Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 29 white papers, page 1 of 2.
Active Directory basics: Under the hood of Active Directory
Topics: veeam
Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD plays in user data-management and security, it’s important to deploy it properly and consistently follow best practices.

Active Directory Basics is a tutorial that will help you address many AD management challenges. You’ll learn what really goes on under the Active Directory hood, including its integration with network services and the features that enable its many great benefits. This white paper also explains how administrators can make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

  • Log onto devices and into applications with the same username and password combination (other optional authentication methods)
  • Use settings and files across all devices, which are AD members
  • Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.
  • Best practices to follow, and references for further reading
Hyper-V Replica in depth
Topics: veeam, hyper-v
When Windows Server 2012 hit the market in 2012 a new feature called - Hyper-V Replica hit the shelf. In 2013, when Windows Server 2012 R2 was released, the Hyper-V Replica feature was improved. This white paper gives you an in-depth look at Hyper-V Replica: what it is, how it works, what capabilities it offers and specific-use cases.

When Windows Server 2012 hit the market in 2012 a new feature called - Hyper-V Replica hit the shelf. In 2013, when Windows Server 2012 R2 was released, the Hyper-V Replica feature was improved. This white paper gives you an in-depth look at Hyper-V Replica: what it is, how it works, what capabilities it offers and specific-use cases.

By the end of this white paper, you’ll know:

  • If this feature is right for your environment
  • Steps for successful implementation
  • Best practices and much more!
IGEL Powers Rich Multimedia Computing Experience for Fulton Financial Corporation
In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure. With the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies, Fulton selected the IGEL Universal Desktop (UD6) thin clients featuring Intel Celeron J1900 Quad-Core processors and the IGEL Universal Management Suite (UMS).

Fulton Financial Corporation has a long and storied history that began in 1882 in Lancaster, Pennsylvania, where local merchants
and farmers organized Fulton National Bank. The bank’s name was chosen to honor Lancaster County native Robert Fulton, the inventor and artist best known for designing and building the Clermont, the first successful steamboat.

In an effort to optimize the productivity of its employees and enable them to have more time to focus on their customers, Fulton sought to upgrade the thin clients for its Citrix application virtualization infrastructure, with the help of its Citrix partner and IGEL Platinum Partner, Plan B Technologies.

In selecting a desktop computing solution to support its Citrix application virtualization infrastructure, Fulton had one unique business requirement, they were looking for a solution that would mirror the experience provided by a Windows PC, without actually being a Windows PC.

During the evaluation process, Fulton looked at thin clients from IGEL and another leading manufacturer, conducting a “bake-off” of several models including the IGEL Universal Desktop (UD6). Fulton like the fact that IGEL is forward- thinking in designing its desktop computing solutions, and began its IGEL roll-out by purchasing 2,300 IGEL UD6 thin clients in 2016 for its headquarters and branch offices, and plans to complete the roll out of IGEL thin clients to the remainder of its 3,700 employees in the coming months. The bank is also leveraging the IGEL Universal Management Suite (UMS) to manage its fleet of IGEL thin clients.

Does Deploying Citrix in the Cloud Make Performance Monitoring Easier?
Organizations now have a variety of cloud-based options for delivering virtualized applications and desktops. Cloud deployments are fast, involve lower hardware footprint and simplify IT operations. A key question to answer in this context is whether Citrix Cloud services make performance monitoring easier than it was for on-premises deployments. Read this white paper and find out how to implement monitoring for Citrix Cloud environments.

The technology of cloud computing has caught up with virtual desktop infrastructures. Tapping into the agility and flexibility of cloud-hosted infrastructures, Citrix Cloud enables organizations to simplify digital workspace delivery. With many of the critical components of the Citrix delivery infrastructure hosted in the cloud and managed by Citrix, organizations can speed up deployment, lower hardware footprint, increase ROI, simplify IT operations. Despite the many benefits of Citrix Cloud, the performance management challenges still persist, just as they do in traditional on-premises Citrix deployments.

Read this eG Innovations white paper, and understand:

  • The two popular Citrix Cloud deployment options
  • Performance monitoring challenges in Citrix Cloud infrastructures
  • Stakeholders involved and their respective domains of responsibility
  • The various monitoring tools and options available
  • Best practices to set up performance monitoring
5 Best Practices to Achieve Successful Migration to Citrix XenApp & XenDesktop 7.x
Citrix XenApp 6.5 is nearing its end-of-life and end-of-maintenance period. As organizations look to migrate to Citrix XenApp and XenDesktop 7.x, they will be encountering many architectural, configuration, platform, and functionality changes. Read this eG Innovations white paper to learn five best practices that Citrix administration teams can use to ensure peak performance of the Citrix infrastructure during and after the migration to XenApp and XenDesktop 7.x.
Citrix XenApp 6.5 is nearing its end-of-life and end-of-maintenance period. As organizations look to migrate to Citrix XenApp and XenDesktop 7.x, they will be encountering many architectural, configuration, platform, and functionality changes. While many new features and enhancements have been introduced in 7.x, there are also some capabilities that were available in XenApp 6.5 and are no longer supported in 7.x (such as Citrix EdgeSight for performance monitoring). Despite all these changes, the success of the migration, ultimately, depends on ensuring outstanding performance and end-user experience in the new 7.x environment.

Read this eG Innovations white paper to learn five best practices that Citrix administration teams can use to ensure peak performance of the Citrix infrastructure during and after the migration to XenApp and XenDesktop 7.x.
Optimizing Performance for Office 365 and Large Profiles with ProfileUnity ProfileDisk
Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them.

Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them. Note that additional profile challenges and solutions are covered in a related ProfileUnity whitepaper entitled “User Profile and Environment Management with ProfileUnity.” To efficiently manage the complex challenges of today’s diverse Windows profile environments, Liquidware ProfileUnity exclusively features two user profile technologies that can be used together or separately depending on the use case.

These include:

1. ProfileDisk, a virtual disk based profile that delivers the entire profile as a layer from an attached user VHD or VMDK, and

2. Profile Portability, a file and registry based profile solution that restores files at login, post login, or based on environment triggers.

Top 5 Backup and DRaaS Considerations to Strengthen Your Multi-Cloud Strategy
Enterprise IT is embracing multi-cloud as the go-to model for cloud deployments. By 2019, nearly 81% of enterprises will have adopted a multi-cloud strategy. While this trend gives organizations more flexibility overall, it puts added pressure on IT teams to manage backup and recovery in a more complex environment.

Enterprise IT is embracing multi-cloud as the go-to model for cloud deployments. By 2019, nearly 81% of enterprises will have adopted a multi-cloud strategy. While this trend gives organizations more flexibility overall, it puts added pressure on IT teams to manage backup and recovery in a more complex environment.

To reduce complexity and lower costs, it is imperative to deploy a single platform that consolidates management for all of your needs - including both on-premises infrastructure and any public cloud platform you choose.

Which features and functions give you the best opportunity for multi-cloud success?

This special white paper, developed in conjunction with TechTarget, outlines the key factors to consider in maximizing your multi-cloud strategy to achieve:

  • Non-stop business continuity
  • Digital transformation agility
  • Analytics and visibility
  • And more!
ESG webcast: Multi-cloud Data Protection Trends and Best Practices
Is the multi-cloud here to stay and are enterprises really adopting this strategy? ESG’s IT Spending Intentions survey shows that 81% of current public cloud infrastructure customers use multiple CSPs and 53% expect the number of unique CSPs they use to increase over the next three years.
Is the multi-cloud here to stay and are enterprises really adopting this strategy? ESG’s IT Spending Intentions survey shows that 81% of current public cloud infrastructure customers use multiple CSPs and 53% expect the number of unique CSPs they use to increase over the next three years.

The proliferation of multiple cloud providers is far from being a point-in-time statistic and it is manly driven by companies’ desire to identify the cloud provider that best fits each application and workload.

Join Edwin Yuen, ESG Senior Analyst for Data Protection and Yesica Schaaf, Senior Director, Veeam® Cloud Marketing in the discussion of Availability in multi-cloud environments to learn more about:
  • Current and upcoming trends in multi-cloud adoption, as well as considerations driving these market shifts
  • Challenges associated with increased IT complexity and multi-cloud deployments
  • How Veeam is helping its customers address multi-cloud and Data Availability: South Oregon University, Goodwill, Columbia Power & Water Systems and Movius
  • And much more!
How to Build a SANless SQL Server Failover Cluster Instance in Google Cloud Platform
This white paper walks through the steps to build a two-node failover cluster between two instances in the same region, but in different Zones, within the Google Cloud Platform (GCP)
If you are going to host SQL Server on the Google Cloud Platform (GCP) you will want to make sure it is highly available with a SQL Failover Cluster. One of the best and most economical ways to do that is to build a SQL Server Failover Cluster Instance (FCI). In this guide, we will walk through the steps to build a two-node failover cluster between two instances in the same region, but in different Zones, within the GCP.
From... to cloud ready in less than one day with Parallels and ThinPrint
Mobility, security and compliance, automation, and the demand for “the workspace of the future” are just some of the challenges that businesses face today. The cloud is best positioned to support these challenges, but it can be hard to pick the right kind of cloud and find the right balance between cost and benefits. Together, Parallels and ThinPrint allow an organization to become a cloud-ready business on its own terms, with unprecedented ease and cost-effectiveness.

Mobility, security and compliance, automation, and the demand for “the workspace of the future” are just some of the challenges that businesses face today.

The cloud is best positioned to support these challenges, but it can be hard to pick the right kind of cloud and find the right balance between cost and benefits.

Parallels Introduction
Parallels is a global leader in cross-platform technologies and is renowned for its award-winning software solutions that cut complexity and lower costs for a wide range of industries, including healthcare, education, banking and finance, manufacturing, the public sector, and many others.

Parallels Remote Application Server (RAS) provides easy-to-use, comprehensive application and desktop delivery that enables business and public-sector organizations to seamlessly integrate virtual Windows applications and desktops on nearly any device or operating system.

ThinPrint Introduction
ThinPrint is a global leader in solutions that support an organization’s digital transformation, helping ensure users can draw on highly reliable and innovative print solutions that support today’s and tomorrow’s requirements.

Joint Value Statement

Together, Parallels and ThinPrint allow an organization to become a cloud-ready business on its own terms, with unprecedented ease and cost-effectiveness.

We support any endpoint device from a desktop PC to a smartphone or tablet, can deploy on-premise or in the cloud, and follow your business as it completes its digital transformation.

You may decide to start digitally transforming your business by delivering applications or desktops from an existing server in your datacenter and move to Amazon Web Services (AWS) or Microsoft Azure later. You can also replace user workstations with newer, more mobile devices, or expand from an initial pilot group to new use cases for the entire company.

Whatever your plans are, Parallels and ThinPrint will help you implement them with easy, cost-effective solutions and the ability to adapt to future challenges.

Is Your Citrix Monitoring Ready for Virtual Apps and Desktops 7.x?
Organizations across the world are migrating from XenApp 6.5 to the latest version of Citrix Virtual Apps and Desktops 7.x. This upgrade comes with radical changes to Citrix architecture, configuration, policy settings, protocols and deployment models. There are many components in the Citrix architecture that have been replaced with new ones. And many have also been newly introduced. With such a strategic change in the Citrix environment, traditional methods of monitoring won't hold good.

With the EOL of XenApp 6.5, organizations across the world are migrating to the latest version of Citrix Virtual Apps and Desktops 7. This upgrade comes with radical changes to Citrix architecture, configuration, policies, protocols and deployment models.

With so many changes in effect, traditional methods of monitoring won't hold good. Your monitoring solution should be ready to adapt to the new enhancements in the 7.x product line.

Read this white paper by George Spiers, Citrix CTP and EUC Architect, where he explains in detail:

  • What’s changed from XenApp 6.5 to Virtual Apps and Desktops 7
  • What monitoring best practices to adopt for ensuring top performance of your virtualized environment and deliver outstanding user experience
PrinterLogic and IGEL Enable Healthcare Organizations to Deliver Better Patient Outcomes
Healthcare professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information.

Many organizations have turned to virtualizing user endpoints to help reduce capital and operational expenses while increasing security. This is especially true within healthcare, where hospitals, clinics, and urgent care centers seek to offer the best possible patient outcomes while adhering to a variety of mandated patient security and information privacy requirements.

With the movement of desktops and applications into the secure data center or cloud, the need for reliable printing of documents, some very sensitive in nature, remains a constant that can be challenging when desktops are virtual but the printing process remains physical. Directing print jobs to the correct printer with the correct physical access rights in the correct location while ensuring compliance with key healthcare mandates like the General Data Protection Regulation (GDPR) and the Healthcare Insurance Portability and Accountability Act (HIPAA) is critical.

Healthcare IT needs to keep pace with these requirements and the ongoing printing demands of healthcare. Medical professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information. By combining PrinterLogic’s enterprise print management software with centrally managed direct IP printing and IGEL’s software-defined thin client endpoint management, healthcare organizations can:

  • Reduce capital and operational costs
  • Support virtual desktop infrastructure (VDI) and electronic medical records (EMR) systems effectively
  • Centralize and simplify print management
  • Add an essential layer of security from the target printer all the way to the network edge
Understanding Windows Server Hyper-V Cluster Configuration, Performance and Security
The Windows Server Hyper-V Clusters are definitely an important option when trying to implement High Availability to critical workloads of a business. Guidelines on how to get started with things like deployment, network configurations to some of the industries best practices on performance, security, and storage management are something that any IT admin would not want to miss. Get started with reading this white paper that discusses the same through scenarios on a production field and helps yo
How do you increase the uptime of your critical workloads? How do you start setting up a Hyper-V Cluster in your organization? What are the Hyper-V design and networking configuration best practices? These are some of the questions you may have when you have large environments with many Hyper-V deployments. It is very essential for IT administrators to build disaster-ready Hyper-V Clusters rather than thinking about troubleshooting them in their production workloads. This whitepaper will help you in deploying a Hyper-V Cluster in your infrastructure by providing step-by-step configuration and consideration guides focussing on optimizing the performance and security of your setup.
VMware vSphere 6.7 Update 1 Upgrade and Security Configuration
Most businesses hugely invest in tackling the security vulnerabilities of their data centers. VMware vSphere 6.7 Upgrade 1 tackles it head-on with its functionalities that aligns with both the legacy and the modern technology capabilities. Read this white paper to know how you can maximize the security posture of vSphere workloads on production environments.
Security is a top concern when it comes to addressing data protection complexities for business-critical systems. VMware vSphere 6.7 Upgrade 1 can be the right fit for your data centers when it comes to resolving security vulnerabilities thereby helping you to take your IT infrastructure to the next level. While there are features that align with the legacy security standards, there are some of the best newly announced functionalities in vSphere 6.7 like Virtual TPM 2.0 and virtualization-based security capabilities that will help you enhance your current security measures for your production workloads. Get started with reading this white paper to know more on how you can implement a solution of this kind in your data centers.
vSphere Troubleshooting Guide
Troubleshooting complex virtualization technology is something all VMware users will have to face at some point. It requires an understanding of how various components fit together and finding a place to start is not easy. Thankfully, VMware vExpert Ryan Birk is here to help with this eBook preparing you for any problems you may encounter along the way.

This eBook explains how to identify problems with vSphere and how to solve them. Before we begin, we need to start off with an introduction to a few things that will make life easier. We’ll start with a troubleshooting methodology and how to gather logs. After that, we’ll break this eBook into the following sections: Installation, Virtual Machines, Networking, Storage, vCenter/ESXi and Clustering.

ESXi and vSphere problems arise from many different places, but they generally fall into one of these categories: Hardware issues, Resource contention, Network attacks, Software bugs, and Configuration problems.

A typical troubleshooting process contains several tasks: 1. Define the problem and gather information. 2. Identify what is causing the problem. 3. Fix the problem, implement a fix.

One of the first things you should try to do when experiencing a problem with a host, is try to reproduce the issue. If you can find a way to reproduce it, you have a great way to validate that the issue is resolved when you do fix it. It can be helpful as well to take a benchmark of your systems before they are implemented into a production environment. If you know HOW they should be running, it’s easier to pinpoint a problem.

You should decide if it’s best to work from a “Top Down” or “Bottom Up” approach to determine the root cause. Guest OS Level issues typically cause a large amount of problems. Let’s face it, some of the applications we use are not perfect. They get the job done but they utilize a lot of memory doing it.

In terms of virtual machine level issues, is it possible that you could have a limit or share value that’s misconfigured? At the ESXi Host Level, you could need additional resources. It’s hard to believe sometimes, but you might need another host to help with load!

Once you have identified the root cause, you should assess the impact of the problem on your day to day operations. When and what type of fix should you implement? A short-term one or a long-term solution? Assess the impact of your solution on daily operations. Short-term solution: Implement a quick workaround. Long-term solution: Reconfiguration of a virtual machine or host.

Now that the basics have been covered, download the eBook to discover how to put this theory into practice!

Mastering vSphere – Best Practices, Optimizing Configurations & More
Do you regularly work with vSphere? If so, this free eBook is for you. Learn how to leverage best practices for the most popular features contained within the vSphere platform and boost your productivity using tips and tricks learnt direct from an experienced VMware trainer and highly qualified professional. In this eBook, vExpert Ryan Birk shows you how to master: Advanced Deployment Scenarios using Auto-Deploy Shared Storage Performance Monitoring and Troubleshooting Host Network configurati

If you’re here to gather some of the best practices surrounding vSphere, you’ve come to the right place! Mastering vSphere: Best Practices, Optimizing Configurations & More, the free eBook authored by me, Ryan Birk, is the product of many years working with vSphere as well as teaching others in a professional capacity. In my extensive career as a VMware consultant and teacher (I’m a VMware Certified Instructor) I have worked with people of all competence levels and been asked hundreds - if not thousands - of questions on vSphere. I was approached to write this eBook to put that experience to use to help people currently working with vSphere step up their game and reach that next level. As such, this eBook assumes readers already have a basic understanding of vSphere and will cover the best practices for four key aspects of any vSphere environment.

The best practices covered here will focus largely on management and configuration solutions so should remain relevant for quite some time. However, with that said, things are constantly changing in IT, so I would always recommend obtaining the most up-to-date information from VMware KBs and official documentation especially regarding specific versions of tools and software updates. This eBook is divided into several sections, and although I would advise reading the whole eBook as most elements relate to others, you might want to just focus on a certain area you’re having trouble with. If so, jump to the section you want read about.

Before we begin, I want to note that in a VMware environment, it’s always best to try to keep things simple. Far too often I have seen environments be thrown off the tracks by trying to do too much at once. I try to live by the mentality of “keeping your environment boring” – in other words, keeping your host configurations the same, storage configurations the same and network configurations the same. I don’t mean duplicate IP addresses, but the hosts need identical port groups, access to the same storage networks, etc. Consistency is the name of the game and is key to solving unexpected problems down the line. Furthermore, it enables smooth scalability - when you move from a single host configuration to a cluster configuration, having the same configurations will make live migrations and high availability far easier to configure without having to significantly re-work the entire infrastructure. Now the scene has been set, let’s get started!

top25