This report shows that in a true apples-to-apples comparison where lossy and lossless policies are applied equally to both platforms to yield a comparable user experience, VMware View 5 demonstrates equal or better efficiency in bandwidth consumption and in client and server side CPU utilization when compared to Citrix XenDesktop 5.5 on common office applications. This advantage in efficiency can translate into great density, better user experience and lower cost for an organization using VDI technologies.
Thursday, March 15. 2012
VMware has released version 1.4 of their View Client for iPad
VMware View Client for iPad is the first iPad client with support for the PCoIP display protocol for tight integration with VMware View and increased flexibility for the end-user. Enable end-users to simply and securely connect to their View-Based Windows desktop from an iPad with the best possible user experience on the Local Area Network (LAN) or across a Wide Area Network (WAN). The improvements in this new 1.4 version are:
- Improved connection times to View server
- Improved support for external monitors
- Bug fixes
Wednesday, March 14. 2012
VMware View 5 - Technical Papers
The Business Case for Desktop Virtualization
In this mobile user- and device-centric environment, IT must protect data security and control user access to data at the same time as it manages the range of applications and devices for all users. The single operating system and single device per user is a model of the past. VMware offers an end user computing solution that meets the challenges of providing for a mobile workforce, without compromising IT control or the operational efficiencies of existing management processes. VMware products incorporate the needs of both IT and end users.
Secure Printing with VMware View
Security Solution Architecture for VDI
This brief provides an overview of the desktop security vulnerabilities which exist in both virtual and physical environments that must be addressed throughout the typical connection sequence, along with the VMware and thirdparty products that remediate the issues. Together, VMware and VMware technologies comprise a security solution architecture for virtual desktop infrastructure (VDI)βan architecture that goes beyond the viruses, worms, and phishing attacks mostly commonly addressed in desktop security technology to include data loss, system management, and compliance monitoring.
Antivirus Practices for VMware View 5
In this mobile user- and device-centric environment, IT must protect data security and control user access to data at the same time as it manages the range of applications and devices for all users. The single operating system and single device per user is a model of the past. VMware offers an end user computing solution that meets the challenges of providing for a mobile workforce, without compromising IT control or the operational efficiencies of existing management processes. VMware products incorporate the needs of both IT and end users.
Secure Printing with VMware View
The first step in implementing Secure Print Release is to acquire the Secure Print Server solution from a printing partner. The Secure Print Control software will be installed on the same machine as your existing Print Server. The Secure Print Control software can use Active Directory for authentication or will integrate with an existing single sign-on solution. The Secure Print Control vendor solutions have modular SSO architecture and can work with you to integrate any existing SSO solution in your current infrastructure. Companies that do not want to use Active Directory or that have an existing SSO solution can alternatively use local lists or user input to a SQL database. The single sign-on and user login data are aggregated for compliance auditing purposes.
Security Solution Architecture for VDI
This brief provides an overview of the desktop security vulnerabilities which exist in both virtual and physical environments that must be addressed throughout the typical connection sequence, along with the VMware and thirdparty products that remediate the issues. Together, VMware and VMware technologies comprise a security solution architecture for virtual desktop infrastructure (VDI)βan architecture that goes beyond the viruses, worms, and phishing attacks mostly commonly addressed in desktop security technology to include data loss, system management, and compliance monitoring.
Antivirus Practices for VMware View 5
This paper focuses on the best practices for protection against viruses in the VMware View 5 virtual desktop environment. Antivirus software is one of the largest segments in todayβs computer security market. Nearly every enterprise deploys antivirus software on every desktop. As services such as security, mobility, access control, and line-of-business applications are all rolled up into the datacenter or cloud, antivirus practices need to be rolled up as well.
Tuesday, March 13. 2012
VMware Workstation and Fusion Technology Preview 2012
The Technology Previews 2012 of VMware Workstation and Fusion are available in VMware's Public Beta Programs. The objective of VMware's Beta Programs is to gain customer feedback on these products. Public betas are available to anyone interested in testing new software and providing feedback to VMware's product & engineering teams.
VMware Labs is providing public access to the VMware Fusion Technology Preview 2012 to gather real-world feedback from users on a wide range of hardware and software configurations. The VMware Fusion Technology Preview includes changes to the core virtualization engine.
This Technology Preview includes changes to the underlying virtualization platform that are under active development. There are no guarantees that changes in this preview will be forward compatible with other VMware software, nor that these changes will be present in future supported releases of VMware Workstation. This Technology Preview does not include major new features.
- Installation and operation of VMware Workstation on Windows 8 and Windows Server 8
- Installation and operation of Windows 8 consumer preview and Windows Server 8 in a virtual machine
- Rendering and graphics correctness issues on all platforms and applications
- Linux 3D desktop experience, particularly when using the Ubuntu 12.04 LTS Beta
- Linux 3D application graphics correctness and performance
- Stability in real-world scenarios including suspend/resume and display and device support
- Nested Virtualization - running ESX and even trying Hyper-V* as a guest OS
- VNC connection performance and stability
VMware Labs is providing public access to the VMware Fusion Technology Preview 2012 to gather real-world feedback from users on a wide range of hardware and software configurations. The VMware Fusion Technology Preview includes changes to the core virtualization engine.
- Installation and operation of Windows 8 previews in a virtual machine
- Running Mac OS X (Mountain Lion) in a virtual machine
- Rendering and graphics correctness issues on all platforms and applications
- Linux 3D desktop experience, particularly Ubuntu 12.04 LTS and recent OpenSUSE releases, which should work out-of-the-box
- Linux 3D application graphics correctness and performance
- Changing boot devices in Mac OS X virtual machines
- Performance and stability of virtual machine power operations including suspend, resume, pause and restart
- Stability in real-world scenarios including suspend/resume and display and device plugging on the Mac
Saturday, March 10. 2012
Cool Tool - IgniteVM
IgniteVM is used by database administrators to ensure service and availability of database instances running in VMware virtual machines. It shows the DBA what the database response time delays are, and what the contributing causes are at the instance, virtual machine, and physical layers.
IgniteVM is a 24/7 monitoring tool, based on industry best practice Performance Intelligence and Wait-Time analysis methods. IgniteVM supports Oracle, SQL Server, DB2 LUW and Sybase databases across all operating systems, running in VMware vCenter Server or stand-alone ESX/ESXi host environments.
IgniteVM is a 24/7 monitoring tool, based on industry best practice Performance Intelligence and Wait-Time analysis methods. IgniteVM supports Oracle, SQL Server, DB2 LUW and Sybase databases across all operating systems, running in VMware vCenter Server or stand-alone ESX/ESXi host environments.
Wait-Time Analysis and Virtualization Visibility
Wait-time analysis is an approach to application and database performance improvement that allows users to see where users are waiting the most. Traditionally, database performance is measured in the number of events and hit ratios. While somewhat meaningful and easy to capture, these statistics do not reflect a relevant view of the end-user experience nor do they reveal with any precision where the problem originated.
IgniteVM gives DBAs visibility to see virtual server operation correlated with database instance wait-time analysis data. Assessing database performance without visibility leaves database administrators (DBAs) guessing about the root cause, hampering their ability to take action to address their most important user-oriented problems.
IgniteVM gives DBAs visibility to see virtual server operation correlated with database instance wait-time analysis data. Assessing database performance without visibility leaves database administrators (DBAs) guessing about the root cause, hampering their ability to take action to address their most important user-oriented problems.
Friday, March 9. 2012
Cool Tool - AlarmVM
AlarmVM is used by VMware Administrators to detect problems in the VMware environment and proactively notify administrators. alarmVM is a 24/7 alarm monitoring tool that detects problems in VMware objects, including VMs, hosts, clusters, datastores and vCenter Servers. When alarm conditions are detected, alarmVM notifies VMware Administrators via email and/or SNMP trap.
Key Benefits:
- alarmVM can be installed and set up to monitor a VMware environment in less than 20 minutes.
- It automatically activates out-of-the-box alarms so an entire VMware environment is being monitored simply by registering a vCenter Server.
- By default, alarmVM notifies all configured contacts about each alarm, eliminating the need to set up contacts for each alarm.
- Using inheritable alarm policies, it is easy to change default alarm behavior on entire sets of vSphere objects (e.g. all VMs in a datacenter or all VMs in a folder).
- A 30 day history of alarms is kept, so you can see what happened in the past. During this period, alarmVM shows graphs for metric-based alarms with the underlying detailed data that would not be available in vSphere Client.
- alarmVM shows how alarms are trending so you can see if trouble is easing or mounting in your VMware environment.
alarmVM consists of a multi-tiered architecture consisting of an alarmVM Server, Web Clients, a Repository database and Monitored vSphere Servers.
- alarmVM: The alarmVM Server performs two key functions. First, it collects data from the monitored VMware servers. Second, it presents web pages to alarmVM users and sends notifications (emails and SNMP traps) when alarm conditions are detected. It is installed on a server that has network access to the Repository and each of the monitored servers. Although this process performs many functions, it appears as a single process on the operating system.
- alarmVM Repository: The Repository database instance is accessed by the alarmVM Server, and holds all of the collected alarm information. A default Repository is installed with alarmVM, but alarmVM can be configured to use another database instance for the Repository.
- Monitored Servers: alarmVMβs agentless monitors remotely connect to each VMware vCenter Server or ESX/ESXi host and cause less than 1% overhead on the monitored systems. No software is installed in the vCenter Server, ESX/ESXi host or Virtual Machines. A vSphere user (aka monitoring user) with administrator privileges is needed for monitoring.
- Web Browsers: alarmVM users view alarm data in a web browser. From this interface, users register VMware servers, configure alarms and contacts for alarm notification.