Deployment Whitepapers


Sort by: Date | Company | Title


The active advantage: Why networking leaders are embracing ADC clustering
By Citrix Systems Asia Pacific | 12/1/2015
This whitepaper shares information about the next generation of ADC deployment and how the importance of that breakthrough rings loud and clear among IT executives. · Data centres finally have a more efficient high-availability deployment option for application delivery controllers · Deploying ADCs in ‘active-active clusters', instead of ‘active-passive’ involves multiple active ADCs sharing the load simultaneously · The latest version of one of the industry’s most respected ADCs is the first to support active-active clustering
Download this now


Vmware Horizon View with Tintri
By Tintri | 9/1/2015
This report documents the results of ESG Lab's hand-on testing of VMware Horizon View 5.1 with the Tintri VMstore platform. Testing focused on performance in the context of the end-user experience in a 1,000 seat virutal desktop environment. In addition, the ease of deployment, manageability, and cost-effectiveness of the Tintri solution in VMware environments were also examined.
Download this now


Backup and recovery best practices with Symantec NetBackup and Tintri Vmstore
By Tintri | 9/1/2015
This Tintri Best Practices Guide for Backup and Recovery will assist individuals who are responsible for the design, deployment, and DR of Tintri VMstore™ Systems. This document will discuss best practices for deploying Symantec NetBackup for data protection leveraging vStorage APIs for Data Protection (VADP) for backups. It also discusses the use of Tintri’s SnapVM™, CloneVM™ and ReplicateVM™ features to complement data protection of virtual machines and critical applications hosted on Tintri’s VMstores with Symantec NetBackup.
Download this now


SQL AlwaysOn Availability Groups (AAG) on Tintri
By Tintri | 9/1/2015
This Best Practices Guide for running SQL Server AlwaysOn Availability Groups on Tintri VMstoreTM systems is intended to assist SQL DBAs, IT Administrators and Architects who are responsible for deploying and managing clustered Microsoft SQL Database servers within their virtual infrastructures powered by Tintri VMstore storage appliances.
Download this now


Deploying Red Hat Enterprise Virtualization on Tintri VMstore Systems best practices guide
By Tintri | 9/1/2015
This Best Practices Guide for deploying Red Hat Enterprise Virtualization (RHEV) on Tintri VMstore systems will assist individuals who are responsible for the design and deployment of Tintri VMstore systems for running RHEV environments. This document will discuss configuration of the Red Hat Enterprise Virtualization Manager (RHEV-M) and configuring host servers in a RHEV cluster, using Tintri per-VM features to deploy, configure and manage data protection of virtual machines (VMs) hosted on Tintri VMstores.
Download this now


Citrix XenDesktop v.7.1 Machine Creation Services (MCS) Deep Dive
By Tintri | 9/1/2015
This paper explores Citrix machine Creation Services (MCS) in Citrix XenDesktop 7.1 deployed on Tintri VM-aware storage and is intended to complement the paper: XenDesktop 7.1 Provisioning & Machine Creation Deep Dive.
Download this now


Why Open Source Hadoop Matters
By Cloudera | 29/10/2014
Today, software for every layer of the enterprise stack is available under a permissive open source license. This whitepaper discusses the benefits and limitations of open source platforms for your business •Understand why all open source platforms are not the same and what to look out for •Find out how to get the baseline and generic business benefits of any platform •Learn how to choose software that will reach a long-term successful deployment
Download this now


The complete guide to log and event management
By Attachmate Australasia | 13/8/2014
Everybody has logs and ultimately will have to deal with them. In this guide, Dr. Anton Chuvakin analyses the relationship between SIEM and log management for a new solution. · Security information and event management (SIEM) emerged in the 1990s, but it has always been controversial · This paper analyses the relationship between SIEM and log management, focusing on technical differences, uses and architecting joint deployments · Dr Chuvakin provides recommendations for companies that have deployed log management or SIEM so they can plot their roadmap for enhancing deployment
Download this now


CA Technologies Strategy and Vision for Cloud Identity and Access Management
By CA Technologies | 29/5/2014
Cloud computing introduces new security challenges for both consumers and providers of cloud services across all types of IT environments. CA’s strategy and vision outlines how to securely provision users, and choose & simplify an IAM deployment models.
Download this now


TechInsights Report: What Smart Businesses Know About DevOps
By CA Technologies | 29/5/2014
Smart companies use DevOps to speed the rollout and quality of new apps and services to market. Read this report to see the findings from a survey of 1300 global IT leaders, including the real benefits a good DevOps strategy can bring to your business.
Download this now