The new Hyper-V R2 will ship with Live migration (LM), the most requested Hyper-V feature.
What it can do is moves a Virtual Machine from one node of the Windows Server Failover Cluster (WSFC) to another node in the same cluster in a fashion that is transparent to the clients that are connected to it. This is done with no dropped network connections, no loss of service, no perceived user downtime.
Live Migration is supposed to only take the VM offline for less than 1 second, compared to the current Quick Migration which will take a few seconds.
Live migration is accomplished by replicating and synchronizing the contents of memory and processor(s) being used by the VM and then quickly switching access to the storage and network from the source node to the destination node. This switch is done quickly enough that the network sessions from client systems connecting to the VM are not lost and therefore has little to no impact on the service that the VM is providing.
I am eager to test it out!!!
Monday, January 12, 2009
Friday, January 9, 2009
High Alert: Microsoft News - Virus as deadly as Blaster found
We have received quite a number of reports of the Conficker worm making it’s rounds in Malaysia. This is not isolated to Malaysia, but is widespread throughout the world. It seems that almost all AV Vendors are having tough time dealing with it . Below is some information that will help to identify , fix and resolve the same – Note that detection & cleaning of the worm is taken into account with the latest Forefront signature.
Security Bulletin
http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
Summary, Analysis, Prevention & Recovery
http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm%3aWin32%2fConficker.B
Good News for ISA Customers- There are scripts available publically from http://www.isatools.org/tools.asp?Context=ISA2006, http://www.isatools.org/tools.asp?Context=ISA2004 à “block conficker.vbs <http://www.isatools.org/tools/block_conficker.vbs> ” which will block the worm at perimeter level itself.
Security Bulletin
http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
Summary, Analysis, Prevention & Recovery
http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm%3aWin32%2fConficker.B
Good News for ISA Customers- There are scripts available publically from http://www.isatools.org/tools.asp?Context=ISA2006, http://www.isatools.org/tools.asp?Context=ISA2004 à “block conficker.vbs <http://www.isatools.org/tools/block_conficker.vbs> ” which will block the worm at perimeter level itself.
Subscribe to:
Posts (Atom)