Posted by Florent Appointaire on June 2, 2016
[Azure] Custom RBAC roles

From December 2015, Microsoft has given the possibility to create your own RBAC roles. I will show you today, how to do this. To start, connect via PowerShell to your Azure RM subscription:

Learn More

Posted by Alex Samoylenko on May 30, 2016
How Transparent Page Sharing memory deduplication technology works in VMware vSphere 6.0

You may know that memory page deduplication technology Transparent Page Sharing (TPS) becomes useless with large memory pages (it’s even disabled in the latest versions of VMware vSphere). However, this doesn’t mean that TPS goes into the trash bin, because when lacking resources on the host-server, ESXi may break large pages into small ones and deduplicate them afterwards. In the process, the large pages are prepared for deduplication beforehand: in case the memory workload grows up to a certain limit the large pages a broken into small ones and then, when the workload peaks, forced deduplication cycle is activated.

Learn More

Posted by Oksana Zybinskaya on May 27, 2016
Citrix issues Raspberry Pi client boxes

Citrix has revealed a desktop thin client based on the Raspberry Pi microcomputer – HDX Ready Pi, which is a Citrix-built box containing the Raspberry Pi 3 hardware and a ViewSonic Linux build designed specifically to run with the Citrix HDX virtual desktop platform. The device contains a Raspberry Pi 3 board, a power supply and ports for the Pi’s HDMI, ethernet and USB connections. It connects to a XenDesktop and XenApp server that hosts the virtual instances of each individual PC.

Learn More

Posted by Askar Kopbayev on May 27, 2016
NUMA and Cluster-on-die

NUMA stands for Non Unified Memory Access and Nehalem was the first generation of Intel CPUs where NUMA was presented. However, the first commercial implementation of NUMA goes back to 1985, developed in Honeywell Information Systems Italy XPS-100 by Dan Gielan.

Learn More

Posted by Oksana Zybinskaya on May 23, 2016
TBW from SSDs with S.M.A.R.T Values in ESXi

Solid-State-Drives are becoming widely implemented in ESXi hosts for caching (vFlash Read Cache, PernixData FVP), Virtual SAN or plain Datastores. Unfortunately, SSDs have limited lifetime per cell. Its value may range from 1.000 times in consumer TLC SSDs up to 100.000 times in enterprise SLC based SSDs. Lifetime can be estimated by device TBW parameters provided by vendor in its specification, It describes how many Terabytes can be written to the entire device, until the warranty expires.

Learn More

Posted by Romain Serre on May 16, 2016
Rename VM network adapter automatically from Virtual Machine Manager 2016

The next version of Hyper-V which comes with Windows Server 2016, brings a new feature called Virtual Network Adapter Identification. This feature enables to specify a name when a network adapter is added to the virtual machine and to retrieve this same name inside the VM. This feature can be also managed from Virtual Machine Manager 2016. This feature is really great to automate the renaming of the virtual network adapters inside VMs. In this topic I’ll show you how it is working and how to automate the renaming of the network adapters with PowerShell.

Learn More

Posted by Oksana Zybinskaya on May 13, 2016
Something to Think About: Nano Server Does Not Support Group Policy

Nano Server is a headless, remotely managed version of its server product that comes as a separate installation option in Windows Server 2016, which is in Technical Preview 5 at the moment, but is thought to represent the final feature version before RTM.

Learn More

Posted by Anton Kolomyeytsev on May 11, 2016
Storage Replica: Overview

Here is an overview dedicated to disaster recovery, more specific, it’s about the DR capabilities of Microsoft Storage Replica – a new feature of Windows Server 2016. It takes a glance on the DR process itself and then brings a few details of the Storage Replica operation, its features, and peculiarities. They include zero data loss, block-level replication, simple deployment and management, guest and host, SMB3 protocol, high security, high performance, consistency groups, user delegation, network constraint, thin provisioning, etc. The post is, basically, an introduction to a series of experiments also listed on the blog. They were conducted in order to check the functionality and performance of Microsoft Storage Replica in different use cases.

Learn More

Posted by Anton Kolomyeytsev on May 10, 2016
SMB3: Overview

This is an overview of the Server Message Block (SMB3) protocol from Microsoft. It offers a short insight into the history of SMB3 creation and development over the years (as the idea is technically around 30 years old). As of Windows Server 2012, the protocol got new features: SMB Transparent Failover, SMB Scale Out, SMB Multichannel, SMB Direct, SMB Encryption, VSS for SMB file shares, SMB Directory Leasing, SMB PowerShell. In Windows Server 2016, it also got Pre-authentication integrity and Cluster dialect fencing. The post concentrates on RDMA-capable SMB Direct and MPIO-utilizing SMB Multichannel and their benefits. Also, it is an introduction to a series of tests aimed at creating SMB 3.0 File Servers in an unusual way.

Learn More

Posted by Vladan Seget on May 10, 2016
Windows Server 2016 – Three Built-in Tools To Protect Your Data From Ransomware

While the Windows Server 2016 “Technical Preview (TP) 5 has had the option for restoring data via System Restore protection, Microsoft did not keep this option in the final release. As such, we have only two built-in options.

After spyware and malware IT administrators do have to face another threat – A Ransomware. You have to pay to recover your data that has been encrypted by malware. Clever move from the Pirate’s perspective. Indeed. Pirates are hoping that they can make some dirty money out of it. And sometimes they’re successful. You might be asking what can you do, as a system administrator, to protect yourself against ransomware?

Learn More