Hi [[ session.user.profile.firstName ]]

Microsoft’s Hyper-V: Important Things You Didn’t Know

Over the past several years, virtualization has played an increasingly vital role in business data centers, eventually becoming one of the key aspects of a flexible infrastructure and a private (or even hybrid) cloud solution. Although VMware and their products have traditionally been the leader in
Over the past several years, virtualization has played an increasingly vital role in business data centers, eventually becoming one of the key aspects of a flexible infrastructure and a private (or even hybrid) cloud solution. Although VMware and their products have traditionally been the leader in this space, their days of market dominance are at an end. You probably didn’t know that, and VMware is certainly not going to tell you.

Microsoft’s Hyper-V – the hypervisor included in the latest server products and even available as a free-yet-full-featured hypervisor, has surpassed vSphere in capability, scalability, flexibility, and performance. And when you add to that the improvements in the recent R2 release, plus System Center 2012 R2 components like Virtual Machine Manager, the story only gets better.

In this live and interactive session, we will inform and enlighten you on just a few of the key things that you may not yet know about Microsoft’s solution for virtualization, and leave you with useful resources for further learning.
Recorded Nov 19 2013
38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin A. Remde, IT Pro Evangelist, Microsoft
Presentation preview: Microsoft’s Hyper-V: Important Things You Didn’t Know
Recommended for you:
  • Date
  • Rating
  • Views
  • CA ARD: efficienza ed ottimizzazione dei test tramite un approccio Model-Driven CA ARD: efficienza ed ottimizzazione dei test tramite un approccio Model-Driven Domenico Maracci - CA Technologies Recorded: May 26 2016 28 mins
    In un momento in cui le iniziative IT corrono di pari passo col business, l’abilità di comunicare i requisiti di business in un modo che sia direttamente comprensibile all’IT diventa un imperativo. CA ARD utilizza l’approccio Model Driven Testing per eliminare ambiguità nei requisiti, ottimizzando i cicli di test garantendo totale test coverage.
  • NSX, Next-Generation Firewall and the Software-Defined Data Center NSX, Next-Generation Firewall and the Software-Defined Data Center Mariano Maluf, VMUG | Blake Wofford, Fuel | Kausum Kumar, VMware | Sai Balabhadr, Palo Alto Networks | John Spiegel, Customer Recorded: May 25 2016 59 mins
    Many organizations are implementing server virtualization to reap the business benefits of simplifying operations, speeding up provisioning, and adapting to rapidly changing infrastructure needs, but this creates a new set of security challenges as network professionals race to keep up with the changes. To really take advantage of software-defined data architecture requires a partnership between a centralized management platform, easily integrated next-gen firewall solution, and an adaptive, simplified virtual environment. Enter VMware and Palo Alto Networks.

    In this webinar, experts from Palo Alto Networks and VMware, along with members of their user communities Fuel and VMUG will provide an technical overview of the advantages of pairing Palo Alto Networks’ VM-series next-generation firewall and Panorama centralized management tools with VMware’s NSX network virtualization platform. With real-world customer examples and advice on the best way to protect your organization across on-prem and online environments, you’ll leave this webinar with an action plan for realizing the full opportunities of SDDC infrastructure.
  • How U.S. hospitals Enhance Patient Care with PCoIP & Imprivata technology How U.S. hospitals Enhance Patient Care with PCoIP & Imprivata technology Chris Smith, Imprivata & Patrick Mauro, Teradici Recorded: May 25 2016 61 mins
    Today, hospitals and healthcare organizations are under increasing pressure to revamp the way doctors and clinicians work and the how patients are treated ̶ IT based solutions across medical units work to make patient treatment and medical professional work more efficient and effective.

    Join us for an informative session and hear how leading hospitals have reduced IT costs and increased clinical staff productivity.

    This webinar will share how three medical facilities in the U.S. have successfully:
    •Streamlined clinical workflows with “no click access”
    •Ensured the protection of patient information and compliance requirements with “tap in and out” user authentication and highly secure PCoIP® Zero Clients
    •Increased staff and doctor satisfaction with a consistent user experience that follows them no matter where they need to work
    •Reduced operational costs by deploying PCoIP Zero Clients, PCoIP Management Console Enterprise Edition and Imprivata OneSign® Single Sign On (SSO)
  • Ransomware: Dark Money and Emerging Threats Ransomware: Dark Money and Emerging Threats Michael Aguilar, Business Product Technical Lead, ESET North America Recorded: May 25 2016 55 mins
    You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
    Join an ESET business product technical lead to learn:
    •How ransomware has evolved and spread
    •Why mobile phones and Apple OS X are increasingly vulnerable
    •Best practices for avoiding and dealing with ransomware
    •Why to implement backup and recovery solutions now
  • The Future of Solid State The Future of Solid State Randy Kerns, Senior Strategist and Analyst, Evaluator Group Recorded: May 25 2016 45 mins
    The movement away from electro-mechanical devices for primary storage to solid state technology continues. Flash technology has been immensely successful and continues to advance with greater density and less cost. It is also driving changes in the interfaces and protocols for storage from disk-based to memory-based. Additional solid state technology is entering the market and will create a hierarchy of different performance and cost storage. This presentation will discuss some of these changes and their potential impacts.
  • The Future of Solid State The Future of Solid State Randy Kerns, Senior Strategist and Analyst, Evaluator Group Recorded: May 25 2016 45 mins
    The movement away from electro-mechanical devices for primary storage to solid state technology continues. Flash technology has been immensely successful and continues to advance with greater density and less cost. It is also driving changes in the interfaces and protocols for storage from disk-based to memory-based. Additional solid state technology is entering the market and will create a hierarchy of different performance and cost storage. This presentation will discuss some of these changes and their potential impacts.
  • How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance Raymond Otero, Manager of End-User Computing, Anexinet; Srinivas Ramanathan, CEO, eG Innovations Recorded: May 25 2016 68 mins
    Citrix XenApp and XenDesktop are two of the most performance-sensitive applications being used in enterprise networks today. Citrix performance management is of critical importance because even a small glitch – anywhere in your infrastructure – can negatively affect the user experience and, ultimately, result in lost business revenue.

    In this webinar, Raymond Otero, Manager of End-User Computing, Anexinet – a leading Citrix Gold Solution Advisor, and Srinivas Ramanathan, CEO of eG Innovations, discuss the top seven mistakes that IT professional make when managing their Citrix-based services as well as the best practices to address and avoid these mistakes to ensure a positive user experience and business continuity.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Closing Network Backdoors: Best Practices to Control Third-Party Risks Closing Network Backdoors: Best Practices to Control Third-Party Risks Dale Gardner, Director, CA Technologies Recorded: May 25 2016 60 mins
    In up to two-thirds of security breaches, stolen or compromised user credentials belonging to a privileged user with wide-ranging access to sensitive systems, served as the initial attack vector. In this way, attackers can steal sensitive data and wreak havoc. While you must provide access to third parties, you must also manage such high-impact security risks. Join us to learn the top five best practices for regaining control of third-party access, and the processes and technology necessary to stop unauthorized access and damaging breaches.

    In this webcast, you’ll learn:

    - The identity, access, and security governance processes needed to protect your network
    - How to ensure positive user identification to prevent credential theft and misuse
    - Techniques to limit access to only those resources required to satisfy work or business requirements
    - Preventing the unauthorized commands — and inadvertent mistakes — threatening your network
    - Establishing monitoring procedures that flag violations and speed forensic investigations
  • Cloud Storage: The 5 Reasons IT Can Do it Better Cloud Storage: The 5 Reasons IT Can Do it Better George Crump, Storage Switzerland Recorded: May 25 2016 61 mins
    In this live webinar, learn the five reasons why a private cloud storage system may be more cost effective and deliver a higher quality of service than public cloud storage providers.

    In this webinar you will learn:

    1. What Public Cloud Storage Architectures Look Like
    2. Why Public Providers Chose These Architectures
    3. The Problem With Traditional Data Center File Solutions
    4. Bringing Cloud Lessons to Traditional IT
    5. The Five Reasons IT can Do it Better

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Microsoft’s Hyper-V: Important Things You Didn’t Know
  • Live at: Nov 19 2013 5:00 pm
  • Presented by: Kevin A. Remde, IT Pro Evangelist, Microsoft
  • From:
Your email has been sent.
or close
You must be logged in to email this