Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 6 of 6 white papers, page 1 of 1.
Ovum: Igel's Security Enhancements for Thin Clients
Thin client vendor Igel is enhancing the security capabilities of its products, both under its own steam and in collaboration with technology partners. Ovum sees these developments as important for the next wave of thin client computing, which will be software-based – particularly if the desktop-as-a-service (DaaS) market is to take off.

With hardware-based thin client shipments in the region of 4–5 million units annually, this market is still a drop in the ocean compared to the 270 million PCs shipping each year, though the latter figure has been declining since 2011. And within the thin client market, Igel is in fourth place behind Dell and HP (each at around 1.2 million units annually) and China’s Centerm, which only sells into its home market.

However, the future for thin clients looks bright, in that the software-based segment of the market  (which some analyst houses refuse to acknowledge) is expanding, particularly for Igel. Virtual desktop infrastructure (VDI) technology has stimulated this growth, but the greatest promise is probably in the embryonic DaaS market, whereby enterprises will have standard images for their workforce hosted by service providers.

The State of IT Resilience 2019
An independent study by analyst firm, IDC, confirms the importance of IT resilience within hundreds of global organizations. The survey report spotlights the level of IT resilience within these companies and where there are gaps. Their findings may surprise you. 9 out of 10 companies that participated in the IDC study think having both Disaster Recovery and Backup is redundant. Do you agree? Read the report and benchmark against your peers.

9 out of 10 companies that participated in the IDC study think having both Disaster Recovery and Backup is redundant. Do you agree? Read the report and benchmark against your peers.

An independent study by analyst firm, IDC, confirms the importance of IT resilience within hundreds of global organizations. The survey report spotlights the level of IT resilience within these companies and where there are gaps. Their findings may surprise you.

• 93% surveyed find redundancy in having both disaster recovery and backup as separate solutions
• 9 out of 10 already do or will use the Cloud for data protection within the next 12 months
• Nearly 50% of respondents have suffered impacts from cyber threats, including unrecoverable data, within the last 3 years

Use the report findings to benchmark your data protection and recovery strategies against your peers. Learn how resilient IT is the foundation to not only protect, but to effectively grow your business.

Download the IDC report to benchmark your data protection and recovery strategies against those of your peers. Learn how Resilient IT is the stepping stone for business growth and transformation.

Futurum Research: Digital Transformation - 9 Key Insights
In this report, Futurum Research Founder and Principal Analyst Daniel Newman and Senior Analyst Fred McClimans discuss how digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes. Discover the nine critical data points that measure the current state of digital transformation in the enterprise to uncover new opportunities, improve business agility, and achieve successful cloud migration.
In this report, Futurum Research Founder and Principal Analyst Daniel Newman and Senior Analyst Fred McClimans discuss how digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes. Discover the nine critical data points that measure the current state of digital transformation in the enterprise to uncover new opportunities, improve business agility, and achieve successful cloud migration.
The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019
Thirteen of the most significant IASM providers identified, researched, analyzed and scored in criteria in the three categories of current offering, market presence, and strategy by Forrester Research. Leaders, strong performers and contenders emerge — and you may be surprised where each provider lands in this Forrester Wave.

In The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019, Forrester identified the 13 most significant IASM providers in the market today, with Zenoss ranked amongst them as a Leader.

“As complexity grows, I&O teams struggle to obtain full visibility into their environments and do troubleshooting. To meet rising customer expectations, operations leaders need new monitoring technologies that can provide a unified view of all components of a service, from application code to infrastructure.”

Who Should Read This

Enterprise organizations looking for a solution to provide:

  • Strong root-cause analysis and remediation
  • Digital customer experience measurement capabilities
  • Ease of deployment across the customer’s whole environment, positioning themselves to successfully deliver intelligent application and service monitoring

Our Takeaways

Trends impacting the infrastructure and operations (I&O) team include:

  • Operations leaders favor a unified view
  • AI/machine learning adoption reaches 72% within the next 12 months
  • Intelligent root-cause analysis soon to become table stakes
  • Monitoring the digital customer experience becomes a priority
  • Ease and speed of deployment are differentiators

ESG Report: Verifying Network Intent with Forward Enterprise
This ESG Technical Review documents hands-on validation of Forward Enterprise, a solution developed by Forward Networks to help organizations save time and resources when verifying that their IT networks can deliver application traffic consistently in line with network and security policies. The review examines how Forward Enterprise can reduce network downtime, ensure compliance with policies, and minimize adverse impact of configuration changes on network behavior.
ESG research recently uncovered that 66% of organizations view their IT environments as more or significantly more complex than they were two years ago. The complexity will most likely increase, since 46% of organizations anticipate their network infrastructure spending to exceed that of 2018 as they upgrade and expand their networks.

Large enterprise and service provider networks consist of multiple device types—routers, switches, firewalls, and load balancers—with proprietary operating systems (OS) and different configuration rules. As organizations support more applications and users, their networks will grow and become more complex, making it more difficult to verify and manage correctly implemented policies across the entire network. Organizations have also begun to integrate public cloud services with their on-premises networks, adding further network complexity to manage end-to-end policies.

With increasing network complexity, organizations cannot easily confirm that their networks are operating as intended when they implement network and security policies. Moreover, when considering a fix to a service-impact issue or a network update, determining how it may impact other applications negatively or introduce service-affecting issues becomes difficult. To assess adherence to policies or the impact of any network change, organizations have typically relied on disparate tools and material—network topology diagrams, device inventories, vendor-dependent management systems, command line (CLI) commands, and utilities such as “ping” and “traceroute.” The combination of these tools cannot provide a reliable and holistic assessment of network behavior efficiently.

Organizations need a vendor-agnostic solution that enables network operations to automate the verification of network implementations against intended policies and requirements, regardless of the number and types of devices, operating systems, traffic rules, and policies that exist. The solution must represent the topology of the entire network or subsets of devices (e.g., in a region) quickly and efficiently. It should verify network implementations from prior points in time, as well as proposed network changes prior to implementation. Finally, the solution must also enable organizations to quickly detect issues that affect application delivery or violate compliance requirements.
Evaluator Group Report on Liqid Composable Infrastructure
In this report from Eric Slack, Senior Analyst at the Evaluator Group, learn how Liqid’s software-defined platform delivers comprehensive, multi-fabric composable infrastructure for the industry’s widest array of data center resources.
Composable Infrastructures direct-connect compute and storage resources dynamically—using virtualized networking techniques controlled by software. Instead of physically constructing a server with specific internal devices (storage, NICs, GPUs or FPGAs), or cabling the appropriate device chassis to a server, composable enables the virtual connection of these resources at the device level as needed, when needed.

Download this report from Eric Slack, Senior Analyst at the Evaluator Group to learn how Liqid’s software-defined platform delivers comprehensive, multi-fabric composable infrastructure for the industry’s widest array of data center resources.
top25