Overview of RD Virtualization Host

Size: px
Start display at page:

Download "Overview of RD Virtualization Host"

Transcription

1 RD Virtualization Host Page 1 Overview of RD Virtualization Host Remote Desktop Virtualization Host (RD Virtualization Host) is a Remote Desktop Services role service included with Windows Server 2008 R2, Windows 2012 and Windows 2012 R2. RD Virtualization Host integrates with Hyper-V to provide virtual machines by using RemoteApp and Desktop Connection. RD Virtualization Host can be configured so that each user in your organization is assigned a unique virtual machine, or users are redirected to a shared virtual machine pool where a virtual machine is dynamically assigned. RD Virtualization Host uses Remote Desktop Connection Broker (RD Connection Broker) to determine where the user is redirected. If a user is assigned and requests a personal virtual desktop, RD Connection Broker redirects the user to this virtual machine. If the virtual machine is not turned on, RD Virtualization Host turns on the virtual machine and then connects the user. If the user is connecting to a shared virtual machine pool, RD Connection Broker first checks to see if the user has a disconnected session in the pool. If the user has a disconnected session, they are reconnected to that virtual machine. If the user does not have a disconnected session, a virtual machine in that pool is dynamically assigned to the user, if one is available. From <

2 RD Virtualization Host Page 2 Virtual Desktop Pools You can group identically configured virtual machines that are hosted on Remote Desktop Virtualization Host (RD Virtualization Host) servers into a virtual desktop pool and make that virtual desktop pool available to users through RemoteApp and Desktop Connection. Because the virtual machines are identically configured, the user sees the same virtual desktop, regardless of which virtual machine in the virtual desktop pool the user connects to. The following are important considerations about a virtual desktop pool: The virtual machines in a virtual desktop pool should be identically configured, including which programs are installed. A virtual machine can be a member of only one virtual desktop pool at a time. Important A virtual machine should not be both a member of a virtual desktop pool and assigned to a user as a personal virtual desktop. A virtual desktop pool is not specifically assigned to a user. Multiple users can use the same virtual desktop pool. Only one user can use a virtual machine in a virtual desktop pool at a time. You can make multiple virtual desktop pools available through RemoteApp and Desktop Connection. The user sees a different icon for each virtual desktop pool. Users should not save files on a virtual machine that is in a virtual desktop pool. If a user logs off from a virtual machine in a virtual desktop pool, the next time that the user logs on to the virtual desktop pool, the user might be connected to a different virtual machine in the virtual desktop pool. If a user disconnects from a virtual machine in a virtual desktop pool, when the user reconnects to the virtual desktop pool, the user will be connected to the same virtual machine. A virtual machine in a virtual desktop pool can be configured to be automatically restored to its original state after the user logs off. Any changes that a user made while logged on are undone. For more information, see From < Step by Step 1. Open Server Manager (ideally from the Server you want to host the Session Broker role), Click on Add Roles and Features, Select Remote Desktop Services Installation and Click Next 2. Select Deployment Type of Standard deployment

3 RD Virtualization Host Page 3 3. Select Virtual machine-based desktop Deployment and Click Next 4. Click Next on the Review of role Services screen 5. Specify which server to act as the RD Connection Broker Server and Click Next 6. Specify which server to act as the RD Web Access Server and Click Next (In our example, we re elected to host the RD Web Access role on the same host as the Session Broker role.)

4 RD Virtualization Host Page 4 7. Specify the RD Virtualization Host and Click Next In our example we re using the same host for all 3 roles. The Hyper-V role will be installed if it isn t already. 8. Confirm Selection and check mark on Restart Destination Server automatically if Required, Click Deploy After completion of this process, you have successfully installed the RD Connection Broker, RD Web Access, RD Virtualization Host. Virtual Machine-based desktop Deployment is of two types: 1. Personal Virtual Desktop Collection Administrators manually assign virtual desktops to the users. 2. Pooled Virtual Desktop Collection - Administrators deploy virtual desktops and users are randomly assigned virtual desktops. At log off virtual desktops are generally rolled back (rollback is optional). Creating a Pooled Virtual Desktop Collection There are two types of Pooled Virtual desktop Collections: 1. Pooled Managed The Virtual desktop machine is created using the Sysprep Template of a virtual machine. We can recreate the virtual desktops from this image at will. 2. Pooled Unmanaged We can add the existing virtual machine to this virtual desktop collection from Hyper V pool. With either option, the administrator can configure the pool to store the user profiles on User Profile disks separate from the machines. Pooled - Managed Virtual desktop Collection 1. Open Server Manager, Click Remote Desktop Services and Select Overview

5 RD Virtualization Host Page 5 2. In Deployment Overview Section, Click Tasks and Select Edit Deployment properties. 3. Expand Active Directory and Select the Organization Unit if you would like to add the Virtual desktops to the domain, Click Apply 4. Select Collections tile 5. In Collection Section, Click Tasks and Select Create Virtual Desktop Collection, Click Next

6 RD Virtualization Host Page 6 6. Type the Name of the Collection and Click Next 7. Select the Pooled Virtual desktop collection and Click Next 8. Specify the Virtual Desktop Template which you must have already configured in Hyper V (making sure to have syspreped the virtual machine after installing the software required by users) and Click Next. Note If you do not have an image then it can be easily created using the following command: %windir%\system32\sysprep\sysprep.exe /generalize /oobe /shutdown /mode:vm See the Windows 2012 RDS guides for more information on how to SYSPREP a template VM. 9. Click Next

7 RD Virtualization Host Page Specify the unattended installation settings and Select the OU 11. Specify the Users and Groups and Specify the Prefix and Suffix for the Virtual Desktop 12. Specify Virtual Desktop allocation and Click Next 13. Specify Virtual desktop storage and Click Next

8 RD Virtualization Host Page Specify User Profile disk if you want with the UNC Path and Click Next 15. Confirm Selections and Click Create 16. View Progress and Click Close 17. In Collection Section, Right Click VDI( Collection Name) and Select Task Status details This completes the Virtual Desktop Managed Pool deployment. Pooled - Unmanaged Virtual desktop Collection

9 RD Virtualization Host Page 9 Pooled - Unmanaged Virtual desktop Collection 1. In Collection Section, Click Tasks and Select Create Virtual Desktop Collection, Click Next 2. Type the Name of the Collection and Click Next 20. Select the Pooled Virtual desktop collection and Uncheck Automatically create and manage virtual desktops, Click Next 21. Specifying the Existing Virtual Desktops and Click Next 22. Specify the Users and Groups and Click Next

10 RD Virtualization Host Page Specify User Profile disk if you want with the UNC Path and Click Next 24. Confirm Selection and Click Create 25. View Progress From <

11 RD Virtualization Host Page 11 Personal Virtual Desktops A specific virtual machine that is hosted on a Remote Desktop Virtualization Host (RD Virtualization Host) server can be assigned to a user in Active Directory Domain Services (AD DS) to use as a personal virtual desktop, which the user can then access by using RemoteApp and Desktop Connection. The following are important considerations about assigning a personal virtual desktop to a user in AD DS: The user and the virtual machine must both be members of an Active Directory domain. A user can be assigned only one personal virtual desktop at a time. A virtual machine can be assigned as a personal virtual desktop to only one user at a time. The functional level of your Active Directory domain must be at least Windows Server The name of the virtual machine in the Hyper-V Manager tool must match the fully qualified domain name (FQDN) of the computer. To assign a specific virtual machine to a user as a personal virtual desktop, use either of the following: The Assign Personal Virtual Desktop Wizard in the Remote Desktop Connection Manager tool. The Active Directory Users and Computers tool in Windows Server 2012 R2. From < Step by Step To Create a Personal - Managed Virtual desktop Collection 1. Open the Server Manager, Click Remote Desktop Services and Select Overview 2. In Deployment Overview Section, Click Tasks and Select Edit Deployment properties. 3. Expand Active Directory and Select the Organization Unit if you would like to add the Virtual desktops to the domain, Click Apply

12 RD Virtualization Host Page Select Collections tile 5. In Collection Section, Click Tasks and Select Create Virtual Desktop Collection, Click Next 6. Type the Name of the Collection and Click Next 7. Select the Personal Virtual desktop collection and Click Next

13 RD Virtualization Host Page Specify the Virtual Desktop Template which you must configure in Hyper V and Make sure sysprep the virtual machine once you have install the software required by users and Click Next 9. Specify the User Assignment and Click Next 10. Click Next 11. Specify the unattended installation settings and Select the OU

14 RD Virtualization Host Page Specify the Users and Groups and Specify the Prefix and Suffix for the Virtual Desktop 13. Specify Virtual Desktop allocation and Click Next 14. Specify Virtual desktop storage and Click Next 15. Confirm Selections and Click Create

15 RD Virtualization Host Page View Progress and Click Close 17. In Collection Section, Right Click Personal( Collection Name) and Select Task Status details Personal - Unmanaged Virtual desktop Collection 1. In Collection Section, Click Tasks and Select Create Virtual Desktop Collection, Click Next 2. Type the Name of the Collection and Click Next 3. Select the Personal Virtual desktop collection and Uncheck Automatically create and manage virtual

16 RD Virtualization Host Page Select the Personal Virtual desktop collection and Uncheck Automatically create and manage virtual desktops, Click Next 4. Specifying the Existing Virtual Desktops and Click Next 5. Specify the User Assignment and Click Next 6. Specify the Users and Groups and Click Next 7. Confirm Selection and Click Create

17 RD Virtualization Host Page View Results 9. In the Virtual Desktop Section under Personal Unmanaged Collection, we can see the Virtual machine which we have added and we can add more virtual desktop. 10. We must assign the Virtual desktop to the specific users if we use Disable automatic user assignment. From <

18 RD Virtualization Host Page 18 Links About Virtual Desktop Pools From < About Personal Virtual Desktops From < Setting up a new Remote Desktop Services deployment using Windows PowerShell From < Windows 8 / Windows Server 2012: Pooled Virtual Desktop Infrastructure From < Using Microsoft VDI to Enable New Workstyles From < Workstyles-04-Hyper-V-for-VDI> Using Hyper-V Differencing Disks with VDI From < Single Image Management for Virtual Desktop Collections in Windows Server 2012 From < Data Deduplication Deploying Data Deduplication for VDI storage in Windows Server 2012 R2 From < Introduction to Data Deduplication in Windows Server 2012 From < Step-by-Step: Enabling Data Deduplication on Windows Server 2012 Volumes From <

19 RD Virtualization Host Page 19 Storage Data Deduplication Does Deduplication Matter? Hard disk drives are getting bigger and cheaper every year, why would I need deduplication? Well, the problem is growth. Growth in data is exploding so much that IT departments everywhere will have some serious challenges fulfilling the demand. Check out the chart below where IDC has forecasted that we are beginning to experience massive storage growth. Can you imagine a world that consumes 90 million terabytes in one year? We are about 18 months away! Source: IDC Worldwide File-Based Storage Forecast: Foundation Solutions for Content Delivery, Archiving and Big Data, doc #231910, December 2011 Data Deduplication Characteristics: 1) Transparent and easy to use: Deduplication can be easily installed and enabled on selected data volumes in a few seconds. Applications and end users will not know that the data has been transformed on the disk and when a user requests a file, it will be transparently served up right away. The file system as a whole supports all of the NTFS semantics that you would expect. Some files are not processed by deduplication, such as files encrypted using the Encrypted File System (EFS), files that are smaller than 32KB or those that have Extended Attributes (EAs). In these cases, the interaction with the files is entirely through NTFS and the deduplication filter driver does not get involved. If a file has an alternate data stream, only the primary data stream will be deduplicated and the alternate stream will be left on the disk. 2) Designed for Primary Data: The feature can be installed on your primary data volumes without interfering with the server s primary objective. Hot data (files that are being written to) will be passed over by deduplication until the file reaches a certain age. This way you can get optimal performance for active files and great savings on the rest of the files. Files that meet the deduplication criteria are referred to as in-policy files. a. Post Processing: Deduplication is not in the write-path when new files come along. New files write

20 RD Virtualization Host Page 20 a. Post Processing: Deduplication is not in the write-path when new files come along. New files write directly to the NTFS volume and the files are evaluated by a file groveler on a regular schedule. The background processing mode checks for files that are eligible for deduplication every hour and you can add additional schedules if you need them. b. File Age: Deduplication has a setting called MinimumFileAgeDays that controls how old a file should be before processing the file. The default setting is 5 days. This setting is configurable by the user and can be set to 0 to process files regardless of how old they are. c. File Type and File Location Exclusions: You can tell the system not to process files of a specific type, like PNG files that already have great compression or compressed CAB files that may not benefit from deduplication. You can also tell the system not to process a certain folder. 3) Portability: A volume that is under deduplication control is an atomic unit. You can back up the volume and restore it to another server. You can rip it out of one Windows 2012 server and move it to another. Everything that is required to access your data is located on the drive. All of the deduplication settings are maintained on the volume and will be picked up by the deduplication filter when the volume is mounted. The only thing that is not retained on the volume are the schedule settings that are part of the task-scheduler engine. If you move the volume to a server that is not running the Data Deduplication feature, you will only be able to access the files that have not been deduplicated. 4) Focused on using low resources: The feature was built to automatically yield system resources to the primary server s workload and back-off until resources are available again. Most people agree that their servers have a job to do and the storage is just facilitating their data requirements. a. The chunk store s hash index is designed to use low resources and reduce the read/write disk IOPS so that it can scale to large datasets and deliver high insert/lookup performance. The index footprint is extremely low at about 6 bytes of RAM per chunk and it uses temporary partitioning to support very high scale c. Deduplication jobs will verify that there is enough memory to do the work and if not it will stop and try again at the next scheduled interval. d. Administrators can schedule and run any of the deduplication jobs during off-peak hours or during idle time. 5) Sub-file chunking: Deduplication segments files into variable-sizes ( kilobyte chunks) using a new algorithm developed in conjunction with Microsoft research. The chunking module splits a file into a sequence of chunks in a content dependent manner. The system uses a Rabin fingerprint-based sliding window hash on the data stream to identify chunk boundaries. The chunks have an average size of 64KB and they are compressed and placed into a chunk store located in a hidden folder at the root of the volume called the System Volume Information, or SVI folder. The normal file is replaced by a small reparse point, which has a pointer to a map of all the data streams and chunks required to rehydrate the file and serve it up when it is requested. Imagine that you have a file that looks something like this to NTFS: clip_image009 And you also have another file that has some of the same chunks:

21 RD Virtualization Host Page 21 And you also have another file that has some of the same chunks: clip_image011 After being processed, the files are now reparse points with metadata and links that point to where the file data is located in the chunk-store. clip_image013 6) BranchCache : Another benefit for Windows is that the sub-file chunking and indexing engine is shared with the BranchCache feature. When a Windows Server at the home office is running deduplication the data chunks are already indexed and are ready to be quickly sent over the WAN if needed. This saves a ton of WAN traffic to a branch office. What about the data access impact? Deduplication creates fragmentation for the files that are on your disk as chunks may end up being spread apart and this causes increases in seek time as the disk heads must move around more to gather all the required data. As each file is processed, the filter driver works to keep the sequence of unique chunks together, preserving on-disk locality, so it isn t a completely random distribution. Deduplication also has a cache to avoid going to disk for repeat chunks. The file-system has another layer of caching that is leveraged for file access. If multiple users are accessing similar files at the same time, the access pattern will enable deduplication to speed things up for all of the users. There are no noticeable differences for opening an Office document. Users will never know that the underlying volume is running deduplication. When copying a single large file, we see end-to-end copy times that can be 1.5 times what it takes on a non-deduplicated volume. When copying multiple large files at the same time we have seen gains due to caching that can cause the copy time to be faster by up to 30%. Under our file-server load simulator (the File Server Capacity Tool) set to simulate 5000 users simultaneously accessing the system we only see about a 10% reduction in the number of users that can be supported over SMB 3.0. Data can be optimized at MB/Sec within a single job, which comes out to about 100GB/hour for a single 2TB volume using a single CPU core and 1GB of free RAM. Multiple volumes can be processed in parallel if additional CPU, memory and disk resources are available. Reliability and Risk Mitigations Even with RAID and redundancy implemented in your system, data corruption risks exist due to various disk anomalies, controller errors, firmware bugs or even environmental factors, like radiation or disk vibrations. Deduplication raises the impact of a single chunk corruption since a popular chunk can be referenced by a large number of files. Imagine a chunk that is referenced by 1000 files is lost due to a sector error; you would instantly suffer a 1000 file loss. Backup Support: We have support for fully-optimized backup using the in-box Windows Server Backup tool and we have several major vendors working on adding support for optimized backup and unoptimized backup. We have a selective file restore API to enable backup applications to pull files out of an optimized backup.

22 RD Virtualization Host Page 22 an optimized backup. Reporting and Detection: Any time the deduplication filter notices a corruption it logs it in the event log, so it can be scrubbed. Checksum validation is done on all data and metadata when it is read and written. Deduplication will recognize when data that is being accessed has been corrupted, reducing silent corruptions. Redundancy: Extra copies of critical metadata are created automatically. Very popular data chunks receive entire duplicate copies whenever it is referenced 100 times. We call this area the hotspot, which is a collection of the most popular chunks. Repair: A weekly scrubbing job inspects the event log for logged corruptions and fixes the data chunks from alternate copies if they exist. There is also an optional deep scrub job available that will walk through the entire data set, looking for corruptions and it tries to fix them. When using a Storage Spaces disk pool that is mirrored, deduplication will reach over to the other side of the mirror and grab the good version. Otherwise, the data will have to be recovered from a backup. Deduplication will continually scan incoming chunks it encounters looking for the ones that can be used to fix a corruption. Why do I want to use Data Deduplication with VDI? To start with: You will save space! Deduplication rates for VDI deployments can range as high as 95% savings. Of course that number will vary depending on the amount of user data, etc and it will also change over the course of any one day. Data Deduplication optimizes files as a post processing operation. That means, as data is added over the course of a day, it will not be optimized immediately and take up extra space on disk. Instead, the new data will be processed by a background deduplication job. As a result, the optimization ratio of a VDI deployment will fluctuate a bit over the course of a day, depending on home much new data is added. By the time next optimization is done, savings will be high again. Saving space is great on its own, but it has an interesting side effect. Volumes that were always too small, but had other advantages are suddenly viable. One such example are SSD volumes. Traditionally, you had to deploy very many of these drives to reach volume sizes that were viable for a VDI deployment. This was of course expensive for the disks, but also considering the increased needs for JBODs, power, cooling, etc. With Data Deduplication in the picture SSD based volumes can suddenly hold vastly more data and we can finally utilize more of their IO capabilities without incurring additional infrastructure costs. On the other hand, due to the fact that Data Deduplication consolidates files, more efficient caching mechanisms are possible. This results in improving the IO characteristics of the storage subsystem for some types of operations. As a result of these, we can often stretch the VM capacity of the storage subsystem without buying additional hardware or infrastructure. How do I deploy VDI with Data Deduplication in Windows Server 2012 R2 Preview then? This turns out to be relatively straight forward, assuming you know how to setup VDI, of course. The generic VDI setup will not be covered here, but rather we will cover how Data Deduplication changes things. Let s go through the steps: 1. Machine deployment First and foremost, to deploy Data Deduplication with VDI, the storage and compute responsibilities

23 RD Virtualization Host Page 23 First and foremost, to deploy Data Deduplication with VDI, the storage and compute responsibilities must be provided by separate machines. The good news is that the Hyper-V and VDI infrastructure can remain as it is today. The setup and configuration of both is pretty much unaltered. The exception is that all VHD files for the VMs must be stored on a file server running Windows Server 2012 R2 Preview. The storage on that file server may be directly attached disks or provided by a SAN/iSCSI. In the interest of ensuring that storage stays available, the file server should ideally be clustered with CSV volumes providing the storage locations for the VHD files. 2. Configuring the File Server Create a new CSV volume on the File Server Cluster using your favorite tool (we would suggest System Center Virtual Machine Manager). Then enable Data Deduplication on that volume. This is very easy to do in PowerShell: Enable-DedupVolume C:\ClusterStorage\Volume1 UsageType HyperV This is basically the same way Data Deduplication is enabled for a general file share, however it ensures that various advanced settings (such as whether open files should be optimized) are configured for the VDI workload. In the Windows Server 2012 R2 Preview one additional step has to be done that will not be required in the future. The default policy for Data Deduplication is now to only optimize files that are older than 3 days. This of course does not work for open VHD files since they are constantly being updated. In the future, Data Deduplication will address this by enabling Partial File Optimization mode, in which it optimizes parts of the file that are older than 3 days. To enable this mode in the Preview, run the following command Set-DedupVolume C:\ClusterStorage\Volume1 OptimizePartialFiles 3. VDI deployment Deploy VDI VMs as normal using the new share as the storage location for VHDs. With one caveat. If you made a volume smaller than the amount of data you are about to deploy on it, you need some special handling. Data Deduplication runs as a post-processing operation. Let us say we want to deploy 120GB of VHD files (6 VHD files of 20GB each) onto a 60 GB volume with Data Deduplication enabled. To do this, deploy VMs onto the volume as they will fit leaving at least 10GB of space available. In this case, we would deploy 2 VMs (20GB + 20GB + 10GB < 60GB). Then run a manual deduplication optimization job: Start-DedupJob C:\ClusterStorage\Volume1 Type Optimization Once this completes, deploy more VMs. Most likely, after the first optimization, there will be around 10GB of space used. That leaves room for another 2 VMs. Deploy these 2 VMs and repeat the optimization run.

24 RD Virtualization Host Page 24 optimization run. Repeat this procedure until all VMs are deployed. After this the default background deduplication job will handle future changes. 4. Ongoing management of Data Deduplication Once everything is deployed, managing Data Deduplication for VDI is no different than managing it for a general file server. For example, to get optimization savings and status: Get-DedupVolume fl Get-DedupStatus fl Get-DedupJob It may at times occur that a lot of new data is added to the volume and the standard background task is not able to keep up (since it stops when the server gets busy). In that case you can start a throughput optimization job that will simply keep going until the work is done: Start-DedupJob D: Type Optimization From <

Windows Server 2012 2,500-user pooled VDI deployment guide

Windows Server 2012 2,500-user pooled VDI deployment guide Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

70-415. Implementing a Desktop Infrastructure. Version: Demo. Page <<1/9>>

70-415. Implementing a Desktop Infrastructure. Version: Demo. Page <<1/9>> 70-415 Implementing a Desktop Infrastructure Version: Demo Page 1. Casos de Estudio Testlet 1 Case Study 1 Proseware Inc. The following testlet will present a Case Study followed by [count] multiple

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Windows Server 2012 Hyper-V support... 3 2. Hyper-V protection features... 3

More information

MOC 10324A: Implementing and Managing Microsoft Desktop Virtualization

MOC 10324A: Implementing and Managing Microsoft Desktop Virtualization MOC 10324A: Implementing and Managing Microsoft Desktop Virtualization Course Overview This course provides students with the knowledge and skills to implement and manage desktop virtualization solutions.

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010

More information

Windows Server 2012 授 權 說 明

Windows Server 2012 授 權 說 明 Windows Server 2012 授 權 說 明 PROCESSOR + CAL HA 功 能 相 同 的 記 憶 體 及 處 理 器 容 量 虛 擬 化 Windows Server 2008 R2 Datacenter Price: NTD173,720 (2 CPU) Packaging All features Unlimited virtual instances Per processor

More information

Implementing and Managing Microsoft Desktop Virtualization

Implementing and Managing Microsoft Desktop Virtualization Implementing and Managing Microsoft Desktop Virtualization Course 10324: 5 days, Instructor-led Course Description This five-day, instructor-led course provides you with the knowledge and skills to implement

More information

PassTest. Bessere Qualität, bessere Dienstleistungen!

PassTest. Bessere Qualität, bessere Dienstleistungen! PassTest Bessere Qualität, bessere Dienstleistungen! Q&A Exam : 70-693 Title : Windows Server 2008R2, Virtualization Administrator Version : Demo 1 / 6 1.You have a Windows Server 2008 R2 Hyper-V failover

More information

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft

More information

How To Live Migrate In Hyperv On Windows Server 22 (Windows) (Windows V) (Hyperv) (Powerpoint) (For A Hyperv Virtual Machine) (Virtual Machine) And (Hyper V) Vhd (Virtual Hard Disk

How To Live Migrate In Hyperv On Windows Server 22 (Windows) (Windows V) (Hyperv) (Powerpoint) (For A Hyperv Virtual Machine) (Virtual Machine) And (Hyper V) Vhd (Virtual Hard Disk Poster Companion Reference: Hyper-V Virtual Machine Mobility Live Migration Without Shared Storage Storage Migration Live Migration with SMB Shared Storage Live Migration with Failover Clusters Copyright

More information

High Availability with Windows Server 2012 Release Candidate

High Availability with Windows Server 2012 Release Candidate High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions

More information

broadberry.co.uk/storage-servers

broadberry.co.uk/storage-servers Established in 1989 Broadberry Data Systems have powered the worlds largest organisations for over 23 years, ranging from the top 10 universities in England to NASA and CERN. We re a leading manufacturer

More information

Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com

Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...

More information

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...

More information

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.pass4test.jp 1 年 で 無 料 進 級 することに 提 供 する Exam : 070-416 Title : Implementing Desktop Application Environments Vendor : Microsoft Version : DEMO 1 NO.1 Your

More information

Administration Guide - Virtual Server idataagent (Microsoft Hyper-V)

Administration Guide - Virtual Server idataagent (Microsoft Hyper-V) Page 1 of 83 Administration Guide - Virtual Server idataagent (Microsoft Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine

More information

VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014

VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Table of Contents Introduction.... 3 vsphere Architectural Overview... 4 SAN Backup

More information

Microsoft.Test-inside.70-669.v2013-11-28.by.ROD.239q

Microsoft.Test-inside.70-669.v2013-11-28.by.ROD.239q Microsoft.Test-inside.70-669.v2013-11-28.by.ROD.239q Number: 70-669 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Exam Code: 70-669 Exam Name: TS: Windows Server

More information

System Protection for Hyper-V User Guide

System Protection for Hyper-V User Guide User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication

Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Table of Contents Introduction... 3 Shortest Possible Backup Window... 3 Instant

More information

STORAGE SOURCE DATA DEDUPLICATION PRODUCTS. Buying Guide: inside

STORAGE SOURCE DATA DEDUPLICATION PRODUCTS. Buying Guide: inside Managing the information that drives the enterprise STORAGE Buying Guide: inside 2 Key features of source data deduplication products 5 Special considerations Source dedupe products can efficiently protect

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Virtualization and Windows 7

Virtualization and Windows 7 9 Chapter Virtualization and Windows 7 Information in this Chapter Windows XP Mode Many Forms of Virtualization Summary Windows Virtual PC is an optional component of Windows 7 Professional, Enterprise,

More information

Configuring a Microsoft Windows Server 2012/R2 Failover Cluster with Storage Center

Configuring a Microsoft Windows Server 2012/R2 Failover Cluster with Storage Center Configuring a Microsoft Windows Server 2012/R2 Failover Cluster with Storage Center Dell Compellent Solution Guide Kris Piepho, Microsoft Product Specialist October, 2013 Revisions Date Description 1/4/2013

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Data Deduplication: An Essential Component of your Data Protection Strategy

Data Deduplication: An Essential Component of your Data Protection Strategy WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING

More information

Maintaining a Microsoft Windows Server 2003 Environment

Maintaining a Microsoft Windows Server 2003 Environment Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.

More information

Dell Compellent Storage Center

Dell Compellent Storage Center Dell Compellent Storage Center Windows Server 2012 Best Practices Guide Dell Compellent Technical Solutions Group July, 2013 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN

More information

Windows Server 2012 Remote Desktop Services on NetApp Storage Implementation and Best Practice

Windows Server 2012 Remote Desktop Services on NetApp Storage Implementation and Best Practice Technical Report Windows Server 2012 Remote Desktop Services on NetApp Storage Implementation and Best Practice Rob Briggs March 2013 TR-4134i TABLE OF CONTENTS 1 Introduction... 5 1.1 Using this Document...5

More information

Implementing and Managing Microsoft Server Virtualization

Implementing and Managing Microsoft Server Virtualization Course 10215A: Implementing and Managing Microsoft Server Virtualization Course Details Course Outline Module 1: Evaluating and Planning for Virtualization Describe virtualization as it relates to server,

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Barracuda Backup Deduplication. White Paper

Barracuda Backup Deduplication. White Paper Barracuda Backup Deduplication White Paper Abstract Data protection technologies play a critical role in organizations of all sizes, but they present a number of challenges in optimizing their operation.

More information

Acronis Backup Deduplication. Technical Whitepaper

Acronis Backup Deduplication. Technical Whitepaper Acronis Backup Deduplication Technical Whitepaper Table of Contents Table of Contents Table of Contents... 1 Introduction... 3 Storage Challenges... 4 How Deduplication Helps... 5 How It Works... 6 Deduplication

More information

What s new in Hyper-V 2012 R2

What s new in Hyper-V 2012 R2 What s new in Hyper-V 2012 R2 Carsten Rachfahl MVP Virtual Machine Rachfahl IT-Solutions GmbH & Co KG www.hyper-v-server.de Thomas Maurer Cloud Architect & MVP itnetx gmbh www.thomasmaurer.ch Before Windows

More information

EMC VNXe File Deduplication and Compression

EMC VNXe File Deduplication and Compression White Paper EMC VNXe File Deduplication and Compression Overview Abstract This white paper describes EMC VNXe File Deduplication and Compression, a VNXe system feature that increases the efficiency with

More information

Understanding Microsoft Storage Spaces

Understanding Microsoft Storage Spaces S T O R A G E Understanding Microsoft Storage Spaces A critical look at its key features and value proposition for storage administrators A Microsoft s Storage Spaces solution offers storage administrators

More information

Best Practices for Deploying Citrix XenDesktop on NexentaStor Open Storage

Best Practices for Deploying Citrix XenDesktop on NexentaStor Open Storage Best Practices for Deploying Citrix XenDesktop on NexentaStor Open Storage White Paper July, 2011 Deploying Citrix XenDesktop on NexentaStor Open Storage Table of Contents The Challenges of VDI Storage

More information

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing

More information

10215A Implementing and Managing Microsoft Server Virtualization

10215A Implementing and Managing Microsoft Server Virtualization 10215A Implementing and Managing Microsoft Server Virtualization About this Course This five-day course will provide you with the knowledge and skills to deploy and manage a server virtualization environment

More information

Windows Server 2008 R2 Essentials

Windows Server 2008 R2 Essentials Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Windows Server 2008 R2 Hyper V. Public FAQ

Windows Server 2008 R2 Hyper V. Public FAQ Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6

More information

Hyper-V backup implementation guide

Hyper-V backup implementation guide Hyper-V backup implementation guide A best practice guide for Hyper-V backup administrators. www.backup-assist.ca Contents 1. Planning a Hyper-V backup... 2 Hyper-V backup considerations... 2 2. Hyper-V

More information

Windows Server 2012. RM Seminars spring 2013 - Windows Server 2012! (C) 2013 RM Education! 1! Agenda. Editions

Windows Server 2012. RM Seminars spring 2013 - Windows Server 2012! (C) 2013 RM Education! 1! Agenda. Editions Windows Server 2012 Andy McKay amckay@rm.com Agenda Server Manager Storage Spaces Data Deduplication VDI powered by RDS PowerShell 3.0 Hyper-V 3.0 SMB 3.0 Editions Datacenter Standard Essentials Foundation

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

For Hyper-V Edition Practical Operation Seminar. 4th Edition

For Hyper-V Edition Practical Operation Seminar. 4th Edition For Hyper-V Edition Practical Operation Seminar 4th Edition 3.5 for Hyper-V 1. ActiveImage Protector made available in 8 editions Server Edition Support for backup of server OS s, Windows 2000 or later,

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 31 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Hardware Configuration Guide

Hardware Configuration Guide Hardware Configuration Guide Contents Contents... 1 Annotation... 1 Factors to consider... 2 Machine Count... 2 Data Size... 2 Data Size Total... 2 Daily Backup Data Size... 2 Unique Data Percentage...

More information

Deploying Microsoft Hyper-V with Dell EqualLogic PS Series Arrays

Deploying Microsoft Hyper-V with Dell EqualLogic PS Series Arrays TECHNICAL REPORT Deploying Microsoft Hyper-V with Dell EqualLogic PS Series Arrays ABSTRACT This technical report details information and best practices for deploying Microsoft Hyper-V with Dell EqualLogic

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

PARALLELS CLOUD STORAGE

PARALLELS CLOUD STORAGE PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...

More information

my forecasted needs. The constraint of asymmetrical processing was offset two ways. The first was by configuring the SAN and all hosts to utilize

my forecasted needs. The constraint of asymmetrical processing was offset two ways. The first was by configuring the SAN and all hosts to utilize 1) Disk performance When factoring in disk performance, one of the larger impacts on a VM is determined by the type of disk you opt to use for your VMs in Hyper-v manager/scvmm such as fixed vs dynamic.

More information

Demystifying Deduplication for Backup with the Dell DR4000

Demystifying Deduplication for Backup with the Dell DR4000 Demystifying Deduplication for Backup with the Dell DR4000 This Dell Technical White Paper explains how deduplication with the DR4000 can help your organization save time, space, and money. John Bassett

More information

STORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside

STORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among

More information

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała Data Deduplication in Tivoli Storage Manager Andrzej Bugowski 19-05-2011 Spała Agenda Tivoli Storage, IBM Software Group Deduplication concepts Data deduplication in TSM 6.1 Planning for data deduplication

More information

Turbo Charge Your Data Protection Strategy

Turbo Charge Your Data Protection Strategy Turbo Charge Your Data Protection Strategy Data protection for the hybrid cloud 1 WAVES OF CHANGE! Data GROWTH User EXPECTATIONS Do It YOURSELF Can t Keep Up Reliability and Visibility New Choices and

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge

More information

Virtualizing Enterprise Desktops and Apps

Virtualizing Enterprise Desktops and Apps Course 20694B: Virtualizing Enterprise Desktops and Apps Page 1 of 6 Virtualizing Enterprise Desktops and Apps Course 20694B: 4 days; Instructor-Led Introduction This four-day, hands-on training course

More information

Backup and Recovery Best Practices With CommVault Simpana Software

Backup and Recovery Best Practices With CommVault Simpana Software TECHNICAL WHITE PAPER Backup and Recovery Best Practices With CommVault Simpana Software www.tintri.com Contents Intended Audience....1 Introduction....1 Consolidated list of practices...............................

More information

Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2

Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 1 Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 Contents Chapter 1 Data migration method:... 3 Chapter

More information

ReadyRECOVER. Reviewer s Guide. A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect

ReadyRECOVER. Reviewer s Guide. A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect ReadyRECOVER Reviewer s Guide A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect Table of Contents NETGEAR Contact Info... 3 Product Category... 3 Overview... 3 ReadyRECOVER...

More information

Implementing and Managing Microsoft Desktop Virtualization 10324 en

Implementing and Managing Microsoft Desktop Virtualization 10324 en Implementing and Managing Microsoft Desktop Virtualization 10324 en Course Outline Module 1: Overview of Desktop Virtualization Scenarios Many organizations are exploring the use of virtualization to optimize

More information

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc. with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications

More information

Vembu BDR v2.0.2. Release Notes. Major features in v2.0.2. Other features in Vembu BDR. Cloud Disaster Recovery Service. VMware UltraBlaze.

Vembu BDR v2.0.2. Release Notes. Major features in v2.0.2. Other features in Vembu BDR. Cloud Disaster Recovery Service. VMware UltraBlaze. Vembu BDR v2.0.2 Release Notes Vembu BDR v2.0.2 is now publicly released and is available for production deployments with new features and more bug fixes which improves the stability and performance. Also,

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

User Guide - Exchange Public Folder idataagent

User Guide - Exchange Public Folder idataagent Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT

More information

Barracuda Backup Vx. Virtual Appliance Deployment. White Paper

Barracuda Backup Vx. Virtual Appliance Deployment. White Paper Barracuda Backup Vx Virtual Appliance Deployment White Paper DOCUMENT SCOPE This document provides guidance and best practices on designing and deploying Barracuda Backup Vx Virtual Appliance on VMware

More information

Enterprise Backup and Restore technology and solutions

Enterprise Backup and Restore technology and solutions Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013

More information

Powered by Windows Server 2012

Powered by Windows Server 2012 Firewall Powered by Windows Server 2012 Desktop sessions Pooled VMs Personal VMs 1 platform 1 experience 3 deployment choices Corporate Office Branch Office Home Public Location Use a scale-out file server

More information

LDA, the new family of Lortu Data Appliances

LDA, the new family of Lortu Data Appliances LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology

More information

Storage Windows Server 2012

Storage Windows Server 2012 Storage Windows Server 2012 Table of contents Copyright information... 3 Introduction... 4 Windows Server 2012: Vast Storage Capabilities for Everyone... 4 Feature and Capability Summary... 4 Storage...

More information

NSS Volume Data Recovery

NSS Volume Data Recovery NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management

More information

Tandberg Data AccuVault RDX

Tandberg Data AccuVault RDX Tandberg Data AccuVault RDX Binary Testing conducts an independent evaluation and performance test of Tandberg Data s latest small business backup appliance. Data backup is essential to their survival

More information

Windows Server 2012 R2 VDI - Virtual Desktop Infrastructure. Ori Husyt Agile IT Consulting Team Manager orih@agileit.co.il

Windows Server 2012 R2 VDI - Virtual Desktop Infrastructure. Ori Husyt Agile IT Consulting Team Manager orih@agileit.co.il Windows Server 2012 R2 VDI - Virtual Desktop Infrastructure Ori Husyt Agile IT Consulting Team Manager orih@agileit.co.il Today s challenges Users Devices Apps Data Users expect to be able to work in any

More information

WHITE PAPER. Permabit Albireo Data Optimization Software. Benefits of Albireo for Virtual Servers. January 2012. Permabit Technology Corporation

WHITE PAPER. Permabit Albireo Data Optimization Software. Benefits of Albireo for Virtual Servers. January 2012. Permabit Technology Corporation WHITE PAPER Permabit Albireo Data Optimization Software Benefits of Albireo for Virtual Servers January 2012 Permabit Technology Corporation Ten Canal Park Cambridge, MA 02141 USA Phone: 617.252.9600 FAX:

More information

Microsoft. Remote Desktop Services. November 2013

Microsoft. Remote Desktop Services. November 2013 Microsoft Remote Desktop Services November 2013 Who? Technology Consulting and Support Content Developer, Technical Reviewer Presenter, RDS, Hyper-V, System Center JWUG Event co-ordinator Ronnie Isherwood

More information

Hardware/Software Guidelines

Hardware/Software Guidelines There are many things to consider when preparing for a TRAVERSE v11 installation. The number of users, application modules and transactional volume are only a few. Reliable performance of the system is

More information

Deployment Guide: Unidesk and Hyper- V

Deployment Guide: Unidesk and Hyper- V TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview

More information

Trends in Enterprise Backup Deduplication

Trends in Enterprise Backup Deduplication Trends in Enterprise Backup Deduplication Shankar Balasubramanian Architect, EMC 1 Outline Protection Storage Deduplication Basics CPU-centric Deduplication: SISL (Stream-Informed Segment Layout) Data

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Integration Guide: Using Unidesk 3.x with Citrix XenDesktop

Integration Guide: Using Unidesk 3.x with Citrix XenDesktop TECHNICAL WHITE PAPER Integration Guide: Using Unidesk 3.x with Citrix XenDesktop This document provides a high- level overview of the Unidesk product as well as design considerations for deploying Unidesk

More information

INTEGRATING APP-V WITH MICROSOFT VDI

INTEGRATING APP-V WITH MICROSOFT VDI INTEGRATING APP-V WITH MICROSOFT VDI 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet

More information

PassTest. Bessere Qualität, bessere Dienstleistungen!

PassTest. Bessere Qualität, bessere Dienstleistungen! PassTest Bessere Qualität, bessere Dienstleistungen! Q&A Exam : 74-409 Title : Server Virtualization with Windows Server Hyper-V and System Center Version : Demo 1 / 11 1.You administer a Windows Server

More information

Microsoft 20694 - Virtualizing Enterprise Desktops and Apps

Microsoft 20694 - Virtualizing Enterprise Desktops and Apps 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20694 - Virtualizing Enterprise Desktops and Apps Length 5 days Price $4169.00 (inc GST) Version B Overview This five-day, hands-on training course is designed

More information

Webinar Windows Storage Server. June, 2013 Prepared By: Brian Verenkoff Director of Marketing

Webinar Windows Storage Server. June, 2013 Prepared By: Brian Verenkoff Director of Marketing Webinar Windows Storage Server June, 2013 Prepared By: Brian Verenkoff Director of Marketing Agenda TeraStation Lineup Overview WSS Overview and Advantages WSS Model Differences WSS 5000 Lineup Data Deduplication

More information

SOLUTION GUIDE AND BEST PRACTICES

SOLUTION GUIDE AND BEST PRACTICES SOLUTION GUIDE AND BEST PRACTICES Last Updated December 2012 Solution Overview Combine the best in bare-metal backup with the best in remote backup to offer your customers a complete disaster recovery

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Virtual desktops made easy

Virtual desktops made easy Product test: DataCore Virtual Desktop Server 2.0 Virtual desktops made easy Dr. Götz Güttich The Virtual Desktop Server 2.0 allows administrators to launch and maintain virtual desktops with relatively

More information

Installing Windows XP Professional

Installing Windows XP Professional CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows

More information