloud adoption, as well as considerations driving these market shifts
  • Challenges associated with increased IT complexity and multi-cloud deployments
  • How Veeam is helping its customers address multi-cloud and Data Availability: South Oregon University, Goodwill, Columbia Power & Water Systems and Movius
  • And much more!
How to Build a SANless SQL Server Failover Cluster Instance in Google Cloud Platform
This white paper walks through the steps to build a two-node failover cluster between two instances in the same region, but in different Zones, within the Google Cloud Platform (GCP)
If you are going to host SQL Server on the Google Cloud Platform (GCP) you will want to make sure it is highly available with a SQL Failover Cluster. One of the best and most economical ways to do that is to build a SQL Server Failover Cluster Instance (FCI). In this guide, we will walk through the steps to build a two-node failover cluster between two instances in the same region, but in different Zones, within the GCP.
top25