spacer
Subscribe via: (Email / RSS)

Publications

spacer
Author- Pro Hyper-V
I am very excited to announce that my book, Pro Hyper-V will be published in May, 2009! This book takes you through a comprehensive technical journey through Microsoft’s new bare-metal hypervisor. Learn how to:

- Manage Hyper-V with SCVMM 2008 and PowerShell

- Enable role-based access in Hyper-V by utilizing Authorization Manager and WMI.

- Set up a Hyper-V Failover Cluster using the new Windows Server 2008 Failover Clustering.

- Backup and Recover Hyper-V virtual machines using built-in tools, Windows Server Backup, or Data Protection Manager 2007.

– And Much More…

I have also written articles for SearchSystemsChannel.com, SearchEnterpriseLinux.com, and SearchServerVirtualization.com. I answer virtualization questions for SearchSystemsChannel.com. I was also the technical editor for Virtualization: From the Desktop to the Enterprisespacer . More information on my writing can be seen by looking at my Writing Category Archive. A partial list of publications and editing work is below.

Technical Editor- Virtualization: From Desktop to the Enterprise spacer

-I was the technical editor for Chris Wolf and Erik Halter’s book on virtualization technology.

-This book was listed on Intel Corporations Fall 2006 Recommended Reading List.

-It covers aspects of virtualization, such as storage virtualization, server clustering, and machine virtualization.

Author- Article: VMware and Moka5 server virtualization for SMBs

-In this four-part article, I go over some technology from Moka5. They are a small startup that is doing some very interesting things with vmware player and virtual machine streaming.

Author- Article: Virtualization opportunities for Citrix resellers

-In this article I go over the Citrix Desktop Broker for Presentation Server and how this technology compliments, instead of competes, with VMWare’s Virtual Desktop Infrastructure (VDI).

Author- Article: Running Windows as a VM on Linux with VMWare Server

-In this article I present a how-to on running windows applications as “windows” on an Ubuntu Linux desktop by using VMWare Server, 2X application server, and Windows XP.

Author- Five-Part Article Series: Improving Microsoft Virtual Server Security

-In this series of articles I go through securing Microsoft Virtual Server R2. Some highlights include:

Part I: Securing local access to the host

-Learn about securing local access to the host, including file and folder security.

Part II: Securing remote access to the host

-Learn about securing remote access to the host, including the Virtual Machine Remote Console (VMRC) and the IIS Administration page.

Part III: Virtual machine log file monitoring

-Learn about virtual machine log file monitoring (which events to monitor). Also, use a vbscript to back up event logs and clear them routinely.

Part IV: Examining the compromised Virtual Server 2005 host

-Learn what to examine if a host machine is compromised. Also, learn how to use some Sysinternals tools and some scripting to collect valuable information from the compromised host.

Part V: Preventing and detecting rogue virtual machines

-Learn how to detect rogue virtual machines on your network. Also, learn how a malicious user could hide a virtual machine in an NTFS alternate data stream!

Author- Article: Implementing a server virtualization pilot

-Learn about some considerations that need to be made when taking on a server virtualization project. This includes considerations for virtualization targets, storage choices, and server capacity planning.

Author- Article: Virtualization and Disaster Recovery Planning

-In this three-section article, learn how storage virtualization (iSCSI), Ardence, and server virtualization technology can be combined to create a flexible production and disaster recovery environment.

Leave a Comment

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.