Conquering Rogue Application Behavior in a Terminal Server Environment
|
|
- Naomi Ray
- 5 years ago
- Views:
Transcription
1 White Paper Conquering Rogue Application Behavior in a Terminal Server Environment Using Application Shaping to ensure reliable, consistent performance and application response times for improved end-user satisfaction Executive Summary Terminal server environments offer numerous benefits including more centralized management of computing resources, wider access to user applications, and greater data security. However, these environments don t come without their own challenges. IT departments are tasked with meeting the performance needs of many users now sharing computing resources. Every application that each user is running must share the CPU resources of the server on which they are running. Sometimes applications go rogue by consuming too many CPU resources. When this happens, all of the users experience sluggish response times and IT administrators must spend time troubleshooting and correcting the issue. Fortunately, there are software solutions that address the problem of rogue applications. Only one solution combines multiple approaches to optimize application performance and maximize CPU resource utilization. RTO Software s TScale solution offers Application Shaping which automates affinity assignments, application priority changes, and CPU load balancing to provide IT administrators with pinpoint application control. With Application Shaping, TScale gives you the tools to overcome problems associated with rogue applications and provide consistent and reliable application performance and responsiveness even during peaks in application demands. Written by: 6120 Windward Parkway Suite 200 Alpharetta, GA info@rtosoft.com
2 Table of Contents Addressing the Problem... 3 Balancing the Benefits and Challenges of Terminal Servers... 3 The Problem of Sharing CPU Resources... 3 Rogue Applications... 3 The Solution... 4 Limiting Solutions... 4 TScale - the Innovative Solution... 4 Why is Application Shaping Necessary and Desirable?... 4 How Does Application Shaping Impact User Experience?... 5 How is Application Shaping Implemented in TScale?... 8 Conclusion... 9 About RTO Software
3 Addressing the Problem Balancing the Benefits and Challenges of Terminal Servers Having gained widespread acceptance, sever-based computing technologies such as Citrix XenApp, Microsoft Terminal Services and now Microsoft Remote Desktop Services provide end users with access to applications from a central set of servers called terminal servers. Terminal servers enable conventional server systems to operate in multi-user mode and extend applications to end-users through thin-client interfaces. Instead of deploying an application to multiple desktops, the IT department makes it available on a server where users can logon and run the application. This centralized application management approach minimizes the complexity of the end-user desktop while maximizing application accessibility, ultimately allowing organizations to lower their total cost of ownership. The challenge to any IT department is to provide the users in the organization with prompt access to new and updated business applications along with acceptable levels of performance. The Terminal Server model delivers on its promise for rapid deployment of applications to all end-users, but the nature of the terminal server environment poses unique challenges in ensuring predictable, reliable performance and application response time. The Problem of Sharing CPU Resources One specific problem is that application components, or instances of applications, can sometimes exhibit behavior that causes all the other applications on the terminal server to pause or run slowly. Quite often, this negative behavior is due to an instance of an application consuming high levels of CPU time. We can split these applications into two categories. The first is made up of legitimate applications that periodically require intensive CPU utilization, such as large spreadsheet macros and recalculations that can take upwards of 5 minutes. The second category is comprised of applications where an instance misbehaves and literally runs away with the CPU resources. Collectively, we call these rogue applications applications that periodically require a high percentage of CPU cycles or consume too many CPU resources. Rogue Applications Applications that go rogue on a single-user desktop PC outside a terminal server environment only impact that individual user. However, in a terminal server environment the effect of rogue applications can be disastrous, because it impacts all of the users on that server. Consider a 40 person call center where time is literally money. What is the financial impact when representatives are unable to process transactions because the terminal server is hung due to a rogue application? In a typical scenario when an application goes rogue on a terminal server: All the users on that terminal server experience sluggishness or non-responsiveness with their applications. Several annoying minutes pass while they wait for the issue to clear up. One or more users will call the IT helpline to complain about performance. IT then opens a case and assigns a resource to troubleshoot the problem. The Citrix/Network admin identifies the specific terminal server(s) with a problem. The Citrix/Network administrator then troubleshoots the server to determine the problematic application or process thread. The bad application/thread is manually terminated, restoring CPU bandwidth back to the users on the system. 3
4 This is obviously a frustrating experience for the users of the applications on the terminal servers, as well as customers who may be impacted by the poor system response. In addition, IT staff must respond to correct the problem, taking them away from planned projects. It is clear that there are significant costs to the organization due to rogue applications. The Solution Limiting Solutions Fortunately, there are software solutions to the problem of rogue applications. One commonly use approach is to lower the priority of an application when it uses too many CPU resources. Lowering the priority of a rogue application will allow other processes to get the CPU resources they need. However, the rogue application could potentially affect each processor and the performance of all applications running on the server. Another commonly used approach is called CPU clamping or CPU throttling. Using this approach, a service runs on the terminal server and literally intervenes in the way the operating system runs by suspending the execution of application threads to limit offending applications to a preset percentage of CPU. Software solutions using this method keep rogue applications from consuming too many CPU resources. However, these solutions miss the mark on maximizing CPU resource utilization. For example, let s say you limit your applications to use no more than 30% of the available CPU resources. If you have several other applications using a total of 50% of the CPU resources when your application goes rogue, your applications will end up using only 80% of the total resources available to them. The other 20% of available resources will be wasted. TScale - the Innovative Solution A unique approach, developed by RTO Software and included in TScale, is called Application Shaping. Application Shaping automates affinity assignments, application priority changes, and CPU load balancing to provide IT administrators with pinpoint application control. With Application Shaping, TScale gives you the tools to overcome problems associated with rogue applications and provide consistent and reliable application performance and responsiveness even during peaks in application demands. Why is Application Shaping Necessary and Desirable? A terminal server environment is typically characterized by many users using many different applications while sharing two or four CPUs on the server. In this environment, if one instance of an application goes rogue or starts to consume more than its fair share of the CPU resources, it will have a very detrimental effect upon the performance that the server delivers to the remaining users and applications. For example, if a typical load on a production terminal server is 40 users of Outlook, 20 users of Internet Explorer, and 30 users of a CRM application load balanced between two CPUs on the server, the distribution would be as depicted in the table below: Application Users on CPU #0 Users on CPU #1 Outlook Internet Explorer CRM
5 As long as each instance of each application is well behaved, a typical modern dual processor server would in general be able to deliver acceptable response times and therefore an acceptable experience to the end users of the system. However, if one instance of IE goes rogue (in some instances, this can occur just by loading a pop-up that contains animation), then that instance of IE can consume virtually all of one of the two CPUs on the server. This leads to two very undesirable consequences: 1. All 20 Outlook users, the other 9 IE users, and all 15 CRM users who share the CPU with the rogue process experience bad performance. 2. As that CPU starts to hang the users of the application on it log off, and log back on again. These logons further stress the entire farm and create load on the other servers, reducing the response time and impacting the user experience across the farm. Note: While we have used Internet Explorer (IE) as a real example, please consider two things: 1) TScale s Application Shaping obviously applies to any application, not just IE, including 64-bit, 32- bit, 16-bit and DOS applications (via NTVDM). 2) IE alone does not typically exhibit rogue behavior. It is the animations, pop-ups and controls frequently used on web pages than can cause problems. Applying Application Shaping to IE controls these problems, and IE is simply used as an example. How Does Application Shaping Impact the User Experience? Application Shaping is an automated approach to dealing with the negative impacts of rogue applications. Application Shaping has three components: Application Affinity This component is used assign all instances of an application to run on a specific CPU on the server. Using Application Affinity for applications that frequently exhibit rogue behavior ensures that when rogue instances occur only one CPU is impacted. The remaining CPUs on that server will continue servicing the other users, optimizing performance for all applications running on the server. You can also use this feature to effectively partition a machine so that certain applications have access to only certain resources. Application Priority With Application Priority, Administrators can define the circumstances in which a potential rogue application is allowed to use CPU resources. TScale will lower an application s priority when it consumes CPU resources beyond its set threshold. Lowering the application priority allows other applications to get the CPU resources they need. If there are still remaining resources, the rogue application may use those additional resources after waiting its turn. Thus, TScale maximizes CPU resource utilization based on user demand rather than limiting CPU utilization based on strict CPU clamping rules. Dynamic CPU Balancing Many client applications work better on a single processor than on multiple processors. TScale s Dynamic CPU Balancing applies the most efficient affinity scheme for running processes, causing applications that perform more efficiently on a single processor to operate on a single processor while not limiting all instances of the application to a single processor. 5
6 TScale automatically assigns applications to run on the least-busy processor, balancing the server work load. Dynamic CPU Balancing also confines multi-threaded applications to one processor and restricts individual threads from consuming resources on all CPUs. Visibly Improved Response Times Together these approaches allow you to eliminate the impacts of rogue applications upon your terminal servers and deliver a superior user experience. When you add the benefits of TScale s Application Shaping to the benefits of TScale s Application Optimization features that have been in TScale since its inception, you get the results depicted in the diagrams below. (To learn more about TScale s Application Optimization and view other whitepapers or demos, please visit our web site Before TScale 6
7 After TScale 7
8 How is Application Shaping Implemented in TScale? Configuring Application Shaping and control rogue applications is easily accomplished using the TScale Optimization Console. TScale s Optimization Console is a graphical user interface that allows administrators to manage all the TScale Agents installed on servers across the entire server farm in one application. TScale s Application Shaping is extremely flexible and configurable, allowing administrators to setup shaping policies which can be applied to individual servers, groups of servers, or the entire server farm. It is possible to individually specify shaping parameters for any number of applications or to name a default *.* process so that any application reaching certain levels of processor usage will be subject to shaping. TScale s Application Shaping gives administrators a great deal of granular control over the applications running on each server. When configuring Application Affinity, the administrator specifies which of the n CPUs on that server all instances of a process will run. Now when that application goes rogue, only the assigned CPU will be affected. For Application Priority, administrators set the threshold for TScale to lower the priority of an application after it has used x% of the CPU for n minutes and seconds. This allows other user applications to get the CPU resources they need, enhancing the application performance for all users. When using Dynamic CPU Balancing, administrators can also further specify which of the n CPUs on which applications can run. Applications that benefit from running on a single processor will see a performance gain. 8
9 Conclusion IT departments are responsible for providing consistent, reliable performance of key applications to the endusers. Organizations using Citrix XenApp, Microsoft Terminal Services, and/or Microsoft Remote Desktop Services in their business require robust tools to ensure peak system performance and prevent rogue applications from causing system freezes and sluggishness. Only TScale combines the benefits of both Application Shaping and Application Optimization into one easy to use and easy to administer product. With TScale you can deliver the following benefits to the users of your terminal server farm: Applications will perform better during periods of peak demand or high workload, resulting in better overall user experiences and less money spent on headroom and server redundancy. You will be able to comfortably support more concurrent users per server. Rogue applications will be constrained from consuming all server CPU resources so users will enjoy a more consistent application operation. Administration and help desk resources will be better utilized, as it will no longer be necessary to manually terminate rogue processes. About RTO Software RTO Software, Inc. is an established provider of application-focused performance management tools. As an innovative leader in this rapidly growing area, RTO provides software solutions to enterprises and software firms that want to improve the performance and capacity of applications operating in a Windows environment. RTO s solutions are used on thousands of servers around the world in a variety of industries, including financial management, manufacturing, healthcare, telecommunications, and government. RTO Software is based in Alpharetta, Georgia. For more information and to obtain a free evaluation version of TScale, please visit RTO Software at or call at RTO Software, Inc. Revised edition. All rights reserved. The information contained in this document represents the current view of RTO on the issues discussed as of the date of publication. Because RTO must respond to changing market conditions, it should not be interpreted to be a commitment on the part of RTO, and RTO cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. RTO MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. TScale is a registered trademark of RTO Software. Other product or company names mentioned herein may be the trademarks and/or registered trademarks of their respective owners. 9
Oracle Database 10g Resource Manager. An Oracle White Paper October 2005
Oracle Database 10g Resource Manager An Oracle White Paper October 2005 Oracle Database 10g Resource Manager INTRODUCTION... 3 SYSTEM AND RESOURCE MANAGEMENT... 3 ESTABLISHING RESOURCE PLANS AND POLICIES...
More informationMeasuring VDI Fitness and User Experience Technical White Paper
Measuring VDI Fitness and User Experience Technical White Paper 3600 Mansell Road Suite 200 Alpharetta, GA 30022 866.914.9665 main 678.397.0339 fax info@liquidwarelabs.com www.liquidwarelabs.com Table
More informationClosing The Application Performance Visibility Gap Inherent To Citrix Environments
WHITE PAPER: COMPUWARE APM FOR CITRIX XenApp/ XenDesktop Closing The Application Performance Visibility Gap Inherent To Citrix Environments Many companies have invested in Citrix XenApp and XenDesktop
More information1Y0-A22 Exam Questions Demo Citrix. Exam Questions 1Y0-A22. Citrix XenApp 6.5 Advanced Administration
Citrix Exam Questions 1Y0-A22 Citrix XenApp 6.5 Advanced Administration Version:Demo 1. Scenario: A XenApp Administrator of a 100-server farm needs to apply Citrix and vendor hotfixes on a monthly basis,
More informationPlanning Guide for Deploying Relevos For First-time Users
Relevos Planning Guide for Deploying Relevos For First-time Users www.wmsoftware.com/relevos Contents Installation... 1 Setup... 2 Licensing... 3 Hardware and Software Requirements... 5 1 Installation
More informationComprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System
Solution Brief HDX Insight powered by Citrix Comprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System HDX Insight is the only tool in the market that provides endto-end
More informationProactive Performance Monitoring for Citrix XenApp & XenDesktop
Proactive Performance Monitoring for Citrix XenApp & XenDesktop TECHNOLOGY OVERVIEW In approximately one week, support tickets dropped by 25% Our customers were complaining about persistent slowness with
More information2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,
2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered
More informationSysTrack 3 Lakeside Software
SysTrack 3 Lakeside Software Written By: Douglas A. Brown dbrown@dabcc.com Introduction Do you know how many users you can fit on a box? Would you like to see trending over a specified period of time?
More informationReal-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationMonitoring Citrix XenDesktop Director
Monitoring Citrix XenDesktop Director eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationInstalling Acumen Fuse in a Citrix XenApp Environment
Installing Acumen Fuse in a Citrix XenApp Environment Requirements The XenApp servers should run Windows Server 2003 Service Pack 2, 2003 R2 or 2008 or 2008 R2 or greater. The servers must also have the
More informationFIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS
WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.
More informationVirtualizing the SAP Infrastructure through Grid Technology. WHITE PAPER March 2007
Virtualizing the SAP Infrastructure through Grid Technology WHITE PAPER March 2007 TABLE OF CONTENTS TABLE OF CONTENTS 2 Introduction 3 The Complexity of the SAP Landscape 3 Specific Pain Areas 4 Virtualizing
More informationVMware Horizon View. VMware Horizon View with Tintri VMstore. TECHNICAL SOLUTION OVERVIEW, Revision 1.1, January 2013
VMware Horizon View VMware Horizon View with Tintri VMstore TECHNICAL SOLUTION OVERVIEW, Revision 1.1, January 2013 Table of Contents Introduction... 1 Before VDI and VMware Horizon View... 1 Critical
More informationBest Practices for Alert Tuning. This white paper will provide best practices for alert tuning to ensure two related outcomes:
This white paper will provide best practices for alert tuning to ensure two related outcomes: 1. Monitoring is in place to catch critical conditions and alert the right people 2. Noise is reduced and people
More informationROI CASE STUDIES. Case Study Forum. Credit Union Reduces Network Congestion, Improves Productivity, and Gains More than $800,000 in Benefits with
HIGHLIGHTS Goal: For a credit union to monitor and troubleshoot its network in order to improve the reliability and speed of connections to its branch offices, and gain total network visibility from the
More informationClosing the Application Performance Visibility Gap Inherent to Citrix Environments
Closing the Application Performance Visibility Gap Inherent to Citrix Environments Table of contents Page Chapter 3 4 5 5 6 8 9 11 12 Executive summary Introduction What is a Citrix environment? The challenges
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-A25 Title : Engineering a Citrix Virtualization Solution Exam Vendors : Citrix Version : DEMO 1 / 4 Get Latest
More informationDeploying VSaaS and Hosted Solutions using CompleteView
SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architectures. Salient Systems
More informationJim Metzler. Introduction. The Role of an ADC
November 2009 Jim Metzler Ashton, Metzler & Associates jim@ashtonmetzler.com Introduction In any economic environment a company s senior management expects that their IT organization will continually look
More informationEndpoint Security and Virtualization. Darren Niller Product Management Director May 2012
Endpoint Security and Virtualization Darren Niller Product Management Director May 2012 Table of contents Introduction... 3 Traditional Security Approach: Counteracts Virtual Performance Gains... 3 Agent-less
More informationWhitepaper. Comprehensive Print Management in a Healthcare Environment
Whitepaper Comprehensive Print Management in a Healthcare Environment Introduction Health IT executives are moving away from traditional computing devices for mobile applications, with 87% reporting that
More informationCUSTOMER SUCCESS STORY GRIMME GRIMME IMPROVES WORKFLOWS AND REDUCES COSTS BY MORE THAN 40% WITH NVIDIA VIRTUAL GPU
GRIMME IMPROVES WORKFLOWS AND REDUCES COSTS BY MORE THAN 40% WITH NVIDIA VIRTUAL GPU Cost efficiences inspire expanded rollout of virtualized workstations and desktops. ABOUT GRIMME FIVE REASONS FOR NVIDIA
More informationTerminal Services Scalability Study
Terminal Services Scalability Study Part 1 The Effect of CPS 4.0 Microsoft Windows Terminal Services Citrix Presentation Server 4.0 June 2007 Table of Contents 1 Executive summary 3 2 Introduction 4 2.1
More informationConsulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Planning Guide: Hosted VM-Based Resource Allocation
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Planning Guide: Hosted VM-Based Resource Allocation www.citrix.com Overview One of the first things that must be determined with designing
More informationVirtuozzo Containers
Parallels Virtuozzo Containers White Paper An Introduction to Operating System Virtualization and Parallels Containers www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3
More informationSystem Requirements and Implementation Options
Choose a building block. Governance, Risk & Compliance System Requirements and Implementation Options ComplianceOne Solution Governance, Risk & Compliance System Requirements and Implementation Options
More informationImmidio White Paper Things You Always Wanted To Know About Windows Profile Management
Immidio White Paper Things You Always Wanted To Know About Windows Profile Management Abstract Why are Windows user profiles so critically important for corporate IT environments and how can they be managed
More informationKey Considerations for Improving Performance And Virtualization in Microsoft SQL Server Environments
Key Considerations for Improving Performance And Virtualization in Microsoft SQL Server Environments Table of Contents Maximizing Performance in SQL Server Environments............... 4 Focusing on Hardware...........................................
More informationEnterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper
Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for
More informationDeploying Application and OS Virtualization Together: Citrix and Virtuozzo
White Paper Deploying Application and OS Virtualization Together: Citrix and Virtuozzo www.swsoft.com Version 1.0 Table of Contents The Virtualization Continuum: Deploying Virtualization Together... 3
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization
More informationWhitepaper. 10 Reasons to Move to the Cloud
Whitepaper 10 Reasons to Move to the Cloud 2 10 Reasons to Move to the Cloud 10 Reasons to Move to the Cloud and Why It Will Be the Best Business Decision You Will Ever Make RapidScale s CloudOffice is
More informationWHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management
WHITE PAPER: ENTERPRISE AVAILABILITY Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management White Paper: Enterprise Availability Introduction to Adaptive
More informationEMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
More informationGoliath Technology Overview with MEDITECH Module
Customers # 324 Fortune 500 Goliath Technology Overview with MEDITECH Module In approximately one week, support tickets dropped by 25% z Our Customers were complaining about persistent slowness with Citrix.
More informationfor Power Energy and
Engineered for Power Management: Dell PowerEdge Servers Are Designed to Help Save Energy and Reduce Costs ABSTRACT Keeping up with the rising cost of energy is one of the greatest challenges facing IT
More informationInstalling and Configuring Citrix XenApp 6.5 (Part 1)
Installing and Configuring Citrix XenApp 6.5 (Part 1) Introduction The first part of this series describes the installation steps of the first server (which will create the XenApp environment) and the
More informationTaking Hyper-converged Infrastructure to a New Level of Performance, Efficiency and TCO
Taking Hyper-converged Infrastructure to a New Level of Performance, Efficiency and TCO Adoption of hyper-converged infrastructure is rapidly expanding, but the technology needs a new twist in order to
More informationDigital Workspace SHOWDOWN
Digital Workspace SHOWDOWN Why Citrix Workspace is a better choice than VMware Workspace ONE Take a closer look at the dozen ways that Citrix Workspace outperforms VMware Workspace ONE. Today s workers
More informationQLE10000 Series Adapter Provides Application Benefits Through I/O Caching
QLE10000 Series Adapter Provides Application Benefits Through I/O Caching QLogic Caching Technology Delivers Scalable Performance to Enterprise Applications Key Findings The QLogic 10000 Series 8Gb Fibre
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationConsulting Solutions WHITE PAPER Citrix XenDesktop XenApp Planning Guide: Virtualization Best Practices
Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp Planning Guide: Virtualization Best Practices www.citrix.com Overview Desktop virtualization comprises of many different types of virtual desktops.
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationImplementing and Supporting Windows Intune
Implementing and Supporting Windows Intune Module 1: Windows Intune Overview Module Overview Challenges in Managing Business PCs Introducing Windows Intune Managing and Securing PCs in Any Location by
More informationDesign and deliver cloud-based apps and data for flexible, on-demand IT
White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to
More informationB.H.GARDI COLLEGE OF ENGINEERING & TECHNOLOGY (MCA Dept.) Parallel Database Database Management System - 2
Introduction :- Today single CPU based architecture is not capable enough for the modern database that are required to handle more demanding and complex requirements of the users, for example, high performance,
More informationHOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT
HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT ARE YOU REALLY READY TO EXECUTE A GLOBAL IOT STRATEGY? Increased demand driven by long-term trends of the Internet of Things, WLAN, connected LED
More informationAn ESRI White Paper June 2009 ArcGIS Server and Virtualization
An ESRI White Paper June 2009 ArcGIS Server and Virtualization ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2009
More information2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or
2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The
More informationDiagnosing the cause of poor application performance
Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.
More informationCitrix 1Y1-A15. Engineering a Citrix Virtualization(R) Solution.
Citrix 1Y1-A15 Engineering a Citrix Virtualization(R) Solution http://killexams.com/exam-detail/1y1-a15 B. CdsController.exe.config C. Presentation Server Console D. Access Management Console Answer: A
More informationOptimizing Tiered Storage Workloads with Precise for Storage Tiering
Applied Technology Abstract By introducing Enterprise Flash Drives to EMC Symmetrix and CLARiiON storage systems, EMC revitalized the importance of tiered storage. Optimizing the use of these tiers provides
More informationVoice, Video and Data Convergence:
: A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationAn Oracle White Paper March Consolidation Using the Oracle SPARC M5-32 High End Server
An Oracle White Paper March 2013 Consolidation Using the Oracle SPARC M5-32 High End Server Executive Overview... 1 Why Server and Application Consolidation?... 2 Requirements for Consolidation... 3 Consolidation
More informationHPE SimpliVity 380. Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager
HPE SimpliVity 380 Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager We ve seen flash evolve at a record pace 61% Have already deployed all-flash in some level and are increasing
More informationA TimeSys Perspective on the Linux Preemptible Kernel Version 1.0. White Paper
A TimeSys Perspective on the Linux Preemptible Kernel Version 1.0 White Paper A TimeSys Perspective on the Linux Preemptible Kernel A White Paper from TimeSys Corporation Introduction One of the most basic
More informationLoad Balancing 101: Nuts and Bolts
Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today's Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it
More informationVMWARE PROTECTION WITH DELL EMC NETWORKER 9
VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture
More informationHow can you manage what you can t see?
How can you manage what you can t see? Know what you have with Panda Cloud Systems Management Business challenge: You can t manage it if you don t know it exists. Do you have 100% permanent visibility
More informationComposable Infrastructure for Public Cloud Service Providers
Composable Infrastructure for Public Cloud Service Providers Composable Infrastructure Delivers a Cost Effective, High Performance Platform for Big Data in the Cloud How can a public cloud provider offer
More informationA Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum
A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users
More informationIMPROVING THE PERFORMANCE, INTEGRITY, AND MANAGEABILITY OF PHYSICAL STORAGE IN DB2 DATABASES
IMPROVING THE PERFORMANCE, INTEGRITY, AND MANAGEABILITY OF PHYSICAL STORAGE IN DB2 DATABASES Ram Narayanan August 22, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS The Database Administrator s Challenge
More informationEngineering a Citrix Virtualization Solution Exam
Citrix 1Y0-A25 Engineering a Citrix Virtualization Solution Exam Version: 4.0 QUESTION NO: 1 Citrix 1Y0-A25 Exam Scenario: A Citrix Engineer is configuring a new XenApp 6.5 farm in order to provide the
More informationWHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY
WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React
More informationHow Microsoft IT Reduced Operating Expenses Using Virtualization
How Microsoft IT Reduced Operating Expenses Using Virtualization Published: May 2010 The following content may no longer reflect Microsoft s current position or infrastructure. This content should be viewed
More informationEnterprise Planning Large Scale
Enterprise Planning Large Scale ARGUS Enterprise 11.6.0 3/8/2017 ARGUS Software An Altus Group Company Large Enterprise Planning Guide ARGUS Enterprise 11.6.0 3/8/2017 Published by: ARGUS Software, Inc.
More informationAdmin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console
WHITE PAPER Managing Distributed Backup Servers VERITAS Backup Exec TM 9.0 for Windows Servers Admin Plus Pack Option ExecView Web Console Backup Exec Admin Console VERSION INCLUDES TABLE OF CONTENTS STYLES
More informationDell Dynamic Power Mode: An Introduction to Power Limits
Dell Dynamic Power Mode: An Introduction to Power Limits By: Alex Shows, Client Performance Engineering Managing system power is critical to balancing performance, battery life, and operating temperatures.
More informationNTP Software File Reporter Data Collection Agent for Windows
NTP Software File Reporter Data Collection Agent for Windows Installation Guide Version 8.1 This guide provides quick instructions for the installation and initial configuration of NTP Software Data Collection
More informationEnterprise Planning Large Scale
Enterprise Planning Large Scale 11.7.0 12/13/2017 11.7.0 12/13/2017 Published by: ARGUS Software, Inc. 750 Town and Country Blvd Suite 800 Houston, TX 77024 Telephone (713) 621-4343 Facsimile (713) 621-2787
More informationCENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC
CENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC EXECUTIVE SUMMARY The PowerVault DL2100 Powered by Symantec Backup Exec offers the industry s only fully integrated backup-to-disk solution
More informationConsulting Solutions WHITE PAPER Citrix XenDesktop XenApp 6.x Planning Guide: Virtualization Best Practices
Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp 6.x Planning Guide: Virtualization Best Practices www.citrix.com Table of Contents Overview... 3 Scalability... 3 Guidelines... 4 Operations...
More informationElite IPK II. The Power To Extend Your Reach Is Now Within Reach. Migrate To A Pure IP Communications Solution At Your Own Pace. Low Cost of Ownership
The Power To Extend Your Reach Is Now Within Reach Elite IPK II Migrate To A Pure IP Communications Solution At Your Own Pace The Elite IPK II Value Proposition Low Cost of Ownership Flexible/Scalable
More informationMassive Scalability With InterSystems IRIS Data Platform
Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special
More informationINTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER
WHITE PAPER INTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER REALIZING VIRTUALIZATION S FULL POTENTIAL Hypervisor-based virtualization offers enterprises opportunities for cost savings, increased
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationTop 5 Reasons to Consider
Top 5 Reasons to Consider NVM Express over Fabrics For Your Cloud Data Center White Paper Top 5 Reasons to Consider NVM Express over Fabrics For Your Cloud Data Center Major transformations are occurring
More informationDelivering. Effective Element Management Networks
Delivering Effective Element Management RELIABLE for Networks Reducing Costs While Improving NETWORK PERFORMANCE is the PROBLEM NODE D NODE D NODE E Central Office B Central Office A NODE D Central Office
More informationAnnouncements. Reading. Project #1 due in 1 week at 5:00 pm Scheduling Chapter 6 (6 th ed) or Chapter 5 (8 th ed) CMSC 412 S14 (lect 5)
Announcements Reading Project #1 due in 1 week at 5:00 pm Scheduling Chapter 6 (6 th ed) or Chapter 5 (8 th ed) 1 Relationship between Kernel mod and User Mode User Process Kernel System Calls User Process
More informationMonitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker
Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Publication Date: June 12, 2012 Abstract EventTracker allows you to effectively manage your systems and provides operational efficiencies
More informationA Guide to Closing All Potential VDI Security Gaps
Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse
More informationMonitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins
Monitoring Tool Made to Measure for SharePoint Admins By Stacy Simpkins Contents About the Author... 3 Introduction... 4 Who s it for and what all can it do?... 4 SysKit Insights Features... 6 Drillable
More informationMaximizing Availability With Hyper-Converged Infrastructure
Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here
More informationGoliath Performance Monitor Frequently Asked Questions: Citrix XenServer
Goliath Performance Monitor Frequently Asked Questions: Citrix XenServer Document Date: May 2015 www.goliathtechnologies.com Legal Notices Inc. All rights reserved. www.goliathtechnologies.com Goliath
More informationData Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM
Rethinking Data Protection Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM Today s Reality: The Rules of the Game Have Changed for Data Protection EXPLOSION OF DATA DATA EVERYWHERE
More informationIntroduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are:
1 CHAPTER Introduction Practice Exercises 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are: To provide an environment for a computer user to execute programs
More informationThe Benefits of Wireless Infrastructure Management in the Cloud
WHITE PAPER The Benefits of Wireless Infrastructure Management in the Cloud High Performance Wireless Networks The Benefits of Wireless Infrastructure Management in the Cloud How the cloud maximizes IT
More informationDe-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid
De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)
More informationWhitepaper. 10 Reasons to Move to the Cloud
Whitepaper 10 Reasons to Move to the Cloud 2 10 Reasons to Move to the Cloud 10 Reasons to Move to the Cloud and Why It Will Be the Best Business Decision You Will Ever Make Convergia s CloudOffice is
More informationTSPLUS PRODUCTS CATALOG RDP Software Editor 1
TSPLUS PRODUCTS CATALOG RDP Software Editor 1 Visit our page www.terminalserviceplus.com Have a look at the various features that TSplus offers, try our Demo sessions, check our tutorial videos, ask for
More informationVMware VMware View. RSA Secured Implementation Guide for RSA DLP Endpoint VDI. Partner Information. Last Modified: March 27 th, 2014
RSA Secured Implementation Guide for RSA DLP Endpoint VDI Partner Information Last Modified: March 27 th, 2014 Product Information Partner Name VMware Web Site www.vmware.com Product Name Version & Platform
More informationJava Without the Jitter
TECHNOLOGY WHITE PAPER Achieving Ultra-Low Latency Table of Contents Executive Summary... 3 Introduction... 4 Why Java Pauses Can t Be Tuned Away.... 5 Modern Servers Have Huge Capacities Why Hasn t Latency
More informationBusiness Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection
Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,
More informationNTP Software File Reporter Analysis Server
NTP Software File Reporter Analysis Server Installation Guide Version 8.2 This guide provides quick instructions for installing NTP Software File Reporter Analysis Server from an administrator s perspective.
More informationHillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Enhanced Intelligent QoS
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Enhanced Intelligent QoS Keywords: Hillstone T-Series Intelligent Next-Generation Firewall (ingfw), Enhanced Intelligent QoS (iqos),,
More informationMachine-Powered Learning for People-Centered Security
White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today
More informationORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE
ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE Most application performance problems surface during peak loads. Often times, these problems are time and resource intensive,
More information