Windows Server 2008 R2 includes improvements in several key areas for IT professionals:
- Enhanced virtualization capabilities in Hyper-V including live migration and improved performance.
- Powerful new management tools like PowerShell 2.0 and the Active Directory Administration Center.
- Increased scalability and reliability with support for up to 256 logical processors and storage improvements.
- Integration with Windows 7 providing richer user experiences and access from anywhere.
- Additional reliability, security and manageability features throughout the operating system.
More info at: www.poweronplatforms.com
follow us for more Microsoft System Center info:
https://www.linkedin.com/company/poweronplatforms
Leading the way with Microsoft System Center deployments and training
Looking at Deploying Microsoft System Center 2012 ... This is a must see session for you. Typically Microsoft System Center has been well documented as a complex system to implement into your organisation, with a single component taking 2-3 months and the suite normally 18 months to deploy. This means a high overhead and protracted deployment process before your business can start to realise the benefits of the system.
No longer is this the case.
In this session you will get to see new methods that have been proven in Enterprise scale deployments, reducing this deployment time down to days!! This means with covering design and training your business can be up and running in a matter of weeks.
The Session is delivered by Microsoft Most Valuable Professional (MVP) Steve Beaumont, who is PowerONPlatforms Technical / Product Director.
The session will cover:
System Center Overview
Traditional Deployment Styles
Automated Deployment Tools and Appliance Platforms
Real Life Customer Examples
Q&A
More info at: www.poweronplatforms.com
follow us for more Microsoft System Center info:
https://www.linkedin.com/company/poweronplatforms
Leading the way with Microsoft System Center deployments and training
Looking at Deploying Microsoft System Center 2012 ... This is a must see session for you. Typically Microsoft System Center has been well documented as a complex system to implement into your organisation, with a single component taking 2-3 months and the suite normally 18 months to deploy. This means a high overhead and protracted deployment process before your business can start to realise the benefits of the system.
No longer is this the case.
In this session you will get to see new methods that have been proven in Enterprise scale deployments, reducing this deployment time down to days!! This means with covering design and training your business can be up and running in a matter of weeks.
The Session is delivered by Microsoft Most Valuable Professional (MVP) Steve Beaumont, who is PowerONPlatforms Technical / Product Director.
The session will cover:
System Center Overview
Traditional Deployment Styles
Automated Deployment Tools and Appliance Platforms
Real Life Customer Examples
Q&A
SharePoint 2010 Upgrade Best Practices Teched Brazil by Joel OlesonJoel Oleson
SharePoint 2010 Upgrade Best Practices Teched Brazil by Joel Oleson. Includes strategy for upgrade including details on the common upgrade methods including additional best practices, a decision tree, and solutions.
Upgrading to SharePoint 2010 - Teched Middle EastJoel Oleson
From Planning to exploring the methods. We take a look at SharePoint 2010 upgrade and look at the new features and options to better understand what the options are.
Contributions: Sean Livingston
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Precisely
In today’s always-on IT world, a single security breach can bring your business to a standstill. You rely on Splunk’s powerful platform for monitoring, integrating, analyzing and visualizing security data from across your enterprise to protect your organization from security threats and incidents. However, Splunk doesn’t natively interact with mainframe and IBM i systems, leaving a glaring blind spot.
Join us to learn how to effectively integrate Mainframe and IBM i security data into Splunk- providing you with a comprehensive view of your security operations landscape.
Topics will include:
- An overview of different types of security data and how to tap into mainframe & IBM i data in your Splunk Security Operations Center
- Unique and comparative differentiators across security data integration tools to be used within the Splunk Security Operations center
- Customer use cases and examples
In this presentation, you’ll get an overview of the capabilities of Oracle Application Server 10g, the fastest-growing middleware platform available today.
SharePoint 2010 Upgrade Best Practices Teched Brazil by Joel OlesonJoel Oleson
SharePoint 2010 Upgrade Best Practices Teched Brazil by Joel Oleson. Includes strategy for upgrade including details on the common upgrade methods including additional best practices, a decision tree, and solutions.
Upgrading to SharePoint 2010 - Teched Middle EastJoel Oleson
From Planning to exploring the methods. We take a look at SharePoint 2010 upgrade and look at the new features and options to better understand what the options are.
Contributions: Sean Livingston
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Precisely
In today’s always-on IT world, a single security breach can bring your business to a standstill. You rely on Splunk’s powerful platform for monitoring, integrating, analyzing and visualizing security data from across your enterprise to protect your organization from security threats and incidents. However, Splunk doesn’t natively interact with mainframe and IBM i systems, leaving a glaring blind spot.
Join us to learn how to effectively integrate Mainframe and IBM i security data into Splunk- providing you with a comprehensive view of your security operations landscape.
Topics will include:
- An overview of different types of security data and how to tap into mainframe & IBM i data in your Splunk Security Operations Center
- Unique and comparative differentiators across security data integration tools to be used within the Splunk Security Operations center
- Customer use cases and examples
In this presentation, you’ll get an overview of the capabilities of Oracle Application Server 10g, the fastest-growing middleware platform available today.
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...Seth Shaw
Documents the creation and setup of a system to provide remote-yet-restricted access to electronic records at Duke University's David M. Rubenstein Rare Book & Manuscript Library using an online reservation system to schedule sessions with virtual machines accessible via Remote Desktop.
As you see in the news every month, credit card breaches are on the rise. Recent investigations into credit card merchant breaches indicate that many attacks have been aimed at insecure remote access. In this session, Matt will cover how a credit card breach happens, what you should do to protect your business and your customers, and how you can take action to secure remote access in your system.
DSSH was written as a direct replacement for the OpenSSH client. It adds SSH over SSH tunneling capabilities (for example, to log in to a network hidden by a firewall), scripting support (using BeanShell), an advanced agent (which allows storing of passwords) and "su -" interactive logging for machines that have disabled direct root login. All of this was done to enable automated scripting and logging to many machines based on a few simple rules.
With Remote Desktop Connection, you can connect to a computer running Windows from another computer running Windows that's connected to the same network or to the Internet. For example, you can use all of your work computer's programs, files, and network resources from your home computer, and it's just like you're sitting in front of your computer at work.
To connect to a remote computer, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the Internet), and you must have permission to connect. For permission to connect, you must be on the list of users. Before you start a connection, it's a good idea to look up the name of the computer you're connecting to and to make sure Remote Desktop connections are allowed through its firewall.
To find the Remote Desktop Connection shortcut, click the Start button Start button, click All Programs, and then click Accessories. To quickly open Remote Desktop Connection, click the Start button Start button, type mstsc in the search box, and then press Enter.
Redirecting a device on your computer makes it available for use in a Remote Desktop session. If a Remote Desktop Connection dialog box appears after you click Connect and enter your credentials, you can redirect local devices and resources, such as your local drives or Clipboard. Click Details, and then select the check box for each item you want to redirect.
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Digital Bond
The session will cover the security risks and issues around the management and usage of privileged/interactive user remote access and will cover the following topics:
- Management of generic and shared accounts (and their users)
- Remote interactive access to critical systems (e.g. vendor support)
- Current typical jump server implementations and its security weakness
- Isolation, Monitoring and Control over interactive/privileged sessions
- Recommended design and implementation of jump servers
The session will cover the security issues and the proposed solutions.
SharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd KlindtJoel Oleson
Learn what's new in Windows 2008 and SQL 2008 that SharePoint Admins should care about. These are the killer new features that will help you justify the upgrade or help you know what to investigate and validate by Joel Oleson and Todd Klindt.
Accelerate Your Enterprise Applications with ePlus and NetAppePlus
Team with ePlus and NetApp to accelerate your enterprise applications. Consolidate infrastructure and ensure your applications perform quick and deliver a high ROI. Contact ePlus to learn more at tech@eplus.com.
Similar to What's New In Windows Server 2008 R2 For IT Pro (20)
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations.
Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by:
1. Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.
2. Helping protect your data by protecting corporate information and managing risk.
3. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Windows Azure.
Let’s discuss each of these areas in more detail.
ענן פרטי וענן ציבורי: לא שני עולמות מתחרים אלא שני מימדים לאותו העולםAmit Gatenyo
ענן פרטי או ענן ציבורי – איזה מהם מהווה את האופציה החכמה, הכדאית והזולה ביותר? הוויכוח החם שמתקיים כיום בתעשייה סביב שאלה זאת מפספס את המהות האמיתית. אלו לא שני עולמות מתחרים, אלא שני מימדים לאותו העולם.
למעשה, ארגונים לא צריכים להחליט בין ענן ציבורי לפרטי, אלא לעמוד על השאלה כיצד השילוב בין השניים ישרת את העסק שלהם בצורה הטובה ביותר. המטרה הינה לשלב On-Premises עם Off-Premises לכדי סביבה אחת אשר מנוהלת כסביבה אחת - זהו החזון אשר בסופו של דבר יאומץ על ידי רוב הארגונים.
בהרצאה זאת עמית גטניו יפרט מדוע עננים ציבוריים חייבים לווייני On-Premises כדי לנצח ויסביר מדוע סביבות ה-On-Premises לא מסוגלות להיות באמת חזקות ללא חיבור לענן ציבורי.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
1. What's new in Windows Server 2008 R2 for IT Pro Amit Gatenyo Infrastructure & Security Manager, Dario Microsoft Regional Director – Windows Server & Security 054-2492499 Amit.g@dario.co.il Kobi Akiva Solutions Architect Dario IT Solutions 054-2549249 Kobi.a@dario.co.il
2. Technology Investment Areas Management Web Virtualization IIS 7.5 ASP .NET on Server Core Enhanced FTP and WebDAV Administration Modules & Cmdlets Hyper-V™ with Live Migration Hot Add/Remove VM Storage Remote Desktop Services Windows PowerShell 2.0 Power Management AD Administrative Center Best Practices Analyzer Solid Foundation for Enterprise Workloads Better Together with Windows 7 Scalability and Reliability DirectAccess™ BranchCache™ Improved File Copy Performance over WANs Enhanced Group Policies RemoteApp & Desktop Connections 256 Core Support Componentization Boot from SAN or VHD Support for Solid-state Devices File Classification Infrastructure
4. Overview Virtualization in WS08R2: Server virtualization with Hyper-V Presentation virtualization with RDS
5. Server virtualization with Hyper-V Delivers high levels of availability for production workloads via flexible and dynamic management while reducing overall costs through efficient server consolidation via: Better flexibility Live Migration Cluster Shared Volumes Hot Add/remove of Storage Processor compatibility mode for live migration Improved performance Improved memory management TCP Offload support Virtual Machine Queue (VMQ) Support Improved Networking Greater Scalability At 64 logical processor support Enhance Green IT with Core Parking
7. Simplifying Deployment Boot from .vhd Enables pre-configuration of virtual and physical computers Reduces the number of managed images Simplifies test deployments VHD Boot
8. RDS & VDI – AnIntegrated Solution Remote App Servers Hyper-V-based Remote Desktops Authentication Client Remote Desktop Gateway Server Remote Desktop Connection Broker RemoteApp & Desktop Web Access Server
9. Presentation virtualization with RDS RDS and VDI – An Integrated Solution Single broker to connect users to sessions or virtual machines, out of the box solution for VDI scenarios with Hyper-V Improving the User Experience Experience rich multimedia, VoIP integration, aero glass remoting, true multi-monitor support RemoteApp & Desktop Connections Centrally hosted applications integrated into start menu, desktop, etc. Can personalize a non-work PC with work applications without installing them locally Improved Management Tool Set Reduce repetitive task with RDS Powershell support, improved application install, connection broker install & profile management Platform Investments Multiple levels of extensibility for custom partner solutions for Remote Desktop Services & VDI based solutions
15. Powershell 2.0 Improved Command-line shell & Scripting Language Improves productivity & control Accelerates automation of system admin Easy-to-use Works with existing scripts Community Model Integration New Features Active Directory Administration Center IIS Power Management One-to-many remote management using WS-MGMT Graphical PowerShell Improved Security Portability New cmdlets
17. Active Directory Domain Services New Active Directory Domain Servicesmanagement console PowerShell integration/Built on PowerShell Recovery of deleted objects New AD Recycle Bin Improved process for joining domains Offline domain join Improved management of user accounts andidentity services Managed service accounts Improved Active Directory Federated Services Authentication assurance
18. Active Directory Recycle Bin & Managed Service Accounts Kobi Akiva Solutions Architect Dario IT Solutions 054-2549249 Kobi.a@dario.co.il
19. Configuration Assurance Integrated Best Practice Analyzer Validates configuration information Enhances infrastructure reliability Improves compliance with service level agreements
20. Best Practice Analyzers Kobi Akiva Solutions Architect Dario IT Solutions 054-2549249 Kobi.a@dario.co.il
22. Key Changes to IIS in R2 IIS 7.5 New IIS Manager Modules ASP.NET on Server Core Integrated PowerShell Provider Configuration Logging & Tracing Integrated FTP and WebDAV Extended Protection & Security
26. Performance & Scalability CPUs Support for 256 Logical Processors (LP) NUMA enhancements System Topology APIs Virtualization Live Migration SLAT support (NPT/SPT) NUMA scheduling improvements Power Improved Processor Power Management Policies & additional optimization of Windows Server component power usage Reduced Memory Reduced Power Windows Server 2008 R2 Scale - 256 p Virtualization
27. Performance & ScalabilityContinued… Memory Footprint Reduction General OS memory reductions Reductions in non-paged memory Trigger start of drivers and services Wide Area Network File copy improvements (per-file round trips reduced Downloads: 5 (old) to 3 (new) Uploads: 4 (old) to 3 (new)
28. Scaling Improvements FSCT File Server Workload (16 core server) OLTP SQL Server Workload + 32% 1.7x scaling throughput throughput
29. File Classification Infrastructure Classify Data Store classification properties Apply Policy based on classification Discover Data Examine Data for qualities bearing on classification Set classification properties API for external applications Get classification properties API for external applications In-box, end-to-end scenarios Integration with SharePoint Extensible infrastructure & Partner ecosystem File Classification Extensibility points
30. Cluster Shared Volumes Concurrent access to a single file system SAN VHD VHD VHD Single Volume
33. Summary Increased server consolidation Greater administrative control Rich Web-based experiences Performance and scalability enhancements Unprecedented synergies with client OS Anywhere access Taking an enterprise-class foundation to the next level
34. Resources Windows Server Division Blog - http://blogs.technet.com/windowsserver Dario Blog - http://www.dario.co.il/blog
36. Thanks for listening! Amit Gatenyo Infrastructure & Security Manager, Dario Microsoft Regional Director – Windows Server & Security 054-2492499 Amit.g@dario.co.il Kobi Akiva Solutions Architect Dario IT Solutions 054-2549249 Kobi.a@dario.co.il
Editor's Notes
Builds on the Windows Server 2008 foundationShippedsimultaneously (Windows 2000 Server® was first). 64-bit only
Server virtualization provided by Hyper-V. Hyper-V™ in Windows Server 2008 R2 is a micro-kernelized hypervisor which manages a server’s system resources to provide a virtualized environment for operating systems and applications. Hyper-V™ is the cornerstone for server virtualization and when used in conjunction with Virtual Desktop Infrastructure (VDI), Hyper-V™ is used for client computer virtualization.Presentation virtualization. Virtualizes a processing environment and isolates the processing from the graphics and I/O, making it possible to run an application in one location but have it be controlled in another. Presentation virtualization might allow you to run only a single application, or it might present you with a complete desktop offering multiple applications. Windows Server 2008 R2 offers a host of new capabilities for administrators taking advantage of presentation virtualization.
Beginning with Windows Server 2008, computer virtualization by using Hyper-V technology has been an integral part of the operating system. Now, Hyper-V in Windows Server 2008 R2 has been updated as a part of Windows Server 2008 R2. The new Hyper-V is an enabling technology for the marquee feature of Windows Server 2008 R2: Live Migration. This allows virtual machines to be moved between failover cluster nodes without interruption of services provided by the virtual machines. The users connected to the virtual machine being moved will notice only a slight drop in performance for a few moments. Otherwise, they will be unaware that the virtual machine was moved from one physical computer to another.In a typical live migration a user is connected to a VM on cluster node 1. An administrator begins the live migration which copies the VM’s config data from node 1 to node 2. It then takes an initial memory snapshot and moves that to node 2. But because users are still connected and interacting with node 1, this memory state changes. To keep the migration seamless, node 1 and node 2 must perform a memory sync. When the two are completely in sync, node 1 goes offline and user 1 is instantly connected to node 2 with no service interruption or perceived downtime.While not a requirement, Live Migration can make good use of the new Cluster Shared Volumes feature in failover clustering. The Cluster Shared Volumes feature supports a file system that is shared between cluster nodes. The Cluster Shared Volumes feature is implemented as a filter driver in Windows Server 2008 R2. Live Migration allows you to perform maintenance on the original physical computer by moving the virtual machines on that computer to another physical computer. Because you have no disruption of service, high user uptime is maintained.Quick Facts:Moving from Quick to Live Migration requires:Changes to VMs: NoChanges to storage infrastructure: NoChanges to network infrastructure: NoUpdate to Windows 7 Hyper-V: Yes
Historically, deploying operating systems and applications to physical and virtual computers used different methods. For virtual computers, the .vhd file format has become a de facto standard for deploying and interchanging pre-configured operating systems and applications.Windows Server 2008 R2 also supports the ability to boot a computer from a .vhd file stored on a local hard disk. This allows you to use preconfigured .vhd files for deploying virtual and physical computers. This helps reduce the number of images that you need to manage and provides an easier method for your testing deployment prior to deployment in your production environment.
Hyper-V support for VDI -Providing a better virtualization platform for scalable and highly available VDI deploymentsLive Migration of Virtual Machines – With Live Migration, there will be no perceived downtime in the desktop workloads running in the VM, and network connections from and to the VM being migrated will stay connected. This capability will be possible between hosts within a High Availability cluster.Support for Enhanced Virtualization Capabilities in the Hardware – Support for Nested Page Tables (NPT) and Extended Page tables (EPT) in Intel and AMD hardware. These capabilities improve the performance of translation of memory addresses.Thenew Remote Desktop Connection Broker, which extends the Session Broker capabilities already found in Windows Server 2008, creates a unified admin experience for traditional session-based remote desktops and (new) virtual machine-based remote desktops. The two key deployment scenarios supported by the Remote Desktop Connection Broker, besides traditional TS, are persistent (permanent) VMs and pooled VMs. In either case, the in-box solution supports storage of the image(s) on the Hyper-V host.SCVMM 2008 support provides intelligent placement of VMs during placement, fast and reliable P2V and V2V (VMware to Hyper-V) conversions as well monitoring of all virtual and physical assets from “one single pane of glass”.
Note for speaker: use this slide if you need to cover the improvements in one slide.You can omit if you are using the following slides to drill down in detailsRDS & VDIIncreasingly businesses aim to enable their employees and contractors to work from home or from an offshore, outsourced facility. These new work environments provide better flexibility, cost control and lower environmental footprint but increase demand for security and compliance so that precious Corporate data is not at risk.To address these challenges, Microsoft has been investing in Virtual Desktop Infrastructure, also known as VDI, in collaboration with our partners, which include Citrix, Unisys, HP, Quest, Ericom and several others. We’ve also been adding management and performance features to our Terminal Services-based virtualization, combining the two to form the most flexible presentation virtualization offering in Windows Server’s history. To better illustrate the breadth of these features, we’ve decided to rename Terminal Services to Remote Desktop Services.RDS incorporates all the features of Terminals Services and expands on them. VDI is a centralized desktop delivery architecture which allows customers to centralize the storage, execution and management of a Windows desktop in the data center. It enables Windows Vista Enterprise and other desktop environments to run and be managed in virtual machines on a centralized server.Improving the user experienceFor both VDI and traditional remote desktop services the quality of user experience is more important than ever before. Microsoft is making great progress in improving the end user experience through new Remote Desktop Protocol capabilities.These new capabilities, enabled with Windows Server 2008 R2 in combination with Windows7 Enterprise Edition and Ultimate Edition, improve significantly the experience of remote users, making it more similar to the experience enjoyed by users accessing local computing resourcesRemoteApp & Desktop ConnectionsNew Remote Desktop & Application feedsprovides a set of resources, such as RemoteApp programs and Remote Desktops. These feeds are presented to Windows 7 users using the new RemoteApp & Desktop Connection control panel. The new RemoteApp & Desktop Web Access provides the ability to connect to resources from Vista & XP in addition to Windows 7.Improved Management ToolsetRemote Desktops Services in Windows Server 2008 R2 focuses on improving management for all the existing scenarios delivered previously in Terminal Services and the exciting new scenarios in Remote Desktop Services; additionally we have added features to help improve application compatibility Perhaps this should be security and platform bucket and then have a separate management bucket?Platform InvestmentsMultiple levels of extensibility for custom partner solutions for Remote Desktop Services & VDI based solutions
The ongoing management of servers in the datacenter is one of most time consuming tasks facing IT professionals today. Any management strategy you deploy must support the management of both your physical and virtual environments. A specific goal for Windows Server 2008 R2 is reducing the ongoing management of Windows Server 2008 R2 and reducing the administrative effort required for completing common day-to-day operational tasks. The management improvements in Windows Server 2008 R2 include the following: Improved datacenter power consumption management. Streamlined management; support for standards, updated management consoles Reduced administrative effort for administrative tasks performed interactively. Enhanced command-line and automated management by using PowerShell version 2.0. Improved identity management provided by Active Directory Domain Services and Active Directory Federated Services. Improved compliance with established standards and best practices.
The Core Parking feature, which is configured by using Group Policy, allows Windows Server 2008 R2 to consolidate process onto the fewest number of possible processor cores and suspends inactive processor cores. If additional processing power is required, the Core Parking feature activates inactive processor cores to handle the increased processing requirements. Windows Server 2008 R2 has the ability to adjust processor performance (or, “P-state”) and subsequently adjust the server power consumption. Depending on the processor architecture, you can configure how P-states are adjusted by using Group Policy, giving you very fine control over processor power consumption.Windows Server 2008 R2 supports the ability to boot from Storage Area Network (SAN), which eliminates the need for local hard disks in the individual server computers. And the performance for accessing storage on SANs has been greatly improved.
Windows Server 2008 R2 has a number of improvements in remote administration, including the following:Improved remote management through updated graphical management consoles. Server Manager has been updated in a number of ways, including tight integration with other Windows Server core roles and Best Practice Analyzers. But one customer request that was most pervasive for Server Manager was the ability to install SM on an admin’s workstation and manage all the servers to which the admin has access from a remote console. We’ve answered that request in Windows Server 2008 R2. We’ve also gone to great lengths to more tightly integrate Server Manager with specific workload management consoles, including AD, Hyper-V and more.The new Active Directory Administrative Center combines the features administrators used to visit multiple areas for into a single cohesive interface. IT’s also written entirely on top of PowerShell, which means all tasks can be done on both the command line and the GUI. You’ll also find new task-driven features, including a cool new Recycle bin, offline domain joins and more.The new IIS Manager is another example of tight integration between R2’s management consoles and PowerShell. Using its PowerShell provider, IIS Manager not only eases Web management overall, but also enables remote management even across Server Core.Hyper-V Manager also includes new VM management tools, notably Live Migration. But much of its functionality is also mirrored in the upcoming System Center Virtual Machine Manager 2008 release, which will be tool of choice for managing large virtualized installations.Improved remove management from command-line and automated scripts. PowerShell version 2.0 has a number of improvements for remote management scenarios. These improvements allow you to run scripts on one or more remote computers or allow multiple IT professionals to simultaneously run scripts on a single computer.
Graphical PowerShell provides a graphical user interface that allows you to interactively create and debug PowerShell scripts within an integrated development environment similar to Visual Studio®. Graphical PowerShell include the following features: Syntax coloring for PowerShell scripts (similar to syntax coloring in Visual Studio). Support for Unicode characters. Support for composing and debugging multiple PowerShell scripts in a multi-tabbed interface. Ability to run an entire script, or a portion a script, within the integrated development environment. Support for up to eight PowerShell Runspaces within the integrated development environment. The new Out-GridView cmdlet displays the results of other commands in an interactive table, where you can search, sort, and group the results. For example, you can send the results of a get-process, get-wmiobject, or get-eventlog command to out-gridview and use the table features to examine the data.Note: Graphical PowerShell feature requires Microsoft .NET Framework 3.0.
For example, you can send the results of a get-process, get-wmiobject, or get-eventlog command to out-gridview and use the table features to examine the data.
The Active Directory Domain Service server role in Windows Server 2008 R2 includes the following improvements:Recovery of deleted objects. Domains in Active Directory now have a Recycle Bin feature that allows you to recover deleted objects. If an Active Directory object is inadvertently deleted, you can restore the object from the Recycle Bin. This feature requires the forest to be running in the Windows Server 7 functional level.Improved process for joining domains. Computers can now join a domain without being connected to the domain during the deployment process, also known as an offline domain join. This process allows you to fully automate the joining of a domain during deployment. Domain administrators create a file that can be included as a part of the automated deployment process. The file includes all the information necessary for the target computer to join the domain.Improved management of user accounts used as identity for services. One of the time consuming management tasks is to maintain passwords for user accounts that are used as identities for services, also known as service accounts. When the password for a service account changes, the services using that identity must also be updated with the new password. To address this problem, Windows Server 2008 R2 includes a new feature called managed service accounts. In Windows Server 2008 R2, when the password for a service account changes, the managed service account feature automatically updates the password for all the services that use the service account.Reduced effort to perform common administrative tasks. Windows Server 2008 R2 includes a new Active Directory Domain Services management console, Active Directory Administrative Center, which is a task-based management console that is based on the new PowerShell cmdlets in Windows Server 2008 R2. Improved Active Directory Federated Services. Active Directory Federated Services in Windows Server 2008 R2 includes a new feature called authentication assurance. Authentication assurance allows you to establish authentication policies for accounts that are authenticated in federated domains. For example, you might require smart card authentication or other biometric authentication for any users in federated domains.
We’ve also leveraged our successful Best Practice Analyzer technology. This was first introduced with other platforms, notably Exchange, and compared the server upon it was run to all the best practice compliance knowledge that Microsoft had available in its knowledgebase. This extends down to configurations and network environments specific to a particular server and the BPA comes back with a complete best practice analysis report, including advice for fixing problems and links back to the Microsoft Web site for more detailed information. Customers have been big fans of this technology and Windows Server 2008 R2 has answered that feedback by providing BPAs for all the server roles available in R2. Administrators can now quickly configure an R2 for any scenario and immediately get back optimized config information. The Best Practices Analyzer creates a checklist within Server Manager for the role that you can use to help you perform all the configuration tasks.
פעם היו חייבים לינוקס ל-PHPאפשר לנהל סביבת PHP בצורה הרבה יותר פשוטהאפשר להמיר את הקוד הקיים
Another key design goal was to provide higher performance for Windows Server 2008 R2 running on the same system resources as previous versions of Windows Server. In addition, Windows Server 2008 R2 supports increased scaling capabilities that allow you to support greater workloads than ever before. The Windows Server 2008 R2 features that improve performance and scalability for applications and services include:Scaling OutSupport for larger workloads by adding additional servers to a workload (scaling out)Scaling UpSupport for larger workloads by utilizing or increasing system resources (scaling up)The Network Load Balancing feature in Windows Server 2008 R2 allows you to combine two or more computers in to a cluster. You can use Network Load Balancing to distribute workloads across the cluster nodes to support larger number of simultaneous users. The Network Load Balancing feature improvements in Windows Server 2008 R2 include:IP Stickiness. The IP Stickiness feature in Network Load Balancing allows you to configure longer affinity between client and cluster nodes by using a configurable timeout setting for connection state (hours or even weeks in length). Common usage scenarios include Universal Access Gateway (UAG) with Secure Sockets Layer (SSL) Virtual Private Network (VPN) and IIS or ASP.NET applications (shopping cart).PowerShell support. PowerShell cmdlets provide the ability to fully manage Network Load Balancing clusters and the applications running on the cluster. The PowerShell cmdlets replace nlb.exe, which provided a command-line and scriptable interface for managing Network Load Balancing clusters in previous versions of Windows Server. These PowerShell cmdlets allow you to:Create and destroy clusters.Add, remove, and control cluster nodes.Add , edit, and remove cluster virtual IP addresses and dedicated IP address.Provide support for local and remote management.Application health awareness. Awareness for applications running on IIS by using the NLB management pack in R2. Support up to 128 logical processors.Run more workloads on Server Core installation option.Has improved disk access to storage devices connected through iSCSI and other remote storage solutions. Scaling up allows you to reduce the number of servers in your datacenter and be more power efficient. The features in Windows Server 2008 R2 that support scaling up include:Increased number of logical processors supported. Windows Server 2008 R2 Datacenter Edition supports up to 256 logical processors.Reduced operating system overhead for graphical user interface. In addition to reducing the attack surface of the operating system, the Server Core installation option eliminates the graphical user interface, which reduces the amount of processor utilization. The reduction in processor utilization allows more of the processing power to be used for running workloads.Improved performance for storage devices. Windows Server 2008 R2 includes a number of performance improvements for managing network-connected storage, including new support for iSCSI SANs, 10gig Ethernet wirespeed throughput
Infrastructure to classify files and apply policy based on classificationMessagingWindows Server 2008 R2 File Classification Infrastructure provides insight into your data to help you manage your data more effectively, reduce costs and mitigate risks by providing a built-in solution for file classification allowing administrators to automate manual processes with predefined policies based on the data’s business value. Also provided is an extensible infrastructure upon which ISVs can build end-to-end solutions that enable organizations to perform advanced classification and data management helping enable Microsoft partners to deliver rich classification solutions.
Cluster Shared VolumesNot a requirement for Live Migration, but highly recommended. CSV enables true storage sharing over SANs.No special hardware requirementsNo special application requirementsNo file type restrictionsNo directory structure or depth limitationsNo special agents or additional installationsNo proprietary file systemUses well established traditional NTFSGuest VMs can be moved without requiring any drive ownership changesNo dismounting and remounting of volumes is requiredEnabling multiple nodes to concurrently access a single ‘truly’ shared LUNProvides VM’s complete transparency with respect to which nodes actually own a LUNOnly supported with Hyper-VCSV provides a single consistent file name spaceFiles have the same name and path when viewed from anynode in the cluster
Microsoft Windows Server 2008 R2 gives IT Professionals more control over their server and network infrastructure, and provides an enterprise-class foundation for business workloads. Microsoft enables organizations to deliver rich Web-based experiences efficiently and effectively, by reducing the amount of effort required to administer and support your Web-based applications. The powerful Virtualization technologies in Windows Server 2008 R2 enable you to increase your server consolidation ratios, while reducing the amount of administrative effort required for managing the infrastructure. Through increased automation and improved remote administration, Windows Server 2008 R2 helps organizations save money and time, by reducing travel expenses, decreasing energy consumption, and automating repetitive IT tasks. When combined with Windows 7 client operating system, the Virtual Desktop Infrastructure in Windows Server 2008 enables you to provide your employees with anywhere access to corporate data and resources, while helping to maintain the security of your enterprise systems.
Lessexpensiveconfiguration ($2245 per processor) that offers both Live Migration and High Availability