Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 19 white papers, page 1 of 2.
5 Fundamentals of Modern Data Protection
Some data protection software vendors will say that they are “agentless” because they can do an agentless backup. However, many of these vendors require agents for file-level restore, proper application backup, or to restore application data. My advice is to make sure that your data protection tool is able to address all backup and recovery scenarios without the need for an agent.
Legacy backup is costly, inefficient, and can force IT administrators to make risky compromises that impact critical business applications, data and resources. Read this NEW white paper to learn how Modern Data Protection capitalizes on the inherent benefits of virtualization to:
  • Increase your ability to meet RPOs and RTOs
  • Eliminate the need for complex and inefficient agents
  • Reduce operating costs and optimize resources
FSLogix Apps for Citrix AppDisk Reference Architecture
App Layering and Image Masking Combined for the Most Versatile Delivery Solution on the Market! Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management.
Normal 0 false false false EN-US X-NONE X-NONE

Optimizing the way applications are delivered and managed has been an ongoing challenge in enterprise IT, and the variety of approaches over the years have been received with varying degrees of success. While every method has pros and cons, some of the most stubborn issues include time-to-deliver, application conflicts, plug-ins and licensing. The too-frequent result is high IT overhead, too many gold images and excess spending on application licenses.

Too many companies are settling on less than optimal solutions because that is all they are presented with and they are unaware of the true state of the art for application management. It is possible to dramatically reduce the number of Windows gold images, in some cases to a single image. It is possible to deliver exactly what each and every end user needs to do their job, and nothing else. It is possible for a user to log into a random system and instantly be presented with their personal desktop, all the right applications, plugins and add-ons, the right printers, and the right fonts. It is possible and it is simple.

Citrix AppDisk, when integrated with FSLogix Apps, provides a unique set of features that can improve end-user productivity, reduce IT overhead and lower the cost of desktop management. With FSLogix patent pending Image Masking technology, AppDisk gains very granular and powerful user-based policy control over every aspect of a user’s desktop and applications, and enhances the ability to distribute applications on network attached disk images. FSLogix Apps also enable AppDisks to scale to a much greater degree than any other similar technologies available today.

This document details what is possible when FSLogix is combined with Citrix AppDisk and suggests best practices for installing and configuring the products for maximum flexibility and applicability in various environments.
True 15-Minute RTO for Mission-Critical VMs using Vembu BDR Suite
Every minute counts when your mission-critical VMs are facing a downtime. Read this whitepaper to see how Vembu VM Replication helps you achieve the true industry-standard of 15-minute Recovery Time Objective (RTO).
When you are running critical VMs that are necessary to sustain your business, you must take all possible steps that are required to reduce their downtime. With every minute of downtime, you are losing business transactions, operations, customer trust and your brand value. Read this whitepaper to know how Vembu BDR helps protect the VM data in a simulated Online Transaction Processing scenario and achieves the industry-standard of 15 minute Recovery Time Objective.
Disaster Recovery Guide: DR in Virtualized Environments
In this guide you will learn about Business Continuity and Disaster Recovery planning with Zerto's Disaster Recovery Solutions for Virtualized Environments. In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

In this guide you will learn about Business Continuity and Disaster Recovery planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immenseUtilizing Zerto’s Disaster Recovery solutions can greatly mitigate downtime and data loss with RTO’s of minutes and RPO’s of seconds
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Zerto’s DR solutions are applicable for both on-premise and cloud (DRaaS) virtual environments
  • Having a plan and process in place will help you mitigate the impact of an outage on your business

In this booklet we provide insights into the challenges, needs, strategies, and solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud.

Download this white paper and learn more about Business Continuity and Disaster Recovery preparedness and how Zerto can help!

DR 101 EBook
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 eBook will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.

This 101 guide will educate you on topics like:
  • How to evaluate replication technologies
  • Measuring the cost of downtime
  • How to test your Disaster Recovery plan
  • Reasons why backup isn’t Disaster Recovery
  • Tips for leveraging the cloud
  • Mitigating IT threats like ransomware
Get your business prepared for any interruption, download the Disaster Recovery 101 eBook now!
Optimizing Performance for Office 365 and Large Profiles with ProfileUnity ProfileDisk
Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them.

Managing Windows user profiles can be a complex and challenging process. Better profile management is usually sought by organizations looking to reduce Windows login times, accommodate applications that do not adhere to best practice application data storage, and to give users the flexibility to login to any Windows Operating System (OS) and have their profile follow them. Note that additional profile challenges and solutions are covered in a related ProfileUnity whitepaper entitled “User Profile and Environment Management with ProfileUnity.” To efficiently manage the complex challenges of today’s diverse Windows profile environments, Liquidware ProfileUnity exclusively features two user profile technologies that can be used together or separately depending on the use case.

These include:

1. ProfileDisk, a virtual disk based profile that delivers the entire profile as a layer from an attached user VHD or VMDK, and

2. Profile Portability, a file and registry based profile solution that restores files at login, post login, or based on environment triggers.

IT Infrastructure Risk Management
When implementing new IT infrastructure there are always risks. These risks include under-provisioning or over-provisioning, hardware incompatibility, software incompatibility, network issues and outages, migration issues, downtime, disaster recovery, vendor reliability, and unexpected costs. These risks can be inflated when ripping and replacing an entire infrastructure, but that doesn’t have to be the case. Hyperconverged infrastructure solutions like HC3 from Scale Computing can reduce or eve
When implementing new IT infrastructure there are always risks. These risks include under-provisioning or over-provisioning, hardware incompatibility, software incompatibility, network issues and outages, migration issues, downtime, disaster recovery, vendor reliability, and unexpected costs. These risks can be inflated when ripping and replacing an entire infrastructure, but that doesn’t have to be the case. Hyperconverged infrastructure solutions like HC3 from Scale Computing can reduce or even eliminate risks that have become common with traditional virtualization infrastructure.
Disaster Recovery Strategies with Scale Computing
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT i
Disaster recovery is a concept that asks the question, “How can an organization survive and respond to a wide variety of threats ranging from small hiccups to catastrophic destruction?” The threats to ongoing operations range from human error to malicious attacks to natural disasters. Organizations need to prepare in ways that involve both human and technological response. Technology is an important part of any organization. At Scale Computing, we recognize that in today’s 24/7 marketplace, IT infrastructure must be both resilient and highly available to keep organizations operational.

In our HC3 architecture, keeping in mind our typical simplicity and ease of use, we have built-in a number of disaster recovery capabilities. These allow our users to recover quickly from a variety of disasters that may affect anywhere from a single file to an entire site. Disaster recovery is often planned for and measured in terms of recovery point objective (RPO) and recovery time objective (RTO). HC3 provides features to achieve both RPO and RTO measured in minutes to minimize both downtime and data loss.
How HC3 Lowers the Total Cost of Ownership
When considering a new IT infrastructure solution, the acquisition cost of the hardware and software to standup the infrastructure is only the starting point for cost analysis. It is important to look into the operational costs of deployment, training, licensing, scale out, downtime, and management. All of these considerations contribute to the total cost of ownership (TCO) of the solution.
When considering a new IT infrastructure solution, the acquisition cost of the hardware and software to standup the infrastructure is only the starting point for cost analysis. It is important to look into the operational costs of deployment, training, licensing, scale out, downtime, and management. All of these considerations contribute to the total cost of ownership (TCO) of the solution.

This document will dive into the TCO of the Scale Computing HC3 infrastructure solution and discuss how it compares to traditional architecture models. The combined considerations of different areas of costs will give a broader and more complete picture of how HC3 affects IT costs. With a focus on serving small and midmarket IT, Scale Computing is committed to making virtualization infrastructure both accessible and affordable for any size organization.
Essential Guide for Application-Centric Workload Migrations to Hybrid Cloud
Essential guide on migrating from the Private to the Hybrid Cloud environment.

IT leaders turn an eye toward the cloud when they’re looking to solve elasticity and scalability issues. One of the key differentiators of the cloud as compared to traditional infrastructure is that it’s inherently flexible.

Migrating workloads, especially complex, multi-tiered applications, can be a harrowing process. Undertaking the migration without a solid understanding of the interdependencies of applications and the exact resource requirements means almost certain failure. In today’s world, it’s understandable that failures can, do, and will happen; what’s not acceptable today is downtime. Cutovers of migrations need to be instant, or an hour at most.

Read this essential guide on Workload Migrations to learn about:

  • Availability Service Level Agreements
  • On-Premises to Public Cloud Migrations
  • Data Center to Data Center Migrations
  • Workload Migration Challenges
  • Migrate Successfully with Application-Centric Workload Visibility
Switch to Parallels Remote Application Server and Save 60% Compared to Citrix XenApp
This article will explain how Parallels Remote Application Server can easily act as a business’s desktop and application delivery solution, offering the same qualities as other leading solutions such as Citrix XenApp, but at an entirely different and affordable price. As a result, companies who opt to use Parallels Remote Application Server could save up to 60%, while gaining added flexibility and maneuverability for their devices.
A few years ago, Citrix had two separate products for its virtualization solutions: XenApp and XenDesktop. In 2016, Citrix merged them into a single product; XenDesktop 7. The change was not well received by Citrix customers, and Citrix has split them again into XenApp and XenDesktop from version 7.5 onward. The major difference between XenApp and XenDesktop is the type of virtual desktop delivered to the user. XenDesktop includes all XenApp features and also has a VDI solution, so from this point on we will use the XenDesktop term in this document to refer to Citrix virtualization solution: published applications and virtual desktop infrastructure. Although XenDesktop is the most popular solution in the industry, it has several shortcomings coupled with a very expensive price tag. Due to migration from Independent Management Architecture (IMA) to Flexcast Management Architecture (FMA), there is no option in place to upgrade to XenDesktop 7.x from previous versions of XenApp (5 or 6.X). Therefore, now is the right time to jump ship. In this white paper, we examine how migrating to Parallels Remote Application Server can reduce the costs of an application and virtual desktop delivery solution by more than 60%. Parallels RAS is an easy-to-use, scalable application and desktop delivery solution which has the lowest total cost of ownership amongst its competitors. Considered an industry underdog by many, Parallels Remote Application Server has been in the industry since 2005, and many Citrix customers have already switched to Parallels RAS.
Become an Always-On Enterprise: How 6 Companies Revolutionized Ops to Achieve 24/7 Availability
Digital transformation is dramatically changing how the world interacts. Ensuring your services and applications are always available to employees - and customers - is essential to becoming a digital leader.
Digital transformation is dramatically changing how the world interacts. Ensuring your services and applications are always available to employees - and customers - is essential to becoming a digital leader.

The journey to Always-On application Availability begins with a close examination of your current infrastructure to determine the cause of unwanted downtime. From eliminating data loss and slow data recovery to minimizing risk and decreasing downtime, you can leverage Availability initiatives to jumpstart digital transformation, rapidly adapt to business changes and become an industry leader.

Read this eBook to learn how six companies achieved 24/7 Availability with help from Cisco and Veeam.
Top 5 Backup and DRaaS Considerations to Strengthen Your Multi-Cloud Strategy
Enterprise IT is embracing multi-cloud as the go-to model for cloud deployments. By 2019, nearly 81% of enterprises will have adopted a multi-cloud strategy. While this trend gives organizations more flexibility overall, it puts added pressure on IT teams to manage backup and recovery in a more complex environment.

Enterprise IT is embracing multi-cloud as the go-to model for cloud deployments. By 2019, nearly 81% of enterprises will have adopted a multi-cloud strategy. While this trend gives organizations more flexibility overall, it puts added pressure on IT teams to manage backup and recovery in a more complex environment.

To reduce complexity and lower costs, it is imperative to deploy a single platform that consolidates management for all of your needs - including both on-premises infrastructure and any public cloud platform you choose.

Which features and functions give you the best opportunity for multi-cloud success?

This special white paper, developed in conjunction with TechTarget, outlines the key factors to consider in maximizing your multi-cloud strategy to achieve:

  • Non-stop business continuity
  • Digital transformation agility
  • Analytics and visibility
  • And more!
Ensure business continuity & disaster recovery compliance
In this webinar and demo, you will learn how NEW Veeam® Availability Orchestrator includes everything you need to reduce the time, costs and effort associated with planning for and recovering from a disaster to ensure DR compliance and the continuous delivery of production IT services
In this webinar and demo, you will learn how NEW Veeam Availability Orchestrator includes everything you need to reduce the time, costs and effort associated with planning for and recovering from a disaster to ensure DR compliance and the continuous delivery of production IT services, including:
  • Fully prepared, automatically updated DR documentation to satisfy compliance requirements, ready for C-level executive and stakeholder sign off
  • Automated plan testing and readiness checks to ensure recoverability with zero impact on production systems
  • Reliable failover and failback of multi-site IT services in the event of planned or unplanned downtime
  • And more!
Strayer University Improves End User Computing Experience with IGEL
Strayer University is leveraging the IGEL Universal Desktop Converter (UDC) and IGEL UD3 to provide faculty, administrators and student support staff with seamless and reliable access to their digital workspaces.
As IT operations manager for Strayer University, Scott Behrens spent a lot of time looking at and evaluating endpoint computing solutions when it came to identifying a new way to provide the University’s faculty, administrators and student support staff with a seamless and reliable end user computing experience.

“I looked at various options including traditional desktops, but due to the dispersed nature of our business, I really wanted to find a solution that was both easy to manage and reasonably priced,

especially for our remote locations where we have limited or no IT staff on premise,” said Behrens. “IGEL fit perfectly into this scenario. Because of IGEL’s simplicity, we are able to reduce the time it takes to get one of our locations up and running from a week, to a day, with little support and very little effort.”

Strayer University first began its IGEL deployment in 2016, with a small pilot program of 30 users in the IGEL UDC. The university soon expanded its deployment, adding the IGEL UD3 and then Samsung All-in-One thin clients outfitted with the IGEL OS and IGEL Universal Management Suite (UMS). Strayer University’s IGEL deployment now includes more than 2,000 endpoints at 75 locations across the United States. The university plans to extend its deployment of the IGEL UD3s further as it grows and the need arises to replace aging desktop hardware.
PrinterLogic and IGEL Enable Healthcare Organizations to Deliver Better Patient Outcomes
Healthcare professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information.

Many organizations have turned to virtualizing user endpoints to help reduce capital and operational expenses while increasing security. This is especially true within healthcare, where hospitals, clinics, and urgent care centers seek to offer the best possible patient outcomes while adhering to a variety of mandated patient security and information privacy requirements.

With the movement of desktops and applications into the secure data center or cloud, the need for reliable printing of documents, some very sensitive in nature, remains a constant that can be challenging when desktops are virtual but the printing process remains physical. Directing print jobs to the correct printer with the correct physical access rights in the correct location while ensuring compliance with key healthcare mandates like the General Data Protection Regulation (GDPR) and the Healthcare Insurance Portability and Accountability Act (HIPAA) is critical.

Healthcare IT needs to keep pace with these requirements and the ongoing printing demands of healthcare. Medical professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information. By combining PrinterLogic’s enterprise print management software with centrally managed direct IP printing and IGEL’s software-defined thin client endpoint management, healthcare organizations can:

  • Reduce capital and operational costs
  • Support virtual desktop infrastructure (VDI) and electronic medical records (EMR) systems effectively
  • Centralize and simplify print management
  • Add an essential layer of security from the target printer all the way to the network edge
top25