Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 13 of 13 white papers, page 1 of 1.
Ease of Management and Flexibility Lead to Long-Term Relationship for IGEL at Texas Credit Union
Randolph-Brooks Federal Credit Union was looking for a more powerful endpoint computing solution to deliver e-mail and core financial applications through its Citrix-based infrastructure to its end-users, and IGEL’s Universal Desktop thin clients and Universal Management Suite (UMS) software fit the bill.

Randolph-Brooks Federal Credit Union is more than just a bank. It is a financial cooperative intent on helping its members save time, save money and earn money. Over the years, the credit union has grown from providing financial resources to military service members and their families to serving hundreds of thousands of members across Texas and around the world. RBFCU has a presence in three major market areas — Austin, Dallas and San Antonio — and has more than 55 branches dedicated to serving members and the community.

First and foremost, RBFCU is people. It’s the more than 1,800 employees who serve members’ needs each day. It’s the senior team and Board of Directors that guide the credit union’s growth. It’s the members who give their support and loyalty to the credit union each day.

To help its employees provide the credit union’s members with the highest levels of services and support, Randolph-Brooks Federal Credit Union relies on IGEL’s endpoint computing solutions.

Austin Solution Provider Powers DaaS Offering with IGEL and Parallels
In 2014, Austin-based Trinsic Technologies introduced Anytime Cloud. Anytime Cloud is a Desktop-as-a-Service (DaaS) solution designed to help SMB clients improve the end user computing experience and streamline business operations. Through Anytime Cloud, customers gain access to the latest cloud and virtualization technologies using IGEL thin clients with Parallels, a virtual application and desktop delivery software application.

Headquartered in Austin, Texas, Trinsic Technologies is a technology solutions provider focused on delivering managed IT and cloud solutions to SMBs since 2005.

In 2014, Trinsic introduced Anytime Cloud, a Desktop-as-a-Service (DaaS) designed to help SMB clients improve the end user computing experience and streamline business operations. To support Anytime Cloud, the solution provider was looking for a desktop delivery and endpoint management solution that would fulfill a variety of different end user needs and requirements across the multiple industries it serves. Trinsic also wanted a solution that provided ease of management and robust security features for clients operating within regulated industries such as healthcare and financial services.

The solution provider selected the IGEL Universal Desktop (UD) thin clients, the IGEL Universal Desktop Converter (UDC), the IGEL OS and the IGEL Universal Management Suite. As a result, some of the key benefits Trinsic has experienced include ease of management and configuration, security and data protection, improved resource allocation and cost savings.

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

PrinterLogic and IGEL Enable Healthcare Organizations to Deliver Better Patient Outcomes
Healthcare professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information.

Many organizations have turned to virtualizing user endpoints to help reduce capital and operational expenses while increasing security. This is especially true within healthcare, where hospitals, clinics, and urgent care centers seek to offer the best possible patient outcomes while adhering to a variety of mandated patient security and information privacy requirements.

With the movement of desktops and applications into the secure data center or cloud, the need for reliable printing of documents, some very sensitive in nature, remains a constant that can be challenging when desktops are virtual but the printing process remains physical. Directing print jobs to the correct printer with the correct physical access rights in the correct location while ensuring compliance with key healthcare mandates like the General Data Protection Regulation (GDPR) and the Healthcare Insurance Portability and Accountability Act (HIPAA) is critical.

Healthcare IT needs to keep pace with these requirements and the ongoing printing demands of healthcare. Medical professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information. By combining PrinterLogic’s enterprise print management software with centrally managed direct IP printing and IGEL’s software-defined thin client endpoint management, healthcare organizations can:

  • Reduce capital and operational costs
  • Support virtual desktop infrastructure (VDI) and electronic medical records (EMR) systems effectively
  • Centralize and simplify print management
  • Add an essential layer of security from the target printer all the way to the network edge
UD Pocket Saves the Day After Malware Cripple’s Hospital’s Mission-Critical PCs
IGEL Platinum Partner A2U had endpoints within the healthcare organization’s finance department up and running within a few hours following the potentially crippling cyberattack, thanks to the innovative micro thin client.

A2U, an IGEL Platinum Partner, recently experienced a situation where one of its large, regional healthcare clients was hit by a cyberattack. “Essentially, malware entered the client’s network via a computer and began replicating like wildfire,” recalls A2U Vice President of Sales, Robert Hammond.

During the cyberattack, a few hundred of the hospital’s PCs were affected. Among those were 30 endpoints within the finance department that the healthcare organization deemed mission critical due to the volume of daily transactions between patients, insurance companies, and state and county agencies for services rendered. “It was very painful from a business standpoint not to be able to conduct billing and receiving, not to mention payroll,” said Hammond.

Prior to this particular incident, A2U had received demo units of the IGEL UD Pocket, a revolutionary micro thin client that can transform x86-compatible PCs and laptops into IGEL OS-powered desktops.

“We had been having a discussion with this client about re-imaging their PCs, but their primary concern was maintaining the integrity of the data that was already on the hardware,” continued Hammond. “HIPAA and other regulations meant that they needed to preserve the data and keep it secure, and we thought that the IGEL UD Pocket could be the answer to this problem. We didn’t see why it wouldn’t work, but we needed to test our theory.”

When the malware attack hit, that opportunity came sooner, rather than later for A2U. “We plugged the UD Pocket into one of the affected machines and were able to bypass the local hard drive, installing the Linux-based IGEL OS on the system without impacting existing data,” said Hammond. “It was like we had created a ‘Linux bubble’ that protected the machine, yet created an environment that allowed end users to quickly return to productivity.”

Working with the hospital’s IT team, it only took a few hours for A2U to get the entire finance department back online. “They were able to start billing the very next day,” added Hammond.

Controlling Cloud Costs without Sacrificing Availability or Performance
This white paper is to help prevent cloud services sticker shock from occurring ever again and to help make your cloud investments more effective.
After signing up with a cloud service provider, you receive a bill that causes sticker shock. There are unexpected and seemingly excessive charges, and those responsible seem unable to explain how this could have happened. The situation is critical because the amount threatens to bust the budget unless cost-saving changes are made immediately. The objective of this white paper is to help prevent cloud services sticker shock from occurring ever again.
Exploring AIOps: Cluster Analysis for Events
AIOps, i.e., artificial intelligence for IT operations, has become the latest strategy du jour in the IT operations management space to help address and better manage the growing complexity and extreme scale of modern IT environments. AIOps enables some unique and new capabilities on this front, though it is quite a bit more complicated than the panacea that it is made out to be. However, the underlying AI and machine learning (ML) concepts do help complement, supplement and, in particular cases
AIOps, i.e., artificial intelligence for IT operations, has become the latest strategy du jour in the IT operations management space to help address and better manage the growing complexity and extreme scale of modern IT environments. AIOps enables some unique and new capabilities on this front, though it is quite a bit more complicated than the panacea that it is made out to be. However, the underlying AI and machine learning (ML) concepts do help complement, supplement and, in particular cases, even supplant more traditional approaches to handling typical IT Ops scenarios at scale.

An AIOps platform has to ingest and deal with multiple types of data to develop a comprehensive understanding of the state of the managed domain(s) and to better discern the push and pull of diverse trends in the environment, both overt and subtle, that may destabilize critical business outcomes. In this white paper, we will take a look at an AIOps approach to handling one of the fundamental data types: events.
See It, Fix It, Manage It: Ensuring Hybrid and Multi-cloud Applications Are Reliable and Secure
Most enterprises are moving to hybrid or multi-cloud architectures. Operating these environments requires IT teams to rethink their approach to monitoring and reporting on applications and environments. Cloud services differ in functions which makes achieving and maintaining a consistent configuration difficult but not impossible. A significant portion of companies plan to utilize third-party products, reducing some of the variability in feature capabilities across clouds to simplify management.

The author of this Pathfinder report is Mike Fratto, a Senior Research Analyst on the Applied Infrastructure & DevOps team at 451 Research, a part of S&P Global Market Intelligence. Pathfinder reports navigate decision-makers through the issues surrounding a specific technology or business case, explore the business value of adoption, and recommend the range of considerations and concrete next steps in the decision-making process.

This report explores the following topics:

  • the growth of already commonplace cloud usage for mission-critical applications
  • the importance of cloud governance
  • the top cloud security concerns for enterprises
  • the adoption of third-party tools for cloud management
  • the steps IT teams should take to make their cloud environments more secure and reliable
Network Element Virtualization (NEV)
The Network Element Virtualization (NEV) technology from Algoblu enables carriers to virtualize and fine-grain management of their underlying network resources, providing products and services with end-to-end service quality assurance for the individual needs of users. Carriers can provide multi-tiered application-oriented networking services and create new revenue streams over existing network infrastructures.
The Network Element Virtualization (NEV) technology from Algoblu enables carriers to virtualize and fine-grain management of their underlying network resources, providing products and services with end-to-end service quality assurance for the individual needs of users. Carriers can provide multi-tiered application-oriented networking services and create new revenue streams over existing network infrastructures.

Within this document, we describe NEV, explaining how NEV fits within the OSI network layer and how NEV’s current implementation as a programmable Multi-Processor System-on-Chip (MPSoC) further increases performance and reduces costs over classical software-only SD-WAN white-box systems.

NEV is ideal for IoT, cloud games, VR/AR broadcasting, and metaverse applications, which have higher requirements for low-latency technology. It is a shortcut to enable carriers to provide multi-tier services to meet users’ personalized requirements with guaranteed SLA and without changing the existing network infrastructure.
Avoid Costly Inter-Cloud Routing Mistakes with an Intent Check
A Google search for “unexpected AWS charges” returns hundreds of thousands of results. In addition to economic consequences, inefficient traffic routing to and from your various cloud instances and other services can also lead to bandwidth and latency issues that undermine network and app performance. By using the intent check feature in the Forward Enterprise platform, you can identify and fix inter-cloud routing mistakes across all of your cloud instances.
A Google search for “unexpected AWS charges” returns hundreds of thousands of results. In addition to
economic consequences, inefficient traffic routing to and from your various cloud instances and other
services can also lead to bandwidth and latency issues that undermine network and app performance.
By using the intent check feature in the Forward Enterprise platform, you can identify and fix inter-cloud
routing mistakes across all of your cloud instances.
Ten Topics to Discuss with your Cloud Provider
Find the “just right” cloud for your business. For this white paper, we will focus on existing applications (vs. new application services) that require high levels of performance and security, but that also enable customers to meet specific cost expectations.
There are hundreds, if not thousands, of cloud services available to organizations. In many cases, the capabilities of the service, adjusted for cost, matter more to decision makers than the infrastructure itself. As an example, the underlying infrastructure that supports common business software such as Salesforce, Microsoft Office 365, is rarely scrutinized, as the products are trusted solely on the brand’s reputation.

Choosing the right cloud service for your organization, or for your target customer if you are a managed service provider, can be time consuming and effort intensive. For this paper, we will focus on existing applications (vs. new application services) that require high levels of performance and security, but that also enable customers to meet specific cost expectations. Topics covered include:
•    Global access and availability
•    Cloud management
•    Application performance
•    Security and compliance

LIQUIT HELPS TEXAS A&M'S IODP ADVANCE RESEARCH COLLABORATION WITH APPLICATION ACCESS EASE
Texas A&M University Research Foundation’s International Ocean Discovery Program (IODP) coordinates seagoing expeditions to study Earth’s history recorded in sediments and rocks beneath the ocean floor. The IODP 6 person IT and help desk team could not efficiently deploy, maintain, and update all applications and devices across its onshore team of 137 researchers, project managers, analyst, and publication/administrative support personnel.
The IODP IT team chose the Liquit end-to-end application management platform, including Liquit Workspace integrated with Liquit Access Manager and Liquit Release & Patch Management. This would provide fast and reliable anywhere any device applications and services access that end users demanded.

With the entire IODP team now using the Liquit platform, application deployment has gone from hours to minutes. Automation and the self-service approach of the Liquit Setup Store has dramatically reduced help desk inquiries and freed up over 20 percent of IT team time that they now devote to other projects.
Optimizing SQL Server Analysis Services (SSAS)
Troubleshooting performance problems with SQL Server Analysis Services (SSAS) can be a frustrating exercise. This insightful guide helps uncover the myriad forces that can conspire to degrade SSAS performance.
Troubleshooting performance problems with SQL Server Analysis Services (SSAS) can be a frustrating exercise. This insightful guide by Steven Wright, database sales engineering manager at SolarWinds, helps uncover the myriad forces that can conspire to degrade SSAS performance. In this five-part guide, Wright explains MOLAP SSAS architecture, examines MDX query performance, and offers timesaving tips for tracking trace events and troubleshooting SSAS bottlenecks. While the information in this whitepaper focuses on SSAS in Multidimensional mode (MOLAP), future editions will expand on differences found in SSAS Tabular mode.