Virtualization

18K

Solutions

11K

Contributors

Virtualization is the act of creating a virtual (rather than actual) version of something, including (but not limited to) a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Virtualization is usually the creation of a system that executes separate from the underlying hardware resources, or the creation of an entire desktop for systems located elsewhere, similar to thin clients.

Share tech news, updates, or what's on your mind.

Sign up to Post

Cyber Infrastructure 3.0
Meet modern IT demands with a scale-out, cost-efficient and multi-purpose solution for the Edge.
0
HTML5 and CSS3 Fundamentals
LVL 13
HTML5 and CSS3 Fundamentals

Build a website from the ground up by first learning the fundamentals of HTML5 and CSS3, the two popular programming languages used to present content online. HTML deals with fonts, colors, graphics, and hyperlinks, while CSS describes how HTML elements are to be displayed.

In my 23-year career as a software developer, I've noticed an imbalance of diversity in the world of technology - especially when it comes to hiring women in tech. Here's a look at ways I try to make a difference in my community and the industry as a whole.
6
LVL 1

Author Comment

by:Kesha Williams
As you note, women aren't well represented in the tech field. However, skin color is relevant in that women of color are marginalized even further. While women as a group potentially experience sexism --  women of color are simultaneously exposed to both sexism and racism. The theory of intersectionality discusses this experience, but the easiest way to explain is that women of color are facing more bias and a more complex social dynamic.

I couldn't have said it better, Lucas. Thank you for your insight. Women of color face both sexism and racism in the US. I'm actually speaking at Amazon re:Invent on intersectionality in tech. I hope to see you there!
5

Expert Comment

by:Raymond Bailey
Thank you, Kesha,
An informed and appropriate article.

As a White Male with a long career in IT, I would like to point out one of your observations:
In this development process, I did not include race as a data factor, because I did not want this tool to ever racially profile individuals. Other developers from the white, male, computer-science background may not have thought of that.

If you are speaking about current White Males in IT, perhaps. But why is that so? The existence of questions about Race, Gender, Ethnicity, Socio-Economic status as it exists in IT now, may need redress. that is indeed your generation's duty to do so. It is a legacy of the past, "My Generation".

When you say
I did not want this tool to ever racially profile individuals
is to miss the point of my generation. The use of "Race" during those years in IT was never meant to "profile" with denigration. As if delimiting African Americans, Asians, American Indians, or Latinos, male or female, was the focus of the question. It was always in service of the requirements of the system, often Government Title and IRS provisions.  In these cases, it was driven by the Civil Rights Acts, Gender Equality, ADA, and other inclusive targeting which came out of the changes my generation sought during the 60' and 70's.

The data many of my systems collected was used for meeting the laudable ends of erasing the racial, economic, and gender lines of the prior generations (1950's and before). I and my colleagues never used our IT programming for "profiling" for negative effect! We opted for "Neutral" as in "All People" to be included, which required redress of the past, which (in an ironic way) required targeting those groups for such redress!

I find it distressing that observations like the ones you make here are part of broad-brush strokes that are based on a presumption of something that is not "proven" by discovery of the past.  As one of my generation that embraced the wonders of the digital age, I can certainly say that the majority of us from the 1960's on have never entertained the thought of using our systems to denigrate others based on exclusion! We also embraced those previously excluded individuals who joined our ranks. Some of the smartest and best of my colleagues were of other than white males. Were we all "perfect" according to today's standards? Of course not! We grew and changed as every generation must do The enlightenment of today did not occur overnight! It takes time!

You do your older IT colleagues a disservice in their being a small part of the change that brought you to your place in the world today. As Hillary Clinton so often says "It Takes a Village". The IT Village was not founded or became what it is today if those of us before you did not embrace the "Right Things" when we saw it.

I embrace what you express in your article, thank you.

With Respect,

An Old White IT Guy Who Loves Tech, and All The People It Serves!
0
Autostart VMWare ESXi 6.0-6.7 Virtual Machines -
The task has taken me a year to figure out, so I would like to share tips with you, in case you run into the problem and come across this article, searching for it.
0
VMware Site Recovery Manager
The article describes step by step how to validate the SRA software certificate once installed on the Site Recovery Manager server. I hope it will be very useful for all administrators of virtualized environments.
0
Re-create the missing VMDK File Descriptor
The following article describes how to recreate the VMDK file of a virtual machine. It is important that this file is always in the datastore where the VM is stored, because if the VM is not present, it will not be able to turn on and an error I hope it is very useful for everyone.
1
LVL 133

Expert Comment

by:Andrew Hancock (VMware vExpert / EE Fellow)
@Nabeel Ahmed

I would recommend if you need URGENT attention to the issue I would Ask a related question.
0
LVL 8

Author Comment

by:RAFA
Hello

Please share the screens until the step you arrived, ask a question to help you.

regards...
0
Write My Paper
Virtualization software lets you run different versions of Windows, Ubuntu Linux and other versions of Linux all at the same time, rather than running each one directly from your computer's hard drive.
0
Can you run Linux on a Windows system? Yep. Here's how.
1
Want to create a VM? Here's how you do it.
0
VMware Converter
If you need to complete a Physical to Virtual (P2V), Virtual to Virtual (V2V) conversion to a VMware product (VMware Workstation, Player or VMware vSphere (ESXi) ) for FREE, then there is some good news...
0
400TB Disaggregate Cluster
Herein one will find an aggregate of some of my experience building and deploying virtualization stacks both in standalone, clustered Hyper-V, clustered Hyper-V with a Scale-Out File Server (SOFS) backend, and Storage Spaces Direct (S2D).
2

Expert Comment

by:Timothy Alexander
What are some good heuristics when considering the ratio of total Guest vCPUs to Host Physical Cores(ignoring HT/SMT); 2:1, 3:1?
The more involved followup might be how to measure core contention on a Hyper-V Host

Also when does core count matter more vs frequency, I guess the answer is workload dependent.
20 Cores @ 2.5Ghz (50k Ghz)
16 Cores @ 3.7Ghz (59.2k Ghz)
0
LVL 45

Author Comment

by:Philip Elder
Microsoft used to have a set of values for VM counts depending on processor core count and GHz. Those recommendations have essentially been sidelined due to the fact that CPU is pretty much not the bottleneck anymore.

That being said, we go for GHz before core count as a rule because it's just that much faster to get the smaller vCPU count VM's threads through the CPU pipeline.

And finally, a wide core count would indeed be needed for multi-threaded applications like SQL to get through the pipeline as soon and as wide as possible.
0
Announcing the Winners!
LVL 13
Announcing the Winners!

The results are in for the 15th Annual Expert Awards! Congratulations to the winners, and thank you to everyone who participated in the nominations. We are so grateful for the valuable contributions experts make on a daily basis. Click to read more about this year’s recipients!

In this article will go through how to backup a vPostgres DB from a broken vCenter Appliance and restore to a new vCenter Appliance.
0
This article will explain How to fix Broken backup chain in Veeam Backup & Replication.
0
August and September have been big months for VMware—from VMworld last month to our new Course of the Month in VMware Professional - Data Center Virtualization. We reached out to Andrew Hancock, resident VMware vExpert, to have a more in-depth discussion about the growth of this field.
7
The ultimate Citrix XenDesktop 7.x internals cheat sheet!
What if you have to shut down the entire Citrix infrastructure for hardware maintenance, software upgrades or "the unknown"? I developed this plan for "the unknown" and hope that it helps you as well. This article explains how to properly shut down and start your ENTIRE Citrix environment.
0
Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root account.
0
ONPAGE AND LOG.IZ
A look into Log Analysis and Effective Critical Alerting.
0
Lab Topology
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
1

Expert Comment

by:PriteshW
Good Article, setup on my lab and works well.
0
Veeam Endpoint Recovery
In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
4

Expert Comment

by:DanielNinkovic Ninkovic
Hello, Is it safe to do this with a Domain Controller?
0
LVL 133

Author Comment

by:Andrew Hancock (VMware vExpert / EE Fellow)
You will need to post a question, so we can discuss this.
0
Is your company's data protection keeping pace with virtualization? Here are 7 dynamic ways to adapt to rapid breakthroughs in technology.
0
OWASP: Forgery and Phishing
LVL 13
OWASP: Forgery and Phishing

Learn the techniques to avoid forgery and phishing attacks and the types of attacks an application or network may face.

Veeam Backup & Replication has added a new integration – Veeam Backup for Microsoft Office 365.  In this blog, we will discuss how you can benefit from Office 365 email backup with the Veeam’s new product and try to shed some light on the needs and use cases of email backups.
2
Last article we focus in how to VMware: How to create and use VMs TAGs – Part 1 so before follow this article and perform the next tasks, you should read the first article how to create the TAG before using them in Veeam Backup Jobs.
2
Will try to explain how to use the VMware feature TAGs in the VMs and create Veeam Backup Jobs using TAGs. Since this article is too long, I will create second article for the Veeam tasks.
0
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
0
When we have a dead host and we lose all connections to the ESXi, and we need to find a way to move all VMs from that dead ESXi host.
0
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona.

Thanks David, for your detailed and honest evaluation!
0
LVL 5

Author Comment

by:Kimberley from Paessler
Hi Ryan,

Thanks for your message.  I'll flesh it out a bit and then submit it again.

I have a related question:  If I have a topic/article/post that I only want to post to the Paessler Topics page, does it still go through independent review?  I tagged "paessler" on several articles, but haven't been asked to review or approve them.  Who decides what can appear on our topics page?

(um, to avoid confusion, yes, I'd like to post this article to several topics, after it meets the requirements for an article.  My question is more a hypothetical one, in case I have things to post only to the Paessler topics page at some point).

Thanks for your help!

Kimberley
0

Virtualization

18K

Solutions

11K

Contributors

Virtualization is the act of creating a virtual (rather than actual) version of something, including (but not limited to) a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Virtualization is usually the creation of a system that executes separate from the underlying hardware resources, or the creation of an entire desktop for systems located elsewhere, similar to thin clients.