The Next-Generation Virtual Data Center
|
|
|
- Rosaline Chambers
- 10 years ago
- Views:
Transcription
1 The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott
2 Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization in the Data Center... 1 Power Savings... 1 Hardware Utilization and Costs... 2 Workload Balancing... 3 Tr ansitioning to a Virtual Data Center... 3 Migration... 4 Maintaining Uptime... 4 Current Trends for Future Results... 4 i
3 Copyright Statement 2009 Realtime Publishers, Inc. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers, Inc. (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers, Inc or its web site sponsors. In no event shall Realtime Publishers, Inc. or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at [email protected]. ii
4 The Next Generation Virtual Data Center The next generation virtual data center represents the culmination of virtualization technologies into a consolidated virtual enterprise data center. In mission critical data center environments, the costs of maintaining the highest levels of uptime can be extreme. By introducing virtualization into the data center, there are several key benefits that become immediately obvious. In fact, the data center concept started virtually on the mainframe. The term hypervisor was originally used to describe the multiple user time slicing technology used on the big iron from which the current virtual to physical interface technologies get their name. There are many reasons that enterprises have started to look at virtualization in the data center. In order to understand the reasons for enterprises to transition to a virtual data center, there needs to be an analysis first of the costs. Benefits of Virtualization in the Data Center The transition to virtual servers has been shown to lead to a drastic decrease in the number of physical servers. Server consolidation is a large part of the cost savings, but it isn t the only factor. Outside of the costs of the infrastructure components themselves, which will decrease for the same server workloads through virtualization, the largest costs in the data center are power, rack space, and bandwidth. The first two items are where the costs associated with data center environments will decrease most sharply. Power Savings Through consolidation and the greater utilization of existing server hardware, the number of physical servers can be reduced to 10 percent or less of the initial servers in the environment. The power cost calculations in the first part of this series provided a means to determine the savings by reduction of hardware. It didn t, however, discuss the unique needs of a data center with regard to power requirements for cooling. What also hasn t been discussed at length is the physical space required to house an enterprise server farm. A decrease in hardware by 90% quite simply allows the same server workload to occupy one rack where it previously needed ten. Whether the servers are physical or virtual, the bandwidth needs won t vary. Each application and role will have requirements for the level of service needed. Bandwidth will be dependent on this factor alone. Power, however, is a variable that will change greatly when transitioning from physical to virtual followed by rack space. 1
5 A typical data center will allocate power to a rack or cage based on the needs of the server hardware inside. When physical servers increase in number, so do the needs to power all the components in them. In a virtual data center, the physical hardware is greatly reduced as a result of the server consolidation taking place during the migration to virtual servers. The increased power demands of the individual servers themselves will increase as the result of more processors and processor cores or additional RAM; however, the overall server power loads will be decreased because several components are not duplicated such as network cards, video hardware, motherboards, and so on. Additionally, modern servers capable of virtualization are designed to efficiently share physical resources for use by virtual server workloads. By embracing a virtualization strategy, a data center environment becomes much more efficient. Hardware Utilization and Costs When virtualizing the servers in the data center, each investment in server hardware will be able to be fully utilized. The abundance of cheap processing power has enabled businesses to buy much more server than they need for even the most basic of roles. Even the lowest end servers available are overkill for basic infrastructure services. Infrastructure servers such as those running DNS or DHCP typically require very little power to perform effectively, but separating those roles is important because so many services rely on them working correctly. In the virtual data center, these infrastructure services can maintain the separation they need while still operating within the confines of a single server. Hardware utilization is key to the savings in a virtual data center. By making more efficient use of physical hardware, the virtual data center environment results in a significant decrease in physical servers. What the virtual data center also does is create a cost effective option for high availability and fault tolerance. The use of high performance shared storage is crucial to keeping costs low and performance high. Traditionally, Storage Area Networks (SANs) have not been used for servers to boot from. Although boot from SAN support has been built in to modern operating systems (OSs) as far back as Windows 2000, the difficulty in managing the solutions based on it has led to low adoption. With virtualization, the ability to run entire virtual guest OSs on the SAN without tying them directly to the host servers has rapidly increased adoption. Less costly iscsi SANs have begun to supplant Fibre Channel in the data center. These disk subsystems are the backbone of the nextgeneration virtual data center. 2
6 Workload Balancing Workload balancing is another concept that the virtual data center has brought into the mainstream. With workload balancing, the next generation virtual data center can cost effectively allow workloads to be balanced between physical and virtual hosts in any combination. In a properly designed workload balancing scenario, resources can be dynamically provisioned for virtual servers. As the demands on a particular workload increase, the available resources can be shifted. Current technologies do not support this while the virtual servers are running, but platform changes are in development that will enable hot adding of virtual CPUs and RAM. The next generation data center hardware already has support for virtualization built in, but the maturity of the virtualization platforms and the awareness of being virtualized allow modern OSs to better capitalize on the benefits of virtualization. OSs now have API support built in, which enable solutions to be constructed for management of virtual servers. This low level support gives developers the flexibility to write the tools necessary for this task. One additional clear cost advantage of moving to a virtual data center is the licensing model now embraced by the major platform vendors. Early enterpriselevel virtualization platforms were often more expensive than the servers on which they ran. However, the trend toward free or low cost platforms has dominated in recent years, setting up the current revolution in adoption. Now, an enterprise doesn t have to choose the most powerful servers on which to host virtual workloads just to save on software costs. Even server OS licensing has been a factor in virtualization with vendors offering additional single and multiple copies of the latest products meant just for virtualization. Transitioning to a Virtual Data Center The provisioning of new virtual servers in the virtual data center is a process that is so elegant in its simplicity it s almost hard to believe. The nature of virtual disks make them portable, so entire libraries of testing, development, and production baseline servers can be created for nearly instantaneous deployment. Building a new virtual server doesn t require the costly and stringent controls that a physical system does. This work has already been done for each of the baseline virtual machines. The hardware independence of the virtual servers makes the compatibility testing unnecessary. From a software standpoint, once a perfect example server is built virtually, it can be duplicated instantly. There are no slight variations in OS platforms such as different patch levels that can create enormous challenges to maintaining a mission critical data center environment. 3
7 Migration The migration process can take many different forms, but there is truly only one data center solution for migration. The enterprise customer migrating to a virtual data center must be able to do so without downtime or interruption to the live environment. The migration solution must be able to analyze the running production workloads, profile them, provision appropriate virtual servers, and incrementally migrate the workloads at a time when it is most advantageous for the company with the least impact on IT personnel who will performing the migration. Maintaining Uptime In order for a migration from a physical data center to a virtual one to be successful, it must not allow for extended downtime. This is perhaps the largest hurdle facing IT managers considering virtualization. They already understand the benefits of virtualization, but have to ensure that the transition does not adversely affect availability. The virtual data center requires a sophisticated set of tools and applications to transition from physical to virtual workloads. In order for a missioncritical data center to exist virtually and make the most of the investments in hardware and software, it is crucial to know exactly what workloads can and should be migrated and how to do so. There are a few next steps required in moving to virtualization in the nextgeneration data center. The workload analysis and profiling done during the process of consolidation will play a critical role when transitioning to virtualization in the data center. You must then determine the availability needs of each workload and the architecture needed to support those goals. Using third party software tools to gain this level of insight into the workloads is vital. Current Trends for Future Results Current trends towards the virtual data center are driving the development of specialized software to make the transition from physical to virtual as seamless as possible. The state of the art solutions available now allow for automated distribution of workloads and effective migrations from physical to virtual. The future virtual data center takes this one step further by introducing a cloud computing model to virtualization. By building on the tools available now, enterprises can plan for a completely distributed virtual data center where workloads can exist anywhere. The future virtual data center platforms will be aware of where these workloads exist, and how to manage them in an automated fashion in the event of any number of disasters. Much like the workflow of any project, the future virtual data center, in terms of availability and recovery models, can be built to handle any number of circumstances. 4
8 Future virtual data centers will need to be able to dynamically shift workloads between servers and virtual servers between physical hosts much like routers choose the best way to route traffic over the Internet. Without virtualization, this idea simply isn t possible. By analyzing the current workloads and trending future utilization, software tools will greatly increase the performance and efficiency of these systems. The human intervention that is core to the current virtualization implementations in the data center will be greatly diminished. As enterprises look to cut cost and increase uptime, the future of the data center becomes apparent in virtualization. 5
Virtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
Why Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
The Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
Realizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
Using Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime
Controlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Data Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
How Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones, Series Editor For
Becoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
The Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
The Definitive Guide to Cloud Acceleration
The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential
The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
How to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
How the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
Collaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
The Shortcut Guide To. Implementing Virtualization in the Small Environment. Greg Shields
tm The Shortcut Guide To Implementing Virtualization in the Small Environment Greg Shields Ch apter 2: What Business Benefits Will I Recognize from Implementing Virtualization?... 16 Why Should My Budget
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Auditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2
Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan
tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 4: Putting It All Together Recovery Management Scenarios for Small Businesses to Emerging Enterprises... 48 Different Business
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan
tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 3: Top-5 Operational Challenges in Recovery Management and How to Solve Them.. 33 Challenge 1: Scheduling and Monitoring...
Quickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
Windows Server Virtualization An Overview
Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.
Virtualization with Microsoft Windows Server 2003 R2, Enterprise Edition
Virtualization with Microsoft Windows Server 2003 R2, Enterprise Edition Microsoft Corporation Published: March 2006 Abstract Virtualization in the volume server market is starting to see rapid adoption
Isolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
Eradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
The Shortcut Guide To. Architecting iscsi Storage for Microsoft Hyper-V. Greg Shields
tm The Shortcut Guide To Architecting iscsi Storage for Microsoft Hyper-V Ch apter 2: Creating Highly Available Hyper V with iscsi Storage... 16 Th e Windows iscsi Initiator: A Primer... 17 NIC Teaming...
solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?
solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? CA Capacity Management and Reporting Suite for Vblock Platforms
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
can you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database
An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always
An Oracle White Paper August 2011. Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability
An Oracle White Paper August 2011 Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability Note This whitepaper discusses a number of considerations to be made when
Organized, Hybridized Network Monitoring
Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
