Apr 272017

VMware vSphere Replication (VR) is a replication feature that is included with vSphere Essentials Plus Kit and higher editions of vSphere. Replication is configured on a per-VM basis with RPOs as low as five minutes. It is compatible with vSAN, as well as, other datastore types such as VMFS, NFS, and vSphere Virtual Volumes (VVols).

The post vSAN Storage Policy Assigned to vSphere Replication Replicas appeared first on Virtual Blocks.

Apr 272017

VMware vSphere Replication (VR) is a replication feature that is included with vSphere Essentials Plus Kit and higher editions of vSphere. Replication is configured on a per-VM basis with RPOs as low as five minutes. It is compatible with vSAN, as well as, other datastore types such as VMFS, NFS, and vSphere Virtual Volumes (VVols).

The post vSAN Storage Policy Assigned to vSphere Replication Replicas appeared first on Virtual Blocks.

Apr 272017

Access the new NSX marketing programs – ranging from emails, webinars, and workshops to leads calling, hands-on labs, and more – on the Partner Demand Center today.

The post Close More Deals with New VMware NSX Programs appeared first on Partner News.

Apr 272017

Access the new NSX marketing programs – ranging from emails, webinars, and workshops to leads calling, hands-on labs, and more – on the Partner Demand Center today.

The post Close More Deals with New VMware NSX Programs appeared first on Partner News.

Apr 272017

After virtualization itself, the public cloud is considered the natural second step in helping both private and public organizations protect, extend, and replace existing data center infrastructure. And spending trends indicate that many enterprises are keen to jump on the public cloud bandwagon. According to Gartner, total public cloud spending through 2020 is projected to reach $381B.1


Already a trusted partner in virtualization, VMware is dedicated to helping its customers safely take the fast path the public cloud, delivering a true hybrid infrastructure that empowers organizations to enhance their data center investments and streamline IT control and capabilities.


And the timing couldn&#rsquo;t be better, as many organizations are encountering the limits of traditional data center capabilities. In both public and private sectors, end-user demands and expectations have created unprecedented levels of pressure on IT staff tasked with supporting their organizations&#rsquo; segue to more advanced data center capabilities.


IT leaders across industries have had to strike the perfect balance: modernize their data centers while complementing existing technology investments and third-party applications. VMware vCloud Air, the secure public cloud for VMware workloads, has helped countless decision-makers in this task, giving adopters an agile infrastructure that not only supports existing applications, but support for application development as well.


Organizations currently experiencing growing pains and unforeseen pressures to their data center capacity can harness three key benefits with vCloud Air:


  • Disaster Recovery: Safeguarding on-premises virtualized and non-virtualized infrastructure to keep IT operations up and running in the event of a disaster


  • Data Center Extension: With common management, seamless networking, and unified support, vCloudAir provides a seamless way to extend on-premises IT infrastructure by adding resources from the public cloud


  • Data Center Replacement: Quickly and securely &#rsquo;lift and shift&#rdquo; an on-premises vSphere infrastructure to the public cloud while maintaining a public cloud architecture that is consistent with the on-premises data center


Ultimately, existing vSphere users have enjoyed particularly seamless transitions to the public cloud, immediately gaining peace of mind and enjoying reduced day-to-day strain on IT staff resources. Learn more about how organizations are utilizing the public cloud to take the next step in updating their data centers.


1Gartner: Forecast Analysis: Public Cloud Services, Worldwide, 2Q16 Update, August 2016.

The post The Public Cloud: The True Next Step in Modern Data Center Control and Evolution appeared first on VMware vCloud.

Apr 272017

Host Profiles is an advanced capability of VMware vSphere that provides for configuration and compliance checking of multiple VMware ESXi hosts. Although a profile can be attached directly to a single host in vCenter Server, typically, a profile is attached to a vSphere cluster, where all the hosts have the same hardware, storage, and networking configurations. The latest release of vSphere includes several enhancements to Host Profiles. This post goes into a little more depth on two different sources of configuration settings for a host.

While Host Profiles focuses on configuring identical settings across multiple hosts, certain items must be unique for each host. These unique items are known as customizations; in the past, we also referred to them as answer files.

Administrators initially configure a reference host to meet business requirements and then extract the entire configuration into a new profile which can be subsequently edited or updated as requirements change. These settings are applied to other hosts in the cluster through the process of remediation, and hosts that are not able to meet all the profile requirements are flagged as non-compliant.

Profiles That UseDynamic Addressing Require Little Customization

In a very basic scenario, it is possible to foregocustomizations that requireadministrator input. This is the case if hosts are using DHCP for network identity – IP address and hostname – and there are no specific business requirements for setting unique root passwords per host.

Typical vSphere Host Configurations Use Static IP Addresses

But for most customers, static IP addresses are desirable in the datacenter, at least for IP storage and perhaps for vMotion or other VMkernel interfaces. Security guidelines may require all hosts to have unique root credentials, and there are other configurable items in a profile that also need to be specified per host. In general, when an attribute in Host Profiles is set to prompt for &#rsquo;user specified&#rdquo; input, that item will need to be configured per-host through customizations.

The following image gives some examples of settings on a host that will require customization:

When these customizations are missing, the profile will not be compliant – for many reasons. For example, shared datastores cannot be mounted if the appropriate VMkernel IP address is not configured.

Host Customizations Supply the Necessary Static Elements

Host customizations can be provided by vSphere administrators through a wizardduring the remediation process, or they can be uploaded in bulk via CSV file – a new feature of vSphere 6.5.

Once the host customizations have been provided and stored on vCenter Server, the associated profile can be remediated to become compliant.

Persistence of Host Customization Data

Host customization data is storedon vCenter Server, and will be deleted if a host is removed from inventory. This is an important behavior to be aware of, as sometimes hosts are removed and re-added to vCenter Server as part of troubleshooting or during a major rolling upgrade.

And finally, be aware that these host customizations apply to both stateful hosts using traditional on-disk installation, as well as stateless hosts that are booted from the network with Auto Deploy.


  • Host Profiles is a feature of vSphere designed to apply identical configuration to multiple VMware ESXi hosts
  • Settings that are unique for individual hosts are provided through customizations
  • vSphere Administrators enter or update customizations through graphical clients or via CSV file

The post Understanding How Host Profiles Handles Host-Specific Configuration Settings Through Customizations appeared first on VMware vSphere Blog.

Apr 272017

The VMware vCloud® Air™ Network is a global network of over 4000 service providers in 116 countries. Together, these providers distribute and deploy over 3 million VMs! It&#rsquo;s an unbelievable scale, but what does this mean for users?


It means giving users the cloud solutions they need at the enterprise level from any location in the world at scale. To illustrate this worldwide availability of cloud services, consider disaster recovery – an often overlooked, but critically important business need.


In this month&#rsquo;s vTechTalk, I discuss the vCloud Air Network and disaster recovery specifically how you can use vCloud to augment and improve your current disaster recovery processes. In the video, which you can find on our YouTube channel, I walk through the benefits of disaster recovery within the vCloud Air Environment and how VMware&#rsquo;s global network of providers can help any enterprise quickly scale its disaster recovery needs.



With VMware vCloud, customers have access to disaster recovery solutions that are globally distributed and, best of all, built from the ground-up with VMware&#rsquo;s vSphere replication environment. This makes it very easy for users to deploy a disaster recovery solution within their on-premise datacenters and then connect it to outside public clouds within the vCloud Air Network.


This hybrid disaster recovery and globally distributed approach yields huge advantages for customers such as limited downtime, automatic VM failover and switching, and minimal interruptions to core workloads during a disaster. Of course, the list goes on…


For more details on disaster recovery within the vCloud Air Network, I encourage you to watch the vTechTalk. And if you&#rsquo;re interested in learning more about service provider solutions that can fit your enterprise, check out our helpful search function here. Easily find service providers that fit your needs from a single search.


Thank you for watching!

The post vTechTalk: Disaster Recovery to the Cloud and VMware vCloud Air Network appeared first on VMware vCloud.

Apr 272017

Beitrag von Matthias Schorer, Lead Business Development Manager, IoT, EMEA bei VMware

In meinen letzten Beiträgen bin ich schon intensiv auf die Themen Chancen und Potentiale durch IoT, auf neue Geschäftsmodelle und die Bedeutung von Partnerschaften eingegangen. Als IoT-Experte bin ich täglich mit Unternehmen in Kontakt, die gerne entsprechende Projekte umsetzen möchten, die fantastische Visionen verfolgen und ihren Kunden einen echten Mehrwert bieten möchten. Doch während in den USA die Innovationen kräftig vorangetrieben werden, scheint Deutschland bei IoT-Projekten stets mit angezogener Handbremse zu fahren.

Größtes Hindernis: IT-Security

Die große Frage, die immer wieder gestellt wird, lautet: Was hindert denn die deutschen Unternehmen daran, IoT-Projekte umzusetzen? Sehen sie nicht die goldene Zukunft, die großartigen Möglichkeiten und die unternehmerischen Vorteile? Den Deutschen wird schon immer nachgesagt, dass ihre vielen Bedenken sie am Handeln hindern. Die folgende Erkenntnis ist deshalb wenig überraschend: Eine der größten Hemmschwellen ist eindeutig die IT-Sicherheit. Doch dank einer Umfrage von IDG zum Internet der Dinge können wir jetzt auch mit konkreten Zahlen aufwarten und sehen, wo genau der Schuh drückt – das ist der erste Schritt, um auch in Deutschland Fahrt aufnehmen zu können.

Immerhin 44 Prozent der deutschen Unternehmen geben an, dass sie das Internet der Dinge als neues Einfallstor für Angriffe sehen. Insbesondere in kleinen Unternehmen mit bis zu 99 Mitarbeitern (55 Prozent) und Unternehmen der Chemie- und Pharmaindustrie (58 Prozent) sind diese Bedenken stark verbreitet. Spannend ist auch ein Blick auf Unternehmen, die bereits die ersten Projekte verwirklicht haben. Für 57 Prozent stellte die Security tatsächlich die größte Herausforderung dar – ganz unbegründet sind die Bedenken der deutschen Unternehmen also nicht.

Komplexität als weiterer Fallstrick

Doch nicht nur die IT-Sicherheit stellt eine Herausforderung dar. Ein Drittel der befragten Unternehmen fürchtet die Komplexität des Themas. Weitere genannte Hemmnisse sind die IT-Infrastruktur (30 Prozent) und mit jeweils 29 Prozent mangelndes Know-how und fehlende Ressourcen. Vor allem kleine Unternehmen haben nicht immer die Manpower, um diese Projekte zu stemmen. IoT-Projekte sind umfangreich und herausfordernd – auch weil sich die Unternehmen nochmal intensiv mit den eigenen Produkten und Dienstleistungen auseinandersetzen und kreativ werden müssen. Hinzu kommt, dass IoT-Projekte auch teuer sein können, denn oftmals muss zunächst noch in Hardware, Cloud-Services oder Security-Maßnahmen investiert werden.

Anbieter stehen in der Pflicht

Dennoch: Deutsche Unternehmen müssen mit der amerikanischen Konkurrenz Schritt halten! Und das ist nur mit neuen Innovationen möglich: IoT ist einer der Türöffner, um bereits bestehende Produkte und Services weiterzuentwickeln, auf sich ändernde Kundenwünsche einzugehen und neue Mehrwerte zu generieren. Dennoch müssen die Bedenken der Unternehmen ernstgenommen werden und nicht einfach als das Bedürfnis der Deutschen Gründlichkeit abgetan werden. Und genau hier müssen die Anbieter einschreiten: Die Kunden müssen an die Hand genommen werden, Lösungen anhand von Beispielen aufgetan und deren Sicherheit demonstriert werden. Eine detaillierte Beratung von ausgewiesenen Experten wird auch schon bald deutsche Unternehmen von den Vorteilen des IoT überzeugen. Worauf warten Sie also noch? Helfen Sie dabei den Weg für weitere kreative Köpfe zu ebnen.

Weitere spannende Fakten aus der genannten Studie von CIO und Computerwoche finden Sie hier. Folgen Sie mir außerdem auf Twitter und erfahren Sie regelmäßig mehr über neueste IoT-Trends und Entwicklungen der Branche.

Apr 272017

Do your personal mobile apps steal data from you, with or without your consent? On the business side, does this mobile surveillance put your company’s data at risk? Read this insightful guest blog from Appthority Co-Founder and President Domingo Guerra.

It seems like a fair trade: Get your favorite mobile apps free, and watch annoying ads in return. Unfortunately, that is not all you do in return.

In reality, you give up a great deal of personal information. Mobile apps collect a massive amount of personal data—your location, your online history, your contacts, your schedule, your identity and more. The app instantly shares your information with mobile advertising networks. Those networks then use your personal information to determine the best ad at any given time and place.

Growing Privacy Threat: Mobile Surveillance

The tradeoff is not really ads for apps; it is intrusive mobile surveillance for apps. By agreeing to free, ad-sponsored mobile apps, we consent to an economic model that entails continuous and comprehensive personal surveillance. It is what Al Gore accurately characterized as the stalker economy.

Why is our personal, location and behavioral data so coveted by marketers? Because a smartphone is something that we as consumers carry everywhere we go. Our smartphones constantly broadcast personal data of all kinds. If advertisers know who we are, where we are and what we do, they can deliver ads that are more effective. Proximity marketing is the ad that pings your phone as you walk through the aisles. &#rsquo;Save 10% now on mouthwash.&#rdquo;

Sounds innocuous, if annoying, but it goes much further than this. We now enable a system where a major retailer can know, for example, that a teenager is pregnant before her parents do simply by correlating her activity, search and purchase data. That retailer can then reach out via mail or email or target her via phone when she is near a point of sale.

This intrusion on our collective privacy is not going away anytime soon (if ever), as the economic incentives for app developers and advertisers are too strong.

[Related: 7 Simple Ways to Secure Your Smartphone]

Enterprise Data at Risk, Too

Okay, agreed, this kind of consumer surveillance is intrusive and creepy, but how does it threaten enterprise security? Simple. As personally owned mobile devices invade the business world, leaks from those devices open the door to corporate hacks, stolen business data and crippling cyber attacks.

For instance, if a company lets its employees sync their corporate calendars and email accounts to their personal mobile devices, this opens up all sorts of risks. Suddenly, employees&#rsquo; phones contain or access the contact information of everyone in the organization. Further, any mobile app that requests access to the employees&#rsquo; contacts and calendar also gets access to the names and titles of company employees. Those apps can get dial-in codes for all private conference calls. A malicious app or hacker can easily use this information in a spear phishing attack.

Worse, many apps monetize their user bases by sharing data with ad networks that share and combine data with other networks. It is impossible to know exactly where data is going and whether any of the many parties that have access to this data handle it securely. All of this sharing means a malicious hacker does not even have to access an employee&#rsquo;s phone to attack a company. He can hack an ad network with the information from millions of users and go from there.

Stolen information can also attack an enterprise through a watering hole attack. For example, your company executives eat lunch regularly at a local restaurant. An attacker with access to their geolocation data could easily know this. The attacker correctly assumes that some of the execs are accessing the restaurant&#rsquo;s website to make reservations and browse the menu before lunch. By placing malware on the lightly defended site, the attacker can compromise the office computer or mobile device of one or more company executives. From there, the attacker can launch a successful breach.

A compromised smartphone represents a threat not just to the targeted employee, but also to the entire company.

Information about employees&#rsquo; activities both on the job and elsewhere, combined with any company-related emails, documents or sensitive information, can be devastating to an organization if it gets into the wrong hands.

[Related Partner Blog: 4 Tips to Protect Company Data & Mobile Employees]

So What Should Enterprises Do to Combat the Threat?

The first step to combating these threats is visibility. Your organization needs to know what apps employees are using, what those apps are doing and whether or not they comply with corporate security policies. For example, is there a particularly risky file-sharing app you do not want employees to use? Is it already used? If you do not know which apps your employees use for work, you are flying blind and taking a huge risk.

However, your organization also has a responsibility to protect your employees&#rsquo; privacy.

For example, it may not be prudent for &#rsquo;Jack from IT&#rdquo; to know that &#rsquo;Jill from finance&#rdquo; has a dating app or a diabetes app on her phone. Further, if employees fear a &#rsquo;big brother&#rdquo; scenario where IT is always looking over their shoulder, they may opt out of using security tools altogether leading to Shadow IT and making your enterprise less secure.

[Related: Data Privacy in 2017: From Project to Priority]

Balancing Privacy & Security

So, how do large enterprises balance the need for mobile security and employee privacy? By employing a Blind

Click to download our free eBook.

Enforcement model, where all IT sees is whether a device (using an anonymized device ID) is compliant or not while simultaneously empowering employees, but providing automate risk education so they can self-manage and self-remediate their devises for mobile risk.

This model represents a win-win, by giving IT and security teams peace of mind that the devices that are connecting to corporate email, corporate Wi-Fi, and corporate/managed apps are compliant. Users also see this model as a win, as they are given a tool to manage and protect their own privacy and security. Whether in BYO or corporate-owned environments, we often ask our employees to agree to a mobile policy, but usually don&#rsquo;t provide education or tools for them to know if they are in compliance. Using an automated Mobile Threat Protection solution with Blind Enforcement like Appthority, both IT and employees can feel safe.

There are other benefits of bringing the employee into the workflow with a self-management and self-remediation model. For one, it decreases the workload on IT or Security teams. These teams no longer become bottlenecks in compliance and enforcement workflows and instead give an opportunity for employees to comply, knowing that if they don&#rsquo;t comply in a certain time period, the system will automatically restrict the employees&#rsquo; access to sensitive company data and networks. Second, it provides on-the-fly security education and training to employees, allowing them to be part of the solution and not just part of the problem. Finally, it changes user behavior to not only improve the current state of security across your mobile fleet, but also improve the security of future use.

Next, you need a policy for managing the use of mobile devices. Most organizations already have policies for other platforms, including managing firewalls and sharing data with partners.

It is equally important to create these policies for mobile. For instance, if employees use free versions of apps that are approved by the company but ad-supported, create a policy that requires employees to upgrade to the paid version. This helps minimize, if not eliminate, unsanctioned data in the form of ads being sent to employees—though it does not eliminate the relentless collection of personal and private data.

A good next step is to educate employees about the risks of the apps they download. It is in your best interest to empower users by arming them with tools and training to make better decisions about what apps they download. For instance, coach your employees to question apps that ask for permission. Many apps want to access location, contacts or camera.

Employees do not have to say &#rsquo;yes&#rdquo; automatically. If an app does not say why it needs access, that is a big red flag.

Most apps work fine if the user denies the request. If the app really needs access to work, it will prompt users again for permission.

Enterprises can address all of these areas with a good mobile security solution. Any enterprise without a mobile threat protection solution is, by definition, unaware of its mobile risks and related data losses. It is therefore imperative that your enterprise include mobile threat protection as part of its overall security strategy. With the right mobile security platform, you take a huge step toward protecting both employee privacy and company data from the ever-growing threat of mobile surveillance and data gathering.

Because you liked this blog:

  • Bulletproof RDS: 30 Ways to Secure Remote Desktop Services
  • Infographic: Optimizing Secure Mobility in Retail
  • Redesigning the VMware AirWatch Privacy Policy

The post Silent Mobile Threat: How Apps Steal Your Data appeared first on VMware End-User Computing Blog.

Apr 272017

By: Christian Fernando


When using SAP native tools such as SAP Solution Manager, there isn&#rsquo;t visibility into the underlying virtualization layers, leaving a blind spot in understanding the complete performance story. The virtualization layer includes, but is not limited to, the virtual machine, ESXi server, CPU, memory and storage. If I am an SAP administrator, the ability to quickly see contention of infrastructure resources and find root causes of performance or outage incidents is very valuable to keep my user base happy and access/uptime SLAs at a high level.

In this post, I&#rsquo;ll provide insight into an example topology of a virtualized environment and dashboards that offer in-depth views into the infrastructure-monitored environment. The second in this two-part blog series will provide insight for the IT administrator, showcasing how visibility into the layers below virtualization will help determine usage patterns in the business and how to dynamically respond to those changes without affecting SLAs.


Topology of a Virtualized SAP Environment


Figure 1: Example topology of a virtualized environment in vROps


The topology includes:

  1. EPP as the SAP System
  2. SAP APP1 as the SAP Host
  3. D00 as the ABAP Instance
  4. SAP APP1 as the VMware VM
  5. ESXI INF as the VMware ESXi Server


With vRealize Operations (vROps), you can also see additional relationships that include all SAP HANA and/or database instances.


Real World Scenario: Memory Contention


Using the Blue Medora Management Packs on vROps, trace the SAP application to the SAP Host. Through the power of relationships, trace which virtual machine this is running on to the VMware ESXi server. In doing so, you will see a contention for memory and CPU on the hypervisor to accommodate the workloads of all the VMs.


Figure 2: The Blue Medora SAP Management Pack for vROps provides insight into memory contention.


With detailed alerts and notifications, understand when your disks are running out of space before it impacts the performance of the database instances and SAP application residing on it. In turn, you can prevent service interruptions of your business-critical SAP application environment and take action before lights go out on application access.


Figure 3: Example of the SAP HANA High Disk Utilization Dashboard


How to Extend Visibility into Storage for SAP


Understanding whether storage and capacity issues are causing performance problems simplifies the troubleshooting process — giving you immediate insight into what part of the IT stack may be causing issues. The Blue Medora SAP Management Pack gives you extended visibility so you can clearly drill down to the root cause of issues, reducing mean-time-to-innocence and eliminating alert storms.


The management pack includes more than 3,000 key performance metrics, including active session counts and system utilization. Combined with a series of out-of-the-box dashboards and reports, gain real-time access to understand issues as they arise instead of when they derail your performance.


To learn more about the SAP Management Pack from Blue Medora or to download a free trial, please visit the True Visibility Suite for VMware vRealize Operations page on Blue Medora&#rsquo;s website.

The post How to Pinpoint Storage Problems in Your SAP Environment appeared first on VMware Cloud Management.

Apr 262017

Whether setting up vSAN using Easy Install, manually, or through the vSphere Web Client, once the first host is setup, there are some necessary tasks to complete the configuration. Initial tasks required include setting up a VMkernel port with vSAN traffic, claiming disks, and more. Each of these can be accomplished relatively easily at through

The post vSAN 6.6 Configuration Assist Makes Setup & Updating Easier appeared first on Virtual Blocks.

Apr 262017

In today’s mobile cloud world, it&#rsquo;s all about the apps. Apps are what help your workforce be productive and successful. Unfortunately, employees do not often use the apps their company provides. Studies have shown that with each extra step required for onboarding a new app, you lose 7% of your user base. Six steps to get started? That means 42% of your workers will never use your work app a single time.

For a successful app strategy, you must deliver the right apps on the right device easily and securely without compromising the privacy of personal data.

Simplifying App Access & Management

VMware Workspace ONE makes it easy for employees to have secure access to the business applications they need, allowing them to get work done whenever and wherever through the Workspace ONE app.

Users have their own personalized app catalog across all of their devices. This makes onboarding new employees with the right apps easier than ever. Additionally, by using powerful single sign-on (SSO) capabilities, your workforce gets immediate access to the information they need without having to remember multiple passwords.

Securing Work Apps & Lowering Costs

When it comes to security, Workspace ONE protects even the most sensitive information, restricting corporate apps from sharing data with personal apps, prevents copy/paste and much more using powerful data-loss prevention policies. These create access control rules to restrict rooted or jailbroken devices and ensure only authorized users and devices can access company applications. IT can set granular, contextual app access policies from one single place.

Best of all, lower costs and higher security make your life easier, helping reduce support tickets from lost passwords and offers remote assistance, self-service tools and troubleshooting. It’s all combined into a super simple solution the users will actually want to use.

Workspace ONE makes it easy to deliver transformational business apps to your workforce and empowers employees to be productive from anywhere with secure, one-touch access to the apps they need—any time on any device.

Click here to get a custom demo of Workspace ONE today.

Want to take Workspace ONE for a test drive? Check out our free hands-on lab.

The post New Video! Simplifying App Access & Management with VMware Workspace ONE appeared first on VMware End-User Computing Blog.

Apr 262017

It can be quite challenging for IT administrators to provide great user experience for high-performance desktops remotely. With VMware Blast Extreme and its new adaptive transport capabilities, we made this possible.

With all the excitement a few weeks ago around the announcement of VMware Horizon 7.1 and Blast Extreme Adaptive Transport, a new NVIDIA GRID test drive provides a quick way for you to get your hands on a demo environment within minutes—all without leaving your office or spinning up internal resources and/or infrastructure.

VMware and NVIDIA&#rsquo;s free &#rsquo;try GRID&#rdquo; demo gives you instant access to hours of NVIDIA GRID vGPU acceleration experience powered by NVIDIA Tesla M60 graphics cards running Horizon 7.1. This experience includes a Windows desktop with 2D and 3D industry-leading enterprise applications, including:

  • Microsoft Office;
  • Adobe Acrobat Reader;
  • Autodesk AutoCAD;
  • Dassault Systèmes SOLIDWORKS;
  • Esri ArcGIS Pro;
  • Siemens NX; and
  • More.

VMware and NVIDIA work together to solve the challenges of delivering consistent user experience for professional graphics workloads in both LAN and WAN environments. With the Blast Extreme protocol, users experience rich, immersive virtual desktop experiences by leveraging the power of NVIDIA Tesla M60 graphics card. This technology provides not only graphics acceleration, but also H.264 encode capabilities. Users caccess 3D graphics applications on any device in any location without compromising user experience, while maintaining enterprise security. With NVIDIA GRID and Horizon, a true workstation-like experience is now possible on a virtual workstation.

Try GRID desktops are available in multiple regions across the world, allowing IT administrators to try both transcontinental and intercontinental scenarios. You can test virtual desktops in San Francisco, Amsterdam and Singapore to experience how Blast Extreme with its adaptive transport intelligently handles varying latencies and packet loss for delivery anywhere in the world.

Download our latest Horizon clients, and sign up for try GRID today to see for yourself how well Horizon and NVIDIA GRID deliver the best experience anywhere in the world.

Because you liked this blog:

  • Innovation In User Experience: A Closer Look at New Blast Extreme Protocol
  • Enterprise-Grade Monitoring with NVIDIA GRID vGPU & Horizon 7
  • Manufacturers Increase Productivity & Reduce Time to Market with Horizon & NVIDIA GRID

The post Experience High-Performance Graphics with Free NVIDIA GRID & VMware Blast Extreme Test Drive appeared first on VMware End-User Computing Blog.

Apr 262017

Businesses of all sizes are creating a digital workspace, delivering anytime, anywhere access to all applications, services and resources across all devices – desktops, tablets and smartphones.

What is the digital workspace? What will a digital workspace do for your IT organisation and your business?

Get a crash course on the digital workspaceand how to do it right from the start with a new VMware Special Edition of theSecure Digital WorkspaceFor Dummies, by our own experts Pam Takahama, Josue Fontanez and Tricia Stream. Get the whole story on the digital workspace, the benefits, the potential pitfalls and the technical stuff.

Regardless ofwhereyou&#rsquo;re at on your digital workspacejourney, the most important thing is that you&#rsquo;reonthat path.Users increasingly expect a consistent experience no matter where, when and how they&#rsquo;re logging in to access work. The answer, as the Dummies guide outlines,is the digital workspace.

&#rsquo;Employees want a seamless experience across personal devices, as well as corporateowned devices, without IT configuration hassles. They also want to be confident that a secure divide exists between their personal and work data— in other words, Big Brother isn&#rsquo;t watching! The same with applications— from legacy to native mobile and cloud to virtual. Workers don&#rsquo;t care how these applications get delivered, but they do care that every application they need is available when they need it.

How can your business support new identitydefined workspaces across a variety of users— retail store associates checking inventory on a PC and a smartphone, hospital clinicians entering test results into a mobile workstation and an iPad, or financial advisors placing trades from Android devices and laptops?

The answer is the digital workspace.&#rdquo;

Download your free copynow of the Secure Digital Workspace For Dummies tolead your organisation&#rsquo;s digital transformation.

Apr 262017

Many of you may have seen the recent announcement onVMware acquiring Wavefront, a Palo Alto-based cloud analytics firm. You can learn the initial details about the acquisition from the blog article written by Ajay Singh, the General Manager and SVP of the VMware Cloud Management Business Unit.

Now, I am glad to share with you more analysis of this event – this time, from one of the major analysts in the cloud space.



Enterprise Management Associates (EMA) is the leading industry analyst firm that provides deep insight across the full spectrum of IT and data management technologies. Torsten Volk, EMA&#rsquo;s managing research director, hybrid cloud, has just published an EMA Impact Brief focused on VMware&#rsquo;s acquisition of Wavefront. The brief covers the Wavefront&#rsquo;s background, its solutions and technology, and the EMA&#rsquo;s view on how Wavefront will help to further propel VMware&#rsquo;s DevOps capabilities.




Torsten starts off by providing the background on Wavefront going back to the time when it was started by former Google employees who set out to create a SaaS-based data analytics platform for cloud-hosted applications. Drilling down, we are introduced to the technology that drives the platform:

  • Metrics collection and storage
  • Analytics engine
  • API and GUI

In essence, Wavefront connects to existing applications, containers, and big data frameworks as well as most popular mega-clouds, to collect and analyze their operational metrics for IT and business process optimization, capacity planning, and user experience monitoring purposes.


Not Your Grandfather&#rsquo;s Monitoring Tool


The article makes a critical point of explaining that Wavefront is not just a monitoring tool, but a data analytics, visualization and alerting platform that relies on input from all of the above components, including monitoring tools such as Nagios, NewRelic, or VMware&#rsquo;s vRealize products. Therefore, Wavefront does not require data collection agents, but receives its input directly from tools and services that are already in place.

The key to understanding the value of Wavefront is to clearly define the use cases it solves. Wavefront enables developers to understand exactly how their application consumes cloud infrastructure and services. The article explains how users can get impactful results both for IT, but also for business processes.


Strategic Fit and EMA Perspective


In conclusion, Torsten provides the EMA&#rsquo;s position on how Wavefront fits into VMware&#rsquo;s Cloud Management Platform strategy in general, and into its growing support of DevOps function within the IT organization. He looks at the Wavefront&#rsquo;s value on a broader scale, but also specific to the recently-announced and soon to be released VMware Cloud on Amazon AWS, as one very strong value proposition for customers who will be moving their applications into the public cloud.


The post Wavefront Acquisition: Analyst’s View appeared first on VMware Cloud Management.