Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 18 white papers, page 1 of 2.
Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

High Availability Clusters in VMware vSphere without Sacrificing Features or Flexibility
This paper explains the challenges of moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Many large enterprises are moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources.

Realizing these benefits with business critical applications, such as SQL Server or SAP can pose several challenges. Because these applications need high availability and disaster recovery protection, the move to a virtual environment can mean adding cost and complexity and limiting the use of important VMware features. This paper explains these challenges and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Understanding Windows Server Cluster Quorum Options
This white paper discusses the key concepts you need to configure a failover clustering environment to protect SQL Server in the cloud.
This white paper discusses the key concepts you need to configure a failover clustering environment to protect SQL Server in the cloud. Understand the options for configuring the cluster Quorum to meet your specific needs. Learn the benefits and key takeaways for providing high availability for SQL Server in a public cloud (AWS, Azure, Google) environment.
Mastering vSphere – Best Practices, Optimizing Configurations & More
Do you regularly work with vSphere? If so, this free eBook is for you. Learn how to leverage best practices for the most popular features contained within the vSphere platform and boost your productivity using tips and tricks learnt direct from an experienced VMware trainer and highly qualified professional. In this eBook, vExpert Ryan Birk shows you how to master: Advanced Deployment Scenarios using Auto-Deploy Shared Storage Performance Monitoring and Troubleshooting Host Network configurati

If you’re here to gather some of the best practices surrounding vSphere, you’ve come to the right place! Mastering vSphere: Best Practices, Optimizing Configurations & More, the free eBook authored by me, Ryan Birk, is the product of many years working with vSphere as well as teaching others in a professional capacity. In my extensive career as a VMware consultant and teacher (I’m a VMware Certified Instructor) I have worked with people of all competence levels and been asked hundreds - if not thousands - of questions on vSphere. I was approached to write this eBook to put that experience to use to help people currently working with vSphere step up their game and reach that next level. As such, this eBook assumes readers already have a basic understanding of vSphere and will cover the best practices for four key aspects of any vSphere environment.

The best practices covered here will focus largely on management and configuration solutions so should remain relevant for quite some time. However, with that said, things are constantly changing in IT, so I would always recommend obtaining the most up-to-date information from VMware KBs and official documentation especially regarding specific versions of tools and software updates. This eBook is divided into several sections, and although I would advise reading the whole eBook as most elements relate to others, you might want to just focus on a certain area you’re having trouble with. If so, jump to the section you want read about.

Before we begin, I want to note that in a VMware environment, it’s always best to try to keep things simple. Far too often I have seen environments be thrown off the tracks by trying to do too much at once. I try to live by the mentality of “keeping your environment boring” – in other words, keeping your host configurations the same, storage configurations the same and network configurations the same. I don’t mean duplicate IP addresses, but the hosts need identical port groups, access to the same storage networks, etc. Consistency is the name of the game and is key to solving unexpected problems down the line. Furthermore, it enables smooth scalability - when you move from a single host configuration to a cluster configuration, having the same configurations will make live migrations and high availability far easier to configure without having to significantly re-work the entire infrastructure. Now the scene has been set, let’s get started!

Implementing High Availability in a Linux Environment
This white paper explores how organizations can lower both CapEx and OpEx running high-availability applications in a Linux environment without sacrificing performance or security.
Using open source solutions can dramatically reduce capital expenditures, especially for software licensing fees. But most organizations also understand that open source software needs more “care and feeding” than commercial software—sometimes substantially more- potentially causing operating expenditures to increase well above any potential savings in CapEx. This white paper explores how organizations can lower both CapEx and OpEx running high-availability applications in a Linux environment without sacrificing performance or security.
Controlling Cloud Costs without Sacrificing Availability or Performance
This white paper is to help prevent cloud services sticker shock from occurring ever again and to help make your cloud investments more effective.
After signing up with a cloud service provider, you receive a bill that causes sticker shock. There are unexpected and seemingly excessive charges, and those responsible seem unable to explain how this could have happened. The situation is critical because the amount threatens to bust the budget unless cost-saving changes are made immediately. The objective of this white paper is to help prevent cloud services sticker shock from occurring ever again.
Lift and Shift Backup and Disaster Recovery Scenario for Google Cloud: Step by Step Guide
There are many new challenges, and reasons, to migrate workloads to the cloud. Especially for public cloud, like Google Cloud Platform. Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

There are many new challenges, and reasons, to migrate workloads to the cloud.

For example, here are four of the most popular:

  • Analytics and Machine learning (ML) are everywhere. Once you have your data in a cloud platform like Google Cloud Platform, you can leverage their APIs to run analytics and ML on everything.
  • Kubernetes is powerful and scalable, but transitioning legacy apps to Kubernetes can be daunting.
  • SAP HANA is a secret weapon. With high mem instances in the double digit TeraBytes migrating SAP to a cloud platform is easier than ever.
  • Serverless is the future for application development. With CloudSQL, Big Query, and all the other serverless solutions, cloud platforms like GCP are well positioned to be the easiest platform for app development.

Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

LQD4500 Gen4x16 NVMe SSD Performance Report
The LQD4500 is the World’s Fastest SSD. The Liqid Element LQD4500 PCIe Add-in-Card (AIC), aka the “Honey Badger" for its fierce, lightning fast data speeds, delivers Gen-4 PCIe performance with up to 4m IOPS, 24 GB/s throughput, ultra-low transactional latency of just 20 µs, in capacities up to 32TB. What does all that mean in real-world testing? Download the full LQD4500 performance report and learn how the ultra-high performance and density Gen-4 AIC can supercharge data for your most demand
The LQD4500 is the World’s Fastest SSD.

The Liqid Element LQD4500 PCIe Add-in-Card (AIC), aka the “Honey Badger" for its fierce, lightning fast data speeds, delivers Gen-4 PCIe performance with up to 4m IOPS, 24 GB/s throughput, ultra-low transactional latency of just 20 µs, in capacities up to 32TB.

The document will contain test results and performance measurements for the Liqid LQD4500 Gen4x16 NVMe SSD. The performance test reports include Sequential, Random, and Latency measurement on the LQD4500 high performance storage device. The following data has been measured in a Linux OS environment and results are taken per the SNIA enterprise performance test specification standards. The below results are steady state after sufficient device preconditioning.

Download the full LQD4500 performance report and learn how the ultra-high performance and density Gen-4 AIC can supercharge data for your most demanding applications.
Ten Topics to Discuss with Your Cloud Provider
Find the “just right” cloud for your business. For this paper, we will focus on existing applications (vs. new application services) that require high levels of performance and security, but that also enable customers to meet specific cost expectations.

Choosing the right cloud service for your organization, or for your target customer if you are a managed service provider, can be time consuming and effort intensive. For this paper, we will focus on existing applications (vs. new application services) that require high levels of performance and security, but that also enable customers to meet specific cost expectations.

Topics covered include:

  • Global access and availability
  • Cloud management
  • Application performance
  • Security and compliance
  • And more!
Introduction to Microsoft Windows Virtual Desktop
This whitepaper provides an overview of WVD and a historical perspective of the evolution of Windows desktops – especially multi-session Windows. This paper was authored by industry veterans with active involvement in multi-session Windows desktop computing since its inception in the early 1990s. Disclaimer: Professionals at Liquidware, a Microsoft WVD partner, authored this paper based on information available at the time of writing.
Microsoft announced the general availability of Windows Virtual Desktop (WVD) on September 30, 2019. The release came after an initial public-preview-evaluation program that lasted about six months. This whitepaper provides an overview of WVD and a historical perspective of the evolution of Windows desktops – especially multi-session Windows. This paper was authored by industry veterans with active involvement in multi-session Windows desktop computing since its inception in the early 1990s. Disclaimer: Professionals at Liquidware, a Microsoft WVD partner, authored this paper based on information available at the time of writing. Information regarding WVD is evolving quickly; consequently, readers should understand that this whitepaper (v2.0) presents the most up-to-date information available. Any inaccuracies in this paper are unintentional. Research and buying decisions are ultimately the readers’ responsibility.
How testing your VDI environment can reduce downtime
Downtime is extremely damaging in VDI environments. Revenue and reputation are lost, not to mention opportunity cost.
Normal 0 false false false EN-US X-NONE X-NONE

Downtime is extremely damaging in VDI environments. Revenue and reputation are lost, not to mention opportunity cost.

Download this white paper to learn how to:

  • Eliminate VDI downtime
  • Help IT get ahead of trouble tickets
  • To optimize environments by using realistic user workloads for synthetic testing
  • Safeguard the performance & availability of your VDI environment
Create and Maintain Superior VDI Workspaces
Both Login VSI and IGEL bring their own specific strengths to the table, giving you the ability to focus on securing and optimizing endpoints, whilst also optimizing end-user experience.
Both Login VSI and IGEL bring their own specific strengths to the table, giving you the ability to focus on securing and optimizing endpoints, whilst also optimizing end-user experience.

Read this white paper and learn how:

  • IGEL & Login VSI provides better VDI workspaces to any enterprise
  • The roll-out of VDI is only successful when end-users are happy
  • To keep VDI environments healthy via Change Management
How PCoIP Technology Saves Broadcasters Time and Money (While Boosting Cybersecurity)
Bring broadcast production into the 21st century with this whitepaper.Discover how to leverage PCoIP technology to help broadcasters move from physical production facilities to virtualized broadcast production/playout systems.

The traditional KVM model is a thing of the past, especially in these times of COVID-19 and remote work. In this whitepaper, we're introducing a post-KVM model that keeps data ultra-secure, and reduces bandwidth, allowing more remote users to connect to a broadcaster's studio.

Download this whitepaper and learn how PCoIP Technology can:

  • Meet specialized high performance computing needs
  • Enable bandwidth-efficient collaboration without delays of large file transfer
  • Help broadcasters move from physical production facilities to virtualized broadcast
The Hybrid Future: The changing face of Architecture, Engineering, and Construction
The AEC sector is changing rapidly with technology having a major influence on the way firms design, collaborate and communicate.
Download the paper and learn about:
•    Technology trends in AEC
•    Using the hybrid work model for flexible working and seamless connection with the job site
•    Data centralization in collaborative Building Information Modeling (BIM) workflows and increased demand for high fidelity graphics
•    Teradici CAS and how it can help support distributed, dynamic AEC teams


How Mobile App Protection Fits into a Broader Security Strategy
Mobile app security is a key, but often overlooked aspect of an organization’s broader security plan. Neglecting mobile security leaves organizations vulnerable to security incidents and breaches, even if their servers and networks are protected. In this solution guide, Guardsquare presents a history and overview of various security strategies, the growing importance of mobile app security, and steps that an organization can take to strengthen the security postures of their mobile apps.

Prioritizing Mobile Application Security

Despite the increase of cyberattacks targeting mobile applications, most organizations neglect, or deprioritize mobile application security until it’s too late. The coverage of high-profile breaches and security incidents involving mobile apps in the news tells us that mobile app security should be a high priority in every organization’s broader security strategy. Failing to properly secure your mobile apps can result in the following:

●    Financial loss
●    Reputational damage
●    Customer data loss
●    IP theft
●    And more

This whitepaper shows organizations how to prioritize mobile app security by focusing on building better relationships between development and security teams. This resource also provides a history and overview of software development and steps that an organization can follow to build a concrete strategy to strengthen their overall mobile app security posture.

Download the full report here.

Fast-tracking your restaurant's digital transformation
Quick service restaurants are experiencing a surge in post-COVID innovation as customer buying behaviors are changed forever. New AI-driven smart applications are appearing that can help deliver on these needs. The bad news is that all these new capabilities mean more IT systems that have to be installed and managed at each location. What if you could accelerate in-restaurant application delivery across all your locations, whilst minimizing infrastructure costs, and reducing complexity?

QSR gets fast and personal

Quick service restaurants are experiencing a surge in post-COVID innovation as customer buying behaviors are changed forever. Customers increasingly demand a better experience - personalization, touchless ordering, smart drive-thrus with pick-up times measured in seconds, and highly consistent food quality.

The good news is that new AI-driven smart applications are appearing that can help deliver on these needs. The bad news is that all these new capabilities mean more IT systems that have to be installed and managed at each location. This leads to high infrastructure costs, more pressure on valuable floor-space, and increased reliance on expensive IT skills to keep things running.

What if you could accelerate in-restaurant application delivery across all your locations, whilst minimizing infrastructure costs, and reducing complexity?

In this whitepaper, Sunlight explores:
●    The new shape of quick service restaurants
●    The rise of smart applications
●    Typical examples of smart application benefits
●    Why smart applications need to run where the data happens
●    How Sunlight can help

With the right support, it can be possible to:
●    Pay less than $5,000 per site for an edge computing node
●    Deploy applications in 10 minutes
●    Remove the need for in-restaurant IT skills