Conquering Rogue Application Behavior in a Terminal Server Environment

Size: px
Start display at page:

Download "Conquering Rogue Application Behavior in a Terminal Server Environment"

Transcription

1 White Paper Conquering Rogue Application Behavior in a Terminal Server Environment Using Application Shaping to ensure reliable, consistent performance and application response times for improved end-user satisfaction Executive Summary Terminal server environments offer numerous benefits including more centralized management of computing resources, wider access to user applications, and greater data security. However, these environments don t come without their own challenges. IT departments are tasked with meeting the performance needs of many users now sharing computing resources. Every application that each user is running must share the CPU resources of the server on which they are running. Sometimes applications go rogue by consuming too many CPU resources. When this happens, all of the users experience sluggish response times and IT administrators must spend time troubleshooting and correcting the issue. Fortunately, there are software solutions that address the problem of rogue applications. Only one solution combines multiple approaches to optimize application performance and maximize CPU resource utilization. RTO Software s TScale solution offers Application Shaping which automates affinity assignments, application priority changes, and CPU load balancing to provide IT administrators with pinpoint application control. With Application Shaping, TScale gives you the tools to overcome problems associated with rogue applications and provide consistent and reliable application performance and responsiveness even during peaks in application demands. Written by: 6120 Windward Parkway Suite 200 Alpharetta, GA info@rtosoft.com

2 Table of Contents Addressing the Problem... 3 Balancing the Benefits and Challenges of Terminal Servers... 3 The Problem of Sharing CPU Resources... 3 Rogue Applications... 3 The Solution... 4 Limiting Solutions... 4 TScale - the Innovative Solution... 4 Why is Application Shaping Necessary and Desirable?... 4 How Does Application Shaping Impact User Experience?... 5 How is Application Shaping Implemented in TScale?... 8 Conclusion... 9 About RTO Software

3 Addressing the Problem Balancing the Benefits and Challenges of Terminal Servers Having gained widespread acceptance, sever-based computing technologies such as Citrix XenApp, Microsoft Terminal Services and now Microsoft Remote Desktop Services provide end users with access to applications from a central set of servers called terminal servers. Terminal servers enable conventional server systems to operate in multi-user mode and extend applications to end-users through thin-client interfaces. Instead of deploying an application to multiple desktops, the IT department makes it available on a server where users can logon and run the application. This centralized application management approach minimizes the complexity of the end-user desktop while maximizing application accessibility, ultimately allowing organizations to lower their total cost of ownership. The challenge to any IT department is to provide the users in the organization with prompt access to new and updated business applications along with acceptable levels of performance. The Terminal Server model delivers on its promise for rapid deployment of applications to all end-users, but the nature of the terminal server environment poses unique challenges in ensuring predictable, reliable performance and application response time. The Problem of Sharing CPU Resources One specific problem is that application components, or instances of applications, can sometimes exhibit behavior that causes all the other applications on the terminal server to pause or run slowly. Quite often, this negative behavior is due to an instance of an application consuming high levels of CPU time. We can split these applications into two categories. The first is made up of legitimate applications that periodically require intensive CPU utilization, such as large spreadsheet macros and recalculations that can take upwards of 5 minutes. The second category is comprised of applications where an instance misbehaves and literally runs away with the CPU resources. Collectively, we call these rogue applications applications that periodically require a high percentage of CPU cycles or consume too many CPU resources. Rogue Applications Applications that go rogue on a single-user desktop PC outside a terminal server environment only impact that individual user. However, in a terminal server environment the effect of rogue applications can be disastrous, because it impacts all of the users on that server. Consider a 40 person call center where time is literally money. What is the financial impact when representatives are unable to process transactions because the terminal server is hung due to a rogue application? In a typical scenario when an application goes rogue on a terminal server: All the users on that terminal server experience sluggishness or non-responsiveness with their applications. Several annoying minutes pass while they wait for the issue to clear up. One or more users will call the IT helpline to complain about performance. IT then opens a case and assigns a resource to troubleshoot the problem. The Citrix/Network admin identifies the specific terminal server(s) with a problem. The Citrix/Network administrator then troubleshoots the server to determine the problematic application or process thread. The bad application/thread is manually terminated, restoring CPU bandwidth back to the users on the system. 3

4 This is obviously a frustrating experience for the users of the applications on the terminal servers, as well as customers who may be impacted by the poor system response. In addition, IT staff must respond to correct the problem, taking them away from planned projects. It is clear that there are significant costs to the organization due to rogue applications. The Solution Limiting Solutions Fortunately, there are software solutions to the problem of rogue applications. One commonly use approach is to lower the priority of an application when it uses too many CPU resources. Lowering the priority of a rogue application will allow other processes to get the CPU resources they need. However, the rogue application could potentially affect each processor and the performance of all applications running on the server. Another commonly used approach is called CPU clamping or CPU throttling. Using this approach, a service runs on the terminal server and literally intervenes in the way the operating system runs by suspending the execution of application threads to limit offending applications to a preset percentage of CPU. Software solutions using this method keep rogue applications from consuming too many CPU resources. However, these solutions miss the mark on maximizing CPU resource utilization. For example, let s say you limit your applications to use no more than 30% of the available CPU resources. If you have several other applications using a total of 50% of the CPU resources when your application goes rogue, your applications will end up using only 80% of the total resources available to them. The other 20% of available resources will be wasted. TScale - the Innovative Solution A unique approach, developed by RTO Software and included in TScale, is called Application Shaping. Application Shaping automates affinity assignments, application priority changes, and CPU load balancing to provide IT administrators with pinpoint application control. With Application Shaping, TScale gives you the tools to overcome problems associated with rogue applications and provide consistent and reliable application performance and responsiveness even during peaks in application demands. Why is Application Shaping Necessary and Desirable? A terminal server environment is typically characterized by many users using many different applications while sharing two or four CPUs on the server. In this environment, if one instance of an application goes rogue or starts to consume more than its fair share of the CPU resources, it will have a very detrimental effect upon the performance that the server delivers to the remaining users and applications. For example, if a typical load on a production terminal server is 40 users of Outlook, 20 users of Internet Explorer, and 30 users of a CRM application load balanced between two CPUs on the server, the distribution would be as depicted in the table below: Application Users on CPU #0 Users on CPU #1 Outlook Internet Explorer CRM

5 As long as each instance of each application is well behaved, a typical modern dual processor server would in general be able to deliver acceptable response times and therefore an acceptable experience to the end users of the system. However, if one instance of IE goes rogue (in some instances, this can occur just by loading a pop-up that contains animation), then that instance of IE can consume virtually all of one of the two CPUs on the server. This leads to two very undesirable consequences: 1. All 20 Outlook users, the other 9 IE users, and all 15 CRM users who share the CPU with the rogue process experience bad performance. 2. As that CPU starts to hang the users of the application on it log off, and log back on again. These logons further stress the entire farm and create load on the other servers, reducing the response time and impacting the user experience across the farm. Note: While we have used Internet Explorer (IE) as a real example, please consider two things: 1) TScale s Application Shaping obviously applies to any application, not just IE, including 64-bit, 32- bit, 16-bit and DOS applications (via NTVDM). 2) IE alone does not typically exhibit rogue behavior. It is the animations, pop-ups and controls frequently used on web pages than can cause problems. Applying Application Shaping to IE controls these problems, and IE is simply used as an example. How Does Application Shaping Impact the User Experience? Application Shaping is an automated approach to dealing with the negative impacts of rogue applications. Application Shaping has three components: Application Affinity This component is used assign all instances of an application to run on a specific CPU on the server. Using Application Affinity for applications that frequently exhibit rogue behavior ensures that when rogue instances occur only one CPU is impacted. The remaining CPUs on that server will continue servicing the other users, optimizing performance for all applications running on the server. You can also use this feature to effectively partition a machine so that certain applications have access to only certain resources. Application Priority With Application Priority, Administrators can define the circumstances in which a potential rogue application is allowed to use CPU resources. TScale will lower an application s priority when it consumes CPU resources beyond its set threshold. Lowering the application priority allows other applications to get the CPU resources they need. If there are still remaining resources, the rogue application may use those additional resources after waiting its turn. Thus, TScale maximizes CPU resource utilization based on user demand rather than limiting CPU utilization based on strict CPU clamping rules. Dynamic CPU Balancing Many client applications work better on a single processor than on multiple processors. TScale s Dynamic CPU Balancing applies the most efficient affinity scheme for running processes, causing applications that perform more efficiently on a single processor to operate on a single processor while not limiting all instances of the application to a single processor. 5

6 TScale automatically assigns applications to run on the least-busy processor, balancing the server work load. Dynamic CPU Balancing also confines multi-threaded applications to one processor and restricts individual threads from consuming resources on all CPUs. Visibly Improved Response Times Together these approaches allow you to eliminate the impacts of rogue applications upon your terminal servers and deliver a superior user experience. When you add the benefits of TScale s Application Shaping to the benefits of TScale s Application Optimization features that have been in TScale since its inception, you get the results depicted in the diagrams below. (To learn more about TScale s Application Optimization and view other whitepapers or demos, please visit our web site Before TScale 6

7 After TScale 7

8 How is Application Shaping Implemented in TScale? Configuring Application Shaping and control rogue applications is easily accomplished using the TScale Optimization Console. TScale s Optimization Console is a graphical user interface that allows administrators to manage all the TScale Agents installed on servers across the entire server farm in one application. TScale s Application Shaping is extremely flexible and configurable, allowing administrators to setup shaping policies which can be applied to individual servers, groups of servers, or the entire server farm. It is possible to individually specify shaping parameters for any number of applications or to name a default *.* process so that any application reaching certain levels of processor usage will be subject to shaping. TScale s Application Shaping gives administrators a great deal of granular control over the applications running on each server. When configuring Application Affinity, the administrator specifies which of the n CPUs on that server all instances of a process will run. Now when that application goes rogue, only the assigned CPU will be affected. For Application Priority, administrators set the threshold for TScale to lower the priority of an application after it has used x% of the CPU for n minutes and seconds. This allows other user applications to get the CPU resources they need, enhancing the application performance for all users. When using Dynamic CPU Balancing, administrators can also further specify which of the n CPUs on which applications can run. Applications that benefit from running on a single processor will see a performance gain. 8

9 Conclusion IT departments are responsible for providing consistent, reliable performance of key applications to the endusers. Organizations using Citrix XenApp, Microsoft Terminal Services, and/or Microsoft Remote Desktop Services in their business require robust tools to ensure peak system performance and prevent rogue applications from causing system freezes and sluggishness. Only TScale combines the benefits of both Application Shaping and Application Optimization into one easy to use and easy to administer product. With TScale you can deliver the following benefits to the users of your terminal server farm: Applications will perform better during periods of peak demand or high workload, resulting in better overall user experiences and less money spent on headroom and server redundancy. You will be able to comfortably support more concurrent users per server. Rogue applications will be constrained from consuming all server CPU resources so users will enjoy a more consistent application operation. Administration and help desk resources will be better utilized, as it will no longer be necessary to manually terminate rogue processes. About RTO Software RTO Software, Inc. is an established provider of application-focused performance management tools. As an innovative leader in this rapidly growing area, RTO provides software solutions to enterprises and software firms that want to improve the performance and capacity of applications operating in a Windows environment. RTO s solutions are used on thousands of servers around the world in a variety of industries, including financial management, manufacturing, healthcare, telecommunications, and government. RTO Software is based in Alpharetta, Georgia. For more information and to obtain a free evaluation version of TScale, please visit RTO Software at or call at RTO Software, Inc. Revised edition. All rights reserved. The information contained in this document represents the current view of RTO on the issues discussed as of the date of publication. Because RTO must respond to changing market conditions, it should not be interpreted to be a commitment on the part of RTO, and RTO cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. RTO MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. TScale is a registered trademark of RTO Software. Other product or company names mentioned herein may be the trademarks and/or registered trademarks of their respective owners. 9

Oracle Database 10g Resource Manager. An Oracle White Paper October 2005

Oracle Database 10g Resource Manager. An Oracle White Paper October 2005 Oracle Database 10g Resource Manager An Oracle White Paper October 2005 Oracle Database 10g Resource Manager INTRODUCTION... 3 SYSTEM AND RESOURCE MANAGEMENT... 3 ESTABLISHING RESOURCE PLANS AND POLICIES...

More information

Measuring VDI Fitness and User Experience Technical White Paper

Measuring VDI Fitness and User Experience Technical White Paper Measuring VDI Fitness and User Experience Technical White Paper 3600 Mansell Road Suite 200 Alpharetta, GA 30022 866.914.9665 main 678.397.0339 fax info@liquidwarelabs.com www.liquidwarelabs.com Table

More information

Closing The Application Performance Visibility Gap Inherent To Citrix Environments

Closing The Application Performance Visibility Gap Inherent To Citrix Environments WHITE PAPER: COMPUWARE APM FOR CITRIX XenApp/ XenDesktop Closing The Application Performance Visibility Gap Inherent To Citrix Environments Many companies have invested in Citrix XenApp and XenDesktop

More information

1Y0-A22 Exam Questions Demo Citrix. Exam Questions 1Y0-A22. Citrix XenApp 6.5 Advanced Administration

1Y0-A22 Exam Questions Demo   Citrix. Exam Questions 1Y0-A22. Citrix XenApp 6.5 Advanced Administration Citrix Exam Questions 1Y0-A22 Citrix XenApp 6.5 Advanced Administration Version:Demo 1. Scenario: A XenApp Administrator of a 100-server farm needs to apply Citrix and vendor hotfixes on a monthly basis,

More information

Planning Guide for Deploying Relevos For First-time Users

Planning Guide for Deploying Relevos For First-time Users Relevos Planning Guide for Deploying Relevos For First-time Users www.wmsoftware.com/relevos Contents Installation... 1 Setup... 2 Licensing... 3 Hardware and Software Requirements... 5 1 Installation

More information

Comprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System

Comprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System Solution Brief HDX Insight powered by Citrix Comprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System HDX Insight is the only tool in the market that provides endto-end

More information

Proactive Performance Monitoring for Citrix XenApp & XenDesktop

Proactive Performance Monitoring for Citrix XenApp & XenDesktop Proactive Performance Monitoring for Citrix XenApp & XenDesktop TECHNOLOGY OVERVIEW In approximately one week, support tickets dropped by 25% Our customers were complaining about persistent slowness with

More information

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, 2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered

More information

SysTrack 3 Lakeside Software

SysTrack 3 Lakeside Software SysTrack 3 Lakeside Software Written By: Douglas A. Brown dbrown@dabcc.com Introduction Do you know how many users you can fit on a box? Would you like to see trending over a specified period of time?

More information

Real-time Protection for Microsoft Hyper-V

Real-time Protection for Microsoft Hyper-V Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Monitoring Citrix XenDesktop Director

Monitoring Citrix XenDesktop Director Monitoring Citrix XenDesktop Director eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document

More information

Installing Acumen Fuse in a Citrix XenApp Environment

Installing Acumen Fuse in a Citrix XenApp Environment Installing Acumen Fuse in a Citrix XenApp Environment Requirements The XenApp servers should run Windows Server 2003 Service Pack 2, 2003 R2 or 2008 or 2008 R2 or greater. The servers must also have the

More information

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.

More information

Virtualizing the SAP Infrastructure through Grid Technology. WHITE PAPER March 2007

Virtualizing the SAP Infrastructure through Grid Technology. WHITE PAPER March 2007 Virtualizing the SAP Infrastructure through Grid Technology WHITE PAPER March 2007 TABLE OF CONTENTS TABLE OF CONTENTS 2 Introduction 3 The Complexity of the SAP Landscape 3 Specific Pain Areas 4 Virtualizing

More information

VMware Horizon View. VMware Horizon View with Tintri VMstore. TECHNICAL SOLUTION OVERVIEW, Revision 1.1, January 2013

VMware Horizon View. VMware Horizon View with Tintri VMstore. TECHNICAL SOLUTION OVERVIEW, Revision 1.1, January 2013 VMware Horizon View VMware Horizon View with Tintri VMstore TECHNICAL SOLUTION OVERVIEW, Revision 1.1, January 2013 Table of Contents Introduction... 1 Before VDI and VMware Horizon View... 1 Critical

More information

Best Practices for Alert Tuning. This white paper will provide best practices for alert tuning to ensure two related outcomes:

Best Practices for Alert Tuning. This white paper will provide best practices for alert tuning to ensure two related outcomes: This white paper will provide best practices for alert tuning to ensure two related outcomes: 1. Monitoring is in place to catch critical conditions and alert the right people 2. Noise is reduced and people

More information

ROI CASE STUDIES. Case Study Forum. Credit Union Reduces Network Congestion, Improves Productivity, and Gains More than $800,000 in Benefits with

ROI CASE STUDIES. Case Study Forum. Credit Union Reduces Network Congestion, Improves Productivity, and Gains More than $800,000 in Benefits with HIGHLIGHTS Goal: For a credit union to monitor and troubleshoot its network in order to improve the reliability and speed of connections to its branch offices, and gain total network visibility from the

More information

Closing the Application Performance Visibility Gap Inherent to Citrix Environments

Closing the Application Performance Visibility Gap Inherent to Citrix Environments Closing the Application Performance Visibility Gap Inherent to Citrix Environments Table of contents Page Chapter 3 4 5 5 6 8 9 11 12 Executive summary Introduction What is a Citrix environment? The challenges

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-A25 Title : Engineering a Citrix Virtualization Solution Exam Vendors : Citrix Version : DEMO 1 / 4 Get Latest

More information

Deploying VSaaS and Hosted Solutions using CompleteView

Deploying VSaaS and Hosted Solutions using CompleteView SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architectures. Salient Systems

More information

Jim Metzler. Introduction. The Role of an ADC

Jim Metzler. Introduction. The Role of an ADC November 2009 Jim Metzler Ashton, Metzler & Associates jim@ashtonmetzler.com Introduction In any economic environment a company s senior management expects that their IT organization will continually look

More information

Endpoint Security and Virtualization. Darren Niller Product Management Director May 2012

Endpoint Security and Virtualization. Darren Niller Product Management Director May 2012 Endpoint Security and Virtualization Darren Niller Product Management Director May 2012 Table of contents Introduction... 3 Traditional Security Approach: Counteracts Virtual Performance Gains... 3 Agent-less

More information

Whitepaper. Comprehensive Print Management in a Healthcare Environment

Whitepaper. Comprehensive Print Management in a Healthcare Environment Whitepaper Comprehensive Print Management in a Healthcare Environment Introduction Health IT executives are moving away from traditional computing devices for mobile applications, with 87% reporting that

More information

CUSTOMER SUCCESS STORY GRIMME GRIMME IMPROVES WORKFLOWS AND REDUCES COSTS BY MORE THAN 40% WITH NVIDIA VIRTUAL GPU

CUSTOMER SUCCESS STORY GRIMME GRIMME IMPROVES WORKFLOWS AND REDUCES COSTS BY MORE THAN 40% WITH NVIDIA VIRTUAL GPU GRIMME IMPROVES WORKFLOWS AND REDUCES COSTS BY MORE THAN 40% WITH NVIDIA VIRTUAL GPU Cost efficiences inspire expanded rollout of virtualized workstations and desktops. ABOUT GRIMME FIVE REASONS FOR NVIDIA

More information

Terminal Services Scalability Study

Terminal Services Scalability Study Terminal Services Scalability Study Part 1 The Effect of CPS 4.0 Microsoft Windows Terminal Services Citrix Presentation Server 4.0 June 2007 Table of Contents 1 Executive summary 3 2 Introduction 4 2.1

More information

Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Planning Guide: Hosted VM-Based Resource Allocation

Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Planning Guide: Hosted VM-Based Resource Allocation Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Planning Guide: Hosted VM-Based Resource Allocation www.citrix.com Overview One of the first things that must be determined with designing

More information

Virtuozzo Containers

Virtuozzo Containers Parallels Virtuozzo Containers White Paper An Introduction to Operating System Virtualization and Parallels Containers www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3

More information

System Requirements and Implementation Options

System Requirements and Implementation Options Choose a building block. Governance, Risk & Compliance System Requirements and Implementation Options ComplianceOne Solution Governance, Risk & Compliance System Requirements and Implementation Options

More information

Immidio White Paper Things You Always Wanted To Know About Windows Profile Management

Immidio White Paper Things You Always Wanted To Know About Windows Profile Management Immidio White Paper Things You Always Wanted To Know About Windows Profile Management Abstract Why are Windows user profiles so critically important for corporate IT environments and how can they be managed

More information

Key Considerations for Improving Performance And Virtualization in Microsoft SQL Server Environments

Key Considerations for Improving Performance And Virtualization in Microsoft SQL Server Environments Key Considerations for Improving Performance And Virtualization in Microsoft SQL Server Environments Table of Contents Maximizing Performance in SQL Server Environments............... 4 Focusing on Hardware...........................................

More information

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for

More information

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo White Paper Deploying Application and OS Virtualization Together: Citrix and Virtuozzo www.swsoft.com Version 1.0 Table of Contents The Virtualization Continuum: Deploying Virtualization Together... 3

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization

More information

Whitepaper. 10 Reasons to Move to the Cloud

Whitepaper. 10 Reasons to Move to the Cloud Whitepaper 10 Reasons to Move to the Cloud 2 10 Reasons to Move to the Cloud 10 Reasons to Move to the Cloud and Why It Will Be the Best Business Decision You Will Ever Make RapidScale s CloudOffice is

More information

WHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management

WHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management WHITE PAPER: ENTERPRISE AVAILABILITY Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management White Paper: Enterprise Availability Introduction to Adaptive

More information

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009

More information

Goliath Technology Overview with MEDITECH Module

Goliath Technology Overview with MEDITECH Module Customers # 324 Fortune 500 Goliath Technology Overview with MEDITECH Module In approximately one week, support tickets dropped by 25% z Our Customers were complaining about persistent slowness with Citrix.

More information

for Power Energy and

for Power Energy and Engineered for Power Management: Dell PowerEdge Servers Are Designed to Help Save Energy and Reduce Costs ABSTRACT Keeping up with the rising cost of energy is one of the greatest challenges facing IT

More information

Installing and Configuring Citrix XenApp 6.5 (Part 1)

Installing and Configuring Citrix XenApp 6.5 (Part 1) Installing and Configuring Citrix XenApp 6.5 (Part 1) Introduction The first part of this series describes the installation steps of the first server (which will create the XenApp environment) and the

More information

Taking Hyper-converged Infrastructure to a New Level of Performance, Efficiency and TCO

Taking Hyper-converged Infrastructure to a New Level of Performance, Efficiency and TCO Taking Hyper-converged Infrastructure to a New Level of Performance, Efficiency and TCO Adoption of hyper-converged infrastructure is rapidly expanding, but the technology needs a new twist in order to

More information

Digital Workspace SHOWDOWN

Digital Workspace SHOWDOWN Digital Workspace SHOWDOWN Why Citrix Workspace is a better choice than VMware Workspace ONE Take a closer look at the dozen ways that Citrix Workspace outperforms VMware Workspace ONE. Today s workers

More information

QLE10000 Series Adapter Provides Application Benefits Through I/O Caching

QLE10000 Series Adapter Provides Application Benefits Through I/O Caching QLE10000 Series Adapter Provides Application Benefits Through I/O Caching QLogic Caching Technology Delivers Scalable Performance to Enterprise Applications Key Findings The QLogic 10000 Series 8Gb Fibre

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email

More information

Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp Planning Guide: Virtualization Best Practices

Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp Planning Guide: Virtualization Best Practices Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp Planning Guide: Virtualization Best Practices www.citrix.com Overview Desktop virtualization comprises of many different types of virtual desktops.

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Implementing and Supporting Windows Intune

Implementing and Supporting Windows Intune Implementing and Supporting Windows Intune Module 1: Windows Intune Overview Module Overview Challenges in Managing Business PCs Introducing Windows Intune Managing and Securing PCs in Any Location by

More information

Design and deliver cloud-based apps and data for flexible, on-demand IT

Design and deliver cloud-based apps and data for flexible, on-demand IT White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to

More information

B.H.GARDI COLLEGE OF ENGINEERING & TECHNOLOGY (MCA Dept.) Parallel Database Database Management System - 2

B.H.GARDI COLLEGE OF ENGINEERING & TECHNOLOGY (MCA Dept.) Parallel Database Database Management System - 2 Introduction :- Today single CPU based architecture is not capable enough for the modern database that are required to handle more demanding and complex requirements of the users, for example, high performance,

More information

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT ARE YOU REALLY READY TO EXECUTE A GLOBAL IOT STRATEGY? Increased demand driven by long-term trends of the Internet of Things, WLAN, connected LED

More information

An ESRI White Paper June 2009 ArcGIS Server and Virtualization

An ESRI White Paper June 2009 ArcGIS Server and Virtualization An ESRI White Paper June 2009 ArcGIS Server and Virtualization ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2009

More information

2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or

2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Citrix 1Y1-A15. Engineering a Citrix Virtualization(R) Solution.

Citrix 1Y1-A15. Engineering a Citrix Virtualization(R) Solution. Citrix 1Y1-A15 Engineering a Citrix Virtualization(R) Solution http://killexams.com/exam-detail/1y1-a15 B. CdsController.exe.config C. Presentation Server Console D. Access Management Console Answer: A

More information

Optimizing Tiered Storage Workloads with Precise for Storage Tiering

Optimizing Tiered Storage Workloads with Precise for Storage Tiering Applied Technology Abstract By introducing Enterprise Flash Drives to EMC Symmetrix and CLARiiON storage systems, EMC revitalized the importance of tiered storage. Optimizing the use of these tiers provides

More information

Voice, Video and Data Convergence:

Voice, Video and Data Convergence: : A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information

More information

An Oracle White Paper March Consolidation Using the Oracle SPARC M5-32 High End Server

An Oracle White Paper March Consolidation Using the Oracle SPARC M5-32 High End Server An Oracle White Paper March 2013 Consolidation Using the Oracle SPARC M5-32 High End Server Executive Overview... 1 Why Server and Application Consolidation?... 2 Requirements for Consolidation... 3 Consolidation

More information

HPE SimpliVity 380. Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager

HPE SimpliVity 380. Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager HPE SimpliVity 380 Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager We ve seen flash evolve at a record pace 61% Have already deployed all-flash in some level and are increasing

More information

A TimeSys Perspective on the Linux Preemptible Kernel Version 1.0. White Paper

A TimeSys Perspective on the Linux Preemptible Kernel Version 1.0. White Paper A TimeSys Perspective on the Linux Preemptible Kernel Version 1.0 White Paper A TimeSys Perspective on the Linux Preemptible Kernel A White Paper from TimeSys Corporation Introduction One of the most basic

More information

Load Balancing 101: Nuts and Bolts

Load Balancing 101: Nuts and Bolts Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today's Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it

More information

VMWARE PROTECTION WITH DELL EMC NETWORKER 9

VMWARE PROTECTION WITH DELL EMC NETWORKER 9 VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture

More information

How can you manage what you can t see?

How can you manage what you can t see? How can you manage what you can t see? Know what you have with Panda Cloud Systems Management Business challenge: You can t manage it if you don t know it exists. Do you have 100% permanent visibility

More information

Composable Infrastructure for Public Cloud Service Providers

Composable Infrastructure for Public Cloud Service Providers Composable Infrastructure for Public Cloud Service Providers Composable Infrastructure Delivers a Cost Effective, High Performance Platform for Big Data in the Cloud How can a public cloud provider offer

More information

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users

More information

IMPROVING THE PERFORMANCE, INTEGRITY, AND MANAGEABILITY OF PHYSICAL STORAGE IN DB2 DATABASES

IMPROVING THE PERFORMANCE, INTEGRITY, AND MANAGEABILITY OF PHYSICAL STORAGE IN DB2 DATABASES IMPROVING THE PERFORMANCE, INTEGRITY, AND MANAGEABILITY OF PHYSICAL STORAGE IN DB2 DATABASES Ram Narayanan August 22, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS The Database Administrator s Challenge

More information

Engineering a Citrix Virtualization Solution Exam

Engineering a Citrix Virtualization Solution Exam Citrix 1Y0-A25 Engineering a Citrix Virtualization Solution Exam Version: 4.0 QUESTION NO: 1 Citrix 1Y0-A25 Exam Scenario: A Citrix Engineer is configuring a new XenApp 6.5 farm in order to provide the

More information

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React

More information

How Microsoft IT Reduced Operating Expenses Using Virtualization

How Microsoft IT Reduced Operating Expenses Using Virtualization How Microsoft IT Reduced Operating Expenses Using Virtualization Published: May 2010 The following content may no longer reflect Microsoft s current position or infrastructure. This content should be viewed

More information

Enterprise Planning Large Scale

Enterprise Planning Large Scale Enterprise Planning Large Scale ARGUS Enterprise 11.6.0 3/8/2017 ARGUS Software An Altus Group Company Large Enterprise Planning Guide ARGUS Enterprise 11.6.0 3/8/2017 Published by: ARGUS Software, Inc.

More information

Admin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console

Admin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console WHITE PAPER Managing Distributed Backup Servers VERITAS Backup Exec TM 9.0 for Windows Servers Admin Plus Pack Option ExecView Web Console Backup Exec Admin Console VERSION INCLUDES TABLE OF CONTENTS STYLES

More information

Dell Dynamic Power Mode: An Introduction to Power Limits

Dell Dynamic Power Mode: An Introduction to Power Limits Dell Dynamic Power Mode: An Introduction to Power Limits By: Alex Shows, Client Performance Engineering Managing system power is critical to balancing performance, battery life, and operating temperatures.

More information

NTP Software File Reporter Data Collection Agent for Windows

NTP Software File Reporter Data Collection Agent for Windows NTP Software File Reporter Data Collection Agent for Windows Installation Guide Version 8.1 This guide provides quick instructions for the installation and initial configuration of NTP Software Data Collection

More information

Enterprise Planning Large Scale

Enterprise Planning Large Scale Enterprise Planning Large Scale 11.7.0 12/13/2017 11.7.0 12/13/2017 Published by: ARGUS Software, Inc. 750 Town and Country Blvd Suite 800 Houston, TX 77024 Telephone (713) 621-4343 Facsimile (713) 621-2787

More information

CENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC

CENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC CENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC EXECUTIVE SUMMARY The PowerVault DL2100 Powered by Symantec Backup Exec offers the industry s only fully integrated backup-to-disk solution

More information

Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp 6.x Planning Guide: Virtualization Best Practices

Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp 6.x Planning Guide: Virtualization Best Practices Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp 6.x Planning Guide: Virtualization Best Practices www.citrix.com Table of Contents Overview... 3 Scalability... 3 Guidelines... 4 Operations...

More information

Elite IPK II. The Power To Extend Your Reach Is Now Within Reach. Migrate To A Pure IP Communications Solution At Your Own Pace. Low Cost of Ownership

Elite IPK II. The Power To Extend Your Reach Is Now Within Reach. Migrate To A Pure IP Communications Solution At Your Own Pace. Low Cost of Ownership The Power To Extend Your Reach Is Now Within Reach Elite IPK II Migrate To A Pure IP Communications Solution At Your Own Pace The Elite IPK II Value Proposition Low Cost of Ownership Flexible/Scalable

More information

Massive Scalability With InterSystems IRIS Data Platform

Massive Scalability With InterSystems IRIS Data Platform Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special

More information

INTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER

INTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER WHITE PAPER INTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER REALIZING VIRTUALIZATION S FULL POTENTIAL Hypervisor-based virtualization offers enterprises opportunities for cost savings, increased

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

Top 5 Reasons to Consider

Top 5 Reasons to Consider Top 5 Reasons to Consider NVM Express over Fabrics For Your Cloud Data Center White Paper Top 5 Reasons to Consider NVM Express over Fabrics For Your Cloud Data Center Major transformations are occurring

More information

Delivering. Effective Element Management Networks

Delivering. Effective Element Management Networks Delivering Effective Element Management RELIABLE for Networks Reducing Costs While Improving NETWORK PERFORMANCE is the PROBLEM NODE D NODE D NODE E Central Office B Central Office A NODE D Central Office

More information

Announcements. Reading. Project #1 due in 1 week at 5:00 pm Scheduling Chapter 6 (6 th ed) or Chapter 5 (8 th ed) CMSC 412 S14 (lect 5)

Announcements. Reading. Project #1 due in 1 week at 5:00 pm Scheduling Chapter 6 (6 th ed) or Chapter 5 (8 th ed) CMSC 412 S14 (lect 5) Announcements Reading Project #1 due in 1 week at 5:00 pm Scheduling Chapter 6 (6 th ed) or Chapter 5 (8 th ed) 1 Relationship between Kernel mod and User Mode User Process Kernel System Calls User Process

More information

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Publication Date: June 12, 2012 Abstract EventTracker allows you to effectively manage your systems and provides operational efficiencies

More information

A Guide to Closing All Potential VDI Security Gaps

A Guide to Closing All Potential VDI Security Gaps Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse

More information

Monitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins

Monitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins Monitoring Tool Made to Measure for SharePoint Admins By Stacy Simpkins Contents About the Author... 3 Introduction... 4 Who s it for and what all can it do?... 4 SysKit Insights Features... 6 Drillable

More information

Maximizing Availability With Hyper-Converged Infrastructure

Maximizing Availability With Hyper-Converged Infrastructure Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here

More information

Goliath Performance Monitor Frequently Asked Questions: Citrix XenServer

Goliath Performance Monitor Frequently Asked Questions: Citrix XenServer Goliath Performance Monitor Frequently Asked Questions: Citrix XenServer Document Date: May 2015 www.goliathtechnologies.com Legal Notices Inc. All rights reserved. www.goliathtechnologies.com Goliath

More information

Data Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM

Data Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM Rethinking Data Protection Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM Today s Reality: The Rules of the Game Have Changed for Data Protection EXPLOSION OF DATA DATA EVERYWHERE

More information

Introduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are:

Introduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are: 1 CHAPTER Introduction Practice Exercises 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are: To provide an environment for a computer user to execute programs

More information

The Benefits of Wireless Infrastructure Management in the Cloud

The Benefits of Wireless Infrastructure Management in the Cloud WHITE PAPER The Benefits of Wireless Infrastructure Management in the Cloud High Performance Wireless Networks The Benefits of Wireless Infrastructure Management in the Cloud How the cloud maximizes IT

More information

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)

More information

Whitepaper. 10 Reasons to Move to the Cloud

Whitepaper. 10 Reasons to Move to the Cloud Whitepaper 10 Reasons to Move to the Cloud 2 10 Reasons to Move to the Cloud 10 Reasons to Move to the Cloud and Why It Will Be the Best Business Decision You Will Ever Make Convergia s CloudOffice is

More information

TSPLUS PRODUCTS CATALOG RDP Software Editor 1

TSPLUS PRODUCTS CATALOG RDP Software Editor 1 TSPLUS PRODUCTS CATALOG RDP Software Editor 1 Visit our page www.terminalserviceplus.com Have a look at the various features that TSplus offers, try our Demo sessions, check our tutorial videos, ask for

More information

VMware VMware View. RSA Secured Implementation Guide for RSA DLP Endpoint VDI. Partner Information. Last Modified: March 27 th, 2014

VMware VMware View. RSA Secured Implementation Guide for RSA DLP Endpoint VDI. Partner Information. Last Modified: March 27 th, 2014 RSA Secured Implementation Guide for RSA DLP Endpoint VDI Partner Information Last Modified: March 27 th, 2014 Product Information Partner Name VMware Web Site www.vmware.com Product Name Version & Platform

More information

Java Without the Jitter

Java Without the Jitter TECHNOLOGY WHITE PAPER Achieving Ultra-Low Latency Table of Contents Executive Summary... 3 Introduction... 4 Why Java Pauses Can t Be Tuned Away.... 5 Modern Servers Have Huge Capacities Why Hasn t Latency

More information

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,

More information

NTP Software File Reporter Analysis Server

NTP Software File Reporter Analysis Server NTP Software File Reporter Analysis Server Installation Guide Version 8.2 This guide provides quick instructions for installing NTP Software File Reporter Analysis Server from an administrator s perspective.

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Enhanced Intelligent QoS

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Enhanced Intelligent QoS Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Enhanced Intelligent QoS Keywords: Hillstone T-Series Intelligent Next-Generation Firewall (ingfw), Enhanced Intelligent QoS (iqos),,

More information

Machine-Powered Learning for People-Centered Security

Machine-Powered Learning for People-Centered Security White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today

More information

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE Most application performance problems surface during peak loads. Often times, these problems are time and resource intensive,

More information