Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 11 of 11 white papers, page 1 of 1.
Salem State University Teams with IGEL, Citrix and Nutanix to Deliver Digital Workspaces
Limited IT resources drive need for the IGEL’s robust management features; maturity of Citrix virtual desktop infrastructure, and the simplicity and time-to-value for Nutanix’s hyperconverged infrastructure offering make the combined solution a no-brainer for the university.
When Jake Snyder joined Salem State University’s IT department, the public university located just outside of Boston, Mass. was only using traditional PCs. “95% of the PCs were still on Windows 7 and there was no clear migration path in sight to Windows 10,” recalls Snyder. “Additionally, all updates to these aging desktop computers were being done locally in the university’s computer labs. Management was difficult and time consuming.”

The university realized something had to change, and that was one of the reasons why they brought Snyder on board – to upgrade its end-user computing environment to VDI. Salem State was looking for the security and manageability that a VDI solution could provide. “One of the biggest challenges that the university had been experiencing was managing desktop imaging and applications,” said Snyder. “They wanted to be able to keep their student, faculty and staff end-points up to date and secure, while at the same time easing the troubleshooting process. They weren’t able to do any of this with their current set-up.”

Snyder first saw a demo of the IGEL solution at the final BriForum event in Boston in 2016. “It was great to see IGEL at that event as I had heard a lot of good buzz around their products and solutions, especially from other colleagues in the industry,” said Snyder. “After BriForum, I went back and ordered some evaluation units to test out within our EUC environment.”

What Snyder quickly discovered during the evaluation period was that the IGEL Universal Management Suite (UMS) was not just plug-and-play, like he had expected. “The IGEL UMS was a very customizable solution, and I liked the robust interface,” continued Snyder. “Despite competitive solutions, it was clear from the start that the IGEL devices were going to be easier to use and cheaper in the long run. IGEL really was a ‘no-brainer’ when you consider the management capabilities and five-year warranty they offer on their hardware.”

Salem State University currently has 400 IGEL Universal Desktop software-defined thin clients deployed on its campus including 360 UD3 thin clients, which are the workhorse of the IGEL portfolio, and 40 UD6 thin clients, which support high-end graphics capabilities for multimedia users. Salem State has also purchased IGEL UD Pocket micro thin clients which they are now testing.
vSphere Troubleshooting Guide
Troubleshooting complex virtualization technology is something all VMware users will have to face at some point. It requires an understanding of how various components fit together and finding a place to start is not easy. Thankfully, VMware vExpert Ryan Birk is here to help with this eBook preparing you for any problems you may encounter along the way.

This eBook explains how to identify problems with vSphere and how to solve them. Before we begin, we need to start off with an introduction to a few things that will make life easier. We’ll start with a troubleshooting methodology and how to gather logs. After that, we’ll break this eBook into the following sections: Installation, Virtual Machines, Networking, Storage, vCenter/ESXi and Clustering.

ESXi and vSphere problems arise from many different places, but they generally fall into one of these categories: Hardware issues, Resource contention, Network attacks, Software bugs, and Configuration problems.

A typical troubleshooting process contains several tasks: 1. Define the problem and gather information. 2. Identify what is causing the problem. 3. Fix the problem, implement a fix.

One of the first things you should try to do when experiencing a problem with a host, is try to reproduce the issue. If you can find a way to reproduce it, you have a great way to validate that the issue is resolved when you do fix it. It can be helpful as well to take a benchmark of your systems before they are implemented into a production environment. If you know HOW they should be running, it’s easier to pinpoint a problem.

You should decide if it’s best to work from a “Top Down” or “Bottom Up” approach to determine the root cause. Guest OS Level issues typically cause a large amount of problems. Let’s face it, some of the applications we use are not perfect. They get the job done but they utilize a lot of memory doing it.

In terms of virtual machine level issues, is it possible that you could have a limit or share value that’s misconfigured? At the ESXi Host Level, you could need additional resources. It’s hard to believe sometimes, but you might need another host to help with load!

Once you have identified the root cause, you should assess the impact of the problem on your day to day operations. When and what type of fix should you implement? A short-term one or a long-term solution? Assess the impact of your solution on daily operations. Short-term solution: Implement a quick workaround. Long-term solution: Reconfiguration of a virtual machine or host.

Now that the basics have been covered, download the eBook to discover how to put this theory into practice!

PowerCLI - The Aspiring Automator's Guide
Automation is awesome but don't just settle for using other people's scripts. Learn how to create your own scripts and take your vSphere automation game to the next level! Written by VMware vExpert Xavier Avrillier, this free eBook presents a use-case approach to learning how to automate tasks in vSphere environments using PowerCLI. We start by covering the basics of installation, set up, and an overview of PowerCLI terms. From there we move into scripting logic and script building with step-by

Scripting and PowerCLI are words that most people working with VMware products know pretty well and have used once or twice. Everyone knows that scripting and automation are great assests to have in your toolbox. The problem usually is that getting into scripting appears daunting to many people who feel like the learning curve is just too steep, and they usually don't know where to start. The good thing is you don't need to learn everything straight away to start working with PowerShell and PowerCLI. Once you have the basics down and have your curiosity tickled, you’ll learn what you need as you go, a lot faster than you thought you would!

ABOUT POWERCLI

Let's get to know PowerCLI a little better before we start getting our hands dirty in the command prompt. If you are reading this you probably already know what PowerCLI is about or have a vague idea of it, but it’s fine you don’t. After a while working with it, it becomes second nature, and you won't be able to imagine life without it anymore! Thanks to VMware's drive to push automation, the product's integration with all of their components has significantly improved over the years, and it has now become a critical part of their ecosystem.

WHAT IS PowerCLI?

Contrary to what many believe, PowerCLI is not in fact a stand-alone software but rather a command-line and scripting tool built on Windows PowerShell for managing and automating vSphere environments. It used to be distributed as an executable file to install on a workstation. Previously, an icon was generated that would essentially launch PowerShell and load the PowerCLI snap-ins in the session. This behavior changed back in version 6.5.1 when the executable file was removed and replaced by a suite of PowerShell modules to install from within the prompt itself. This new deployment method is preferred because these modules are now part of Microsoft’s Official PowerShell Gallery. 7 These modules provide the means to interact with the components of a VMware environment and offer more than 600 cmdlets! The below command returns a full list of VMware-Associated Cmdlets!

LQD4500 Gen4x16 NVMe SSD Performance Report
The LQD4500 is the World’s Fastest SSD. The Liqid Element LQD4500 PCIe Add-in-Card (AIC), aka the “Honey Badger" for its fierce, lightning fast data speeds, delivers Gen-4 PCIe performance with up to 4m IOPS, 24 GB/s throughput, ultra-low transactional latency of just 20 µs, in capacities up to 32TB. What does all that mean in real-world testing? Download the full LQD4500 performance report and learn how the ultra-high performance and density Gen-4 AIC can supercharge data for your most demand
The LQD4500 is the World’s Fastest SSD.

The Liqid Element LQD4500 PCIe Add-in-Card (AIC), aka the “Honey Badger" for its fierce, lightning fast data speeds, delivers Gen-4 PCIe performance with up to 4m IOPS, 24 GB/s throughput, ultra-low transactional latency of just 20 µs, in capacities up to 32TB.

The document will contain test results and performance measurements for the Liqid LQD4500 Gen4x16 NVMe SSD. The performance test reports include Sequential, Random, and Latency measurement on the LQD4500 high performance storage device. The following data has been measured in a Linux OS environment and results are taken per the SNIA enterprise performance test specification standards. The below results are steady state after sufficient device preconditioning.

Download the full LQD4500 performance report and learn how the ultra-high performance and density Gen-4 AIC can supercharge data for your most demanding applications.
The Backup Bible – Complete Edition
In the modern workplace, your data is your lifeline. A significant data loss can cause irreparable damage. Every company must ask itself - is our data properly protected? Learn how to create a robust, effective backup and DR strategy and how put that plan into action with the Backup Bible – a free eBook written by backup expert and Microsoft MVP Eric Siron. The Backup Bible Complete Edition features 200+ pages of actionable content divided into 3 core parts, including 11 customizable templates

Part 1 explains the fundamentals of backup and how to determine your unique backup specifications. You'll learn how to:

  • Get started with backup and disaster recovery planning
  • Set recovery objectives and loss tolerances
  • Translate your business plan into a technically oriented outlook
  • Create a customized agenda for obtaining key stakeholder support
  • Set up a critical backup checklist

Part 2 shows you what exceptional backup looks like on a daily basis and the steps you need to get there, including:

  • Choosing the Right Backup and Recovery Software
  • Setting and Achieving Backup Storage Targets
  • Securing and Protecting Backup Data
  • Defining Backup Schedules
  • Monitoring, Testing, and Maintaining Systems

Part 3 guides you through the process of creating a reliable disaster recovery strategy based on your own business continuity requirements, covering:

  • Understanding key disaster recovery considerations
  • Mapping out your organizational composition
  • Replication
  • Cloud solutions
  • Testing the efficacy of your strategy
  • The Backup Bible is the complete guide to protecting your data and an essential reference book for all IT admins and professionals.


8 Keys to Achieving Anywhere Operations
Download this whitepaper today for insights on how to achieve an efficient IT operation model that supports end users no matter where they are. You’ll learn about the eight value-added areas and strategic trends that are the keys to achieving anywhere operations.
Learn how you can:
  • Deliver the user experience on any device and make the process simple for users and IT alike.
  • Lighten the load for your IT team by creating a unified workspace for a simple environment that’s easier and faster to manage.
  • Automate cleanup of end users’ workspaces and synchronize applications with the latest versions, all without disrupting end-user productivity.
  • Enable anywhere operations using your preferred cloud — on-premises, public, or hybrid.

Key Criteria for Evaluating Data Protection for Kubernetes
Using the findings from the “Key Criteria for Evaluating Kubernetes Data Protection,” this new GigaOm report evaluates CloudCasa, a Kubernetes backup SaaS offering. CloudCasa is a Kubernetes native service with a friendly licensing model that significantly eases the initial testing and adoption of Kubernetes backup and cloud database backup. The straightforward user interface and integration helps simplify backup, migration and recovery operations while improving the return on investment.

Kubernetes is the de-facto standard for container orchestration, and it’s being used by born-in-the-cloud startups and cloud-native enterprises alike. In 2021, Kubernetes was in production on-premises, in the cloud, and even at the edge for many different types of applications, including those that Kubernetes wasn’t initially built for.

Kubernetes was never really built for stateful applications and, by default, lacks features for data protection. However, we see many organizations building and running their stateful applications on top of Kubernetes, indicating there’s a gap in functionality between what Kubernetes offers and what the (enterprise) market wants.

Unfortunately, existing data protection tools, mostly built for legacy technologies such as virtual machines, do not fit well into the container paradigm. Vendors are adapting existing solutions or creating new products from scratch that are often better aligned with the cloud-native and container paradigms.

The market for cloud-native data protection is growing rapidly, with both incumbent vendors and challengers competing for completeness of features, and differences can be observed between those targeting more traditional infrastructure alignment and those aimed at fully cloud-native environments.

In any case, we see a growing need for flexible, adaptive solutions that can meet the changing requirements of their customers. Multi-platform, multi-cloud, multi-environment (including edge), multi-team, and self-service capabilities are quickly becoming differentiating features that ensure successful adoption, not for just one use case but for continuously changing use cases across the entire enterprise.

CloudCasa is the perfect example of this type of modern solution that can adapt quickly to changing business and technical needs. Designed to be Kubernetes native, it is a SaaS offering with a friendly licensing model that significantly eases the initial testing and adoption of the solution.

Incorporating Mobile App Security into the Dev Lifecycle Without Friction
Security is an integral part of the mobile application development process. Organizations are beginning to prioritize security in their development process, but often at the end of the lifecycle. In this report, Guardsquare reviews the mobile application development process to demonstrate how to integrate security measures throughout the development lifecycle, not just at the end. In adapting these recommendations, developers can avoid slowdowns and ineffective, reactive security measures.

Mobile app security shouldn’t be left until the end of the development process. It is possible to integrate security measure throughout the entirety of the development process — even if your team is using one of the agile development methods. If an organization pushes security later in the development process, or even waits until the development process is complete, they run the risk of major complications and the consequences from security incidents. These include:

  • Financial loss
  • Reputational damage
  • Data loss (company or customer)
  • IP theft
  • And more
Overall, this makes security more expensive, especially if organizations find vulnerabilities after deployment. Consequently, it is the recommendation of industry experts that developers incorporate security into the lifecycle early via security assurance (SA).

This whitepaper will show your organization how to seamlessly integrate security throughout your mobile app’s development lifecycle, without slowing your app development teams down. Guardsquare covers each step of the secure software development lifecycle (SSDLC) and shows you how security tests can be built into each of the seven phases: inception, requirements analysis, architecture and design, development, testing, deployment, and steady state.

Ready to take your security strategy to the next level? Download the full report to get started!

The Business Value of Digital Workspace Testing
Software vendors deliver changes faster than ever, and in a digital workspace, one must identify and resolve problems before impacting the business. It’s crucial to test continuously to reduce risk.

Software vendors deliver changes faster than ever, and in a digital workspace, one must identify and resolve problems before impacting the business. It’s crucial to test continuously to reduce risk.

Login Enterprise ensures all the applications in your enterprise work at scale and delivers a full-stack testing approach to your environment.

A Guide to VDI Change Management
How Testing Protects Business Continuity: Leverage testing to ensure your change plan is successful.
How Testing Protects Business Continuity: Leverage testing to ensure your change plan is successful.
Read this white paper and learn how to:
•    Ensure uptime while implementing change
•    Maximize the end-user experience in a constantly changing environment
•    Leverage testing to guarantee a successful roll-out of your change management plan in both pre-production and production
Managing the Ultimate Virtual Desktop Environment
Test, monitor and analyze for optimal user experience & VDI environments VDI environments are complex infrastructure stacks with many interdependent parts. At the same time, they are a single point of failure for the entire organization. Building and managing VDI in the best way possible has become a critical success factor for the business continuity of most large organizations.

Test, monitor and analyze for optimal user experience & VDI environments

VDI environments are complex infrastructure stacks with many interdependent parts. At the same time, they are a single point of failure for the entire organization. Building and managing VDI in the best way possible has become a critical success factor for the business continuity of most large organizations. This white paper describes how Lakeside Software’s SysTrack and Login VSI’s suite of testing tools complement each other throughout the entire VDI lifecycle. We describe how these two toolsets can be combined effectively to create and sustain the best possible end‐user experience.

Read this white paper and learn how:

•    Login VSI & Lakeside work together throughout the entire VDI lifecycle
•    To build and manage ultimate VDI environments with the right tools for the job
•    Moving from ‘fat’ client models to ‘thin’ client infrastructures can benefit you