Our team has been delivering Windows Server 2008 content and the following is a list of April’s webcasts. I recommend your reviewing of them as part of a daily or weekly training routine to bring your understanding of the features and capabilities offered by the product to a 300 level in a short and predictable period of time.
24 Hours of Windows Server 2008
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 10 of 24): IIS 7.0 Diagnostics and Troubleshooting (Level 300)
Friday, April 4, 2008 9:30 A.M.–11:00 A.M. Pacific Time
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 11 of 24): IIS 7.0 Web and Applications Support (Level 300)
Wednesday, April 9, 2008 9:30 A.M.–11:00 A.M. Pacific Time
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 12 of 24): Migrating and Upgrading to IIS 7.0 (Level 300)
Friday, April 11, 2008 9:30 A.M.–11:00 A.M. Pacific Time
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 13 of 24): Server and Print Management (Level 300)
Wednesday, April 16, 2008 9:30 A.M.–11:00 A.M. Pacific Time
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 14 of 24): Windows PowerShell (Level 300)
Friday, April 18, 2008 9:30 A.M.–11:00 A.M. Pacific Time
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 15 of 24): Windows Deployment Services and Microsoft Deployment (Level 300)
Wednesday, April 23, 2008 9:30 A.M.–11:00 A.M. Pacific Time
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 16 of 24): Windows Server 2008 Active Directory Features (Level 300)
Friday, April 25, 2008 9:30 A.M.–11:00 A.M. Pacific Time
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 17 of 24): Migrating to Active Directory Domain Services in Windows Server 2008 (Level 300)
Wednesday, April 30, 2008 9:30 A.M.–11:00 A.M. Pacific Time
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 01 of 24): Overview (Level 200)
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 02 of 24): Server Virtualization with Hyper-V Features and Architecture (Level 200)
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 03 of 24): Managing Hyper-V (Level 200)
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 04 of 24): Presentation Virtualization with Terminal Services RemoteApp (Level 200)
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 05 of 24): Terminal Services Gateway and Terminal Services Web Access (Level 200)
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 06 of 24): Deploying and Migrating to Terminal Server (Level 200)
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 07 of 24): IIS 7.0 Overview and Architecture (Level 200)
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 08 of 24): IIS 7.0 Advanced Management (Level 200)
TechNet Webcast: 24 Hours of Windows Server 2008 (Part 09 of 24): IIS 7.0 Centralized Configuration (Level 300)
Group Policy On-Demand Webcasts
TechNet Webcast: Group Policy Fundamentals (Part 01 of 14): Introduction to Group Policy (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 02 of 14): Applying Group Policy (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 03 of 14): Creating and Editing Group Policy Objects (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 04 of 14): Managing Group Policy with GPMC (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 05 of 14): Managing Group Policy Operations with the GPMC (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 06 of 14): Group Policy Processing Behavior-Initial Processing of GPOs (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 07 of 14): Group Policy Processing Behavior-Using Objects to Affect GP (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 08 of 14): Group Policy Administrative Templates (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 09 of 14): From Basic to Advanced: Security (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 10 of 14): From Basic to Advanced: Security Templates and IPSEC (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 11 of 14): Designing and Planning Group Policy (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 12 of 14): Managing Your Group Policy Environment with GPMC (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 13 of 14): Troubleshooting Group Policy (Level 200)
TechNet Webcast: Group Policy Fundamentals (Part 14 of 14): Group Policy Best Practices (Level 200)
TechNet Webcast: Active Directory Inside Out (Part 01 of 11)—Active Directory Logical Concepts—Level 200
TechNet Webcast: Active Directory Inside Out (Part 02 of 11)—Active Directory Physical Concepts—Level 200
TechNet Webcast: Active Directory Inside Out (Part 03 of 11)—Active Directory Replication and the Operations Masters Role—Level 200
TechNet Webcast: Active Directory Inside Out (Part 04 of 11)—Installing and Managing DNS—Level 200
TechNet Webcast: Active Directory Inside Out (Part 05 of 11)—DNS Features and Configuration—Level 200
TechNet Webcast: Active Directory Inside Out (Part 06 of 11)—Interoperability and Migration from Novell Directory Services—Level 200
TechNet Webcast: Active Directory Inside Out (Part 07 of 11)—Migrating File Resources from NetWare to Active Directory 2003—Level 200
TechNet Webcast: Active Directory Inside Out (Part 08 of 11)—Deployment and Interoperability with NT 4.0 and Windows 2000—Level 200
TechNet Webcast: Active Directory Inside Out (Part 09 of 11)—Administration Features—Level 200
TechNet Webcast: Active Directory Inside Out (Part 10 of 11)—Replication Features and Forest to Forest Trusts—Level 200
TechNet Webcast: Active Directory Inside Out (Part 11 of 11)—Group Policy Management Console and Software Restriction—Level 200
Office 2007 Deployment project template is available for download from here or
1. Download, install, and bring up Microsoft Deployment Tool Kit.
2. Go to Documentation and click Office Deployment icon.
3. Click Office Project Plan.mpp.
This post assume you have some experience of Groove admin console.
With Groove domain policy settings, an administrator can enforce corporate policies on Groove collaborations. First, we must deploy the Device Management Key to our Groove clients, such that a Groove domain policy becomes enforceable. Two ways there are to configure a managed client:
With the Device Management Key deployed, a desktop however needs to be in a lockdown environment to ensure once the key is in place, stays in place.
Figure 1. Groove Device Management Key
Figure 2. Enable Groove client manageability during account configuration
Next, restricting collaboration based on trust relationships by adding and cross-certifying Groove domain certificates using the interface. Here in Figure 3. the interface is shown for your reference and no cross-certified certificate is included.
Groove Server 2007 Manager is a Certificate Authority which establishes the trust hierarchy in Groove PKI. Groove PKI is a term signifying the PKI automatically deployed within and specific to an associated Groove domain during account configuration process. Since all Groove internal communications are Groove PKI-based, a client in current domain can exchange keys, establish a secure channel, and communicate with only those clients trusting a cross-certified certificate. In other words, a Groove user can send out a workspace invitation to both trusted and non-trusted clients. A non-trusted client however cannot establish a secure channel and consequently will not be able to successfully communicate within Groove with the sender of a workspace invitation and join the associated workspace. This, in essence, prevents a Groove user in current domain from collaborating with a target, however not cross-certified, Groove user in other Groove domain.
Certainly once the settings are save in the default policy templates or customized ones. We will then assign the policy templates to an intended group or account.
Figure 3. Cross-Certified Certificates
Figure 4. Restricting collaborations with only those from certified domains
I had a chance to participate in Microsoft Office System Webcast: Tips and Tricks for Groove 2007, Provide Anywhere, Anytime Access to People and Information (Level 100) delivered by Paul Cannon, Microsoft Groove Product Manager, on 09/16/2008 and help out in answering questions in the background. Paul did a great job in delivering a lot of useful information in one short hour and made it very interesting. During the session, there was a question on Groove vs. OneNote which I thought is something worth further discussion.
Based on the story I have heard, OneNote is a Microsoft home-grown product developed due to the need for a tool to quickly and easily capture, organize, and share information from meetings. OneNote to me is an effective tool for digital notes taking. I love and use it very extensively to organization the mass amount of information I need to manage everyday on meetings minutes, status reports, research and drafts, presentation story-boarding, my technical notes, personal journals, important emails, etc. In OneNote 2007, many functions and capabilities are added including sharing information and working with others, and it appears there is some overlap between OneNote and Groove which can share files as well.
One important distinction between OneNote and Groove is the fundamental issue each is trying to address. Fundamentally, OneNote is for (digital) notes taking while Groove is for collaboration. I imagine the originally design focuses or requirements, between OneNote and Groove, must be noticeably different. The ease of information capturing is, in my view, a main focus on notes taking, while seamless content synchronization is essential to collaboration. Taking notes does not necessarily imply information sharing or teamwork, while collaboration suggests there is something in common or synchronized among the team members.
I see taking and sharing notes are not necessarily the same with collaboratively developing contents. Further sharing information is one activity in collaboration, while collaboration is much more than just information sharing. Collaboration is about establishing common operating picture as it is frequently stated in the context of emergency management and military operations. Collaboration is a state and not simply a shareable file or a deliverable system. When I say Groove is for collaboration, I mean Groove is a solution to facilitate all members of a team to reach a state that is situation-aware and informed decisions can be made accordingly. It has much to do with sharing and communications. It is also about knowing, sharing, and discussing what happens, when it happens, what to do with it, who to do it, and how all within a relevant context. For all these needs, Groove offers out-of-box capabilities including presence awareness, automatically data synchronization, always-on encryption, workspace tools, instant messaging, VoIP, SharePoint and InfoPath integration, API, and SDK.
This is not to suggest, between Groove and OneNote, one is better than the other. I see they are simply trying to solve different business problems and should be employed accordingly to maximize an information worker’s productivity.
Finally I got some time to finish documenting the screen flow of Groove Server 2007 Relay installation. It is now published and the one for Groove Server 2007 Manager is also available here. Let me know, if you notice any correction is needed.
Groove communicates with Simple Symmetric Transmission Protocol (SSTP) using 2 types of connections.
Using phone conversation as an example, when Alice calls bob, if Bob answers the call, they are directly connected. This is logically similar to a Groove-to-Groove connection between two Groove clients. If for some reason, Bob is not answering the phone; Alice will leave a message in Bob's voice message box which later can then be consumed by Bob with his pin when he connects to the voice message box. This is logically similar to a Groove-to-Relay connection for the sender to queue the message for an intended recipient at the recipient's designated Relay. To consume a message queued at the recipient's designated Relay; a recipient will employ a Groove-to-Relay connection as well. Notice Groove Relay does not initiate connections to client. It is always a Groove client initiates and connects to the client's designated Relay.
As depicted in the following slide, Groove will always try first to establish and prefer a direct, i.e. Groove-to-Groove, connection followed by Groove-to-Relay connection as needed. A Groove-to-Groove connection requires TCP 2492 open. Groove-to-Relay on the other hand uses HTTP PROXY Connect to or tunneling through port 443, if allowed, or simply HTTP port 80.
A technical overview of how Groove works is also available here.
In Groove infrastructure, there are 2 essential servers, Groove Server 2007 Manager and Groove Server 2007 Relay. The former is where a Groove domain gets created and accounts populated (while the account configurations are actually stored in an associated SQL backend.)
For a non-managed account, i.e. one configures/activate a Groove account without a configuration code (as shown below) via internet, the account is created in a Groove Server 2007 Manager and the configuration stored in an associated SQL backend both managed by Microsoft in the clouds. There is however, as the name indicated, no management to a non-managed account once created. Logically a non-management Groove client works similar to a pre-paid cell phone. It looks and functions just like a normal phone, other than there is no service contract with a cell phone service provider and a pre-paid phone will cease functioning once the pre-paid minutes are used up. A non-managed Groove client functions just like a managed client other than it is not associated with any Groove domain from a Groove user's view. As well a non-managed client is entitled to use Microsoft public infrastructure in the clouds for 5 years once configured.
Event subscription is one of the most exciting features in Windows Server 2008 and it is very easy to set up. In the Subscription folder of Event Viewer, with a few mouse clicks and no coding, one can easily configure an event subscription to subscribe targeted events from remote computers. Should an automated process be needed upon the arrival of a subscribed event at a collecting computer, we can attach a Windows task to that particular event such that follow-up actions like emailing alerts or starting a workflow in SharePoint can be triggered automatically. This screencast also discussed the advanced settings including the service account employment and event delivery optimizations of an event subscription configuration. The screen flow is available for reference here. For better viewing, use full screen mode to view the following screencast.
Microsoft released SQL Server 2008 to manufacture (RTM) on 08/06/2008 and the press release is here. All of the RTM bits are on the TechNet subscriber download area. Much information of this SQL Server release is readily available. TechNet Magazine recently published an overview of the key changes and what you can expect from SQL Server 2008. You can also get a rundown of the various Editions and Components of SQL Server 2008 and take part in SQL Server 2008 Tutorials.
An Overview of SQL Server 2008 installation will help you get started with your deployments. You can also find guidance for Upgrading to SQL Server 2008 or Migrating to SQL Server 2008. And if you are upgrading, be sure to check out Using Upgrade Advisor to Prepare For Upgrades.
Finally, you can easily find local partners offering SQL Server 2008 solutions, find training partners near you offering official Microsoft courses on SQL Server 2008, as well as attend local in-person events and online webcasts on SQL Server 2008.
Originally I configured my laptop as a dual-boot with Vista SP1 and Windows Server 2008 and total two partitions on the hard drive. So this is a configuring BitLocker with existing operating system scenario. The following are the high level steps which I did to put BitLocker on the machine. A follow-up screencast of this post is coming soon.
When it’s all said and done, the included screen captures are what I see from either operating system. Notice when booting into Vista SP1, due to the encryption, I don’t see the drive information of the partition hosting Windows Server 2008. Similarly when booting into Widows Server 2008, the Vista Sp1 partition becomes not accessible. I also have a 2nd hard disk mapped to the “data” drive which also becomes BitLocker aware.
Make no mistake about it. Keep the BitLocker recovery password safe and readily available. And very importantly, one should consider based on the dual-boot usage scenario, which partition BitLocker will be configured with first. There may be times we may also inadvertently change the hardware configuration without realizing it, and the system will come up with a black and white screen asking for the recovery password which is a set of 8 6-digit numbers. What has been happening to me is when booting from the partition that was not the first of the two to configure with BitLocker, apparently the on-board Trust Platform Module (TPM) thinks it's a change of system configuration and requests the recovery password. In my case, Windows Server 2008 was configured with BitLocker first and Vista (Enterprise SP1) later. So booting with Windows Server 2008 is business as usual, while whenever booting with Vista, TPM will intercept the process and request the recovery password for this drive.
System and drive information, and BitLocker configuration and Disk Management
Dual Boot with BitLocker – Windows Server 2008
User Account Control (UAC), a technology introduced in Vista, is to prevent an application or process making changes to your computer without your explicit consent. Minasi's book, Administering Windows Vista Security: The Big Surprises, listed out the notorious 9 blocked by UAC. For IT professionals, this list deserves a serious review. Imagine if UAC is not in place, what can happen on a computer.
· Mark Minasi, Administering Windows Vista Security: The Big Surprises
To place a translator on your web page, add the following code
You can set it to English to Chinese, Chinese to English, or German to Chinese just for the kick and see what happens. This translator feature will be included in upcoming IE8. With this feature, you will be able to read headlines in Paris, for instance, or foreign literature work easier.
I kind of like my new Chinese name. As it is obvious there is still much heuristic to be done to improve the translation.
Yes, the official name of the next version of Windows is now “Windows 7” as announced in Mike Nash’s post on the Windows Vista Team Blog. More details are to be available at the upcoming PDC 2008 and WinHEC 2008. In both shows, a pre-beta "developer only release" is to eb shared with attendees. Going forward, information of Windows 7 once available will be posted in the Springboard Series which is also a great resource on Windows Vista and desktop management.
Blain Barton, a seasoned IT professional, an interesting and dynamic speaker, and one of the most respected IT Evangelists in Microsoft technical communities is hosting a PowerShell series in Second Life. I know many of you known him and attended his events around the country in the past years are fans just like one I am, and we always get a good laugh and learn something new from him at the same time. I know this PowerShell series will be as informative and interesting as many other great presentations Blain has delviered. For more information, follow the link below.
Hyper-V was available in late June. And today another milestone, Hyper-V Server 2008, is released.
Microsoft Hyper-V Server 2008 provides a simplified, reliable, and optimized virtualization solution, enabling improved server utilization and reduced costs. Since Hyper-V Server is a dedicated stand-alone product, which contains only the Windows Hypervisor, Windows Server driver model and virtualization components, it provides a small footprint and minimal overhead. Microsoft Hyper-V Server 2008 is a great choice for customers who want a basic and simplified virtualization solution for consolidating servers as well as for development and test environments. With most basic of virtualization features, Microsoft Hyper-V Server 2008 is ideal for:
· Test and Development
· Basic Server Consolidation
· Branch Office Consolidation
· Hosted Desktop Virtualization (VDI)
Here’s where to find more information on this exciting solution:
Unlike a Windows Server, Microsoft Hyper-V Server does not provide any other roles amd services that Windows provides (AD, DNS, File/Print, IIS, etc.). Microsoft Hyper-V Server is a single purpose virtualization solution. The linked table outlines which Hyper-V–enabled product would suit different virtualization needs.
Do you use SharePoint and work with Groove? Microsoft's User Research Group is conducting series of studies for SharePoint products and technologies at the Microsoft campus in Redmond, WA, and is looking for participants in the Puget Sound area.
The research team is looking for individuals who use SharePoint at least twice a week and have experience working with Groove. Each participant will receive a gift item they select from a list of some of Microsoft's most popular hardware and software titles.
If you are interested please email firstname.lastname@example.org with your name phone number and insert Groove into the subject line.
Microsoft User Research focuses on how people interact with hardware and software products; the information and feedback gathered is translated directly into product design improvements.
Designers take all the research and insight gathered in order to discern whether the product does, or does not do, what people expect and how it can be improved upon. Past participants have enjoyed these studies; finding them to be unique and informative by meeting with Microsoft product development teams and being directly involved with a product development process.
Many of you attended my TechNet events have asked me about getting the sample scripts I used in the PowerShell session. Kevin Remde, one of our best presenters in the TechNet Team, has contributed and shared pertinent information including event resources pages and our PowerShell demo scripts. I have now made them available as a download. Here's how you can try them:
Use get-command to list out all the cmdlets, get-help with -full switch to get the examples in the help file. And get-member to review all the methods and attributes of an object.
Please notice these sample scripts include cmdlets may change the state of a Windows computer including stopping necessary services, so run them at your own risk. To mitigate the risk, use the –whatif to examine the effect and -confirm for getting prompted before the execution of a cmdlet. Neither Yung Chou, nor Microsoft assumes any responsibility for damage caused by using them in any computing environment, including on a production machine.
Check out my TechNet Event Resource page with a list of resources relevant to the PowerShell session. Additionally, for Getting Started Guide and Quick Reference, get the Windows PowerShell 1.0 Documentation Pack. To use PowerShell for IIS administration, install IIS 7.0 PowerShell Provider. Also readily available for download are Sample Windows PowerShell scripts in Script Center Script Repository and free books of PowerShell workshops by Frank Koch in Microsoft Switzerland.
In the TechNet Webcast: Microsoft Solutions for Windows Vista Management (Level 300), I will demo a number of capabilities for managing Vista desktops and Windows environment in general. Microsoft Advanced Group Policy Management (AGPM) 3.0 is one of the 5 components in Microsoft Desktop Optimization Pack for Software Assurance (MDOP) 2008 R2. AGPM enables the change-approval workflow of Group Policy Objects (GPOs) and is something I thought worth a special introduction here. Meanwhile I am also developing a screencast and will publish it here soon.
AGPM is to help customers better manage GPOs, particularly those with complex information technology (IT) environments. A robust delegation model, role-based administration, and change-request approval provide granular administrative control as described in the overview whitepaper and shown below. For example, you can delegate Reviewer, Editor, and Approver roles to other administrators — even administrators who do not have access to production GPOs. The Editor role can edit GPOs but not deploy them; the Approver role can deploy GPO changes. AGPM also helps reduce the risk of widespread failures. You can use AGPM to edit GPOs offline, outside of the production environment, and then audit changes and easily find differences between GPO versions. In addition, AGPM supports effective change control by providing version tracking, history capture, and quick rollback of deployed GPO changes. It also supports a management workflow by allowing you to create GPO template libraries and send GPO change e-mail notifications. Step-by-Step and Operations Guides of AGM 3.0 are also readily available.
For those who are interested in finding more, MDOP 2008 R2 was RTM in September of 2008. Here are demos, more demos, and FAQ. Subscribers can download MDOP 2008 R2 from the TechNet and MSDN subscription sites. The availability of the components is as follows through Microsoft Volume Licensing Service (MVLS):
The official MDOP blog is the channel to get the latest.
Current economic downturn confronts us with a tremendous impact and unfavorable trend on worldwide IT budget and spending as discussed in Simple Savvy Savings - 9 ideas to make anyone a Cost Cutting Hero by Tom Pisello, CEO, Alinean, Inc. More than ever companies are now looking for every opportunity to further cut costs and maintain competitiveness during these times of global economic instability. Nevertheless, the adversity also presents a very opportunity for us to accelerate and transform IT into a more mature, better managed, and highly optimized settings. And there are methodology, tools as shown below, and case studies to help us get started the processes.
This cost savings analysis tool examines IT infrastructure and platform to identify cost savings opportunities focusing on:
The tool generates a report with specific project recommendations that can be implemented to generate high-impact costs savings with minimal investment.The results can be refined to match specific details of the IT environment and local currency. The calculation is based on research by IDC, Forrester, WiPro and Alinean and the results include recommendations to projects which can be implemented to generate high-impact cost savings with minimal investment.
The Optimization Self-Assessment Tool on the other hand derives optimization score, peer comparison, and value assessment for your organization. The tool generates a comprehensive report that can serve as an actionable roadmap and incentive for optimizing your IT infrastructure and platform.
Identify your goal, find out where you stand, and make an informed decision. We must start the process now.
This book, by Mitch Tulloch with the Microsoft Virtualization team, is for IT professionals who want to learn more about Microsoft virtualization and virtualization-enabling technologies. It convers many areas of virtualization solutions including: Virtual Machine Manager 2008, Application Virtualization, Presentation Virtualization (Terminal Services), Desktop Virtualization, etc. You can download the book here.
There are 4 levels of UAC warning form “Always notify” to “Never notify” configurable in a Windows 7 client. A set level determines when UAC will warn the current user on a change made by a program or by the user oneself while an elevated privilege is required for making the change. The Windows 7 client UI is very user friendly and informative. Linked help file as well as recommendations highlighted with the icon, , and relevant to each level are readily available. This new UI makes it easier to understand and configure UAC, and improve the user experience. The following screen captures showing the user experience of configuring UAC were taken from Windows 7 Client Build 7000, i.e. the Beta code. Notice the user experience of UAC settings in Windows Server 2008 R2 is identical with that in Windows 7 client.
For those who are interested in Windows 7, Steve Ballmer’s announcement of the availability of Windows 7 Beta and Windows Live, and a Windows 7 demo delivered in Consumer Electronics Show 2009 are great to review.
The default setting is to warn only when programs try to make changes to the computer.
The TechNet live events of this quarter are just about to start. For IT Pro track, a team of IT Evangelists will be making a contact and delivering content to various IT Pro communities in cities throughout the U.S. starting late January:
These terms: Cloud Computing, Software as a Service (SaaS), Software-plus-Services (S+S), Microsoft Online Services, Microsoft Azure Service platform, Microsoft Business Productivity Office Suite (BPOS) can be sometimes confusing. Exactly what is Cloud Computing? Is apps accessible through clouds Cloud Computing? What do SaaS and S+S really mean to IT Pros? Session 1 will bring clarity to you in a 30-minute discussion on how these concepts complement one another, and demo how the architectural components integrate and work together to give a user an integrated experience on "connect, communicate, and collaborate with anywhere access."
Recently virtualization has been coming with a big wave and bringing IT with much momentum and excitements. Some virtualization solutions provide not only the ability to run applications, but also with deployment mechanisms. And as an IT Pro, one must recognize it is so critical now to have a system management solution in place. And any IT infrastructure projects going forward should include considerations on how to manage and integrate newly introduced resources, physical and virtualized, with existing ones in a transparent and systematic way. System management is an area that IT Pros must keep their skill up to date and not to overlook.
Session 2 offers an operational aspect on System Center Configuration Manager 2007 on deploying and managing resources as well as Network Access Protection (NAP). In 90 minutes, the scenario-based demos will give you a realistic view with insights of enterprise configuration management. Get your pen and a notebook ready, there is so much included in this session.
With the employment of virtualization, deploying and managing virtual machines is a topic with much visibility. To increase ROI and reduce TCO of a virtualization solution, in addition to virtualizing resources, the management of a virtualization solutions (such as requesting, configuring, deploying, patching, and revoking virtual machines) must be implemented with minimal impact upon and maximal integration with and applicability to IT resources already put in place. This is also why Microsoft System Center Virtual Machine Manager (SCVMM) 2008 has become such an essential component to realize the benefits of a virtualization solution. Session 3 is 90 minutes packed with demos of SCVMM 2008 and walks through various scenarios on managing Microsoft and non-Microsoft virtual machines with a consistent user experience and your already developed Windows skills.
Notice the slide decks are soon to be released, then they can be downloaded from TechNet Event resource page.
So are you ready to be a rock, and not to roll? Come, join us.
is an enterprise-class server solution with a focus on the IT needs and priced to yield substantial cost savings over stand-alone products. For instance, the solution simplifies the licensing with a single server license and Client Access for all included products. To reduce complexity and improve productivity, EBS 2008 provides a unified administration console to manage an integrated IT infrastructure with the latest versions of management, messaging, and security server technologies.
With EBS 2008, basically a mid-size business can have the strength of enterprise IT on system management, security, and messaging without paying and maintaining like enterprise IT. A very interesting concept with a very practical approach, it is indeed. Here are some additional resources to learn more: