This document provides an overview of implementing affordable disaster recovery with Hyper-V and multi-site clustering. It discusses what constitutes a disaster, the key components needed which are a storage mechanism, replication mechanism, and target servers/cluster. It also covers clustering history, what a cluster is, and the important concept of quorum which determines a cluster's existence through voting of its members.
Veeam webinar - Deduplication best practicesJoep Piscaer
Â
This document discusses best practices for using data deduplication with Veeam Backup & Replication 6.5 and Windows Server 2012. It recommends using data deduplication for backups with long retention periods of over 60 days to reduce storage costs. It provides guidance on planning and configuring deduplication, including sizing estimates, optimizing the backup repository, using forward incremental backups, and enabling inline and compression deduplication. It also demonstrates how Windows Server 2012 provides global deduplication across backup jobs and volumes.
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski buildacloud
Â
The document provides troubleshooting strategies for CloudStack installations, including network issues, security groups, host connectivity, virtual routers, templates, and log analysis. It discusses common problems such as VLAN misconfigurations, security group rules not being applied, hosts showing in the "avoid set", template preparation errors, and exceptions in the logs. It emphasizes analyzing logs at the management server, hypervisor, and job levels to find the root cause of failures.
This document provides an overview of troubleshooting CloudStack components including general troubleshooting techniques, secondary storage VMs, console proxy VMs, and virtual routers. It discusses examining log files, enabling debug logging, and using tools like MySQL Workbench. Examples are given for troubleshooting issues like insufficient capacity and calculating primary storage allocation. System VMs each have specific log files and services to check. The presentation aims to help support engineers effectively troubleshoot CloudStack environments.
Orchestration, resource schedulingâŠWhat does that mean? Is this only relevant for data centers with thousands of nodes? Should I care about Mesos, Kubernetes, Swarm, when all I have is a handful of virtual machines? The motto of public cloud IAAS is "pay for what you use," so in theory, if I deploy my apps there, I'm already getting the best "resource utilization" aka "bang for my buck," right? In this talk, we will answer those questions, and a few more. We will define orchestration, scheduling, and others, and show what it's like to use a scheduler to run containerized applications there.
NetApp technologies like snapshots, replication, and cloud integration can help organizations recover from ransomware and other data disasters. The document discusses several customer examples where:
1) Ransomware like NotPetya encrypted files and disrupted backups, but NetApp snapshots would have allowed much faster restores.
2) Backup methods like full backups slowed restoration and checking, but FlexClone from snapshots provides instant restores.
3) Storing backups in the cloud did not prevent ransomware impacts, but solutions like Cloud Volumes ONTAP can integrate snapshots and replication with public clouds for improved recovery.
The key message is that software and hypervisor-level replication is not enough - hardware snapshots provide additional imm
The document discusses monitoring ESX server performance and provides tips for troubleshooting performance issues. It outlines a 10 step process for analyzing performance that includes checking VMware tools, host and guest CPU usage, memory usage and swapping, network throughput and packet drops, IOPS, storage latency, and VM CPU utilization. The presentation aims to provide a structured approach for identifying and addressing the root causes of performance problems.
The document discusses troubleshooting CloudStack. It covers troubleshooting for CloudStack developers and administrators. For developers, it discusses error codes, debugging tips, system virtual machine troubleshooting and port usage. For administrators, it discusses installation, configuration, log analysis, important parameters, best practices, reusing hypervisors and the CloudStack database. The document also provides references and information on getting involved in the CloudStack community.
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per SecondAmazon Web Services
Â
With the introduction of Amazon Elastic Block Store (EBS) GP2 and recent stability improvements, EBS has gained credibility in the Cassandra world for high performance workloads. By running Cassandra on Amazon EBS, you can run denser, cheaper Cassandra clusters with just as much availability as ephemeral storage instances. This talk walks through a highly detailed use case and configuration guide for a multi PetaByte, million write per second cluster that needs to be high performing and cost efficient. We explore the instance type choices, configuration, and low-level tuning that allowed us to hit 1.3 million writes per second with a replication factor of 3 on just 60 nodes.
This document provides an overview of SQL Server clustering for beginners. It introduces SQL Server clustering, including what it is, why it is used, who supports it, and whether it is suitable. It also outlines an agenda covering introduction to clustering, demonstrations, installation, administration, problems, and disaster planning. The presenter's qualifications and contact details are provided.
Compare Clustering Methods for MS SQL ServerAlexDepo
Â
Clustering is very important technology for High Availability and it is important for DBA to understand benefits and pitfalls. With very few available techniques and a lot of gray areas right decision might help to avoid extra costs. Presentation is unveiling clustering basics, reviews and compares clustering technologies including Microsoft, XCOTO Gridscale, and HP PolyserveMatrix. This presentation can be helpful not only to beginners but to intermediate level DBAs and infrastructure managers.
1. The document discusses 5 key topics about disaster recovery planning: mixed platforms in data centers, virtualization, cloud computing, cost savings through virtualization, and the importance of testing disaster recovery plans.
2. Virtualization can simplify disaster recovery planning by allowing a single virtual recovery platform to protect all workloads regardless of physical or virtual servers and operating systems.
3. Cloud computing is well-suited for disaster recovery needs due to its on-demand, elastic resource model that handles unexpected resource demands.
Virtualization Technology, Cloud Computing & Building a Private Cloudahmedmehiny
Â
This book takes you through two of the most important innovations happened in the past couple years. The first chapter will give you overview about Virtualization technology and how it transferred our physical data centers to virtualized ones. The second chapter covers some topics in the Cloud Computing world, mainly private cloud model. The third chapter takes you through the steps of building a private cloud using Microsoft Technologies like System Center 2012 R2 and Windows Server 2012 R2. It is the implementation of my own design when I have do for my school. I hope this is going to be informative for you and please write me if you got any problem implementing the design.http://www.grin.com/en/e-book/287640/virtualization-cloud-building-a-private-cloud
Why resilience - A primer at varying flight altitudesUwe Friedrichsen
Â
This session provides a primer to resilience at varying flight altitudes.
It starts at a management level and motivates why resilience is important, why it is important today and what the business case for resilience is (or actually is not).
Then it descends to a high level architectural view and explains resilience a bit more in detail, its correlation to availability and the difference between resilience and robustness.
Afterwards it descends to a design level and explains some selected core principles of resilience, some of them garnished with grass-root level flight altitude code examples.
At the end the flight altitude is risen again and some recommendations how to introduce resilient software design into your software development process are given and the correlation to some related topics is explained.
Of course this slide deck will only show a fraction of the actual talk contents as the voice track is missing but I hope it will be helpful anyway.
The document discusses virtualization and cloud computing technologies. It describes how virtualization allows multiple operating systems to run on a single physical system and share resources. Cloud computing provisions computing services in an on-demand manner to dynamically scale resources up or down. The document outlines the benefits these technologies provide over traditional server models and how they enable more flexible and cost-effective computing.
This document discusses server virtualization concepts including the advantages of virtualization, different types of virtualization, and virtualization products. It begins with an overview of server virtualization and defines virtualization. It then covers reasons for virtualization, virtualization concepts including hypervisor types, and advantages. It discusses different types of virtualization including operating system, desktop, application, service, and user virtualization. Finally, it provides examples of popular virtualization products and technologies including VMware ESX/ESXi, vMotion, and vSphere.
The document provides a step-by-step guide for configuring Virtual Server host clustering using Virtual Server 2005 R2 and Windows Server 2003 clustering, describing a simple scenario with two physical servers, one guest operating system, shared storage, and a script to ensure smooth failover of the guest between servers. Virtual Server host clustering allows consolidating servers onto fewer physical hosts while maintaining high availability through automatic failover of virtual machines between nodes if a host fails.
JavaOne 2014: Taming the Cloud Database with jcloudszshoylev
Â
This document provides information and instructions for setting up a project using Apache jclouds to create a database in the cloud. It discusses initializing the necessary APIs from jclouds to interact with cloud database services, and provides code samples for creating a database user, database instance, and connecting to the database to test it. The document also discusses next steps like contributing to jclouds examples projects and documentation.
CloudStack, jclouds, Jenkins and CloudCatAndrew Bayer
Â
This document discusses jclouds, an open source multi-cloud library, and how it can be used with CloudStack. It describes how jclouds supports the standard and lower-level CloudStack APIs, and provides examples of using jclouds with CloudStack for provisioning Jenkins build slaves and building an application called CloudCat that allows provisioning and reporting within CloudStack.
Presented at Apache CloudStack Collabration Conference 2014, Denver, CO.
Talked about recently Virtual Router improvement in CloudStack 4.4 to unify and significantly speed up VR command execution, as well as some further improvement ideas.
This document is a slide deck presentation introducing PowerShell. It was presented by Don Jones of Concentrated Technology LLC to explain what PowerShell is, why it is useful for system administration, and demonstrate some key PowerShell patterns and practices through examples. Contact information is provided for ordering Jones' book on PowerShell and scheduling private training sessions.
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and UsesConcentrated Technology
Â
Todayâs talk about VDI centers around deploying hundreds or thousands of desktops. But sometimes you just want access for a few people and a few applications. Or, you just canât afford big-budget solutions. Have you tried Microsoft Hyper-V and RDS? Combining these two tools, a sufficiently-powerful server, and the information in this session, youâll quickly build a single-server VDI solution for just those small needs. Join RDS MVP Greg Shields for a look at the very small in VDI. Heâll show you how to get started on the most micro of budgets, and send you home with the exact click-by-click to begin hosting your own virtual desktops.
This document is a slide deck presentation about Windows PowerShell scripting and modularization. The presentation covers topics such as starting with commands, moving to scripts, parameterizing scripts, encapsulating in functions, using dot-sourcing, building pipeline functions, adding help, building script modules, and making script cmdlets. The presentation provides examples and guidance for improving PowerShell scripts through modularization and best practices.
This document provides an overview and agenda for a PowerShell crash course presentation. It introduces PowerShell concepts like cmdlets, aliases, snap-ins, objects, and the pipeline. It also covers PowerShell security features and using alternate credentials. The agenda includes a PowerShell backgrounder, accomplishing admin tasks with PowerShell, and available resources.
Don Reese completed the Advanced Tools & Scripting with PowerShell 3.0 Jump Start course on May 23, 2016. The course focused on advanced tools and scripting using PowerShell version 3.0. Don Reese achieved this certification on the specified date.
The document is a slide deck about PowerShell error handling and debugging. It discusses two types of bugs, techniques for debugging like using trace code, breakpoints, and the step debugger. It also covers error handling using try/catch blocks and setting error actions. The slide deck was presented at a conference by Concentrated Technology.
The document is a slide deck presentation about combining output from multiple sources in PowerShell. It was presented by Don Jones, a Windows PowerShell MVP, and includes demonstrations of retrieving information from multiple places and properly combining the output into a single output. Contact and resource information is provided for Don Jones and his company Concentrated Technology.
This document discusses how to create graphical user interfaces (GUIs) for PowerShell scripts using tools like .NET Framework, PowerShell, Visual Studio, Windows Presentation Foundation (WPF) and Extensible Application Markup Language (XAML). It provides step-by-step instructions for building a simple GUI with a label and button, loading the interface from an XAML file, adding a click handler to the button, and launching the GUI window. The goal is to understand how to apply XML, XAML, WPF and PowerShell to create an attractive and functional user interface.
Basic PowerShell Toolmaking - Spiceworld 2016 sessionRob Dunn
Â
PowerShell is everywhere. Admit it, even if you don't like change, you've probably needed to run a one-off command or small script in order to accomplish something...whether it was in AD, Exchange, VMWare or something else.
Running a single command is one thing, but what about making a reusable piece of code that anyone can run, or even better, schedule it? Get a report every Monday about drive space, remove old log files every month, report on logon failures...
We're going to take a command that fulfills a 'single-serving' role and turn it into something more dynamic; something that can be run over and over and be both relevant and timely!
Be ready to learn about parameters, basic functions, comment-based help, and other useful techniques - bring your laptop and code along with us!
Let's build a PowerShell tool!
Watch me present this topic via YouTube: https://youtu.be/akTypRvwr7g (video 1 of 2)
This slide deck discusses customizing PowerShell output using calculated properties. It explains that calculated properties allow dynamically extending objects with custom columns. The hashtable syntax for defining a calculated property is shown, with the expression using $_ to access the object being piped. Examples are provided like calculating free disk space, performing secondary WMI queries, and formatting output for AD user creation. More advanced formatting options like alignment, width, and format strings are also covered.
This document provides summaries of various free tools for Windows server administration. It is organized into sections covering server and security tools, file and disk tools, and network monitoring and troubleshooting tools. For each tool, a brief description is given along with the download link. Over 50 different tools are mentioned and summarized.
This document provides an overview of automating Active Directory management tasks using Windows PowerShell. It discusses prerequisites like having PowerShell v2 and a domain controller with the Gateway Service. It demonstrates how to import and use the Active Directory module to access AD drives and cmdlets. It also covers best practices, common gotchas, and how to run the cmdlets on older Windows versions using implicit remoting.
This slide deck presentation introduces Windows PowerShell and WMI (Windows Management Instrumentation) and provides tips on using them together. The presenter is Don Jones, a Windows PowerShell MVP. The presentation covers what WMI is, how it is organized and explored, its documentation, how to use it with PowerShell through Get-WmiObject and other cmdlets. It also provides tips for handling WMI output and building an inventory tool using WMI to retrieve system information like OS version, disks, BIOS, and processor architecture. Attendees are invited to use the materials freely and provided information on other resources from the presenter.
The document is a slide deck presentation about managing SQL Server for administrators. It covers topics like how SQL Server works with data pages and transactions; backup and restore operations using full, differential and transaction log backups; indexes and when to rebuild or reorganize them; database configuration options; security models; high availability and replication options. The presentation encourages administrators to keep indexes optimized and to use features like SQL Server Agent to help manage multiple servers.
The document discusses PowerShell functions including their structure, guidelines, input/output parameters, scope, use in pipelines, and comment-based help. PowerShell functions allow reusable blocks of code to be defined and behave similar to cmdlets. They can take parameters, return output, and be used in scripts, profiles, or modules. Functions provide a way to encapsulate and reuse code along with features like parameter handling and scoping rules.
This document contains a slide deck presentation about eight tips and tricks for using PowerShell. The presentation covers remote control using WinRM and PSRemoting, parameter binding, splatting, tracing commands, suppressing errors, making reusable tools, comment-based help, and creating GUI apps. The presentation encourages attendees to download the slides and scripts from the Concentrated Technology website.
This document is a slide deck presentation about automating Active Directory administration using PowerShell. It discusses the Microsoft and Quest cmdlets for managing AD, how to load the necessary modules and snap-ins, and common tasks like filtering, properties, mapping drives, and using options. The presentation aims to demonstrate many AD administration capabilities in PowerShell.
This document provides an overview of common Active Directory (AD) disasters, including hardware/software failures, human errors, and complete disasters. It discusses specific issues like morphed SYSVOL folders, broken GPT/GPC linkages, DNS aging/scavenging not being enabled, and improper time synchronization. Solutions provided include using tools like NTDSUTIL, GPOTOOL, and REPADMIN to fix issues and prevent disasters. The document emphasizes the importance of logging and monitoring to troubleshoot AD problems.
This document provides an introduction to PowerShell, including what PowerShell is, how it addresses security issues with existing scripting languages, basic commands and features like cmdlets, variables, pipelines, operators, and functions. It also covers topics like exporting, importing, sorting, filtering, regular expressions, arrays, hash tables, XML handling, and resources for learning more about PowerShell.
This document is a slide deck about Hyper-V high availability and live migration presented by Greg Shields of Concentrated Technology. The deck covers understanding live migration and its role in Hyper-V HA, fundamentals of Windows failover clustering, building a two-node Hyper-V cluster with iSCSI storage, managing a Hyper-V cluster, and adding disaster recovery with multi-site clustering. The deck is intended to help IT professionals implement and manage highly available Hyper-V environments.
The document discusses the challenges of storage requirements for server and desktop virtualization. It notes that virtualization increases storage demands by 5-15x by consolidating workloads onto shared storage. This makes SANs essential but also drives up costs significantly. It then presents a case study of a police station that was able to implement a virtual infrastructure solution within its $200k budget using DataCore software rather than an expensive SAN proposal. The document argues that DataCore's software-defined approach can provide high availability and disaster recovery at a fraction of the cost of traditional hardware-based SAN solutions.
The Lies We Tell Our Code (#seascale 2015 04-22)Casey Bisson
Â
This document discusses various lies and forms of virtualization that are commonly used in computing. It begins by summarizing different virtualization technologies used at Joyent like zones, SmartOS, and Triton. It then discusses lies told at different layers of the stack, from virtual memory to network virtualization. Some key lies discussed include hyperthreading, paravirtualization, hardware virtual machines, Docker containers, filesystem virtualization techniques, and network virtualization. The document argues that many of these lies are practical choices that improve performance and workload density despite not perfectly representing the underlying hardware. It concludes by acknowledging the need to be mindful of security issues but also not to stop lying at the edge of the compute node.
This document provides an overview and summary of key points from a presentation on designing virtual infrastructures and hypervisors. It discusses pre-requisites, assessing which servers are good candidates for virtualization, measuring server performance, determining the right amount of RAM for virtual machines, different types of virtualization technologies, high availability options, and live migration capabilities.
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18Casey Bisson
Â
As presented at LinuxCon/CloudOpen 2015: http://sched.co/3Y3v
We tell our code lies from development to deploy. The most common of these lies start with the simple act of launching a virtual machine. These lies are critical to our applications. Some of them protect applications from themselves and each other, some even improve performance. Some, however, decrease performance, and others create barriers to simply getting things done.
We lie about the systems, networks, storage, RAM, CPU and other resources our applications use, but how we tell those lies is critical to how the applications that depend on them perform. Joyent's Casey Bisson will explore the lies we tell our code and demonstrate examples of how they sometimes help and hurt us.
CloudStack - Top 5 Technical Issues and TroubleshootingShapeBlue
Â
Cloudstack Top 5 technical issues and troubleshooting. Cloudstack is a mature product in use by companies world-wide. While being associated with CloudStack development for over 5 years, Abhi has come across some technical issues that once in a while affect the CloudStack deployment. This presentation is an effort to put together top 5 such issues, analyze their symptoms, see them from CloudStack architecture perspective and from the distributed nature of cloud orchestration, then look at ways to avoid them and finally be able to troubleshoot if they occur.
This document summarizes a presentation on understanding virtualization's role in auditing and security. It begins with introducing the speaker, Greg Shields, and his background and expertise in virtualization. It then discusses some key points about virtualization including what it is, what it does by virtualizing computer resources like memory, processors, network cards and disks, and some of the problems it can help solve like disaster recovery and server consolidation. It also discusses the seven elements of a successful virtualization architecture including recognizing hype, doing an assessment of your environment, purchase and implementation, physical to virtual conversions, high availability, backups, virtualizing desktops, and disaster recovery implementation.
The document provides tips for building a scalable and high-performance website, including using caching, load balancing, and monitoring. It discusses horizontal and vertical scalability, and recommends planning, testing, and version control. Specific techniques mentioned include static content caching, Memcached, and the YSlow performance tool.
The document discusses using virtualization with Xen in a real world environment. It describes how virtualization was used at Newtec to consolidate servers, test configurations, and build dynamic development environments. Some key benefits realized were reduced hardware costs through consolidation, the ability to test at large scale without dedicated hardware, and automating the deployment of virtual machines. It also discusses lessons learned around only virtualizing what is needed and ensuring simplicity to maximize availability.
Vizioncore Economical Disaster Recovery through Virtualization1CloudRoad.com
Â
Virtualization enables more affordable disaster recovery for SMBs. Previously, having a duplicate backup site required duplicate expensive hardware and infrastructure. With virtualization, virtual machines can easily be copied to alternate backup sites for quick recovery in the event of failure. Testing backups is also simpler through virtual machine replication. Vizioncore provides virtualization solutions like vReplicator that optimize replication speeds and storage usage to enable cost-effective disaster recovery for SMBs through virtualization.
Web Werks Cloud FAQs. Our expert answers all of your questions related to Web Werks Cloud Hosting in this document. Read further to know more about Web Werks Cloud Server Hosting plans, benefits and strategies.
This document discusses high availability, disaster recovery, and backup considerations for Microsoft Hyper-V virtual machines. It covers Hyper-V architecture, anatomy of a virtual machine, challenges with backing up virtual machines including transactional consistency, and different approaches to backups including file-level and image-level. It also discusses high availability options for Hyper-V like live migration and replication, and disaster recovery strategies ranging from days to immediate recovery depending on budget and needs.
The document discusses virtualization for database administrators. It begins by describing the major players in virtualization like VMWare and Hyper-V. It then defines key virtualization terms like hypervisor, guest, host, and vMotion. The document outlines both the costs and benefits of virtualization. It provides details on optimizing SQL Server in a virtual environment and discusses monitoring virtualized SQL Servers. It concludes with reminding readers that virtualization is becoming more common and provides contact information for any additional questions.
The document discusses virtualization for database administrators. It defines key virtualization terms like hypervisor, guest, and host. It explores major virtualization platforms like VMWare and costs/benefits of virtualization. The document provides guidance on optimizing SQL Server in virtual environments, including using large memory pages, dedicating resources, and monitoring from the virtualization management layer. It warns against over-allocating resources for production databases and stresses testing I/O performance.
The document provides an overview of server virtualization, including:
- A definition of virtualization as dividing computer resources into multiple execution environments using concepts like hardware/software partitioning and emulation.
- A brief history of virtual machines dating back to the 1960s on IBM mainframes.
- How virtualization allows consolidating multiple servers onto fewer physical servers, improving hardware utilization.
- Common virtualization platforms like VMware ESX Server, and differences between Type 1 and Type 2 hypervisors.
Double-Take Software provides workload optimization solutions such as disaster recovery, high availability, server migration, and backup/management. It focuses on virtualized workload protection and has over 19,000 customers including over half of the Fortune 500. Double-Take's solutions provide real-time replication, hardware agnostic protection, automated failover and recovery in minutes, and WAN-optimized migration and backup.
Server Virtualization Seminar Presentationshabi_hassan
Â
VMware is a leading provider of virtualization software. It has over 4 million users, 3000+ channel partners, and generated $709 million in revenue in 2006. Virtualization allows multiple virtual machines to run on the same physical server, increasing hardware utilization and reducing costs. Key benefits of VMware include server consolidation, mobility of virtual machines, high availability, disaster recovery, and non-disruptive operations.
This presentation provides an overview of virtualization and demonstrates how to set up a virtual environment. It discusses the benefits of virtualization for development and testing. The demonstration shows how to install Windows Server 2003 and Windows XP in virtual machines, configure the virtual network and domain, and test applications across the virtual environment. Optimizing virtual machine resources and migrating physical servers to virtual machines are also covered.
This document provides an overview of sample scripts for Windows Server Update Services (WSUS). It describes scripts that can remotely install the WSUS client, enumerate installed and missing patches on multiple computers, perform on-demand patching of multiple machines, and match security updates to their corresponding Microsoft advisory numbers. The scripts are offered without warranty and are intended to demonstrate what can be automated through scripting WSUS functionality.
This slide deck presentation on best practices for architecting and implementing Windows Server Update Services (WSUS) was used at a technology conference. The document provides an overview and outline of the presentation topics, which include WSUS architecture designs, implementation, troubleshooting tips, and a demonstration. Contact information is provided for the presenting company for additional information.
The document discusses the history and current state of virtualization technology. It covers major developments from the 1960s to present day, including the introduction of virtualization concepts, early vendors like VMware, the growth of open source solutions, and the emergence of cloud computing. The document also examines current adoption rates and trends, noting that virtualization is becoming standard across enterprise data centers but challenges remain for desktop virtualization and cloud adoption.
This document discusses how VDI-in-a-Box can be used to deliver applications and desktops in small business scenarios. It provides steps to set up a VDI-in-a-Box server with Remote Desktop Services, Hyper-V, and RemoteApp capabilities. Problem applications can be hosted on pooled desktops using RemoteApp for Hyper-V as a lighter-weight alternative to full virtual desktops. The document aims to help IT professionals right-size application delivery based on user needs.
This document is a slide deck presentation about converting scripts from VBScript to PowerShell. It discusses how PowerShell uses objects and pipelines instead of text and loops. It provides examples of writing modular, reusable functions and using PowerShell commands and techniques instead of those from VBScript. The presentation encourages attendees to download the materials and scripts from the company's website and consider attending future classes.
This document summarizes various command line tricks and tools for managing ESXi hosts, including Linux commands like find, grep, cat, and vi, as well as VMware-specific commands like esxtop, vmkfstools, vim-cmd, esxcli, esxupdate, and vm-support. It is divided into four parts that cover understanding the ESXi command line, Linux commands, VMware commands, and using the vMA and scripting. The document provides examples for using these commands to locate files, read logs, control services, get process and disk information, configure networking and storage, manage VMs, troubleshoot issues, and install updates.
This document contains slides from a presentation about supporting SQL Server. The presentation provides an overview of how SQL Server works, including how data is stored physically and accessed. It discusses backup strategies, indexing, query optimization, high availability options and basic SQL queries. The presenter provides their contact information and offers to share additional resources.
This document summarizes a presentation about building, deploying, and supporting Server Core in Windows Server 2008 R2. The presentation covers the benefits of Server Core, including a smaller footprint, fewer patches required, and greater stability. It also discusses some of the limitations of Server Core, such as limited GUI functionality and .NET framework support. The presentation provides guidance on installing and configuring Server Core, and recommends using remote management tools like PowerShell instead of direct console access for ongoing management.
This document discusses different ways to deploy RemoteApps using Remote Desktop Services (RDS), including RDP file distribution, RD Web Access, local desktop installation, and client extension re-association. It compares the pros and cons of each approach and how they enable users to access applications remotely in different ways.
This document discusses how to automatically and rapidly deploy software in a small environment. It covers the two main parts of the process: software packaging and software deployment. For packaging, it explains how to configure software installations to run silently without user input using techniques like installation switches, MSI properties, and diff tools. For deployment, it discusses options like GPSI, PSExec, and paid solutions to remotely install packaged software on machines.
This PowerShell crash course for SharePoint administrators introduces PowerShell and demonstrates how to use it to manage SharePoint and other Microsoft products and services. The presentation covers PowerShell basics like running commands, piping, formatting output, remoting, and using WMI. It aims to help administrators learn PowerShell and show how it can simplify and automate administrative tasks. Attendees are encouraged to download the slides and materials from the presenter's website for reference.
The document discusses preparing software for automated deployment after upgrading to Windows 7. It covers two key aspects: repackaging software to install silently without user input, and deploying the repackaged software using a deployment tool. For repackaging, it describes analyzing the installation format (EXE, MSI, etc.), identifying any silent installation switches, and using tools like WinINSTALL LE to capture changes if switches cannot be found. It also discusses customizing software post-installation using registry changes packaged via these same tools.
This slide deck discusses remote computer management using PowerShell v2. It covers prerequisites, an overview of PowerShell remoting and underlying technologies like WinRM. Specific configuration steps are provided for domains, workgroups and individual machines. Troubleshooting tips and techniques for using remoting sessions and Invoke-Command are also summarized. The instructor encourages attendees to contact them for additional materials or questions.
This PowerShell crash course for SharePoint administrators introduces PowerShell and demonstrates how to use it to manage SharePoint and other Microsoft products and services. The presentation covers PowerShell basics like running commands, piping, formatting output, remoting, and using WMI. It aims to help administrators learn PowerShell and show how it can simplify and automate administrative tasks. Attendees are encouraged to download the materials from the presenter's website for reference.
This document is a slide deck presentation on Windows PowerShell given by Don Jones of Concentrated Technology. The presentation introduces PowerShell, covering topics like why it was created, running commands, piping, remoting, and more. It encourages attendees to download the transcript and scripts from the company's website for further reference.
This 75-minute PowerShell crash course presentation teaches key PowerShell usage patterns using real-world tasks as examples. It covers loading extensions and modules, cmdlet and parameter names, piping, formatting output as tables, manipulating objects, comparison operators, filtering with Where-Object, using WMI, batch cmdlets like Invoke-WmiMethod, and PowerShell scripting. The slide deck is available on the company's website and they offer additional training resources.
This slide deck presentation provides an overview of managing Microsoft SQL Server for those who are not primarily database administrators. The presentation covers how SQL Server works, backup and restore operations, indexes, database and server configuration options, security models, and high availability and replication options. It also demonstrates various SQL Server management tasks in the SQL Server Management Studio tool. The presentation encourages attendees to reuse the material and provides contact information for the company that created the presentation for additional training opportunities.
This document is a slide deck presentation about managing an enterprise from a single seat using Windows PowerShell remoting. The presentation introduces PowerShell remoting, how it works using WinRM, and how to enable and use remoting for 1:1 connections, running commands on multiple computers simultaneously, using persistent sessions, and leveraging implicit remoting to access remote modules. The presentation is copyrighted material from Concentrated Technology that can be used within one's own organization and provides contact information for the company.
This document is a slide deck presentation about using Windows PowerShell and Windows Management Instrumentation (WMI) to inventory network clients. The presentation introduces PowerShell and WMI, explores how to use WMI locally and remotely to retrieve device information, and demonstrates building a flexible WMI tool in PowerShell in a step-by-step manner. The presentation is copyrighted material from Concentrated Technology, LLC that can be used freely within organizations and provides links to additional resources on their website.
This document is a slide deck presentation about implementing, securing, and supporting IIS 7.x. The presentation provides an overview of IIS architecture and functionality, demonstrates how to configure IIS 7.5 to set up websites and FTP sites, and discusses tools like the Web Platform Installer for adding functionality to IIS. The instructor, Don Jones, is an IT author and consultant specializing in IIS and aims to provide a primarily demonstration-based session with opportunities for questions.
Planetek Italia is an Italian Benefit Company established in 1994, which employs 120+ women and men, passionate and skilled in Geoinformatics, Space solutions, and Earth science.
We provide solutions to exploit the value of geospatial data through all phases of data life cycle. We operate in many application areas ranging from environmental and land monitoring to open-government and smart cities, and including defence and security, as well as Space exploration and EO satellite missions.
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPathCommunity
Â
Welcome to our third live UiPath Community Day Amsterdam! Come join us for a half-day of networking and UiPath Platform deep-dives, for devs and non-devs alike, in the middle of summer â.
đ Agenda:
12:30 Welcome Coffee/Light Lunch â
13:00 Event opening speech
Ebert Knol, Managing Partner, Tacstone Technology
Jonathan Smith, UiPath MVP, RPA Lead, Ciphix
Cristina Vidu, Senior Marketing Manager, UiPath Community EMEA
Dion Mes, Principal Sales Engineer, UiPath
13:15 ASML: RPA as Tactical Automation
Tactical robotic process automation for solving short-term challenges, while establishing standard and re-usable interfaces that fit IT's long-term goals and objectives.
Yannic Suurmeijer, System Architect, ASML
13:30 PostNL: an insight into RPA at PostNL
Showcasing the solutions our automations have provided, the challenges weâve faced, and the best practices weâve developed to support our logistics operations.
Leonard Renne, RPA Developer, PostNL
13:45 Break (30')
14:15 Breakout Sessions: Round 1
Modern Document Understanding in the cloud platform: AI-driven UiPath Document Understanding
Mike Bos, Senior Automation Developer, Tacstone Technology
Process Orchestration: scale up and have your Robots work in harmony
Jon Smith, UiPath MVP, RPA Lead, Ciphix
UiPath Integration Service: connect applications, leverage prebuilt connectors, and set up customer connectors
Johans Brink, CTO, MvR digital workforce
15:00 Breakout Sessions: Round 2
Automation, and GenAI: practical use cases for value generation
Thomas Janssen, UiPath MVP, Senior Automation Developer, Automation Heroes
Human in the Loop/Action Center
Dion Mes, Principal Sales Engineer @UiPath
Improving development with coded workflows
Idris Janszen, Technical Consultant, Ilionx
15:45 End remarks
16:00 Community fun games, sharing knowledge, drinks, and bites đ»
Project management Course in Australia.pptxdeathreaper9
Â
Project Management Course
Over the past few decades, organisations have discovered something incredible: the principles that lead to great success on large projects can be applied to projects of any size to achieve extraordinary success. As a result, many employees are expected to be familiar with project management techniques and how they apply them to projects.
https://projectmanagementcoursesonline.au/
Multimodal Embeddings (continued) - South Bay Meetup SlidesZilliz
Â
Frank Liu will walk through the history of embeddings and how we got to the cool embedding models used today. He'll end with a demo on how multimodal RAG is used.
Global Collaboration for Space Exploration.pdfSachin Chitre
Â
Distinguished readers, leaders, esteemed colleagues, and fellow dreamers,
We stand at the precipice of a new era, an epoch where the boundaries of human potential are poised to be redefined. For centuries, humanity has gazed up at the celestial expanse, yearning to explore the cosmic mysteries that beckon us.
Today, I present a vision, a blueprint for a journey that transcends the limitations of conventional science and technology.
Imagine a world where the shackles of gravity are broken, where interstellar travel is no longer confined to the realms of science fiction. A world united not by petty differences, but by a shared purpose â to explore, to discover, and to elevate humanity.
This presentation outlines a comprehensive research project to construct and deploy Vimanas â ancient, aerial vehicles of wisdom and power. By harnessing the knowledge of our ancestors and the advancements of modern science, we can embark on a quest to not only conquer the skies but to conquer the cosmos.
Let us together ignite the spark of human ingenuity and propel our civilization towards a future where the stars are within our reach and where the bonds of humanity are strengthened through shared exploration.
The time for action is now. Let us embark on this extraordinary journey together."
Airports, banks, stock exchanges, and countless other critical operations got thrown into chaos!
In an unprecedented event, a recent CrowdStrike update had caused a global IT meltdown, leading to widespread Blue Screen of Death (BSOD) errors, and crippling 8.5 million Microsoft Windows systems.
What triggered this massive disruption? How did Microsoft step in to provide a lifeline? And what are the next steps for recovery?
Swipe to uncover the full story, including expert insights and recovery steps for those affected.
Generative AI technology is a fascinating field that focuses on creating comp...Nohoax Kanont
Â
Generative AI technology is a fascinating field that focuses on creating computer models capable of generating new, original content. It leverages the power of large language models, neural networks, and machine learning to produce content that can mimic human creativity. This technology has seen a surge in innovation and adoption since the introduction of ChatGPT in 2022, leading to significant productivity benefits across various industries. With its ability to generate text, images, video, and audio, generative AI is transforming how we interact with technology and the types of tasks that can be automated.
Securiport Gambia is a civil aviation and intelligent immigration solutions provider founded in 2001. The company was created to address security needs unique to todayâs age of advanced technology and security threats. Securiport Gambia partners with governments, coming alongside their border security to create and implement the right solutions.
Using ScyllaDB for Real-Time Write-Heavy WorkloadsScyllaDB
Â
Keeping latencies low for highly concurrent, intensive data ingestion
ScyllaDBâs âsweet spotâ is workloads over 50K operations per second that require predictably low (e.g., single-digit millisecond) latency. And its unique architecture makes it particularly valuable for the real-time write-heavy workloads such as those commonly found in IoT, logging systems, real-time analytics, and order processing.
Join ScyllaDB technical director Felipe Cardeneti Mendes and principal field engineer, Lubos Kosco to learn about:
- Common challenges that arise with real-time write-heavy workloads
- The tradeoffs teams face and tips for negotiating them
- ScyllaDB architectural elements that support real-time write-heavy workloads
- How your peers are using ScyllaDB with similar workloads
The Challenge of Interpretability in Generative AI Models.pdfSara Kroft
Â
Navigating the intricacies of generative AI models reveals a pressing challenge: interpretability. Our blog delves into the complexities of understanding how these advanced models make decisions, shedding light on the mechanisms behind their outputs. Explore the latest research, practical implications, and ethical considerations, as we unravel the opaque processes that drive generative AI. Join us in this insightful journey to demystify the black box of artificial intelligence.
Dive into the complexities of generative AI with our blog on interpretability. Find out why making AI models understandable is key to trust and ethical use and discover current efforts to tackle this big challenge.
1. Implementing Affordable Disaster Recovery with Hyper-V andMulti-Site ClusteringGreg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
3. What Makes a Disaster?Which of the following would you consider a disaster?
4. A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage. That damage causes the entire processing of that datacenter to cease.
5. A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
6. A problem with a virtual host creates a âblue screen of deathâ, immediately ceasing all processing on that server.
7. An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
8. An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.What Makes a Disaster?Which of the following would you consider a disaster?
9. A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage. That damage causes the entire processing of that datacenter to cease.
10. A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
11. A problem with a virtual host creates a âblue screen of deathâ, immediately ceasing all processing on that server.
12. An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
13. An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.DISASTER!JUST A BAD DAY!
14. What Makes a Disaster?Your decision to âdeclare a disasterâ and move to âdisaster opsâ is a major one.The technologies used for disaster protection are different than those used for high-availability.More complex.More expensive.
15. What Makes a Disaster?Your decision to âdeclare a disasterâ and move to âdisaster opsâ is a major one.The technologies used for disaster protection are different than those used for high-availability.More complex.More expensive.Failover and failback processes involve more thought.You might not be able to just âfail backâ with a click of a button.
16. A Disastrous PollWhere are We? Who Here isâŠPlanning a DR Environment?In Process of Implementing One?Already Enjoying One?Whatâs a âDR Environmentâ ???
17. Multi-Site Hyper-V == Single-Site Hyper-VDONâT PANIC: Multi-site Hyper-V looks very much the same as single-site Hyper-V.Microsoft has not done a good job of explaining this fact!Some Hyper-V hosts.Some networking and storage.Virtual machines that Live Migrate around.
18. Multi-Site Hyper-V == Single-Site Hyper-VDONâT PANIC: Multi-site Hyper-V looks very much the same as single-site Hyper-V.Microsoft has not done a good job of explaining this fact!Some Hyper-V hosts.Some networking and storage.Virtual machines that Live Migrate around.But there are some major differences tooâŠVMs can Live Migrate across sites.Sites typically have different subnet arrangements.Data in the primary site must be replaced with the DR site.Clients need to know where your servers go!
19. Constructing Site-Proof Hyper-V:Three Things You NeedAt a very high level, Hyper-V disaster recovery is three things:A storage mechanismA replication mechanismA set of target servers and a cluster to receive virtual machines and their dataOnce you have these three things, layering Hyper-V atop is easy.
21. Thing 1:A Storage MechanismTypically, two SANs in two different locationsFibre Channel , iSCSI, FCoE, heck JBOD.Often similar model or manufacturer. This similarity can be necessary (although not required) for some replication mechanisms to function property.
22. Thing 1:A Storage MechanismTypically, two SANs in two different locationsFibre Channel , iSCSI, FCoE, heck JBOD.Often similar model or manufacturer. This similarity can be necessary (although not required) for some replication mechanisms to function property.Backup SAN doesnât necessarily need to be of the same size or speed as the primary SANReplicated data isnât always full set of data.You may not need disaster recovery for everything.DR Environments: Where Old SANs Go To Die.
23. Thing 2:A Replication MechanismReplication between SANs must occur.There are two commonly-accepted ways to accomplish thisâŠ.
24. Thing 2:A Replication MechanismReplication between SANs must occur.There are two commonly-accepted ways to accomplish thisâŠ.SynchronouslyChanges are made on one node at a time. Subsequent changes on primary SAN must wait for ACK from backup SAN.AsynchronouslyChanges on backup SAN will eventually be written. Changes queued at primary SAN to be transferred at intervals.
25. Thing 2:A Replication MechanismSynchronouslyChanges are made on one node at a time. Subsequent changes on primary SAN must wait for ACK from backup SAN.
26. Thing 2:A Replication MechanismAsynchronouslyChanges on backup SAN will eventually be written. Are queued at primary SAN to be transferred at intervals.
38. Your Recovery Point Objective makes this decisionâŠThing 2Âœ:Replication Processing LocationThere are also two locations for replication processingâŠ
39. Thing 2Âœ:Replication Processing LocationThere are also two locations for replication processingâŠStorage LayerReplication processing is handled by the SAN itself.Agents are often installed to virtual hosts or machines to ensure crash consistency.Easier to set up, fewer moving parts. More scalable.Concerns about crash consistency.OS / Application LayerReplication processing is handled by software in the VM OS.This software also operates as the agent.More challenging to set up, more moving parts. More installations to manage/monitor. Scalability and cost are linear.Fewer concerns about crash consistency.
40. Thing 3:Target Servers and a ClusterFinally are target servers and a cluster in the backup site.
41. Clusteringâs Sordid HistoryWindows NT 4.0Microsoft Cluster Service âWolfpackâ.âAs the corporate expert in Windows clustering, I recommend you donât use Windows clustering.â
42. Clusteringâs Sordid HistoryWindows NT 4.0Microsoft Cluster Service âWolfpackâ.âAs the corporate expert in Windows clustering, I recommend you donât use Windows clustering.âWindows 2000Greater availability, scalability. Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).
43. Clusteringâs Sordid HistoryWindows NT 4.0Microsoft Cluster Service âWolfpackâ.âAs the corporate expert in Windows clustering, I recommend you donât use Windows clustering.âWindows 2000Greater availability, scalability. Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).Windows 2008Eliminated use of SCSI Resets.Eliminated full-solution HCL requirement.Added Cluster Validation Wizard and pre-cluster tests.Clusters can now span subnets (ta-da!)
44. Clusteringâs Sordid HistoryWindows NT 4.0Microsoft Cluster Service âWolfpackâ.âAs the corporate expert in Windows clustering, I recommend you donât use Windows clustering.âWindows 2000Greater availability, scalability. Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).Windows 2008Eliminated use of SCSI Resets.Eliminated full-solution HCL requirement.Added Cluster Validation Wizard and pre-cluster tests.Clusters can now span subnets (ta-da!)Windows 2008 R2Improvements to Cluster Validation Wizard and Migration Wizard.Additional cluster services.Cluster Shared Volumes (!) and Live Migration (!)
48. Quorum: Windows Clusteringâs Most Confusing ConfigurationEver been to a Kiwanis meetingâŠ?
49. Quorum: Windows Clusteringâs Most Confusing ConfigurationEver been to a Kiwanis meetingâŠ?A cluster âexistsâ because it has quorum between its members. That quorum is achieved through a voting process.Different Kiwanis clubs have different rules for quorum.Different clusters have different rules for quorum.
50. Quorum: Windows Clusteringâs Most Confusing ConfigurationEver been to a Kiwanis meetingâŠ?A cluster âexistsâ because it has quorum between its members. That quorum is achieved through a voting process.Different Kiwanis clubs have different rules for quorum.Different clusters have different rules for quorum.If a cluster âloses quorumâ, the entire cluster shuts down and ceases to exist. This happens until quorum is regained.This is much different than a resource failover, which is the reason why clusters are implemented.Multiple quorum models exist.
51. Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk Only
52. Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk Only
53. Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk Only
54. Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk Only
55. Quorum in Multi-Site ClustersNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk OnlyMicrosoft recommends using the Node and File Share Majority model for multi-site clusters.This model provides the best protection for a full-site outage.Full-site outage requires a file share witness in a third geographic location.
56. Quorum in Multi-Site ClustersUse the Node and File Share QuorumPrevents entire-site outage from impacting quorum.Enables creation of multiple clusters if necessary.Third Site for Witness Server
57. I Need a Third Site? Seriously?Hereâs where Microsoftâs ridiculous quorum notion gets unnecessarily complicatedâŠWhat happens if you put the quorumâs file share in the primary site?The secondary site might not automatically come online after a primary site failure.Votes in secondary site < Votes in primary siteLetâs count on our fingersâŠ
58. I Need a Third Site? Seriously?Hereâs where Microsoftâs ridiculous quorum notion gets unnecessarily complicatedâŠWhat happens if you put the quorumâs file share in the secondary site?A failure in the secondary site could cause the primary site to go down.Votes in secondary site > votes in primary site.More fingersâŠThis problem gets even weirder as time passes and the number of servers changes in each site.
59. I Need a Third Site? Seriously?Third Site for Witness Server
61. Multi-Site Cluster Tips/TricksInstall servers to sites so that your primary site always contains more servers than backup sites.Eliminates some problems with quorum during site outage.
62. Multi-Site Cluster Tips/TricksManage Preferred Owners & Persistent Mode options.Make sure your servers fail over to servers in the same site first.But also make sure they have options on failing over elsewhere.
64. Multi-Site Cluster Tips/TricksManage Preferred Owners & Persistent Mode options.Make sure your servers fail over to servers in the same site first.But also make sure they have options on failing over elsewhere.Consider carefully the effects of Failback.Failback is a great solution for resetting after a failure.But Failback can be a massive problem-causer as well.Its effects are particularly pronounced in Multi-Site Clusters.Recommendation: Turn it off, (until youâre ready).
67. Multi-Site Cluster Tips/TricksResist creating clusters that support other services.A Hyper-V cluster is a Hyper-V cluster is a Hyper-V cluster.Use disk âdependenciesâ as Affinity/Anti-Affinity rules.Hyper-V all by itself doesnât have an elegant way to affinitize.Setting disk dependencies against each other is a work-around.
68. Multi-Site Cluster Tips/TricksResist creating clusters that support other services.A Hyper-V cluster is a Hyper-V cluster is a Hyper-V cluster.Use disk âdependenciesâ as Affinity/Anti-Affinity rules.Hyper-V all by itself doesnât have an elegant way to affinitize.Setting disk dependencies against each other is a work-around.Add Servers in PairsEnsures that a server loss wonât cause site split brain.This is less a problem with the File Share Witness configuration.
71. Most Important!Ensure that networking remains available when VMs migrate from primary to backup site.Clustering can span subnets!This is good, but only if you plan for itâŠRemember that crossing subnets also means changing IP address, subnet mask, gateway, etc, at new site.This can be automatically done by using DHCP and dynamic DNS, or must be manually updated.DNS replication is also a problem. Clients will require time to update their local cache.Consider reducing DNS TTL or clearing client cache.
72. Implementing Affordable Disaster Recovery with Hyper-V andMulti-Site ClusteringGreg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com