Virtualize Your Business Desktop Deployment
|
|
- Bennett Carpenter
- 6 years ago
- Views:
Transcription
1 Virtualize Your Business Desktop Deployment A White Paper by Danielle Ruest and Nelson Ruest July 26, Altiris Inc. All rights reserved.
2 ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that allows IT organizations to easily manage desktops, notebooks, thin clients, handhelds, industry-standard servers, and heterogeneous software including Windows, Linux, and UNIX. Altiris automates and simplifies IT projects throughout the life of an asset to reduce the cost and complexity of management. Altiris client and mobile, server, and asset management solutions natively integrate via a common Web-based console and repository. For more information, visit NOTICE The content in this document represents the current view of Altiris as of the date of publication. Because Altiris responds continually to changing market conditions, this document should not be interpreted as a commitment on the part of Altiris. Altiris cannot guarantee the accuracy of any information presented after the date of publication. Copyright 2006, Altiris, Inc. All rights reserved. Altiris, Inc. 588 West 400 South Lindon, UT Phone: (801) Fax: (801) BootWorks U.S. Patent No. 5,764,593. RapiDeploy U.S. Patent No. 6,144,992. Altiris, BootWorks, Inventory Solution, PC Transplant, RapiDeploy, and RapidInstall are registered trademarks of Altiris, Inc. in the United States. Carbon Copy is a registered trademark licensed to Altiris, Inc. in the United States and a registered trademark of Altiris, Inc. in other countries. Microsoft, Windows, and the Windows logo are trademarks, or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other company names or products mentioned are or may be trademarks of their respective owners. Information in this document is subject to change without notice. For the latest documentation, visit
3 CONTENTS Abstract... 2 About the Authors 2 Migration Project Truisms... 1 The Benefits of Software Virtualization... 3 Dealing with Application Conflicts 4 In Comes Software Virtualization 5 Begin with Baby Steps 7 Migrate to SVS... 9 Best Practices for SVS in Migration Projects... 13
4 ABSTRACT One of the most demanding aspects of distributed systems management is software asset management: the science of tagging, packaging, deploying and maintaining software assets in your organization. In comes software virtualization, or the ability to completely isolate software running on Windows PCs from both the operating system and from other applications which may cause system conflicts. In and of itself, software virtualization offers many benefits and may warrant an immediate implementation; but because of its nature, it requires redeployment of all of the software you run in order to take advantage of its virtualization capabilities. This white paper discusses where it is best to use software virtualization immediately as well as how to fully implement software virtualization when you perform your next operating system upgrade, hardware refresh or deployment project. About the Authors Danielle Ruest and Nelson Ruest are IT professionals specializing in systems administration, migration planning, software management and architecture design. They are authors of multiple books, notably two books published by McGraw-Hill Osborne: Windows Server 2003: Best Practices for Enterprise Deployments, ISBN X and Windows Server 2003 Pocket Administrator, ISBN as well as Preparing for.net Enterprise Technologies, published by Addison Wesley, ISBN They have extensive experience in software packaging and managing large packaging projects. They are working on their fourth book, Enterprise Software Packaging: Patterns and Practices, to be released in late
5 MIGRATION PROJECT TRUISMS One of the most demanding aspects of distributed systems management is software asset management: the science of tagging, packaging, deploying and maintaining software assets in your organization. In comes software virtualization, or the ability to completely isolate software running on Windows PCs from both the operating system and from other applications that may cause system conflicts. In and of itself, software virtualization offers many benefits and may warrant an immediate implementation. However, because of its nature, it requires redeployment of all of the software you run in order to take advantage of its virtualization capabilities. This means replacing the applications already running; that is, uninstalling the application and then redeploying it as a virtual application. Of course, uninstalling may leave behind traces of the application, leaving the operating system in a potentially unstable state, so the ideal time to do this is when deploying a brand new, clean PC. Depending on your organization size, you may have from a dozen to several hundred applications in operation in your network. If it is only a dozen, you can take advantage of software virtualization immediately. Organizations that have hundreds of applications in operation won t be able to completely adopt software virtualization unless they are willing to engage in a significant project that looks at each application and runs it through a new packaging 1 service to adapt it to this new technology. Large-scale projects of this type often only occur during an operating system upgrade project. This is why the best time to implement software virtualization may be during a migration to Microsoft Windows XP SP2 or even better, Windows Vista, or gradually as new PCs are added or older PCs are refreshed. That s because these deployment projects include a lot of activities, one of which is the evaluation of the compatibility of each application or software that is currently in use with the newly updated operating system to ensure that it will function properly. It is usually at this time that organizations implement several additional processes: Application Categorization. Identify which type applications fall into. Usually there will be three or four types, such as Windows Installer native commercial applications, legacy commercial applications, Windows Installer native corporate applications and legacy corporate applications. Finally, some organizations may further subdivide these categories to Win32 or.net applications. Categorization is a process that will greatly assist in facilitating the packaging activity. 1 Packaging is the activity of preparing an application with customized settings that meet corporate standards so that it will install automatically without any feedback or interaction from end users. Virtualize your Business Desktop Deployment > 1
6 Application Sponsors Application sponsors are responsible for several activities, which include: Subject matter expertise for the application Acceptance testing for the application package Application monitoring or watching for new versions or patches Rationalization justifications or justifying why the application should be in the overall software portfolio Application Rationalization. Rationalization is also an important aspect of deployment projects. It consists of reducing the number of applications in the network through a series of evaluation processes. The easiest of these processes looks to reduction based on multiple versions of the same application and minimizes it to a single version. Next, if several applications offer similar feature sets, they can be reduced to a single application. Rationalization ensures that application sponsors exist for each application in the network. These sponsors are responsible for several activities during the migration project. System Construction Model. This is also an ideal time to implement a system construction model, one that divides the construction of a system into layers so that you can create a layer for all users, one for specific teams of users working in the same function and one for users who require individual applications that cannot really be assigned to groups. Standardized Systems Management. Migration projects are often the ideal time to review and update your systems management practices to streamline activities and reduce overall operating costs 2. Standardize Deployments. Finally, one of the most important aspects of any deployment, especially an operating system deployment, is the implementation of a standardized approach to desktop deployment. Microsoft now provides some guidance and a set of tools for this through the Solution Accelerator for Business Desktop Deployment (BDD) 3. BDD provides both guidance and tools that allow organizations both small and large to more easily deploy both Windows XP SP2 and Windows Vista. Since each of these processes will help reduce operational costs and decrease the size of the overall project, and since this type of project requires a look at each one of the applications in the network, this may be the ideal time to consider software virtualization. 2 Additional information on Standardized Systems Management is available at 3 More information on the BDD is available at 2 < Virtualize your Business Desktop Deployment
7 THE BENEFITS OF SOFTWARE VIRTUALIZATION It is the very nature of Windows that causes the problem when it comes to software. Microsoft designed Windows as the heart and soul of the computer. This means that Windows provides a set of core services that other applications can rely on, services such as a graphical interface, printing, communications, and other device interfaces. Because Windows provides the interaction with all hardware devices, application developers can concentrate on providing added functionality through their application. To do this, they must rely on the dynamic link libraries (DLL) built into Windows. A major problem occurs when developers decide to include core operating system DLLs with their application because they know that their application works with this particular version. The application installation then replaces an existing DLL, breaking some other component in Windows. This is DLL hell conflicts arise in your operating system when applications using conflicting DLLs try to cohabitate on a system. Microsoft has done a lot of work to make Windows able to deal with these conflicts. The most important of these is the release of the Windows Installer service (WIS) which, along with providing one single interface for the installation of applications within the Windows environment, also provides the ability to manage application conflicts to some degree. WIS now provides extensive support for the software lifecycle (see Figure 1). Figure 1. Windows Installer support for the Software Lifecycle Virtualize your Business Desktop Deployment > 3
8 In addition, Microsoft has been putting additional features into the operating system to provide support for multiple versions of the same DLL operating simultaneously. In Windows NT, Microsoft began by creating the NTFS file system, which adds access control to all files and folders. In Windows 2000, where Microsoft integrated WIS for the first time, they restricted the way applications and users interact with the operating system, moving all user data access to a personal profile. In Windows XP, Microsoft added support for side-by-side DLLs operating in memory at the same time and introduced Windows System File Protection a watchdog service that automatically repairs core system files in the event that an application installation overwrites them. In Windows Vista, Microsoft is providing further support for isolation through User Access Protection (UAP), a technology that forces even administrative users to acknowledge each time they need to perform an administrative or highprivilege action on their system. Ironically, it is the level of effort Microsoft is investing in making Windows more stable that requires organizations to spend so much time testing application compatibility during each and every OS deployment project. Dealing with Application Conflicts Despite all these improvements, application conflicts still exist because of the way organizations operate. This is partly due to the sheer number of applications organizations must run in order to support their operations. While small organizations may get away with running small numbers of applications to operate, medium to large firms often find themselves running hundreds of different applications with a wide range of functionalities and features, each one requiring some particular component to run properly within Windows. It is true that migration projects such as the deployment of a new version of Windows will allow organizations to both reduce the number of running applications and upgrade some of them to versions that take full advantage of new operating system features. However, because of the number of applications they run, organizations simply can t afford to upgrade each and every one of them. This leaves organizations with a mix of updated and outdated applications. In fact, organizations often find themselves running four or five categories of software: Newly-released commercial applications. These take full advantage of new OS features. Legacy commercial applications. These often cause the most conflicts. Updated or new custom applications. Applications that are developed in-house to take advantage of new OS features. Legacy custom applications. Applications that the organization is not willing or can t afford to upgrade. 4 < Virtualize your Business Desktop Deployment
9 Custom commercial applications. Applications that cannot be upgraded because an upgrade simply does not exist. A good example of this type of application can be found in manufacturing, where applications are designed to run special equipment providing mission-critical services to the organization. This mix of applications makes the management of application conflicts one of the most important and challenging responsibilities of system administrators today. Corporations running Access 97 or 2000 applications can now have them cohabitate with Access 2003 on the same system without a worry that they might cause system incompatibilities. In Comes Software Virtualization According to Wikipedia.com, virtualization is the process of presenting a logical grouping of computing resources so that they can be accessed in ways that give benefits over the original configuration. This is exactly what Altiris Software Virtualization Solution does present groupings of file system and registry objects in such a way that is completely transparent to the applications that require them as well as to the operating system itself. In fact, Altiris goal is to eventually virtualize nearly every component of the local desktop. Applications continue to be deployed locally, but instead of deploying application installations, you deploy applications as files only files that require activation once they are located on the target system. The first step in preparing an application for virtualization is the process of capturing the installed state of the application and storing it in a Virtual Software Package (VSP). Next, the application is delivered to the target system. Then it is imported and activated. Users run the application normally because the SVS filter driver, running at about 170 KB, manages all application interaction with the file system and registry. Since the application is captured in its installed state, users or administrators can reset it to its installed version in the event that an untoward incident occurs. When it is time to retire the application, simply deactivate it and delete it from the system (see Figure 2). Figure 2. Working with Virtual Software Packages Virtualize your Business Desktop Deployment > 5
10 In addition to supporting the activation and deactivation of applications, SVS also provides complete isolation of an application s resources, allowing formerly incompatible applications to cohabitate happily on the same system. In fact, applications continue to interact with each other and with the operating system in a normal way; only the application's resources are isolated. This approach offers the benefits of virtualization while still allowing the application to execute normally and the virtualization to be invisible to the end user. For example, corporations running Access 97 or 2000 applications can now have them cohabitate with Access 2003 on the same system without a worry that they might cause system incompatibilities. This is because SVS uses a filter driver (FSLX.SYS) to protect the operating system and present it with the requirements of the application (see Figure 3). Users can even cut and paste information from one version of Access to another because the operating system interprets both applications as behaving normally. Figure 3. SVS Basics SVS applications are stored in layer files that contain both a read-only and read-write sections. The read-only section is what makes it possible to reset an application to its pristine state, while the read-write section provides the ability to store custom modifications created during 6 < Virtualize your Business Desktop Deployment
11 application usage. In addition, Data Layers support the ability to preserve user data 4. What is most important is that SVS is designed to interact directly with the Windows Installer service because the captured VSP can include a copy of the original MSI file used to install the software in the first place. If the application being virtualized is a legacy application that does not include an MSI, then SVS simply captures its running state and keeps the operating system pristine by stopping the interaction of the application from making any permanent changes to the OS (see Figure 4). Figure 4. The Software Virtualization Advantage While traditional applications interact deeply and actually change the operating system and sometimes other applications during installation, Virtual Software Packages only interact with the SVS filter driver, keeping the operating system and other applications completely pristine. SVS isolation features allow you to support your most problematic applications immediately. Begin with Baby Steps As mentioned previously, while SVS provides an incredible advantage to organizations that constantly face operational application issues, it still requires the repackaging and deployment of each application to fully profit from the advantages SVS offers. This is why it may be best to wait for a project such as an operating system upgrade to fully deploy SVS in the organization. 4 For a more detailed overview of the operation of SVS, see Altiris Software Virtualization Solution at Virtualize your Business Desktop Deployment > 7
12 But, this does not mean that you can t use SVS in the meantime. Even if you decide to wait for an OS deployment to convert every application to SVS, you can still take advantage of its isolation features to support your most problematic applications immediately. Good examples abound. Access applications. Most organizations cannot afford to upgrade the multitude of Microsoft Access applications their user community has developed. Properly converting these applications to a client-server structure using back end databases and frontend screens that can operate through the Access runtime is the best way to deal with this issue, but if you haven t taken this step, then virtualize them! This will completely isolate them from the latest version of Access you need to deploy 5. Custom in-house applications. If you have custom applications that just won t cohabitate with any other, you can virtualize them and have them finally cohabitate with any other on any system. Custom industrial applications. If you have custom industrial applications, for example, manufacturing applications, that require different settings for each manufacturing plant you run, you can now easily convert them to Virtual Software Packages and run them all on the same system. Perform spot virtualizations by identifying the most problematic applications and virtualizing them immediately, then wait until your next OS deployment or hardware refresh project to virtualize the rest. This allows you to familiarize yourself with SVS and learn what advantages it brings to application management. 5 More information on running and managing Access applications in-house is available at under Decentralized Development Strategies. 8 < Virtualize your Business Desktop Deployment
13 MIGRATE TO SVS With SVS, you can focus on the proper construction of your core operating system and expect it to maintain its pristine state for the duration of its existence within your organization. When you re ready to move all of your applications to SVS, then you can begin to create a Virtual Software Package for each application. This means that if you integrate it with an operating system deployment, you might change the way you perform this deployment. For example, using SVS might change the way you create your machine build. Before, organizations tended to create a massive system kernel that included all of most common applications and utilities found within the organization (see Figure 5). This kernel was difficult to build and even more difficult to test because it required the integration of vast numbers of components. With SVS, this level of integration is reduced. Figure 5. The PASS 6 System Construction Model includes a core System Kernel Now, you can focus on installing the core operating system along with any required updates, adding core utilities such as antivirus, antispyware, firewalls, management agents, and virtualization filter driver and then virtualize all other components. You can still create a single core image that will include everything that is common to all desktops, but now, you can focus on the proper construction of your core operating 6 For more information on the PASS System Construction Model, see Enterprise Software Packaging: Practices, Benefits and Strategic Advantages at Virtualize your Business Desktop Deployment > 9
14 system and expect it to maintain its pristine state for the duration of its existence within your organization. Just imagine the benefits! If you rely on a system construction model like PASS, then you can begin to see how SVS changes the structure and interaction of its components (see Figure 6). Several layers of this model are impacted by SVS both within and without the kernel. Figure 6. SVS Interacts with PASS at Several Layers The image you capture for deployment will include an installed operating system and installed utilities that cannot be virtualized at this stage, but everything else can be contained within a Virtual Software Package. This makes the construction of a kernel image much easier than before. You simply install the operating system and core utilities, and then import and activate the required VSPs. Finish by capturing the image for deployment. Reference computers are now much easier to construct. In addition, if you use Microsoft s new file-based Windows Imaging format (WIM) which will be delivered with Windows Vista 7, you will be able to service images by mounting them as files and injecting new components to them. With Virtual Software Packages, you can update an OS image simply by 7 For more information on WIM, see Ximage and WIM Image Format at 10 < Virtualize your Business Desktop Deployment
15 updating the VSP and recopying it into the image you build a reference computer only once in the project. Another way to facilitate this process is to use an existing Windows Installer (MSI) package, create a new layer through the virtualization filter and install it into an isolated environment. This allows you to use existing packages while benefiting from virtualization. In addition, because of the very nature of VSPs, it will be much easier to work with the presentation layer of your system images. One of the toughest activities today in desktop construction and system imaging is to properly create and update both the Default User Profile and the custom user profile. Because VSPs can include presentation layer changes such as the positioning of icons within the Quick Launch Area of the desktop Start Menu, you don t need to modify these settings ever again. Simply make sure they are captured within the VSP and they will show up automatically when the VSP is activated. In addition, your packaging and testing process will be modified. You still need to package, but you won t need to worry about clean machine images so much anymore. That is because after each application capture, you can simply deactivate the software you just installed to return the system to its clean state, saving hours of work (see Figure 7). Figure 7. The Packaging Process for Virtual Software Packages Virtualize your Business Desktop Deployment > 11
16 Finally, with the use of a system construction model such as PASS, you ll find that role-based application groupings are now much easier to deploy. With installed applications, you need to create conditional installation sequences that require complex logic to make sure that applications are not installed out of sequence. With VSPs, you just need to bundle all of the applications in a group within the same VSP or, if you prefer, create an independent VSP for each tool and then copy all of them to target computers. SVS also interacts completely with deployment tools such as Microsoft Systems Management Server or Altiris Client Management Suite, so you don t need to change your existing management infrastructure or your existing deployment strategies. Only core system imaging and packaging strategies need to change. You ll still need to be concerned about proper deployment strategies and proper deployment project structures, but using SVS to capture all of your application installations will greatly simplify the deployment preparation steps and the operation of the desktops once deployed 8. 8 For more information on proper migration project strategies, see Six Steps to Successful Hardware Refresh at 12 < Virtualize your Business Desktop Deployment
17 BEST PRACTICES FOR SVS IN MIGRATION PROJECTS Integrating SVS to an operating system migration or hardware refresh project will help you put an end to application management difficulties. So, when you do move to your next version of Windows, make sure you take advantage of the following best practices. Rationalize all applications. There is no reason to have more than one version of an application in your network or any reason to have multiple applications that offer the same feature set. Use application sponsors. Make sure that each and every application in your network has a named sponsor and that sponsors know and understand the responsibilities of this role. Categorize your applications. Properly categorizing your applications will help you identify problematic applications more quickly. It will also smooth the deployment preparation process. Use a system construction model. Using a model like PASS can help reduce desktop and server management costs. Implement standardized systems management. Streamline your management practices to help reduce operational costs and decrease your administrators workload. Standardize your deployments. Make use of best practices such as the Business Desktop Deployment Solution Accelerator to reduce desktop deployment costs. Move to software virtualization. Virtualize applications wherever possible to deal with application conflicts. Meanwhile, you can perform spot virtualizations, repackaging the most problematic applications you own. This allows you to reap immediate benefits from software virtualization while you perform your global move. Focus on the new kernel. With software virtualization, you can now concentrate on the operating system with proper updates and core utilities as your system kernel. Everything else is virtualized and isolated from the base OS. This means the kernel stays pristine throughout its lifetime in your organization. Change your reference computer habits. With SVS, you can build one reference computer and always keep it clean by deactivating virtual software packages once they are captured. Integrate the presentation layer. Make sure that your VSPs include interface components that are activated with the VSP. This way, you are automatically dealing with the presentation layer for both new and current users. When you think migration, think SVS. Make sure you take full advantage of SVS during your next deployment project. You will quickly see the advantages. Virtualize your Business Desktop Deployment > 13
Deployment Solution 6.5: Image Distribution Framework. Prepared by:
Deployment Solution 6.5: Image Distribution Framework Prepared by: Brian Palmer, Development Nelson Villegas, Development Jacob Hammons, Documentation January 13, 2006 About Altiris Altiris, Inc. is a
More informationStreamline Your Windows * 7 Migration with Novell ZENworks 11
Technical White Paper ENDPOINT MANAGEMENT Streamline Your Windows * 7 Migration with Novell ZENworks 11 Windows * 7: The Fastest, Most Widespread OS Migration in a Decade Keys to a Successful Windows 7
More informationWHITE PAPER. How AdminStudio Helps IT Migrate to Windows Vista 5x Faster
WHITE PAPER How AdminStudio Helps IT Migrate to Windows Vista 5x Faster How AdminStudio Helps IT Migrate to Windows Vista 5x Faster Executive Summary With the Microsoft release of Service Pack 1 (SP1)
More informationALTIRIS CONNECTOR 6.0 FOR HP SYSTEMS INSIGHT MANAGER PRODUCT GUIDE
ALTIRIS CONNECTOR 6.0 FOR HP SYSTEMS INSIGHT MANAGER PRODUCT GUIDE Notice Copyright 1998-2004 Altiris Inc. All rights reserved. Product Version: 6.0 Document Date: June 11, 2004 Bootworks U.S. Patent No.
More informationAltiris Ports and Protocols used by Deployment Solution 6.5
Altiris Ports and Protocols used by Deployment Solution 6.5 Prepared By: Development/Sustained Engineering March 28, 2006 www.altiris.com Ports and Protocols used by Deployment Solution 6.5 Page 1 of 17
More informationEnterprise Software Packaging Practices, Benefits and Strategic Advantages
Enterprise Software Packaging Practices, Benefits and Strategic Advantages Nelson Ruest A Report by Wise Solutions, Inc. 2002 Wise Solutions. All rights reserved. Abstract This white paper provides an
More informationALTIRIS APPLICATION MANAGEMENT SOLUTION 6.0 SP1 HELP
ALTIRIS APPLICATION MANAGEMENT SOLUTION 6.0 SP1 HELP Notice Copyright 2000-2004 Altiris Inc. All rights reserved. Product Version: 6.0 Document Date: December 21, 2004 Bootworks U.S. Patent No. 5,764,593.
More informationSoftware Delivery Solution 6.1 SP1 HF2 for Windows Release Notes
Software Delivery Solution 6.1 SP1 HF2 for Windows Release Notes February 17, 2006 NOTICE The content in this document represents the current view of Altiris as of the date of publication. Because Altiris
More informationMicro Focus Desktop Containers
White Paper Security Micro Focus Desktop Containers Whether it s extending the life of your legacy applications, making applications more accessible, or simplifying your application deployment and management,
More informationBenefits and Practices
Automated Server Provisioning Benefits and Practices White Paper September 29, 2004 2004 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
More informationDEPLOYMENT WHITE PAPER.
DEPLOYMENT WHITE PAPER www.seavusprojectviewer.com Deployment Options Seavus Project Viewer provides a wide variety of deployment options: Single User installation is a stand-alone, web downloadable configuration
More informationProtecting Your Investment in Java SE
Software platform maintenance and patching is one of the greatest challenges of managing business critical applications. Oracle Java SE Subscription combines license and support into a simple subscription
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationALTIRIS. Inventory Solution for Network Devices 6.0 SP2 Help
ALTIRIS Inventory Solution for Network Devices 6.0 SP2 Help Notice Inventory Solution 6.0 for Network Devices Product Guide 2001-2005 Altiris, Inc. All rights reserved. Document Date: January 17, 2007
More informationALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE
ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE Notice Copyright 2004 Altiris Inc. All rights reserved. Product Version: 6.1 Document Date: October 14, 2004 Bootworks U.S. Patent No. 5,764,593.
More informationInstallShield AdminStudio Evaluator s Guide
InstallShield AdminStudio Evaluator s Guide Published: April 2003 Abstract This guide helps system administrators and other reviewers evaluate the key functionality of InstallShield AdminStudio. It provides
More informationMigrating Novell ZENworks 7 to Novell ZENworks 10 Configuration Management SP3
Migration Guide ZENWORKS Migrating Novell ZENworks 7 to Novell ZENworks 10 Configuration Management SP3 Migrating Novell ZENworks 7 to Novell SP3 Table of Contents: 2..... Your Guide to Easy Migration
More informationBest Practices for Application Virtualization
Best Practices for Application Virtualization By Brien M. Posey TABLE OF CONTENTS Introduction... 1 Can an Application be Virtualized?...2 Should Your Application be Virtualized?...5 Third Party Software
More informationShavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst
ESG Lab Review Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst Abstract: This ESG Lab Review documents hands-on testing of Shavlik
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationData Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationReducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast
City of Aurora Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast Fending off viruses and other malware was straining IT resources at the
More informationSymantec System Recovery 2013 Management Solution FAQ
WHITE PAPER: SYMANTEC SYSTEM RECOVERY 2013 MANAGEMENT.............. SOLUTION......... FAQ................. Symantec System Recovery 2013 Management Solution FAQ Who should read this paper This paper answers
More informationParallels Containers for Windows 6.0
Parallels Containers for Windows 6.0 Templates Management Guide May 26, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse
More informationMigration With Duda.
Migration With Duda A Comprehensive Guide to the Opportunities and Considerations that Come with Website Migration for DIY and DIFM Solutions Providers. www.dudamobile.com Table of Contents Introduction
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationMade for the way you work: Big ideas and innovation from Windows 10 and Lenovo
Made for the way you work: Big ideas and innovation from Windows 10 and Lenovo When it comes to technology, leadership matters. Together, Windows 10 and Lenovo are giving organizations dependable solutions
More informationImmidio White Paper Migration to Windows 7 with Immidio Flex Profiles
Immidio White Paper Migration to Windows 7 with Immidio Flex Profiles Abstract When updating from Windows XP to Windows 7 you may notice that compatibility for user profiles containing all personal desktop
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationManaging Exchange Migration with Enterprise Vault
WHITE PAPER Managing Exchange Migration with Enterprise Abstract: Many organizations today are considering either replacing their legacy mail system, for example GroupWise or ccmail, with Microsoft Exchange
More informationRAIFFEISENBANK BULGARIA
RAIFFEISENBANK BULGARIA IT thought leader chooses EMC XtremIO and VMware for groundbreaking VDI project OVERVIEW ESSENTIALS Industry Financial services Company Size Over 3,000 employees, assets of approximately
More informationVMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions
VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop
More informationALTIRIS CONNECTOR PACK 6.0 FOR HP OPENVIEW PRODUCT GUIDE
ALTIRIS CONNECTOR PACK 6.0 FOR HP OPENVIEW PRODUCT GUIDE Notice Copyright 1998-2005 Altiris Inc. All rights reserved. Product Version: 6.0 Document Date: March 9, 2005 Bootworks U.S. Patent No. 5,764,593.
More informationTips for creating a VDI backup plan
E-Guide Tips for creating a VDI backup plan Most virtual desktop infrastructure (VDI) products claim to simplify the backup process, but IT administrators are finding that backing up and protecting data
More informationAltiris Software Management Solution 7.1 from Symantec User Guide
Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationDELL EMC VALIDATED SYSTEM FOR VIRTUALIZATION
DELL EMC VALIDATED SYSTEM FOR VIRTUALIZATION A converged system that adapts to your needs, for new levels of savings simplicity Finally, there is a converged system tailored to meet your needs, with lifecycle
More informationSolutions Business Manager. Path to Production for Enterprises
White Paper Solutions Business Manager Solutions Business Manager Path to Production for Enterprises Table of Contents Introduction to the Solutions Business Manager Development Process... 1 The Path to
More informationdbdos PRO 2 Quick Start Guide dbase, LLC 2013 All rights reserved.
dbdos PRO 2 Quick Start Guide 1 dbase, LLC 2013 All rights reserved. dbase, LLC may have patents and/or pending patent applications covering subject matter in this document. The furnishing of this document
More informationImplementing and Supporting Windows Intune
Implementing and Supporting Windows Intune Module 1: Windows Intune Overview Module Overview Challenges in Managing Business PCs Introducing Windows Intune Managing and Securing PCs in Any Location by
More informationNext Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures
Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationParallels Virtuozzo Containers 4.6 for Windows
Parallels Parallels Virtuozzo Containers 4.6 for Windows Templates Management Guide Copyright 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd. c/o Parallels
More informationBringing OpenStack to the Enterprise. An enterprise-class solution ensures you get the required performance, reliability, and security
Bringing OpenStack to the Enterprise An enterprise-class solution ensures you get the required performance, reliability, and security INTRODUCTION Organizations today frequently need to quickly get systems
More informationNovell ZENworks 7.2 Linux Management
Product Guide SYSTEMS AND RESOURCE MANAGEMENT www.novell.com Novell ZENworks 7.2 Linux Management Making Your Linux* Resources More Automated, Intelligent and Efficient Novell ZENworks 7.2 Linux Management
More informationPATCH MANAGER AUTOMATED PATCHING OF MICROSOFT SERVERS AND 3RD-PARTY APPS
DATASHEET PATCH MANAGER AUTOMATED PATCHING OF MICROSOFT SERVERS AND 3RD-PARTY APPS What s great about SolarWinds Patch Manager is that everything is right there in a single interface, having a one-stop
More informationAdvanced patching of SUSE Linux Enterprise Server 10 with ZENworks Linux Management 7.2
SUSE LINUX Enterprise Server 10 www.novell.com Advanced patching of SUSE Linux Enterprise Server 10 with ZENworks Linux Management 7.2 Version 0.1 Disclaimer Novell, Inc. makes no representations or warranties
More informationHP CLIENT MANAGER 6.1 PRODUCT GUIDE
HP CLIENT MANAGER 6.1 PRODUCT GUIDE Notice HP Client Manager Copyright 2003-2005 Altiris Inc. All rights reserved. Product Version: 6.1 Document Date: June 29, 2005 Bootworks U.S. Patent No. 5,764,593.
More informationPower, Patch, and Endpoint Managers Expand McAfee epolicy Orchestrator Platform Capabilities While Cutting Costs
Power, Patch, and Endpoint Managers Expand McAfee epolicy Orchestrator Platform Capabilities While Cutting Costs Autonomic Software solutions are fully integrated into the McAfee epolicy Orchestrator (McAfee
More informationFrequently Asked Questions
Frequently Asked Questions FAQ December Revision Table of Contents General... 3 Agent Deployment... 5 Cloud Administration... 8 Security... 10 Purchase... 10 Support... 11 Page 2 of 11 justsamit Frequently
More informationBusiness Objects Product Suite
Business Objects Product Suite IPv6 Support in BusinessObjects XI 3.1 Overview Contents With the growth of Internet Protocol Version 6 (IPv6) technology, demand for IPv6 compatible applications has increased
More informationPackaging in Existing and Emerging Options
Packaging in 2009 Existing and Emerging Options Bob Kelly Author Deploying and Administering Windows Vista Start to Finish Guide to Scripting with KiXtart The Definitive Guide to Desktop Administration
More informationDesktop DNA r11.1. PC DNA Management Challenges
Data Sheet Unicenter Desktop DNA r11.1 Unicenter Desktop DNA is a scalable migration solution for the management, movement and maintenance of a PC s DNA (including user settings, preferences and data).
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E x t e n d i n g P C L i f e - C y c l e M a n a g e m e n t a n d C l i e n
More informationThin Desktop - The business case for using a PC or Thin Client as the user access device in a virtualization deployment
Thin Desktop - The business case for using a PC or Thin Client as the user access device in a virtualization deployment Mike Cardinal General Manager ThinLaunch Software, LLC January, 2009 Contents Executive
More informationWindows 7 Done Right: From Migration to Implementation
I D C E X E C U T I V E B R I E F Windows 7 Done Right: From Migration to Implementation Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com July 2010
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationQuickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER
Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER Table of Contents Executive Overview...1 Problem Resolution A Major Time Consumer...2 > Inefficiencies of the Problem
More informationThat Set the Foundation for the Private Cloud
for Choosing Virtualization Solutions That Set the Foundation for the Private Cloud solutions from work together to harmoniously manage physical and virtual environments, enabling the use of multiple hypervisors
More informationVirtual Private Networks with Cisco Network Services Orchestrator Enabled by Tail-f - Fast, Simple, and Automated
Solution Overview Virtual Private Networks with Cisco Network Services Orchestrator Enabled by Tail-f - Fast, Simple, and Automated BENEFITS Accelerate new VPN services with automated, self-service, on-demand
More informationSTORAGECRAFT SHADOWPROTECT 5 DESKTOP
STORAGECRAFT SHADOWPROTECT 5 DESKTOP PRODUCT BRIEF 1 THE CHALLENGE OF BUSINESS CONTINUITY Businesses are becoming less centralized in the 21st century with many more workers relying on laptops as their
More informationWwise Installation and Migration Guide
Wwise 2015.1.9 Installation and Migration Guide Wwise 2015.1.9 Wwise 2015.1.9: Installation and Migration Guide Wwise 2015.1.9 Revision 1910 Copyright 2016 Audiokinetic Inc. All rights reserved. Patents
More informationALTIRIS Connector Pack 6.0 for Remedy Product Guide
ALTIRIS Connector Pack 6.0 for Remedy Product Guide Notice Altiris Connector Pack 6.0 for Remedy Copyright 1998-2005 Altiris, Inc. All rights reserved. Document Date: October 31, 2005 Bootworks U.S. Patent
More informationVideo Conferencing & Skype for Business: Your Need-to-Know Guide
Video Conferencing & Skype for Business: Your Need-to-Know Guide Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant
More informationHow can you manage what you can t see?
How can you manage what you can t see? Know what you have with Panda Cloud Systems Management Business challenge: You can t manage it if you don t know it exists. Do you have 100% permanent visibility
More informationHave you ever considered what it takes for the operating system (OS) on
In This Chapter Chapter 1 Getting Familiar with JUNOS Software Understanding the purpose of a network operating system Discovering how JUNOS software is different Looking inside JUNOS software Realizing
More informationMaking the case for SD-WAN
Making the case for SD-WAN A practical guide to getting buy-in for your new network New challenges require a new network It isn t just that enterprise IT is changing rapidly it s that it s changing in
More informationWhy Enterprises Need to Optimize Their Data Centers
White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals
More informationClient Automation v8.10 Enterprise, Standard, Starter*
Core Installation Satellite Installation Application Management Application Self Service Management Application Management Profiles Patch Management Security And Compliance Management OS Management Out-of-Band
More informationBUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back
BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE These Common Misconceptions Could Be Holding You Back 2 IT Is Facing a New Set of Challenges As technology continues to evolve, IT must adjust to changing
More informationDeploying Windows 10
Deploying Windows 10 Deploying Windows 10 Michael Niehaus Course Agenda Introducing Windows as a Service Deploying Windows 10 Staying Current with Windows as a Service Managing Windows 10 with System Center
More informationBUILDING the VIRtUAL enterprise
BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,
More informationAutodesk Vault and Data Management Questions and Answers
Autodesk Civil 3D 2007 Autodesk Vault and Data Management Questions and Answers Autodesk Civil 3D software is a powerful, mature, civil engineering application designed to significantly increase productivity,
More informationDesign Better. Reduce Risks. Ease Upgrades. Protect Your Software Investment
Protect Your Software Investment Design Better. Reduce Risks. Ease Upgrades. Protect Your Software Investment The Difficulty with Embedded Software Development Developing embedded software is complicated.
More informationOracle Java SE Advanced for ISVs
Oracle Java SE Advanced for ISVs Oracle Java SE Advanced for ISVs is designed to enhance the Java based solutions that ISVs are providing to their enterprise customers. It brings together industry leading
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More information3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity
3 Ways Businesses Use Network Virtualization A Faster Path to Improved Security, Automated IT, and App Continuity INTRODUCTION 2 Today s IT Environments Are Demanding Technology has made exciting leaps
More informationGetting Started. Citrix Load Manager. Version 1.0. Citrix Systems, Inc.
Getting Started Citrix Load Manager Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
More informationFile Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationBest practices in IT security co-management
Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3
More informationVisualSP Help System 2013 Installation Procedure. Rehmani Consulting, Inc.
Rehmani Consulting, Inc. VisualSP Help System 2013 Installation Procedure http://www.visualsp.com vsp-support@visualsp.com 630-786-7026 Rev 6.2 for VSP 5.2.0.0 Contents Contents... 1 Introduction... 2
More informationG Suite: Enabling the connected workspace with a cloud communications system. Google
G Suite: Enabling the connected workspace with a cloud communications system Google Table of contents 3 12 Integrations today and tomorrow 5 13 7 9 10 Business communications and applications were made
More information4 Effective Tools for Docker Monitoring. By Ranvijay Jamwal
4 Effective Tools for Docker Monitoring By Ranvijay Jamwal CONTENT 1. The need for Container Technologies 2. Introduction to Docker 2.1. What is Docker? 2.2. Why is Docker popular? 2.3. How does a Docker
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationfor Modernization Accelerate Your Modernization Project Faster return on your investment goals
DATASHEET Rocket Service Packages for Accelerate Your Project Faster return on your investment goals Short path to proficiency in modernization techniques, without retooling skills Repeatable operating
More information7 Things ISVs Must Know About Virtualization
7 Things ISVs Must Know About Virtualization July 2010 VIRTUALIZATION BENEFITS REPORT Table of Contents Executive Summary...1 Introduction...1 1. Applications just run!...2 2. Performance is excellent...2
More informationDeploying Operating System Images on Latitude and Precision E-Series Systems using Microsoft System Center Configuration Manager 2007
Deploying Operating System Images on Latitude and Precision E-Series Systems using Microsoft System Center Configuration Manager 2007 A Dell Best Practices Paper Dell OpenManage Systems Management By Sandeep
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationAltiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes
Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is
More informationPart I. Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL
Part I Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL Chapter 1 What s New in Windows XP? Windows XP suffers somewhat from a dual personality. In some ways it is a significant release,
More informationPTC Employs Its Own Arbortext Software to Improve Delivery of PTC University Learning Content Materials
PTC Employs Its Own Arbortext Software to Improve Delivery of PTC University Learning Content Materials Produces Higher Quality Courseware, Faster Development Cycles for Global Training Content Produces
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationTen Things to Know Before Deploying Active Directory. written by Dmitry Sotnikov. White Paper
Ten Things to Know Before Deploying Active Directory written by Dmitry Sotnikov White Paper Abstract Active Directory migration raises many questions about the design of your new directory. As you attempt
More informationLinux Automation.
Linux Automation Using Red Hat Enterprise Linux to extract maximum value from IT infrastructure www.redhat.com Table of contents Summary statement Page 3 Background Page 4 Creating a more efficient infrastructure:
More informationHow your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter
How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...
More informationBigFix OS Deployment. Windows 7 Migration Guide
BigFix OS Deployment August, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product names, trade names,
More informationDesign and deliver cloud-based apps and data for flexible, on-demand IT
White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to
More informationBest Practices for Server Migration with Windows Server 2012
October 2013 Best Practices for Server Migration with Windows Server 2012 Keeping both feet on the upgrade path If you re running an older version of Windows Server in your organization, you are far from
More information