Microsoft SQL Server is the backbone of many businesses, but when it comes to high availability, which path should you take: Always On Availability Groups (AG) or Failover Cluster Instances (FCI)?
A database (DB) management system is vital for any infrastructure. To control your data and protect it, you need to keep it organized. However, having a tool doesn’t mean knowing how to use it, so find out how to structure originally unstructured data using SQL Server FILESTREAM feature.
In public could hosting, whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, you deal with security credentials. For every business, securing data, protecting information, or delegating access are vital. Identity Access Management (IAM) is a framework that helps to distribute access policies and account protection, and it can serve your needs specifically. Learn what exactly it is and why you should care!
Non-volatile storages are lifebuoys for any company in case of power cycling. In running business having untouchable memory storage is vital. That’s why any novel software or hardware must support non-volatile memory with no problems. Time to learn how to go with the times and configure NVDIMM-N on one of the latest Dell PowerEdge Servers with Windows NT most recent software solution!
Some time ago, I published here comparison of SQL Server Failover Cluster Instances (FCI) and SQL Server Availability Group (AG) performance while having them run on top of StarWind Virtual SAN (https://www.starwindsoftware.com/blog/hyper-v/can-sql-server-failover-cluster-instance-run-twice-fast-sql-server-basic-availability-groups-2-node-cluster-part-2-studying-fci-performance/). Today, I measure SQL Server AG performance on Storage Spaces. The next part sheds light on SQL Server FCI performance on S2D. Can I squeeze two times more TPM out of SQL Server FCI on S2D than SQL Server AG can provide on Storage Spaces?
Admins love hyperconvergence because it allows conjoining compute, storage, and networking resources that makes the environment cheaper and easier to manage. Experienced users can build an infrastructure in different ways using any parts. For instance, you can grab some servers from Dell and install an industry-standard hypervisor (Hyper-V, KVM, ESXi, whatever) on top of them. If you do not know that much about hyperconvergence though, consider buying an appliance.
Azure Firewall is a security service designed for Azure virtual network protection. Presented in 2018, the Firewall, as its name implies, helps to control inbound and outbound network traffic. With a feature-rich service like that, keeping your Azure network this secure has never been that easy!
Storage controllers are virtual environment tools essential for locating and accessing both block-based devices and SCSI devices. Storage controllers in VMware vSphere virtualization platform can operate with different storage controllers, varying in types, purposes, and usages. A wide range of functional capacities allows you to establish storage controller compatibility, choose configurations, and process SCSI emulation and paravirtualization. Use a storage controller as best suited for your preferred OS!
Azure Virtual Machine Extensions are small applications that provide post-deployment configuration and simplify the management of VMs. This feature uses Windows and Linux Azure agents that are automatically installed during the provisioning process. If your VM requires the installation of software, anti-virus protection or running a script inside of it, feel free to use VM extensions. Configure your VMs quickly and easily, automate your critical tasks, and save time with Azure VM extensions!.
I think that any business needs a disaster recovery site. That’s why I discuss today VMware vCenter Site Recover Manager (SRM) 8.1 and how to set up that solution.
Upgrading VMware vSphere infrastructure may seem a boring, tedious, and sometimes even difficult process. But that’s not true at all if you know about three steps you need to follow in order to avoid difficulties in updating. These steps are called pre-upgrade, upgrade, post -pgrade phases. What should be done at the pre-upgrade stage? How to choose the most appropriate upgrade scenario for your infrastructure and architecture? What steps should be taken after completing the infrastructure upgrade?