Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 11 of 11 white papers, page 1 of 1.
UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

Evaluator Group Report on Liqid Composable Infrastructure
In this report from Eric Slack, Senior Analyst at the Evaluator Group, learn how Liqid’s software-defined platform delivers comprehensive, multi-fabric composable infrastructure for the industry’s widest array of data center resources.
Composable Infrastructures direct-connect compute and storage resources dynamically—using virtualized networking techniques controlled by software. Instead of physically constructing a server with specific internal devices (storage, NICs, GPUs or FPGAs), or cabling the appropriate device chassis to a server, composable enables the virtual connection of these resources at the device level as needed, when needed.

Download this report from Eric Slack, Senior Analyst at the Evaluator Group to learn how Liqid’s software-defined platform delivers comprehensive, multi-fabric composable infrastructure for the industry’s widest array of data center resources.
LQD4500 Gen4x16 NVMe SSD Performance Report
The LQD4500 is the World’s Fastest SSD. The Liqid Element LQD4500 PCIe Add-in-Card (AIC), aka the “Honey Badger" for its fierce, lightning fast data speeds, delivers Gen-4 PCIe performance with up to 4m IOPS, 24 GB/s throughput, ultra-low transactional latency of just 20 µs, in capacities up to 32TB. What does all that mean in real-world testing? Download the full LQD4500 performance report and learn how the ultra-high performance and density Gen-4 AIC can supercharge data for your most demand
The LQD4500 is the World’s Fastest SSD.

The Liqid Element LQD4500 PCIe Add-in-Card (AIC), aka the “Honey Badger" for its fierce, lightning fast data speeds, delivers Gen-4 PCIe performance with up to 4m IOPS, 24 GB/s throughput, ultra-low transactional latency of just 20 µs, in capacities up to 32TB.

The document will contain test results and performance measurements for the Liqid LQD4500 Gen4x16 NVMe SSD. The performance test reports include Sequential, Random, and Latency measurement on the LQD4500 high performance storage device. The following data has been measured in a Linux OS environment and results are taken per the SNIA enterprise performance test specification standards. The below results are steady state after sufficient device preconditioning.

Download the full LQD4500 performance report and learn how the ultra-high performance and density Gen-4 AIC can supercharge data for your most demanding applications.
IDC: SaaS Backup and Recovery: Simplified Data Protection Without Compromise
Although the majority of organizations have a "cloud first" strategy, most also continue to manage onsite applications and the backup infrastructure associated with them. However, many are moving away from backup specialists and instead are leaving the task to virtual infrastructure administrators or other IT generalists. Metallic represents Commvault's direct entry into one of the fastest-growing segments of the data protection market. Its hallmarks are simplicity and flexibility of deployment

Metallic is a new SaaS backup and recovery solution based on Commvault's data protection software suite, proven in the marketplace for more than 20 years. It is designed specifically for the needs of medium-scale enterprises but is architected to grow with them based on data growth, user growth, or other requirements. Metallic initially offers either monthly or annual subscriptions through reseller partners; it will be available through cloud service providers and managed service providers over time. The initial workload use cases for Metallic include virtual machine (VM), SQL Server, file server, MS Office 365, and endpoint device recovery support; the company expects to add more use cases and supported workloads as the solution evolves.

Metallic is designed to offer flexibility as one of the service's hallmarks. Aspects of this include:

  • On-demand infrastructure: Metallic manages the cloud-based infrastructure components and software for the backup environment, though the customer will still manage any of its own on- premise infrastructure. This environment will support on-premise, cloud, and hybrid workloads. IT organizations are relieved of the daily task of managing the infrastructure components and do not have to worry about upgrades, OS or firmware updates and the like, for the cloud infrastructure, so people can repurpose that time saved toward other activities.
  • Metallic offers preconfigured plans designed to have users up and running in approximately 15 minutes, eliminating the need for a proof-of-concept test. These preconfigured systems have Commvault best practices built into the design, or organizations can configure their own.
  • Partner-delivered services: Metallic plans to go to market with resellers that can offer a range of services on top of the basic solution's capabilities. These services will vary by provider and will give users a variety of choices when selecting a provider to match the services offered with the organization's needs.
  • "Bring your own storage": Among the flexible options of Metallic, including VM and file or SQL database use cases, users can deploy their own storage, either on-premise or in the cloud, while utilizing the backup/recovery services of Metallic. The company refers to this option as "SaaS Plus."
Greater Ransomware Protection Using Data Isolation and Air Gap Technologies
The prevalence of ransomware and the sharp increase in users working from home adds further complexity and broadens the attack surfaces available to bad actors. While preventing attacks is important, you also need to prepare for the inevitable fallout of a ransomware incident. To prepare, you must be recovery ready with a layered approach to securing data. This WhitePaper will address the approaches of data isolation and air gapping, and the protection provided by Hitachi and Commvault through H

Protecting your data and ensuring its’ availability is one of your top priorities. Like a castle in medieval times, you must always defend it and have built-in defense mechanisms. It is under attack from external and internal sources, and you do not know when or where it will come from. The prevalence of ransomware and the sharp increase in users working from home and on any device adds further complexity and broadens the attack surfaces available to bad actors. So much so, that your organization being hit with ransomware is almost unavoidable. While preventing attacks is important, you also need to prepare for the inevitable fallout of a ransomware incident.

Here are just a few datapoints from recent research around ransomware:
•    Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021
•    Ransomware is expected to attack a business every 11 seconds by the end of 2021
•    75% of the world’s population (6 Billion people) will be online by 2022.
•    Phishing scams account for 90% of attacks.
•    55% of small businesses pay hackers the ransom
•    Ransomware costs are predicted to be 57x more over a span of 6 years by 2021
•    New ransomware strains destroy backups, steal credentials, publicly expose victims, leak stolen data, and some even threaten the victim's customers

So how do you prepare? By making sure you’re recovery ready with a layered approach to securing your data. Two proven techniques for reducing the attack surface on your data are data isolation and air gapping. Hitachi Vantara and Commvault deliver this kind of protection with the combination of Hitachi Data Protection Suite (HDPS) and Hitachi Content Platform (HCP) which includes several layers and tools to protect and restore your data and applications from the edge of your business to the core data centers.

Why User Experience is Key to Your Desktop Transformation
This whitepaper has been authored by experts at Liquidware and draws upon its experience with customers as well as the expertise of its Acceler8 channel partners in order to provide guidance to adopters of desktop virtualization technologies. In this paper, we explain the importance of thorough planning— factoring in user experience and resource allocation—in delivering a scalable next-generation workspace that will produce both near- and long-term value.

There’s little doubt we’re in the midst of a change in the way we operationalize and manage our end users’ workspaces. On the one hand, IT leaders are looking to gain the same efficiencies and benefits realized with cloud and next-generation virtual-server workloads. And on the other hand, users are driving the requirements for anytime, anywhere and any device access to the applications needed to do their jobs. To provide the next-generation workspaces that users require, enterprises are adopting a variety of technologies such as virtual-desktop infrastructure (VDI), published applications and layered applications. At the same time, those technologies are creating new and challenging problems for those looking to gain the full benefits of next-generation end-user workspaces. 

Before racing into any particular desktop transformation delivery approach it’s important to define appropriate goals and adopt a methodology for both near- and long-term success. One of the most common planning pitfalls we’ve seen in our history supporting the transformation of more than 6 million desktops is that organizations tend to put too much emphasis on the technical delivery and resource allocation aspects of the platform, and too little time considering the needs of users. How to meet user expectations and deliver a user experience that fosters success is often overlooked. 

To prevent that problem and achieve near-term success as well as sustainable long-term value from a next-generation desktop transformation approach, planning must also include defining a methodology that should include the following three things:

•    Develop a baseline of “normal” performance for current end user computing delivery
•    Set goals for functionality and defined measurements supporting user experience
•    Continually monitor the environment to ensure users are satisfied and the environment is operating efficiently

This white paper will show why the user experience is difficult to predict, why it’s essential to planning, and why factoring in the user experience—along with resource allocation—is key to creating and delivering the promise of a next-generation workspace that is scalable and will produce both near-and long-term value.

Application Lifecycle Management with Stratusphere UX
This whitepaper defines three major lifecycle stages—analysis, user experience baselining and operationalization―each of which is composed of several crucial steps. The paper also provides practical use examples that will help you create and execute an application-lifecycle methodology using Stratusphere UX from Liquidware.
Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users have come to expect applications to ‘just work’ on whatever device they have on hand. Combined with the notion that for many organizations, workspaces can be a mix of various delivery approaches, it is vital. to better understand application use, as well as information such as versioning, resource consumption and application user experience. This whitepaper defines three major lifecycle stages—analysis, user experience baselining and operationalization―each of which is composed of several crucial steps. The paper also provides practical use examples that will help you create and execute an application-lifecycle methodology using Stratusphere UX from Liquidware.
VDI Performance: The Importance of Testing
The importance of testing in your virtualized desktop environments.
Normal 0 false false false EN-US X-NONE X-NONE

The importance of testing in your virtualized desktop environments

With VDI gaining greater popularity among many enterprises across multiple industries, and with growing numbers of desktops migrating to the cloud, the importance of testing your virtualized desktop environment has never been higher.

Read this white paper and learn how:

  • End-user expectations for a great desktop experience from any device, at any time, are increasing
  • IT departments must rise to the challenge of delivering outstanding service
  • Requirements to reduce the complexity and costs associated with infrastructure
Have It Your Way: Access Your Mac from Anywhere
Learn how Teradici CAS enables secure, remote Mac access from any device, anywhere.

Does your organization leverage applications designed specifically for macOS systems? Do your employees prefer macOS over Windows or Linux desktops? Do you have Macs in the office that are too expensive to ship home for remote work and are you worried about the security of content stored on them?

Learn how Teradici CAS for Mac users enable seamless remote desktops with the best resolution, sound, and color fidelity to create and work from anywhere.

8 Keys to Achieving Anywhere Operations
Download this whitepaper today for insights on how to achieve an efficient IT operation model that supports end users no matter where they are. You’ll learn about the eight value-added areas and strategic trends that are the keys to achieving anywhere operations.
Learn how you can:
  • Deliver the user experience on any device and make the process simple for users and IT alike.
  • Lighten the load for your IT team by creating a unified workspace for a simple environment that’s easier and faster to manage.
  • Automate cleanup of end users’ workspaces and synchronize applications with the latest versions, all without disrupting end-user productivity.
  • Enable anywhere operations using your preferred cloud — on-premises, public, or hybrid.

Blast Radius Identification and Isolation
Security teams need access to actionable information about everything in the network—where devices are located, how they interact, and all relevant details about their configuration and state. With the Forward Networks blast radius feature, they have the ability to not only isolate devices and cut off paths after an attack, but they can also prevent hosts from being vulnerable to attackers in the first place.

When looking to identify and isolate compromised network hosts, the following questions are important to answer promptly and accurately:

  • What are all the possible paths attackers can take from the compromised host?
  • What ports can they access?
  • What objects are along these paths, and what do those devices touch?
  • Is it possible for the attackers to move laterally in the network to reach critical systems or exfiltrate data to the internet?
The Forward Enterprise blast radius feature allows security operations professionals to answer those questions with one click. They can get detailed information about a compromised host, all the other devices reachable by that compromised host, and all possible traffic flows.

Once the exposure is identified, isolating the devices is a much simpler and faster process. Read the use case for more details, including an example of how the blast radius feature can locate the host device and document in seconds every destination, protocol, and L4 port it could possibly reach.