Index
A
- Access Policy Manager (APM) tool / Log Intelligence value propositions
- Advanced Service Designer (ASD) forms / vRCS deployment architecture
- AMD I/O Virtualization (AMD-Vi or IOMMU) / Modes of GPU usage
- App analytics
- for smart planning / App analytics for smart planning
- AppDefense
- about / ML and VMware, AppDefense and NSX
- globally expanding / Expanding globally with AppDefense
- enhanced security / Enhanced security with AppDefense
- detailed implementation / Detailed implementation and configuration plan
- configuration plan / Detailed implementation and configuration plan
- deployment, environment preparation / Environment preparation for AppDefense deployment
- application-centric alerting
- for SOC / Application-centric alerting for the SOC
- application-specific integrated circuits (ASICs) / The NaaS operating model
- application development life cycles / Application development life cycles
- application scalability
- on vSAN / Application scalability on vSAN
- application security readiness
- transforming / Transforming application security readiness
- automation, with vRealize
- about / Automation with vRealize
- SDDC Content Life Cycle / Automation with vRealize
- infrastructure, deploying as code / Deploying Infrastructure as Code
- Autoregressive Integrated Moving Average (ARIMA) / Log Intelligence value propositions
B
- BIG-IP DNS components
- customizing / Customizing the BIG-IP DNS component
- listener / Customizing the BIG-IP DNS component
- data center / Customizing the BIG-IP DNS component
- server / Customizing the BIG-IP DNS component
- virtual server / Customizing the BIG-IP DNS component
- pool / Customizing the BIG-IP DNS component
- wide-IP / Customizing the BIG-IP DNS component
- DIG / Customizing the BIG-IP DNS component
- BIG-IP DNS high-level design / BIG-IP DNS high-level design
- BIG-IP DNS load-balancing algorithm
- global availability / Global availability
- ratio / Ratio
- round robin / Round robin
- BIG-IP LTM objects
- node / Configuring BIG-IP LTM objects
- pool member / Configuring BIG-IP LTM objects
- pool / Configuring BIG-IP LTM objects
- virtual server / Configuring BIG-IP LTM objects
- big data infrastructure
- about / Big data infrastructure
- Hadoop, as service / Hadoop as a service
- BMC Remedy IT Service Management (ITSM) / Pipeline automation model – the release process for any kind of software
- bring your own device (BYOD) / Top ten use cases of Workspace ONE Intelligence
- business and operations challenges
- overview / Overview on business and operations challenges, The challenges of not having services owners for the operations team
- solutio, with service owners / A solution with service owners
- responsibilities, of service owner / Responsibilities of the service owner
- Business Process Management (BPM) platform / Case study – automating application delivery for a major media provider
C
- Canadian Institute For Advanced Research (CIFAR) / Comparing ML workloads to GPU configurations
- CapEx / Considering solutions with CapEx and OpEx
- CD pipeline
- about / CD pipeline
- plan / CD pipeline
- code / CD pipeline
- commit / CD pipeline
- Challenge handshake authentication protocol (CHAP) / Open source software
- CI pipeline
- about / CI pipeline
- control stack / CI pipeline
- feedback stack / CI pipeline, Feedback
- planning / Planning
- clarity / Open source software
- cloud-native applications
- about / Cloud-native applications
- characteristics / Cloud-native applications
- automation, with containers / Automation with containers
- Cloud Pod Architecture (CPA) / Expanded Win32 app delivery
- Cloud Security Alliance (CSA) / Compliance management
- Cloud Service Managers (CSMs) / Transforming VMware technical support operations
- Code Stream
- about / vRealize Code Stream
- technical advantages / vRealize Code Stream
- collective operations, MPI applications / Intel tested a variety of HPC benchmarks
- command-line interface (CLI) / Indexing performance, storage, and report export
- commercial off-the-shelf (COTS) software solution / Considering solutions with CapEx and OpEx
- computational fluid dynamics (CFD) / Intel tested a variety of HPC benchmarks
- container as a service (CaaS) / Automation with containers
- containerized ML applications
- Container Networking Interface (CNI) / Deploying and running containerized workloads
- containers
- automation, performing with / Automation with containers
- about / Automation with containers
- use cases / Container use cases
- challenges / Challenges with containers
- Content-Based Read Cache (CRBC) / vSAN Observer
- content pack / The Log Insight user interface
- continuous deployment (CD) / Containerized ML applications inside a VM
- continuous integration (CI) / Containerized ML applications inside a VM
- Criminal Justice Information Services (CJIS) / Compliance management
- cumulative functions / Events
- Custom data centers (CDCs) / Log Intelligence key benefits for service providers
- Customer Experience Improvement Program (CEIP)
- about / VMware's Customer Experience Improvement Program/vSAN ReadyCare, Release strategy, CEIP
- de-registration process / CEIP
D
- data loss prevention (DLP) / Intelligent government workflows with automation
- data movement
- across, Wavefront and Log Intelligence / Log Intelligence value propositions
- destination NAT (DNAT) port forwarding / Deploying Infrastructure as Code
- Device Service Clustering (DSC) / The LBaaS LTM design
- DevOps model
- change management / Change management
- release management / Release management
- compliance management / Compliance management
- incident management / Incident management
- event management / Event management
- capacity management / Capacity management
- DirectPath I/O (DPIO) / DirectPath I/O
- Distributed Execution Manager (DEM) / vRA appliance communication
- distributed firewall (DFW) rules / Product usage data utilization
- Distributed Logical Router (DLR) / LBaaS network design using NSX
- distributed resource manager (DRM) / Virtualizing HPC applications
- Distributed Resource Scheduler (DRS) / The Log Insight user interface, Multi-tenancy with guaranteed resources
E
- Elastic Container Service (ECS) / Log Intelligence value propositions
- electronic design automation (EDA) chip designers / High-performance computing cluster performances
- Endpoint Detection and Response (EDR) / AppDefense and NSX
- expanded Win32 app delivery / Expanded Win32 app delivery
F
- fault tolerance (FT) / VMware best practices recommendations
- Fault Tolerance Method / FTT policy with RAID configurations
- Federal Risk Authorization and Management Program (FedRAMP) / Compliance management
- Foundational VMware NSX-T deployment / Deploying the NSX-T foundation
- FTT policy
- with RAID configuration / FTT policy with RAID configurations
- Fully-Qualified Domain Name (FQDN) / BIG-IP DNS high-level design
- functions as a service (FaaS) / Automation with containers
G
- general-purpose GPUs (GPGPU) / Intel tested a variety of HPC benchmarks
- General Data Protection Regulation (GDPR) / Transforming networking and security, Least-privilege security for containerized applications, Compliance management
- General purpose Input Output (GPIO) / Modes of GPU usage
- Global Server Load Balancer (GSLB) / Datastores
- Google Cloud Platform (GCP) / Pivotal Container Service and VMware Kubernetes Engine
- GPU configuration
- equal share scheduler / vGPU scheduling and vGPU profile selection
- fixed share scheduler / vGPU scheduling and vGPU profile selection
- GPU scalability
- in virtual environment / Scalability of GPU in a virtual environment
- GPU usage
- modes / Modes of GPU usage
- GPU usage, modes
- hardware-assisted I/O MMU virtualization / Modes of GPU usage
H
- Hadoop architecture
- Hadoop File System (HDFS) / A standard Hadoop architecture
- Map / A standard Hadoop architecture
- Reduce / A standard Hadoop architecture
- Hadoop Distributed File System (HDFS) / Hadoop as a service
- Hadoop journey
- categorizing / Hadoop as a service
- Hadoop virtualization
- benefits / Benefits of virtualizing Hadoop
- security and configuration isolation use case / Use case – security and configuration isolation
- automating application delivery for major media provider, use case / Case study – automating application delivery for a major media provider
- hard disk drive (HDD) / VMware best practices recommendations
- hardware-accelerated graphics, configuration
- Virtual Shared Graphics Acceleration / Virtual shared graphics acceleration
- vSGA settings, in virtual machine / Configuring vSGA settings in a virtual machine
- virtual machine settings, for vGPU / Virtual machine settings for vGPU
- Health Insurance Portability and Accountability Act (HIPPA) / Compliance management
- high-performance computing cluster performances
- about / High-performance computing cluster performances
- standard Hadoop architecture / A standard Hadoop architecture
- standard tests / Standard tests
- HPC challenge benchmarks / Intel tested a variety of HPC benchmarks
- high availability (HA)
- configuration, in stretched clusters / HA configuration in stretched clusters
- two-node clusters / Two-node clusters
- High Performance Computing (HPC)
- about / MLaaS in a private cloud
- technical requisites / Technical requirements
- Horizon / Power user and designer profiles
- Hortonworks Data Platform (HDP) / The BDE plugin
- HPC applications
- virtualizing / Virtualizing HPC applications
- multi-tenancy, with guaranteed resources / Multi-tenancy with guaranteed resources
- unification, critical use case / Critical use case – unification
- high-performance computing cluster performances / High-performance computing cluster performances
- HPC benchmarks / Intel tested a variety of HPC benchmarks
- HTTP Service / Application architecture overview
- Hybrid Linked Mode (HLM) / Hybrid-linked-mode testing functionality
- hybrid run time (HRT) / Intel tested a variety of HPC benchmarks
- hyperconverged infrastructure (HCI) / Business outcomes of the VMware approach
I
- I/O operations per second (IOPS) / Application scalability on vSAN
- IaaS solution, with vRealize Suite
- about / IaaS solution using vRealize Suite
- business-level administration / Business-level administration and organizational grouping
- organizational grouping / Business-level administration and organizational grouping
- vRA deployment / vRA deployment
- Identity and Access Management (IAM) roles / Business-level administration and organizational grouping
- identity service, executing
- VMware directory service / Services running as part of the identity service
- VMware KDC service / Services running as part of the identity service
- VMware Secure Token Service / Services running as part of the identity service
- InfiniBand (IB) / Virtualizing HPC applications
- Infrastructure as a Service (IaaS) / Automation with containers
- infrastructure as code (IaC) / Challenges with containers
- integrated deep insights / Integrated deep insights
- intelligent automation driven
- design requirements / Design requirements
- conceptual designs / Conceptual designs
- intelligent log management, with vRealize Log Insight
- about / Intelligent log management with vRealize Log Insight
- Log Intelligence value propositions / Log Intelligence value propositions
- intelligent monitoring / Intelligent monitoring
- intelligent operational analytics
- about / Intelligent operational analytics
- vRealize Operations Manager architecture / The vRealize Operations Manager architecture
- capacity planning / Capacity planning
- critical success factors / Critical success factors
- Kubernetes solution, from VMware / Kubernetes solution from VMware
- Intel Virtualization Technology for Directed I/O (VT-d) / Modes of GPU usage
- International Organization for Standardization (ISO) / Compliance management
- internet group management protocol (IGMP) / VMware best practices recommendations
- Internet of Things (IoT)
- internet small computer system interface (iSCSI) / VMware best practices recommendations
- IoT data center network security
- NSX distributed firewall / NSX distributed firewall
- prerequisites, to any automation / Prerequisites to any automation
- Hybrid cloud, for scale and distribution / Hybrid cloud for scale and distribution
- IoT support
- prerequisites, for configuration / Configuring IoT support
- virtual machines, in OVA / Virtual machines in the OVA
- enabling / Virtual machines in the OVA
- use cases, with VMware Pulse / IoT use cases with VMware Pulse
- IoT use cases, with VMware Pulse
- automotive industry / Powering the connected car (automotive industry)
- entertainment / Entertainment, parks, and resorts
- parks / Entertainment, parks, and resorts
- resorts / Entertainment, parks, and resorts
- smart hospitals / Smart hospitals (medical)
- smart surveillance (higher education) / Smart surveillance (higher education)
- smart warehouse (retail industry) / Smart warehouse (retail industry)
- internet of trains (transportation and logistics) / The internet of trains (transportation and logistics)
- financial industry / The financial industry
- smart weather forecasting / Smart weather forecasting
- IP flow information export (IPFIX) / NSX for vSphere
- IT security
- innovating, with developers / Innovating IT security with developers, security, and the Ops team
- innovating, with security / Innovating IT security with developers, security, and the Ops team
- innovating, Ops team / Innovating IT security with developers, security, and the Ops team
J
- Jenkins / vRealize Code Stream
K
- key performance indicators (KPIs) / Workspace ONE Intelligence
- Knowledge Base (KB) / Collector, viewer, and advisor, Transforming VMware technical support operations
- Kubernetes as a service (KaaS) / Pivotal Container Service and VMware Kubernetes Engine
L
- Large Receive Offload (LRO) / Critical use case – unification
- Lattice Boltzmann Magneto-Hydrodynamics (LBMHD) / Standard tests
- LBaaS design use cases
- single-site load balancer, deploying / LBaaS design use cases
- multi-site load balancer, deploying / LBaaS design use cases
- load balancer, modifying / LBaaS design use cases
- VM, de-provisioning / LBaaS design use cases
- LBaaS workflow / LBaaS design use cases
- LBaaS LTM design
- BIG-IP LTM objects, configuring / Configuring BIG-IP LTM objects
- oad-balancing method, designing / Designing the LTM load-balancing method
- LTM virtual server, designing / Designing the LTM virtual server
- LBaaS network design, with NSX / LBaaS network design using NSX
- LBaaS workflow / LBaaS design use cases
- least privilege security
- for containerized applications / Least-privilege security for containerized applications
- Lightweight Directory Access Protocol (LDAP) / The user experience, vRA deployment
- line of business (LOB) / Adopting internal mobile applications, Critical use case – unification
- load balancer as a service (LBaaS)
- overview / LBaaS overview
- design use cases / LBaaS design use cases
- Local Traffic Manager (LTM) / LBaaS design use cases
- Log Insight
- about / The Log Insight user interface
- indexing performance / Indexing performance, storage, and report export
- storage / Indexing performance, storage, and report export
- report export / Indexing performance, storage, and report export
- user experience / The user experience
- Log Insight Interactive Analysis
- about / The user experience
- events / Events
- query, creating / Events
- Log Insight user interface
- dashboard / The Log Insight user interface
- interactive analytics / The Log Insight user interface
- Log Intelligence (LInt)
- about / Log Intelligence value propositions
- key benefits, for service providers / Log Intelligence key benefits for service providers
- audit log examples / Audit log examples
- dashboard / Audit log examples
- Log Intelligence metrics
- features / Log Intelligence value propositions
- Log Intelligence value propositions / Log Intelligence value propositions
M
- M10 / GRID vPC and GRID vApps capabilities
- machine learning (ML)
- about / ML and VMware
- virtualized GPUs, using with / Using virtualized GPUs with ML
- machine learning as a service (MLaaS)
- technical requisites / Technical requirements
- in private cloud / MLaaS in a private cloud
- VMware approach / VMware approach for MLaaS
- macOS adoption
- simplifying / Simplified macOS adoption
- massively-parallel processing (MPP) databases / Hadoop as a service
- Maximum transmission unit (MTU) / VMware container-based services
- mean time between failures (MTBF) / Critical success factors
- mean time to repair (MTTR) / Critical success factors
- mean time to resolution (MTTR) / Log Intelligence key benefits for service providers
- Message Passing Interface (MPI) / Virtualizing HPC applications, Intel tested a variety of HPC benchmarks
- Microsoft Office 365 (O365) applications
- ML, with NVIDIA GPUs
- about / ML with NVIDIA GPUs
- pool and farm settings, in Horizon / Pool and farm settings in Horizon
- ML-based data analysis / ML-based data analysis
- MLaaS, using vGPU / MLaaS using vRealize Automation and vGPU
- MLaaS, using vRealize Automation / MLaaS using vRealize Automation and vGPU
- ML workloads
- comparing, to GPU configurations / Comparing ML workloads to GPU configurations
- MxGPU / GRID vWS to Quadro vDWS
N
- NaaS operating model
- about / Challenges with network and security services , The NaaS operating model
- LBaaS network design, using NSX / LBaaS network design using NSX
- BIG-IP DNS high-level design / BIG-IP DNS high-level design
- BIG-IP DNS load-balancing algorithm / The BIG-IP DNS load-balancing algorithm
- LBaaS LTM design / The LBaaS LTM design
- NaaS service
- NaaS transformation envisioning / The NaaS operating model
- NaaS transformation discovery / The NaaS operating model
- National Security Agency (NSA) / Critical use case – unification
- NAT topology / PKS/NSX-T logical topologies
- net promoter score (NPS) / Release strategy
- network and security
- challenges / Challenges with network and security services
- network as a service (NaaS)
- used, for transforming traditional network / The NaaS operating model
- Network Filesystem Storage (NFS) / Critical use case – unification
- network functions virtualization (NFV) / Open source software
- network interface card (NIC) / Network design policy
- Network time protocol (NTP) / VMware container-based services
- network time protocol (NTP) / Recommendations with priority 1
- network transformation, with IoT
- technical requisites / Technical requirements
- NFS Storage / NSX for vSphere
- NO-NAT topology / PKS/NSX-T logical topologies
- non-uniform memory access (NUMA) / Recommendations with priority 3, Multi-tenancy with guaranteed resources
- non-volatile memory express (NVMe) / VMware best practices recommendations
- NSX / AppDefense and NSX
- NSX, for vSphere
- about / NSX for vSphere
- ESXi hosts / NSX for vSphere
- NSX-T
- deploying, for network virtualization on ESXi / Deploying NSX-T for network virtualization on ESXi and deploying PKS for use in a private cloud
- foundation, deploying / Deploying the NSX-T foundation
- containerized workloads, deploying / Deploying and running containerized workloads
- containerized workloads, executing / Deploying and running containerized workloads
- NSX Public Cloud Gateway (PCG) / Business-level administration and organizational grouping
- NVIDIA Grid / Power user and designer profiles
- NVIDIA GRID Virtual Applications (vApp) / GRID vPC and GRID vApps capabilities
- NVIDIA GRID Virtual PC (vPC) / Virtual machine settings for vGPU
- NVIDIA GRID Virtual Workstation (vWS) / GRID vPC and GRID vApps capabilities
- NVIDIA vGPU configuration
- on vSphere ESXi / NVIDIA vGPU configuration on vSphere ESXi
- NVIDIA VIB / Adding vGPU hosts to a cluster with vGPU Manager
O
- open network automation platform (ONAP) / Open source software
- open source software
- about / Open source software
- solutions, with CapEx / Considering solutions with CapEx and OpEx
- solutions, with OpEx / Considering solutions with CapEx and OpEx
- open virtualization appliance (OVF) / Skyline Collector user permissions
- open virtualization application (OVA) / Deploying and running containerized workloads
- Open vSwitch (OVS) / Open source software
- Operational Summary Report (OSR) / Product usage data utilization, Transforming VMware technical support operations
- OpEx / Considering solutions with CapEx and OpEx
P
- P2P messages / Intel tested a variety of HPC benchmarks
- packets per second (pps) / Log Intelligence value propositions
- Particle Mesh Ewald Molecular Dynamics (PMEMD) / Standard tests
- Payment Card Industry (PCI) / Compliance management
- PC lifecycle management (PCLM) / Workspace ONE AirLift
- Peripheral Component Interconnect (PCI) / VMware best practices recommendations
- persistent volumes (PV) / Storage for K8s cluster node VMs
- Pivotal Application Service (PAS) / Automation with containers
- Pivotal Cloud Foundry (PCF) / Automation with containers
- Pivotal Container Service (PKS)
- PKS/NSX-T logical topologies
- about / PKS/NSX-T logical topologies
- use cases, with different configurations / Use cases with different configurations
- PKS and NSX-T Edge Nodes and Edge Cluster / PKS and NSX-T Edge Nodes and Edge Cluster
- PKS and NSX-T communications / PKS and NSX-T communications
- storage, for K8s cluster node VMs / Storage for K8s cluster node VMs
- datastores / Datastores
- PKS availability zone (AZ)
- about / PKS availability zone
- management AZ / PKS availability zone
- compute AZ / PKS availability zone
- PKS component
- compute and storage requisites / PKS on vSphere
- PKS deployment, on vSphere
- about / PKS on vSphere
- vSphere clusters / PKS on vSphere
- PKS Management Plane / PKS on vSphere
- PKS data plane / PKS on vSphere
- K8s master node / PKS on vSphere
- vSphere cluster configuration / PKS availability zone
- PKS/NSX-T networks / PKS availability zone
- CIDR, for nodes IP block / PKS availability zone
- PKS design topologies / PKS availability zone
- policies, IoT data center network security
- Distributed firewall (DFW) / IoT data center network security
- guest introspection / IoT data center network security
- network introspection / IoT data center network security
- automate remediation / IoT data center network security
- automate coherent perspective / IoT data center network security
- pool and farm settings, in Horizon
- configuring / Pool and farm settings in Horizon
- Portable Batch System (PBS) / Virtualizing HPC applications
- prerequisites, Skyline Collector
- software requirements / The requirements for Skyline Collector
- networking requirements / Networking requirements
- proactive support technology, with Skyline
- product-related data utilization
- about / Product usage data utilization
- product deployment reports / Product usage data utilization
- SDDC analysis / Product usage data utilization
- customer advocacy surveys, for new SDDC product releases / Product usage data utilization
- customer support / Product usage data utilization
- customer profiles and advanced analytics / Product usage data utilization
- Pulse IoT Center infrastructure management blueprint
- about / Pulse IoT Center infrastructure management blueprint
- OVA, deploying / Deploying and configuring the OVA
- OVA, configuring / Deploying and configuring the OVA
- IoT support, configuring / Configuring IoT support
- IoT data center network security / IoT data center network security
Q
- quad data rate (QDR) / Intel tested a variety of HPC benchmarks
- quality of service (QoS) / vSAN policy design with SPBM, Strategic partner
R
- remote direct memory access (RDMA) / Standard tests
- Representational State Transfer (REST) / VMware vReaIize Network Insight, Services running as part of the identity service
- role-based access control (RBAC) / VMware Cloud on AWS differs from on-premises vSphere
- Ruby vSphere Console (RVC) / vSAN Observer
- rugged devices
- extended management / Extended management for rugged devices
S
- SDDC Content Life Cycle
- Production Tenant / Automation with vRealize
- vRO / Automation with vRealize
- workflows / Automation with vRealize
- Xenon / Automation with vRealize
- configuration / Automation with vRealize
- SDDC journey stages
- about / SDDC journey stages
- cost center / SDDC journey stages
- service provider / SDDC journey stages
- business partner / SDDC journey stages
- capabilities / SDDC journey stages
- VMware container-based services / VMware container-based services
- SDDC services
- about / SDDC services
- service catalog management / Service catalog management
- Secure Shell (SSH) / VMware vReaIize Network Insight
- Secure Token Service (STS) / Services running as part of the identity service
- Security Operations Center (SOC) / Compliance management
- securitySimple Object Access Protocol (SOAP) / Extended management for rugged devices
- Self-Service Portal (SSP) / LBaaS design use cases
- Service Broker stage
- about / Service Broker
- capabilities / Service Broker
- service catalog management
- design / Service design, development, and release
- development / Service design, development, and release
- release / Service design, development, and release
- cloud business management operations / Cloud business management operations
- service definition and automation / Service definition and automation
- service foundation areas
- service level agreements (SLAs) / vSAN policy design with SPBM
- simple mail transfer protocol (SMTP) server / The user experience
- Simple Network Management Protocol (SNMP) / VMware vReaIize Network Insight
- simple object access protocol (SOAP) / Services running as part of the identity service
- Single Sign-On (SSO) / Automation with vRealize
- Site Recovery Manager (SRM) / Recommendations with priority 1
- Skyline Advisor / Collector, viewer, and advisor
- Skyline Collector
- about / Collector, viewer, and advisor
- downloading / Release strategy
- overview / Overview of Skyline Collector
- prerequisites / The requirements for Skyline Collector
- user permissions / Skyline Collector user permissions
- client plugin, integrating / Skyline Collector user permissions
- appliance / Skyline Collector user permissions
- admin interface / VMware Skyline Collector admin interface
- linking, with My VMware account / Linking with My VMware account
- endpoints, managing / Managing endpoints
- admin interface, configuring / Configuring VMware Skyline Collector admin interface
- auto-upgrade / Auto-upgrade
- Skyline tool
- proactive support technology / Proactive support technology – VMware Skyline
- viewer / Collector, viewer, and advisor
- release strategy / Release strategy
- Soft 3D / Knowledge and task user profiles
- solid state drives (SSDs) / VMware best practices recommendations
- Source Network Address Translation (SNAT) / Deploying Infrastructure as Code
- Splunk Enterprise / The Log Insight user interface
- standardize stage
- about / Standardize
- capabilities / Standardize
- strategic partner stage / Strategic partner
- Support Account Engineers (SAEs) / Transforming VMware technical support operations
- Support Account Managers (SAMs) / Transforming VMware technical support operations
- Support and Subscription Services (SnS) bookings / Proactive support technology – VMware Skyline
- Support request (SR) deflection / Proactive support technology – VMware Skyline
- System Center Configuration Manager (SCCM) / Workspace ONE AirLift
T
- time to resolution (TTR) / Transforming VMware technical support operations
- total cost of ownership (TCO) / Strategic partner, Overview on business and operations challenges
- translation look-aside buffer (TLB) / Critical use case – unification
- transmission control protocol (TCP) / Critical use case – unification
- Transport Nodes (TN) / PKS and NSX-T Edge Nodes and Edge Cluster
- two-node clusters / Two-node clusters
U
- unified end-to-end monitoring / Unified end-to-end monitoring
- unprecedented scale / Log Intelligence value propositions
- User Account and Authentication (UAA) / Deploying and running containerized workloads
V
- vGPU / Modes of GPU usage
- vGPU Manager / Adding vGPU hosts to a cluster with vGPU Manager
- vGPU profiles
- about / vGPU scheduling and vGPU profile selection
- power user and designer profiles / Power user and designer profiles
- knowledge and task user profiles / Knowledge and task user profiles
- vGPU hosts, adding to cluster with vGPU Manager / Adding vGPU hosts to a cluster with vGPU Manager
- vGPU profile selection / vGPU scheduling and vGPU profile selection
- vGPU scheduling / vGPU scheduling and vGPU profile selection
- virtual appliance (vApp) / The vRealize Operations Manager architecture
- Virtual Cloud Network (VCN) / NSX for vSphere
- Virtual data centers
- IaaS solution, with vRealize Suite / IaaS solution using vRealize Suite
- virtual data centers / Virtual data centers
- Virtual Data Center Workstation (vDWS) / Virtual machine settings for vGPU
- Virtual Dedicated Graphics Acceleration (vDGA) / Power user and designer profiles
- virtual desktop infrastructure (VDI) / Services running as part of the identity service
- Virtual Desktop Infrastructure (VDI) solution / Using virtualized GPUs with ML
- Virtual Extensible LAN (VXLAN) / LBaaS network design using NSX
- Virtual Function (VF) / GRID vWS to Quadro vDWS
- virtualization-based security (VBS) / AppDefense and NSX
- virtualization technology (VT) / Modes of GPU usage
- virtualized GPUs
- using, with ML / Using virtualized GPUs with ML
- virtual machine
- configuring, with MxGPU and vDGA / GRID vWS to Quadro vDWS
- virtual machine disk (VMDK) / FTT policy with RAID configurations, Storage for K8s cluster node VMs
- virtual machines (VMs) / Pulse IoT Center infrastructure management blueprint
- virtual machine settings, for vGPU
- configuring / Virtual machine settings for vGPU
- GRID vPC capabilities / GRID vPC and GRID vApps capabilities
- GRID vApps capabilities / GRID vPC and GRID vApps capabilities
- GRID vWS, to Quadro vDWS / GRID vWS to Quadro vDWS
- virtual network interface cards (vNICs) / Recommendations with priority 2
- Virtual Private Clouds (VPCs) / GRID vPC and GRID vApps capabilities, NSX for vSphere
- virtual reality as a service (vRAAS) / vRealize Code Stream
- virtual resources
- configuration recommendations / Virtual data centers
- Virtual Shared Graphics Acceleration (vSGA) / Knowledge and task user profiles
- virtual storage area network (vSAN)
- application scalability / Application scalability on vSAN
- storage assessment / Storage and network assessment
- network assessment / Storage and network assessment
- storage design policy / Storage design policy
- network design policy / Network design policy
- about / Expanded Win32 app delivery
- VMKernel NIC (vmknic) / Two-node clusters
- VMware / ML and VMware
- VMware, network design policy
- best practices recommendations / VMware best practices recommendations
- Customer Experience Improvement Program/vSAN ReadyCare / VMware's Customer Experience Improvement Program/vSAN ReadyCare
- VMware, storage design policy
- best practices recommendations / VMware best practices recommendations
- VMware Analytics Cloud (VAC) / Collector, viewer, and advisor
- VMware approach
- business outcome / Business outcomes of the VMware approach
- VMware Boxer
- with Intelligent Workflows / VMware Boxer with Intelligent Workflows
- VMware Certificate Authority (VMCA) / Services running as part of the identity service
- VMware Cloud
- on AWS / VMware Cloud on AWS
- on AWS disaster recovery / VMware Cloud on AWS
- on AWS differs from on-premises vSphere / VMware Cloud on AWS differs from on-premises vSphere
- on AWS implementation plan / VMware Cloud on the AWS implementation plan
- implementing, on AWS / Implementation plan for VMware Cloud on AWS
- configuring, on AWS / Detailed initial steps to configure VMC on AWS, Installation, configuration, and operating procedures
- operating procedures, on AWS / Installation, configuration, and operating procedures
- installing, on AWS / Installation, configuration, and operating procedures
- hybrid-linked-mode testing functionality / Hybrid-linked-mode testing functionality
- support / Support and troubleshooting
- troubleshooting / Support and troubleshooting
- VMware Cloud (VMC) / Compliance management
- VMware Cloud Foundation (VCF) / NSX for vSphere
- VMware Cloud operations stages
- about / Cloud operations stages
- standardize / Standardize
- Service Broker / Service Broker
- strategic partner / Strategic partner
- VMware Health Analyzer (vHA) / Storage design policy
- VMware Hybrid Cloud Extension (HCX) / VMware Cloud on AWS
- VMware Infrastructure Planner (VIP) / LBaaS design use cases
- VMware innovation
- for application security / VMware innovation for application security
- transforming, into digital government / Digital governance and compliance
- intelligent government workflows, with automation / Intelligent government workflows with automation
- network, transforming / Transforming networking and security
- security, transforming / Transforming networking and security
- VMware Integrated OpenStack (VIO) / Audit log examples
- VMware Kubernetes Engine (VKE) / Pivotal Container Service and VMware Kubernetes Engine
- VMware product technical data
- configuration data / Types of information that are collected
- feature-related data / Types of information that are collected
- performance data / Types of information that are collected
- product log data / Types of information that are collected
- VMware Pulse IoT Center
- about / VMware Pulse
- queries / The queries that arise related to VMware Pulse
- VMware technical support operations
- transforming / Transforming VMware technical support operations
- SDDC services / SDDC services
- NSX for vSphere / NSX for vSphere
- recommendations with priority / Recommendations with priority
- recommendations with priority 1 / Recommendations with priority 1
- recommendations with priority 2 / Recommendations with priority 2
- recommendations with priority 3 / Recommendations with priority 3
- VMware Validated Designs (VVDs) / Transforming VMware technical support operations
- VMware VDI solution / Using virtualized GPUs with ML
- VMware vReaIize Network Insight
- data collecting ways / VMware vReaIize Network Insight
- VMware VRealize Business (vRB) / Audit log examples
- VMware vRealize Code Stream (vRCS)
- technical requisites / Technical requirements
- about / vRealize Code Stream
- Pipeline automation model / Pipeline automation model – the release process for any kind of software
- VMware vRealize Network Insight
- about / VMware vReaIize Network Insight
- supported data sources / Supported data sources
- VMware vRealize Orchestrator (vRO) / LBaaS overview
- VMware vSphere Big Data Extensions (BDE)
- about / Hadoop as a service
- BDE appliance, deploying / Deploying the BDE appliance
- configuring / Configuring the VMware BDE
- BDE plugin / The BDE plugin
- distributions, configuring / Configuring distributions on BDE
- Hadoop plugin, in vRO / The Hadoop plugin in vRO
- vRA deployment
- vRA appliance communication / vRA appliance communication
- services, executing as part of identity service / Services running as part of the identity service
- complete solution, with desired result / A complete solution with the desired result
- vRA provisioning
- base Windows image / Deploying Infrastructure as Code
- base Linux image / Deploying Infrastructure as Code
- Windows linked clone component / Deploying Infrastructure as Code
- Linux linked clone component / Deploying Infrastructure as Code
- multi-machine blueprint / Deploying Infrastructure as Code
- vRCS deployment architecture
- about / vRCS deployment architecture
- system architecture / System architecture
- vRCS, integrating with standalone vRA / Integrating vRCS with an external, standalone vRA
- vRealize Automation
- blueprint, customizing / Customizing the vRealize Automation blueprint
- catalog, for software provisioning / Request fulfillment
- vRealize Network Insight (vRNI) / NSX for vSphere
- vRealize Operations Manager (vROP) / Recommendations with priority 2
- vRealize Operations Manager architecture
- vRealize Operations Manager monitoring
- about / vRealize Operations Manager monitoring
- business outcomes, challenges affecting / Challenges affecting business outcomes
- business benefits / Business benefits
- technical issues / Technical Issues
- technical solution / Technical solution
- log intelligence advantages / Log Intelligence advantages
- vSAN cluster
- witness appliance / Witness appliance for the vSAN cluster
- configuring / Configuring the vSAN cluster
- vSAN environment monitoring
- general monitoring practices / General monitoring practices
- vSAN Health Check plugin / vSAN Health Check plugin
- vSAN Observer / vSAN Observer
- vRealize Operations Manager monitoring / vRealize Operations Manager monitoring
- vSAN Health Check plugin / vSAN Health Check plugin
- vSAN Observer / vSAN Observer
- vSAN policy design
- with SPBM / vSAN policy design with SPBM
- business objectives, policy defining / Defining a policy based on business objectives
- vSphere cluster groups / PKS on vSphere
- vSphere DirectPath I/O / Modes of GPU usage
- vSphere Distributed Switch (VDS) / Network design policy, Recommendations with priority 2, Virtual data centers
- vSphere high availability / Containerized ML applications inside a VM
- vSphere Installation Bundle (VIB) / Recommendations with priority 3
- vSphere Integrated Containers
- virtual container hosts / Containerized ML applications inside a VM
- Docker container hosts / Containerized ML applications inside a VM
- vSphere vMotion / Containerized ML applications inside a VM
W
- Wavefront
- about / Log Intelligence value propositions, Wavefront dashboard
- dashboard / Wavefront dashboard
- people working, monitoring for insights / Getting insights by monitoring how people work
- Windows Communication Foundation (WCF) / Extended management for rugged devices
- witness traffic separation (WTS) / Two-node clusters
- Workspace / ML and VMware
- Workspace ONE Intelligence
- about / Workspace ONE Intelligence
- business objectives / Business objectives of Workspace ONE Intelligence
- integrated deep insights / Integrated deep insights
- App analytics, for smart planning / App analytics for smart planning
- intelligent automation driven, by decision engines / Intelligent automation driven by decision engines
- use cases / Top ten use cases of Workspace ONE Intelligence
- mobile OS vulnerabilities, identifying / Identifying and mitigating mobile OS vulnerabilities
- mobile OS vulnerabilities, mitigating / Identifying and mitigating mobile OS vulnerabilities
- Windows 10 OS updates, insights / Insights into Windows 10 OS updates and patches
- Windows 10 OS patches, insights / Insights into Windows 10 OS updates and patches
- Windows 10 Dell battery failures, predicting / Predicting Windows 10 Dell battery failures and automating replacement
- unsupported OS versions, identifying / Identifying unsupported OS versions and platforms
- unsupported OS platforms, identifying / Identifying unsupported OS versions and platforms
- OS upgrade progress, tracking / Tracking OS upgrade progress
- device utilization, monitoring / Monitoring device utilization or usage
- usage, monitoring / Monitoring device utilization or usage
- compliance, increasing across Windows 10 devices / Increasing compliance across Windows 10 devices
- mobile app deployment visibility, comprehensive / Comprehensive mobile app deployment visibility
- migration of productivity apps, tracking / Tracking migration and adoption of productivity applications
- adoption of productivity apps, tracking / Tracking migration and adoption of productivity applications
- internal mobile apps, adopting / Adopting internal mobile applications
- Workspace ONE platform updates / Workspace ONE platform updates
- Workspace ONE Trust Network
- about / Workspace ONE Trust Network
- Workspace ONE AirLift / Workspace ONE AirLift