This document provides an overview of Microsoft's System Center Data Protection Manager (DPM) 2007. It discusses customer needs for fast and reliable data recovery, 24/7 backup capabilities without downtime, and an easy to use and cost effective solution. It then summarizes DPM's continuous data protection features, efficient disk-based storage that avoids data duplication, support for virtual and application-level backups, and Microsoft IT's deployment of DPM across its infrastructure.
Power management has become increasingly important in large-scale datacenters to address costs and limitations in cooling or power delivery, and it is much critical in mobile client where battery lifecycle is considered as one of the critical characteristics of the platform of choice. Good power management helps to achieve great energy efficiency. Virtualization imposes additional challenge to power management. It involves multiple software layers: VMM, OS, APP. For example, a good OS software stack may result in bad power consumption, if the hypervisor is not the timer unalignment, etc.
In this session, we will introduce what we did to improve power efficiency to achieve better power efficiency in both server and client virtualization environment.
In server side, we will introduce additional optimization technologies (e.g., eliminate unnecessary activities, align periodic timers to create long-idle period), to improve package C6 residency to be within 5% overhead with native. In client side, we will share our client power optimization technologies (e.g. graphics, ATA and wireless), which successfully reduce XenClient idle power overhead to be within 5%.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Что такое Hyper-V
Версии Windows Server 2012 Hyper-V
Аппаратные требования к Windows Server 2012 Hyper-V
Установка Hyper-V
Сетевые возможности Windows Server 2012 Hyper-V
Что такое Live Migration
Высокодоступные кластеры Windows Server 2012 Hyper-V
Аварийное восстановление и Hyper-V Replica
Азы управления при помощи System Center
При поддержке "Звезды и С" www.stars-s.ru
One of the main design princples of ZFS is merging the management of physical volumes with individual filesystems. Instead of relying on an underlying volume manager, ZFS manages disks directly and aggregates them into pools from which individual filesystems are allocated. Storage servers using ZFS typically configure two pools: one pool onto which the system’s root filesystem is installed, and a second for the data to be managed by that system.
At Joyent we’ve taken a different approach and discarded the root pool in favor of a single system-wide pool. Not only does this approach free up an additional two drives to be used for main storage, it also provides us flexibility in upgrading system software, higher customer multitenancy, and ease of deploying new machines. In this talk, I’ll describe our overall architecture, talk about challenges we faced in constructing such an architecture, and characterize our experiences having deployed this model in production over the last 18 months.
In this session we examined the Xen PV performance on the latest platforms in a few cases that covers CPU/memory intensive, disk intensive and network intensive workloads. We compared Xen PV guest vs. HVM/PVOPS to see whether PV guest still have advantage over HVM on a system with state-of-the-art VT features. KVM was also compared as a reference. We also compared PV driver performance against bare-metal and pass-through/SR-IOV. The identified issues were discussed and we presented our proposal on fixing those issues.
With compelling new features in SUSE Linux Enterprise Server—and the stellar workgroup services found in Novell Open Enterprise Server 2—the benefits of moving your Novell GroupWise environment to Linux are more readily apparent than ever. This session will cover how you can use available Novell tools to move a GroupWise system to the Linux platform. In addition to tools and utilities, we'll share practical tips, tricks and demonstrations.
This document describes how XenServer provides and keeps track of the storage supplied to its guests. The first section
is a reminder of how Linux looks at storage and the second section builds on that to explain XenServer storage. Basic
knowledge of Linux is required, as some standard tools are used.
Dealing with Hardware Heterogeneity Using EmbeddedXEN, a Virtualization Frame...The Linux Foundation
EmbeddedXEN is a particularly efficient virtualization framework tailored to ARM-based core embedded systems.
While security and OS isolation are key features of conventional virtualizuation frameworks, the main concerns for EmbeddedXEN are device heterogeneity and realtime aspects, which are particularly important in the embedded world.
EmbeddedXEN mainly relies on the original XEN architecture but with major differences in the way guest OS are handled: the hypervisor has been simplified, and only two guest OS (dom0 and domU) can run simultaneously; while dom0 is used to manage the native OS with drivers (original and backend splitted drivers), a paravirtualized OS (domU) can be cross-compiled on a different ARM device, and user applications can run seamlessly on the (virtualized) host device. Another important difference is that no user space tools are required to manage the VMs; the framework produces a compact single binary image containing both dom0 and domU guests, which can be easily deployed. The Xenbus architecture has been adapted to that context.
EmbeddedXEN therefore allows the porting of an OS and its applications from an ARM embedded device to last generation ARM hardware, such as HTC Smartphone for example.
Power management has become increasingly important in large-scale datacenters to address costs and limitations in cooling or power delivery, and it is much critical in mobile client where battery lifecycle is considered as one of the critical characteristics of the platform of choice. Good power management helps to achieve great energy efficiency. Virtualization imposes additional challenge to power management. It involves multiple software layers: VMM, OS, APP. For example, a good OS software stack may result in bad power consumption, if the hypervisor is not the timer unalignment, etc.
In this session, we will introduce what we did to improve power efficiency to achieve better power efficiency in both server and client virtualization environment.
In server side, we will introduce additional optimization technologies (e.g., eliminate unnecessary activities, align periodic timers to create long-idle period), to improve package C6 residency to be within 5% overhead with native. In client side, we will share our client power optimization technologies (e.g. graphics, ATA and wireless), which successfully reduce XenClient idle power overhead to be within 5%.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Что такое Hyper-V
Версии Windows Server 2012 Hyper-V
Аппаратные требования к Windows Server 2012 Hyper-V
Установка Hyper-V
Сетевые возможности Windows Server 2012 Hyper-V
Что такое Live Migration
Высокодоступные кластеры Windows Server 2012 Hyper-V
Аварийное восстановление и Hyper-V Replica
Азы управления при помощи System Center
При поддержке "Звезды и С" www.stars-s.ru
One of the main design princples of ZFS is merging the management of physical volumes with individual filesystems. Instead of relying on an underlying volume manager, ZFS manages disks directly and aggregates them into pools from which individual filesystems are allocated. Storage servers using ZFS typically configure two pools: one pool onto which the system’s root filesystem is installed, and a second for the data to be managed by that system.
At Joyent we’ve taken a different approach and discarded the root pool in favor of a single system-wide pool. Not only does this approach free up an additional two drives to be used for main storage, it also provides us flexibility in upgrading system software, higher customer multitenancy, and ease of deploying new machines. In this talk, I’ll describe our overall architecture, talk about challenges we faced in constructing such an architecture, and characterize our experiences having deployed this model in production over the last 18 months.
In this session we examined the Xen PV performance on the latest platforms in a few cases that covers CPU/memory intensive, disk intensive and network intensive workloads. We compared Xen PV guest vs. HVM/PVOPS to see whether PV guest still have advantage over HVM on a system with state-of-the-art VT features. KVM was also compared as a reference. We also compared PV driver performance against bare-metal and pass-through/SR-IOV. The identified issues were discussed and we presented our proposal on fixing those issues.
With compelling new features in SUSE Linux Enterprise Server—and the stellar workgroup services found in Novell Open Enterprise Server 2—the benefits of moving your Novell GroupWise environment to Linux are more readily apparent than ever. This session will cover how you can use available Novell tools to move a GroupWise system to the Linux platform. In addition to tools and utilities, we'll share practical tips, tricks and demonstrations.
This document describes how XenServer provides and keeps track of the storage supplied to its guests. The first section
is a reminder of how Linux looks at storage and the second section builds on that to explain XenServer storage. Basic
knowledge of Linux is required, as some standard tools are used.
Dealing with Hardware Heterogeneity Using EmbeddedXEN, a Virtualization Frame...The Linux Foundation
EmbeddedXEN is a particularly efficient virtualization framework tailored to ARM-based core embedded systems.
While security and OS isolation are key features of conventional virtualizuation frameworks, the main concerns for EmbeddedXEN are device heterogeneity and realtime aspects, which are particularly important in the embedded world.
EmbeddedXEN mainly relies on the original XEN architecture but with major differences in the way guest OS are handled: the hypervisor has been simplified, and only two guest OS (dom0 and domU) can run simultaneously; while dom0 is used to manage the native OS with drivers (original and backend splitted drivers), a paravirtualized OS (domU) can be cross-compiled on a different ARM device, and user applications can run seamlessly on the (virtualized) host device. Another important difference is that no user space tools are required to manage the VMs; the framework produces a compact single binary image containing both dom0 and domU guests, which can be easily deployed. The Xenbus architecture has been adapted to that context.
EmbeddedXEN therefore allows the porting of an OS and its applications from an ARM embedded device to last generation ARM hardware, such as HTC Smartphone for example.
Efficient Data Protection in VMware environments. You will learn about the basics of data protection in VMware environments and you will also find sample configurations and recommendations including Symantec Backup Exec / NetBackup, Fujitsu ETERNUS LT and Fujitsu ETERNUS CS800.
Violin Memory: Concerto 2200 with Dedupe and CompressionViolin Memory
In this presentation, Violin Memory debuts the Concerto 2200 with deduplication and compression.
In this presentation, you will learn about
* how to control the desktop experience
* an overview of the Violin Memory Concerto 2200, Concerto 7000 and Windows Flash Array
* a detailed review of the Concerto 2200 data reduction appliance with inline dedupe and compression
* Concerto 2200: high-level architecture blocks
* Concerto 2200: typical set up
* cost of desktops in a flash, per VDI desktop
* cool stuff to know about the Concerto 2200
VMworld 2013: vSphere Data Protection 5.5 Advanced VMware Backup and Recovery...VMworld
VMworld Europe 2013
Mauricio Barra, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Jeff Hunter, VMware
Material de la Charla del Evento de Virtualizacion del 10 de setiembre del 2009 en FUNDATEC.
http://ecastrom.blogspot.com
http://comunidadwindows.org
ecastro@grupoasesor.net
Ing. Eduardo Castro Martinez, PhD
Microsoft SQL Server MVP
http://ecastrom.blogspot.com
http://mswindowscr.org
http://comunidadwindows.org
The Best Storage For V Mware Environments Customer Presentation Jul201Michael Hudak
Server virtualization is being widely adopted throughout the industry. Server virtualization places new demands on the storage infrastructure that should be considered early in the design process. NetApp provides storage and data management solutions that uniquely enable effective server virtualization environments, and which further extend the benefits of server virtualization. In this presentation, we’ll review why NetApp is the best storage solution for virtualized server environments.
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. https://www.pass4sureexam.com/70-412.html
Re-Think Storage – PernixData. Meet & greet with Frank DennemanDigicomp Academy AG
Die Verwendung von Storage-Arrays wird allgemein als natürliches Design einer Virtualisierung angesehen. Die Verwendung dieser Storage-Arrays fürhrt allerdings oft zu Problemen mit der Speicherleistung. Flash-Speicher wird als Retter für die Speicherengpässe angesehen. Stellt sich nur noch die Frage, wo denn Flash am sinnvollsten eingesetz werden sollte?
Frank Denneman, Tech Evangelist und Author, sprach am VMware Storage Event vom 30. April 2015 über den Einsatz von Flash-Speicher. Ebenfalls stellte er in seiner Präsentation PernixData FVP™, mit der die Storage-Performance um ein vielfaches erhöht werden kann.
Virtualization has been the “big thing” in server consolidation for years, and two of the biggest players are Microsoft and VMware. So how do these solutions stack up for live migration, memory, support, and fault tolerance? Find out this and more when you view C/D/H's Virtualization Smackdown slide deck.
And for more information on this or other virtualization topics, visit our blog at www.cdhtalkstech.com.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
3. Agenda
Introduction to Microsoft® System Center Data
Protection Manager (DPM) 2007
Deep dive
How does DPM do efficient protection?
Protecting virtual hosts
Demo
How Microsoft IT uses DPM
Questions and Answers
4. Customer Needs & Requirements
• Need for Speed – Fast & Reliable Recoveries
• Today, recovery is slow, unreliable and painful
• Data protection is labor intensive & error-prone
• 24x7 Businesses – No Backup Window
• Backup is too complex, slow, and inefficient
• Tape inconvenience and unreliability is # 1 challenge
• Application downtime is not an option to get application consistency
• Simplify & Save – Easy to Buy & Use
• Current backup products are too complex, costly
• Branch office data protection is cumbersome
• IT budget remains flat but data keeps growing – need to do more with
less.
5. Microsoft ®
System Center
Data Protection Manager 2007
Online Snapshots (up to 512)
Disk-based
Recovery
Active Directory®
System State
Up to
Every 15 minutes
DPM 2007 sp1 DPM 2007 sp1
Disaster Recovery
with offsite replication & tape
Tape-based
Backup
file shares and directories
DPM 2007
• Continuous Data Protection (CDP) for Windows application and file servers
• Rapid and reliable recovery from disk instead of tape
• Advanced technology for enterprises of all sizes
6.
7. DPM Efficient Disk Storage Without Duplication Day 0
Production Data DPM Replica
A B C D E F G H A B C D E F G H
Original Data ABCDEFGH
8. DPMEfficient Disk Storage Without Duplication Day 0 –
DPM Efficient Disk Storage Without Duplication
Data 0 – Data
Day Change is Protected
1
Production Data DPM Replica
A B I D E J G H A B C D E F G H
C F
DPM Recovery Point Area
Original Data ABCDEFGH
1st data change ABIDEJGH
9. DPM Efficient Disk Storage Without Duplication Day 2 –
DPM Efficient Disk Storage Without Duplication
Day 2 – Data
Data Change is Protected
3
Production Data DPM Replica
K B I D E J L H A B C D E F G H
A G
DPM Recovery Point Area
C F
Original Data ABCDEFGH
1st data change ABIDEJGH
2nd data change KBIDEJLH
10. DPM Efficient Disk Storage Without Duplication Day 3 –
DPM Efficient Disk Storage Without Duplication
Day 3 – Data
Data Change is Protected
Production Data DPM Replica
K B I D M N O P Q K B I D E J L H
E J L H
DPM Recovery Point Area
C F A G
Original Data ABCDEFGH
1st data change ABIDEJGH
2nd data change KBIDEJLH
3rd data change KBIDMNOPQ
11. DPM Efficient Disk Storage Without Duplication
To Recovery Day 2
Production Data DPM Replica
K B I D M N O P Q
DPM Recovery Point Area
C F A G E J L H
Original Data ABCDEFGH
1st data change ABIDEJGH
2nd data change KBIDEJLH
3rd data change KBIDMNOPQ 8 blocks restored
12. DPM Efficient Disk Storage Without Duplication
To Recovery Day 0
Production Data DPM Replica
K B I D M N O P Q
DPM Recovery Point Area
C F A G E J L H
Original Data ABCDEFGH 8 blocks restored
1st data change ABIDEJGH
2nd data change KBIDEJLH
3rd data change KBIDMNOPQ
13.
14. Windows Virtualization host-based protection
Exchange 2003
Exchange 2007
Virtual Server 2005 R2 sp1
Windows Server 2008 with Hyper-V
VSSVR
Guest OS instances
SQL Server 2005 Linux02
SQL Server 2008
NT4-CustomApp
Win2003-SQL2005
15. Windows Virtualization host-based protection
VirtualServer2005 R2 today / Hyper-VwithDPM2007 SP1
VSS capable guests = Online backup
no downtime / no agent required
Windows Virtualization Host
VSS consistent inside
Windows Server 2003 sp1 or later
New VM Additions VSSVR
VSS consistent outside Guest OS instances
VHD VSS writer Linux02
NT4-CustomApp
Win2003-SQL2005
16. Windows Virtualization host-based protection
VirtualServer2005 R2 today / Hyper-VwithDPM2007 SP1
VSS capable guests = Online backup
no downtime / no agent required
Windows Virtualization Host
VSS consistent inside
Windows Server 2003 sp1
New VM Additions VSSVR
VSS consistent outside Guest OS instances
VHD VSS writer Linux02
NT4-CustomApp
Win2003-SQL2005
Non-VSS capable guests = Offline
Hibernate/SaveState virtual machine
Save state of memory/CPU
VSS shadow copy of VHD’s
Immediately resume virtual machine
Block level synchronization of VHD changed blocks
17. Windows Virtualization host-based protection
SQL2005
Windows Linux
Server
2003
Windows Server 2008 with Hyper-V NEW
Virtual Server 2005 R2 with Service Pack 1
18. Windows Virtualization host-based protection
Linux.config
Linux
Linux_C.VHD
Linux_D.VHD
Windows Server 2008 with Hyper-V NEW
Virtual Server 2005 R2 with Service Pack 1
19. Windows Virtualization host-based protection
Linux.config
Linux
VSS Writer
Linux_C.VHD
Linux_D.VHD
Save State
Linux.VSV
2-3 minutes
Windows Server 2008 with Hyper-V NEW
Virtual Server 2005 R2 with Service Pack 1
20. Windows Virtualization host-based protection
SQL2005
Windows
Server
2003
Windows Server 2008 with Hyper-V NEW
Virtual Server 2005 R2 with Service Pack 1
21. Windows Virtualization host-based protection
SQL2005
WinSvr.config
Windows
Server VSS Writer
2003 VSS writer for SQL 2005
Database consistent
VSS writer for Windows Server
C: & D: volumes
VSS writer for Virtual Server 2005 R2 sp1
WinSvr_C.VHD & WinSvr_D.VHD
Windows Server 2008 with Hyper-V NEW
Virtual Server 2005 R2 with Service Pack 1
22. Windows Virtualization host-based protection
SQL2005
• No downtime
Windows
Server
2003 • Recursive VSS
consistency
• Only requires updated VM
additions from MSVS sp1
Windows Server 2008 with Hyper-V NEW
Virtual Server 2005 R2 with Service Pack 1
23. Windows Virtualization host-based protection
Online backups
Guests running Win2003/Win2008 with Integration
Components installed
Offline backups
Older Windows Guests – e.g. Windows 2000, NT4
Non Windows Guests – Linux, etc
Guest OS’s with pass-through disks, dynamic disks
Guest level backups
Guests with no VHD file on the Host
iSCSI storage inside the guest
Remote VHDs
25. Protected Platforms
Microsoft platforms with VSS capabilities
Microsoft® Office SharePoint® Server 2007
Windows® SharePoint® Services version 3.0
Microsoft® Office SharePoint® Portal Server 2003 – protected as SQL databases
Windows® SharePoint® Services version 2.0 – protected as SQL databases
Microsoft® SQL Server 2000 Service Pack 4
Microsoft® SQL Server™ 2005
Microsoft® SQL Server™ 2008
Microsoft® Exchange Server 2003 Service Pack 2
Microsoft® Exchange Server 2007 – including LCR, CCR, and SCR configurations
Microsoft® Virtual Server 2005 R2 Service Pack 1
Hyper-V™ Server and Windows Server 2008 with Hyper-V
Windows Server® 2003 Service Pack 1
Windows Server® 2008
Windows® XP Professional Service Pack 2
Windows Vista® Business or higher
27. Deployment Overview
What we started with
5,770 protected servers
19,240 protected resources
Nearly 2 petabytes of existing disk
Introducing major paradigm shift in service:
Continuous native protection of
SQL, SharePoint, Exchange
Reallocate disk while maintaining SLA
All this and provide same or better protection
28. DPM 2007 deployment at Microsoft IT
Operations
24x7 operations
Daily Goals
100% Restore Success
Monitoring 123 DPM
servers 98% Backup Success
Redmond
Tukwila Dublin
Tokyo
Singapore
Service Requests Data Volume
Backup/Restores Month : 1500 1.76 PB used storage
Servers Protected : 3674 600,000 Jobs/Month
29. MSIT Deployment of DPM 2007
Current Status
97% complete
19,524 protected resources
567 Protection Groups
3,674 Protected Servers
2.25 PB Total Storage
1.76 PB Used Storage
30. MSIT Deployment of DPM 2007
Current Status
Average DPM server protects 32 servers and
170 resources
Average DPM server has 19 TB of disk
SQL is nearly 50% of servers backed up
After migration, SQL databases are nearly 80% of
protected resources (< 20% previously)
31. MSIT Deployment of DPM 2007
Key Wins with Deployment
Tape library reduction in branch offices
$730K in annual M&R and replacement costs
Reduction in licensing costs
$500K in Symantec licensing per year
92 bugs/DCR’s, 46 CSS cases
Dev has published disk migration scripts with SP1
and other updates found by MSIT
32. MSIT Deployment of DPM 2007
More Key Wins with Deployment
Overall clean-up of what’s protected
Reduced by ~ 2,300 servers (41%)
SMS scripts for large scale agent deployment
Reduced operational cost
SCOM Pack will drive reduction in headcount
Needs in bold, challenges belowDPM addresses these challenges and more
Immeasurable headcount costs reduced for troubleshooting the HWSymantec cost is about 25% that of avg ‘enterprise’ customer due to contract negotiated over 10 yrs ago
MOM pack not operationalized yet, cost reductions not yet realized.