Publications
Author- Pro Hyper-V
I am very excited to announce that my book, Pro Hyper-V will be published in May, 2009! This book takes you through a comprehensive technical journey through Microsoft’s new bare-metal hypervisor. Learn how to:
- Manage Hyper-V with SCVMM 2008 and PowerShell
- Enable role-based access in Hyper-V by utilizing Authorization Manager and WMI.
- Set up a Hyper-V Failover Cluster using the new Windows Server 2008 Failover Clustering.
- Backup and Recover Hyper-V virtual machines using built-in tools, Windows Server Backup, or Data Protection Manager 2007.
– And Much More…
I have also written articles for SearchSystemsChannel.com, SearchEnterpriseLinux.com, and SearchServerVirtualization.com. I answer virtualization questions for SearchSystemsChannel.com. I was also the technical editor for Virtualization: From the Desktop to the Enterprise . More information on my writing can be seen by looking at my Writing Category Archive. A partial list of publications and editing work is below.
Technical Editor- Virtualization: From Desktop to the Enterprise
-I was the technical editor for Chris Wolf and Erik Halter’s book on virtualization technology.
-This book was listed on Intel Corporations Fall 2006 Recommended Reading List.
-It covers aspects of virtualization, such as storage virtualization, server clustering, and machine virtualization.
Author- Article: VMware and Moka5 server virtualization for SMBs
-In this four-part article, I go over some technology from Moka5. They are a small startup that is doing some very interesting things with vmware player and virtual machine streaming.
Author- Article: Virtualization opportunities for Citrix resellers
-In this article I go over the Citrix Desktop Broker for Presentation Server and how this technology compliments, instead of competes, with VMWare’s Virtual Desktop Infrastructure (VDI).
Author- Article: Running Windows as a VM on Linux with VMWare Server
-In this article I present a how-to on running windows applications as “windows” on an Ubuntu Linux desktop by using VMWare Server, 2X application server, and Windows XP.
Author- Five-Part Article Series: Improving Microsoft Virtual Server Security
-In this series of articles I go through securing Microsoft Virtual Server R2. Some highlights include:
Part I: Securing local access to the host
-Learn about securing local access to the host, including file and folder security.
Part II: Securing remote access to the host
-Learn about securing remote access to the host, including the Virtual Machine Remote Console (VMRC) and the IIS Administration page.
Part III: Virtual machine log file monitoring
-Learn about virtual machine log file monitoring (which events to monitor). Also, use a vbscript to back up event logs and clear them routinely.
Part IV: Examining the compromised Virtual Server 2005 host
-Learn what to examine if a host machine is compromised. Also, learn how to use some Sysinternals tools and some scripting to collect valuable information from the compromised host.
Part V: Preventing and detecting rogue virtual machines
-Learn how to detect rogue virtual machines on your network. Also, learn how a malicious user could hide a virtual machine in an NTFS alternate data stream!
Author- Article: Implementing a server virtualization pilot
-Learn about some considerations that need to be made when taking on a server virtualization project. This includes considerations for virtualization targets, storage choices, and server capacity planning.
Author- Article: Virtualization and Disaster Recovery Planning
-In this three-section article, learn how storage virtualization (iSCSI), Ardence, and server virtualization technology can be combined to create a flexible production and disaster recovery environment.