10 virtualization best practices which are bad advice

by | Aug 27, 2015


One can find lots of publications, comments and even conferences talking about virtualization best practices, but many authors don't bear in mind that these tips change depending on the technology which is being used. In this article we provide some Citrix & VMware best practices that we should clarify not to become worst practices:

  1. Performance tab isn’t where admins should look first to monitor vSphere.

  2. All versions of Citrix Receiver aren’t the same.

  3. Citrix license server grace periods aren’t automatic.

  4. Callbacks in Citrix StoreFront aren’t really optional.

  5. All codecs are not the same.

  6. Not everyone needs to use WorxMail and Mobile Device Management in Citrix XenMobile.

  7. CPU over-commitment isn’t that bad.

  8. Don’t trust everything experts say.

  9. Flexcast Management Architecture (FMA) can span data centers.

  10. Pod architecture isn’t useless.

To dig deeper into each of these points, have a look at the original article: Ten virtualization best practices not to be trusted



Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content