/
Dan Stolts Dan Stolts

Dan Stolts - PowerPoint Presentation

phoebe-click
phoebe-click . @phoebe-click
Follow
366 views
Uploaded On 2016-10-11

Dan Stolts - PPT Presentation

ITProGuru Chief Technology Strategist US DX North East Audience dstoltsMicrosoftcom Blog ITProGurucom Virtualization amp Datacenter Operations and Management of the future Abstract ID: 474227

business server virtual host server business host virtual management microsoft cloud windows hyper amp storage technology fabric services guest

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Dan Stolts" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Dan Stolts

(@ITProGuru)Chief Technology StrategistUS DX North East – Audiencedstolts@Microsoft.comBlog: ITProGuru.com

Virtualization & Datacenter Operations and Management of the futureSlide2

Abstract

Virtualization & Datacenter Operations and Management of the futureTechnology is changing at a breathtaking pace! Major security landscape changes, Client and Server OS changes, Hybrid and Cloud technology changes and much more. All of this puts an increased burden on IT. Our need to translate business problems into technology solutions put an even greater stress on IT. We are forced to keep up with the changes in business and technology. What are some of these changes and how should we respond to them? In this session, we will demystify the future of IT and datacenter operations. Windows Server 2016 and the cloud will play an increasing role in helping us meet the challenges of our new IT landscape. Come to this session to have a look at the near future as well as the soon to be released tools to help us meet these challenges. On this journey, we will also get a sneak peek of the next version of Windows Server… Windows Server 2016.Slide3

2016 CIO Priorities & Challenges

Talent has now been recognized globally as the single biggest issue standing in the way of CIOs achieving their objectives.The biggest talent gaps are around information — big data, analytics, and informationmanagement — followed by business knowledge/acumen. http://www.gartner.com/imagesrv/cio/pdf/cio_agenda_insights_2016.pdfSlide4

Short Story…Protecting Elephants and other endangered …Slide5

CHALLENGE

Fujitsu is the world’s fourth-largest IT services provider with approximately

162,000

employees in more than

100

countries and holds about

97,000

patents worldwide. Fujitsu wanted to help dairy farmers

increase production

, improve

data insights

and

transform

their

business

by optimizing the timing of artificial insemination (AI). It also wanted to decrease loss through early detection of health issues.

Improves calf production up to 31%, with an average of 12%Modernizes data access with mobile phone alerts, reducing labor costs for monitoring cowsTransforms herd management by allowing farmers to increase chances of producing a male or female calfReduces loss by detecting 8-10 different kinds of diseases in cattle

BENEFITS

SOLUTION

Fujitsu learned from public research that a cow produces more estrus (goes into heat) 16 hours after the number of steps increases significantly. The company created an

innovative solution which uses a rugged pedometer with a five-year battery to measure the number of footsteps a cow takes, then sends that data to the cloud for analysis to determine optimum AI timing and even affect calf gender. In addition, the patterns of steps can detect disease in cattle. Alerts are delivered to the farmer’s cell phone.

FUJITSU

The connected cow: Using IoT to transform cattle productionSlide6

The Talent Problem

Get Smart on the business!

Get Smart on Technology!Slide7

Who is best suited to do the mapping between Business Problem and Technology Solution?

CEO / CFO / CXOCIO / Director of ITManagers / Business Unit LeadersIT Managers / System Designers / Architects / Engineers

Where do YOU

fit?Who understands

how

Technology

can be used to Solve Business Problems?Slide8

Translating Business Problem to Technology Solution Often Really HARD!!!

Business ProblemAKA: Functional RequirementsAddresses a business need or opportunityLanguage: Business (vision, strategic mission, objectives, processes)Often many problems are manifests so root problem often difficult to identifyPeople who understand the business typically not smart about technologyPerspective: Business climate, emerging industry issues, culture, business aimWhat are the usability implicationsTechnology SolutionAKA: Technical RequirementsAddresses a technology challengeLanguage: Technology (Programming, Infrastructure, Cloud, IoT)Often many solutions are required to solve one business problem Solve for y = ((x + 2) * (x + 7) )/ 127 People who understand technology often do not understand business challengesPerspective: Technology Available, technical skills, technical resourcesWhat are the Security ImplicationsTwo trains leave different cities heading toward each other at different speeds. When and where do they meet?Train A, traveling 70 miles per hour (mph), leaves Westford heading toward Eastford

, 260 miles away.

At the same time Train B, traveling 60 mph, leaves

Eastford

heading toward Westford.

When do the two trains meet?

How far from each city do they meet?

http://mathforum.org/dr.math/faq/faq.two.trains.htmlSlide9

Architect Defined

Noun: 1. a person who designs and in many cases also supervises construction2. the deviser, maker, or creator of anything: the architects of the Constitution of the United States.Verb:4. to plan, organize, or structure as an architect: The house is well architected.Take Challenge <=> Create SolutionSlide10

But…Your Help Is Needed!!!!

At the speed at which technology changes, it is impossible for a person CIO or even a small number of people (Architects) to Solve All Business Needs. Slide11

Provide Business Units The Service(s) and Solutions They NeedOr…

Your Business Unit Will…Lose MoneyNot Hit Their NumbersGo Around You!Find a SolutionHost it in the cloudStray from policy and proceduresYou WILL …Miss OpportunityLose ControlLose VisibilityLose ManagementStill be RESPONSIBLE if the $%^&* hits the fan!!!Lose your SANITY? Your JOB?AKA: Shadow ITSlide12

Translate Business Objectives Into Actions

Identify Problems (especially root problems)Determine the requirements to solve each problemDetermine technology available to help solve the problemIdentify strategic partnersDetermine likely barriersDetermine additional value (if any)Get StartedSlide13

Complicating The Situation…

Business Units are accustomed to …IT coming up with objectionsIT not understanding needsIT Not delivering in a timely fashionIT as a barrier to progress….Why?Poorly formulated planDoes not follow proceduresNot enough time Don’t have the right skills….We Need to get their confidence backGet them to engage you early then OVER DELIVER for a few years!Slide14

Considerations / NEED TO KNOW!

Vision or Strategic MissionBenefit to the business and companyLongevity of solutionUser ImpactSystems & Business Impact (pro’s and con’s)How it is RELATED to other business challengesHow it is RELATED to other technology solutionsIdentify stakeholders – All may not be obviousSecurity ImplicationsBudget????Slide15

Driving Business ImpactDon’t wait for a business challenge to land in your lap.. Go FIND IT!Slide16

What’s Possible?Business Impact &

Career ImpactSlide17

What’s Possible?Microsoft Want’s to help you create what is possible for your company!

Solve Current problemsCreate New RevenueGenerate New Customer Base…New Opportunities that nobody has thought of?The people in this room, CAN and SHOULD Make A Difference byArchitecting What’s PossibleSlide18

Identifying What is Possible?Ask Yourself or Business Unit Leader…

What challenges are you facing?How are we falling behind the competition?How can you deliver services faster?How can you help the company continue expansion?How can you increase customer satisfaction or retention?  What are current pain points for…Customers? Partners? Employees?What new services (cloud, mobile) might your business benefit from?Projects on a shelf for lack of infrastructure or money?Vision + New Cloud Solution = Success!@ITProGuruSlide19

Brainstorming / Team Workshop (60 min)Or… ¼ or ½ day workshops

HintsCollaborationCloudMobileIoTDatacenterMerger/AcquisitionSave MoneyIncrease RevenueBusiness Unit OppEmployeeCustomerPartnerSupplierCollaborate!Slide20

Dedicate Time Each Week

Understanding the BusinessKeeping up with Technology5%10%15%MorePersonal TimeSlide21

EVOLUTION OF DATACENTER

EFFICIENCY

CLOUD-FIRST

APPLICATIONS AND SERVICES

INFRASTRUCTURE

How much remains un-virtualized?

Why is the business using shadow IT?

Why is my CIO looking at agile alternatives?

Why is investment in apps growing so much faster than IT?

We want you to be at the center of application innovationSlide22

Introduced

virtualization platform/ managementIndustry-leading scale and performance

Azure as

design point

Cloud-first

innovation:

Infrastructure

and application

platform

Windows Server 2008

System Center 2008

Windows Server 2012

System Center 2012

Windows Server 2012 R2

System Center 2012 R2

Microsoft Azure

Windows Server 2016System Center 2016

Microsoft Azure

Looking aheadSlide23

Opportunity to rethink your datacenter: Think services, not servers

Traditional datacenter

Tight coupling between infrastructure and apps

Expensive, vertically integrated hardware

Silo-

ed

infrastructure and operations

Highly customized processes and configurations

Microsoft Azure datacenter

Loosely coupled apps and micro-services

Industry-standard hardware

Service-focused DevOps

Standardized processes and configurationsSlide24

Platform Services

Security & ManagementInfrastructure ServicesCompute

Storage

Datacenter Infrastructure (24 Regions, 19 Online)

Web and Mobile

Web Apps

Mobile

Apps

API

Management

API

Apps

Logic

Apps

Notification

Hubs

Media & CDN

Content Delivery

Network (CDN)

Media

ServicesAnalytics & IoT

HDInsightMachineLearning

Stream

Analytics

Data

Factory

Event

Hubs

Mobile

Engagement

Active

Directory

Multi-Factor

Authentication

Automation

Portal

Key Vault

Integration

Biztalk

Services

Hybrid

Connections

Service

Bus

Storage

Queues

Store /

Marketplace

Hybrid

Operations

Backup

StorSimple

Site

Recovery

Import/Export

Networking

Data

SQL

Database

DocumentDB

Redis

Cache

Search

Tables

SQL Data

Warehouse

Azure AD

Connect Health

Virtual Network

Express

Route

BLOB Storage

Azure Files

Premium Storage

Virtual Machines

AD Privileged

Identity

Management

Traffic Manager

Application Gateway

Operational

Insights

Compute

Cloud

Services

Batch

Remote App

Service

Fabric

Developer Services

Visual Studio

Application

Insights

Azure SDK

Team Project

Containers

VM Image Gallery

& VM Depot

DNS

VPN Gateway

Load BalancerSlide25

Example: Azure Certification Jump Start

70-534 Architecting Microsoft Azure Solutions8:00 Registration, Breakfast and Networking8:30 Sharp: 70-534 IntroductionExam Tips and TricksDesign Microsoft Azure infrastructure and networking (15–20%)Secure resources (15–20%)Design an advanced application (15–20%)Lunch & Labs Design websites (15–20%)Design an application storage and data access strategy (15–20%)Design a management, monitoring, and business continuity strategy (15–20%)Field Experiences5:00pm Book Signing – Authors Dan Stolts5:00pm Social Hour w/ Dan Stolts and FriendsRegistration Required

ITProGuru.com/Join

All Attendees Go Home With The Book & Autograph!!!

Brought to you By:

@ITProGuru

Microsoft

http://www.amazon.com/dp/0735697442/ref=rdr_ext_tmbSlide26

Microsoft Azure Infrastructure

24

Regions ONLINE…huge datacenter capacity around the world…and we’re growing

100+ datacenters

One of the top 3 networks in the world (coverage, speed, connections)

2 x AWS and 6x Google number of offered regions

G Series – Largest VM available in the market – 32 cores, 448GB Ram, SSD…

Operational

Announced

Central US

Iowa

West US

California

North Europe

Ireland

East US

Virginia

East US 2

Virginia

US

Gov

Virginia

North Central US

Illinois

US

Gov

Iowa

South Central US

Texas

Brazil South

Sao Paulo

West Europe

Netherlands

China North *

Beijing

China South *

Shanghai

Japan East

Saitama

Japan West

Osaka

India West

TBD

India East

TBD

East Asia

Hong Kong

SE Asia

Singapore

Australia West

Melbourne

Australia East

Sydney

* Operated by 21VianetSlide27

VMware Comparison

SystemResourceWindows Server 2012 R2 Hyper-VvSphereHypervisorvSphere 5.1 Enterprise PlusvSphere 5.5 Enterprise PlusHost

Logical Processors

320

320

160

320

Physical

Memory

4TB

4TB

2TB

4TB

Virtual CPUs per Host

2,048

4,0962,048

4,096VMVirtual CPUs per VM648641641Memory per VM1TB1TB1TB1TBActive VMs per Host1,024512

512

512Guest NUMAYesYesYesYesCluster

Maximum Nodes64N/A2N/A32Maximum VMs8,000

N/A2N/A4,000Want more a more detailed technical comparison? Visit http://aka.ms/CompareTovSphere Slide28

SCALE

64 vCPU per VM1TB RAM per VM4TB RAM per host320 LP per host64 TB VHDX1024 VMs per hostvNUMA

AGILITY

Dynamic memoryLive migration

LM with compression

LM over SMB direct

Storage LM

Shared nothing LM

Cross-version LM

Hot add/resize VHDX

Storage

QoS

Live VM export

AVAILABILITY

Host clustering

64 node clusters

Guest clusteringShared VHDXHyper-V replicaNETWORKINGIntegrated network virtualNetwork virtual gatewayExtended port ACLsvRSSDynamic teamingHETEROGENEOUSLinuxFreeBSD

AND MORE…

Gen 2 VMsEnhanced sessionAuto VM activationThe Windows Server story so far…

Built in.Slide29

Security and isolationSlide30

Emerging security threats

Rising number of organizations suffering from breaches

Cybercrime costs US economy up to $140 billion annually, report says

Los Angeles Times [2014]

How hackers allegedly stole “unlimited” amounts of cash

from banks in just

a few hours

Ars

Technica

[2014]

The biggest

cyberthreat

to companies

could come

from the inside

Cnet

[2015]

Cyberattacks on

the rise against US corporationsNew York Times [2014]

Espionage malware infects

rafts of governments,

industries around the world

Ars

Technica

[2014]

Forget carjacking, soon it will be

carhacking

The Sydney Morning

Herald [2014]

Malware burrows deep into computer BIOS to escape AV

The Register

[September 2014]

Bigger

motivations

2

Increasing

incidents

1

Bigger

risk

3

1

1

2

2

3

3

3

Need more or more recent samples… http://www.privacyrights.org/data-breach/newSlide31

We know that administrators have the keys to the kingdom; we gave them those keys decades ago

But those administrators privileges are being compromised through social engineering, bribery, coercion, private initiatives … each of these attacks seeks out & exploits privileged accounts.Central risk: Administrator privileges

Stolen admin

credentials

Insider

attacks

Phishing

attacksSlide32

Conclusion: change the way we think about security

We have to “assume breach” – not a position of pessimism, one of security rigorProblemA breach will (already did?) happen

Lacking the security-analysis manpowerCan’t determine the impact of the breach

Unable to adequately respond to the breach

New approach

(in addition to ‘prevention’)

Limit or block the breach from spreading

Detect the breach

Respond to the breachSlide33

Virtual machine

OS

Data

Workload

Compute

Storage

Network

Hypervisor

Fabric

Host Guardian Service

Enabler to run Shielded

Virtual

Machines on

a legitimate host in the fabric

Shielded VM

Bitlocker enabled VM

Virtual Secure Mode

Process and Memory access protection from the host

Any seized or infected host administrators can access

guest virtual machines

Impossible to identify

legitimate hosts without a hardware based verification

Tenants VMs are exposed to storage and network attacks while unencrypted

Protect virtual machines

Microsoft’s approach

Hardware-rooted technologies

to separate the guest operating system from host administrators

Guarded fabric to identify legitimate hosts and certify them to run shielded tenant VMs

Virtualized trusted platform module (

vTPM

) support to encrypt virtual machines

Host Guardian Service

Fabric

Hypervisor

Customer

Hypervisor

Fabric

Storage

Host OS

Customer

Guest VM

Trust

the host

Guest VMSlide34

A privileged fabric

1

Hyper-V hosts

Virtual machines

Spread of virtualization has led to unexpected security implications

2

3

4

Tenant

virtual

machines

Fabric/virtualization administrators

Have the highest privileges, instead of the traditional model where domain administrators are the most trusted IT staff

1

2

Virtualized domain controllers

If DCs are virtualized and I’m a Hyper-V administrator, I can shut down the VM, copy the virtual disks for offline attacks, or install malware

Public cloud

Fabric administrators could potentially have full access to tenant VMs

3

Shielded Virtual Machines

Strong separation between the fabric administrators and the workload administrators, implemented through encryption and protected secrets

4

Fabric/virtualization administratorSlide35

So what is a“Shielded Virtual Machine”?

The data and state of a Shielded VM are protected against inspection, theft, and tampering from both malware and datacenter administrators11 Fabric admins, storage admins, server admins, network adminsSlide36

.VHDX

.VHDX

.VHDX

Step 1: How things look today

Hyper-V

Server administrator

Storage administrator

Network administrator

Backup operator

Virtualization-host administrator

Yes

No

No

No

No

Yes

Yes

Yes

Yes

Yes

Physical machines

Virtual machines

Computer room

PerimeterSlide37

Step 1: Encrypt VM-state and data

Step 1: How things look today

.VHDX

.VHDX

.VHDX

Hyper-V

Server administrator

Storage administrator

Network administrator

Backup operator

Virtualization-host administrator

Yes

No

No

No

No

Yes

Yes

Yes

Yes

Yes

Physical machines

Virtual machines

Computer room

Perimeter

Configuration dependent

No

No

No

NoSlide38

Cloud datacenter

Fabric controllerHyper-V host 1Hypervisor

Host OS

Guest VM

Guest VM

Guest VM

Hyper-V host 2

Hypervisor

Host OS

Guest VM

Guest VM

Hyper-V host 2

Hypervisor

Host OS

Guest VM

Guest VM

Step 2:

Decryption keys controlled by external system

Key protection

Host guardian service

Please sir, may I have some more keys?

Sure, I know you and you look

healthySlide39

Building block #1: Generation 2 VMs

Boot from virtual UEFI firmwareThis provides secure boot, ensures neither the UEFI firmware nor the VM’s startup files can be tampered withAlso enables BitLocker disk encryption to be used inside the VM’s virtual disksModern OS supportGeneration 2 supports Windows Server 2012/Windows 8 and laterWorking to support Windows Server 2008/2008 R2Slide40

Building block #2: Guarded Fabric

Host Guardian Service (HGS): Windows Server role used to implement the hardened fabricHGS provides attestation and key distribution services so that guarded hosts can run shielded VMsGuarded hosts: A host in the fabric on which shielded VMs can run. Guarded hosts must be identified prior to being trusted, and must be configured appropriately in order to pass attestationAttestation: The process of the Host Guardian Service verifying that a host is part of the fabric, a guarded host, and the state of its configurationKey distribution: The operation of delivering a key to a guarded host so that it can unlock and run shielded VMsThe HGS service must run in its own active directory domain and must be isolated from the current fabric AD infrastructureSlide41

Converged networking with 2016

WS2012 R2 Hyper-V Host (with converged)Example 2 x 10GbE + 2 x 10GbE RDMA NICsManagement OSVM(s)

20GbE Team 1

Hyper-V vSwitch

10GbE

N1

10GbE

N1

RDMA N1

RDMA N2

DCB policies configured for management, storage, migration,

& clustering traffic

Utilizes SMB Multichannel

& SMB Direct

VM

vNIC

WS2016 Hyper-V Host (with converged)Example 2 x 10GbE RDMA NICs

VM(s)

VMvNIC

Management OS10GbE RN1

10GbE RN2Hyper-V vSwitch (SDN) with SETHostvRNIC1 HostvNIC3

HostvRNIC2 HostvNIC5 HostvNIC4 Slide42

Guest clustering with Shared VHDXNot bound to underlying storage topology

Flexible and secure Shared VHDX removes need to present the physical underlying storage to a guest OS*NEW* Shared VHDX supports online resizeStreamlined VM shared storage Shared VHDX files can be presented to multiple VMs simultaneously, as shared storageThe VM sees shared virtual SAS disk that it can use

for clustering at the guest OS and application level

Utilizes SCSI-persistent reservations

Shared VHDX can reside on a Cluster Shared Volume (CSV) on block storage, or on SMB file-based storage

*NEW* protected

Shared VHDX supports Hyper-V Replica and

host-level backup

CSV on

block storage

SMB Share

file-based storage

Guest

cluster

Shared

VHDX files

Guest

cluster

Shared

VHDX files

Hyper-V

host clustersSlide43

Nano ServerSlide44

The next step in the journey…

Nano Server

Nano Server:

A new

headless

, 64-bit only, deployment option for Windows Server

Server

Core

Deep refactoring with cloud emphasis

Cloud fabric & infrastructure (clustering, storage, networking)

Born-in-the-cloud applications (PaaS v2, ASP.NET v5)

VMs & Containers (Hyper-V & Docker)

Server

with a desktop experience

Extend the Server Core pattern

Roles & features live outside of Nano Server

No binaries or metadata in OS image

Standalone packages install like apps

Full driver support

AntimalwareSlide45

Deployment improvements

Setup time (Sec)Disk footprint (GB)VHD size (GB)Slide46

Remote Management by Default;Easy access to IP InformationSlide47

For the leanest image, install just the drivers your hardware requires.Dism /Add-Driver /driver:<path>Nano Server includes a package of all drivers in Server Core

Dism /Add-Package /PackagePath:.\packages\Microsoft-NanoServer-OEM-Drivers-Package.cabPackages are provided for:Hyper-V HostFile Server HostFailover ClusteringNano as a VMAll OEM Drivers (in Server Core)Reverse ForwardersDrivers, Roles and FeaturesSlide48

Manage Using Familiar Tools:

Server Manager; Computer Management; PowerShell; PowerShell Direct (VMBus); System Center; Visual Studio and moreSlide49

Shifting needs in IT management

Management as a service

Micro services and containers

Support for heterogeneous environments

Cloud-inspired

Modern IT

managementSlide50

Management anywhere

Next generation cloud management solutionMulti-cloud, multi-platform supportUnified management across infrastructure and servicesAzure | AWS

Modern

management

Any cloud, any platformSlide51

Microsoft’s hybrid cloud IT management solution

Operations Management Suite

System Center

Extend your datacenter investments into hybrid cloud

Unleash modern IT management scenarios with SC and OMS

REAL-TIME

VISIBILITY

SEAMLESS IT AUTOMATION

CLOUD-ENABLED PROTECTION

ROBUST THREAT ANALYSIS

&Slide52

New automation

capabilitiesBuilt-in integration with on-premises systems and PowerShell DSC nodes Run Azure Automation Runbooks on-premisesAutomation accessible via new REST API (including GitHub, VSO, and ARM)Graphical workflow-authoring tool Runbook management from the new Microsoft Azure portalSlide53

ContainersSlide54

ContainersA new approach to build, ship, deploy, and instantiate applications

Physical

Applications traditionally built and deployed onto physical systems with

1:1 relationship

New applications often required new physical systems for isolation of resources

Higher consolidation ratios and

better utilization

Faster app deployment than in a traditional, physical environment

Apps deployed into VMs with

high compatibility success

Apps benefited from key VM

features i.e., live migration, HA

Physical/virtual

Key benefits

Further accelerate of app deployment

Reduce effort to deploy apps

Streamline development and testing

Lower costs associated with app deployment

Increase server consolidation

Package and run apps within

containers

VirtualSlide55

ContainersIsolated runtime environment for hosted applications

DependenciesEvery application has its own dependencies which includes both software (services, libraries) and hardware (CPU, memory, storage)VirtualizationContainer engine is a light weight virtualization mechanism which isolates these dependencies per each application by packaging them into virtual containersShared host OSContainer runs as an isolated process in user space on the host OS, sharing the kernel with other containers

Flexible

Differences in underlying OS and infrastructure are abstracted away, streamlining “deploy anywhere” approach

Fast

Containers can be created almost instantly, enabling rapid scale-up and scale-down in response to changes in demand

Container

App A

Bins/libraries

App B

Bins/libraries

Container management stack

Host OS with container support

Server

http://channel9.msdn.com/blogs/containersSlide56

Container ecosystem

Container runtimeLinux

Container images

Image repository

Application framework

ApplicationSlide57

Container Run-time

Host Operating SystemWindows ServerContainersSlide58

Container Run-time

HostOperatingSystemVirtual machine(s)Hyper-V Hypervisor

Hyper-V

Container(s)

Windows Server

Container(s)Slide59

Container Run-time

HostOperating SystemVirtual machine(s)Hyper-V Hypervisor

Windows Server

Container(s)

Hyper-V

Container(s)

Hyper-V HypervisorSlide60

Your cloud provider is your partner

Responsibility

On-

Prem

IaaS

PaaS

SaaS

Data classification

and accountability

Client & end-point

protection

Identity & access

management

Application

level controls

Network controls

Host Security

Physical Security

Cloud Customer

Cloud Provider

Provider management of risk

Physical | Networking

Shared management of risk

Identity & access management

Customer management of risk

Data Classification | End Point DevicesSlide61

Play with Technology…VMware to Hyper-V Migration

Supported & Free – Quick and easy to download, use and start conversions of VMware VMs on ESXi 4.1/5.0/5.1/5.5Convert to 2012 – Converts and deploys VMs or virtual disks from VMware hosts to Hyper-V 2008 R2 SP1/2012/2012 R2Scriptable – to integrate with automated workflowsOS Support – Supports Windows Server 2008/2008 R2/2012/2012 R2, along with Windows Vista/7/8/8.1Linux OS Support – Red Hat 5/6, Ubuntu 10.04/12.04, SUSE 11, CentOS 5/6, MoreClean

– Snapshots VM, then removes VMware Tools, converts, then installs Hyper-V IC’s as needed.

Conversion with the Microsoft Virtual Machine Converter

https://technet.microsoft.com/en-us/library/dn873998.aspxSlide62

Virtualization resources and feedback

Download Windows Server 2016 Preview:http://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-technical-previewExplore Technical Preview documentation:https://technet.microsoft.com/en-us/library/mt420609.aspx Explore Containers documentation:https://msdn.microsoft.com/virtualization/ Explore Nano Server documentation:https://technet.microsoft.com/en-us/library/mt126167.aspx Uservoice:https://windowsserver.uservoice.com/forums/295050-virtualization Slide63

Deep technical content and free product evaluations

Hands-on deep technical labs

Free, online,

technical courses

Download Microsoft software trials today.

Find Hand On Labs.

Take a free online course.

Technet.microsoft.com/evalcenter

Technet.microsoft.com/

virtuallabs

microsoftvirtualacademy.com

At the TechNet Evaluation Center you can download free, trial versions of Microsoft software, with no feature limits. Dozens of trials are available – all at no cost.

Try Windows Server 2012 R2 for up to 180 days. Download the Windows 8.1 Enterprise 90-day evaluation. Or try Microsoft Azure at no-cost for up to 90 days.

Microsoft Hands On Labs offer virtual environments that will take you through guided, technically deep product learning experience.

Learn at your own pace in labs that you can complete in 90 minutes or less. There is no complex setup or installation is required to use TechNet Virtual Labs.

Microsoft Virtual Academy provides free online training on the IT scenarios that are important to your company and your career.

Learn at your own pace and boost your IT skills with over 100 courses across more than 15 Microsoft technologies including Windows Server, Windows 8, Microsoft Azure, Office 365, virtualization, Windows Phone, and more. TechNet Virtual LabsSlide64

Next Steps – Keep LearningWhat technology is available from Microsoft to help you solve business problems!

Continue Learning About Technology… Expand your capabilities to do your job while also expanding your careerDedicated Certification Jump StartDedicated full day brainstorming Problem/Solution workshopDedicated full day technology training (eg. http://aka.ms/CloudInfrastructure)Continue Learning … Brad Anderson: Cloud Blog http://aka.ms/InTheCloud Dan Stolts blog http://ITProGuru.com Microsoft Virtual Academy http://MicrosoftVirtualAcademy.com Dan’s email: dstolts@Microsoft.com

Related Contents


Next Show more