Citrix Hypervisor 8.1-Produktdokumentation

Total Page:16

File Type:pdf, Size:1020Kb

Citrix Hypervisor 8.1-Produktdokumentation Citrix Hypervisor 8.1 Citrix Product Documentation | docs.citrix.com June 9, 2020 Citrix Hypervisor 8.1 Contents Citrix Hypervisor 8.1 Current Release 3 What’s new 4 Fixed issues 11 Known issues 13 Deprecation 18 System requirements 24 Configuration limits 28 Guest operating system support 33 Quick start 37 Technical overview 59 Technical FAQs 66 Licensing 83 Install 91 Installation and deployment scenarios 100 Upgrade from an existing version 106 Update your hosts 115 Troubleshoot the installation 127 Boot from SAN environments 128 Network boot installations 131 Host partition layout 137 Install on small devices 138 Hosts and resource pools 139 Clustered pools 152 © 1999-2020 Citrix Systems, Inc. All rights reserved. 2 Citrix Hypervisor 8.1 Manage users 157 Role-based access control 165 RBAC roles and permissions 166 Use RBAC with the CLI 177 Networking 182 Manage networking 198 Troubleshoot networking 221 Storage 226 Storage repository formats 231 Thin provisioned shared GFS2 block storage 248 Manage storage repositories 255 Storage multipathing 267 IntelliCache 269 Storage read caching 274 PVS-Accelerator 277 Graphics overview 284 Prepare host for graphics 289 Create vGPU enabled VMs 299 Memory usage 305 Monitor and manage your deployment 307 Manage virtual machines 330 Windows VMs 335 Linux VMs 355 VM memory 364 © 1999-2020 Citrix Systems, Inc. All rights reserved. 3 Citrix Hypervisor 8.1 Migrate VMs 370 Import and export VMs 374 Bromium Secure Platform 391 Container management 392 vApps 400 Demo Linux virtual appliance 404 Advanced notes for virtual machines 406 Enable VNC for Linux VMs 415 Troubleshoot VM problems 427 High availability 434 Disaster recovery and backup 441 Enable Disaster Recovery 444 vApps 449 Back up and restore hosts and VMs 450 VM snapshots 455 Cope with machine failures 461 Troubleshooting 465 Measured Boot Supplemental Pack 469 Workload Balancing 472 Get started with Workload Balancing 475 Administer the Workload Balancing virtual appliance 484 Certificates for Workload Balancing 553 Convert VMware workloads 561 vSwitch and Controller 577 © 1999-2020 Citrix Systems, Inc. All rights reserved. 4 Citrix Hypervisor 8.1 Manage vSwitch 582 Virtual network visibility and control 588 Administer and maintain the vSwitch Controller 606 Commands 610 Troubleshoot vSwitch Controller issues 615 Command-line interface 618 SDKs and APIs 747 Data Governance 748 © 1999-2020 Citrix Systems, Inc. All rights reserved. 5 Citrix Hypervisor 8.1 Citrix Hypervisor 8.1 Current Release May 27, 2020 The technology you trust from XenServer, the high-performance hypervisor optimized for virtual app and desktop workloads and based on the Xen Project hypervisor, is now Citrix Hypervisor. Latest release Citrix Hypervisor 8.1 is the latest Current Release version of Citrix Hypervisor and this documentation reflects features and configurations in this latest release. To learn about the new features in Citrix Hypervisor 8.1, see What’s New. Earlier releases For documentation on supported previous releases, see: • Citrix Hypervisor 8.0 CR • XenServer 7.1 LTSR • XenServer 7.0 Documentation for Citrix Hypervisor and XenServer releases that are no longer supported is archived in the Legacy Documentation area. The Citrix Hypervisor product lifecycle strategy for Current Releases and Long Term Service Releases is described in Lifecycle Milestones for Citrix Hypervisor. About Citrix Hypervisor Citrix Hypervisor is the complete server virtualization platform from Citrix. The Citrix Hypervisor pack- age contains all you need to create and manage a deployment of virtual x86 computers running on Xen, the open-source paravirtualizing hypervisor with near-native performance. Citrix Hypervisor is optimized for both Windows and Linux virtual servers. Citrix Hypervisor runs directly on server hardware without requiring an underlying operating system, which results in an efficient and scalable system. Citrix Hypervisor works by abstracting elements from the physical machine (such as hard drives, resources, and ports) and allocating them to the virtual machines running on it. A virtual machine (VM) is a computer composed entirely of software that can run its own operating sys- tem and applications as if it were a physical computer. A VM behaves exactly like a physical computer and contains its own virtual (software-based) CPU, RAM, hard disk, and NIC. © 1999-2020 Citrix Systems, Inc. All rights reserved. 6 Citrix Hypervisor 8.1 Citrix Hypervisor lets you create VMs, take VM disk snapshots, and manage VM workloads. For a comprehensive list of major Citrix Hypervisor features, visit https://www.citrix.com/products/citrix- hypervisor. XenCenter XenCenter is a Windows GUI client that provides a rich user experience when managing multiple Citrix Hypervisor servers and resource pools, and the virtual infrastructure associated with them. For more information, see the XenCenter documentation. What’s new April 29, 2020 About this release The technology you trust from XenServer, the high-performance hypervisor optimized for virtual app and desktop workloads and based on the Xen Project hypervisor, is now Citrix Hypervisor. Citrix Hypervisor 8.1 is a Current Release (CR). The Current Release model allows customers to con- sume new features at the earliest possible juncture. A Current Release contrasts with the Long Term Service Release (XenServer 7.1 LTSR), which guarantees stability in terms of the feature set. Citrix Hypervisor 8.1 is available in the following editions: • Premium Edition (previously Enterprise Edition) • Standard Edition • Express Edition (previously Free Edition) For information about the features available in each edition, see the Citrix Hypervisor Feature Matrix. New features and improvements in Citrix Hypervisor 8.1 Citrix Hypervisor 8.1 introduces enhanced features and functionality for application, desktop, and server virtualization use cases. All Citrix Hypervisor 8.1 features are available to all licensed Citrix Vir- tual Apps and Desktops (formerly XenApp and XenDesktop) customers. © 1999-2020 Citrix Systems, Inc. All rights reserved. 7 Citrix Hypervisor 8.1 Guest UEFI boot and Secure Boot Citrix Hypervisor enables VMs running Windows 10 (64-bit), Windows Server 2016 (64-bit), or Windows Server 2019 (64-bit) to boot in UEFI mode. UEFI boot provides a richer interface for the guest operating systems to interact with the hardware, which can significantly reduce Windows VM boot times. For these Windows operating systems, Citrix Hypervisor also supports Windows Secure Boot. Secure Boot prevents unsigned, incorrectly signed or modified binaries from being executed during boot. Secure Boot also reduces the risk that malware in the guest can manipulate the boot files or run during the boot process. For more information, see Windows VMs Note: Guest UEFI boot was provided in Citrix Hypervisor 8.0 as an experimental feature. If you created UEFI boot VMs with Citrix Hypervisor 8.0 you cannot migrate them to Citrix Hypervisor 8.1. You must shutdown these UEFI boot VMs before updating to Citrix Hypervisor 8.1. Multiple vGPU For NVIDIA GPUs and drivers that support multiple vGPU, you can configure a single VM to use multiple virtual GPUs concurrently. These additional vGPUs can be used to perform computational processing. Only certain vGPU profiles can be used and all vGPUs attached to a single VM must be of the same type. For more information, see Graphics Overview. Performance improvements Improved performance for VM imports and exports that use the XVA format Changes to the checksum used in XVA files in Citrix Hypervisor 8.1 provide significant performance improvements when importing or exporting VMs using this new checksum algorithm. The reduction in the time it takes to import or export a VM depends on the specific hardware of the machine. The larger the VM the larger the performance improvement seen. Use XenCenter 8.1 to manage exported VMs that use XVA files with the new checksum algorithm. If you have a custom application that relies on the format of the checksum included in the XVA file, up- date your application to use the new format. The checksum has changed to use the xxHash algorithm. The checksum file name now ends with the extension .xxhash. © 1999-2020 Citrix Systems, Inc. All rights reserved. 8 Citrix Hypervisor 8.1 Storage performance improvements Citrix Hypervisor 8.1 includes the following performance enhancements to storage: • Storage performance is significantly improved when I/O is performed in block sizes larger than 64 KiB on an NFS SR. • Multipage support is now available in non-GFS2 SRs for better storage performance. If your Windows VM has the Citrix VM Tools installed, the VM uses multipage support automatically. To enable multipage support on a Linux VM complete the following steps: 1. First, verify that your kernel supports the max_ring_page_order parameter. Run the following command: 1 modinfo xen_blkfront | grep max_ring_page_order If this command returns an empty response, your kernel does not support this feature. Do not proceed with these steps. 2. Take a snapshot of your VM. 3. On the VM, run the following command: 1 echo ’options xen_blkfront max_ring_page_order=3’ >/etc/ modprobe.d/xen_blkfront.conf 4. Depending on your Linux distribution, run one of the following commands: – For RHEL, CentOS, or Oracle Enterprise Linux: dracut -f -v – For Debian-based distributions: update-initramfs -u -k all 5. Reboot your VM. New Windows I/O drivers with improved performance Updated Windows I/O drivers with the major version 9 (9.x.x.x) are provided with this release of Cit- rix Hypervisor for the following operating systems: Windows 8.1, Windows 10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server Core 2016, Windows Server 2019, Win- dows Server Core 2019. These Windows I/O drivers include a number of performance improvements. These drivers are also available through Windows Update for Premium Edition customers. Windows I/O drivers with the major version 8 (8.x.x.x) are still provided for the older supported Win- dows operating systems. These drivers do not contain the performance improvements.
Recommended publications
  • Xen Enterprise
    Xen: the Past, Present and Exciting Future Ian Pratt Chairman of Xen.org, SVP and Founder of Bromium Sponsored by: & 1 Outline • Community Update • Xen 4 Review • Xen and the next wave of virtualization 2 COMMUNITY UPDATE 3 2011 Highlights • Inclusion of Xen into Linux 3 (and distros) • New Initiatives: – Project Kronos – Xen.org Governance – Renewed focus on Xen for ARM • Successful Community Initiatives – Documentation Day – Google Summer of Code – Hackathons: Cambridge (Citrix) and Munich (Fujitsu) • Lars Kurth: (not so) new Community Manager 4 Contribution Statistics By Change Sets Contributors to Xen.org 5000.0 200 4500.0 180 4000.0 160 3500.0 140 3000.0 120 XenARM** 2500.0 100 PVOPS Individuals 2000.0 XCP 80 Orgs 1500.0 Xen HV 60 1000.0 40 500.0 20 0.0 0 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011* *) End of Sept 2011 **) Activity on Development branch (not yet in xen-unstable) 5 2010 & 2011 Contributors (by KLOC) 2010** 2011** *** 1% 2% 3% 4% 5% 4% 6% 5% Citrix HV 28% Citrix XCP Citrix XCP 5% Citrix HV Oracle Samsung* 39% 11% Intel Novell 6% Novell Oracle Fujitsu AMD 7% AMD Individual Individual 13% Intel Misc 18% Misc 8% University 20% 15% *) Activity on Development branch (not yet in xen-unstable) **) Includes PVOPS ***) Until Sept 2011 6 Developer mailing list traffic Conversations, excluding patches excluding Conversations, 1000 1500 2000 2500 500 0 Oct-03 Dec-03 Feb-04 Apr-04 Jun-04 Aug-04 Oct-04 Dec-04 Feb-05 Apr-05 Jun-05 Aug-05 Oct-05 Dec-05 Feb-06 Apr-06 Jun-06 Aug-06 Oct-06 Dec-06 xen-devel Feb-07 Apr-07 Jun-07 Aug-07
    [Show full text]
  • Bromium Advanced Endpoint Security Protect | Detect | Respond
    Data Sheet Bromium Advanced Endpoint Security Protect | Detect | Respond At a Glance Today’s enterprises are fighting a losing battle against advanced, Bromium Advanced Endpoint Security targeted and often undetectable cyber attacks. In spite of the uses micro-virtualization and contextual, increased spend on more and more layered security solutions, real-time detection to protect across all major threat vectors and attack types. organizations are not making headway against attackers. Enterprises Enterprises can finally defeat cyber attacks and eliminate endpoint breaches. are getting breached, users’ productivity is hampered by side effects of security solutions, and IT is stuck on a treadmill of never-ending Key Business Benefits patching and remediation. PROTECT AGAINST ZERO-DAY ATTACKS Revolutionary micro-virtualization technology prevents known and Bromium® Advanced Endpoint Security next-generation endpoint protection unknown cyber attacks from offers a better way to defeat cyber that integrates endpoint threat isolation, compromising endpoints and your attacks that target the endpoint, where threat analytics and continuous host corporate network more than 70% of breaches originate. monitoring to enable organizations TRUE PREVENTION WITHOUT The first to deliver an endpoint security to protect, detect and respond to USER DISRUPTION Users can safely click on anything from solution based on virtualization, targeted attacks, zero-day threats and home, branch offices, airports and cafes— Bromium offers comprehensive attempted breaches in real time. without the need for restrictive policies DETECT ATTEMPTED BREACHES Behavioral detection techniques alert and monitor suspicious activity on the host system ELIMINATE REMEDIATION AND EMERGENCY PATCHING COSTS Bromium-protected endpoints are self-remediating because any possibility of malware persistence is eliminated.
    [Show full text]
  • Improving Desktop System Security Using Compartmentalization
    Improving Desktop System Security Using Compartmentalization by Mohsen Zohrevandi A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved April 2018 by the Graduate Supervisory Committee: Rida Bazzi, Chair Gail-Joon Ahn Adam Doupé Ming Zhao ARIZONA STATE UNIVERSITY August 2018 ABSTRACT Compartmentalizing access to content, be it websites accessed in a browser or docu- ments and applications accessed outside the browser, is an established method for protect- ing information integrity [12, 19, 21, 60]. Compartmentalization solutions change the user experience, introduce performance overhead and provide varying degrees of security. Strik- ing a balance between usability and security is not an easy task. If the usability aspects are neglected or sacrificed in favor of more security, the resulting solution would have a hard time being adopted by end-users. The usability is affected by factors including (1) the gen- erality of the solution in supporting various applications, (2) the type of changes required, (3) the performance overhead introduced by the solution, and (4) how much the user expe- rience is preserved. The security is affected by factors including (1) the attack surface of the compartmentalization mechanism, and (2) the security decisions offloaded to the user. This dissertation evaluates existing solutions based on the above factors and presents two novel compartmentalization solutions that are arguably more practical than their existing counterparts. The first solution, called FlexICon, is an attractive alternative in the design space of compartmentalization solutions on the desktop. FlexICon allows for the creation of a large number of containers with small memory footprint and low disk overhead.
    [Show full text]
  • Stratodesk Notouch Desktop
    Stratodesk NoTouch Desktop www.stratodesk.com NoTouch Desktop is the #1 endpoint OS and [email protected] management solution for your preferred VDI US: +1 (415) 946 4029 environment. This Linux-based, small footprint EU: +43 (463) 890298 hardware agnostic solution allows companies to cost effectively scale and manage endpoints. By working seamlessly across x86 and ARM based hardware products (including the Raspberry Pi), NoTouch Center provides a unified platform for all EUC enterprise endpoints. Increase endpoint security, simplify management and universalize user experience while also maximizing on the benefits of existing desktop hardware through PC Repurposing. NoTouch is a registered trademark of Stratodesk Corp. All hardware and software names are brand names or registered trademarks of their respective manufacturers. Errors and omissions excepted. © 2018 Stratodesk Corp., all rights reserved. Features & Benefits Hardware Agnostic and Highly Desktop. Build, configure and control your entire Scalable endpoint device network from one browser. Stratodesk’s software runs on any x86 or ARM NoTouch Center is the only endpoint management based device (including Raspberry Pis). Replace solution that can run either from an on premise your need for locally installed Windows and easily installation or from the cloud. scale up your network of end user devices. Authentication and Single Sign-on Standardizing Desktops and NoTouch fully supports Imprivata Single Sign-On, Hardware Repurposing including features like Fingerprint Authentication, Standardize your endpoints by turning new and Fast User Switching and more. existing PCs, Laptops and Thin Clients regardless of manufacturer into powerful, up-to-date NoTouch clients. Easily Customizable Configure and customize endpoints however you Highly Flexible - Any EUC like.
    [Show full text]
  • Deployment Guide Citrix Virtual Apps and Dekstops with Windows Virtual
    Deployment Guide for Citrix Virtual Apps and Desktops service with Windows Virtual Desktop Table of Contents Overview ...................................................................................................................................................... 3 Conceptual Architecture ............................................................................................................................ 3 Scope ............................................................................................................................................................ 3 Deployment Steps ...................................................................................................................................... 6 Create an Azure Subscription and an Azure Active Directory Tenant ............................................... 6 Connect the on premises AD to Azure AD using Azure AD Connect ............................................... 10 Create a master image using Windows 10 Enterprise for Virtual Desktops .................................. 15 Create a Cloud Connector in your Azure subscription ...................................................................... 19 Create a Citrix Cloud Account .............................................................................................................. 23 Create a new Resource Location ........................................................................................................ 27 Request a Citrix Virtual Apps and Desktops service trial .................................................................
    [Show full text]
  • Securing the Path to Windows 10 How to Achieve the Benefits of Virtualization-Based Security Without a Hardware Refresh White Paper
    White Paper Securing the Path to Windows 10 How to Achieve the Benefits of Virtualization-based Security Without a Hardware Refresh White Paper Introduction “Bromium, a Microsoft partner, For enterprises the #1 reason to upgrade to Windows 10 is delivers hardware-enforced improved security, but the critical enhancements that rely on security to today’s deployed Windows endpoints. More hardware protection will be difficult to adopt until you buy importantly, Bromium enables new PCs. Bromium, a Microsoft partner, delivers hardware- IT organizations to easily upgrade existing PCs to Windows 10 with enforced security to today’s deployed Windows endpoints. More hardware-enforced security importantly, Bromium enables IT organizations to easily upgrade that extends the in-box security existing PCs to Windows 10 with hardware-enforced security that of Windows 10, without a hardware refresh, accelerating extends the in-box security of Windows 10, without a hardware Windows 10 rollouts.” refresh, accelerating Windows 10 rollouts. Windows 10 Security Windows 10 Enterprise promises many security enhancements over Windows 7 and 8, and introduces a family of hardware-assisted security technologies in Device Guard (DG). DG helps to ensure a secure boot, whitelists kernel code and offers credential protection and biometric authentication. The most important Figure 1: Windows 10 Device Guard SECURING THE PATH TO WINDOWS 10 2 White Paper “VBS uses endpoint CPU feature is virtualization-based security (VBS) which uses Hyper-V, enhanced with virtualization to isolate and elements of micro-virtualization, to help protect the operating system using protect two critical Windows hardware virtualization. The Bromium / Microsoft partnership aims to accelerate services: Windows Code Integrity service which protects the kernel the roadmap for VBS.
    [Show full text]
  • Citrix Virtual Apps and Desktops 1808 on Microsoft Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019 RDS/VDI
    Citrix Virtual Apps and Desktops Feature Analysis Citrix Virtual Apps and Desktops 1808 on Microsoft Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019 RDS/VDI The Microsoft server and desktop operating systems provide a solid foundation for an enterprise-level RDS and VDI deployment, whether that deployment is based within the organization’s data center running Hyper-V or in the Azure cloud. This foundation, when extended with Citrix Virtual Apps and Desktops 1808, can enable the following benefits for a broader array use cases: • Simple, scalable management and support capabilities: A single solution, supporting RDS, VDI and physical workloads with built-in life cycle revision management for dev, test, UAT, production and archive image, capable of updating and rolling back images in the time it takes a user to reboot. • Delightful and productive user experiences: A dynamic protocol providing users with the best route to their workspace, built with the integration of local, on premise and cloud-based apps and desktops, utilizing logon optimizations capable of reducing logon times by up to 90%. The user experience also provides print capabilities to any end point device (Windows, Mac, Linux, iOS, Android, Chromebooks, and HTML5) from any resource (apps and desktops) over any connection (locally attached printers and network attached printers) with a single, universal print driver and print server. • Device, app and cloud flexibility: An open solution that supports any hypervisor, any cloud and any device while running on a set of integrated infrastructure technologies that not only optimizes storage performance but does so in a way that directly impacts the user experience.
    [Show full text]
  • Citrix Gateway Service
    Citrix Gateway Service Citrix Product Documentation | docs.citrix.com September 28, 2021 Citrix Gateway Service Contents Release Notes 3 Get started with Citrix Gateway service 14 Technical Security Overview 15 Migrate Citrix Gateway to Citrix Gateway service for HDX Proxy 18 HDX Adaptive transport with EDT support for Citrix Gateway service 24 Support for Citrix Virtual Apps and Desktops 27 Route tables to resolve conflicts if the related domains in both SaaS and web apps are the same ‑ Tech Preview 29 Contextual access to Enterprise Web and SaaS applications – Tech Preview 33 Read‑only access for admins to SaaS and Web apps 37 Support for Software as a Service apps 41 Apps configuration using a template 52 SaaS app server specific configuration 59 Citrix Gateway Connector 73 Citrix Gateway Connector dashboard 96 Support for Enterprise web apps 97 Support for Citrix Endpoint Management 109 Citrix Cloud Gateway Connector availability in Azure Marketplace 113 Citrix Cloud Gateway Connector availability in Azure 118 Deploy a Citrix Gateway Connector instance on AWS ‑ Tech Preview 125 ADFS integration with Secure Workspace Access 131 FAQ 140 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Gateway Service Release Notes August 24, 2021 The Citrix Gateway service release to cloud release notes describe the new features, enhancements to existing features, fixed issues, and known issues available in a service release. The release notes include one or more of the following sections: What’s new: The new features and enhancements available in the current release. Fixed issues: The issues that are fixed in the current release.
    [Show full text]
  • Citrix Hypervisor 8.2
    Citrix Hypervisor 8.2 Citrix Product Documentation | docs.citrix.com August 16, 2021 Citrix Hypervisor 8.2 Contents Citrix Hypervisor 8.2 3 新增功能 4 自 XenServer 7.1 以来的新增功能 8 已修复的问题 19 已知问题 21 弃用 25 系统要求 32 配置限制 35 来宾操作系统支持 39 快速入⻔ 42 技术概述 61 技术常⻅问题解答 68 许可 82 安装 89 安装和部署方案 96 从现有版本升级 101 更新您的主机 109 对安装问题进行故障排除 119 从 SAN 环境引导 120 网络引导安装 124 主机分区布局 133 在小型设备上安装 134 XenCenter 当前版本 135 © 1999‒2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Hypervisor 8.2 主机和资源池 135 群集池 150 管理用户 154 基于⻆色的访问控制 161 RBAC ⻆色和权限 161 将 RBAC 与 CLI 结合使用 171 网络连接 176 管理网络连接 189 网络连接故障排除 208 存储 212 存储库格式 216 精简预配的共享 GFS2 块存储 233 管理存储库 240 存储多路径 251 和 IntelliCache 253 存储读缓存 256 PVS 加速器 259 图形概述 266 准备主机以处理图形 270 创建启用了 vGPU 的 VM 279 内存使用率 285 监视和管理您的部署 287 管理虚拟机 307 Windows VM 310 © 1999‒2021 Citrix Systems, Inc. All rights reserved. 3 Citrix Hypervisor 8.2 Linux VM 327 VM 内存 334 迁移 VM 340 导入和导出 VM 343 删除 VM 355 Bromium 安全平台 357 vApp 359 演示版 Linux 虚拟设备 361 虚拟机高级注释 363 为 Linux VM 启用 VNC 372 VM 问题故障排除 384 高可用性 390 灾难恢复和备份 397 启用灾难恢复 399 vApp 402 备份和还原主机和 VM 403 VM 快照 407 处理计算机故障 414 故障排除 417 标准引导补充包 420 Workload Balancing 423 Workload Balancing 入⻔ 425 管理 Workload Balancing 虚拟设备 435 用于 Workload Balancing 的证书 491 © 1999‒2021 Citrix Systems, Inc. All rights reserved. 4 Citrix Hypervisor 8.2 转换 VMware 工作负载 498 命令行接口 511 第三方声明 625 Citrix Hypervisor 开源许可和属性 625 SDK 和 API 630 数据治理 631 © 1999‒2021 Citrix Systems, Inc.
    [Show full text]
  • Weekly Internet / Digital Media / Saas Sector Summary
    Weekly Internet / Digital Media / SaaS Sector Summary Week of October 28th, 2013 Industry Stock Market Valuation Internet / Digital Media / SaaS Last 12 Months Last 3 Months 170 130 58% 55% 160 53% 125 46% 22% 150 43% 21% 120 43% 13% 43% 140 11% 40% 115 9% 32% 130 8% 8% 110 7% 120 7% 105 110 100 100 95 90 80 90 10/25/12 01/24/13 04/25/13 07/25/13 10/25/13 07/25/13 08/16/13 09/09/13 10/02/13 10/25/13 (1) (2) (3) (4) NASDAQ Search / Online Advertising Internet Commerce Internet Content Publishers (5) (6) (7) (8) Diversified Marketing Media Conglomerates Gaming SaaS Notes: 1) Search/Online Advertising Composite includes: BCOR, BLNX-GB, GOOG, FUEL, MCHX, MM, MRIN, MSFT, QNST, RLOC, TRMR, VCLK, VELT, YHOO, YNDX, YUME. 2) Internet Commerce Composite includes: AMZN, AWAY, CPRT, DRIV, EBAY, EXPE, FLWS, LINTA, NFLX, NILE, OPEN, OSTK, PCLN, PRSS, SSTK, STMP, TZOO, VPRT. 3) Internet Content Composite includes: AOL, DHX, DMD, EHTH, IACI, MOVE, MWW, RATE, RENN, RNWK, SCOR, SFLY, TRLA, TST, TTGT, UNTD, WBMD, WWWW, XOXO, Z. 4) Publishers Composite includes: GCI, MMB-FR, NWSA, NYT, PSON-GB, SSP, TRI, UBM-GB, WPO. 5) Diversified Marketing Composite includes: ACXM, EFX, EXPN-GB, HAV-FR, HHS, IPG, MDCA, NLSN, VCI, WPP-GB. 6) Media Conglomerates Composite includes: CBS, CMCSA, DIS, DISCA, LGF, SNE, TWX, VIA.B. 1 7) Gaming Composite includes: 035420-KR, 036570-KR, 2432-JP, 3632-JP, 3765-JP, 700-HK, ATVI, CYOU, EA, GA, GAME, GLUU, NTES, PWRD, UBI-FR, ZNGA.
    [Show full text]
  • It's That Time
    December 2014 / January 2015 | Vol. 8 No. 1 VirtualizationReview.com 2015 READERS CHOICE AWARDS WINNER IT’S THAT TIME OFYEAR! Eggnog, presents and the products you like best. PLUS > VIRTUAL PREDICTIONS > DELL’S VDI STRATEGY > UNTANGLING VMWARE DRS VISIT VIRTUALIZATIONREVIEW.COM contents The objective is helping organizations accomplish their 6 goals; not to push any specifi c type of technology. By Dan Kusnetzky 2015Readers Choice Awards “Chromebook desktop ÌÌÌÌ Winner ÌÌÌÌ access looks especially promising, especially in the education market.” Garret Grajek, dinCloud 18 6 December 2014 / January 2015 | VIRTUALIZATION REVIEW | VOL. 7, NO. 2 FEATURES 11 Best Cloud Storage Product 15 Best Network 4 The 2015 Reader’s Choice 12 Best Cloud Security Product Virtualization Product Awards and Buyer’s Guide 12 Best Cloud Software Product 16 Best Virtualization Security Product You, the readers, have spoken. 13 Best Business Continuity Product Here are the virtualization and Best Converged 14 Best Virtualization 17 cloud computing products that Automation Product Infrastructure Product rock your world. Best Virtualization Training 15 Best Storage 17 6 Best Application Virtualization Product Virtualization Product 6 Best Server Virtualization Product Best Desktop Virtualization/ 7 18 2015 Virtualization Predictions COLUMNS Virtual Desktop Infrastructure Product What can you expect to happen 2 Editor’s Note: KEITH WARD in the virtualization and cloud 3 Expectations for 2015 8 Best Mobile Virtualization/ BYOD Product industries in the coming year?
    [Show full text]
  • Hardware-Assisted Security for High-Value Information
    SOLUTION BRIEF Application Code Security Intel® Software Guard Extensions Hardware-Assisted Security for High-Value Information Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions Developers have long been constrained by the security capabilities that major platform providers have exposed for application development. These same capabilities are also well known to hackers, who have exploited weaknesses to steal sensitive data and credentials, or hijack code for attacks. Until now, developers have been forced to rely on the provider’s security architecture, with no way to apply a security model designed to fit their own requirements after a platform release has shipped. Recognizing the need for a new model that protects selected code and data from disclosure or modification, Intel designed Intel® Software Guard Extensions (Intel® SGX), a hardware-assisted trusted execution environment with the smallest possible attack surface. With Intel SGX, developers can partition their application into CPU-hardened “enclaves,” or protected areas of execution, that increase security even on compromised platforms. Using this new application-layer trusted execution environment allows developers to enable identity and records privacy, secure browsing, DRM, harden end point protection, or any high assurance security use case that needs to safely store secrets or protect data. Intel SGX is an Intel® technology for application developers who are seeking to protect select code and data from disclosure or modification. Intel SGX makes such protections possible through the use of enclaves. Application code can be put into an enclave by special instructions and software made available to developers via the Intel SGX SDK.
    [Show full text]