Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 33 - 48 of 56 white papers, page 3 of 4.
UD Pocket Saves the Day After Malware Cripple’s Hospital’s Mission-Critical PCs
IGEL Platinum Partner A2U had endpoints within the healthcare organization’s finance department up and running within a few hours following the potentially crippling cyberattack, thanks to the innovative micro thin client.

A2U, an IGEL Platinum Partner, recently experienced a situation where one of its large, regional healthcare clients was hit by a cyberattack. “Essentially, malware entered the client’s network via a computer and began replicating like wildfire,” recalls A2U Vice President of Sales, Robert Hammond.

During the cyberattack, a few hundred of the hospital’s PCs were affected. Among those were 30 endpoints within the finance department that the healthcare organization deemed mission critical due to the volume of daily transactions between patients, insurance companies, and state and county agencies for services rendered. “It was very painful from a business standpoint not to be able to conduct billing and receiving, not to mention payroll,” said Hammond.

Prior to this particular incident, A2U had received demo units of the IGEL UD Pocket, a revolutionary micro thin client that can transform x86-compatible PCs and laptops into IGEL OS-powered desktops.

“We had been having a discussion with this client about re-imaging their PCs, but their primary concern was maintaining the integrity of the data that was already on the hardware,” continued Hammond. “HIPAA and other regulations meant that they needed to preserve the data and keep it secure, and we thought that the IGEL UD Pocket could be the answer to this problem. We didn’t see why it wouldn’t work, but we needed to test our theory.”

When the malware attack hit, that opportunity came sooner, rather than later for A2U. “We plugged the UD Pocket into one of the affected machines and were able to bypass the local hard drive, installing the Linux-based IGEL OS on the system without impacting existing data,” said Hammond. “It was like we had created a ‘Linux bubble’ that protected the machine, yet created an environment that allowed end users to quickly return to productivity.”

Working with the hospital’s IT team, it only took a few hours for A2U to get the entire finance department back online. “They were able to start billing the very next day,” added Hammond.

Modernized Backup for Open VMs
Catalogic vProtect is an agentless enterprise backup solution for Open VM environments such as RedHat Virtualization, Nutanix Acropolis, Citrix XenServer, KVM, Oracle VM, PowerKVM, KVM for IBM z, oVirt, Proxmox and Xen. vProtect enables VM-level protection and can function as a standalone solution or integrate with enterprise backup software such as IBM Spectrum Protect, Veritas NetBackup or Dell-EMC Networker. It is easy to use and affordable.
Catalogic vProtect is an agentless enterprise backup solution for Open VM environments such as RedHat Virtualization, Nutanix Acropolis, Citrix XenServer, KVM, Oracle VM, PowerKVM, KVM for IBM z, oVirt, Proxmox and Xen.  vProtect enables VM-level protection and can function as a standalone solution or integrate with enterprise backup software such as IBM Spectrum Protect, Veritas NetBackup or Dell-EMC Networker. It is easy to use and affordable.
Modernized Backup for Nutanix Acropolis Hypervisor
Catalogic vProtect is an agentless enterprise backup solution for Nutanix Acropolis. vProtect enables VM-level protection with incremental backups, and can function as a standalone solution or integrate with enterprise backup software such as IBM Spectrum Protect, Veritas NetBackup or Dell-EMC Networker. It is easy to use and affordable. It also supports Open VM environments such as RedHat Virtualization, Citrix XenServer, KVM, Oracle VM, and Proxmox.
Catalogic vProtect is an agentless enterprise backup solution for Nutanix Acropolis. vProtect enables VM-level protection with incremental backups, and can function as a standalone solution or integrate with enterprise backup software such as IBM Spectrum Protect, Veritas NetBackup or Dell-EMC Networker. It is easy to use and affordable.  It also supports Open VM environments such as RedHat Virtualization, Citrix XenServer, KVM, Oracle VM, and Proxmox.
Overcome the Data Protection Dilemma - Vembu
Selecting a high-priced legacy backup application that protects an entire IT environment or adopting a new age solution that focuses on protecting a particular area of an environment is a dilemma for every IT professional. Read this whitepaper to overcome the data protection dilemma with Vembu.
IT professionals face a dilemma while selecting a backup solution for their environment. Selecting a legacy application that protects their entire environment means that they have to tolerate high pricing and live with software that does not fully exploit the capabilities of modern IT environment.

On the other hand, they can adopt solutions that focus on a particular area of an IT environment and limited just to that environment. These solutions have a relatively small customer base which means the solution has not been vetted as the legacy applications. Vembu is a next-generation company that provides the capabilities of the new class of backup solutions while at the same time providing completeness of platform coverage, similar to legacy applications.
vSphere Troubleshooting Guide
Troubleshooting complex virtualization technology is something all VMware users will have to face at some point. It requires an understanding of how various components fit together and finding a place to start is not easy. Thankfully, VMware vExpert Ryan Birk is here to help with this eBook preparing you for any problems you may encounter along the way.

This eBook explains how to identify problems with vSphere and how to solve them. Before we begin, we need to start off with an introduction to a few things that will make life easier. We’ll start with a troubleshooting methodology and how to gather logs. After that, we’ll break this eBook into the following sections: Installation, Virtual Machines, Networking, Storage, vCenter/ESXi and Clustering.

ESXi and vSphere problems arise from many different places, but they generally fall into one of these categories: Hardware issues, Resource contention, Network attacks, Software bugs, and Configuration problems.

A typical troubleshooting process contains several tasks: 1. Define the problem and gather information. 2. Identify what is causing the problem. 3. Fix the problem, implement a fix.

One of the first things you should try to do when experiencing a problem with a host, is try to reproduce the issue. If you can find a way to reproduce it, you have a great way to validate that the issue is resolved when you do fix it. It can be helpful as well to take a benchmark of your systems before they are implemented into a production environment. If you know HOW they should be running, it’s easier to pinpoint a problem.

You should decide if it’s best to work from a “Top Down” or “Bottom Up” approach to determine the root cause. Guest OS Level issues typically cause a large amount of problems. Let’s face it, some of the applications we use are not perfect. They get the job done but they utilize a lot of memory doing it.

In terms of virtual machine level issues, is it possible that you could have a limit or share value that’s misconfigured? At the ESXi Host Level, you could need additional resources. It’s hard to believe sometimes, but you might need another host to help with load!

Once you have identified the root cause, you should assess the impact of the problem on your day to day operations. When and what type of fix should you implement? A short-term one or a long-term solution? Assess the impact of your solution on daily operations. Short-term solution: Implement a quick workaround. Long-term solution: Reconfiguration of a virtual machine or host.

Now that the basics have been covered, download the eBook to discover how to put this theory into practice!

Reducing Data Center Infrastructure Costs with Software-Defined Storage
Download this white paper to learn how software-defined storage can help reduce data center infrastructure costs, including guidelines to help you structure your TCO analysis comparison.

With a software-based approach, IT organizations see a better return on their storage investment. DataCore’s software-defined storage provides improved resource utilization, seamless integration of new technologies, and reduced administrative time - all resulting in lower CAPEX and OPEX, yielding a superior TCO.

A survey of 363 DataCore customers found that over half of them (55%) achieved positive ROI within the first year of deployment, and 21% were able to reach positive ROI in less than 6 months.

Download this white paper to learn how software-defined storage can help reduce data center infrastructure costs, including guidelines to help you structure your TCO analysis comparison.

The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019
Thirteen of the most significant IASM providers identified, researched, analyzed and scored in criteria in the three categories of current offering, market presence, and strategy by Forrester Research. Leaders, strong performers and contenders emerge — and you may be surprised where each provider lands in this Forrester Wave.

In The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019, Forrester identified the 13 most significant IASM providers in the market today, with Zenoss ranked amongst them as a Leader.

“As complexity grows, I&O teams struggle to obtain full visibility into their environments and do troubleshooting. To meet rising customer expectations, operations leaders need new monitoring technologies that can provide a unified view of all components of a service, from application code to infrastructure.”

Who Should Read This

Enterprise organizations looking for a solution to provide:

  • Strong root-cause analysis and remediation
  • Digital customer experience measurement capabilities
  • Ease of deployment across the customer’s whole environment, positioning themselves to successfully deliver intelligent application and service monitoring

Our Takeaways

Trends impacting the infrastructure and operations (I&O) team include:

  • Operations leaders favor a unified view
  • AI/machine learning adoption reaches 72% within the next 12 months
  • Intelligent root-cause analysis soon to become table stakes
  • Monitoring the digital customer experience becomes a priority
  • Ease and speed of deployment are differentiators

ESG Report: Verifying Network Intent with Forward Enterprise
This ESG Technical Review documents hands-on validation of Forward Enterprise, a solution developed by Forward Networks to help organizations save time and resources when verifying that their IT networks can deliver application traffic consistently in line with network and security policies. The review examines how Forward Enterprise can reduce network downtime, ensure compliance with policies, and minimize adverse impact of configuration changes on network behavior.
ESG research recently uncovered that 66% of organizations view their IT environments as more or significantly more complex than they were two years ago. The complexity will most likely increase, since 46% of organizations anticipate their network infrastructure spending to exceed that of 2018 as they upgrade and expand their networks.

Large enterprise and service provider networks consist of multiple device types—routers, switches, firewalls, and load balancers—with proprietary operating systems (OS) and different configuration rules. As organizations support more applications and users, their networks will grow and become more complex, making it more difficult to verify and manage correctly implemented policies across the entire network. Organizations have also begun to integrate public cloud services with their on-premises networks, adding further network complexity to manage end-to-end policies.

With increasing network complexity, organizations cannot easily confirm that their networks are operating as intended when they implement network and security policies. Moreover, when considering a fix to a service-impact issue or a network update, determining how it may impact other applications negatively or introduce service-affecting issues becomes difficult. To assess adherence to policies or the impact of any network change, organizations have typically relied on disparate tools and material—network topology diagrams, device inventories, vendor-dependent management systems, command line (CLI) commands, and utilities such as “ping” and “traceroute.” The combination of these tools cannot provide a reliable and holistic assessment of network behavior efficiently.

Organizations need a vendor-agnostic solution that enables network operations to automate the verification of network implementations against intended policies and requirements, regardless of the number and types of devices, operating systems, traffic rules, and policies that exist. The solution must represent the topology of the entire network or subsets of devices (e.g., in a region) quickly and efficiently. It should verify network implementations from prior points in time, as well as proposed network changes prior to implementation. Finally, the solution must also enable organizations to quickly detect issues that affect application delivery or violate compliance requirements.
Restoring Order to Virtualization Chaos
Get Tighter Control of a Mixed VM Environment and Meet Your Data Protection SLAs Is virtualization bringing you the promised benefits of increased IT agility and reduced operating costs, or is virtualization just adding more chaos and complexity? Getting a grip on the prismatic environment of virtualized platforms – whether on-premises, in-cloud, or in some hybrid combination – is key to realizing virtualization’s benefits. To truly achieve better IT productivity, reduce costs, and meet ever mo
Get Tighter Control of a Mixed VM Environment and Meet Your Data Protection SLAs

Is virtualization bringing you the promised benefits of increased IT agility and reduced operating costs, or is virtualization just adding more chaos and complexity? Getting a grip on the prismatic environment of virtualized platforms – whether on-premises, in-cloud, or in some hybrid combination – is key to realizing virtualization’s benefits. To truly achieve better IT productivity, reduce costs, and meet ever more stringent service level agreements (SLAs), you need to create order out of virtualization chaos.

We’ll examine ways in which IT executives can more effectively manage a hybrid virtual machine (VM) environment, and more importantly, how to deliver consistent data protection and recovery across all virtualized platforms. The goal is to control complexity and meet your SLAs, regardless of VM container. In so doing, you will control your VMs, instead of allowing their chaos to control you!
Lift and Shift Backup and Disaster Recovery Scenario for Google Cloud: Step by Step Guide
There are many new challenges, and reasons, to migrate workloads to the cloud. Especially for public cloud, like Google Cloud Platform. Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

There are many new challenges, and reasons, to migrate workloads to the cloud.

For example, here are four of the most popular:

  • Analytics and Machine learning (ML) are everywhere. Once you have your data in a cloud platform like Google Cloud Platform, you can leverage their APIs to run analytics and ML on everything.
  • Kubernetes is powerful and scalable, but transitioning legacy apps to Kubernetes can be daunting.
  • SAP HANA is a secret weapon. With high mem instances in the double digit TeraBytes migrating SAP to a cloud platform is easier than ever.
  • Serverless is the future for application development. With CloudSQL, Big Query, and all the other serverless solutions, cloud platforms like GCP are well positioned to be the easiest platform for app development.

Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

Data Protection Overview and Best Practices
This white paper works through data protection processes and best practices using the Tintri VMstore. Tintri technology is differentiated by its level of abstraction—the ability to take every action on individual virtual machines. Hypervisor administrators and staff members associated with architecting, deploying and administering a data protection and disaster recovery solution will want to dig into this document to understand how Tintri can save them the majority of their management effort an

This white paper works through data protection processes and best practices using the Tintri VMstore. Tintri technology is differentiated by its level of abstraction—the ability to take every action on individual virtual machines.  In this paper, you’ll:

  • Learn how that greatly increases the precision and efficiency of snapshots for data protection
  • Explore the ability to move between recovery points
  • Analyze the behavior of individual virtual machines
  • Predict the need for additional capacity and performance for data protection

If you’re focused on building a successful data protection solution, this document targets key best practices and known challenges. Hypervisor administrators and staff members associated with architecting, deploying and administering a data protection and disaster recovery solution will want to dig into this document to understand how Tintri can save them a great deal of their management effort and greatly reduce operating expense.

Frost & Sullivan Best Practices in Storage Management 2019
This analyst report examines the differentiation of Tintri Global Center in storage management, resulting in receiving this award for product leadership in 2019. Businesses need planning tools to help them handle data growth, new workloads, decommissioning old hardware, and more. The Tintri platform provides both the daily management tasks required to streamline storage management, as well as the forward-looking insights to help businesses plan accordingly. Today Tintri technology is different
This analyst report examines the differentiation of Tintri Global Center in storage management, resulting in receiving this award for product leadership in 2019.  Businesses need planning tools to help them handle data growth, new workloads, decommissioning old hardware, and more. The Tintri platform provides both the daily management tasks required to streamline storage management, as well as the forward-looking insights to help businesses plan accordingly.  Today Tintri technology is differentiated by its level of abstraction—the ability to take every action on individual virtual machines.  Hypervisor administrators and staff members associated with architecting, deploying and managing virtual machines will want to dig into this document to understand how Tintri can save them the majority of their management effort and greatly reduce operating expense.
How to Develop a Multi-cloud Management Strategy
Increasingly, organizations are looking to move workloads into the cloud. The goal may be to leverage cloud resources for Dev/Test, or they may want to “lift and shift” an application to the cloud and run it natively. In order to enable these various cloud options, it is critical that organizations develop a multi-cloud data management strategy.

The primary goal of a multi-cloud data management strategy is to supply data, either via copying or moving data to the various multi-cloud use cases. A key enabler of this movement is the data management software applications. In theory, data protection applications can perform both of the copy and move functions. A key consideration is how the multi-cloud data management experience is unified. In most cases, data protection applications ignore the user experience of each cloud and use their proprietary interface as the unifying entity, which increases complexity.

There are a variety of reasons organizations may want to leverage multiple clouds. The first use case is to use public cloud storage as a backup mirror to an on-premises data protection process. Using public cloud storage as a backup mirror enables the organization to automatically off-site data. It also sets up many of the more advanced use cases.

Another use case is using the cloud for disaster recovery.

Another use case is “Lift and Shift,” which means the organization wants to run the application in the cloud natively. Initial steps in the “lift and shift” use case are similar to Dev/Test, but now the workload is storing unique data in the cloud.

Multi-cloud is a reality now for most organizations and managing the movement of data between these clouds is critical.

Top 10 VMware Performance Metrics That Every VMware Admin Must Monitor
How does one track the resource usage metrics for VMs and which ones are important? VMware vSphere comprises many different resource components. Knowing what these components are and how each component influences resource management decisions is key to efficiently managing VM performance. In this blog, we will discuss the top 10 metrics that every VMware administrator must continuously track.

Virtualization technology is being widely adopted thanks to the flexibility, agility, reliability and ease of administration it offers. At the same time, any IT technology – hardware or software – is only as good as its maintenance and upkeep, and VMware virtualization is no different. With physical machines, failure or poor performance of a machine affects the applications running on that machine. With virtualization, multiple virtual machines (VMs) run on the same physical host and a slowdown of the host will affect applications running on all of the VMs. Hence, performance monitoring is even more important in a virtualized infrastructure than it is in a physical infrastructure.

How does one determine what would be the right amount of resources to allocate to a VM? The answer to that question lies in tracking the resource usage of VMs over time, determining the norms of usage and then right-sizing the VMs accordingly.

But how does one track the resource usage metrics for VMs and which ones are important? VMware vSphere comprises many different resource components. Knowing what these components are and how each component influences resource management decisions is key to efficiently managing VM performance. In this blog, we will discuss the top 10 metrics that every VMware administrator must continuously track.

The Top 10 Metrics a Citrix Administrator Must Monitor in Their Environment
We have invited George Spiers, who is a Citrix architect with rich experience in consulting and implementing Citrix technologies for organizations in various sectors, to write this guest blog and enlighten us on the topic of Citrix monitoring. George is also a Citrix Technology Professional and has contributed immensely to the Citrix community. Read on to see what George thinks are the top 10 most important metrics that Citrix administrators must monitor.

Citrix application and desktop virtualization technologies are widely used by organizations that are embarking on digital transformation initiatives. The success of these initiatives is closely tied to ensuring a great user experience for end users as they access their virtual apps and desktops. Given the multitude of components and services that make up the Citrix delivery architecture, administrators constantly face an uphill challenge in measuring performance and knowing what key performance indicators (KPIs) to monitor.

We have invited George Spiers (https://www.jgspiers.com/), who is a Citrix architect with rich experience in consulting and implementing Citrix technologies for organizations in various sectors, to write this guest blog and enlighten us on the topic of Citrix monitoring. George is also a Citrix Technology Professional and has contributed immensely to the Citrix community. Read on to see what George thinks are the top 10 most important metrics that Citrix administrators must monitor.

The Monitoring ELI5 Guide
The goal of this book is to describe complex IT ideas simply. Very simply. So simply, in fact, a five-year-old could understand it. This book is also written in a way we hope is funny, and maybe a little irreverent—just the right mix of snark and humor and insubordination.

Not too long ago, a copy of Randall Munroe’s “Thing Explainer” made its way around the SolarWinds office—passing from engineering to marketing to development to the Head Geeks™ (yes, that’s actually a job at SolarWinds. It’s pretty cool.), and even to management.

Amid chuckles of appreciation, we recognized Munroe had struck upon a deeper truth: as IT practitioners, we’re often asked to describe complex technical ideas or solutions. However, often it’s for folks who need a simplified version. These may be people who consider themselves non-technical, but just as easily it could be for people who are technical in a different discipline. Amid frustrated eye-rolling we’re asked to “explain it to me like I’m five years old” (a phrase shortened to just “Explain Like I’m Five,” or ELI5, in forums across the internet).

There, amid the blueprints and stick figures, were explanations of the most complex concepts in hyper-simplified language that had achieved the impossible alchemy of being amusing, engaging, and accurate.

We were inspired. What you hold in your hands (or read on your screen) is the result of this inspiration.

In this book, we hope to do for IT what Randall Munroe did for rockets, microwaves, and cell phones: explain what they are, what they do, and how they work in terms anyone can understand, and in a way that may even inspire a laugh or two.

top25