Skip to main content

Videos: NPIV SAN integration and Microsoft Virtualization

Server virtualization solutions allow enterprises to aggregate server workloads within their physical server platform and improve agility of virtual machine migration across physical systems. Platform virtualization solutions create new economy of scale and dynamic configuration challenges for storage area network (SAN) integration.This session details key integration and management dimensions around the core Windows operating system, Virtual Server, future Windows virtualization, and Virtual Machine Manager. The ANSI T11 N-Port ID Virtualization (NPIV) standard extends a powerful complementary capability to associate multiple virtual N_Ports to a single hardware-based N_Port over the same FC switch connection. Through this standard the SAN-managed controls around zones and masks can be coordinated and specific SAN resources mapped to different virtual machine workloads while maintaining SAN best practices. Microsoft will discuss key platform virtualization design criteria and fundamental values for ecosystem compatibility and next steps for standards and extending capabilities. Emulex will join Microsoft to describe their NPIV-based HBA solution that provides administrators improved deployment, migration, and management capabilities.


Here is the link. WinHec it surely is a wealthy resource for professionals. And there are a lot of vids out there on ShowTime, but I guess you will go hunting for yourself now, won't you?

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op