Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 9 of 9 white papers, page 1 of 1.
UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

Mastering vSphere – Best Practices, Optimizing Configurations & More
Do you regularly work with vSphere? If so, this free eBook is for you. Learn how to leverage best practices for the most popular features contained within the vSphere platform and boost your productivity using tips and tricks learnt direct from an experienced VMware trainer and highly qualified professional. In this eBook, vExpert Ryan Birk shows you how to master: Advanced Deployment Scenarios using Auto-Deploy Shared Storage Performance Monitoring and Troubleshooting Host Network configurati

If you’re here to gather some of the best practices surrounding vSphere, you’ve come to the right place! Mastering vSphere: Best Practices, Optimizing Configurations & More, the free eBook authored by me, Ryan Birk, is the product of many years working with vSphere as well as teaching others in a professional capacity. In my extensive career as a VMware consultant and teacher (I’m a VMware Certified Instructor) I have worked with people of all competence levels and been asked hundreds - if not thousands - of questions on vSphere. I was approached to write this eBook to put that experience to use to help people currently working with vSphere step up their game and reach that next level. As such, this eBook assumes readers already have a basic understanding of vSphere and will cover the best practices for four key aspects of any vSphere environment.

The best practices covered here will focus largely on management and configuration solutions so should remain relevant for quite some time. However, with that said, things are constantly changing in IT, so I would always recommend obtaining the most up-to-date information from VMware KBs and official documentation especially regarding specific versions of tools and software updates. This eBook is divided into several sections, and although I would advise reading the whole eBook as most elements relate to others, you might want to just focus on a certain area you’re having trouble with. If so, jump to the section you want read about.

Before we begin, I want to note that in a VMware environment, it’s always best to try to keep things simple. Far too often I have seen environments be thrown off the tracks by trying to do too much at once. I try to live by the mentality of “keeping your environment boring” – in other words, keeping your host configurations the same, storage configurations the same and network configurations the same. I don’t mean duplicate IP addresses, but the hosts need identical port groups, access to the same storage networks, etc. Consistency is the name of the game and is key to solving unexpected problems down the line. Furthermore, it enables smooth scalability - when you move from a single host configuration to a cluster configuration, having the same configurations will make live migrations and high availability far easier to configure without having to significantly re-work the entire infrastructure. Now the scene has been set, let’s get started!

PowerCLI - The Aspiring Automator's Guide
Automation is awesome but don't just settle for using other people's scripts. Learn how to create your own scripts and take your vSphere automation game to the next level! Written by VMware vExpert Xavier Avrillier, this free eBook presents a use-case approach to learning how to automate tasks in vSphere environments using PowerCLI. We start by covering the basics of installation, set up, and an overview of PowerCLI terms. From there we move into scripting logic and script building with step-by

Scripting and PowerCLI are words that most people working with VMware products know pretty well and have used once or twice. Everyone knows that scripting and automation are great assests to have in your toolbox. The problem usually is that getting into scripting appears daunting to many people who feel like the learning curve is just too steep, and they usually don't know where to start. The good thing is you don't need to learn everything straight away to start working with PowerShell and PowerCLI. Once you have the basics down and have your curiosity tickled, you’ll learn what you need as you go, a lot faster than you thought you would!

ABOUT POWERCLI

Let's get to know PowerCLI a little better before we start getting our hands dirty in the command prompt. If you are reading this you probably already know what PowerCLI is about or have a vague idea of it, but it’s fine you don’t. After a while working with it, it becomes second nature, and you won't be able to imagine life without it anymore! Thanks to VMware's drive to push automation, the product's integration with all of their components has significantly improved over the years, and it has now become a critical part of their ecosystem.

WHAT IS PowerCLI?

Contrary to what many believe, PowerCLI is not in fact a stand-alone software but rather a command-line and scripting tool built on Windows PowerShell for managing and automating vSphere environments. It used to be distributed as an executable file to install on a workstation. Previously, an icon was generated that would essentially launch PowerShell and load the PowerCLI snap-ins in the session. This behavior changed back in version 6.5.1 when the executable file was removed and replaced by a suite of PowerShell modules to install from within the prompt itself. This new deployment method is preferred because these modules are now part of Microsoft’s Official PowerShell Gallery. 7 These modules provide the means to interact with the components of a VMware environment and offer more than 600 cmdlets! The below command returns a full list of VMware-Associated Cmdlets!

Lift and Shift Backup and Disaster Recovery Scenario for Google Cloud: Step by Step Guide
There are many new challenges, and reasons, to migrate workloads to the cloud. Especially for public cloud, like Google Cloud Platform. Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

There are many new challenges, and reasons, to migrate workloads to the cloud.

For example, here are four of the most popular:

  • Analytics and Machine learning (ML) are everywhere. Once you have your data in a cloud platform like Google Cloud Platform, you can leverage their APIs to run analytics and ML on everything.
  • Kubernetes is powerful and scalable, but transitioning legacy apps to Kubernetes can be daunting.
  • SAP HANA is a secret weapon. With high mem instances in the double digit TeraBytes migrating SAP to a cloud platform is easier than ever.
  • Serverless is the future for application development. With CloudSQL, Big Query, and all the other serverless solutions, cloud platforms like GCP are well positioned to be the easiest platform for app development.

Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

DevOps – an unsuspecting target for the world's most sophisticated cybercriminals
DevOps focuses on automated pipelines that help organizations improve time-to-market, product development speed, agility and more. Unfortunately, automated building of software that’s distributed by vendors straight into corporations worldwide leaves cybercriminals salivating over costly supply chain attacks. It takes a multi-layered approach to protect such a dynamic environment without harming resources or effecting timelines.

DevOps: An unsuspecting target for the world’s most sophisticated cybercriminals

DevOps focuses on automated pipelines that help organizations improve business-impacting KPIs like time-to-market, product development speed, agility and more. In a world where less time means more money, putting code into production the same day it’s written is, well, a game changer. But with new opportunities come new challenges. Automated building of software that’s distributed by vendors straight into corporations worldwide leaves cybercriminals salivating over costly supply chain attacks.

So how does one combat supply chain attacks?

Many can be prevented through the deployment of security to development infrastructure servers, the routine vetting of containers and anti-malware testing of the production artifacts. The problem is that a lack of integration solutions in traditional security products wastes time due to fragmented automation, overcomplicated processes and limited visibility—all taboo in DevOps environments.

Cybercriminals exploit fundamental differences between the operational goals of those who maintain and operate in the development environment. That’s why it’s important to show unity and focus on a single strategic goal—delivering a safe product to partners and customers in time.

The protection-performance balance

A strong security foundation is crucial to stopping threats, but it won’t come from a one bullet. It takes the right multi-layered combination to deliver the right DevOps security-performance balance, bringing you closer to where you want to be.

Protect your automated pipeline using endpoint protection that’s fully effective in pre-filtering incidents before EDR comes into play. After all, the earlier threats can be countered automatically, the less impact on resources. It’s important to focus on protection that’s powerful, accessible through an intuitive and well-documented interface, and easily integrated through scripts.

The Accelerated Change of Digital Workspaces
Overcoming Digital Workspace Challenges Software vendors are delivering changes to Operating Systems and Applications faster than ever. Agile development is driving smaller (but still significant), more frequent changes. Digital Workspace managers in the Enterprise are being bombarded with increased demand. With this in mind, Login VSI looks at the issues and solutions to the challenges Digital Workspace management will be presented with – today and tomorrow.
Normal 0 false false false EN-US X-NONE X-NONE

Overcoming Digital Workspace Challenges

Software vendors are delivering changes to Operating Systems and Applications faster than ever. Agile development is driving smaller (but still significant), more frequent changes. Digital Workspace managers in the Enterprise are being bombarded with increased demand.

With this in mind, Login VSI looks at the issues and solutions to the challenges Digital Workspace management will be presented with – today and tomorrow.

The rate of changes for the OS and Applications keeps increasing. It seems like there are updates every day, and keeping up with those updates is a daunting task.

Digital workspace managers need the ways and means to keep up with all the changes AND reduce the risk that all these updates represent for the applications themselves, the infrastructure they live on, and most importantly, for the users that rely on Digital Workspaces to do their job effectively and efficiently.

The Importance of Testing in Today's Ever-Changing IT Environment
Software vendors are delivering changes to Operating Systems and Applications faster than ever. Agile development is driving smaller (but still significant), more frequent changes. Digital Workspace managers in the Enterprise are being bombarded with increased demand. With this in mind, Login VSI looks at the issues and solutions to the challenges Digital Workspace management will be presented with – today and tomorrow.
Software vendors are delivering changes to Operating Systems and Applications faster than ever. Agile development is driving smaller (but still significant), more frequent changes. Digital Workspace managers in the Enterprise are being bombarded with increased demand.

With this in mind, Login VSI looks at the issues and solutions to the challenges Digital Workspace management will be presented with – today and tomorrow.
CloudCasa - Kubernetes and Cloud Database Protection as a Service
CloudCasa™ was built to address data protection for Kubernetes and cloud native infrastructure, and to bridge the data management and protection gap between DevOps and IT Operations. CloudCasa is a simple, scalable and cloud-native BaaS solution built using Kubernetes for protecting Kubernetes and cloud databases. CloudCasa removes the complexity of managing traditional backup infrastructure, and it provides the same level of application-consistent data protection and disaster recovery that IT O

CloudCasa supports all major Kubernetes managed cloud services and distributions, provided they are based on Kubernetes 1.13 or above. Supported cloud services include Amazon EKS, DigitalOcean, Google GKE, IBM Cloud Kubernetes Service, and Microsoft AKS. Supported Kubernetes distributions include Kubernetes.io, Red Hat OpenShift, SUSE Rancher, and VMware Tanzu Kubernetes Grid. Multiple worker node architectures are supported, including x86-64, ARM, and S390x.

With CloudCasa, managing data protection in complex hybrid cloud or multi-cloud environments is as easy as managing it for a single cluster. Just add your multiple clusters and cloud databases to CloudCasa, and you can manage backups across them using common policies, schedules, and retention times. And you can see and manage all your backups in a single easy-to-use GUI.

Top 10 Reasons for Using CloudCasa:

  1. Backup as a service
  2. Intuitive UI
  3. Multi-Cluster Management
  4. Cloud database protection
  5. Free Backup Storage
  6. Secure Backups
  7. Account Compromise Protection
  8. Cloud Provider Outage Protection
  9. Centralized Catalog and Reporting
  10. Backups are Monitored

With CloudCasa, we have your back based on Catalogic Software’s many years of experience in enterprise data protection and disaster recovery. Our goal is to do all the hard work for you to backup and protect your multi-cloud, multi-cluster, cloud native databases and applications so you can realize the operational efficiency and speed of development advantages of containers and cloud native applications.

Powering Remote Game Development
The unprecedented growth in consumer demand exacerbated some challenges the gaming industry faced pre-pandemic—challenges largely created by the need to support an increasingly remote workforce. This guide examines some of those challenges and explores how gaming studios are optimizing processes and technologies to address them while enhancing the collaboration, productivity, and security of remote workers.

People around the world turned to the video gaming industry for entertainment, escapism, and social connection during the COVID-19 pandemic.

The unprecedented growth in consumer demand exacerbated some challenges the gaming industry faced pre-pandemic—challenges largely created by the need to support an increasingly remote workforce.

This guide examines some of those challenges and explores how gaming studios are optimizing processes and technologies to address them while enhancing the collaboration, productivity, and security of remote workers.

What you'll learn:

  • Challenges facing development studios today
  • Four ways to enable remote game developers
  • Key considerations for configuring virtual desktops