Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 5 of 5 white papers, page 1 of 1.
UD Pocket Saves the Day After Malware Cripple’s Hospital’s Mission-Critical PCs
IGEL Platinum Partner A2U had endpoints within the healthcare organization’s finance department up and running within a few hours following the potentially crippling cyberattack, thanks to the innovative micro thin client.

A2U, an IGEL Platinum Partner, recently experienced a situation where one of its large, regional healthcare clients was hit by a cyberattack. “Essentially, malware entered the client’s network via a computer and began replicating like wildfire,” recalls A2U Vice President of Sales, Robert Hammond.

During the cyberattack, a few hundred of the hospital’s PCs were affected. Among those were 30 endpoints within the finance department that the healthcare organization deemed mission critical due to the volume of daily transactions between patients, insurance companies, and state and county agencies for services rendered. “It was very painful from a business standpoint not to be able to conduct billing and receiving, not to mention payroll,” said Hammond.

Prior to this particular incident, A2U had received demo units of the IGEL UD Pocket, a revolutionary micro thin client that can transform x86-compatible PCs and laptops into IGEL OS-powered desktops.

“We had been having a discussion with this client about re-imaging their PCs, but their primary concern was maintaining the integrity of the data that was already on the hardware,” continued Hammond. “HIPAA and other regulations meant that they needed to preserve the data and keep it secure, and we thought that the IGEL UD Pocket could be the answer to this problem. We didn’t see why it wouldn’t work, but we needed to test our theory.”

When the malware attack hit, that opportunity came sooner, rather than later for A2U. “We plugged the UD Pocket into one of the affected machines and were able to bypass the local hard drive, installing the Linux-based IGEL OS on the system without impacting existing data,” said Hammond. “It was like we had created a ‘Linux bubble’ that protected the machine, yet created an environment that allowed end users to quickly return to productivity.”

Working with the hospital’s IT team, it only took a few hours for A2U to get the entire finance department back online. “They were able to start billing the very next day,” added Hammond.

Lift and Shift Backup and Disaster Recovery Scenario for Google Cloud: Step by Step Guide
There are many new challenges, and reasons, to migrate workloads to the cloud. Especially for public cloud, like Google Cloud Platform. Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

There are many new challenges, and reasons, to migrate workloads to the cloud.

For example, here are four of the most popular:

  • Analytics and Machine learning (ML) are everywhere. Once you have your data in a cloud platform like Google Cloud Platform, you can leverage their APIs to run analytics and ML on everything.
  • Kubernetes is powerful and scalable, but transitioning legacy apps to Kubernetes can be daunting.
  • SAP HANA is a secret weapon. With high mem instances in the double digit TeraBytes migrating SAP to a cloud platform is easier than ever.
  • Serverless is the future for application development. With CloudSQL, Big Query, and all the other serverless solutions, cloud platforms like GCP are well positioned to be the easiest platform for app development.

Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

Understanding Windows Server Hyper-V Cluster Configuration, Performance and Security
Explore Hyper-V cluster configuration, performance optimization, and security best practices with this comprehensive whitepaper. Learn how to enhance your Hyper-V environment's reliability and efficiency.
Delve into the world of Hyper-V cluster configuration, performance enhancement, and security reinforcement with our in-depth whitepaper. This resource provides valuable insights into maximizing the potential of your Hyper-V environment. It covers essential topics such as Windows Server Failover Clustering, Hyper-V configuration best practices, networking considerations, advanced virtual machine network configuration, iSCSI storage design, VHDX file format optimization, and event log troubleshooting for Hyper-V. Discover the benefits of using System Center Virtual Machine Manager (SCVMM) and gain a clear understanding of when it's required. Whether you're an IT professional managing virtualized environments or an organization seeking to improve its Hyper-V infrastructure, this whitepaper equips you with the knowledge needed to achieve a robust, high-performing, and secure Hyper-V setup.
VMware DEM and App Volumes Overview Comparison with ProfileUnity & FlexApp
This guide has been authored by experts at Liquidware in order to provide information and guidance regarding some of the frequently asked questions customers encounter while exploring the FlexApp™ Layering technology.
This guide has been authored by experts at Liquidware in order to provide information and guidance regarding some of the frequently asked questions customers encounter while exploring the FlexApp™ Layering technology. FlexApp Application Layering is an integrated part of ProfileUnity that enables applications to be virtualized in such an innate way that they look native to the Windows operating system (OS) and other applications. FlexApp is a perfect complement to ProfileUnity, which provides full user environment management (UEM) with advanced features such as Application Rights Management and context-aware settings for printer and policy management. Although FlexApp is cost effectively licensed with ProfileUnity™, the solution can be licensed separately if your organization has already standardized on an alternative User Environment Management solution. Application Layering leads to much higher rates of compatibility than previous technologies which used Application Isolation to virtualize applications. Once applications have been packaged for layering, they are containerized on virtual hard disks (VHDXs) or virtual machine disks (VMDKs). They can be centrally assigned to users on a machine-level or context-aware basis. FlexApp applications are compatible with virtual, physical and multi-session Windows® environments such as VMware® Horizon View, Citrix® Virtual Apps and Desktops and Microsoft® AVD. This whitepaper provides an overview of FlexApp concepts and ways in which FlexApp can serve as a cornerstone in an application delivery strategy. FlexApp greatly reduces desktop administration overhead by dramatically reducing the need for traditional software distribution and through a reduction in the number of base images needed to support users. FlexApp is a powerful ally of VDI users and administrators. This paper compares Liquidware solutions to VMware App Volumes version 4 and its current updates through the last revision of this document.
AIOps Best Practices for IT Teams & Leaders
What is AIOps & why does it matter for today’s enterprises? Gartner first coined the term AIOps in 2016 to describe an industry category for machine learning and analytics technology that enhances IT operations analytics. Learn how AIOps helps manage IT systems performance and improve customer experience.

AIOps is an umbrella term for underlying technologies, including Artificial Intelligence, Big Data Analytics and Machine Learning that automate the determination and resolution of IT issues in modern, distributed IT environments.

Here's a brief overview on how AIOps solution work:

  • AIOps data usually comes from different MELT sources.
  • Then, big data technologies aggregate and organize it, reduce noise, find patterns and isolate anomalies.
  • The AIOps automated resolution system resolves known issues and hands over the complicated scenarios to IT teams.

Learn from this whitepaper on what are the Best Practices IT Teams and IT Leaders should follow in implementing AIOps in their enterprise.