Presentation by Michael Van Horenbeeck: http://twitter.com/mvanhorenbeeck. Video recording available here: http://technet.microsoft.com/en-us/video/windows-server-2012-improvements-in-failover-clustering.
Windows server 2012 failover clustering new featuresJoseph D'Antoni
This document summarizes new features in Windows Server 2012 Failover Clustering. Key points include: increased scalability up to 4,000 Hyper-V VMs per cluster; easier cluster management through Server Manager; automated cluster-aware updating to reduce downtime during updates; and more flexible quorum management and task scheduling. The majority of changes improve flexibility and management of large Hyper-V virtual environments.
Introduction to failover clustering with sql serverEduardo Castro
In this presentation we review the basic requirements to install a SQL Server Failover Cluster.
Regards,
Eduardo Castro Martinez
http://ecastrom.blogspot.com
http://comunidadwindows.org
XenServer uses a control domain/Dom0 to manage virtual machines running on DomUs. It utilizes a Linux kernel with Intel-VT or AMD-V virtualization extensions. The hypervisor allows virtual machines to access physical resources like CPU, memory, network and storage. Networking and storage are virtualized using technologies like bonding, LVM, NFS and iSCSI. Performance analysis tools like iperf and hdparm can help optimize network and storage I/O.
Xen server 6.1 technical sales presentationsolarisyougood
The document provides an overview of XenServer 6.1. It describes XenServer as a robust, widely deployed, advanced, and trusted hypervisor. It notes that XenServer's hypervisor and domain 0 manage resources for virtual machines. It also describes domain 0, Linux VMs, Windows VMs, XenServer's capabilities for various workloads, and its management and features like high availability, live migration, graphics support, and networking.
Top Troubleshooting Tips and Techniques for Citrix XenServer DeploymentsDavid McGeough
This session will provide an expert insight into the most common issues encountered by Customers, Partners and Support engineers.
It’s a feature packed agenda which gets to the point quickly and concentrates on the issues we encounter continuously with XenServer deployments.
As the invited speaker during Microsoft Technical Partner Community Event @Microsoft KLCC Auditorium , i have presented 3 Key Area: Scalability,Mobility and Delivery High Availabili
The document discusses a mid-evaluation of a major project comparing several hypervisors. It will compare Xen, KVM, VMware, and VirtualBox based on their technical differences and performance benchmarks. The benchmarks will test CPU speed, network speed, I/O speed, and performance running various server workloads. This comparison will help determine the best hypervisor for a given virtualization situation. Key factors that will be compared include OS support, security, CPU speed, network speed, I/O speed, and response times.
Windows server 2012 failover clustering new featuresJoseph D'Antoni
This document summarizes new features in Windows Server 2012 Failover Clustering. Key points include: increased scalability up to 4,000 Hyper-V VMs per cluster; easier cluster management through Server Manager; automated cluster-aware updating to reduce downtime during updates; and more flexible quorum management and task scheduling. The majority of changes improve flexibility and management of large Hyper-V virtual environments.
Introduction to failover clustering with sql serverEduardo Castro
In this presentation we review the basic requirements to install a SQL Server Failover Cluster.
Regards,
Eduardo Castro Martinez
http://ecastrom.blogspot.com
http://comunidadwindows.org
XenServer uses a control domain/Dom0 to manage virtual machines running on DomUs. It utilizes a Linux kernel with Intel-VT or AMD-V virtualization extensions. The hypervisor allows virtual machines to access physical resources like CPU, memory, network and storage. Networking and storage are virtualized using technologies like bonding, LVM, NFS and iSCSI. Performance analysis tools like iperf and hdparm can help optimize network and storage I/O.
Xen server 6.1 technical sales presentationsolarisyougood
The document provides an overview of XenServer 6.1. It describes XenServer as a robust, widely deployed, advanced, and trusted hypervisor. It notes that XenServer's hypervisor and domain 0 manage resources for virtual machines. It also describes domain 0, Linux VMs, Windows VMs, XenServer's capabilities for various workloads, and its management and features like high availability, live migration, graphics support, and networking.
Top Troubleshooting Tips and Techniques for Citrix XenServer DeploymentsDavid McGeough
This session will provide an expert insight into the most common issues encountered by Customers, Partners and Support engineers.
It’s a feature packed agenda which gets to the point quickly and concentrates on the issues we encounter continuously with XenServer deployments.
As the invited speaker during Microsoft Technical Partner Community Event @Microsoft KLCC Auditorium , i have presented 3 Key Area: Scalability,Mobility and Delivery High Availabili
The document discusses a mid-evaluation of a major project comparing several hypervisors. It will compare Xen, KVM, VMware, and VirtualBox based on their technical differences and performance benchmarks. The benchmarks will test CPU speed, network speed, I/O speed, and performance running various server workloads. This comparison will help determine the best hypervisor for a given virtualization situation. Key factors that will be compared include OS support, security, CPU speed, network speed, I/O speed, and response times.
This document provides a comparison of features for the latest versions of four major hypervisors: VMware vSphere 5.1, Microsoft Hyper-V 2012, Citrix XenServer 6.1, and RedHat RHEV 3.1 beta. It compares features around host, guest, management, business continuity, storage, networking, and supported operating systems. The goal is to help readers choose the ideal hypervisor for their enterprise environment based on well-considered selection criteria.
Hyper-V Best Practices & Tips and TricksAmit Gatenyo
This document discusses best practices for configuring Hyper-V hosts and virtual machines. It recommends:
- Using Server Core installation and dedicating hosts to the Hyper-V role for improved security and reliability.
- Properly sizing host CPUs, memory, and storage and separating networks for management, storage, and VMs.
- Configuring virtual machines with fixed VHDs, proper RAM and network settings, and latest integration components.
- Implementing security practices like regular patching of VMs and limiting processor usage to prevent overcommitment.
- Using VSS-aware backups and excluding unnecessary files/folders from antivirus scans to optimize performance.
The document discusses a technology leader with over 10 years of experience in Microsoft, VMware, and Citrix platforms including Windows, Active Directory, private cloud, server and desktop virtualization, high availability, BYOD and other technologies. The individual holds several industry certifications including MCSE Private Cloud and VMware Certified Professional.
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding_Humair_Ahmed_
XenServer, Hyper-V, and ESXi hypervisor comparison in regards to market share, architecture/installation, and APIs/coding. Technical details, demos, and code provided. Visit my blog at http://humairahmed.com/blog/.
A day in the life of a VSAN I/O - STO7875Duncan Epping
This document provides an overview and summary of a VMworld session about Virtual SAN I/O. The session covers Virtual SAN concepts, the I/O flow of reads and writes in Virtual SAN, failure scenarios and how Virtual SAN handles them, and new features like deduplication and compression. The document includes diagrams demonstrating how data is distributed and replicated across hosts in a Virtual SAN cluster. It also provides details on how reads, writes, and failures are handled at a technical level in Virtual SAN. In the conclusion, it recommends three ways for attendees to get started with Virtual SAN: a hands-on lab, 60-day free evaluation, or working with a VMware partner on an assessment.
Windows server 2012 failover clustering improvementsSusantha Silva
The document discusses a private cloud infrastructure using Hyper-V for virtualization. It describes clustering multiple Hyper-V nodes together to improve availability and scalability. The infrastructure supports large numbers of virtual machines through scale-up and scale-out approaches, with features like live migration, storage migration, and replication for disaster recovery. It also discusses integrating file servers and SQL servers into the private cloud.
VMware VSAN Technical Deep Dive - March 2014David Davis
Virtual SAN 5.5 provides a software-defined storage solution that is integrated with VMware vSphere. It allows storage resources on standard servers to be pooled into a shared datastore. Virtual SAN uses SSDs to provide flash-accelerated performance and HDDs for capacity. It delivers high performance scaling linearly with the addition of servers. Storage policies can be set on a per-VM basis to control capacity, performance and availability without using LUNs or volumes. Virtual SAN simplifies storage management and provides resilience, flexibility and savings over external storage arrays.
The webinar on Citrix XenServer 6.5 will provide an overview of new features, packaging and licensing changes, and demonstrations of in-memory caching, workload balancing reports, login VSI scalability tests, and vGPU capabilities; attendees are encouraged to tweet about the session using designated hashtags; and the agenda includes discussions of XenServer editions, the What's New in 6.5 release, and live demos of the XenCenter view, configuration, and vGPU functionality.
Citrix XenServer 6.1 is a virtualization platform optimized for enterprise, desktop, and cloud workloads. The key highlights include:
- Citrix being placed in the leaders quadrant in Gartner's Magic Quadrant report for x86 server virtualization.
- 1&1 Internet choosing XenServer for their public cloud offering due to its product maturity, open source code base, flexible pricing, and Citrix support.
- New features in 6.1 including updated guest support, Dom-0 vCPU enhancements, performance monitoring improvements, and an automated hardware test kit.
The Next Generation of Microsoft Virtualization With Windows Server 2012Lai Yoong Seng
The document discusses new features in Windows Server 2012 that improve virtualization capabilities. Key features highlighted include increased scalability for Hyper-V hosts and virtual machines, live migration enhancements, storage migration capabilities, high availability options like Hyper-V Replica for disaster recovery, and flexibility in infrastructure deployment. The presentation aims to demonstrate how these features enable private cloud deployments with optimized performance, scalability, and availability.
What is coming for VMware vSphere?
Delivered at VMUG DK/UK/BE in November 2014. Session is all about vSphere futures, what can be expected in the near future.
CloudStack, the world's leading open-source cloud infrastructure platform, was recently donated to the Apache Foundation, and is now an incubated Apache project. Ewan Mellor, Director of Engineering in the Citrix Cloud Platforms Group will describe the CloudStack project and explain why Xen is the pre-eminent hypervisor in public clouds today. He will describe the changes coming in CloudStack in the next 12 months, and how they are going to change the way that Xen is consumed in public and private clouds next year.
2015 03-26 cloud platform master class for cloudplatform 4 5 - publicCitrix
In this session you will learn about the new features of Citrix CloudPlatform 4.5:
Learn about new support for 3D graphics
See step-by-step demonstrations of GPU/vGPU, Bare metal and Linux Containers (LXC)
Hear about installation/configuration/deployment considerations
VMworld 2017 - Top 10 things to know about vSANDuncan Epping
In this session Cormac Hogan and I go over the top 10 things to know about vSAN. This is based on two years of questions/answers from our field and customers. Useful for any VMware vSAN customer!
#STO1264BU #STO1264BE
This document provides an overview and introduction to VMware Virtual SAN (VSAN). It discusses the VSAN architecture which uses SSDs for caching and HDDs for storage. It also covers how VSAN can be configured through storage policies assigned at the VM level. The document outlines how VSAN provides a software-defined storage solution that is hardware agnostic and can elastically scale storage performance and capacity by adding servers and disks.
In this session we examined the Xen PV performance on the latest platforms in a few cases that covers CPU/memory intensive, disk intensive and network intensive workloads. We compared Xen PV guest vs. HVM/PVOPS to see whether PV guest still have advantage over HVM on a system with state-of-the-art VT features. KVM was also compared as a reference. We also compared PV driver performance against bare-metal and pass-through/SR-IOV. The identified issues were discussed and we presented our proposal on fixing those issues.
This document provides an overview of Windows Server 2008 R2 Failover Clustering and Network Load Balancing. It discusses what a cluster is, why they are used, and cluster terminology. It also covers the software and hardware requirements for failover clustering, and the process of validating and creating a cluster. For network load balancing, it describes how load balancing works, deployment requirements, and options for configuring host parameters and port rules.
VMworld 2014: Virtual SAN Architecture Deep DiveVMworld
This document provides an overview of VMware's Virtual SAN architecture. It discusses Virtual SAN's goals of being easy to manage, providing compelling TCO, and being strongly integrated with VMware products. It describes how Virtual SAN aggregates local flash and HDDs to provide a shared datastore. It also covers topics like Virtual SAN's distributed architecture, scaling capabilities, storage policies, deployment considerations, resiliency features, and monitoring tools.
The document summarizes different high availability solutions in SQL Server 2012, including AlwaysOn Failover Cluster Instances, AlwaysOn Availability Groups, and Database Mirroring. It defines key terms like primary/secondary databases and replicas. It also describes the benefits of each solution, such as automatic failover, read-only access on secondaries, and support for different storage options.
This document provides an overview of SQL Server clustering for beginners. It introduces SQL Server clustering, including what it is, why it is used, who supports it, and whether it is suitable. It also outlines an agenda covering introduction to clustering, demonstrations, installation, administration, problems, and disaster planning. The presenter's qualifications and contact details are provided.
This document provides a comparison of features for the latest versions of four major hypervisors: VMware vSphere 5.1, Microsoft Hyper-V 2012, Citrix XenServer 6.1, and RedHat RHEV 3.1 beta. It compares features around host, guest, management, business continuity, storage, networking, and supported operating systems. The goal is to help readers choose the ideal hypervisor for their enterprise environment based on well-considered selection criteria.
Hyper-V Best Practices & Tips and TricksAmit Gatenyo
This document discusses best practices for configuring Hyper-V hosts and virtual machines. It recommends:
- Using Server Core installation and dedicating hosts to the Hyper-V role for improved security and reliability.
- Properly sizing host CPUs, memory, and storage and separating networks for management, storage, and VMs.
- Configuring virtual machines with fixed VHDs, proper RAM and network settings, and latest integration components.
- Implementing security practices like regular patching of VMs and limiting processor usage to prevent overcommitment.
- Using VSS-aware backups and excluding unnecessary files/folders from antivirus scans to optimize performance.
The document discusses a technology leader with over 10 years of experience in Microsoft, VMware, and Citrix platforms including Windows, Active Directory, private cloud, server and desktop virtualization, high availability, BYOD and other technologies. The individual holds several industry certifications including MCSE Private Cloud and VMware Certified Professional.
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding_Humair_Ahmed_
XenServer, Hyper-V, and ESXi hypervisor comparison in regards to market share, architecture/installation, and APIs/coding. Technical details, demos, and code provided. Visit my blog at http://humairahmed.com/blog/.
A day in the life of a VSAN I/O - STO7875Duncan Epping
This document provides an overview and summary of a VMworld session about Virtual SAN I/O. The session covers Virtual SAN concepts, the I/O flow of reads and writes in Virtual SAN, failure scenarios and how Virtual SAN handles them, and new features like deduplication and compression. The document includes diagrams demonstrating how data is distributed and replicated across hosts in a Virtual SAN cluster. It also provides details on how reads, writes, and failures are handled at a technical level in Virtual SAN. In the conclusion, it recommends three ways for attendees to get started with Virtual SAN: a hands-on lab, 60-day free evaluation, or working with a VMware partner on an assessment.
Windows server 2012 failover clustering improvementsSusantha Silva
The document discusses a private cloud infrastructure using Hyper-V for virtualization. It describes clustering multiple Hyper-V nodes together to improve availability and scalability. The infrastructure supports large numbers of virtual machines through scale-up and scale-out approaches, with features like live migration, storage migration, and replication for disaster recovery. It also discusses integrating file servers and SQL servers into the private cloud.
VMware VSAN Technical Deep Dive - March 2014David Davis
Virtual SAN 5.5 provides a software-defined storage solution that is integrated with VMware vSphere. It allows storage resources on standard servers to be pooled into a shared datastore. Virtual SAN uses SSDs to provide flash-accelerated performance and HDDs for capacity. It delivers high performance scaling linearly with the addition of servers. Storage policies can be set on a per-VM basis to control capacity, performance and availability without using LUNs or volumes. Virtual SAN simplifies storage management and provides resilience, flexibility and savings over external storage arrays.
The webinar on Citrix XenServer 6.5 will provide an overview of new features, packaging and licensing changes, and demonstrations of in-memory caching, workload balancing reports, login VSI scalability tests, and vGPU capabilities; attendees are encouraged to tweet about the session using designated hashtags; and the agenda includes discussions of XenServer editions, the What's New in 6.5 release, and live demos of the XenCenter view, configuration, and vGPU functionality.
Citrix XenServer 6.1 is a virtualization platform optimized for enterprise, desktop, and cloud workloads. The key highlights include:
- Citrix being placed in the leaders quadrant in Gartner's Magic Quadrant report for x86 server virtualization.
- 1&1 Internet choosing XenServer for their public cloud offering due to its product maturity, open source code base, flexible pricing, and Citrix support.
- New features in 6.1 including updated guest support, Dom-0 vCPU enhancements, performance monitoring improvements, and an automated hardware test kit.
The Next Generation of Microsoft Virtualization With Windows Server 2012Lai Yoong Seng
The document discusses new features in Windows Server 2012 that improve virtualization capabilities. Key features highlighted include increased scalability for Hyper-V hosts and virtual machines, live migration enhancements, storage migration capabilities, high availability options like Hyper-V Replica for disaster recovery, and flexibility in infrastructure deployment. The presentation aims to demonstrate how these features enable private cloud deployments with optimized performance, scalability, and availability.
What is coming for VMware vSphere?
Delivered at VMUG DK/UK/BE in November 2014. Session is all about vSphere futures, what can be expected in the near future.
CloudStack, the world's leading open-source cloud infrastructure platform, was recently donated to the Apache Foundation, and is now an incubated Apache project. Ewan Mellor, Director of Engineering in the Citrix Cloud Platforms Group will describe the CloudStack project and explain why Xen is the pre-eminent hypervisor in public clouds today. He will describe the changes coming in CloudStack in the next 12 months, and how they are going to change the way that Xen is consumed in public and private clouds next year.
2015 03-26 cloud platform master class for cloudplatform 4 5 - publicCitrix
In this session you will learn about the new features of Citrix CloudPlatform 4.5:
Learn about new support for 3D graphics
See step-by-step demonstrations of GPU/vGPU, Bare metal and Linux Containers (LXC)
Hear about installation/configuration/deployment considerations
VMworld 2017 - Top 10 things to know about vSANDuncan Epping
In this session Cormac Hogan and I go over the top 10 things to know about vSAN. This is based on two years of questions/answers from our field and customers. Useful for any VMware vSAN customer!
#STO1264BU #STO1264BE
This document provides an overview and introduction to VMware Virtual SAN (VSAN). It discusses the VSAN architecture which uses SSDs for caching and HDDs for storage. It also covers how VSAN can be configured through storage policies assigned at the VM level. The document outlines how VSAN provides a software-defined storage solution that is hardware agnostic and can elastically scale storage performance and capacity by adding servers and disks.
In this session we examined the Xen PV performance on the latest platforms in a few cases that covers CPU/memory intensive, disk intensive and network intensive workloads. We compared Xen PV guest vs. HVM/PVOPS to see whether PV guest still have advantage over HVM on a system with state-of-the-art VT features. KVM was also compared as a reference. We also compared PV driver performance against bare-metal and pass-through/SR-IOV. The identified issues were discussed and we presented our proposal on fixing those issues.
This document provides an overview of Windows Server 2008 R2 Failover Clustering and Network Load Balancing. It discusses what a cluster is, why they are used, and cluster terminology. It also covers the software and hardware requirements for failover clustering, and the process of validating and creating a cluster. For network load balancing, it describes how load balancing works, deployment requirements, and options for configuring host parameters and port rules.
VMworld 2014: Virtual SAN Architecture Deep DiveVMworld
This document provides an overview of VMware's Virtual SAN architecture. It discusses Virtual SAN's goals of being easy to manage, providing compelling TCO, and being strongly integrated with VMware products. It describes how Virtual SAN aggregates local flash and HDDs to provide a shared datastore. It also covers topics like Virtual SAN's distributed architecture, scaling capabilities, storage policies, deployment considerations, resiliency features, and monitoring tools.
The document summarizes different high availability solutions in SQL Server 2012, including AlwaysOn Failover Cluster Instances, AlwaysOn Availability Groups, and Database Mirroring. It defines key terms like primary/secondary databases and replicas. It also describes the benefits of each solution, such as automatic failover, read-only access on secondaries, and support for different storage options.
This document provides an overview of SQL Server clustering for beginners. It introduces SQL Server clustering, including what it is, why it is used, who supports it, and whether it is suitable. It also outlines an agenda covering introduction to clustering, demonstrations, installation, administration, problems, and disaster planning. The presenter's qualifications and contact details are provided.
William Bartholomew presented at the QLD VSTS Users Group meeting on customizing work item types in Visual Studio Team System. The presentation covered adding and modifying fields, customizing forms and workflows, defining business rules, and creating new work item types. It provided examples of customizations done by TechnologyOne and Conchango and discussed customizing the work item web page.
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
The document provides information on the Microsoft Assessment & Planning Toolkit 5.0 customer technology preview and Visual Studio Team System 2010 Lab Management Beta 2. It also covers topics like Windows Server 2008 R2 Hyper-V security best practices, Hyper-V networking configurations, Windows Server 2008 R2: SCONFIG, and Hyper-V best practices.
Windows Server 2008 R2 Hyper-V SP1 Component Architecture Tũi Wichets
Hyper-V is a role that can be installed in Windows Server 2008 R2 to add virtualization capabilities. It introduces architectural changes and installs components needed for virtualization. Hyper-V supports different types of virtual networks to connect virtual machines. Virtual machine snapshots allow capturing a point-in-time state that can be restored later with minimal interruption. Live migration allows moving running virtual machines between physical servers without disconnecting users.
This document discusses SQL and NoSQL approaches to scaling databases. It describes how social networks and other large-scale websites use techniques like sharding and messaging to partition data across many databases. It also discusses how SQL Server is adopting NoSQL paradigms like flexible schemas and federated sharding to provide scalability. The document aims to educate about scaling databases and how SQL Server is evolving to support both SQL and NoSQL approaches.
AzMan is the authorization manager that controls role-based access in Hyper-V. It uses role definitions and assignments to determine which tasks and operations each user role is allowed to perform. AzMan can be used to securely configure access at the hypervisor or individual VM level. It is configured through the Azman.msc interface by creating roles, tasks, and assigning users and groups to roles. When a Hyper-V host joins a domain or is managed by VMM, AzMan permissions may be overwritten and default to provide full access to domain admins or VMM administrators.
RODC features in Windows Server 2008 R2 include:
1. Read-only domain controllers (RODCs) provide domain services like authentication and DNS lookup to branch offices without replicating sensitive credentials or allowing changes.
2. New features for RODCs include live migration for virtual machines, support for dynamic storage changes, enhanced processor and networking capabilities.
3. RODCs use unidirectional replication and credential caching to provide services locally while limiting exposure of credentials if the RODC is compromised. Administrator roles are separated to restrict branch administrators.
Each of the files or classes of a projects source code represents a tree (AST). Looking at dependencies to other classes besides inheritance creates a graph though. Field types and method parameters are also implicit dependencies. Storing this information in a graph database like Neo4j allows for interesting queries and insights. Class-Graph provides that and is available as open-source github project.
This document provides an overview of programmatically controlling TFS using .NET APIs and web services. It discusses connecting to TFS, accessing different services like source control and work item tracking, and provides examples of common scenarios like starting builds, retrieving files from source control, and creating work items.
This document discusses managing Hyper-V with PowerShell. It covers PowerShell features like remoting and the integrated scripting environment. It then discusses using WMI and a PowerShell module to manage Hyper-V virtual machines, networks, and storage. The PowerShell module contains over 120 cmdlets for tasks like creating and managing VMs, virtual switches, disks, and setting VM resources.
Storage and hyper v - the choices you can make and the things you need to kno...Louis Göhl
This document summarizes storage options and best practices for Hyper-V virtualization. It discusses the different types of storage that can be used with Hyper-V hosts and virtual machines, including direct attached storage, storage area networks, and virtual hard disks. It also provides guidance on topics like storage performance, antivirus exclusion lists, encryption, clustering, and multi-path I/O configuration to optimize storage. Best practices are presented for areas like sizing storage, networking configurations, and high availability solutions.
Sasha Goldshtein's talk at the SELA Developer Practice (May 2013) that explains the most common vulnerabilities in web applications and demonstrates how to exploit them and how to defend applications against these attacks. Among the topics covered: SQL and OS command injection, XSS, CSRF, insecure session cookies, insecure password storage, and security misconfiguration.
This document discusses analyzing networks using Hadoop and Neo4j. It demonstrates transforming raw network data into nodes and edges that can be imported into Neo4j. It then shows how to run graph queries in Cypher to analyze the network data and find meaningful patterns. The document also provides sample nodes, edges, and Cypher queries run on the network data.
- The document discusses the basics of Windows clustering and quorum models. It defines what clustering is and why it is used for high availability of critical applications.
- It covers the differences between Windows 2008 and 2012 clustering capabilities. Windows 2012 supports more nodes, built-in iSCSI, and file/storage services.
- Common clustering terms are defined like active/passive, heartbeat network, shared disks, quorum, cluster resources, and groups.
- Quorum configuration options are reviewed including typical settings, adding witnesses, and advanced configurations. Quorum helps ensure only one cluster remains active if communication is lost.
DeltaV Development Systems in a Virtualized EnvironmentEmerson Exchange
The document discusses challenges supporting multiple DeltaV systems and revisions. It introduces virtualization as a solution, describing how virtualizing DeltaV systems provides benefits like reduced hardware costs, power usage, and cooling needs. Virtualizing allows consolidating many systems onto fewer physical servers through efficient use of resources.
This document discusses DeltaV model predictive control (MPC). It describes how MPC uses process models derived from historical data to predict process behavior and calculate target setpoints and manipulated variable moves. It also discusses tuning the dynamic controller and economic optimizer to minimize errors for controlled variables while achieving optimization objectives like minimizing costs. Troubleshooting tips are provided to check if the optimizer and controller are performing as expected.
At Emerson Exchange 2009, Martin Berutti presents on the business benefits, requirements, and steps for building a Virtual DeltaV system with a virtual plant and I/O.
This document discusses best practices for deploying Windows Server 2008 Hyper-V and System Center Virtual Machine Manager 2008. It provides an overview of Hyper-V functionality and deployment strategies. It also covers Virtual Machine Manager architecture, requirements, installation, host and cluster configuration, delegation, and Performance and Resource Optimization capabilities.
The document appears to be a presentation about test automation best practices given by Mitch Denny, Chief Technology Officer of Readify. It discusses topics such as creating test plans and cases, running automated tests, and deploying lab environments. It provides terminology related to testing and demonstrates various testing tools and workflows.
This document discusses virtualization technologies including server virtualization using Hyper-V, desktop virtualization, application virtualization, and presentation virtualization. It covers key features of Hyper-V like live migration, failover clustering, thin provisioning, and improvements in Windows Server 2008 R2. Management techniques for virtualized environments are also addressed.
The document summarizes CloudStack architecture plans for the future. It discusses moving to management server clusters per availability zone rather than per region. It also discusses using an object storage system for templates and snapshots rather than a separate NFS server. Finally, it discusses a possible future model where CloudStack manages existing virtualization clusters rather than deploying and managing its own system VMs.
Hyper-V is Microsoft's server virtualization technology that is included with Windows Server 2008. It allows multiple virtual machines to run on a single physical machine. Key capabilities of Hyper-V include support for large memory virtual machines up to 64GB, live migration of virtual machines between physical servers, and integration with the Windows hypervisor for security and isolation of virtual machines. System Center Virtual Machine Manager 2008 provides centralized management of virtualized and physical infrastructure across Hyper-V, Virtual Server and VMware environments.
What is Coming in Hyper-V Vnext on Windows 8Lai Yoong Seng
This document summarizes key features coming in the next version of Hyper-V, codenamed "VNext" or V3, which will be included in Windows 8. Some of the major new capabilities highlighted include increased scalability up to 160 processors and 2TB of RAM per host, and 512GB of RAM per virtual machine. Other improvements include enhanced data mobility options using new replication features, support for larger virtual hard disks up to 16TB with more robust formats, support for shared storage over SMB file servers, and quality of service features for managing network bandwidth.
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2Damir Bersinic
This is the second of a 2-part series delivered at Prairie DevCon in Calgry on March 15. 2012. The sessions provided a quick overview of the new features of Hyper-V in Windows Server "8" Beta and how these compare to VMware vSphere 5.
Nova for Physicalization and Virtualization compute modelsopenstackindia
This document discusses Nova, OpenStack's compute service, and provides an overview of:
1) Different compute models Nova supports including physical servers, virtualized servers using technologies like ESX, Hyper-V, KVM, Xen server, and container-based virtualization using LXC and OpenVZ.
2) Nova uses a driver-based approach to support different hypervisor technologies with drivers for KVM, ESX, Hyper-V, and others.
3) An example multi-hypervisor OpenStack cloud is shown supporting images, controllers, services, and compute hosts running Hyper-V, KVM, and ESXi.
4) Key features like physical bare-metal provisioning are supported across different
Cluster ist die Basis für die Private Cloud. In dieser Session lernen Sie die Erweiterungen der Cluster Services kennen, wie Cluster Shared Volumes, Cluster-Aware Updating und VM-Cloning und -Monitoring. Nach der Session können Sie die neuen Möglichkeiten einschätzen und das Potenzial für Ihr Unternehmen bestimmen.
The document discusses new capabilities in Windows Server 8 for virtual machine mobility and disaster recovery. Key points include allowing unlimited live migration between hosts with no storage or cluster limits, supporting live migration with any storage solution including iSCSI, Fibre Channel, SAS or SMB, and enabling live storage migration between hosts. It also outlines approaches for application failover, I/O redundancy, node redundancy, and handling hardware faults.
Security Best Practices For Hyper V And Server Virtualizationrsnarayanan
The document summarizes information about Hyper-V virtualization. It provides an overview of Hyper-V architecture, including that the hypervisor partitions the hardware and manages guest partitions through the virtualization stack. It also discusses Hyper-V security, noting that guests are isolated from each other and the root to prevent attacks, and that delegated administration and role-based access control can be used to manage virtual machine access.
Material de la Charla del Evento de Virtualizacion del 10 de setiembre del 2009 en FUNDATEC.
http://ecastrom.blogspot.com
http://comunidadwindows.org
ecastro@grupoasesor.net
Ing. Eduardo Castro Martinez, PhD
Microsoft SQL Server MVP
http://ecastrom.blogspot.com
http://mswindowscr.org
http://comunidadwindows.org
CloudStack is an open source cloud computing platform that allows users to manage their infrastructure as an automated system. It provides self-service access to computing resources like servers, storage, and networking via a web interface. CloudStack supports multiple hypervisors and public/private cloud deployment strategies. The core components include hosts, primary storage, clusters, pods, networks, secondary storage, and zones which are managed by CloudStack servers.
16 August 2012 - SWUG - Hyper-V in Windows 2012Daniel Mar
Windows Server 8 Beta includes new features that improve Hyper-V host scalability, virtual machine density, and high availability. Key enhancements include support for up to 320 logical processors, 4 TB of memory per host, 1,024 virtual CPUs and 1 TB of memory per virtual machine, and 1,024 active VMs per host. It also features improved live migration, storage migration, and failover clustering capabilities.
This presenation gives a quick history on Hyper-V and discusses the arhcitecture of the vurrent release. It then goes into detail on Hyper-V R2, i.e. the build included in Hyper-V Server 2008 R2 and Windows Server 2008 R2. It includes Live Migration, Cluster Shared Volumes, Virtual Machine Queue, SLAT, Core Parking and Native VHD.
The document discusses the evolution of XenServer architecture to address scalability limitations. The current architecture works well now but will hit bottlenecks on larger servers. The new "Windsor" architecture uses domain 0 disaggregation to move virtualization functions out of domain 0 and into separate domains for improved performance, scalability, and isolation. Key benefits include better VM density, use of hardware resources, stability, availability, and extensibility. It provides a flexible platform that can scale-out across servers.
Windows server 8 hyper v networking (aidan finn)hypervnu
This document discusses new networking features in Windows Server 8 Hyper-V including built-in NIC teaming, SMB 2.2 for storage access over the network, network virtualization to isolate tenant networks, and security features like port ACLs and private VLANs. It also covers performance optimizations for network traffic like dynamic VMQ, SR-IOV, and new Quality of Service capabilities for prioritizing applications in a multi-tenant hosting environment.
Ready for cloud computing with hyper vAndik Susilo
Andik Susilo is a Most Valuable Professional (MVP) in data center engineering and cloud consulting. He provides consulting services through http://www.infinyscloud.com/ and http://www.telkomcloud.com. The document discusses cloud computing models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also covers the advantages of cloud computing such as pay per use, scalability, security, and reliability. The document provides examples of commercial cloud services and describes Microsoft Hyper-V virtualization capabilities on Windows Server 2008 R2.
Am 04 track1--salvatore orlando--openstack-apac-2012-finalOpenCity Community
1) Quantum provides network services for OpenStack and allows tenants to control virtual networking in their cloud.
2) Quantum uses a plugin architecture that supports different networking technologies through plugins like Nicira NVP.
3) The Nicira NVP plugin uses network virtualization and overlay tunneling to decouple logical and physical network topology and provide flexible network designs.
This is the deck that I used at the January 2012 Hyper-V.nu event in Amsterdam, Netherlands. It focuses on the Build announced details on Windows Server 8 Hyper-V networking.
Building Business Continuity Solutions With Hyper Vrsnarayanan
This document provides an overview and agenda for a session on virtualization and high availability. It discusses types of high availability enabled by virtualization including cluster creation and making virtual machines highly available. It also covers demos of Windows Server 2008 cluster creation and configuring virtual machine high availability. Additional topics include stretch clusters, guest clustering best practices, Hyper-V and network load balancing, disaster recovery and virtualization, and new features in Windows Server 2008 R2 such as live migration.
Similar to Improvements in Failover Clustering in Windows Server 2012 (20)
During this session we will look into Windows 10 for the Enterprise.
Let’s explore the new management capabilities and choices.
Let’s understand the Windows 10 deployment infrastructure and mechanisms.
Let’s discover new Windows 10 features and improvements.
You are eager to learn about Windows 10 and want to gather early-stage info about this exciting Operating System… ?
Well you know what to do! See you there!
Compliance settings, formerly known as DCM, remains one of the often unexplored features in Configuration Manager. During this session we will walk through the new capabilities and improvements of this feature in ConfigMgr 2012, discuss implementation details, and demonstrate how you can start using it to fulfill actual business requirements.
Discover what’s new in Windows 8.1 regarding interface, settings, deployment, security, … How will Windows 8.1 fit in your enterprise? How do you upgrade? All answers are here!
The document discusses how to get started with monitoring after a successful installation of System Center Operations Manager (SCOM). It recommends doing an initial health check of the SCOM management server and database. It also covers installing SCOM agents, selecting appropriate management packs to monitor key components, and defining a phased approach for starting monitoring. The presentation provides tips on leveraging the community, backing up the SCOM environment, and finding quick wins to show management.
RMS, EFS, and BitLocker are Microsoft data protection technologies that can help prevent data leakage. RMS allows users to apply usage policies to files and encrypts files to control access. EFS transparently encrypts files stored locally on a computer. BitLocker encrypts fixed and removable drives to protect data at rest. The technologies provide different levels of protection and have varying capabilities for controlling access to data inside and outside an organization.
The document discusses Configuration Manager client deployment and health. It covers supported platforms for Windows, Linux, and Mac clients. Deployment methods include SUP, Group Policy, scripts, and manual installation. Client health is monitored from the server and client. Components include Client Check for prerequisites, dependencies and remediation, and Client Activity for tracking server interactions and status. Dashboards and reports provide visibility into client health and alerts surface issues.
This document discusses the history and evolution of self-service business intelligence (BI) tools from the 1980s to the present. It traces how BI tools have shifted from being developed primarily by IT to being user-focused end tools. It highlights key Microsoft products at different stages, from Excel in the 1980s to the addition of new apps like GeoFlow and Data Explorer in 2013. The document also demos some new self-service BI capabilities and resources.
This document discusses Cluster-Aware Updating (CAU) in Windows Server 2012. It provides an overview of how CAU works to update nodes in a failover cluster. The CAU update coordinator manages the updating process, pausing nodes, draining virtual machines, updating nodes, and failing back virtual machines in a coordinated manner. The document also provides links to Microsoft articles about CAU and integrating it with Dell server update tools.
The document discusses Microsoft's antimalware management platform which provides a common antimalware platform across Microsoft clients with proactive protection against known and unknown threats while reducing complexity. It integrates features such as early-launch antimalware, measured boot, and secure boot through UEFI to prevent malware from bypassing antimalware inspection during the boot process. The platform also provides simplified administration through a single console experience for endpoint protection and management.
This LiveMeeting presentation introduces Application Performance Monitoring (APM) in System Center Operations Manager 2012. APM allows monitoring of .NET and WCF applications to identify performance issues. It requires SCOM 2012 or later with the IIS management pack installed. APM bridges the gap between development and operations teams by integrating with Team Foundation Server and collecting traces in an IntelliTrace format. It provides various tools for client-side monitoring, server-side monitoring, and analyzing application diagnostics and advisors to help answer common support questions about application slowdowns and errors.
This document discusses Microsoft Lync Server 2013's persistent chat feature. It provides an overview of persistent chat's history and integration within Microsoft products. It also describes Lync 2013's unified client, improved server infrastructure and manageability, rich platform capabilities, and tools to easily migrate from previous versions. Configuration and management of persistent chat policies, categories, rooms and add-ins are examined. The document concludes with a section on licensing requirements for persistent chat.
The document discusses desktop virtualization and remote desktop services. It explains that with these services, the desktop workload is centralized on a virtual machine in the datacenter while the presentation of the UI is managed remotely via protocols like RDP. It also discusses mobility options that allow Lync to work across devices like PCs, Macs, smartphones and tablets through different applications. Finally, it provides a table comparing Lync support and requirements for various Windows Phone models.
Office 365 ProPlus can be deployed using Click-to-Run installation, which uses an App-V foundation for a streaming installation. This allows deploying Office fast without sacrificing control. The Office Deployment Tool can be used to download Click-to-Run packages, customize configurations, and deploy the packages across an organization. Telemetry data is collected to help optimize the user experience and identify issues, and a Telemetry Dashboard provides tools to manage data collection and settings.
This document discusses identity and authentication options for Office 365. It covers Directory Synchronization (DirSync) which synchronizes on-premises Active Directory with Azure Active Directory. It also discusses Active Directory Federation Services (ADFS) which provides single sign-on for federated identities and different ADFS topologies including on-premises, hybrid and cloud. Additionally, it covers Windows Azure Active Directory and how it can be used to provide identity services for cloud applications. The key takeaways are to check Active Directory health before using DirSync, understand the different Office 365 authentication flows with ADFS, and that WAAD can extend identity functionality to websites.
This document discusses options for upgrading a SharePoint environment from 2010 to 2013. It outlines the upgrade process which involves learning about the options, validating the environment, preparing by cleaning up and managing customizations, implementing the upgrade by building servers and upgrading content and services, and testing the upgraded environment. The key aspects are performing the upgrade on a new farm by attaching content databases to avoid downtime, allowing site collections to upgrade individually to minimize disruption, and thoroughly testing the upgraded environment.
This document discusses System Center Configuration Manager 2012's application model. It provides an overview of the application model, including the vision behind it of lifecycle management and user-centric deployment. Key concepts covered include requirement rules, detection methods, the application evaluation flow, application supersedence, and application uninstalls. Challenges and potential workarounds are also mentioned.
This document discusses FlexPod for Microsoft Private Cloud, an integrated solution from NetApp and Cisco for implementing a Microsoft Private Cloud using their technologies. It is a pre-validated reference implementation that is fully integrated with Microsoft System Center 2012 and provides a scalable Hyper-V platform. It accelerates private cloud deployments with reduced risk. Key components include Cisco UCS blade servers and switches, NetApp FAS storage, and tight integration and management capabilities through Cisco UCS Manager and NetApp OnCommand with Microsoft System Center.
Windows RT devices can be used in corporate environments if managed properly. Windows RT provides limited management capabilities compared to full Windows devices, but supports application deployment and some policy enforcement through Intune and ConfigMgr. Key challenges include application delivery restrictions, limited VPN configuration options, and lack of remote control and software metering capabilities. Proper infrastructure like Intune, ConfigMgr and VPN servers is required to securely connect and manage Windows RT devices in an enterprise.
The document discusses the evolution from device-centric management to user-centric management. Device-centric management involved managing individual devices, but user-centric management focuses on managing all of a user's devices through a single interface. The document outlines how Microsoft System Center Configuration Manager 2012 and Microsoft Intune can be used to implement user-centric management, including managing applications, settings, and security across devices. A hybrid approach using both Configuration Manager and Intune is also presented.
The document discusses steps for deploying a successful virtual network, including designing the network, building and configuring hardware, and configuring the virtual machine manager. It covers providing isolation through techniques like VLANs and software defined networking. Topics include logical network addressing, host configuration options, and creating logical switches. Tenant configuration using network virtualization is described for isolation.
More from Microsoft TechNet - Belgium and Luxembourg (20)
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Improvements in Failover Clustering in Windows Server 2012
1.
2.
3.
4.
5. What? Why?
Multiple individual computers Support business needs by avoiding
working together to increase the downtime (increasing availability)
availability (and scalability) of a
clustered service.
Result
+ Complexity
+ Management
+ Cost
6.
7. Management of the private cloud
Hyper-V Platform of the private cloud
Infrastructure of the private cloud
8. 4,000 VM’s in a single cluster
Scale Up
Scale Out
...
64 nodes in a cluster
20. Concurrent Live Migrations:
Multiple simultaneous LM’s for
Live Migration Queuing:
a given source or target
In-box tools queue & manage
large numbers of VMs
Storage Live Migration: VHD VHD
Moves VHD’s from one disk to
another
Hyper-V Replica:
Point-in-time replication of VHD’s
for disaster recovery
26. Node N
Node 2
Node 1
Node N
Node 2 Hyper-V
Shared Node 1 VM
JBOD Mgmt OS
Platfor File VM
HB Data Clusteri Server & NIC NIC
A
m VSwitc
Manag ng Networkin h
External HB Storag NIC NIC
A ement gStack VM
Storage e
Arrays VMBus VM
30. Hyper-V Cluster
(Up to 63 nodes)
Data Center Network
File Server
Cluster
(Up to 4 nodes)
Single Logical File Server (FSShare)
Single File System Namespace
Cluster Shared Volumes
32.
SQL Server
fs1share fs1share
File Server Node File Server Node
A B
File Server Cluster
33.
SQL Server
fs1share fs1share
File Server Node File Server Node
A B
File Server Cluster
34. • Witness
Service
User
Witness
Kernel
Protocol
(new) SMB 3.0 Server
Witness
• Client
User User
Kernel Kernel
State
Operation replay SMB 3.0 persistence
SMB2 Redirector SMB3 Server
•
Resume Key Filter
File System
SMB 3.0 Client SMB 3.0 Server
35.
36.
37.
1. Failover Take
2. Resources offline
3.
4.
5. Put
Patch
online
Restart
45. Slide 39: http://www.flickr.com/photos/emmebi89/2918973663/
“Building Windows 8” ~ http://blogs.msdn.com/b/b8/
“Clustering and High-Availability” http://blogs.msdn.com/b/clustering/
“Windows Server Blog” ~ http://blogs.technet.com/b/windowsserver/
Editor's Notes
Support for up to 64 physical nodes and up to 4,000 virtual machines per cluster (compared with 16 physical nodes and 1,000 virtual machines in Windows Server 2008 R2)Cluster integration with Windows Server 2012 Server Manager to discover and manage all the nodes of the clusterFailover Cluster Manager features to manage large-scale clustersAutomated management settings for clustered virtual machines and other clustered rolesLive migration of virtual machine storageSupport for Hyper-V Replica (which provides automated replication of virtual machines between storage systems, clusters, and data centers)Policies to failback clustered roles to a node following maintenance operations
The updated Failover Cluster Manager snap-in simplifies large-scale management of clustered virtual machines and other clustered roles. The new features include the following:- Features for managing large numbers of virtual machines or other clustered roles. Search, filtering, and custom views in Failover Cluster Manager make it easier to manage large numbers of clustered virtual machines or other clustered roles.- Multiselect. Administrators can easily select a specific collection of virtual machines and then perform any needed operation on them (live migration, save, shutdown, or start).- Simplified live migration and quick migration of virtual machines. Live migration and quick migration are easier to perform from within Failover Cluster Manager.- Simpler configuration of Cluster Shared Volumes (CSV). Configuring CSVs is a simple right-click in the Storage pane.New Windows PowerShell cmdlets support capabilities in Failover Clustering including the following:- Managing cluster registry checkpoints, including cryptographic checkpoints-Creating Scale-Out File Servers, which provide continuously available and scalable file-based server application storage - Monitoring of virtual machine applications - Updating the properties of a Distributed Network Name resource- Creating a highly available iSCSI Target Server
Administrators can now control the way that the cluster handles virtual machines and other clustered roles by assigning a priority to each clustered role. The possible priorities are:HighMediumLowNo Auto StartWhen a clustered role is created, the default priority is Medium.By assigning priorities to clustered roles, administrators can influence:Start order of roles. Virtual machines or clustered roles with higher priority are started before those with lower priority.Placement order of roles. Virtual machines or clustered roles with higher priority are placed on appropriate nodes before virtual machines or clustered roles with lower priority.When the whole cluster is restarted, multiple roles must be placed on multiple nodes in the cluster. If a node crashes or is evicted, multiple roles must be placed on the remaining nodes in the cluster. The placement order of these roles is determined by their priority setting.If a No Auto Start priority is assigned to a clustered role, the role does not start automatically (does not come online) after it fails, which keeps resources available so other roles can start.
The Validate a Configuration Wizard in Failover Cluster Manager simplifies the process of validating hardware and software across servers for use in a failover cluster. The performance for large failover clusters has been improved, and new tests have been added.The following aspects of validation have been improved: Faster validation: Validation tests, especially storage validation tests, run significantly faster.Targeted validation of new LUNs: Administrators can target validation of a specific new LUN (disk), rather than testing all LUNs every time they test storage.Integration of validation with WMI: Cluster validation status is now exposed through Windows Management Instrumentation (WMI), so that applications and scripts can programmatically consume it.New validation tests for CSV: Validation tests help administrators confirm that their configuration meets the requirements for CSVs.New validation tests for Hyper-V and virtual machines: Validation tests help administrators determine whether the servers in their cluster are compatible for Hyper-V purposes, that is, whether the servers will support smooth failover of virtual machines from one host to another.What value do these changes add?The added validation tests help confirm that the servers in the cluster will support smooth failover, particularly of virtual machines from one host to another.
High Availability > Continuous AvailabilityCost and availability continuum – pay for the availability you need Build on standard, lower-cost, high-volume hardware componentsOS platform enables partners to deliver a wide range of solutionsEasy for customers to procure, deploy and manageRecoverable device failures and failure isolation Transparent and fast recovery from failures without service disruptionDynamic Cluster Quorum Model > Last Man standing as available as possible
SMB2 direct. This improvement uses a special type of network adapter that has remote direct memory access (RDMA) capability and can function at full speed with very low latency, while using very little CPU. For server roles or applications such as Hyper-V or SQL Server, this allows a remote file server to have performance that compares to local storage.SMB2 multichannel. This improvement allows aggregation of network bandwidth and network fault tolerance if multiple paths are available between the SMB 3 client and the SMB 3 server. Server applications can then take advantage of all available network bandwidth and be resilient to a network failure.
Key benefits provided by Scale-Out File Server in Windows Server 2012 include:Active-Active file shares All cluster nodes can accept and serve SMB client requests. By making the file share content accessible through all cluster nodes simultaneously, SMB 3.0 clusters and clients cooperate to provide transparent failover to alternative cluster nodes during planned maintenance and unplanned failures with service interruption.Increased bandwidth The maximum share bandwidth is the total bandwidth of all file server cluster nodes. Unlike previous versions of Windows Server, the total bandwidth is no longer constrained to the bandwidth of a single cluster node, but rather the capability of the backing storage system. You can increase the total bandwidth by adding nodes.CHKDSK with zero downtime CHKDSK in Windows Server 2012 is significantly enhanced to dramatically shorten the time a file system is offline for repair. Clustered shared volumes (CSVs) in Windows Server 2012 take this one step further and eliminates the offline phase. A CSV File System (CSVFS) can perform CHKDSK without impacting applications with open handles on the file system.Clustered Shared Volume cache CSVs in Windows Server 2012 introduces support for a read cache, which can significantly improve performance in certain scenarios, such as Virtual Desktop Infrastructure.Simpler management With Scale-Out File Servers, you create the Scale-Out File Server and then add the necessary CSVs and file shares. It is no longer necessary to create multiple clustered file servers, each with separate cluster disks, and then develop placement policies to ensure activity on each cluster node.
New protocol version: SMB 3.0SMB 3.0 Client (Redirector)Client operation replayEnd-to-end support for replay of idempotent and non-idempotent operationsSMB 3.0 ServerSupport for network state persistenceSingle share spans multiple nodes (active-active shares)Files are always opened Write-ThroughResume Key – used on failover to:Resume handle state after planned or unplanned failoverFence handle state informationMask some NTFS failover issuesWitness ProtocolEnables faster unplanned failover because clients do not wait for timeoutsEnables dynamic reallocation of load
I’m not going to demo this feature at this time. Later, when I’ll be demoing the cool new continuous available file share, I’ll also show this feature.
Failover Clustering is delivering the infrastructure for the Private CloudMost scalable private cloudFlexible deployment choices Intelligent placement across the private cloudNext generation Cluster Shared Volumes (CSV)