This document provides an overview comparison of capabilities between Microsoft and VMware for private cloud platforms, including virtualization, templates, management, automation, monitoring, disaster recovery and data protection. Key differences noted are that Microsoft provides more granular workload protection, integrated development and operations (DevOps), application insight and support for heterogeneous environments compared to VMware which focuses primarily on VMware-specific technologies and capabilities.
Vmware Certified Professional 6 2V0-621 DumpsShamar41
pass4sureexam is a website which can help you save time and energy to rapidly and efficiently master the vmware certification 2v0-621d exam dumps.
https://www.pass4sureexam.com/2V0-621.html
This document provides an introduction to virtualization using VMware vSphere. It discusses key concepts of virtualization including virtual machines, ESXi architecture, and how vSphere fits into cloud computing environments. The document outlines lessons that cover comparing physical and virtual systems, vSphere user interfaces, and an overview of the ESXi hypervisor.
Veeam Availability top 10 reasons to choose veeam - longS. Hanau
The document discusses the advantages of Veeam Backup & Replication over legacy backup tools for virtual machine backups. Key advantages include:
1) Being agentless, avoiding the costs and risks of agents within VMs.
2) Having built-in advanced replication to easily maintain offsite backups without additional tools.
3) Offering instant VM recovery in minutes by running VMs directly from backups, versus hours for legacy tools.
This White Paper describes the EMC Backup-as-a-Service (BaaS) solution based on EMC Avamar, EMC Data Protection Advisor, and EMC HomeBase, which allows service providers to deliver backup services for cloud and traditional hosted environments, reduce storage space, increase backup speeds, and provide portal-based backup management.
This document describes the reference architecture of the EMC infrastructure for VMware View 5.1, EMC VNX Series (FC), VMware vSphere 5.0, VMware View Persona Management, VMware View Storage Accelerator, and VMware View Composer 3.0 solution, which was tested and validated by the EMC Solutions group.
The values of server virtualization are well understood today. Customers implement
server virtualization to increase server utilization, handle peak loads efficiently,
decrease total cost of ownership (TCO), and streamline server landscapes.
Similarly, storage virtualization helps to address the same challenges as server
virtualization. Storage virtualization also expands beyond the boundaries of physical
resources and helps to control how IT infrastructures adjust to rapidly changing
business demands. Storage virtualization benefits customers through improved
physical resource utilization and improved hardware efficiency, as well as reduced
power and cooling expenses. In addition, consolidation of resources obtained
through virtualization offers measurable returns on investment for today’s
businesses. Finally, virtualization serves as one of the key enablers of cloud
solutions, which are designed to deliver services economically and on demand.
The document contains 41 multiple choice questions about VMware certification exam 2V0-621D. The questions cover topics like vSphere permissions, ESXi security configurations, vCenter Server security certificates, and virtual machine security hardening. An administrator is seeking to reduce the memory overhead for a 3D graphics enabled virtual machine by adding the "vga.vgaOnly=TRUE" advanced configuration option to the virtual machine settings file.
This document is an introduction to the course "VMware vSphere: Install, Configure, Manage". The course aims to equip administrators with the skills to build and manage a VMware vSphere environment, including installing and configuring ESXi hosts and vCenter Server, and managing virtual machines. After completing the course, students should be able to perform tasks like configuring networking and storage, managing virtual machines, using vCenter Server for monitoring, and installing ESXi and vCenter Server.
Vmware Certified Professional 6 2V0-621 DumpsShamar41
pass4sureexam is a website which can help you save time and energy to rapidly and efficiently master the vmware certification 2v0-621d exam dumps.
https://www.pass4sureexam.com/2V0-621.html
This document provides an introduction to virtualization using VMware vSphere. It discusses key concepts of virtualization including virtual machines, ESXi architecture, and how vSphere fits into cloud computing environments. The document outlines lessons that cover comparing physical and virtual systems, vSphere user interfaces, and an overview of the ESXi hypervisor.
Veeam Availability top 10 reasons to choose veeam - longS. Hanau
The document discusses the advantages of Veeam Backup & Replication over legacy backup tools for virtual machine backups. Key advantages include:
1) Being agentless, avoiding the costs and risks of agents within VMs.
2) Having built-in advanced replication to easily maintain offsite backups without additional tools.
3) Offering instant VM recovery in minutes by running VMs directly from backups, versus hours for legacy tools.
This White Paper describes the EMC Backup-as-a-Service (BaaS) solution based on EMC Avamar, EMC Data Protection Advisor, and EMC HomeBase, which allows service providers to deliver backup services for cloud and traditional hosted environments, reduce storage space, increase backup speeds, and provide portal-based backup management.
This document describes the reference architecture of the EMC infrastructure for VMware View 5.1, EMC VNX Series (FC), VMware vSphere 5.0, VMware View Persona Management, VMware View Storage Accelerator, and VMware View Composer 3.0 solution, which was tested and validated by the EMC Solutions group.
The values of server virtualization are well understood today. Customers implement
server virtualization to increase server utilization, handle peak loads efficiently,
decrease total cost of ownership (TCO), and streamline server landscapes.
Similarly, storage virtualization helps to address the same challenges as server
virtualization. Storage virtualization also expands beyond the boundaries of physical
resources and helps to control how IT infrastructures adjust to rapidly changing
business demands. Storage virtualization benefits customers through improved
physical resource utilization and improved hardware efficiency, as well as reduced
power and cooling expenses. In addition, consolidation of resources obtained
through virtualization offers measurable returns on investment for today’s
businesses. Finally, virtualization serves as one of the key enablers of cloud
solutions, which are designed to deliver services economically and on demand.
The document contains 41 multiple choice questions about VMware certification exam 2V0-621D. The questions cover topics like vSphere permissions, ESXi security configurations, vCenter Server security certificates, and virtual machine security hardening. An administrator is seeking to reduce the memory overhead for a 3D graphics enabled virtual machine by adding the "vga.vgaOnly=TRUE" advanced configuration option to the virtual machine settings file.
This document is an introduction to the course "VMware vSphere: Install, Configure, Manage". The course aims to equip administrators with the skills to build and manage a VMware vSphere environment, including installing and configuring ESXi hosts and vCenter Server, and managing virtual machines. After completing the course, students should be able to perform tasks like configuring networking and storage, managing virtual machines, using vCenter Server for monitoring, and installing ESXi and vCenter Server.
The document provides an introduction to VMware Infrastructure, which includes ESX Server, VirtualCenter Server, and various distributed services. It describes the typical physical topology of a VI datacenter, including computing servers running ESX Server, storage networks and arrays, IP networks, the VirtualCenter management server, and desktop clients. It also provides an overview of the virtual datacenter architecture and its key components like hosts, clusters, resource pools, and distributed services.
VMware Infrastructure is a full virtualization suite that provides comprehensive virtualization, management, and automation capabilities. It virtualizes physical hardware resources across servers and provides pools of virtual resources. It also includes distributed services that enable fine-grained resource allocation, high availability, and consolidated backup of the entire virtual datacenter. The main components are ESX Server, which provides the virtualization layer, and VirtualCenter Server, which is used to centrally manage virtualized environments.
Getting Started with ESXServer3iEmbedded aktivfinger
- The document provides instructions for setting up and configuring ESX Server 3i Embedded for the first time, including adding the host to the network, deploying the VI Client to connect to a single host, deploying virtual machines, and deploying VMware Infrastructure with VirtualCenter to manage multiple hosts.
- It describes the key components of VMware Infrastructure including the VI Client, VirtualCenter Server, datacenter, host, and virtual machines. It compares managing a single host versus managing multiple hosts with VirtualCenter.
- The steps explained include configuring the administrative password and management network on the ESX Server 3i host using the direct console before installing the VI Client software.
The purpose of this reference architecture is to build and demonstrate the functionality, performance, and scalability of virtual desktops enabled by EMC VNX series (NFS), VMware vSphere 5.0, VMware View 5.1, VMware View Persona Management, VMware View Storage Accelerator, and VMware View Composer 3.0.
Microsoft veröffentlichte vor kurzem das jüngste Update für System Center Configuration Manager - System Center 2012 R2 Configuration Manager. Viele der neuen Updates sind so gut, dass jeder das Upgrade so schnell wie möglich haben möchte. Wally Mead, Microsoft MVP, präsentierte in dieser Preäsentation die neuen Features von Configuration Manager 2012 R2.
This document discusses testing disaster recovery of a FujiFilm Synapse application suite using VMware vSphere Replication between two sites. It describes building a DR setup with SRM 5.0 on both the protected and recovery sites and testing replication and failover of the Synapse VMs. Functionality of the application suite was validated after failover to ensure successful DR. Multi-tenancy site security was also tested using vCenter roles and privileges.
This document provides best practices for deploying Microsoft Exchange 2010 in a VMware vSphere environment. It discusses ESX host configuration guidelines for CPU, memory, storage and networking. It also covers Exchange performance, capacity planning, sizing examples, and how vSphere features can enhance deployments and operations. The goal is to help organizations virtualize Exchange to improve flexibility, reliability and reduce costs.
This ESG Lab review documents hands-on testing of Symantec Backup Exec 2014, with a focus on ease of management and flexible recovery options for virtual machine backups.
Server virtualization has become a mainstream deployment due to its proven benefits: physical server consolidation, cost reduction, efficiency, and flexibility. However, it can throw a monkey wrench into data protection processes. Backup administrators must manage physical and virtual servers, consolidated workloads, and multiple hypervisors—while often lacking virtualization skills and training. 1 In addition, the ease of spinning up new VMs can leave administrators unaware of unprotected assets, resulting in data vulnerabilities.
ESG recently asked IT professionals at both midmarket and enterprise organizations about their challenges in protecting virtualized environments. In terms of all virtual server data protection challenges, the ability to validate both backup and recovery success topped the list, closely followed by recoverability of data (Figure 1).2 Other top challenges included response times for troubleshooting, gaps in protection, and simplified views across the virtual infrastructure.
VMware vSphere is a virtualization platform that includes the ESXi hypervisor and vCenter Server management software. The document outlines the agenda for a VMware vSphere presentation, which includes topics such as virtualization, ESXi, vCenter, virtual machine management, networking, storage, vMotion, high availability, and other advanced features. It also provides overviews of ESXi hardware requirements, new features in vSphere 5.0, and how to upgrade from a previous version to vSphere 5.0.
This 3-day course teaches system administrators how to securely design, deploy, and manage a VMware vSphere environment. Through lectures and hands-on labs, students learn to identify vulnerabilities, harden vSphere components, recommend security policies and processes, and configure secure virtual networking and management environments. The course covers securing ESX/ESXi host systems, virtual machines, vCenter Server, and implementing configuration and change management best practices.
This document describes a virtual desktop solution for knowledge workers using VMware View 4.5 on a Vblock Series 700 infrastructure platform. It details the solution architecture, validation testing of 768 and 1536 desktops, and results. Testing showed the solution can support the workload characteristics of knowledge workers with good application response times and scalable server and storage utilization. The Vblock 700 provided a pre-integrated, validated platform that streamlined deployment of the virtual desktop environment.
Microsoft App-V 5.1 and Flexera AdminStudio WebinarFlexera
Steven Thomas, Senior Consultant at Microsoft specializing in Desktop and Application Virtualization talks with Flexera about current recommended processes and developments with App V 5.1 as well as the future of application virtualization.
Veeam is introducing an Enterprise Edition of its Veeam Backup & Replication software in addition to the Standard Edition to accommodate new features. The Enterprise Edition includes additional capabilities like application-item recovery (U-AIR), automated recovery verification, and the ability to run VMs from backup in an isolated sandbox environment. Customers with current maintenance can upgrade to the Standard Edition at no cost, while those wanting the Enterprise Edition features can upgrade for an additional fee.
This document provides an overview of a reference architecture for delivering desktops as a service using EMC and VMware technologies. The solution aims to deploy virtual desktop services in cloud environments, support virtual desktops in multi-tenant environments, and simplify management and decrease total cost of ownership. The reference architecture leverages EMC VNX and Symmetrix VMAX storage, VMware vCloud Director, vSphere 5.0, and View 5 to provide a virtual desktop infrastructure that can deliver services to enterprise, multi-department, hosted, and multi-tenant desktop users.
VMware Infrastructure is evolving into a virtual datacenter operating system (VDC-OS) that aggregates server, storage, and network hardware into shared resources and allocates these efficiently among applications. This provides built-in services like availability, security, and performance scalability to all applications. The VDC-OS allows more efficient consolidation than traditional operating systems and helps address challenges of complex, siloed, and inefficient infrastructures. Key features of the VDC-OS include virtual services for compute, storage, networking, and cloud resources that improve scalability, availability, security and manageability.
Practical Guide to Business Continuity & Disaster Recoveryatif_kamal
This document provides a guide to implementing a business continuity and disaster recovery (BCDR) solution using VMware Infrastructure. It discusses using virtualization to simplify BCDR for physical servers running virtual machines. The guide outlines replicating storage for virtual machines across sites to provide protection independent of underlying hardware. It then details specific hardware and software components to build a working multi-site BCDR solution. The goal is to help readers establish a scalable, fault-tolerant BCDR solution while demonstrating virtualization's viability for availability.
This document discusses optimizing an EMC Symmetrix storage array to support virtual desktops in a private cloud environment. It outlines testing that was done using the Vblock Series 700 model MX configuration with Symmetrix VMAX storage, VMware vSphere, and Cisco UCS servers. The testing showed the storage array could support up to 1536 virtual desktops while maintaining balanced utilization across the front end, back end, and disks. It provides best practices for configuring the various components to optimally support virtual desktops at scale.
This document discusses enhancing an automation framework called vdNet Framework for testing virtual networking in VMware ESX. It first provides background on virtual networking concepts and components in VMware, including virtual switches, virtual network adapters, and network isolation. It then describes the vdNet Framework, how it is used to automate testing of virtual networking features using a master controller machine and test virtual machines. It also discusses how the framework utilizes the STAF automation framework to remotely execute tests on the system under test.
SCCM 2012 focuses on providing a unified management solution through application lifecycle management, simplified administration, and support for a mobile workforce. Key capabilities include unified compliance settings management across platforms, simplified software distribution through application modeling, and targeted management of Windows, UNIX/Linux, and mobile devices. SCCM 2012 also aims to reduce IT complexity through features like role-based administration and tiered primary site structures for improved scale.
This reference architecture document describes deploying the VMware vCloud Enterprise Suite on the IBM PureFlex System hardware platform. Key points:
- The vCloud Suite software provides components for managing and delivering cloud services, while the IBM PureFlex System provides an integrated hardware platform in a single chassis.
- The reference architecture focuses on installing the vCloud Suite management components as virtual machines on an ESXi host to manage consumer resources.
- The IBM PureFlex System provides servers, networking, and storage in a single chassis that can then be easily scaled out. This standardized deployment accelerates provisioning of cloud infrastructure.
- Deployment considerations cover systems management using IBM Flex System Manager, server, networking, storage configurations
VMWARE Professionals - Foundation Hybrid Clouds and CostsPaulo Freitas
This document provides an overview and agenda for a Microsoft Virtual Academy training on Windows Server 2012 Hyper-V and System Center 2012 SP1. The training will cover topics like storage and resource management, security, multi-tenancy, high availability, and private cloud solutions. It then discusses features of Hyper-V like scalability, performance, security, and availability. The remainder compares licensing and management costs of a Hyper-V and System Center environment versus a VMware vSphere and vCloud Suite environment.
The document provides an overview of a Microsoft Virtual Academy training on Windows Server 2012 Hyper-V, System Center 2012 SP1, and comparisons to VMware vSphere 5.1. It includes an agenda with topics on storage, security, high availability, and application management. It also includes a table comparing the multi-hypervisor management, guest OS support, third party integration, and application frameworks capabilities between Microsoft and VMware products.
The document provides an introduction to VMware Infrastructure, which includes ESX Server, VirtualCenter Server, and various distributed services. It describes the typical physical topology of a VI datacenter, including computing servers running ESX Server, storage networks and arrays, IP networks, the VirtualCenter management server, and desktop clients. It also provides an overview of the virtual datacenter architecture and its key components like hosts, clusters, resource pools, and distributed services.
VMware Infrastructure is a full virtualization suite that provides comprehensive virtualization, management, and automation capabilities. It virtualizes physical hardware resources across servers and provides pools of virtual resources. It also includes distributed services that enable fine-grained resource allocation, high availability, and consolidated backup of the entire virtual datacenter. The main components are ESX Server, which provides the virtualization layer, and VirtualCenter Server, which is used to centrally manage virtualized environments.
Getting Started with ESXServer3iEmbedded aktivfinger
- The document provides instructions for setting up and configuring ESX Server 3i Embedded for the first time, including adding the host to the network, deploying the VI Client to connect to a single host, deploying virtual machines, and deploying VMware Infrastructure with VirtualCenter to manage multiple hosts.
- It describes the key components of VMware Infrastructure including the VI Client, VirtualCenter Server, datacenter, host, and virtual machines. It compares managing a single host versus managing multiple hosts with VirtualCenter.
- The steps explained include configuring the administrative password and management network on the ESX Server 3i host using the direct console before installing the VI Client software.
The purpose of this reference architecture is to build and demonstrate the functionality, performance, and scalability of virtual desktops enabled by EMC VNX series (NFS), VMware vSphere 5.0, VMware View 5.1, VMware View Persona Management, VMware View Storage Accelerator, and VMware View Composer 3.0.
Microsoft veröffentlichte vor kurzem das jüngste Update für System Center Configuration Manager - System Center 2012 R2 Configuration Manager. Viele der neuen Updates sind so gut, dass jeder das Upgrade so schnell wie möglich haben möchte. Wally Mead, Microsoft MVP, präsentierte in dieser Preäsentation die neuen Features von Configuration Manager 2012 R2.
This document discusses testing disaster recovery of a FujiFilm Synapse application suite using VMware vSphere Replication between two sites. It describes building a DR setup with SRM 5.0 on both the protected and recovery sites and testing replication and failover of the Synapse VMs. Functionality of the application suite was validated after failover to ensure successful DR. Multi-tenancy site security was also tested using vCenter roles and privileges.
This document provides best practices for deploying Microsoft Exchange 2010 in a VMware vSphere environment. It discusses ESX host configuration guidelines for CPU, memory, storage and networking. It also covers Exchange performance, capacity planning, sizing examples, and how vSphere features can enhance deployments and operations. The goal is to help organizations virtualize Exchange to improve flexibility, reliability and reduce costs.
This ESG Lab review documents hands-on testing of Symantec Backup Exec 2014, with a focus on ease of management and flexible recovery options for virtual machine backups.
Server virtualization has become a mainstream deployment due to its proven benefits: physical server consolidation, cost reduction, efficiency, and flexibility. However, it can throw a monkey wrench into data protection processes. Backup administrators must manage physical and virtual servers, consolidated workloads, and multiple hypervisors—while often lacking virtualization skills and training. 1 In addition, the ease of spinning up new VMs can leave administrators unaware of unprotected assets, resulting in data vulnerabilities.
ESG recently asked IT professionals at both midmarket and enterprise organizations about their challenges in protecting virtualized environments. In terms of all virtual server data protection challenges, the ability to validate both backup and recovery success topped the list, closely followed by recoverability of data (Figure 1).2 Other top challenges included response times for troubleshooting, gaps in protection, and simplified views across the virtual infrastructure.
VMware vSphere is a virtualization platform that includes the ESXi hypervisor and vCenter Server management software. The document outlines the agenda for a VMware vSphere presentation, which includes topics such as virtualization, ESXi, vCenter, virtual machine management, networking, storage, vMotion, high availability, and other advanced features. It also provides overviews of ESXi hardware requirements, new features in vSphere 5.0, and how to upgrade from a previous version to vSphere 5.0.
This 3-day course teaches system administrators how to securely design, deploy, and manage a VMware vSphere environment. Through lectures and hands-on labs, students learn to identify vulnerabilities, harden vSphere components, recommend security policies and processes, and configure secure virtual networking and management environments. The course covers securing ESX/ESXi host systems, virtual machines, vCenter Server, and implementing configuration and change management best practices.
This document describes a virtual desktop solution for knowledge workers using VMware View 4.5 on a Vblock Series 700 infrastructure platform. It details the solution architecture, validation testing of 768 and 1536 desktops, and results. Testing showed the solution can support the workload characteristics of knowledge workers with good application response times and scalable server and storage utilization. The Vblock 700 provided a pre-integrated, validated platform that streamlined deployment of the virtual desktop environment.
Microsoft App-V 5.1 and Flexera AdminStudio WebinarFlexera
Steven Thomas, Senior Consultant at Microsoft specializing in Desktop and Application Virtualization talks with Flexera about current recommended processes and developments with App V 5.1 as well as the future of application virtualization.
Veeam is introducing an Enterprise Edition of its Veeam Backup & Replication software in addition to the Standard Edition to accommodate new features. The Enterprise Edition includes additional capabilities like application-item recovery (U-AIR), automated recovery verification, and the ability to run VMs from backup in an isolated sandbox environment. Customers with current maintenance can upgrade to the Standard Edition at no cost, while those wanting the Enterprise Edition features can upgrade for an additional fee.
This document provides an overview of a reference architecture for delivering desktops as a service using EMC and VMware technologies. The solution aims to deploy virtual desktop services in cloud environments, support virtual desktops in multi-tenant environments, and simplify management and decrease total cost of ownership. The reference architecture leverages EMC VNX and Symmetrix VMAX storage, VMware vCloud Director, vSphere 5.0, and View 5 to provide a virtual desktop infrastructure that can deliver services to enterprise, multi-department, hosted, and multi-tenant desktop users.
VMware Infrastructure is evolving into a virtual datacenter operating system (VDC-OS) that aggregates server, storage, and network hardware into shared resources and allocates these efficiently among applications. This provides built-in services like availability, security, and performance scalability to all applications. The VDC-OS allows more efficient consolidation than traditional operating systems and helps address challenges of complex, siloed, and inefficient infrastructures. Key features of the VDC-OS include virtual services for compute, storage, networking, and cloud resources that improve scalability, availability, security and manageability.
Practical Guide to Business Continuity & Disaster Recoveryatif_kamal
This document provides a guide to implementing a business continuity and disaster recovery (BCDR) solution using VMware Infrastructure. It discusses using virtualization to simplify BCDR for physical servers running virtual machines. The guide outlines replicating storage for virtual machines across sites to provide protection independent of underlying hardware. It then details specific hardware and software components to build a working multi-site BCDR solution. The goal is to help readers establish a scalable, fault-tolerant BCDR solution while demonstrating virtualization's viability for availability.
This document discusses optimizing an EMC Symmetrix storage array to support virtual desktops in a private cloud environment. It outlines testing that was done using the Vblock Series 700 model MX configuration with Symmetrix VMAX storage, VMware vSphere, and Cisco UCS servers. The testing showed the storage array could support up to 1536 virtual desktops while maintaining balanced utilization across the front end, back end, and disks. It provides best practices for configuring the various components to optimally support virtual desktops at scale.
This document discusses enhancing an automation framework called vdNet Framework for testing virtual networking in VMware ESX. It first provides background on virtual networking concepts and components in VMware, including virtual switches, virtual network adapters, and network isolation. It then describes the vdNet Framework, how it is used to automate testing of virtual networking features using a master controller machine and test virtual machines. It also discusses how the framework utilizes the STAF automation framework to remotely execute tests on the system under test.
SCCM 2012 focuses on providing a unified management solution through application lifecycle management, simplified administration, and support for a mobile workforce. Key capabilities include unified compliance settings management across platforms, simplified software distribution through application modeling, and targeted management of Windows, UNIX/Linux, and mobile devices. SCCM 2012 also aims to reduce IT complexity through features like role-based administration and tiered primary site structures for improved scale.
This reference architecture document describes deploying the VMware vCloud Enterprise Suite on the IBM PureFlex System hardware platform. Key points:
- The vCloud Suite software provides components for managing and delivering cloud services, while the IBM PureFlex System provides an integrated hardware platform in a single chassis.
- The reference architecture focuses on installing the vCloud Suite management components as virtual machines on an ESXi host to manage consumer resources.
- The IBM PureFlex System provides servers, networking, and storage in a single chassis that can then be easily scaled out. This standardized deployment accelerates provisioning of cloud infrastructure.
- Deployment considerations cover systems management using IBM Flex System Manager, server, networking, storage configurations
VMWARE Professionals - Foundation Hybrid Clouds and CostsPaulo Freitas
This document provides an overview and agenda for a Microsoft Virtual Academy training on Windows Server 2012 Hyper-V and System Center 2012 SP1. The training will cover topics like storage and resource management, security, multi-tenancy, high availability, and private cloud solutions. It then discusses features of Hyper-V like scalability, performance, security, and availability. The remainder compares licensing and management costs of a Hyper-V and System Center environment versus a VMware vSphere and vCloud Suite environment.
The document provides an overview of a Microsoft Virtual Academy training on Windows Server 2012 Hyper-V, System Center 2012 SP1, and comparisons to VMware vSphere 5.1. It includes an agenda with topics on storage, security, high availability, and application management. It also includes a table comparing the multi-hypervisor management, guest OS support, third party integration, and application frameworks capabilities between Microsoft and VMware products.
VMWARE Professionals - Availability and ResiliencyPaulo Freitas
This document provides an overview and comparison of virtualization capabilities between Microsoft Hyper-V and VMware vSphere. It outlines key hypervisor, management, networking, storage, availability, migration and disk formatting features. The document compares terminology and functionality between the two platforms across these areas to help identify similarities and differences.
VMWARE Professionals - Storage and ResourcesPaulo Freitas
This document provides an overview and comparison of virtualization capabilities in Windows Server 2012 Hyper-V and VMware vSphere 5.1. It discusses features related to storage, networking, high availability, scalability and performance. Key areas covered include virtual hard disk formats, live migration, quality of service, dynamic memory and more. Charts are provided comparing specific features between Hyper-V and vSphere. The document aims to help organizations evaluate virtualization options for their datacenter needs.
Office Comunnications Server 2007 R2 PosterPaulo Freitas
This document provides an overview of the workload architecture for a unified communications solution. It includes a legend defining the various hardware components, diagrams showing traffic flows between internal and external systems, and details on DNS records, certificates, and firewall configurations required. The solution comprises multiple workloads including IM and presence, audio/video conferencing, enterprise voice, and application sharing, with load balanced front end servers and edge servers directing traffic between internal and external networks.
VMWARE Professionals - Intro to System Center 2012 SP1Paulo Freitas
This document provides an overview comparison of virtualization and cloud management capabilities between Microsoft and VMware platforms. It outlines the key components of vSphere and System Center 2012, including hypervisor, virtual machine management, automation, service management, self-service, and monitoring tools. Pricing is listed for VMware vCloud Suite and Microsoft System Center 2012 Datacenter Edition licenses.
Tudor Damian - Comparing Microsoft Cloud with VMware CloudITSpark Community
The session plans to review the key capabilities of the latest release of Hyper-V and see how they match with the latest release of VMware vSphere across four key areas: scalability and performance, security and multi-tenant environments.
This document outlines a training course on Microsoft Virtualization. The course is divided into two halves, with the first half covering introductory topics like Hyper-V infrastructure and networking, and the second half focusing on advanced topics such as Hyper-V management, high availability, and integration with System Center 2012. Management options for Hyper-V are also discussed, including using Hyper-V Manager, Windows PowerShell, and System Center Virtual Machine Manager for large environments.
This document provides an overview and introduction to the VMware vSphere: Install, Configure, Manage course. It describes the basic concepts of virtualization and VMware ESXi, outlines the vSphere components, and how vSphere fits into software-defined data centers and clouds. It also introduces the vSphere Client user interface and provides learning objectives for lessons on the software-defined data center, the vSphere Client, and an overview of ESXi.
System Center 2012 for VMware InfrastructureBryan Dady
Slides from a group presentation I was privileged to participate in during the last Microsoft Management Summit (MMS, April 2013).
The original is hosted by Microsoft at http://channel9.msdn.com/Events/MMS/2013/IM-B309, and I've copied this edition here for sharing on my LinkedIn profile.
The document discusses Veeam Availability Suite, which provides always-on availability for software defined data centers. It highlights key features like validated recovery, orchestration and automation for disaster recovery, and what's next for the product. Building blocks like policy-driven backup, migration, and sandbox capabilities are summarized. Integration with solutions like NetApp for orchestrated storage and VM failover is also covered.
Virtualization abstracts the underlying physical hardware and allows multiple virtual machines to run on the same server. This provides benefits like server consolidation, increased hardware utilization, and improved security. While virtualization works well for most applications, some resource-intensive or real-time applications may have performance limitations in a virtualized environment. Virtualization is now being applied at larger scales through cloud computing, where virtual machines and services can be provisioned on-demand from large-scale data centers.
This document discusses 15 common interview questions asked about VMware technology. It provides answers to each question, describing key VMware concepts like virtualization, hypervisors, virtual machines, networking and security. Example questions cover the benefits of virtualization, types of virtualization, virtual machine migration, VMware tools, templates vs clones, vCenter security and more. The document aims to help candidates prepare for VMware technical interviews.
VMware is introducing major upgrades to its cloud infrastructure stack in 2011, including vSphere 5.0, vCloud Director 1.5, and vShield 5.0. The new vShield 5.0 release addresses customer concerns around security and compliance in the cloud with new features such as sensitive data discovery, intrusion prevention, and efficient antivirus protection using virtual appliances. These new capabilities help customers secure sensitive data and infrastructure, segment networks into trust zones, and automate compliance audits, allowing them to trust running business critical applications in the cloud.
This document outlines the modules and objectives of a comprehensive training course on designing, implementing, and protecting a VMware datacenter. The 14 main modules cover topics like ESXi installation, vCenter configuration, networking, storage, security appliances, and backup solutions. Additional modules address virtual storage appliances, monitoring, management tools, and multi-site backup for failover. Upon completing the course, students will be able to design, deploy, secure, manage, and backup all aspects of a VMware virtual infrastructure.
VMworld 2013: Virtualization Rookie or Pro: Why vSphere is Your Best ChoiceVMworld
VMworld 2013
Eric Horschman, VMware
Jeff Margolese, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
A Principled Technologies deployment guide
Conclusion
Deploying VMware Cloud Foundation 5.1 on next gen Dell PowerEdge servers brings together critical virtualization capabilities and high-performing hardware infrastructure. Relying on our hands-on experience, this deployment guide offers a comprehensive roadmap that can guide your organization through the seamless integration of advanced VMware cloud solutions with the performance and reliability of Dell PowerEdge servers. In addition to the deployment efficiency, the Cloud Foundation 5.1 and PowerEdge solution delivered strong performance while running a MySQL database workload. By leveraging VMware Cloud Foundation 5.1 and PowerEdge servers, you could help your organization embrace cloud computing with confidence, potentially unlocking a new level of agility, scalability, and efficiency in your data center operations.
Blue Chip is a leading UK provider of business IT solutions such as virtualization, cloud services, and technical training. It has over 160 staff across multiple locations serving over 1000 clients of varying sizes. Key services include VMware virtualization, Microsoft infrastructure, and security solutions from Cisco and Fortinet. Blue Chip works with major technology partners and launched new virtualization and cloud capabilities from VMware in 2011 to help clients adapt to changing technology demands.
Back-ups: Hoe ze je kunnen redden van een cyberaanvalCombell NV
Het aantal cyberaanvallen stijgt jaar na jaar en ook de methoden die cybercriminelen gebruiken worden beter. Maar één ding is belangrijk om te blijven onthouden: 100% veiligheid bestaat niet. Er is altijd wel een stukje software met een lek of een onbeveiligd apparaat dat cybercriminelen de kans geeft in te breken in je omgeving. En ook menselijke fouten kunnen je waardevolle informatie doen kwijtspelen.
Nadenken over de manier waarop je omgaat met back-ups is dus cruciaal. De beste back-up strategie is echter sterk afhankelijk van je bedrijf en je data. Het vereist een planning waarbij je goed nadenkt over welke keuzes het best zijn voor jouw onderneming.
Kies je bijvoorbeeld voor een lokale opslag of toch eerder voor de cloud? Of allebei?
Een back-up op een andere locatie (off-site) is soms het enige wat uit de handen van hackers kan blijven. Zeker wanneer je bedrijfsvoering afhangt van automatische processen is dit een niet te verwaarlozen onderdeel van je back-up strategie.
Bekijk ons Veeam Cloud Connect aanbod:
https://www.combell.com/nl/backup/veeam-cloud-connect
Heb je interesse om de webinar van deze presentatie of één van onze andere trainingen te volgen? Bekijk onze kalender: https://www.combell.com/nl/resources/events
This document provides guidance on upgrading from System Center Virtual Machine Manager (VMM) 2008 R2 SP1 to VMM 2012. It covers planning the upgrade, prerequisites, upgrading the VMM server and other components, post-upgrade tasks, and troubleshooting. Key aspects of planning include assessing hardware and software requirements, supported configurations, and considerations for highly available upgrades.
VMware overview presentation by alamgir hossainALAMGIR HOSSAIN
VMware is a global leader in cloud infrastructure and digital workspace technology. It offers various virtualization products including vSphere for server virtualization, NSX for network virtualization, and Horizon for desktop and application virtualization. VMware's virtualization software allows multiple operating systems to run on a single physical host. VMware vShield provides security advantages over traditional hardware-based security appliances by offering a single virtual appliance with comprehensive protection capabilities that is cost-effective, simple to use, and adaptive to virtualized environments.
Why Security Teams should care about VMwareJJDiGeronimo
The document discusses VMware's security strategy and how virtualization provides security benefits. It outlines how virtualization allows automation of manual security processes, improves forensics capabilities, and makes patching and recovery faster. VMware focuses on integrating products into existing security policies while enabling broad security for all VMs. Features like vShield Zones and VMsafe appliances provide centralized security management and protection of virtual environments. Virtualization also extends these security advantages from the datacenter to endpoint devices through portable client-side virtual machines.
This document provides an overview of a two-day training course on server virtualization with Windows Server Hyper-V and System Center. Day 1 covers installing and configuring Hyper-V, creating and managing virtual machines and networks. Day 2 focuses on installing and using System Center Virtual Machine Manager to manage the virtualization infrastructure, including networking, storage, and virtual machines. The presenters are introduced, including their backgrounds working with Microsoft virtualization technologies.
Similar to VMWARE Professionals - App Management (20)
VMWARE Professionals - Security, Multitenancy and FlexibilityPaulo Freitas
This document provides information about virtualization capabilities and features of Hyper-V 2012 and VMware vSphere 5.1. It discusses network virtualization, live migration capabilities like simultaneous migrations and storage migrations. Hyper-V 2012 supports many advanced features out of the box, while some VMware features require additional licenses or components. The document also provides configuration examples and diagrams to illustrate network virtualization and live migration workflows between Hyper-V hosts.
This document discusses Microsoft Virtual Academy (MVA) which provides free online training for IT professionals on Microsoft products. It promotes an upcoming MVA event that will provide training on Windows Server 2012 Hyper-V, System Center 2012, and VMware's Private Cloud. The event will compare Hyper-V and VMware virtualization platforms and discuss storage, security, high availability, and private/hybrid clouds. It also provides details on performance and scalability improvements in Windows Server 2012 Hyper-V over previous versions and how it compares to VMware vSphere 5.1.
Hyper-V Integration with other System Center 2012 ComponentsPaulo Freitas
The document outlines Microsoft Virtual Academy training on System Center 2012 SP1. The training is divided into two halves, with the first half covering Hyper-V virtualization topics and the second half focused on integrating System Center 2012 components. Key System Center 2012 SP1 components discussed include Virtual Machine Manager, Operations Manager, Orchestrator, and App Controller. The components work together to provide an integrated cloud solution for managing virtual and physical infrastructure from public and private clouds.
Hyper-V Integration with System Center 2012 Virtual Machine ManagerPaulo Freitas
This document provides an overview of the Microsoft Virtual Academy training on Hyper-V and System Center 2012. It outlines an introductory first half on Hyper-V topics like infrastructure, networking, storage, and management. After a meal break, the second half covers advanced Hyper-V configuration, high availability, and integration with System Center 2012 Virtual Machine Manager and other components. It then shifts to describing the capabilities of System Center 2012 Virtual Machine Manager for provisioning and managing virtualized workloads across private clouds.
Hyper-V High Availability and Live MigrationPaulo Freitas
This document provides an overview of a Microsoft Virtual Academy training program on Hyper-V virtualization. The program is split into two halves, with the first half covering topics like Hyper-V infrastructure, networking, storage, and management. The second half focuses on high availability, disaster recovery, and integrating Hyper-V with System Center. It also discusses capabilities like live migration, replication, clustering and improving application availability and redundancy through virtualization.
This document provides an overview of Microsoft Virtual Academy training on Hyper-V and System Center 2012. It outlines an introductory course in the first half that covers Hyper-V infrastructure, networking, storage and management. After a meal break, the second half covers advanced Hyper-V topics like high availability, integration with System Center Virtual Machine Manager, and other System Center components. The document also shares technical details on Hyper-V storage options, performance improvements in Windows Server 2012, and benefits of using file storage for virtualization.
This document provides an overview of Microsoft's Virtual Academy training on Hyper-V and virtualization. It outlines an introductory first half focusing on Hyper-V infrastructure, networking, storage and management. After a meal break, the second half covers Hyper-V networking technologies like VMQ, SR-IOV and the extensible switch, as well as integration with System Center and other Microsoft virtualization products. Frequently asked networking questions are also addressed at a high level.
This document provides an overview of a training course on Microsoft's Hyper-V virtualization platform. The course is divided into two halves with breaks in between sections. The first half covers introductory topics like Hyper-V infrastructure, networking, storage and management. The second half focuses on more advanced topics such as high availability, integration with System Center, and other Microsoft virtualization technologies. The document also includes several pages on Hyper-V concepts like NUMA support, dynamic memory, and differences between the Hyper-V Server and Windows Server editions.
Windows Server 2012 R2 Jump Start - WEBPaulo Freitas
This document provides an overview of topics that will be covered over two days of training on Windows Server 2012 R2 and System Center 2012 R2. Day 1 will cover server virtualization, cloud networking, storage, and server management automation. Day 2 will focus on virtual desktop infrastructure (VDI), access and information protection, and web application platforms. Links are provided to download the Windows Server 2012 R2 and System Center 2012 R2 previews and access hands-on labs.
Windows Server 2012 R2 Jump Start - AIPPaulo Freitas
The document outlines a two day training on Windows Server 2012 R2 and System Center 2012 R2. Day 1 covers new features of Windows Server 2012 R2 including server virtualization, cloud optimized networking, and storage. Day 2 focuses on server management, VDI, access and information protection, and web applications. The document also provides information on downloading the Windows Server 2012 R2 and System Center 2012 R2 previews and an upcoming System Center 2012 R2 Jumpstart event.
Windows Server 2012 R2 Jump Start - IntroPaulo Freitas
The document outlines a two day training agenda on Windows Server 2012 R2. Day 1 covers server virtualization, cloud networking, storage, and Day 2 covers server management, VDI, access protection, and web applications. It also includes links to download Windows Server 2012 R2 and System Center 2012 R2 previews and hands-on labs.
Windows Server 2012 R2 Jump Start - IntroPaulo Freitas
The document outlines an agenda for introducing new features of Windows Server 2012 R2 over two days. Day 1 will cover server virtualization, cloud optimized networking, and storage enhancements. Day 2 focuses on server management and automation improvements, virtual desktop infrastructure (VDI), access and information protection, and enhancements to the web application and platform. The document also discusses challenges IT organizations face around efficient datacenter operations and opportunities around offering differentiated cloud services and enabling mobile access. It summarizes new capabilities in various Windows Server 2012 R2 areas like virtualization, networking, storage, management, development, access and information protection, and VDI.
Multi site Clustering with Windows Server 2008 EnterprisePaulo Freitas
This document discusses multi-site clustering with Microsoft Failover Clustering. It describes how multi-site clustering protects against datacenter loss through replication of data between sites. Key aspects covered include benefits of multi-site clustering, deployment considerations, replication solutions, network configurations, faster failover techniques using DNS and VLANs, quorum models, and best practices.
The document shows different types of database objects and their relationships in SQL Server. It includes system views, stored procedures, functions, tables, indexes and other objects. Arrows indicate relationships between objects like inheritance, dependencies and foreign keys.
Share Point 2010 Developer Platform PosterPaulo Freitas
The document discusses the SharePoint 2010 developer platform, which allows software developers to build business collaboration applications for enterprises and the web using tools like Visual Studio 2010, SharePoint Designer 2010, and Team Foundation Server 2010. The platform provides features for building applications like Silverlight web parts, LINQ to SharePoint, Business Connectivity Services, and Sandboxed Solutions. Sandboxed Solutions can be deployed to a shared hosting environment or SharePoint Online.
The document summarizes the key components of Microsoft's Remote Desktop Services architecture:
- Remote Desktop Connection Broker authenticates users and provides a single access point for RemoteApps, desktops, and virtual desktops.
- Remote Desktop Web Access provides a customizable web portal for accessing resources from RD Connection Broker.
- Remote Desktop Session Host and Remote Desktop Virtualization Host host session-based desktops and virtual desktops respectively.
- Remote Desktop Gateway allows secure external access over the internet to resources behind the corporate firewall.
- Remote Desktop Licensing manages the required client access licenses for connections to Remote Desktop Services.
This document provides information about live migration capabilities in Windows Server 2012 Hyper-V, including live migration without shared storage, live migration with SMB shared storage, storage migration, and live migration with failover clusters. It defines the requirements for each type of live migration and describes the key steps and benefits of live migration without shared storage, which allows virtual machines and their storage to be migrated between Hyper-V hosts without the need for shared storage.
The document summarizes new storage technologies in Windows Server 2012 for Hyper-V including support for virtual Fibre Channel, NPIV, live migration with Fibre Channel connectivity, MPIO, the new VHDX virtual hard disk format, and use of SMB file shares for virtual machine storage. It also discusses features like virtual Fibre Channel adapters, the benefits of MPIO, and support for virtual hard disks on 4KB native disks.
This document provides an overview of new features related to virtual machine replication in Windows Server 2012, including Hyper-V Replica configuration, initial replication methods, recovery history, and failover operations. It discusses enabling replication on the replica server, the different methods for initial virtual machine replication, and ongoing replication of virtual machine changes between the primary and replica servers.
The document provides information on new networking features in Windows Server 2012 for Hyper-V including load balancing and failover capabilities using NIC Teaming, support for Single Root I/O Virtualization (SR-IOV) to directly assign network adapters to virtual machines, and Quality of Service bandwidth management. It defines these features and explains how NIC Teaming can provide redundancy, how SR-IOV can reduce latency and increase throughput, and how bandwidth management enables predictable performance for virtual machines.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
5. Standardized
VM Templates
Roles & Features
Application Layers
VM Templates 2.0:
Service Templates
Construction, Delivery & Consumption
6.
7.
8.
9.
10.
11.
12.
13.
14.
15. Standardized
VM Templates
Roles & Features
Application Layers
VM Templates 2.0:
Service Templates
Deployment
into clouds
Construction, Delivery & Consumption
16.
17.
18.
19.
20.
21. Standardized
VM Templates
Roles & Features
Application Layers
VM Templates 2.0:
Service Templates
Deployment
into clouds
Role-based
Self Service
Controlled
Consumption
Construction, Delivery & Consumption
22.
23.
24.
25.
26.
27.
28.
29.
30. Application Construction, Delivery & Consumption
Capability Microsoft VMware
Request Private Cloud Resources Yes Yes1
Role-Based Self-Service Yes Yes
Standardized Templates Yes Yes2
Template Granularity: Roles / Features Yes No
Template Granularity: Application Layer Yes Yes3
Service/Multi-Tier Templates Yes Yes3
Deployment Across Heterogeneous Clouds Yes Yes4
1. vCloud Automation Center allows for the requesting of private cloud resources but lacks a true CMDB capability in box.
2. Each VMware VM template will have it’s own VMDK, even if the template varies only slightly in it’s configuration options.
3. No alternatives to Server Application Virtualization (App-V) thus relies on regular installation methods or inflexible scripts.
4. vCloud Automation Center allows deployment onto non-VMware infrastructure at a cost of $400 per managed machine + S&S
however once deployed, it could not be managed from vCloud Director along with other VMware-based VMs.
VMware Information: http://www.vmware.com/products/datacenter-virtualization/vcloud-automation-center/features.html,
http://www.vmware.com/files/pdf/management/vmw-vcloud-automation-center-faq.pdf
69. Application Maintenance, Management & Monitoring
Capability Microsoft VMware
Centralized Patching & Maintenance Yes Yes
Non-Virtualized Infrastructure Management Yes Yes1
Integrated Service Management Yes Lacks CMDB2
Heterogeneous Automation Yes VMware Centric3
Deep Application Insight Yes Yes4
Integrated Dev-Ops Yes No5
1. Would require purchases outside of the vCloud Suite including vCloud Automation Center, vFabric Hyperic, vCenter Operations Management Suite Enterprise Edition
2. vCloud Automation Center enables application owners or administrators to request infrastructure but vCAC lacks any form of true CMDB for complete ITIL/MOF IT
Service Management
3. VMware's vCenter Orchestrator has a limited set of plug-ins, of which the vast majority are VMware centric. No mention of plug-ins for other enterprise management
systems and tools such as those from HP, IBM, BMC etc.
4. Remediation limited to VMware best practices thus lacking in application-specific remediation guidance
5. Lab Manager deprecated, with customers expected to upgrade to vCloud Director, which has no connections with Development IDE.
VMware Information: http://www.vmware.com/products/datacenter-virtualization/vcloud-suite/compare.html, http://www.vmware.com/products/datacenter-virtualization/vcloud-
automation-center/overview.html, http://www.vmware.com/products/datacenter-virtualization/vcloud-automation-center/buy.html,
http://www.vmware.com/products/application-platform/vfabric-hyperic/buy.html, https://solutionexchange.vmware.com/store/categories/21/view_all,
http://www.vmware.com/products/labmanager/overview.html
70.
71.
72.
73.
74.
75.
76.
77. Protection of Key Applications & Workloads
Capability Microsoft VMware
Granular Workload Protection Yes No1
Physical & Virtual Protection Yes No1
3rd Party Integration Yes No2
Centralized Role-Based Management Yes Yes3
Tape Backup Yes No4
Integrated Disaster Recovery Yes Yes
1. VMware Data Protection offers no protection for the workloads within the virtual machine, simply focusing on the VM itself as the protection
unit and offers no protection of physical machines
2. VMware Data Protection is not extensible by 3rd parties
3. VMware Data Protection is capped at 10 appliances per vCenter with a maximum storage of 2TB/100 VMs per appliance.
4. VMware Data Protection offers no protection to tape media. Disk only
VMware Information: http://www.vmware.com/files/pdf/techpaper/Introduction-to-Data-Protection.pdf, http://pubs.vmware.com/vsphere-
51/topic/com.vmware.ICbase/PDF/vmware-data-protection-administration-guide-51.pdf
Goal of the slideRepresent how System Center 2012 simplifies application provisioning for private clouds by enabling a standardized approach.Talking points <Click> Through service templates, System Center 2012 – Virtual Machine Manager offers you the ability to define standardized application blueprints, which can be used to automatically deploy application services to shared resource pools, thus simplifying application provisioning. Defining your application requirements with a repeatable construct like service templates makes provisioning faster and less error-prone than when you manually have to deploy the application.Service templates provide the blueprint for the application service, including specifications for the hardware, operating system, and application packages. System Center 2012 supports multiple package types for .NET applications, including MS Deploy for the web tier (IIS), SAV for the application tier, and SQL DAC for the data tier.Operationalizing service templates across your service-consumer and service-provider organizations will likely require active collaboration between the App Devs, App Ops, and DC Admin roles to discuss and standardize the initial set of hardware, OS, and app profiles that new applications could adhere to. It might be beneficial to take an incremental approach to testing this capability before rolling out across a broader set of applications. This process will likely require broad sponsorship across the LOB application IT and infrastructure IT organizations.<Click>Once organizationally approved application blueprints are established and stored in the Virtual Machine Manager service template library, your application owners are ready to deploy applications on their own. They can go to the application owner self-service experience in System Center 2012 - App Controller, where they can access and select service templates that they’ve been authorized for. They can easily specify configuration requirements like application topology, scale-out rules, health thresholds, and upgrade rules into the service template and then kick-start a “one-click deployment.” Before the application owner hits deploy, App Controller provides a compelling visualization of the of the holistic application service, including all the requested service tiers, the underlying virtual instance templates, and storage, compute, and network resources. This enables application owners to “think services, not servers” by offering a “service-centric” approach to provisioning.Virtual Machine Manager uses the service template specifications to build out the application tiers, including the various logical instances associated with each tier. In the real world, you are likely to encounter scaled-out (or multi-instance) web front ends and application tiers, but scaled-up (or single instance–based) database tiers. Virtual Machine Manager uses the service template specifications to help ensure that the application is deployed to the appropriate virtualized resource pools.
Become source of truth and starting point for servicesSpecify machine and connectivity requirementsLink to deployed servicesEnable servicing of deployed instancesDeploy a set of virtual machinesCompose virtual machines through machine definitionsSupport for native application types: Web applications, Server App-V packages, and SQL applications (SQL DAC)Breakdown of how the Service template comes together to deliver the application.Infra and Fabric will cover the HW profile and OS profile content.TemplateStarting point for services and source of truthSpecifies machine and connectivity requirementsDeployed services are always linked to their templatesEnables servicing of the instancesInstanceGroups of machines that work togetherIncludes machine definitions as well as applicationsNative application types:Web Applications (WebDeploy)Virtual Applications (Server App-V Package)Database Applications (SQL DAC)
Deploying SQL within a Service Template is a key workload that we make very simple.Starting with the Deployment of SQL Server within a template, we are looking here for consistent SQL configurations, with the ability to define the Named Instance, product key to use.We can set the Configuration details for the SQL installation, from the media source locations, to the security mode and network connectivity configurations. You can even include a SQL configuration file.For the applications, we can configuration the Connections. This includes the dacpac connections, the Instance definition, Authentication mode and what behaviors will be followed when upgrades or migration are required.And finally we can capture the Service Account information, which accounts are used for each of the SQL Server services.
Now in Virtual Machine Manager 2012 is a feature called Server App-V.Server App-V provides the capability to capture server based applications into isolated ‘bubbles’ and allow us to deploy applications in the same way, every time.Capturing the application using App-V is called Sequencing. This is where you start with a blank server OS with just the Server App-V agent, and you run through an installation of the application. Server App-V captures all the files, registry settings, services and other associated application resources that are installed, and packages them into a file.Once the application is packaged, it can be included as part of a Service Template and deployed as part of a service, and dynamically configured at deployment time with instance specific information.We provide the ability to update the application through service templates, you simply edit the service template and save as a new version number, include the updated application resources and this can then be used to update the running services.And then we make the applications highly available by providing the ability to update the underlying OS whilst retaining the Server App-V state.
Lets have a deeper look at the virtualization of applications with Server App-V, and the attributes of applications that are suitable to be captured into Server App-V ‘bubbles’.Server App-V supports Windows Server Hosts, including the dynamic registration of services with the Service Control Manager, web applications running on IIS and the various types of user accounts – LocalSystem, Network Service and Domain accounts.We can capture and package most application resources as they are installed, including the application files, COM+ and DCOM functions, WMI providers and local users and groups.And we can capture all the application components including things like registry settings, and .Net components, and we can also capture some Java apps. Stateful information is stored on the local disk, and is retained when you upgrade an application or replace the underlying OS.Additional notes on SAV:OS support: Server App-V supports server OS platforms only. Both x86 (where applicable) and x64 versions of Windows Server 2003, Windows Server 2008,Windows Server 2008 R2 and Windows Server 2102 are supported. All editions are supported with one exception – The Server Core edition is supported for Windows Server 2008 R2 and Windows Server 2012 only. Server App-V features for application virtualization supportIIS Server App-V supports applications that install web sites, virtual directories and application pools. With Server App-V, you can easily virtualize applications that create these components on IIS 6.0, IIS 7.0,IIS 7.5, and IIS 8.0. Windows Services Many server applications install Windows services. With Server App-V, you can sequence an application which creates Windows services. When a virtual package is deployed to a server, you will see the same services in the Windows Service Control manager as you would see with a native installation of the application. COM/DCOM/COM+ Server App-V Sequencer captures COM/DCOM/COM+ components created by the application installer. These components are registered during deployment time so that they can be consumed by other applications or processes. You can also see these components with tools such as dcomcnfg. WMI Many datacenter applications create WMI components such as WMI providers or classes during the application installation. With a Server App-V virtualized package, you won’t miss any of these components when the package is deployed! Local users and Groups Unlike desktop applications, it is common for datacenter applications to create local users or groups as part of the installation process. Many files also contain references to user or group security IDs to restrict access to certain users and groups. Server App-V is capable of capturing local users and groups created during sequencing of the application and recreating them at deployment time. Any references to the SIDs are also maintained automatically. SSRS In Server App-V, we built a special component to handle the virtualization of applications that install SQL Services Reporting Services as part of the installation process. Therefore, if your application uses SSRS, you can use Server App-V to virtualize it! Server App-V does not support applications that install the following components: Drivers If your application installs drivers, Server App-V won’t install the drivers on deployment machines. Some applications have drivers that are installable separately. If this is the case for your application, you can install the driver first and then sequence the application with Server App-V sequencer. Before you deploy the package, you should also install the driver to the deployment servers. SharePoint Server App-V does not support virtualization of SharePoint or virtualization of an application that installs SharePoint as part of the installation process. If your application uses SharePoint, check if it can connect to an external SharePoint server. If so, you can virtualize the application without installing SharePoint during sequencing process. SQL Server Server App-V does not support SQL Server virtualization. If your application requires SQL server, you will need to point the installer to a previously deployed SQL server instance on another machine during sequencing time and update the deployment configuration information to point to an appropriate (again, previously deployed) instance at deployment time. It is always difficult to draw a line between what applications can be virtualized and what applications can’t be virtualized. The Server App-V Sequencer is designed to report any issues that are encountered during sequencing process. Therefore, after your sequencing finishes, it’s always a good idea to check the Server App-V Sequencer report and verify that your package is functional with the Server App-V cmdlets
Use the Ribbon for contextual actions within the Service DesignerUse the Designer Canvas to build your service template from Virtual Machine templates, Logical Networks, and Load BalancersSet service related properties such as Cost Center, Description, Release NumberTemplate is a starting pointAuthor the template in the new Service DesignerDefines machines and their connectivityTiers, Hardware, Logical Networks, OS, Apps, Load Balancer templates etc.Deployed services are always linked to their templatesTypically information like hosts or load balancers is not available while creating templateWhat customization you can do within a VM TemplateWindows Server 2008 R2 Roles and FeaturesArbitrary script execution and payload deliveryMultiple entry points (e.g. prior to any application install operation, after a specific application install operation)“First-Class” application deploymentWeb DeployServer App-VSQL Data-Tier ApplicationsConfigurable service settingsDefer setting a value until deployment timeUse @Variable Name@ nomenclature (e.g. @SQL User@)
Preview Pane shows view of service deploymentSettings all you to set deployment specific variablesRibbon for deploy activity or to check deployment ratingsPrepares the template for deploymentSpecify OS settings Computer name, Admin password etc.Specify Configurable Service Setting Values e.g. SQL connection string, script parametersAllows usage of same template in different environments Development, Staging, Production etc.
Perform operations at the service level, tier level, or on an individual VMView specific service, tier, or application settings
Deployed service viewed as Distributed Application in Operations Manager and Business Service in Service Manager.Monitored at the tier level.Viewed at the virtual machine level.
Full Animation and items grouped
With the private cloud, you want to ensure that the correct people have access to the resources that that you control. To accomplish this, we have created access control capabilities to give you fine-grainedThe Administrator and Delegated Administrator has full control to the underlying Infrastructure and all of the fabric. While the Administrator has access to the entire VMM environment, the Delegated Administrator has the control over the delegated host groups assigned.The Self-Service User will have access to just clouds, and there you can set revocable actions in a quota controlled environment. This gives you the ability to specify what actions these users can do and how much of the cloud resources they can consume.
Talk track – Granular and revocableThis isn’t the whole list just some…Integrate into slideAn application owner authors the service template and then shares that template with his team to deploy the application.Shareable ObjectsProfiles (Hardware, Guest OS, Application, SQL)Templates (VM, Service)Virtual machine Service
Controlled empowerment is about the service provider publishing requests that the consumers can access but then the user being able to initiate when they want service on their terms. It helps express IT requests in business language. Quite often things are lost in translation between what IT is asking for and what the user is wanting. And this allows us to start bringing this together and deliver a consistent experience that users can request but then IT, or the IT service provider gets the information they need in order to fulfill that request. And they get it in a consistent manner, each time, every time. The key thing is this allows the consumer to choose what level of service + cost that they want. So you might deliver and offer, say, a silver, gold and bronze level of service, specifying what the time-frames are, what the cost structure is for each option for them to select. It gives the user the empowerment to choose what they want based on what level of service they are after and the cost that is associated with it. And you give them the power to choose as opposed to users, quite often, asking for everything, but expecting to pay nothing. And we can standardize what they experience.
So, service offering is a type of work item within the CMDB that identifies and classifies a standard IT service. A service offering will contain one or more request offering. And it provides a consistent delivery of service-related information. Within a service offering, you will have information about knowledge articles associated with that service, service level agreement information about what you can expect from a response and fulfillment time-frame, and also cost and charge back related information.
Role-based is really about giving the users the ability to see what they are allowed to see based on their role. And this is dynamic within the service catalog. It is based off of Service Manager groups which are mapped back to Active Directory and it is dynamic. So what ever your group allocation is inside Service Manager again mapped back to Active Directory permissions, you will see the associated request offerings within the service catalog based on that.
The last one is one of the things I’m really excited about – the Simplified Portal. With system Center 2012, specifically Service Manager 2012 with the new suite, we actually reintroduced and rebuilt a brand new portal that is Silverlight web parts hosted in SharePoint foundation 2010 or higher. And it allows us to customize it. So you can tailor this portal using standard out-of-the-box SharePoint administration tools. And you can extend it using custom web parts. But it used SharePoint and Silverlight to host this. The main thing is this is customizable look and feel, but all of the forms in here are dynamically generated based on the request and service offerings that we configure that I talked about previously. So when we configure a new request offering in service offering, Service Manager goes through, picks those up, and manages them for us in a very easy to navigate format.
Now with Service Manager 2012 and the new System Center 2012 suite, we are actually bringing some out-of-the-box service and request offerings to our end users. And this contains request capabilities for requesting private cloud capacity and then virtual machines within private clouds.So we’ve going to provide best practice knowledge and automation for the service catalog that gets embedded into the service catalog that Consumers can take advantage of very quickly to maximize their time to value. And we call this the System Center Cloud Services Process Pack. Internally, this is what was known as project Andy. If you are familiar with that, it is now called the System Center Cloud Services Process Pack.This replaces SSP 2.0
Enabling Application Self Service requires an organization to think about how they wish to do this. What is delegated, to whom, what are the policies and procedures that surround this and so on.Lets take a look at 3 key capabilities that System Center 2012 delivers.Delegation with Control – Delegating out to Application Owners can be a daunting task for IT, and represents the intersection of 2 worlds – the Datacenter Admin and the Application Owner. So we introduce the concept of “Delegation WITH Control”. IT can delegate out access to resources such as service templates, but enforce control through quotas and any change procedures and release management requirements.Empowering Application Owners – based on the users identity and the resources delegated, they can perform their tasks and duties of associated with being an application owner. They can also manage the resources related to the application.Single Management Point – System Center 2012 provides, through App Controller the ability to manage both private cloud services and Windows Azure applications within a single web console. They can also see job status and task progress, as well as auditing is provided by capturing all actions.
For managing the service, we leverage the template model where we can update elements in the template and apply them to the deployed services. The template is the “Source of Truth” for the service and as we make modifications and publish those changes, we can see which services need to be updated. We use the concept of “Upgrade Domains” to provide the ability to update the tiers while helping to keep the service available.We have two types of updates, In Place Updates and Image Based Updates.In Place Updates – Update the application or virtual machine specifications which can be applied to the existing version off the OS. Update the Service without replacing the OS imageImage Based Updates – Update to the OS can be applied by replacing the OS underneath the application. With this, the process would be to lift up the application, saving the state, replace the OS, drop the application back onto the updated system and then restore the state.
[Click] – The template for the VM is the “Source of Truth” for the VM.[Click] – We can now deploy some services off of that template.[Click] – We want to make updates to the application and apply them to the template. In this example we are making updates to the application running in the middle tier.[Click] – After updating the template we can now “Set” the template which allows us to correlate the services that used the older template. Once the template is set, the Service moves into a “Pending Service Update” mode.[Click] – At this point you can apply the changes and the service is now running with the updated application.
[Click] – The template for the VM is the “Source of Truth” for the VM.[Click] – We can now deploy some services off of that template.[Click] – We want to make updates to the application and apply them to the template. In this example we are making updates to the application running in the middle tier.[Click] – After updating the template we can now “Set” the template which allows us to correlate the services that used the older template. Once the template is set, the Service moves into a “Pending Service Update” mode.[Click] – At this point you can apply the changes and the service is now running with the updated application.
Baselines Can be assigned toHosts, Host Groups and Host ClustersVMM Server Roles – Library Server, PXE Server, Update Server, VMM ServerBaselines Can NOT be assigned toVMs (running or stored), VHDs in library RemediationAutomated workflowPut a node in maintenance modeVMM maintenance mode can trigger SCOM maintenance modeEvacuates the node using Live MigrationUser can override this to save state the VMs on the nodeInstall missing updates based on baselines assigned Take the node out of maintenance modeGo to next node and repeatSupport for Windows Server 2008 as well as Windows Server 2008 R2 clustersScriptable using PowerShell
Transition:Another way that System Center 2012 enables you to meeting your fabric SLA is by ensuring your virtual resources are up to date.Traditional update engines like System Center Configuration Manager aren’t cluster-aware. They’re likely to push out patches to all hosts simultaneously, disrupting cluster availability.VMM 2012 can integrate with a dedicated 64-bit Windows Server Update Services (WSUS) 3.0 SP2 server and will orchestrate cluster patching by migrating VMs to other hosts in the cluster, patching the node and rebooting if required. It will repeat the process on the next host until the whole cluster is up-to-date.You can define update baselines with lists of required updates. VMM will then scan hosts to determine compliance, and finally apply patches to bring them current. You will have the option to exempt particular hosts if a patch turns out to cause instability.Talking Points:The feature requires a pre-existing, dedicated, root WSUS 3.0 SP2 64 bit server. If the WSUS server is remote, the WSUS console is required on the VMM server. It supports WSUS in SSL mode.A scan is then conducted to see if the server is compliant or not for the assigned baseline. VMM leverages WUA for applicability and compliance. Scan is on demand and automatable using PowerShell. VMM then makes the server compliant by installing missing updates. Update installation progress can be tracked in the VMM console and remediation is on demand and automatable using PowerShell.Virtual Machine Manager provides a feature by which you can manage updates for your virtual machine hosts, library servers, PXE servers, the Windows Server Update Management (WSUS) server, and the VMM server itself in the VMM console. Enable featureIn VMM, use Add WSUS server wizard to select and add WSUS server and then synchronize with the latest updates. VMM gets a catalog of updates from the update server. It points the fabric servers to the correct update server, i.e. configures the WUA agent on each fabric server.Create BaselineAfter you enable update management in VMM, you are ready to prepare for patching by configuring update baselines. An update baseline contains a set of required updates. The baseline is a logical grouping of updates to assess compliance. VMM provides two sample baselines for Security and Critical updates. You can assign the baseline to hosts, host groups and host clusters, plus VMM server roles (library server, PXE server, Update server and VMM server). You cannot assign it to VMs (running or stored) or VHDs in the library.Scan ServersDuring a compliance scan, computers that are assigned to a baseline are graded for compliance to their assigned baselines. After a computer is found noncompliant, an administrator brings the computer into compliance through update remediation.<click> Remediate serversIf computers are found to be non-compliant, remediation can be performed. When you perform update remediation on a host cluster, VMM orchestrates the updates, in turn placing each cluster node in maintenance mode, migrating virtual machines off the host by using intelligent placement, and then installing the updates. If the cluster supports live migration of Windows Server-based virtual machines, live migration is used. If the cluster does not support live migration, VMM saves state for the virtual machines and does not migrate them.Outline for talking pointsManaging BaselinesCreate baselineLogical grouping updates to assess complianceTwo sample baselines for Security and Critical updatesAssign baselineChoosing the servers to assess complianceCan assign toHosts, Host Groups and Host ClustersVMM Server Roles – Library Server, PXE Server, Update Server, VMM ServerCan NOT assign toVMs (running or stored), VHDs in library ScanCheck if the server is compliant or not for assigned baselineVMM leverages WUA for applicability and complianceScan is on demand and automatable using PowerShellRemediateMake the server compliant by installing missing updatesUpdate installation progress can be tracked in VMM consoleRemediate is on demand and automatable using PowerShellNotes:- Requires WSUS 3.0 SP2 64 Bit server- Requires WSUS console on VMM server if WSUS server is remote - Supports WSUS in SSL mode- Share a WSUS root server between SCCM and SCVMM -NEW- Utilize an autonomous SCCM WSUS DSS server at the integration point -NEW- Enable centralized reporting via SCCM reporting -NEW
System Center 2012 provides the complete application monitoring solution!Operations Manager has done infrastructure monitoring for many years and we have an incredibly strong base on which to build. And this is very important, after all, you can’t know if an application is performing correctly without understanding if the underlying platform is also performing as expected.Application monitoring builds on infrastructure monitoring in 3 ways:Server-side – this is the monitoring at the back-end of what is being executed by the application and delivered to the end user.Client-side – understanding and capturing the end user experience with the application, including how long things take to load and execute, network latency and any client-side scripting exceptionsSynthetic transactions – these are pre-recorded testing paths through the application. You record the steps you want to complete, and then these are run on a regular schedule to ensure that the application is functional and available.
What is Discovered:ConnectivityServer to Switch, Switch to SwitchVLAN membershipHSRP groupsStitching of switch ports to server NICsKey components of a devicePorts/InterfacesProcessorMemoryWhat is Monitored:Port/Interface Up/Down (operational & admin status)Volumes of inbound/outbound traffic% UtilizationDiscards, Drops, ErrorsProcessor% UtilizationMemoryIn depth memory counters (Cisco Only)Free memoryConnection HealthBased on looking at both ends of a connectionVLAN Health Based on health state of switches in VLANHSRP GroupBased on health state of individual HSRP end pointsWhat is VisualizedNetwork Summary Network Node Network Interface VicinityWhat is ReportedMemory UtilizationProcessor UtilizationPort Traffic VolumePort Error AnalysisPort Packet Analysis
So the first thing we want to take a look at is opening up this conversation at the start of the “Configure and Deploy” and the “IT as a Service” slide at the front we look at the application owner and the datacenter admin and how those two have different sets of personas with quite different views on the world in terms of what should and shouldn’t be and how things are run and come together. So here we have and end-user or application owner who’s saying, “Well my application is running slowly!” The network though might look fine. We’re green across the board, everything is ok, there’s no problem whatsoever from the network guys. We have the developers saying “The code passed all testing,” there’s no bugs, there’s no crashing, everything is fine. And then we have the infrastructure monitoring guys saying, “The servers are all running fine,” there’s no problem here whatsoever. However, the end-user is still having a poor performance. This is actually a fairly common scenario. And the way this comes together is that the server-side availability monitoring shows the application is functioning just fine. This is where we get into the difference between availability and monitoring vs. performance monitoring.From an availability point of view, its highly available, we have green across the board, but that doesn’t really show the true state, which is from the client side it is running slowly and there are some issues happening from the client side. Its highly available, but performing slowly. What we get with application performance monitoring is to understand exactly where the issue is, what piece of code is causing the problem and then the ability to share that information out. So let’s take a look at what this looks like.
Getting deep inside into the application performance is the key bit. When we look at the server side monitoring and we touch on this in the “Configure and Deploy” presentation, what we’re really doing here is we’re collecting data from the .NET calls, we’re reading the application methods, all the variable and parameters, the types of calls being made, the web methods, the internal execution the SQL commands and so forth, all of the information comes together.With the client-side, it shows the page load times, where the time was spent - was it spent loading images, CSS, etc. , was it a JavaScript exceptions, all that data is collected using a JavaScript injection on the page side. And what we get out of all of that is at the code-execution level information, where we can drill in and see exactly where was the time spent. What that means is that we can get rich visualization and a breakdown of how long did that transaction take, where was the threshold and what was the problem actually causing them.
From a response point of view, we can see in this screenshot, we have a threshold of 500 ms, however we’ve gone well over that and into the 1300 ms range. So if we drill into this more what we can see is that we expected the end user experience to be at 500 ms, however the end user experience was actually having an experience much longer than that, and then we can see what the impact of that end user experience actually is. Now when we start to think about System Center 2012 all up, we start to bring in the other components that come together around all of this information. So if you’ve configured Service Manager in the environment, the Operations Manager to Service Manager connector means that whenever this alert is raised in Operations Manager, then it will also go along the Service manager and raise an incident, that can then go through all of the different escalation paths - the developers, network and infrastructure guys - we can capture all of that knowledge and perhaps we have some automated remediation going on and when you resolve this issue on the Server Manager side, it will also close the alert on the Operation Manager side. And this is a key component of System Center 2012, in a way that all of the different components come together and light up these very rich scenarios where you got service manager, orchestrator and operations manager all coming together to do some very impactful application performance management.
You need to be able to report on what’s going on and Operations Manager Application Advisor provides rich reporting and trending information about the applications performance. You can easily gain quick visibility into the Top issues. You can see the screenshot – we’ve got 5 Top issues there and 76% of all of these resources is spent on the search service. So clearly there is a problem inside that. And really if want to boil this down into a nutshell conversation, this is where the application owner needs to spend their time. 76% of all performance issues are about that particular component, so this is probably where you want to see the developers do some work. Now part of understanding that, is when that runs, what are the things that are associated with that. And so we can understand the relationship between all of the different application components, that this menu search service is loading default.aspx for example, but you can also see how all of these different things around that get impacted. We’re impacting on the menus, the categories, etc. and so you start to get a bottleneck with an application, there’s a lot more under the hood. So understanding how all of that comes together is crucially important to really doing the reporting and trending and delivering on those SLAs as an application owner.
So when we look a the automation concepts, we are looking at the four areas The various activities – activities are really intelligent tasks that perform a defined action. There are a couple of examples there like we might run a .NET script, check a schedule, invoke a web service, query a database, or even send an email.A Runbook is a collection of activities that are pulled together in a workflow. This is a systems level workflow that will execute a series of linked automation activities. In this case, we have an example there of we create an incident which creates an incident record inside of either Service Manager or Remedy or HPOV Service Desk. We might then kick off a workflow that checkpoints a server, puts it into maintenance mode, shuts down the virtual machine, and then writes the update back to the incident record. It’s a simple Runbook but it allows us to take various activities and link them together and pass data between them.This gets into what we call the databus. The databus is used to publish and consume information as a Runbook executes. So if we have an activity where we need to get the idea of a server, and we get the necessary data sources, we can pass information from one activity to the next, to the next very easily and build off of each other so we may start with one piece of information at the beginning of our workflow and we collect additional information as we go through our workflow. When we get to the end, we have a large amount of information that can be used across that workflow. Now with these activities, we provide out-of-the-box standard activities that provide various functionality capabilities for users. And these different utilities that might be file level, interaction capabilities, running .NET scripts, running PowerShell commands, connecting to systems, querying databases. And I mentioned earlier that we ship a significant amount of data integration packs out-of-the-box.
So, in creating those Runbooks, we allow you to take those standardized activities and build those like you are building a Visio diagram. So we are talking about easy authoring and debugging. It is a drag and drop experience much like dragging and dropping and creating a Visio diagram to create your Runbook or create nested Runbooks with looping and branching to really automate your systems level activities and automate the decision process of the various activities within your Runbook. So you reach a point where you want to make a decision. If a certain condition is met, I go one direction. If it is not met, I go another direction. You can actually automate those into your Orchestrator Runbook. I mentioned the Databus. The Databus helps abstract developer level complexity from the Runbook author and enables us to do a hub-and-spoke integration model where we can take information and pass it back and forth to different solutions. And as I mentioned, we are shipping more than twenty different Integration Packs for System Center, Microsoft, and third party management tools.
Some of those standard activities to support things like delivering private cloud offerings are run system commands, perform schedules activities, down to send email notifications or other notification types if needed, manipulate a text file, and manage workflows.
A simple collection of the Microsoft Runbook Integration Packs across the System Center suite as well as Microsoft tools such as Active Directory.
And if that’s not enough, you can build your own. You can build and distribute your own integrations. We call it the Quick Integration Kit, QIK. That is a command line interface or a software development kit to actually build out your own integration packs. They are easy to build and to integrate and allows you to use either .NET or Java IDEs to compile DLL or JAR resource files to deliver your own integrations.
And if that’s not enough, you can build your own. You can build and distribute your own integrations. We call it the Quick Integration Kit, QIK. That is a command line interface or a software development kit to actually build out your own integration packs. They are easy to build and to integrate and allows you to use either .NET or Java IDEs to compile DLL or JAR resource files to deliver your own integrations.
So at the end of the day, we provide a lot, but we also provide you the ability to build your own if you need to. In building those integrations, most of those are delivered through XML files that expose Orchestrator runtime functionality and data. It also helps with reporting and is our external interface into System Center, and it is standards based so it operates with other tool sets.
So, when you think about integration, let’s look at it in this way, integration is about starting with Service Manager and Orchestrator, the process and the system integration capabilities. And we have a bi-directional connector between these two for automation activities from Orchestrator getting pulled into the Service Manager CMDB. And we can reference those as part of the service and request offerings and the activities that are needed to fulfill those.We then have the different tools within the System Center suite as well as Active Directory, Notification capabilities via Exchange,third party management tools and Line of Business applications such as Exchangewhere we pull in our configuration items and automation data to populate our CMDB from other System Center tools as well as from our Line of Business Applications such as Exchange for users and admins and our third party management tools as shown there. We then have the ability to, once we know the information about the pieces of our infrastructure, issue automation commands to the System Center, other System Center products, as well as third party tools, as well as Line of Business Applications, primarily through Orchestrator and in some cases through Service Manager via Operations Manager to actually go do something, to kick off an automation activity where that might be the start up of virtual machine or create a new virtual machine or create some private cloud capacity or create a new user inside a Line of Business Application or create a new processing compute environment inside say a third party management tool that’s going to touch out to an SAP environment.In addition to that, we have the notification and reporting aspects through Exchange, again either via System Manager or Orchestrator to issue notifications either outbound or inbound from a notification or accepting an approval via email notification, and then also through reporting, through dashboards and reports to be able to have visibility of how is IT performing, what are the services, how are we adhering to the service levels that we have established for our IT service that we are offering?
We start as Service Manager as the repository for our CMDB and then Orchestrator which provides us our automation engine. We have a bi-directional connector those automation activities to come into Service Manager, as well as for Service Manager to issue and execute those automation workflows within Orchestrator. We then have our other external repositories, either System Center related,Line of Business application such as Microsoft Exchange (User and Admin which is enabled with SP1) or 3rd Party management tools and inbound connectors to pull in configuration items and automation data to be populated into our CMDB and be reconciled together so that we’re looking at single record for a piece of our infrastructure even though some pieces came from Virtual Machine Manager, Operations or Configuration Manager or even Active Directory. Once we have our reconciled view of data within our infrastructure we can then do something with that. We have within the System Center suite a bi-directional interface through Orchestrator to issue automation commands to System Center products or 3rd party tools or Line of business application if you build your own integration pack using the SDK to actually drive automation within those tools, to respond to errors to deliver changes to manage changes with your infrastructure. Within SP1, we’ve added integration packs to enable Azure cloud management. And then lastly part of doing all this work we have to do two things: keep people aware and what’s happening and we got to be able to report on it. And we provide that inbound and outbound notifications capability through Service Manager and Orchestrator to Exchange as well as to our Service Manager data warehouse for dash boarding and reporting capabilities.
Let’s look at how we manage application across multiple clouds. This is a conversation that comes up a lot where our customers have some on-premise application and maybe they’re looking at Windows Azure applications and they need to understand, “Well how do I actually do this?” And this is how we do it. We have the two constructs here. We have private cloud on the left hand side, which is a Virtual Machine Manager cloud. And we have multiple hypervisors , we support Hyper-V, VMware and XenServer. And then we have a service template model that sits on top of that to deliver our applications.On the right hand side we have Windows Azure and/or a Service Provider, which has a package and configuration model, and we want to able to do is deploy, monitor and manage your applications , regardless of where they are running. The way we can do this is with App Controller. And App Controller enables us to manage both on the left hand side, a virtual machine manager service, and on the right hand side either Windows Azure application from within a single console. We can see information on what’s running, we can see how many instances are running, and so forth and we can also see go through and perform actions against these services as well deploy new application on both the private cloud and public cloud.
The System Center 2012 Service Pack 1 (SP1) version of Operations Manager can show you different perspectives of application health in one place—360 .NET Application Monitoring Dashboards. The 360 .NET Application Monitoring Dashboards display information from Global Service Monitor, .NET Application Performance Monitoring, and Web Application Availability Monitoring to provide a summary of health and key metrics for 3-tier applications in a single view. The 360 .NET Application Monitoring Dashboards show where an application is unhealthy and provide a launch point for detail dashboards that highlight component-level issues.The 360 .NET Application Monitoring Dashboards display data from powerful monitoring tools. .NET Application Performance Monitoring looks deep into the application to get details that can help you pinpoint solutions from server- and client-side perspectives. Web Application Availability monitoring in Operations Manager monitors internal synthetic transactions. Global Service Monitor monitors the availability of applications from an outside location, measuring availability from where the user is.
As an example of comprehensive monitoring and deep application insight, System Center 2012 SP1 enables a rich end-to-end scenario from creation of web tests to external “outside-in” monitoring, integrated on-premises monitoring and rich developer diagnostics in the case of any detected exceptions.On premises, you have developers working in Visual Studio 2012. Visual Studio enables developers to create web tests to validate that their applications are functioning correctly. A subset of these tests would be imported into Operations Manager, which is subsequently used to configure the Global Service Monitor Service.Global Service Monitor is a service hosted in Windows Azure Points of Presence around the globe that enables organizations to assess the real world performance and availability of their applications. Operations Manager instructs Global Service Monitor which application endpoints to invoke with the web tests along with a schedule. Once configured, Global Service Monitor calls the production web application according to the schedule and returns the results to the on-premise operations manager for display along side other monitoring data on the application gathered within the organizations private network.This capability ensures the broadest set of data to assess the health of the application and when intervention is necessary.When Global Service Monitor returns either an exception or response times that trigger an alert in Operations Manager, Operations Manager can schedule a work item to be added to the developers’ queue to be addressed by the developer.This level of integration helps to accelerate issue resolution and achieve SLAs.
Here you see the Global Service Monitor report screen in Operations Manager showing Where the tests are being issued fromWhich Point of Presence is detecting an out of order stateA list of test resultsResponse timesAlerts generated.
On this slide we talk about how the same product can be used to back-up and recover a wide range of Microsoft products. We have a few data points that we can leverage here as to how we have optimized our back-up and recovery solution:In SQL: We support any point in time recovery, we provide self service restoresUpto 2000 SQL Databases can be protected using a single DPM serverThe change tracking is super storage efficient.For Exchange:We provide protection against total loss due to logical corruptionsWe can preserve data for point in time restoresFor SharepointYou can protect at a farm level, but can do granular level recovery. Recovery of a document takes only a few seconds now.New databases are automatically detected and protectedFor HyperVYou can do item level recovery of VMsYou can back-up the entire hostYou can seamlessly protect live migration of VMsWe can back-up data from all these sources once every 15 minutes to a Tape or a Disk and you can save this back-up in an offsite location again on a tape or a disk or in the cloud.
What exactly is DPM’s Hyper-V protection for CSV R2? So we have efficient express full backups which means there is no owner node or non owner node performance penalty to have. We also support parallel backups as I already mentioned which means you can have multiple snapshots and multiple backups happening at the same time over CSV volume. The performance improvement in terms of the amount of time taken for executing these backups has improved 900% and that is something that we have delivered as part of SP1. Live migration, uninterrupted data protection within the cluster which is a key feature given that in most cluster environment migration is a key scenario. So how does it all happen? So DPM actually provides a filter that actually tracks changes that happen on a VM and all these changes are noted in a bitmap and these changes are tracked at the point and time when we take a snapshot in order to ensure that we transfer only the delta or the change to blocks from the VM into the DPM server. So that basically means that during backup or during creation of snapshot we basically read and transfer changed content from the previous snapshot so it’s very efficient and it also ensures faster backups which is also a key differentiator for SP1.
Coming to live migration, we support any migration whether it’s inter, intra, whether it’s stand alone to stand alone or between cluster to cluster or hybrid scenario from cluster to stand alone and we also provide security options whereby VMs can be recovered to the original host where the VM is actually currently running right. So now the key question here is how does DPM take care of mobility scenarios?Well the simple answer to that is that as part of supporting these mobility scenarios DPM interacts with VMM to find the location of the host where the VM is after migration. It then initiates a back up job on the new host if need be and in order to establish this communication DPM and VMM need to be configured with each other, that’s just a simple two step process of configuring the DPM machine account as an admin on the server and then installing the VMM console on the DPM server.
As I was talking about some of the scale improvements that we have done as part of SP1 this is the current scale number that we have supported for SP1. so DPM, 1 DPM server can support up to 800 VMs each of which are 100GBs each. We support any size clusters with a scale out model whereby we use multiple DPM servers that are actually bigger in number more than 800. we also provide the feature to exclude the page files in order to achieve efficiency it is a new feature that we have provided for whereby in order to achieve efficiency of backup storage we can exclude the page file during backups. Now, how is that accomplished, you can provide the page file to the DPM server and move it to a separate VHD like a scratch VHD and thereby DPM will back up only the page file as part of the initial application but not as part of the subsequent delta application.
Now the question then comes as to what is the scale out story for DPM given that Windows 2012 supports a scale of 4000 VMs for a 64 node cluster. Well DPM has a scale out model whereby we can support a 64 node cluster with 4000 VMs with 5DPM servers in other words each DPM will protect 800 VMs and the 5 DPM servers together will protect 4000 VMs on a 64 node cluster. Multiple DPM servers can protect the same cluster and therefore there is no requirement that you assign one DPM to one cluster as long as you know the scale numbers are evenly distributed across the DPM servers then we are good.
So it’s very integrated into the current workflows, it is a new online service so the ability of DPM as a cloud facing application has also been added as part of this, so how does it work? As I said someone subscribes to an online service, he deploys the DPM-A bits on the DPM server, registers DPM with the online service and then he can go about creating backups just like he would in the private cloud space. So it’s a seamless workflow that is also Azure facing.