Microsoft tech•ed Europe 2009, Berlin, 11 November 2009

A daily update from Microsoft tech•ed Europe 2009, Berlin, 8-13 November 2009

Not the best day for me in terms of TechEd objectives (i.e. attending learning sessions, etc.) with the first post of the day saying ‘decisions decisions… for sessions just 09:00-10:15’ as struggled to choose between:

DAT302 Top 10 Best Practices for Microsoft SQL Server 2008 Analysis Services
or
MGT11-IS Get Virtualized with Microsoft System Center Essentials!
or
OFS322 Overview of Social Computing in SharePoint 2010
or
SVR207 Windows Server 2008 R2 File Classification Infrastructure: Managing your file data more effectively.
or
SVR319 Multi-Site Clustering with Windows Server 2008 R2

Ended up doing none of the above, but did have a productive breakfast meeting with Stuart Leddy, UK Windows Server Product Marketing Manager.  Stuart has been heading up the Windows Server 2008 R2 UK EAP activities that we have been involved in with Ascom Network Testing (http://blog.thefullcircle.com/2009/11/05/the-full-circle-secures-ascom-network-testing-for-windows-server-2008-r2-early-adopter-program/)

The day turned into going from one full session to the next, and walking back and forth for what seemed like miles in between!
my TechEd tip for the day – for popular sessions get there 10 minutes before they start!

Eventually did get into a 1st choice session I wanted at 12:20…

MGT03-DEMO Introduction to Microsoft System Center Essentials 2010

Presenters: Ravikiran Chintalapudi, David Mills, Eamon O’Reilly, Jeremy Winter
 
Come see the new customer-driven enhancements and fully integrated virtual management capabilities in the next release of Microsoft’s unified IT Management solution for medium-sized businesses, System Center Essentials 2010!
 
– great product, can manage 50 servers and 200 clients
 
 

SVR307 Security Best Practices for Hyper-V and Server Virtualisation

Jeff Woolsey, Senior Program Manager, Microsoft Virtualization
http://blogs.technet.com/virtualization/

Virtualisation is one of the hottest topics in IT today and security is a top priory for IT staff. In this session we cover security best practices for Hyper-V and introduce the Hyper-V Security Guide. This guide is Microsoft’s reference for hardening servers running Windows Server 2008 with Hyper-V enabled.

– Use of BitLocker
– AV scanning of offline VHD images… stale/dormant VMs that get reintroduced to the corporate network then can wreak havoc to new vulnerability exploits.  first product to do this is McAfee VirusScan Enterprise for Offline Virtual Images (rolls off the toungue!)
– AV configuration… added benefit of passthrough disks – host AV will scan these disks.  install AV on the guests!
– VHD performance, 2nd most popular VM workload in Microsoft is SQL! fixed disk performance is now on par with raw/real disk!  but remember spindles still count!
– Dynamic VHDs are now up to 15x faster with R2 – still a 10-15% performance hit over fixed, and the risk of disk over commit
– Multipath I/O (MPIO) in R2 & Win7 is soo much easier with iSCSI Quick Connect
– Advanced Storage Capabilities… storage dedupe and replication, if it is block based it will work
Hyper-V Networking – don’t forget the parent is a VM too!  the Hypervisor slides in beneath the O/S once enabled.  More NICs the better, min 2, min 3 with iSCSI
Jumbo Frames… Significant performance increases, but the infrastructure must support it.  also needs to be end-to-end.  confirm test with ping host -l 4000 -f – if you get a response you have jumbo frames
Virtual Machine Queues – Hyper-V R2 supports processing offloading to newer network adaptors (Intel, Broadcom, etc.), most benefit with 10Gb/E
– more tips… turn off screen savers in guests, in Windows Server 2003 create using 2-way to ensure MP HAL

more of a best practise and walkthrough of some basic tasks like not forgetting to install Intergration Component, good session and great blogger (not me – Jeff! ;-))

 

DAT301 Building and Implementing a High Availability Strategy for Your Enterprise

Presenter: Gopal Ashok
Wed 11/11 | 17:30-18:45 | London 3 – Hall 7-1b
Every business has mission-critical applications running on Microsoft SQL Server that require maximum uptime. Some application data is more critical than others and requires strict guarantees with regard to data loss. Depending on the application requirements and IT constraints, the availability strategy and corresponding technology choices will vary. As an architect, DBA, or IT admin it is important to develop the right HA strategy and corresponding solution which meets the availability requirement and at the same time provides the cost benefit for your organisation. Microsoft SQL Server 2008 Always On Technologies provide a full range of options to minimise downtime and maintain appropriate levels of application availability. Come to this session to learn how to develop a comprehensive HA solution using the Always On technologies. The session walks you through the various technologies and features, providing a cost-benefit analysis and comparison, talks about the key decision points to consider when choosing a technology, and showcases real-world examples of how these technologies are currently used to provide a High Availability solution for various customer environments around the world.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: